Search results for: internet technology
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8777

Search results for: internet technology

8297 The Perspectives of Adult Learners Towards Online Learning

Authors: Jacqueline Żammit

Abstract:

Online learning has become more popular as a substitute for traditional classroom instruction because of the COVID-19 epidemic. The study aimed to investigate how adult Maltese language learners evaluated the benefits and drawbacks of online instruction. 35 adult participants provided data through semi-structured interviews with open-ended questions. NVivo software was used to analyze the interview data using the thematic analysis method in order to find themes and group the data based on common responses. The advantages of online learning that the participants mentioned included accessing subject content even without live learning sessions, balancing learning with household duties, and lessening vulnerability to problems like fatigue, time-wasting traffic, school preparation, and parking space constraints. Conversely, inadequate Internet access, inadequate IT expertise, a shortage of personal computers, and domestic distractions adversely affected virtual learning. Lack of an Internet connection, IT expertise, a personal computer, or a phone with Internet access caused inequality in access to online learning sessions. Participants thought online learning was a way to resume academic activity, albeit with drawbacks. In order to address the challenges posed by online learning, several solutions are proposed in the research's conclusion.

Keywords: adult learners, online education, e-learning, challenges of online learning, benefits ofonline learning

Procedia PDF Downloads 60
8296 Reclaiming the House with Use of Web 2.0 Tools: Democratic Candidates and Social Media during Midterm Elections in 2018

Authors: Norbert Tomaszewski

Abstract:

Modern politicians tend to resign from the traditional media as Web 2.0 tools allow them to interact with a much bigger audience while spending less money on their campaign. Current studies on this subject prove that in order to win the elections, the candidate needs to show his personal side during the campaign to appeal to the voter as an average citizen. Because of that, the internet user may engage in the politician's campaign by spreading his message along with his followers. The aim of the study is to determine how did the Democratic candidates use the Web 2.0 tools during the 2018 midterm elections campaign and whether they managed to succeed. Taking into consideration the fact that the United States as a country, has always set important milestones for the political marketing as a field of science, the result of the research can set some examples on how to manage the modern internet campaign in less developed countries.

Keywords: political campaign, midterm elections, social media, Web 2.0

Procedia PDF Downloads 148
8295 The Use of Software and Internet Search Engines to Develop the Encoding and Decoding Skills of a Dyslexic Learner: A Case Study

Authors: Rabih Joseph Nabhan

Abstract:

This case study explores the impact of two major computer software programs Learn to Speak English and Learn English Spelling and Pronunciation, and some Internet search engines such as Google on mending the decoding and spelling deficiency of Simon X, a dyslexic student. The improvement in decoding and spelling may result in better reading comprehension and composition writing. Some computer programs and Internet materials can help regain the missing awareness and consequently restore his self-confidence and self-esteem. In addition, this study provides a systematic plan comprising a set of activities (four computer programs and Internet materials) which address the problem from the lowest to the highest levels of phoneme and phonological awareness. Four methods of data collection (accounts, observations, published tests, and interviews) create the triangulation to validly and reliably collect data before the plan, during the plan, and after the plan. The data collected are analyzed quantitatively and qualitatively. Sometimes the analysis is either quantitative or qualitative, and some other times a combination of both. Tables and figures are utilized to provide a clear and uncomplicated illustration of some data. The improvement in the decoding, spelling, reading comprehension, and composition writing skills that occurred is proved through the use of authentic materials performed by the student under study. Such materials are a comparison between two sample passages written by the learner before and after the plan, a genuine computer chat conversation, and the scores of the academic year that followed the execution of the plan. Based on these results, the researcher recommends further studies on other Lebanese dyslexic learners using the computer to mend their language problem in order to design and make a most reliable software program that can address this disability more efficiently and successfully.

Keywords: analysis, awareness, dyslexic, software

Procedia PDF Downloads 220
8294 R Data Science for Technology Management

Authors: Sunghae Jun

Abstract:

Technology management (TM) is important issue in a company improving the competitiveness. Among many activities of TM, technology analysis (TA) is important factor, because most decisions for management of technology are decided by the results of TA. TA is to analyze the developed results of target technology using statistics or Delphi. TA based on Delphi is depended on the experts’ domain knowledge, in comparison, TA by statistics and machine learning algorithms use objective data such as patent or paper instead of the experts’ knowledge. Many quantitative TA methods based on statistics and machine learning have been studied, and these have been used for technology forecasting, technological innovation, and management of technology. They applied diverse computing tools and many analytical methods case by case. It is not easy to select the suitable software and statistical method for given TA work. So, in this paper, we propose a methodology for quantitative TA using statistical computing software called R and data science to construct a general framework of TA. From the result of case study, we also show how our methodology is applied to real field. This research contributes to R&D planning and technology valuation in TM areas.

