Search results for: internet of things technologies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5299

Search results for: internet of things technologies

4609 Green Windows of Opportunity in Latin American Countries

Authors: Fabianna Bacil, Zenathan Hasannundin, Clovis Freire

Abstract:

The green transition opens green windows of opportunity – temporary moments in which there are lower barriers and shorter learning periods for developing countries to enter emerging technologies and catch-up. However, taking advantage of these windows requires capabilities in national sectoral systems to adopt and develop technologies linked to green sectors as well as strong responses to build the required knowledge, skills, and infrastructure and foster the growth of targeted sectors. This paper uses UNCTAD’s frontier technology readiness index to analyse the current position of Latin America and the Caribbean to use, adopt, and adapt frontier technologies, examining the preconditions in the region to take up windows of opportunity that arise with the green transition. The index highlights the inequality across countries in the region, as well as gaps in capabilities dimensions, especially in terms of R&D. Moving to responses, it highlights industrial policies implemented to foster the growth of green technologies, emphasising the essential role played by the state to build and strengthen capabilities and provide infant industry protection that enables the growth of these sectors. Overall, while there are exceptions, especially in the Brazilian case, countries in Latin America and the Caribbean should focus on strengthening their capabilities to be better positioned, especially in terms of knowledge creation, infrastructure, and financing availability.

Keywords: Green technologies, Industrial policy, Latin America, windows of opportunity

Procedia PDF Downloads 55
4608 Review on Implementation of Artificial Intelligence and Machine Learning for Controlling Traffic and Avoiding Accidents

Authors: Neha Singh, Shristi Singh

Abstract:

Accidents involving motor vehicles are more likely to cause serious injuries and fatalities. It also has a host of other perpetual issues, such as the regular loss of life and goods in accidents. To solve these issues, appropriate measures must be implemented, such as establishing an autonomous incident detection system that makes use of machine learning and artificial intelligence. In order to reduce traffic accidents, this article examines the overview of artificial intelligence and machine learning in autonomous event detection systems. The paper explores the major issues, prospective solutions, and use of artificial intelligence and machine learning in road transportation systems for minimising traffic accidents. There is a lot of discussion on additional, fresh, and developing approaches that less frequent accidents in the transportation industry. The study structured the following subtopics specifically: traffic management using machine learning and artificial intelligence and an incident detector with these two technologies. The internet of vehicles and vehicle ad hoc networks, as well as the use of wireless communication technologies like 5G wireless networks and the use of machine learning and artificial intelligence for the planning of road transportation systems, are elaborated. In addition, safety is the primary concern of road transportation. Route optimization, cargo volume forecasting, predictive fleet maintenance, real-time vehicle tracking, and traffic management, according to the review's key conclusions, are essential for ensuring the safety of road transportation networks. In addition to highlighting research trends, unanswered problems, and key research conclusions, the study also discusses the difficulties in applying artificial intelligence to road transport systems. Planning and managing the road transportation system might use the work as a resource.

Keywords: artificial intelligence, machine learning, incident detector, road transport systems, traffic management, automatic incident detection, deep learning

Procedia PDF Downloads 97
4607 System for Monitoring Marine Turtles Using Unstructured Supplementary Service Data

Authors: Luís Pina

Abstract:

The conservation of marine biodiversity keeps ecosystems in balance and ensures the sustainable use of resources. In this context, technological resources have been used for monitoring marine species to allow biologists to obtain data in real-time. There are different mobile applications developed for data collection for monitoring purposes, but these systems are designed to be utilized only on third-generation (3G) phones or smartphones with Internet access and in rural parts of the developing countries, Internet services and smartphones are scarce. Thus, the objective of this work is to develop a system to monitor marine turtles using Unstructured Supplementary Service Data (USSD), which users can access through basic mobile phones. The system aims to improve the data collection mechanism and enhance the effectiveness of current systems in monitoring sea turtles using any type of mobile device without Internet access. The system will be able to report information related to the biological activities of marine turtles. Also, it will be used as a platform to assist marine conservation entities to receive reports of illegal sales of sea turtles. The system can also be utilized as an educational tool for communities, providing knowledge and allowing the inclusion of communities in the process of monitoring marine turtles. Therefore, this work may contribute with information to decision-making and implementation of contingency plans for marine conservation programs.

Keywords: GSM, marine biology, marine turtles, unstructured supplementary service data (USSD)

Procedia PDF Downloads 199
4606 Heritage and Tourism in the Era of Big Data: Analysis of Chinese Cultural Tourism in Catalonia

Authors: Xinge Liao, Francesc Xavier Roige Ventura, Dolores Sanchez Aguilera

Abstract:

With the development of the Internet, the study of tourism behavior has rapidly expanded from the traditional physical market to the online market. Data on the Internet is characterized by dynamic changes, and new data appear all the time. In recent years the generation of a large volume of data was characterized, such as forums, blogs, and other sources, which have expanded over time and space, together they constitute large-scale Internet data, known as Big Data. This data of technological origin that derives from the use of devices and the activity of multiple users is becoming a source of great importance for the study of geography and the behavior of tourists. The study will focus on cultural heritage tourist practices in the context of Big Data. The research will focus on exploring the characteristics and behavior of Chinese tourists in relation to the cultural heritage of Catalonia. Geographical information, target image, perceptions in user-generated content will be studied through data analysis from Weibo -the largest social networks of blogs in China. Through the analysis of the behavior of heritage tourists in the Big Data environment, this study will understand the practices (activities, motivations, perceptions) of cultural tourists and then understand the needs and preferences of tourists in order to better guide the sustainable development of tourism in heritage sites.

