Search results for: structurational model of technology (Orlikowski)
22526 Educational Related Information Technology Department Transformation: A Case Study
Authors: P. Joongsiri, K. Pattanapisuth, P. Siwatintuko, S. Vasupongayya
Abstract:
This paper presents a case study of developing a four-year plan for the information technology department at the Faculty of Engineering, Prince of Songkla University, Thailand. This work can be used as a case study for other in-house information technology department in a higher educational environment. The result of this paper is the guideline of the four year plan creation process which is generated by analyzing the related theories and several best practices.Keywords: strategic plan, management information system, information technology department governance, best practices, organization transformation
Procedia PDF Downloads 45522525 Survey on Malware Detection
Authors: Doaa Wael, Naswa Abdelbaky
Abstract:
Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.Keywords: malware analysis, blockchain, malware attacks, malware detection approaches
Procedia PDF Downloads 8522524 Forecasting Silver Commodity Prices Using Geometric Brownian Motion: A Stochastic Approach
Authors: Sina Dehghani, Zhikang Rong
Abstract:
Historically, a variety of approaches have been taken to forecast commodity prices due to the significant implications of these values on the global economy. An accurate forecasting tool for a valuable commodity would significantly benefit investors and governmental agencies. Silver, in particular, has grown significantly as a commodity in recent years due to its use in healthcare and technology. This manuscript aims to utilize the Geometric Brownian Motion predictive model to forecast silver commodity prices over multiple 3-year periods. The results of the study indicate that the model has several limitations, particularly its inability to work effectively over longer periods of time, but still was extremely effective over shorter time frames. This study sets a baseline for silver commodity forecasting with GBM, and the model could be further strengthened with refinement.Keywords: geometric Brownian motion, commodity, risk management, volatility, stochastic behavior, price forecasting
Procedia PDF Downloads 2022523 A Filtering Algorithm for a Nonlinear State-Space Model
Authors: Abdullah Eqal Al Mazrooei
Abstract:
Kalman filter is a famous algorithm that utilizes to estimate the state in the linear systems. It has numerous applications in technology and science. Since of the most of applications in real life can be described by nonlinear systems. So, Kalman filter does not work with the nonlinear systems because it is suitable to linear systems only. In this work, a nonlinear filtering algorithm is presented which is suitable to use with the special kinds of nonlinear systems. This filter generalizes the Kalman filter. This means that this filter also can be used for the linear systems. Our algorithm depends on a special linearization of the second degree. We introduced the nonlinear algorithm with a bilinear state-space model. A simulation example is presented to illustrate the efficiency of the algorithm.Keywords: Kalman filter, filtering algorithm, nonlinear systems, state-space model
Procedia PDF Downloads 37322522 Challenges Caused by the Integration of Technology as a Pedagogy in One of the Historically Disadvantaged Higher Education Institutions
Authors: Rachel Gugu Mkhasibe
Abstract:
Incorporation of technology as a pedagogy has many benefits. For instance, improvement of pedagogy, increased information access, increased cooperation, and collaboration. However, as good as it may be, this integration of technology as a pedagogy has not been widely adopted in most historically Black higher education institutions especially those in developing countries. For example, the socioeconomic background of students in historically black universities, the weak financial support available from these universities, as well as a large population of students struggle to access the recommended modern physical resources such as iPads, laptops, mobile phones, to name a few. This contributes to an increase in the increase of educational inequalities. The qualitative research approach was utilized in this work to gather detailed data about the obstacles created by the integration of technology as a pedagogy. Interviews were conducted to generate data from 20 academics from 10 Leve two students from one of the historically disadvantaged higher education Institutions in South Africa. The findings revealed that although both students and academics had overwhelming support of the integration of technology as a pedagogy in their institution, the environment which they found themselves in compromise the incorporation of technology as a pedagogy. Therefore, this paper recommends that Department of Higher Education and University Management should intervene and budget for technology to be provided in all the institutions of higher education regardless of where the institutions are situated.Keywords: collaboration, integration, pedagogy, technology