Keywords: technology management, R system, R data science, statistics, machine learning

Procedia PDF Downloads 451
8293 Modern Methods of Technology and Organization of Production of Construction Works during the Implementation of Construction 3D Printers

Authors: Azizakhanim Maharramli

Abstract:

The gradual transition from entrenched traditional technology and organization of construction production to innovative additive construction technology inevitably meets technological, technical, organizational, labour, and, finally, social difficulties. Therefore, the chosen nodal method will lead to the elimination of the above difficulties, combining some of the usual methods of construction and the myth in world practice that the labour force is subjected to a strong stream of reduction. The nodal method of additive technology will create favourable conditions for the optimal degree of distribution of labour across facilities due to the consistent performance of homogeneous work and the introduction of additive technology and traditional technology into construction production.

Keywords: parallel method, sequential method, stream method, combined method, nodal method

Procedia PDF Downloads 87
8292 The Optical OFDM Equalization Based on the Fractional Fourier Transform

Authors: A. Cherifi, B. S. Bouazza, A. O. Dahman, B. Yagoubi

Abstract:

Transmission over Optical channels will introduce inter-symbol interference (ISI) as well as inter-channel (or inter-carrier) interference (ICI). To decrease the effects of ICI, this paper proposes equalizer for the Optical OFDM system based on the fractional Fourier transform (FrFFT). In this FrFT-OFDM system, traditional Fourier transform is replaced by fractional Fourier transform to modulate and demodulate the data symbols. The equalizer proposed consists of sampling the received signal in the different time per time symbol. Theoretical analysis and numerical simulation are discussed.

Keywords: OFDM, fractional fourier transform, internet and information technology

Procedia PDF Downloads 403
8291 The History and Plausible Future of Assistive Technology and What It Might Mean for Singapore Students With Disabilities

Authors: Thomas Chong, Irene Victor

Abstract:

This paper discusses the history and plausible future of assistive technology and what it means for students with disabilities in Singapore, a country known for its high quality of education in the world. Over more than a century, students with disabilities have benefitted from relatively low-tech assistive technology (like eye-glasses, Braille, magnifiers and wheelchairs) to high-tech assistive technology including electronic mobility switches, alternative keyboards, computer-screen enlargers, text-to-speech readers, electronic sign-language dictionaries and signing avatars for individuals with hearing impairments. Driven by legislation, the use of assistive technology in many countries is becoming so ubiquitous that more and more students with disabilities are able to perform as well as if not better than their counterparts. Yet in many other learning environments where assistive technology is not affordable or mandated, the learning gaps can be quite significant. Without stronger legislation, Singapore may still have a long way to go in levelling the playing field for its students with disabilities.

Keywords: assistive technology, students with disabilities, disability laws in Singapore, inclusiveness

Procedia PDF Downloads 67
8290 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 285
8289 Developing a Research Culture in the Faculty of Engineering and Information Technology at the Central University of Technology, Free State: Implications for Knowledge Management

Authors: Mpho Agnes Mbeo, Patient Rambe

Abstract:

The thirteenth year of the Central University of Technology, Free State’s (CUT) transition from a vocational and professional training orientation institution (i.e. a technikon) into a university with a strong research focus has neither been a smooth nor an easy one. At the heart of this transition was the need to transform the psychological faculties of academic and research staffs compliment who were accustomed to training graduates for industrial placement. The lack of a culture of research that fully embraces a strong ethos of conducting world-class research needed to be addressed. The induction and socialisation of academic staff into the development and execution of cutting-edge research also required the provision of research support and the creation of a conducive academic environment for research, both for emerging and non-research active academics. Drawing on ten cases, comprising four heads of departments, three prolific established researchers, and three emerging researchers, this study explores the challenges faced in establishing a strong research culture at the university. Furthermore, it gives an account of the extent to which the current research interventions have addressed the perceivably “missing research culture”, and the implications of these interventions for knowledge management. Evidence suggests that the endowment of an ideal institutional research environment (comprising strong internet networks, persistent connectivity on and off campus), research peer mentorship, and growing publication outputs should be matched by a coherent research incentive culture and strong research leadership. This is critical to building new knowledge and entrenching knowledge management founded on communities of practice and scholarly networking through the documentation and communication of research findings. The study concludes that the multiple policy documents set for the different domains of research may be creating pressure on researchers to engage research activities and increase output at the expense of research quality.