Keywords: Barcelona, Big Data, Catalonia, cultural heritage, Chinese tourism market, tourists’ behavior

Procedia PDF Downloads 126
4605 The Perspectives of Adult Learners Towards Online Learning

Authors: Jacqueline Żammit

Abstract:

Online learning has become more popular as a substitute for traditional classroom instruction because of the COVID-19 epidemic. The study aimed to investigate how adult Maltese language learners evaluated the benefits and drawbacks of online instruction. 35 adult participants provided data through semi-structured interviews with open-ended questions. NVivo software was used to analyze the interview data using the thematic analysis method in order to find themes and group the data based on common responses. The advantages of online learning that the participants mentioned included accessing subject content even without live learning sessions, balancing learning with household duties, and lessening vulnerability to problems like fatigue, time-wasting traffic, school preparation, and parking space constraints. Conversely, inadequate Internet access, inadequate IT expertise, a shortage of personal computers, and domestic distractions adversely affected virtual learning. Lack of an Internet connection, IT expertise, a personal computer, or a phone with Internet access caused inequality in access to online learning sessions. Participants thought online learning was a way to resume academic activity, albeit with drawbacks. In order to address the challenges posed by online learning, several solutions are proposed in the research's conclusion.

Keywords: adult learners, online education, e-learning, challenges of online learning, benefits ofonline learning

Procedia PDF Downloads 55
4604 Reclaiming the House with Use of Web 2.0 Tools: Democratic Candidates and Social Media during Midterm Elections in 2018

Authors: Norbert Tomaszewski

Abstract:

Modern politicians tend to resign from the traditional media as Web 2.0 tools allow them to interact with a much bigger audience while spending less money on their campaign. Current studies on this subject prove that in order to win the elections, the candidate needs to show his personal side during the campaign to appeal to the voter as an average citizen. Because of that, the internet user may engage in the politician's campaign by spreading his message along with his followers. The aim of the study is to determine how did the Democratic candidates use the Web 2.0 tools during the 2018 midterm elections campaign and whether they managed to succeed. Taking into consideration the fact that the United States as a country, has always set important milestones for the political marketing as a field of science, the result of the research can set some examples on how to manage the modern internet campaign in less developed countries.

Keywords: political campaign, midterm elections, social media, Web 2.0

Procedia PDF Downloads 144
4603 Sustainability Model for Rural Telecenter Using Business Intelligence Technique

Authors: Razak Rahmat, Azizah Ahmad, Rafidah Razak, Roshidi Din, Azizi Abas

Abstract:

Telecenter is a place where communities can access computers, the Internet, and other digital technologies to enable them to gather information, create, learn, and communicate with others. However, previous studies found that sustainability issues related to economic, political and institutional, social and technology is one of the major problem faced by the telecenter. Based on that problem, this research is planning to design a possible solution on rural telecenters sustainability with the support of business intelligence (BI). The empirical study will be conducted through the qualitative and quantitative method including interviews and observations with a range of stakeholders including ministry officers, telecenters managers and operators. Result from the data collection will be analyze using the causal modeling approach of SEM SmartPLS for the validity. The expected finding from this research is the Business Intelligent Requirement Model as a guild for sustainability of the rural telecenters.

Keywords: Rural ICT Telecenter(RICTT), business intelligence, sustainability, requirement analysis modal

Procedia PDF Downloads 480
4602 The Use of Software and Internet Search Engines to Develop the Encoding and Decoding Skills of a Dyslexic Learner: A Case Study

Authors: Rabih Joseph Nabhan

Abstract:

This case study explores the impact of two major computer software programs Learn to Speak English and Learn English Spelling and Pronunciation, and some Internet search engines such as Google on mending the decoding and spelling deficiency of Simon X, a dyslexic student. The improvement in decoding and spelling may result in better reading comprehension and composition writing. Some computer programs and Internet materials can help regain the missing awareness and consequently restore his self-confidence and self-esteem. In addition, this study provides a systematic plan comprising a set of activities (four computer programs and Internet materials) which address the problem from the lowest to the highest levels of phoneme and phonological awareness. Four methods of data collection (accounts, observations, published tests, and interviews) create the triangulation to validly and reliably collect data before the plan, during the plan, and after the plan. The data collected are analyzed quantitatively and qualitatively. Sometimes the analysis is either quantitative or qualitative, and some other times a combination of both. Tables and figures are utilized to provide a clear and uncomplicated illustration of some data. The improvement in the decoding, spelling, reading comprehension, and composition writing skills that occurred is proved through the use of authentic materials performed by the student under study. Such materials are a comparison between two sample passages written by the learner before and after the plan, a genuine computer chat conversation, and the scores of the academic year that followed the execution of the plan. Based on these results, the researcher recommends further studies on other Lebanese dyslexic learners using the computer to mend their language problem in order to design and make a most reliable software program that can address this disability more efficiently and successfully.