Procedia PDF Downloads 8022521 Factors Influencing the Continuance Usage of Online Mobile Payment Apps: A Case Study of WECHAT Users in China
Authors: Isaac Kofi Mensah, Jianing Mi, Feng Cheng
Abstract:
This research paper seeks to investigate the factors determining the continuance usage of online mobile payment applications among WECHAT users in China. Technology Acceptance Model (TAM) and the Diffusion of Innovation (DOI) theory would both be applied as the theoretical foundation for this study. A developed instrument would be administered to the targeted sample of 1000 WECHAT Users in the City of Harbin, China, through an online questionnaire administration platform. Factors such as perceived usefulness, perceived ease of use, perceived service quality, social influence, trust in the internet, internet self-efficacy, relative advantage, compatibility, and complexity would be explored to determine its significant impact on the continuance intention to use mobile payment apps. This study is at the development and implementation stage. The successful completion of this research article would not only provide an insightful understanding of the factors influencing the decision of WECHAT users in China to use mobile payment applications but also enrich the e-commerce adoption literature.Keywords: diffusion of innovation (DOI), e-commerce, mobile payment, technology acceptance model (TAM), WECHAT
Procedia PDF Downloads 19122520 Local Community Participation and the Adoption of Agricultural Technology in Kayunga District, Uganda
Authors: Barbara Kyampeire, Gerald Karyeijja
Abstract:
This study investigated the influence of local community participation on the adoption of new agricultural technology in Uganda, using the case study of Smooth Cayenne Pineapples in Kayunga District, Uganda. The mechanism of adoption of new technologies is often not fully understood and this prompted the study. The study adopted a descriptive, co relational, survey design. The researcher used questionnaire survey, focus group discussion as methods of data collection. A total of 152 respondents including adopters and non-adopters of new technology for producing pineapples were selected from 8 farmer groups in Kayunga District. The results indicated that the participation of the community in the planning, implementation and the monitoring and evaluation of the adoption of the new technology for producing pineapples was low thus reducing the adoption of the new technology in the District. The researcher concluded that community participation significantly influences the adoption of new agricultural technology by members of a particular community. The study thus recommended that: first, there is need for maximum involvement of members of the community in the planning, implementation and monitoring of any new agricultural technology; secondly, there is need for continued sharing of information about new agricultural technologies being introduced; and finally, community members must be equipped with Monitoring and Evaluation (M&E) skills in order to make them monitor the progress made by the new agricultural technologies.Keywords: adoption, community, technology, implementation
Procedia PDF Downloads 42122519 Multiparametric Optimization of Water Treatment Process for Thermal Power Plants
Authors: Balgaisha Mukanova, Natalya Glazyrina, Sergey Glazyrin
Abstract:
The formulated problem of optimization of the technological process of water treatment for thermal power plants is considered in this article. The problem is of multiparametric nature. To optimize the process, namely, reduce the amount of waste water, a new technology was developed to reuse such water. A mathematical model of the technology of wastewater reuse was developed. Optimization parameters were determined. The model consists of a material balance equation, an equation describing the kinetics of ion exchange for the non-equilibrium case and an equation for the ion exchange isotherm. The material balance equation includes a nonlinear term that depends on the kinetics of ion exchange. A direct problem of calculating the impurity concentration at the outlet of the water treatment plant was numerically solved. The direct problem was approximated by an implicit point-to-point computation difference scheme. The inverse problem was formulated as relates to determination of the parameters of the mathematical model of the water treatment plant operating in non-equilibrium conditions. The formulated inverse problem was solved. Following the results of calculation the time of start of the filter regeneration process was determined, as well as the period of regeneration process and the amount of regeneration and wash water. Multi-parameter optimization of water treatment process for thermal power plants allowed decreasing the amount of wastewater by 15%.Keywords: direct problem, multiparametric optimization, optimization parameters, water treatment
Procedia PDF Downloads 38522518 Topics of Blockchain Technology to Teach at Community College
Authors: Penn P. Wu, Jeannie Jo
Abstract:
Blockchain technology has rapidly gained popularity in industry. This paper attempts to assist academia to answer four questions. First, should community colleges begin offering education to nurture blockchain-literate students for the job market? Second, what are the appropriate topical areas to cover? Third, should it be an individual course? And forth, should it be a technical or management course? This paper starts with identifying the knowledge domains of blockchain technology and the topical areas each domain has, and continues with placing them in appropriate academic territories (Computer Sciences vs. Business) and subjects (programming, management, marketing, and laws), and then develops an evaluation model to determine the appropriate topical area for community colleges to teach. The evaluation is based on seven factors: maturity of technology, impacts on management, real-world applications, subject classification, knowledge prerequisites, textbook readiness, and recommended pedagogies. The evaluation results point to an interesting direction that offering an introductory course is an ideal option to guide students through the learning journey of what blockchain is and how it applies to business. Such an introductory course does not need to engage students in the discussions of mathematics and sciences that make blockchain technologies possible. While it is inevitable to brief technical topics to help students build a solid knowledge foundation of blockchain technologies, community colleges should avoid offering students a course centered on the discussion of developing blockchain applications.Keywords: blockchain, pedagogies, blockchain technologies, blockchain course, blockchain pedagogies
Procedia PDF Downloads 12822517 Videoconference Technology: An Attractive Vehicle for Challenging and Changing Tutors Practice in Open and Distance Learning Environment
Authors: Ramorola Mmankoko Ziphorah
Abstract:
Videoconference technology represents a recent experiment of technology integration into teaching and learning in South Africa. Increasingly, videoconference technology is commonly used as a substitute for the traditional face-to-face approaches to teaching and learning in helping tutors to reshape and change their teaching practices. Interestingly, though, some studies point out that videoconference technology is commonly used for knowledge dissemination by tutors and not so much for the actual teaching of course content in Open and Distance Learning context. Though videoconference technology has become one of the dominating technologies available among Open and Distance Learning institutions, it is not clear that it has been used as effectively to bridge the learning distance in time, geography, and economy. While tutors are prepared theoretically, in most tutor preparation programs, on the use of videoconference technology, there are still no practical guidelines on how they should go about integrating this technology into their course teaching. Therefore, there is an urgent need to focus on tutor development, specifically on their capacities and skills to use videoconference technology. The assumption is that if tutors become competent in the use of the videoconference technology for course teaching, then their use in Open and Distance Learning environment will become more commonplace. This is the imperative of the 4th Industrial Revolution (4IR) on education generally. Against the current vacuum in the practice of using videoconference technology for course teaching, the current study proposes a qualitative phenomenological approach to investigate the efficacy of videoconferencing as an approach to student learning. Using interviews and observation data from ten participants in Open and Distance Learning institution, the author discusses how dialogue and structure interacted to provide the participating tutors with a rich set of opportunities to deliver course content. The findings to this study highlight various challenges experienced by tutors when using videoconference technology. The study suggests tutor development programs on their capacity and skills and on how to integrate this technology with various teaching strategies in order to enhance student learning. The author argues that it is not merely the existence of the structure, namely the videoconference technology, that provides the opportunity for effective teaching, but that is the interactions, namely, the dialogue amongst tutors and learners that make videoconference technology an attractive vehicle for challenging and changing tutors practice.Keywords: open distance learning, transactional distance, tutor, videoconference
Procedia PDF Downloads 12722516 Impact of Reverse Technology Transfer on Innovation Capabilities: An Econometric Analysis for Mexican Transnational Corporations
Authors: Lissette Alejandra Lara, Mario Gomez, Jose Carlos Rodriguez
Abstract:
ransnational corporations (TNCs) as units in which it is possible technology and knowledge transfer across borders and the potential for generating innovation and contributing in economic development both in home and host countries have been widely acknowledged in the foreign direct investment (FDI) literature. Particularly, the accelerated expansion of emerging countries TNCs in the last decades has guided an uprising research stream that measure the presence of reverse technology transfer, defined as the extent to which emerging countries’ TNCs use outward FDI in a host country through certain mechanisms to absorb and transfer knowledge thus improving its technological capabilities in the home country. The objective of this paper is to test empirically the presence of reverse technology transfer and its impact on the innovation capabilities in Mexican transnational corporations (MXTNCs) as a part of the emerging countries TNCs that have successfully entered to industrialized markets. Using a panel dataset of 22 MXTNCs over the period 1994-2015, the results of the econometric model demonstrate that the amount of Mexican outward FDI and the research and development (R&D) expenditure in host developed countries had a positive impact on the innovation capabilities at the firm and industry level. There is also evidence that management of acquired brands and the organizational structure of Mexican subsidiaries improved these capabilities. Implications for internationalization strategies of emerging countries corporations and future research guidelines are discussed.Keywords: emerging countries, foreign direct investment, innovation capabilities, Mexican transnational corporations, reverse technology transfer
Procedia PDF Downloads 22522515 Mobile Systems: History, Technology, and Future
Authors: Shivendra Pratap Singh, Rishabh Sharma
Abstract:
The widespread adoption of mobile technology in recent years has revolutionized the way we communicate and access information. The evolution of mobile systems has been rapid and impactful, shaping our lives and changing the way we live and work. However, despite its significant influence, the history and development of mobile technology are not well understood by the general public. This research paper aims to examine the history, technology and future of mobile systems, exploring their evolution from early mobile phones to the latest smartphones and beyond. The study will analyze the technological advancements and innovations that have shaped the mobile industry, from the introduction of mobile internet and multimedia capabilities to the integration of artificial intelligence and 5G networks. Additionally, the paper will also address the challenges and opportunities facing the future of mobile technology, such as privacy concerns, battery life, and the increasing demand for high-speed internet. Finally, the paper will also provide insights into potential future developments and innovations in the mobile sector, such as foldable phones, wearable technology, and the Internet of Things (IoT). The purpose of this research paper is to provide a comprehensive overview of the history, technology, and future of mobile systems, shedding light on their impact on society and the challenges and opportunities that lie ahead.Keywords: mobile technology, artificial intelligence, networking, iot, technological advancements, smartphones
Procedia PDF Downloads 9122514 Important Management Competencies: University of Technology Perspective
Authors: Courtley Pharaoh, D. J. Visser
Abstract:
University management is often caught between competing interests from stakeholders like students, trustees, donors, government and the community it serves. This study aimed to identify what management competencies are required by executive management members of universities of technology to effectively manage a university of technology in South Africa from the perspective of the executive management members. This exploratory study will make use of a qualitative methodology to establish what management competencies are deemed as important to manage a university of technology in South Africa from the executive management perspective. Due to the consequences of the COVID-19 Pandemic, the study made use of online face-to-face interviews to ascertain from executive management members of universities of technology what the required management competencies needed by executive management members of universities of technology to effectively manage a University of Technology in South Africa. Qualitative Content Analysis was used to analyse the data collected. The findings of the study identified a total of 26 management competencies which were categorised into three groupings or themes. This study identified a list of required management competencies needed by executive management members of universities of technology to effectively manage a university of technology in South Africa, as per the lived experience of executive management members. The researcher recommends further studies at traditional and comprehensive universities and compares the results of those future studies with the results of this study. A comprehensive list of management competencies could then be identified, which could assist with the compilation of job descriptions of executive management members of universities in South Africa.Keywords: university of technology, management competencies, executive management, executive management members, important