Keywords: Central University of Technology, performance, publication, research culture, university

Procedia PDF Downloads 171
8288 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 534
8287 Feasibility Study of MongoDB and Radio Frequency Identification Technology in Asset Tracking System

Authors: Mohd Noah A. Rahman, Afzaal H. Seyal, Sharul T. Tajuddin, Hartiny Md Azmi

Abstract:

Taking into consideration the real time situation specifically the higher academic institutions, small, medium to large companies, public to private sectors and the remaining sectors, do experience the inventory or asset shrinkages due to theft, loss or even inventory tracking errors. This happening is due to a zero or poor security systems and measures being taken and implemented in their organizations. Henceforth, implementing the Radio Frequency Identification (RFID) technology into any manual or existing web-based system or web application can simply deter and will eventually solve certain major issues to serve better data retrieval and data access. Having said, this manual or existing system can be enhanced into a mobile-based system or application. In addition to that, the availability of internet connections can aid better services of the system. Such involvement of various technologies resulting various privileges to individuals or organizations in terms of accessibility, availability, mobility, efficiency, effectiveness, real-time information and also security. This paper will look deeper into the integration of mobile devices with RFID technologies with the purpose of asset tracking and control. Next, it is to be followed by the development and utilization of MongoDB as the main database to store data and its association with RFID technology. Finally, the development of a web based system which can be viewed in a mobile based formation with the aid of Hypertext Preprocessor (PHP), MongoDB, Hyper-Text Markup Language 5 (HTML5), Android, JavaScript and AJAX programming language.

Keywords: RFID, asset tracking system, MongoDB, NoSQL

Procedia PDF Downloads 303
8286 Classic Modelled Hybrid Electric Vehicles Using The Power of Internet Of Things

Authors: Venkatesh Krishna Murthy

Abstract:

The era before government-regulated automotive designs gave us some astonishing vehicles that are well worth to keep on the road. The fact that restoring an automobile in 2015 does not mean it will perform like one designed in 2021. This is one of the reasons that manufacturers continue to turn to vintage hardware for future enhancements in their vehicles. Now we need to understand that a modern chassis could possibly allow manufacturers to give vintage performance cars a level of braking capability, compatibility with tires, chassis rigidity, suspension sophistication, and steering response, an experience only racers got until now. However, half a century of advancements in engineering can have a great impact on design in any field, and the automotive realm which holds no exception. In the current situation, a growing number of companies offer chassis and braking components to onboard manufacturers to retrofit contemporary technology for their vintage vehicles to modernize them at the foundation level. The recent question arises on performance on lithium batteries, as opposed to simply bolting upgraded components, for ex. lithium batteries with graphene as superconductive material to enhance performance, an area deeply investigated. Serving as the “bones” of the vehicle, the chassis and frame play a central role in dictating how that automobile will perform. While the desire to maintain originality is alluring for many, the benefits of a modern chassis are vast. In some situations, it also allows builders to put cars back on the road that might otherwise be too far gone. “There’s a couple of different factors at play here – one of them being that these older cars from the ’40s, ’50s, and ’60s have seen a lot of weather and a lot of road miles over the years, more often than not,” says Craig Morrison of Art Morrison Enterprises.

Keywords: hybrid electric vehicles, internet of things, lithium graphene batteries, classic car chassis

Procedia PDF Downloads 169
8285 Consumer Behaviour Model for Apparel E-Tailers Using Structural Equation Modelling

Authors: Halima Akhtar, Abhijeet Chandra

Abstract:

The paper attempts to analyze the factors that influence the Consumer Behavior to purchase apparel through the internet. The intentions to buy apparels online were based on in terms of user style, orientation, size and reputation of the merchant, social influence, perceived information utility, perceived ease of use, perceived pleasure and attractiveness and perceived trust and risk. The basic framework used was Technology acceptance model to explain apparels acceptance. A survey was conducted to gather the data from 200 people. The measures and hypotheses were analyzed using Correlation testing and would be further validated by the Structural Equation Modelling. The implications of the findings for theory and practice could be used by marketers of online apparel websites. Based on the values obtained, we can conclude that the factors such as social influence, Perceived information utility, attractiveness and trust influence the decision for a user to buy apparels online. The major factors which are found to influence an online apparel buying decision are ease of use, attractiveness that a website can offer and the trust factor which a user shares with the website.