Keywords: analysis, awareness, dyslexic, software

Procedia PDF Downloads 214
4601 Fabrication of Textile-Based Radio Frequency Metasurfaces

Authors: Adria Kajenski, Guinevere Strack, Edward Kingsley, Shahriar Khushrushahi, Alkim Akyurtlu

Abstract:

Radio Frequency (RF) metasurfaces are arrangements of subwavelength elements interacting with electromagnetic radiation. These arrangements affect polarization state, amplitude, and phase of impinged radio waves; for example, metasurface designs are used to produce functional passband and stopband filters. Recent advances in additive manufacturing techniques have enabled the low-cost, rapid fabrication of ultra-thin metasurface elements on flexible substrates such as plastic films, paper, and textiles. Furthermore, scalable manufacturing processes promote the integration of fabric-based RF metasurfaces into the market of sensors and devices within the Internet of Things (IoT). The design and fabrication of metasurfaces on textiles require a multidisciplinary team with expertise in i) textile and materials science, ii) metasurface design and simulation, and iii) metasurface fabrication and testing. In this presentation, we will discuss RF metasurfaces on fabric with an emphasis on how the materials, including fabric and inks, along with fabrication techniques, affect the RF performance. We printed metasurfaces using a direct-write approach onto various woven and non-woven fabrics, as well as on fabrics coated with either thermoplastic or thermoset coatings. Our team also performed a range of tests on the printed structures, including different inks and their curing parameters, wash durability, abrasion resistance, and RF performance over time.

Keywords: electronic textiles, metasurface, printed electronics, flexible

Procedia PDF Downloads 189
4600 The Grand Technological Promise in Norwegian Child Welfare Services: Social Workers’ Experiences and Expectations

Authors: Ida Bruheim Jensen, Hulda Mjöll Gunnarsdottir, Ingunn T. Ellingsen

Abstract:

Digital government is often seen as an enabler or even driver of transformation of public administration, with the objective of creating public value. The increasing use of digital solutions in public services comes with great expectations of new and/or more efficient service provision. Digitalizing public sector services involve multi-level implementation. It involves national policy negotiations and decisions of digital government solutions. It involves co-creation/-production of ideas where planning, design, and implementation involves several groups of actors targeting end-users. Norway is among the most digitalised countries in the world, and Government spendings on digital technologies in public services are high compared to other OECD countries. This contribution studies an ongoing digital transformation in the Norwegian child welfare services. DigiBarnevern (Digi child welfare) is a nationwide project promising better and more efficient child welfare services through various digital technologies. The digitalization process, which is managed by the state and municipalities, is still in its early stages, and as of 2022, only a few services are operative. Digital technologies such as DigiBarnevern are implemented with promises of qualitatively improving child protection work, making the services more effective, foster user participation, and increase availability. There is limited research on the implications of using digital technologies in child protection work. We aim to present findings from an ongoing research project (2022-2024). Drawing on data from focus group interviews with social workers in 5 municipal child welfare services in Norway, we explore social workers’ experiences and expectations towards using digital technologies in child welfare services. Technological solutions may change the services and child protection work in numerous ways. Potential points of departure for discussion are how technologies may change the relationships between social workers, children, youth, and their families, how technologies can alter and obscure responsibilities, and how technologies may demand digital competence among social workers and service recipients.

Keywords: child welfare, social work, technology, digitalisation

Procedia PDF Downloads 80
4599 Technologies for Phosphorus Removal from Wastewater: Review

Authors: Thandie Veronicah Sima, Moatlhodi Wiseman Letshwenyo

Abstract:

Discharge of wastewater is one of the major sources of phosphorus entering streams, lakes and other water bodies causing undesired environmental problem such as eutrophication. This condition not only puts the ecosystem at risk but also causes severe economic damages. Stringent laws have been developed globally by different bodies to control the level of phosphorus concentrations into receiving environments. In order to satisfy the constraints, a high degree of tertiary treatment or at least a significant reduction of phosphorus concentration is obligatory. This comprehensive review summarizes phosphorus removal technologies, from the most commonly used conventional technologies such as chemical precipitation through metal addition, membrane filtration, reverse osmosis and enhanced biological phosphorus removal using activated sludge system to passive systems such as constructed wetlands and filtration systems. Trends, perspectives and scientific procedures conducted by different researchers have been presented. This review critically evaluates the advantages and limitations behind each of the technologies. Enhancement of passive systems using reactive media such as industrial wastes to provide additional uptake through adsorption or precipitation is also discussed in this article.