Procedia PDF Downloads 10122513 Equivalent Circuit Model for the Eddy Current Damping with Frequency-Dependence
Authors: Zhiguo Shi, Cheng Ning Loong, Jiazeng Shan, Weichao Wu
Abstract:
This study proposes an equivalent circuit model to simulate the eddy current damping force with shaking table tests and finite element modeling. The model is firstly proposed and applied to a simple eddy current damper, which is modelled in ANSYS, indicating that the proposed model can simulate the eddy current damping force under different types of excitations. Then, a non-contact and friction-free eddy current damper is designed and tested, and the proposed model can reproduce the experimental observations. The excellent agreement between the simulated results and the experimental data validates the accuracy and reliability of the equivalent circuit model. Furthermore, a more complicated model is performed in ANSYS to verify the feasibility of the equivalent circuit model in complex eddy current damper, and the higher-order fractional model and viscous model are adopted for comparison.Keywords: equivalent circuit model, eddy current damping, finite element model, shake table test
Procedia PDF Downloads 18922512 Design and Simulation on Technology Capabilities in Developing countries, Design and Engineering Approach
Authors: S. Abedi, M. R. Soroush, M. Mousakhani
Abstract:
According to studies in the field of technology capabilities we identify the most important indicators to evaluate the level of "Design and Engineering" capabilities. Since the technology development correlates with the level of technology capabilities trying to promote its key importance. In this research by using FDM, the right combination of D&E capabilities indicators according to the auto industry is presented. Finally, with modeling evaluation of D&E capabilities by using FIS and check its reliability, five levels were determined to evaluate the D&E capabilities. We have analyzed 80 companies in auto industry and determined D&E capabilities of each level. Field of company activity indicators has been divided into four categories, Suspension group, Electrical group, Engine groups and trims group. The results show that half of the surveyed companies had D&E capabilities in Level 1 and 2 or in other words very low and low level of D&E.Keywords: developing countries, D&E capabilities, technology capabilities, auto industry
Procedia PDF Downloads 53422511 The Extended Skew Gaussian Process for Regression
Authors: M. T. Alodat
Abstract:
In this paper, we propose a generalization to the Gaussian process regression(GPR) model called the extended skew Gaussian process for regression(ESGPr) model. The ESGPR model works better than the GPR model when the errors are skewed. We derive the predictive distribution for the ESGPR model at a new input. Also we apply the ESGPR model to FOREX data and we find that it fits the Forex data better than the GPR model.Keywords: extended skew normal distribution, Gaussian process for regression, predictive distribution, ESGPr model
Procedia PDF Downloads 55122510 The Role of Information Technology in the Supply Chain Management
Authors: Azar Alizadeh, Mohammad Reza Naserkhaki
Abstract:
The application of the IT systems for collecting and analyzing the data can have a significant effect on the performance of any company. In recent decade, different advancements and achievements in the field of information technology have changed the industry compared to the previous decade. The adoption and application of the information technology are one of the ways to achieve a distinctive competitive personality to the companies and their supply chain. The acceptance of the IT and its proper implementation cam reinforce and improve the cooperation between different parts of the supply chain by rapid transfer and distribution of the precise information and the application of the informational systems, leading to the increase in the supply chain efficiency. The main objective of this research is to study the effects and applications of the information technology on and in the supply chain management and to introduce the effective factors on the acceptance of information technology in the companies. Moreover, in order to understand the subject, we will investigate the role and importance of the information and electronic commerce in the supply chain and the characteristics of the supply chain based on the information flow approach.Keywords: electronic commerce, industry, information technology, management, supply chain, system
Procedia PDF Downloads 48322509 Camera Model Identification for Mi Pad 4, Oppo A37f, Samsung M20, and Oppo f9
Authors: Ulrich Wake, Eniman Syamsuddin
Abstract:
The model for camera model identificaiton is trained using pretrained model ResNet43 and ResNet50. The dataset consists of 500 photos of each phone. Dataset is divided into 1280 photos for training, 320 photos for validation and 400 photos for testing. The model is trained using One Cycle Policy Method and tested using Test-Time Augmentation. Furthermore, the model is trained for 50 epoch using regularization such as drop out and early stopping. The result is 90% accuracy for validation set and above 85% for Test-Time Augmentation using ResNet50. Every model is also trained by slightly updating the pretrained model’s weightsKeywords: One Cycle Policy, ResNet34, ResNet50, Test-Time Agumentation