Keywords: E-tailers, consumer behaviour, technology acceptance model, structural modelling

Procedia PDF Downloads 180
8284 Pattern of Cybercrime Among Adolescents: An Exploratory Study

Authors: Mohamamd Shahjahan

Abstract:

Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.

Keywords: cybercrime, adolescents, pattern, internet

Procedia PDF Downloads 77
8283 Assessing the Pre-Service and In-Service Teachers’ Continuation of Use of Technology After Participation in Professional Development

Authors: Ayoub Kafyulilo, Petra Fisser, Joke Voogt

Abstract:

This study was conducted to assess the continuation of the use of technology in science and mathematics teaching of the pre-service and in-service teachers who attended the professional development programme. It also assessed professional development, personal, institutional, and technological factors contributing to the continuous use of technology in teaching. The study involved 42 teachers, thirteen pre-service teachers, and twenty-nine in-service teachers. A mixed-method research approach was used to collect data for this study. Findings showed that the continuous use of technology in teaching after the termination of the professional development arrangement was high among the pre-service teachers, and differed for the in-service teachers. The regression model showed that knowledge and skills, access to technology and ease of use were strong predictors (R2 = 55.3%) of the teachers’ continuous use of technology after the professional development arrangement. The professional development factor did not have a direct effect on the continuous use of technology, rather had an influence on personal factors (knowledge and skills). In turn, the personal factors had influence on the institutional factors (access to technology) and technological factors (ease of use), which together had an effect on the teachers’ continuous use of technology in teaching.

Keywords: technology, professional development, teachers, science and mathematics

Procedia PDF Downloads 155
8282 Deep Reinforcement Learning-Based Computation Offloading for 5G Vehicle-Aware Multi-Access Edge Computing Network

Authors: Ziying Wu, Danfeng Yan

Abstract:

Multi-Access Edge Computing (MEC) is one of the key technologies of the future 5G network. By deploying edge computing centers at the edge of wireless access network, the computation tasks can be offloaded to edge servers rather than the remote cloud server to meet the requirements of 5G low-latency and high-reliability application scenarios. Meanwhile, with the development of IOV (Internet of Vehicles) technology, various delay-sensitive and compute-intensive in-vehicle applications continue to appear. Compared with traditional internet business, these computation tasks have higher processing priority and lower delay requirements. In this paper, we design a 5G-based Vehicle-Aware Multi-Access Edge Computing Network (VAMECN) and propose a joint optimization problem of minimizing total system cost. In view of the problem, a deep reinforcement learning-based joint computation offloading and task migration optimization (JCOTM) algorithm is proposed, considering the influences of multiple factors such as concurrent multiple computation tasks, system computing resources distribution, and network communication bandwidth. And, the mixed integer nonlinear programming problem is described as a Markov Decision Process. Experiments show that our proposed algorithm can effectively reduce task processing delay and equipment energy consumption, optimize computing offloading and resource allocation schemes, and improve system resource utilization, compared with other computing offloading policies.

Keywords: multi-access edge computing, computation offloading, 5th generation, vehicle-aware, deep reinforcement learning, deep q-network

Procedia PDF Downloads 112
8281 Modified RSA in Mobile Communication

Authors: Nagaratna Rajur, J. D. Mallapur, Y. B. Kirankumar

Abstract:

The security in mobile communication is very different from the internet or telecommunication, because of its poor user interface and limited processing capacity, as well as combination of complex network protocols. Hence, it poses a challenge for less memory usage and low computation speed based security system. Security involves all the activities that are undertaken to protect the value and on-going usability of assets and the integrity and continuity of operations. An effective network security strategies requires identifying threats and then choosing the most effective set of tools to combat them. Cryptography is a simple and efficient way to provide security in communication. RSA is an asymmetric key approach that is highly reliable and widely used in internet communication. However, it has not been efficiently implemented in mobile communication due its computational complexity and large memory utilization. The proposed algorithm modifies the current RSA to be useful in mobile communication by reducing its computational complexity and memory utilization.