Keywords: adsorption, chemical precipitation, enhanced biological phosphorus removal, phosphorus removal

Procedia PDF Downloads 315
4598 Teachers' Attitude and Knowledge as Predictors of Effective Use of Digital Devices for the Education of Students with Special Needs in Oyo, Nigeria

Authors: Faseluka Olamide Tope

Abstract:

Giving quality education to students with special needs requires that all necessary resources should be harnessed and digital devices has become important part of resources used as instructional materials in educating students with special needs. Teachers who will make use of these technologies are considered as a part of the most important elements in any educational programme and the effective usage of these technologies largely depends on them. Out of numerous determinants of the effective use of these digital devices, this study examines teachers’ attitude and knowledge as predictors of effective use of digital technology for education of special needs student in Oyo state, Nigeria. The descriptive survey research design of the expo-facto type was adopted for the study, using simple random sampling technique. The study was carried out among sixty (60) participants. Two research questions and two research hypotheses were formulated and used. The data collected through the research instruments for the study were analysedusing frequency, percentage, mean and standard deviation, Pearson, Product, Moment Correlation (PPMC) and Multiple Regression Analysis. The study revealed a significant relationship between teachers attitude (50, < 0.05) and effective use of digital technologies for special needs students. Furthermore, there was a significant contribution F (F=4.289; R=0.876 and R2 =0.758) in the joint contribution of the independent variable  (teacher’s attitude and teacher’s knowledge) and dependent variable (effective use of digital technologies) while teachers knowledge have the highest contribution(b=7.926, t=4.376), the study therefore revealed that teachers attitude and knowledge are potent factors that predicts the effective usage of digital technologies for the education of special needs student. The study recommended that due to the ever-changing nature of technology which comes with new features, teachers should be equipped with appropriate knowledge in order to effectively make use of them and teachers should also develop right attitude toward the use of digital technologies

Keywords: teachers’ knowledge, teachers’ attitude, digital devices, special needs students

Procedia PDF Downloads 22
4597 Video Games Technologies Approach for Their Use in the Classroom

Authors: Daniel Vargas-Herrera, Ivette Caldelas, Fernando Brambila-Paz, Rodrigo Montufar-Chaveznava

Abstract:

In this paper, we present the advances corresponding to the implementation of a set of educational materials based on video games technologies. Essentially these materials correspond to projects developed and under development as bachelor thesis of some Computer Engineering students of the Engineering School. All materials are based on the Unity SDK; integrating some devices such as kinect, leap motion, oculus rift, data gloves and Google cardboard. In detail, we present a virtual reality application for neurosciences students (suitable for neural rehabilitation), and virtual scenes for the Google cardboard, which will be used by the psychology students for phobias treatment. The objective is these materials will be located at a server to be available for all students, in the classroom or in the cloud, considering the use of smartphones has been widely extended between students.

Keywords: virtual reality, interactive technologies, video games, educational materials

Procedia PDF Downloads 647
4596 Application of Powder Metallurgy Technologies for Gas Turbine Engine Wheel Production

Authors: Liubov Magerramova, Eugene Kratt, Pavel Presniakov

Abstract:

A detailed analysis has been performed for several schemes of Gas Turbine Wheels production based on additive and powder technologies including metal, ceramic, and stereolithography 3-D printing. During the process of development and debugging of gas turbine engine components, different versions of these components must be manufactured and tested. Cooled blades of the turbine are among of these components. They are usually produced by traditional casting methods. This method requires long and costly design and manufacture of casting molds. Moreover, traditional manufacturing methods limit the design possibilities of complex critical parts of engine, so capabilities of Powder Metallurgy Techniques (PMT) were analyzed to manufacture the turbine wheel with air-cooled blades. PMT dramatically reduce time needed for such production and allow creating new complex design solutions aimed at improving the technical characteristics of the engine: improving fuel efficiency and environmental performance, increasing reliability, and reducing weight. To accelerate and simplify the blades manufacturing process, several options based on additive technologies were used. The options were implemented in the form of various casting equipment for the manufacturing of blades. Methods of powder metallurgy were applied for connecting the blades with the disc. The optimal production scheme and a set of technologies for the manufacturing of blades and turbine wheel and other parts of the engine can be selected on the basis of the options considered.

Keywords: additive technologies, gas turbine engine, powder technology, turbine wheel

Procedia PDF Downloads 309
4595 The Pursuit of Marital Sustainability Inspiring by Successful Matrimony of Two Distinguishable Indonesian Ethnics as a Learning Process

Authors: Mutiara Amalina Khairisa, Purnama Arafah, Rahayu Listiana Ramli

Abstract:

In recent years, so many cases of divorce increasingly occur. Betrayal in form of infidelity, less communication one another, economically problems, selfishness of two sides, intervening parents from both sides which frequently occurs in Asia, especially in Indonesia, the differences of both principles and beliefs, “Sense of Romantism” depletion, role confict, a large difference in the purpose of marriage,and sex satisfaction are expected as the primary factors of the causes of divorce. Every couple of marriage wants to reach happy life in their family but severe problems brought about by either of those main factors come as a reasonable cause of failure marriage. The purpose of this study is to find out how marital adjustment and supporting factors in ensuring the success of that previous marital adjusment are inseparable two things assumed as a framework can affect the success in marriage becoming a resolution to reduce the desires to divorce. Those two inseparable things are able to become an aspect of learning from the success of the different ethnics marriage to keep holding on wholeness.