Procedia PDF Downloads 20722508 Developing Measurement Instruments for Enterprise Resources Planning (ERP) Post-Implementation Failure Model
Authors: Malihe Motiei, Nor Hidayati Zakaria, Davide Aloini
Abstract:
This study aims to present a method to develop the failure measurement model for ERP post-implementation. To achieve this outcome, the study firstly evaluates the suitability of Technology-Organization-Environment framework for the proposed conceptual model. This study explains how to discover the constructs and subsequently to design and evaluate the constructs as formative or reflective. Constructs are used including reflective and purely formative. Then, the risk dimensions are investigated to determine the instruments to examine the impact of risk on ERP failure after implementation. Two construct as formative constructs consist inadequate implementation and poor organizational decision making. Subsequently six construct as reflective construct include technical risks, operational risks, managerial risks, top management risks, lack of external risks, and user’s inefficiency risks. A survey was conducted among Iranian industries to collect data. 69 data were collected from manufacturing sectors and the data were analyzed by Smart PLS software. The results indicated that all measurements included 39 critical risk factors were acceptable for the ERP post-implementation failure model.Keywords: critical risk factors (CRFs), ERP projects, ERP post-implementation, measurement instruments, ERP system failure measurement model
Procedia PDF Downloads 36122507 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207
Authors: Mazhar Hamayun
Abstract:
Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207
Procedia PDF Downloads 8522506 Modern Trends in Pest Management Agroindustry
Authors: Amarjit S Tanda
Abstract:
Integrated Pest Management Technology (IPMT) offers a crop protection model with sustainable agriculture production with minimum damage to the environment and human health. A concept of agro-ecological crop protection seems unsuitable under dynamic environmental systems. To remedy this, we are proposing Genetically Engineered Crop Protection System (GECPS), as an alternate concept in IPMT that suggests how GE cultivars can be optimally put to the service of crop protection. Genetically engineered cultivars which are developed by gene editing biotechnology may provide a preventive defense against the insect pests and plant diseases, a suitable alternative crop system for blending in IPMT program, in the future agro-industry.Keywords: integrated, pest, management, technology
Procedia PDF Downloads 7122505 BIM Model and Virtual Prototyping in Construction Management
Authors: Samar Alkindy
Abstract:
Purpose: The BIM model has been used to support the planning of different construction projects in the industry by showing the different stages of the construction process. The model has been instrumental in identifying some of the common errors in the construction process through the spatial arrangement. The continuous use of the BIM model in the construction industry has resulted in various radical changes such as virtual prototyping. Construction virtual prototyping is a highly advanced technology that incorporates a BIM model with realistic graphical simulations, and facilitates the simulation of the project before a product is built in the factory. The paper presents virtual prototyping in the construction industry by examining its application, challenges and benefits to a construction project. Methodology approach: A case study was conducted for this study in four major construction projects, which incorporate virtual construction prototyping in several stages of the construction project. Furthermore, there was the administration of interviews with the project manager and engineer and the planning manager. Findings: Data collected from the methodological approach shows a positive response for virtual construction prototyping in construction, especially concerning communication and visualization. Furthermore, the use of virtual prototyping has increased collaboration and efficiency between construction experts handling a project. During the planning stage, virtual prototyping has increased accuracy, reduced planning time, and reduced the amount of rework during the implementation stage. Irrespective of virtual prototyping being a new concept in the construction industry, the findings outline that the approach will benefit the management of construction projects.Keywords: construction operations, construction planning, process simulation, virtual prototyping
Procedia PDF Downloads 22922504 French Language Teaching in Nigeria and Future with Technology
Authors: Chidiebere Samuel Ijeoma
Abstract:
The impact and importance of technology in all domains of existence cannot be overemphasized. It is like a double-edged sword which can be both constructive and destructive. The paper, therefore, tends to evaluate the impact of technology so far in the teaching and learning of French language in Nigeria. According to the study, the traditional methods of teaching French as a Foreign Language and recognized as our cultural methods of knowledge transfer are being fast replaced by digitalization in teaching. This, the research tends to portray and suggest the best way forward. In the Nigerian Primary Education System, the use of some local and cultural Instructional materials (teaching aids) is now almost history which the paper frowns at. Consequently, the study has these questions to ask?; Where are the chalks and blackboards? Where are the ‘Handworks’ (local brooms) submitted by school children as part of their Continuous Assessment? Finally, the research is in no way against the application of technology in the Nigerian French Language Teaching System but tries to draw a curtain between Technological methods of teaching French as a Foreign Language and the Original Nigerian System of teaching the language before the arrival of technology.Keywords: French language teaching, future, impact, importance of technology
Procedia PDF Downloads 35322503 Augmenting Classroom Reality
Authors: Kerrin Burnell
Abstract:
In a world of increasingly technology-dependent students, the English language classroom should ideally keep up with developments to keep students engaged as much as possible. Unfortunately, as is the case in Oman, funding is not always adequate to ensure students have the most up to date technology, and most institutions are still reliant on paper-based textbooks. In order to try and bridge the gap between the technology available (smartphones) and textbooks, augmented reality (AR) technology can be utilized to enhance classroom, homework, and extracurricular activities. AR involves overlaying media (videos, images etc) over the top of physical objects (posters, book pages etc) and then sharing the media. This case study involved introducing students to a freely available entry level AR app called Aurasma. Students were asked to augment their English textbooks, word walls, research project posters, and extracurricular posters. Through surveys, interviews and an analysis of time spent accessing the different media, a determination of the appropriateness of the technology for the classroom was determined. Results indicate that the use of AR has positive effects on many aspects of the English classroom. Increased student engagement, total time spent on task, interaction, and motivation were evident, along with a decrease in technology-related anxiety. As it is proving very difficult to get tablets or even laptops in classrooms in Oman, these preliminary results indicate that many positive outcomes will come from introducing students to this innovative technology.Keywords: augmented reality, classroom technology, classroom innovation, engagement
Procedia PDF Downloads 37922502 Policy Compliance in Information Security
Authors: R. Manjula, Kaustav Bagchi, Sushant Ramesh, Anush Baskaran
Abstract:
In the past century, the emergence of information technology has had a significant positive impact on human life. While companies tend to be more involved in the completion of projects, the turn of the century has seen importance being given to investment in information security policies. These policies are essential to protect important data from adversaries, and thus following these policies has become one of the most important attributes revolving around information security models. In this research, we have focussed on the factors affecting information security policy compliance in two models : The theory of planned behaviour and the integration of the social bond theory and the involvement theory into a single model. Finally, we have given a proposal of where these theories would be successful.Keywords: information technology, information security, involvement theory, policies, social bond theory
Procedia PDF Downloads 36822501 Knowledge, Technology and Empowerment in Contemporary Scenario
Authors: Samir Roy
Abstract:
This paper investigates the relationship among knowledge, technology, and empowerment. In Physics power is defined as rate of doing work. In everyday use, the meaning of the word power is related to the capacity to bring change of value in the world. It appears that the popular aphorism “Knowledge is power” should be revisited in the context of contemporary states of affairs. For instance, classical mechanics is a system of knowledge, so also thermodynamics. But neither of them, per se, is sufficient to produce automobilin es. Boolean algebra, the logical foundation of digital electronic computers, was introduced by George Boole in 1847. But that knowledge was practically useless for almost one hundred years until digital electronics was developed in early twentieth century, which eventually led to invention of digital electronic computers. Empowerment of women is a burning issue in the arena of social justice. However, if we carefully analyze the functional elements of women’s empowerment, we find them to be highly technology driven as well as technology dependent in real life. On the other hand, technology has empowered modern states to maintain social order and promote democracy in an effective manner. This paper includes a few case studies to establish the close correspondence between knowledge, especially scientific knowledge, technology, and empowerment. It appears that in contemporary scenario, “Technology is power” is a more appropriate statement than the traditional aphorism “Knowledge is power”.Keywords: knowledge, science, technology, empowerment, change, social justice