Keywords: M-RSA, sensor networks, sensor applications, security

Procedia PDF Downloads 341
8280 Effect of Distance Education Students Motivation with the Turkish Language and Literature Course

Authors: Meva Apaydin, Fatih Apaydin

Abstract:

Role of education in the development of society is great. Teaching and training started with the beginning of the history and different methods and techniques which have been applied as the time passed and changed everything with the aim of raising the level of learning. In addition to the traditional teaching methods, technology has been used in recent years. With the beginning of the use of internet in education, some problems which could not be soluted till that time has been dealt and it is inferred that it is possible to educate the learners by using contemporary methods as well as traditional methods. As an advantage of technological developments, distance education is a system which paves the way for the students to be educated individually wherever and whenever they like without the needs of physical school environment. Distance education has become prevalent because of the physical inadequacies in education institutions, as a result; disadvantageous circumstances such as social complexities, individual differences and especially geographical distance disappear. What’s more, the high-speed of the feedbacks between teachers and learners, improvement in student motivation because there is no limitation of time, low-cost, the objective measuring and evaluation are on foreground. In spite of the fact that there is teaching beneficences in distance education, there are also limitations. Some of the most important problems are that : Some problems which are highly possible to come across may not be solved in time, lack of eye-contact between the teacher and the learner, so trust-worthy feedback cannot be got or the problems stemming from the inadequate technological background are merely some of them. Courses are conducted via distance education in many departments of the universities in our country. In recent years, giving lectures such as Turkish Language, English, and History in the first grades of the academic departments in the universities is an application which is constantly becoming prevalent. In this study, the application of Turkish Language course via distance education system by analyzing advantages and disadvantages of the distance education system which is based on internet.

Keywords: distance education, Turkish language, motivation, benefits

Procedia PDF Downloads 432
8279 The Third Level Digital Divide: Millennials and Post-Millennials Online Activities in South Africa

Authors: Ayanda Magida, Brian Armstrong

Abstract:

The study aimed to assess the third level of the digital divide among the millennials and post-millennials in South Africa. The millennials are people born from 1981-to 1996, that is, people between the ages of 25-40 years old and post-millennials are people born from 1997 to date. For the study, only post-millennials born between 1997-2003 were included as they were old enough to consent to participation in the study. Data was collected as part of the Ph.D. project that focuses on the relationship between income inequality, the digital divide, and social cohesion in South Africa. The digital divide has three main levels, namely the first, second and third. The first and second focus on access and usage, respectively. The third-level digital divide can be defined as the differences in the benefits associated with being online. The current paper focuses on the third level: the benefits derived by being online using four domains: economic, educational, social, and personal benefits. The economic benefits include income, employment and finance-related activities; the social benefits include socializing belonging, identity, and informal networks. The personal benefits include personal wellbeing and self-actualization. A total of 763 participants completed the survey, and 61.3% were post-millennials between the ages of 18-24 and s 38.6 % were millennials between 25 and 40. The majority of the respondents were female (62%), male (34%) and nonbinary (1%), respectively. Most of the respondents were black, followed by whites, Indians and colored, respectively. Thus, they represented the status of the demographics of the country. Most of the respondents had access to the internet and smartphone. Most expressed that they use laptops (68%) or mobile (71%) to access the internet and 54 % access the internet using wireless/Wi-Fi. There were no differences between the millennial and post-millennial economic and educational benefits of being online. However, the post-millennials were more inclined to use the internet for social and personal benefits than the millennials. This could be attributed to many factors, such as age. The post-millennials are still discovering themselves and therefore would derive social and personal benefits associated with being online. The findings confirm studies that argue that younger generations derive more benefits from being online than the older generation. Based on the findings, it is evident that the post-millennials are not using the internet or online activities for social networks and socializing but can derive economic benefits such as job looking and education benefits from being online. It can be inferred that there are no significant differences between the two groups, and it seems like the third-level digital divide is not evident among the two groups as they both have been able to derive meaningful benefits from being online. Further studies should focus on the third-level divide between the baby boomers and Generation X.