Keywords: marital adjustment, marital sustainability, learning process, successful ethnicity differences marriage, basical cultural values

Procedia PDF Downloads 422
4594 Coping with the Stress and Negative Emotions of Care-Giving by Using Techniques from Seneca, Epictetus, and Marcus Aurelius

Authors: Arsalan Memon

Abstract:

There are many challenges that a caregiver faces in average everyday life. One such challenge is coping with the stress and negative emotions of caregiving. The Stoics (i.e. Lucius Annaeus Seneca [4 B.C.E. - 65 C.E.], Epictetus [50-135 C.E.], and Marcus Aurelius [121-180 C.E.]) have provided coping techniques that are useful for dealing with stress and negative emotions. This paper lists and explains some of the fundamental coping techniques provided by the Stoics. For instance, some Stoic coping techniques thus follow (the list is far from exhaustive): a) mindfulness: to the best of your ability, constantly being aware of your thoughts, habits, desires, norms, memories, likes/dislikes, beliefs, values, and of everything outside of you in the world (b) constantly adjusting one’s expectations in accordance with reality, c) memento mori: constantly reminding oneself that death is inevitable and that death is not to be seen as evil, and d) praemeditatio malorum: constantly detaching oneself from everything that is so dear to one so that the least amount of suffering follows from the loss, damage, or ceasing to be of such entities. All coping techniques will be extracted from the following original texts by the Stoics: Seneca’s Letters to Lucilius, Epictetus’ Discourses and the Encheiridion, and Marcus Aurelius’ Meditations. One major finding is that the usefulness of each Stoic coping technique can be empirically tested by anyone in the sense of applying it one’s own life especially when one is facing real-life challenges. Another major finding is that all of the Stoic coping techniques are predicated upon, and follow from, one fundamental principle: constantly differentiate what is and what is not in one’s control. After differentiating it, one should constantly habituate oneself in not controlling things that are beyond one’s control. For example, the following things are beyond one’s control (all things being equal): death, certain illnesses, being born in a particular socio-economic family, etc. The conclusion is that if one habituates oneself by practicing to the best of one’s ability both the fundamental Stoic principle and the Stoic coping techniques, then such a habitual practice can eventually decrease the stress and negative emotions that one experiences by being a caregiver.

Keywords: care-giving, coping techniques, negative emotions, stoicism, stress

Procedia PDF Downloads 130
4593 Innovative Technologies for Aeration and Feeding of Fish in Aquaculture with Minimal Impact on the Environment

Authors: Vasile Caunii, Andreea D. Serban, Mihaela Ivancia

Abstract:

The paper presents a new approach in terms of the circular economy of technologies for feeding and aeration of accumulations and water basins for fish farming and aquaculture. Because fish is and will be one of the main foods on the planet, the use of bio-eco-technologies is a priority for all producers. The technologies proposed in the paper want to reduce by a substantial percentage the costs of operation of ponds and water accumulation, using non-polluting technologies with minimal impact on the environment. The paper proposes two innovative, intelligent systems, fully automated that use a common platform, completely eco-friendly. One system is intended to aerate the water of the fish pond, and the second is intended to feed the fish by dispersing an optimal amount of fodder, depending on population size, age and habits. Both systems use a floating platform, regenerative energy sources, are equipped with intelligent and innovative systems, and in addition to fully automated operation, significantly reduce the costs of aerating water accumulations (natural or artificial) and feeding fish. The intelligent system used for feeding, in addition, to reduce operating costs, optimizes the amount of food, thus preventing water pollution and the development of bacteria, microorganisms. The advantages of the systems are: increasing the yield of fish production, these are green installations, with zero pollutant emissions, can be arranged anywhere on the water surface, depending on the user's needs, can operate autonomously or remotely controlled, if there is a component failure, the system provides the operator with accurate data on the issue, significantly reducing maintenance costs, transmit data about the water physical and chemical parameters.

Keywords: bio-eco-technologies, economy, environment, fish

Procedia PDF Downloads 141
4592 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 525
4591 Importance of Remote Sensing and Information Communication Technology to Improve Climate Resilience in Low Land of Ethiopia

Authors: Hasen Keder Edris, Ryuji Matsunaga, Toshi Yamanaka

Abstract:

The issue of climate change and its impact is a major contemporary global concern. Ethiopia is one of the countries experiencing adverse climate change impact including frequent extreme weather events that are exacerbating drought and water scarcity. Due to this reason, the government of Ethiopia develops a strategic document which focuses on the climate resilience green economy. One of the major components of the strategic framework is designed to improve community adaptation capacity and mitigation of drought. For effective implementation of the strategy, identification of regions relative vulnerability to drought is vital. There is a growing tendency of applying Geographic Information System (GIS) and Remote Sensing technologies for collecting information on duration and severity of drought by direct measure of the topography as well as an indirect measure of land cover. This study aims to show an application of remote sensing technology and GIS for developing drought vulnerability index by taking lowland of Ethiopia as a case study. In addition, it assesses integrated Information Communication Technology (ICT) potential of Ethiopia lowland and proposes integrated solution. Satellite data is used to detect the beginning of the drought. The severity of drought risk prone areas of livestock keeping pastoral is analyzed through normalized difference vegetation index (NDVI) and ten years rainfall data. The change from the existing and average SPOT NDVI and vegetation condition index is used to identify the onset of drought and potential risks. Secondary data is used to analyze geographical coverage of mobile and internet usage in the region. For decades, the government of Ethiopia introduced some technologies and approach to overcoming climate change related problems. However, lack of access to information and inadequate technical support for the pastoral area remains a major challenge. In conventional business as usual approach, the lowland pastorals continue facing a number of challenges. The result indicated that 80% of the region face frequent drought occurrence and out of this 60% of pastoral area faces high drought risk. On the other hand, the target area mobile phone and internet coverage is rapidly growing. One of identified ICT solution enabler technology is telecom center which covers 98% of the region. It was possible to identify the frequently affected area and potential drought risk using the NDVI remote-sensing data analyses. We also found that ICT can play an important role in mitigating climate change challenge. Hence, there is a need to strengthen implementation efforts of climate change adaptation through integrated Remote Sensing and web based information dissemination and mobile alert of extreme events.