Procedia PDF Downloads 3922500 A Theoretical Hypothesis on Ferris Wheel Model of University Social Responsibility
Authors: Le Kang
Abstract:
According to the nature of the university, as a free and responsible academic community, USR is based on a different foundation —academic responsibility, so the Pyramid and the IC Model of CSR could not fully explain the most distinguished feature of USR. This paper sought to put forward a new model— Ferris Wheel Model, to illustrate the nature of USR and the process of achievement. The Ferris Wheel Model of USR shows the university creates a balanced, fairness and neutrality systemic structure to afford social responsibilities; that makes the organization could obtain a synergistic effect to achieve more extensive interests of stakeholders and wider social responsibilities.Keywords: USR, achievement model, ferris wheel model, social responsibilities
Procedia PDF Downloads 72222499 Investigating the Relationship between Bank and Cloud Provider
Authors: Hatim Elhag
Abstract:
Banking and Financial Service Institutions are possibly the most advanced in terms of technology adoption and use it as a key differentiator. With high levels of business process automation, maturity in the functional portfolio, straight through processing and proven technology outsourcing benefits, Banking sector stand to benefit significantly from Cloud computing capabilities. Additionally, with complex Compliance and Regulatory policies, combined with expansive products and geography coverage, the business impact is even greater. While the benefits are exponential, there are also significant challenges in adopting this model– including Legal, Security, Performance, Reliability, Transformation complexity, Operating control and Governance and most importantly proof for the promised cost benefits. However, new architecture designed should be implemented to align this approach.Keywords: security, cloud, banking sector, cloud computing
Procedia PDF Downloads 49722498 Model Predictive Control of Three Phase Inverter for PV Systems
Authors: Irtaza M. Syed, Kaamran Raahemifar
Abstract:
This paper presents a model predictive control (MPC) of a utility interactive three phase inverter (TPI) for a photovoltaic (PV) system at commercial level. The proposed model uses phase locked loop (PLL) to synchronize TPI with the power electric grid (PEG) and performs MPC control in a dq reference frame. TPI model consists of boost converter (BC), maximum power point tracking (MPPT) control, and a three leg voltage source inverter (VSI). Operational model of VSI is used to synthesize sinusoidal current and track the reference. Model is validated using a 35.7 kW PV system in Matlab/Simulink. Implementation and results show simplicity and accuracy, as well as reliability of the model.Keywords: model predictive control, three phase voltage source inverter, PV system, Matlab/simulink
Procedia PDF Downloads 59222497 Generation of Waste Streams in Small Model Reactors
Authors: Sara Mostofian
Abstract:
The nuclear industry is a technology that can fulfill future energy needs but requires special attention to ensure safety and reliability while minimizing any environmental impact. To meet these expectations, the nuclear industry is exploring different reactor technologies for power production. Several designs are under development and the technical viability of these new designs is the subject of many ongoing studies. One of these studies considers the radioactive emissions and radioactive waste generated during the life of a nuclear power production plant to allow a successful license process. For all the modern technologies, a good understanding of the radioactivity generated in the process systems of the plant is essential. Some of that understanding may be gleaned from the performance of some prototype reactors of similar design that operated decades ago. This paper presents how, with that understanding, a model can be developed to estimate the emissions as well as the radioactive waste during the normal operation of a nuclear power plant. The model would predict the radioactive material concentrations in different waste streams. Using this information, the radioactive emission and waste generated during the life of these new technologies can be estimated during the early stages of the design of the plant.Keywords: SMRs, activity transport, model, radioactive waste
Procedia PDF Downloads 108