Keywords: third-level digital divide, millennials, post-millennials, online activities

Procedia PDF Downloads 100
8278 Network Mobility Support in Content-Centric Internet

Authors: Zhiwei Yan, Jong-Hyouk Lee, Yong-Jin Park, Xiaodong Lee

Abstract:

In this paper, we analyze NEtwork MObility (NEMO) supporting problems in Content-Centric Networking (CCN), and propose the CCN-NEMO which can well support the deployment of the content-centric paradigm in large-scale mobile Internet. The CCN-NEMO extends the signaling message of the basic CCN protocol, to support the mobility discovery and fast trigger of Interest re-issuing during the network mobility. Besides, the Mobile Router (MR) is extended to optimize the content searching and relaying in the local subnet. These features can be employed by the nested NEMO to maximize the advantages of content retrieving with CCN. Based on the analysis, we compare the performance on handover latency between the basic CCN and our proposed CCN-NEMO. The results show that our scheme can facilitate the content-retrieving in the NEMO scenario with improved performance.

Keywords: NEMO, CCN, mobility, handover latency

Procedia PDF Downloads 465
8277 Solar Energy Technology Adoption; A Vignette Study for the Up-Scale Residential Sector in Egypt

Authors: Mazen Zaki, Sherwat E. Ibrahim

Abstract:

Renewable energy has become a very important and critical topic all around the world due to the limited resources that led to shifting to the trend of renewable energy and its integration with the conventional ones. This paper investigates the adoption of the solar energy technology for up-scale residential sector in Cairo, Egypt. The technology acceptance model uses several stakeholder points’ of views to develop vignettes to be used in examining the intention and attitude of the householders to adopt the solar energy technology.

Keywords: solar energy, technology acceptance model, TAM, stakeholder analysis, vignette, residential sector

Procedia PDF Downloads 141
8276 The Unintended Consequences of a Digitized World: Different Tactics, Same Abuse

Authors: Ashley Andrew

Abstract:

Over the years, there have been drastic developments in technology that have altered the ways we interact with and utilize technology. Social media platforms have expanded, access to information is easily accessible on cellular devices, ways of banking have changed, and virtual meetings/work have become the norm. The COVID-19 pandemic also highlighted the importance of pivoting and adapting to the benefits that technology provides, including Accessibility (services are more available to people living in remote areas and/or with mobility concerns), Convenience (technology has allowed easier options for booking appointments and connecting with loved ones), Availability (People can attend services that best meet their availability/schedule). Although there have been large improvements in accessibility to services and resources with the evolution of technology, there are also some major concerns that are not being addressed when it comes to technology and intimate partner violence. This study explores how the growth in technology has changed the way people are being abused and harmed and the sad reality that regulations and laws have not caught up with the advances in technology. The study will also explore cyberstalking, social media triggers, and location-tracking devices and applications. By exploring how technology impacts intimate partner violence, clinicians will learn how to better assess and safety plan for these risk factors.

Keywords: abuse, intimate partner violence, safety planning, technology

Procedia PDF Downloads 33
8275 Self-Regulated Learning: A Required Skill for Web 2.0 Internet-Based Learning

Authors: Pieter Conradie, M. Marina Moller

Abstract:

Web 2.0 Internet-based technologies have intruded all aspects of human life. Presently, this phenomenon is especially evident in the educational context, with increased disruptive Web 2.0 technology infusions dramatically changing educational practice. The most prominent of these Web 2.0 intrusions can be identified as Massive Open Online Courses (Coursera, EdX), video and photo sharing sites (Youtube, Flickr, Instagram), and Web 2.0 online tools utilize to create Personal Learning Environments (PLEs) (Symbaloo (aggregator), Delicious (social bookmarking), PBWorks (collaboration), Google+ (social networks), Wordspress (blogs), Wikispaces (wiki)). These Web 2.0 technologies have supported the realignment from a teacher-based pedagogy (didactic presentation) to a learner-based pedagogy (problem-based learning, project-based learning, blended learning), allowing greater learner autonomy. No longer is the educator the source of knowledge. Instead the educator has become the facilitator and mediator of the learner, involved in developing learner competencies to support life-long learning (continuous learning) in the 21st century. In this study, the self-regulated learning skills of thirty first-year university learners were explored by utilizing the Online Self-regulated Learning Questionnaire. Implementing an action research method, an intervention was affected towards improving the self-regulation skill set of the participants. Statistical significant results were obtained with increased self-regulated learning proficiency, positively impacting learner performance. Goal setting, time management, environment structuring, help seeking, task (learning) strategies and self-evaluation skills were confirmed as determinants of improved learner success.