Keywords: climate changes, ICT, pastoral, remote sensing

Procedia PDF Downloads 301
4590 Reasons and Implications of the Use of Social Media by Kuwaiti Women

Authors: Bashayer Alsana

Abstract:

Communication technologies are changing the way we experience life. More specifically, such technologies have changed the interaction system through which women express themselves. Interaction with the other gender, accessibility to useful content, and creative public expression are but a few facets of the new living experience now being offered to women through the use of technology, especially in areas where females are bounded by societal taboos and traditions. An evaluation of the new female experience of expressing themselves through technology is yet to be done. This study aims to fill the void of research conducted around that topic. The study explores women’s use of communication technologies in Kuwait in terms of reasons and effects. women’s responses to survey questions present an overview of the new and changing female experience in this traditional middle eastern country, and draws a framework through which implications and suggestions for future research are discussed to better serve the advancement of women in developing countries.

Keywords: communications, kuwait, social media, women

Procedia PDF Downloads 288
4589 Evaluation and Selection of Drilling Technologies: An Application of Portfolio Analysis Matrix in South Azadgan Oilfield

Authors: M. Maleki Sadabad, A. Pointing, N. Marashi

Abstract:

With respect to the role and increasing importance of technology for countries development, in recent decades technology development has paid attention in a systematic form. Nowadays the markets face with highly complicated and competitive conditions in foreign markets, therefore, evaluation and selection of technology effectiveness and also formulating technology strategy have changed into a vital subject for some organizations. The study introduces the standards of empowerment evaluation and technology attractiveness especially strategic technologies which explain the way of technology evaluation, selection and finally formulating suitable technology strategy in the field of drilling in South Azadegan oil field. The study firstly identifies the key challenges of oil fields in order to evaluate the technologies in field of drilling in South Azadegan oil field through an interview with the experts of industry and then they have been prioritised. In the following, the existing and new technologies were identified to solve the challenges of South Azadegan oil field. In order to explore the ability, availability, and attractiveness of every technology, a questionnaire based on Julie indices has been designed and distributed among the industry elites. After determining the score of ability, availability and attractiveness, every technology which has been obtained by the average of expert’s ideas, the technology package has been introduced by Morin’s model. The matrix includes four areas which will follow the especial strategy. Finally, by analysing the above matrix, the technology options have been suggested in order to select and invest.

Keywords: technology, technology identification, drilling technologies, technology capability

Procedia PDF Downloads 123
4588 Pattern of Cybercrime Among Adolescents: An Exploratory Study

Authors: Mohamamd Shahjahan

Abstract:

Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.

Keywords: cybercrime, adolescents, pattern, internet

Procedia PDF Downloads 64
4587 Classification of Manufacturing Data for Efficient Processing on an Edge-Cloud Network

Authors: Onyedikachi Ulelu, Andrew P. Longstaff, Simon Fletcher, Simon Parkinson

Abstract:

The widespread interest in 'Industry 4.0' or 'digital manufacturing' has led to significant research requiring the acquisition of data from sensors, instruments, and machine signals. In-depth research then identifies methods of analysis of the massive amounts of data generated before and during manufacture to solve a particular problem. The ultimate goal is for industrial Internet of Things (IIoT) data to be processed automatically to assist with either visualisation or autonomous system decision-making. However, the collection and processing of data in an industrial environment come with a cost. Little research has been undertaken on how to specify optimally what data to capture, transmit, process, and store at various levels of an edge-cloud network. The first step in this specification is to categorise IIoT data for efficient and effective use. This paper proposes the required attributes and classification to take manufacturing digital data from various sources to determine the most suitable location for data processing on the edge-cloud network. The proposed classification framework will minimise overhead in terms of network bandwidth/cost and processing time of machine tool data via efficient decision making on which dataset should be processed at the ‘edge’ and what to send to a remote server (cloud). A fast-and-frugal heuristic method is implemented for this decision-making. The framework is tested using case studies from industrial machine tools for machine productivity and maintenance.

Keywords: data classification, decision making, edge computing, industrial IoT, industry 4.0

Procedia PDF Downloads 171
4586 Modified RSA in Mobile Communication

Authors: Nagaratna Rajur, J. D. Mallapur, Y. B. Kirankumar

Abstract:

The security in mobile communication is very different from the internet or telecommunication, because of its poor user interface and limited processing capacity, as well as combination of complex network protocols. Hence, it poses a challenge for less memory usage and low computation speed based security system. Security involves all the activities that are undertaken to protect the value and on-going usability of assets and the integrity and continuity of operations. An effective network security strategies requires identifying threats and then choosing the most effective set of tools to combat them. Cryptography is a simple and efficient way to provide security in communication. RSA is an asymmetric key approach that is highly reliable and widely used in internet communication. However, it has not been efficiently implemented in mobile communication due its computational complexity and large memory utilization. The proposed algorithm modifies the current RSA to be useful in mobile communication by reducing its computational complexity and memory utilization.

Keywords: M-RSA, sensor networks, sensor applications, security

Procedia PDF Downloads 337
4585 Optimization of Strategies and Models Review for Optimal Technologies-Based on Fuzzy Schemes for Green Architecture

Authors: Ghada Elshafei, A. Elazim Negm

Abstract:

Recently, Green architecture becomes a significant way to a sustainable future. Green building designs involve finding the balance between comfortable homebuilding and sustainable environment. Moreover, the utilization of the new technologies such as artificial intelligence techniques are used to complement current practices in creating greener structures to keep the built environment more sustainable. The most common objectives are green buildings should be designed to minimize the overall impact of the built environment on ecosystems in general and particularly on human health and on the natural environment. This will lead to protecting occupant health, improving employee productivity, reducing pollution and sustaining the environmental. In green building design, multiple parameters which may be interrelated, contradicting, vague and of qualitative/quantitative nature are broaden to use. This paper presents a comprehensive critical state of art review of current practices based on fuzzy and its combination techniques. Also, presented how green architecture/building can be improved using the technologies that been used for analysis to seek optimal green solutions strategies and models to assist in making the best possible decision out of different alternatives.

Keywords: green architecture/building, technologies, optimization, strategies, fuzzy techniques, models

Procedia PDF Downloads 462
4584 The Third Level Digital Divide: Millennials and Post-Millennials Online Activities in South Africa

Authors: Ayanda Magida, Brian Armstrong

Abstract:

The study aimed to assess the third level of the digital divide among the millennials and post-millennials in South Africa. The millennials are people born from 1981-to 1996, that is, people between the ages of 25-40 years old and post-millennials are people born from 1997 to date. For the study, only post-millennials born between 1997-2003 were included as they were old enough to consent to participation in the study. Data was collected as part of the Ph.D. project that focuses on the relationship between income inequality, the digital divide, and social cohesion in South Africa. The digital divide has three main levels, namely the first, second and third. The first and second focus on access and usage, respectively. The third-level digital divide can be defined as the differences in the benefits associated with being online. The current paper focuses on the third level: the benefits derived by being online using four domains: economic, educational, social, and personal benefits. The economic benefits include income, employment and finance-related activities; the social benefits include socializing belonging, identity, and informal networks. The personal benefits include personal wellbeing and self-actualization. A total of 763 participants completed the survey, and 61.3% were post-millennials between the ages of 18-24 and s 38.6 % were millennials between 25 and 40. The majority of the respondents were female (62%), male (34%) and nonbinary (1%), respectively. Most of the respondents were black, followed by whites, Indians and colored, respectively. Thus, they represented the status of the demographics of the country. Most of the respondents had access to the internet and smartphone. Most expressed that they use laptops (68%) or mobile (71%) to access the internet and 54 % access the internet using wireless/Wi-Fi. There were no differences between the millennial and post-millennial economic and educational benefits of being online. However, the post-millennials were more inclined to use the internet for social and personal benefits than the millennials. This could be attributed to many factors, such as age. The post-millennials are still discovering themselves and therefore would derive social and personal benefits associated with being online. The findings confirm studies that argue that younger generations derive more benefits from being online than the older generation. Based on the findings, it is evident that the post-millennials are not using the internet or online activities for social networks and socializing but can derive economic benefits such as job looking and education benefits from being online. It can be inferred that there are no significant differences between the two groups, and it seems like the third-level digital divide is not evident among the two groups as they both have been able to derive meaningful benefits from being online. Further studies should focus on the third-level divide between the baby boomers and Generation X.

Keywords: third-level digital divide, millennials, post-millennials, online activities

Procedia PDF Downloads 92
4583 Network Mobility Support in Content-Centric Internet

Authors: Zhiwei Yan, Jong-Hyouk Lee, Yong-Jin Park, Xiaodong Lee

Abstract:

In this paper, we analyze NEtwork MObility (NEMO) supporting problems in Content-Centric Networking (CCN), and propose the CCN-NEMO which can well support the deployment of the content-centric paradigm in large-scale mobile Internet. The CCN-NEMO extends the signaling message of the basic CCN protocol, to support the mobility discovery and fast trigger of Interest re-issuing during the network mobility. Besides, the Mobile Router (MR) is extended to optimize the content searching and relaying in the local subnet. These features can be employed by the nested NEMO to maximize the advantages of content retrieving with CCN. Based on the analysis, we compare the performance on handover latency between the basic CCN and our proposed CCN-NEMO. The results show that our scheme can facilitate the content-retrieving in the NEMO scenario with improved performance.