Keywords: andragogy, online self-regulated learning questionnaire, self-regulated learning, web 2.0

Procedia PDF Downloads 413
8274 Use of Information and Communication Technology (ICT) Among Nigerian Colleges of Education Lecturers: A Gender Analysis Approach

Authors: Rasheed A. Saliu, Sunday E. Ogundipe, Oluwaseun A. Adefila

Abstract:

Information and Communication Technology (ICT) in recent time has transformed the means by which we inform ourselves, with world events and areas of personal interests, and further our learning. Today, for many, books and journals are no longer the first or primary source of information or learning. We now regularly rely on images, video, animations and sound to acquire information and to learn. Increased and improved access to the internet has accelerated this phenomenon. We now acquire and access information in ways fundamentally different from the pre-ICT era. But to what extent is academic staff in colleges of education, having access to and the utilising of ICT devices in their lecture deliveries especially in School of Science and Vocational and Technical? The main focus of this paper is to proffer solution to this salient question. It is essentially an empirical study carried out in five colleges of education in south-west zone of Nigeria. The target population was the academic staff in the selected institution. A total number of 150 male and female lecturers were contacted for the study. The main instrument was questionnaire. The finding reveals that male lecturers are much more ICT inclined than women folk in the academics. Some recommendations were made to endear academics to utilizing ICT at their disposal to foster qualitative delivery in this digital era.

Keywords: education, gender, ICT, Nigeria

Procedia PDF Downloads 293
8273 Mapping a Data Governance Framework to the Continuum of Care in the Active Assisted Living Context

Authors: Gaya Bin Noon, Thoko Hanjahanja-Phiri, Laura Xavier Fadrique, Plinio Pelegrini Morita, Hélène Vaillancourt, Jennifer Teague, Tania Donovska

Abstract:

Active Assisted Living (AAL) refers to systems designed to improve the quality of life, aid in independence, and create healthier lifestyles for care recipients. As the population ages, there is a pressing need for non-intrusive, continuous, adaptable, and reliable health monitoring tools to support aging in place. AAL has great potential to support these efforts with the wide variety of solutions currently available, but insufficient efforts have been made to address concerns arising from the integration of AAL into care. The purpose of this research was to (1) explore the integration of AAL technologies and data into the clinical pathway, and (2) map data access and governance for AAL technology in order to develop standards for use by policy-makers, technology manufacturers, and developers of smart communities for seniors. This was done through four successive research phases: (1) literature search to explore existing work in this area and identify lessons learned; (2) modeling of the continuum of care; (3) adapting a framework for data governance into the AAL context; and (4) interviews with stakeholders to explore the applicability of previous work. Opportunities for standards found in these research phases included a need for greater consistency in language and technology requirements, better role definition regarding who can access and who is responsible for taking action based on the gathered data, and understanding of the privacy-utility tradeoff inherent in using AAL technologies in care settings.

Keywords: active assisted living, aging in place, internet of things, standards

Procedia PDF Downloads 127
8272 Augmented Reality Aplications for Armed Forces

Authors: Murat Sözen

Abstract:

It is not at all difficult to estimate which level today’s technology reaches considering that humankinds space-faring in early 1950s. Technology is a means to help achieve goals and people can produce systems on their physical and mental abilities. Needed and used as tools in all areas of life and became a necessity and dependency, technology, widely used in the military field. To be a revolutionary change in the military matters, opportunities offered by technology should be put into practice. Tech makes weapons, sensors, platforms and soldiers carrying them more effective. To increase this efficiency in the battlefield defense industry is seeking every advantage of technology. In this study, the applicability of existing and on-going augmented reality applications for Armed Forces will be evaluated.

Keywords: augmented reality, battlefield, military, virtual reality

Procedia PDF Downloads 262
8271 Technology in Commercial Law Enforcement: Tanzania, Canada, and Singapore Comparatively

Authors: Katarina Revocati Mteule

Abstract:

The background of this research arises from global demands for fair business opportunities. As one of responses to these demands, nations embarked on reforms in commercial laws. In 1990s Tanzania resorted to economic transformation through liberalization to attract more investments included reform in commercial laws enforcement. This research scrutinizes the effectiveness of reforms in Tanzania in comparison with Canada and Singapore and the role of technology. The methodology to be used is doctrinal legal research mixed with international comparative legal research. It involves comparative analysis of library, online, and internet resources as well as Case Laws and Statutory Laws. Tanzania, Canada and Singapore are sampled comparators basing on their distinct level of economic development. The criteria of analysis includes the nature of reforms, type of technology, technological infrastructure and human resource technical competence in each country. As the world progresses towards reforms in commercial laws, improvements in law, policy, and regulatory frameworks are paramount. Specifically, commercial laws are essential in contract enforcement and dispute resolution and how it copes with modern technologies is a concern. Harnessing the best technology is necessary to cope with the modernity in world businesses. In line with this, Tanzania is improving its business environment, including law enforcement mechanisms that are supportive to investments. Reforms such as specialized commercial law enforcement coupled with alternative dispute resolutions such as arbitration, mediation, and reconciliation are emphasized. Court technology as one of the reform tools given high priority. This research evaluates the progress and the effectiveness of the reforms in Commercial Laws towards friendly business environment in Tanzania in comparison with Canada and Singapore. The experience of Tanzania is compared with Canada and Singapore to see what to improve for each country to enhance quick and fair enforcement of commercial law. The research proposes necessary global standards of procedures and in national laws to offer a business-friendly environment and the use of appropriate technology. Solutions are proposed in tackling the challenges of delays in enforcing Commercial Laws such as case management, funding, legal and procedural hindrances, laxity among staff, and abuse of Court process among litigants, all in line with modern technology. It is the finding of the research that proper use of technology has managed to reduce case backlogs and time taken to resolve a commercial dispute, to increase court integrity by minimizing human contacts in commercial law enforcement which may lead to solicitation of favors and saving of parties’ time due to online service. Among the three countries, each one is facing a distinct challenge due to the level of poverty and remoteness from online service. How solutions are found in one country is a lesson to another. To conclude, this paper is suggesting solutions for improving the commercial law enforcement mechanisms in line with modern technology. The call for technological transformation is essential for the enforcement of commercial laws.

Keywords: commercial law, enforcement, technology

Procedia PDF Downloads 56
8270 Parent’s Preferences about Technology-Based Therapy for Children and Young People on the Autism Spectrum – a UK Survey

Authors: Athanasia Kouroupa, Karen Irvine, Sivana Mengoni, Shivani Sharma

Abstract:

Exploring parents’ preferences towards technology-based interventions for children on the autism spectrum can inform future research and support technology design. The study aimed to provide a comprehensive description of parents’ knowledge and preferences about innovative technology to support children on the autism spectrum. Survey data were collected from parents (n = 267) internationally. The survey included information about the use of conventional (e.g., smartphone, iPod, tablets) and non-conventional (e.g., virtual reality, robot) technologies. Parents appeared to prefer conventional technologies such as tablets and dislike non-conventional ones. They highlighted the positive contribution technology brought to the children’s lives during the pandemic. A few parents were equally concerned that the compulsory introduction of technology during the pandemic was associated with elongated time on devices. The data suggested that technology-based interventions are not widely known, need to be financially approachable and achieve a high standard of design to engage users.

Keywords: autism, intervention, preferences, technology

Procedia PDF Downloads 131
8269 Evolution of Floating Photovoltaic System Technology and Future Prospect

Authors: Young-Kwan Choi, Han-Sang Jeong

Abstract:

Floating photovoltaic system is a technology that combines photovoltaic power generation with floating structure. However, since floating technology has not been utilized in photovoltaic generation, there are no standardized criteria. It is separately developed and used by different installation bodies. This paper aims to discuss the change of floating photovoltaic system technology based on examples of floating photovoltaic systems installed in Korea.

Keywords: floating photovoltaic system, floating PV installation, ocean floating photovoltaic system, tracking type floating photovoltaic system

Procedia PDF Downloads 556
8268 A Survey of Crowdsourcing Technology

Authors: Qianjia Cheng, Hongquan Jiang

Abstract:

Crowdsourcing solves the problems that computers can't handle by integrating computers and the Internet. Its extensive knowledge sources, high efficiency and high quality, make crowdsourcing attract wide attention in industry and academia in recent years. The development of online crowdsourcing platforms such as Clickworker and Amazon Mechanical Turk(Mturk) tend to mature gradually. This paper sorts out the concept of crowdsourcing, sorts out the workflow of competitive crowdsourcing, summarizes the related technologies of crowdsourcing based on the workflow, quality control, cost control and delay control, introduces the typical crowdsourcing platform. Finally, we highlight some open problems of the current crowdsourcing and present some future research direction in this area.

Keywords: application, crowdsourcing, crowdsourcing platform, system architecture

Procedia PDF Downloads 67