Keywords: NEMO, CCN, mobility, handover latency

Procedia PDF Downloads 461
4582 Influence of Information Technology on Financial Management Practices in Secondary School: For National Transormation in Zone C Senatorional District of Benue State

Authors: Eru Ihie Joel

Abstract:

This study was carried out to investigate the influence of information technology on financial management practice in secondary schools for transformation. In Zone C Senatorial District of Benue state. The study answered four research questions and tested four hypotheses. Related literature was reviewed to show the gap to be filled in the study. The population was 196 respondents made up of principals and finance clerks of secondary schools. The descriptive survey was adopted for the study. A structured 20 item questionnaire (IITFMPSQ) was constructed and used to collect date for the study. Data obtained were analyzed using descriptive and inferential statistic. Mean and standard deviation were used to analyze the research question while the chi- square (x2) test of goodness of fit was used to test the hypothesis. The major findings revealed that the use of computer system significantly influences budgeting in secondary schools in zone senatorial district of Benue State for transformation. It was also established that the use of internet facilities influences the funding of secondary schools for transformation in the zone. Based on the findings of the study, it was recommended among other things that administrators and teachers in schools should be trained to make effective use of the computer in budgeting so as to facilitate delegations, control, evaluation, accountability for transformation. It was further suggested that the study be replicated on the effective use of information communication teaching (ITC) in teaching and learning in secondary school for transformation.

Keywords: influence, finance, management, technology

Procedia PDF Downloads 349
4581 Mapping the Adoption Process of Communication Technology to Maintain Contact between Older Adults with Intellectual Disability in Out-of-home Residence and Their Families: A Multiple-Case Study Research

Authors: Carmit Noa Shpigelman, Michal Isaacson

Abstract:

Over the last decades, the improvement in welfare and health services and the increase in awareness of the needs of people with intellectual disability has led to an increase in their life expectancy, and many of them enter into old age. Furthermore, many older adults with intellectual disability live in out-of-home residence. This situation, in addition to the parents' aging process as the main caregivers, may lead to a reduction in contact with the family and, as a result, decreased level of the residents' (older adults with intellectual disability) well-being. A plausible solution for this condition may be using communication technologies. Previous studies indicate that using communication technologies among older adults contributes to maintaining the relationship with others, decreasing the older adult's sense of loneliness, and increasing their level of well-being. Using communication technologies may be especially valuable for older adults in the current global pandemic of COVID-19 and the associated restrictions of social distancing. However, to date, research on using communication technologies among people with intellectual disability has focused on younger cohorts. Moreover, research on the adoption of technologies among older adults with intellectual disability has focused more on assistive technologies and less on communication technologies. To address these practice and research gaps, the present study focuses on the adoption process of communication technology among older adults with intellectual disability (over the age of 45 years) who live in supported accommodation. Fifteen residents participated in an intervention program where they received a tablet with a video communication application and through which they were able to contact their families. A multiple-case study methodology was applied to capture the experiences, including barriers and needs, of the residents from three perspectives: the resident, the family member, and a staff member from the residential setting. The data was collected via quantitative and qualitative measures at different time points over the intervention. The findings demonstrate the contribution of using communication technology for the well-being of older adults with intellectual disability in supported accommodation. The findings also map the adoption process among this population, including pitfalls. The present study contributes to developing best practices on how to accommodate communication technologies to older adults with intellectual disability for maintaining contact with others.

Keywords: adoption, aging, communication, intellectual disability, technology

Procedia PDF Downloads 225
4580 [Keynote Talk]: Caught in the Tractorbeam of Larger Influences: The Filtration of Innovation in Education Technology Design

Authors: Justin D. Olmanson, Fitsum Abebe, Valerie Jones, Eric Kyle, Xianquan Liu, Katherine Robbins, Guieswende Rouamba

Abstract:

The history of education technology--and designing, adapting, and adopting technologies for use in educational spaces--is nuanced, complex, and dynamic. Yet, despite a range of continually emerging technologies, the design and development process often yields results that appear quite similar in terms of affordances and interactions. Through this study we (1) verify the extent to which designs have been constrained, (2) consider what might account for it, and (3) offer a way forward in terms of how we might identify and strategically sidestep these influences--thereby increasing the diversity of our designs with a given technology or within a particular learning domain. We begin our inquiry from the perspective that a host of co-influencing elements, fields, and meta narratives converge on the education technology design process to exert a tangible, often homogenizing effect on the resultant designs. We identify several elements that influence design in often implicit or unquestioned ways (e.g. curriculum, learning theory, economics, learning context, pedagogy), we describe our methodology for identifying the elemental positionality embedded in a design, we direct our analysis to a particular subset of technologies in the field of literacy, and unpack our findings. Our early analysis suggests that the majority of education technologies designed for use/used in US public schools are heavily influenced by a handful of mainstream theories and meta narratives. These findings have implications for how we approach the education technology design process--which we use to suggest alternative methods for designing/ developing with emerging technologies. Our analytical process and re conceptualized design process hold the potential to diversify the ways emerging and established technologies get incorporated into our designs.

Keywords: curriculum, design, innovation, meta narratives

Procedia PDF Downloads 502