Search results for: mobile touch technology
8350 Solar Energy Technology Adoption; A Vignette Study for the Up-Scale Residential Sector in Egypt
Authors: Mazen Zaki, Sherwat E. Ibrahim
Abstract:
Renewable energy has become a very important and critical topic all around the world due to the limited resources that led to shifting to the trend of renewable energy and its integration with the conventional ones. This paper investigates the adoption of the solar energy technology for up-scale residential sector in Cairo, Egypt. The technology acceptance model uses several stakeholder points’ of views to develop vignettes to be used in examining the intention and attitude of the householders to adopt the solar energy technology.Keywords: solar energy, technology acceptance model, TAM, stakeholder analysis, vignette, residential sector
Procedia PDF Downloads 1458349 Depth Camera Aided Dead-Reckoning Localization of Autonomous Mobile Robots in Unstructured GNSS-Denied Environments
Authors: David L. Olson, Stephen B. H. Bruder, Adam S. Watkins, Cleon E. Davis
Abstract:
In global navigation satellite systems (GNSS), denied settings such as indoor environments, autonomous mobile robots are often limited to dead-reckoning navigation techniques to determine their position, velocity, and attitude (PVA). Localization is typically accomplished by employing an inertial measurement unit (IMU), which, while precise in nature, accumulates errors rapidly and severely degrades the localization solution. Standard sensor fusion methods, such as Kalman filtering, aim to fuse precise IMU measurements with accurate aiding sensors to establish a precise and accurate solution. In indoor environments, where GNSS and no other a priori information is known about the environment, effective sensor fusion is difficult to achieve, as accurate aiding sensor choices are sparse. However, an opportunity arises by employing a depth camera in the indoor environment. A depth camera can capture point clouds of the surrounding floors and walls. Extracting attitude from these surfaces can serve as an accurate aiding source, which directly combats errors that arise due to gyroscope imperfections. This configuration for sensor fusion leads to a dramatic reduction of PVA error compared to traditional aiding sensor configurations. This paper provides the theoretical basis for the depth camera aiding sensor method, initial expectations of performance benefit via simulation, and hardware implementation, thus verifying its veracity. Hardware implementation is performed on the Quanser Qbot 2™ mobile robot, with a Vector-Nav VN-200™ IMU and Kinect™ camera from Microsoft.Keywords: autonomous mobile robotics, dead reckoning, depth camera, inertial navigation, Kalman filtering, localization, sensor fusion
Procedia PDF Downloads 2078348 Augmented Reality Aplications for Armed Forces
Authors: Murat Sözen
Abstract:
It is not at all difficult to estimate which level today’s technology reaches considering that humankinds space-faring in early 1950s. Technology is a means to help achieve goals and people can produce systems on their physical and mental abilities. Needed and used as tools in all areas of life and became a necessity and dependency, technology, widely used in the military field. To be a revolutionary change in the military matters, opportunities offered by technology should be put into practice. Tech makes weapons, sensors, platforms and soldiers carrying them more effective. To increase this efficiency in the battlefield defense industry is seeking every advantage of technology. In this study, the applicability of existing and on-going augmented reality applications for Armed Forces will be evaluated.Keywords: augmented reality, battlefield, military, virtual reality
Procedia PDF Downloads 2678347 A Secure Survey against Black Hole Attack in MANET
Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi
Abstract:
Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security
Procedia PDF Downloads 4068346 Robot Operating System-Based SLAM for a Gazebo-Simulated Turtlebot2 in 2d Indoor Environment with Cartographer Algorithm
Authors: Wilayat Ali, Li Sheng, Waleed Ahmed
Abstract:
The ability of the robot to make simultaneously map of the environment and localize itself with respect to that environment is the most important element of mobile robots. To solve SLAM many algorithms could be utilized to build up the SLAM process and SLAM is a developing area in Robotics research. Robot Operating System (ROS) is one of the frameworks which provide multiple algorithm nodes to work with and provide a transmission layer to robots. Manyof these algorithms extensively in use are Hector SLAM, Gmapping and Cartographer SLAM. This paper describes a ROS-based Simultaneous localization and mapping (SLAM) library Google Cartographer mapping, which is open-source algorithm. The algorithm was applied to create a map using laser and pose data from 2d Lidar that was placed on a mobile robot. The model robot uses the gazebo package and simulated in Rviz. Our research work's primary goal is to obtain mapping through Cartographer SLAM algorithm in a static indoor environment. From our research, it is shown that for indoor environments cartographer is an applicable algorithm to generate 2d maps with LIDAR placed on mobile robot because it uses both odometry and poses estimation. The algorithm has been evaluated and maps are constructed against the SLAM algorithms presented by Turtlebot2 in the static indoor environment.Keywords: SLAM, ROS, navigation, localization and mapping, gazebo, Rviz, Turtlebot2, slam algorithms, 2d indoor environment, cartographer
Procedia PDF Downloads 1458345 Mobile Phone Text Reminders and Voice Call Follow-ups Improve Attendance for Community Retail Pharmacy Refills; Learnings from Lango Sub-region in Northern Uganda
Authors: Jonathan Ogwal, Louis H. Kamulegeya, John M. Bwanika, Davis Musinguzi
Abstract:
Introduction: Community retail Pharmacy drug distribution points (CRPDDP) were implemented in the Lango sub-region as part of the Ministry of Health’s response to improving access and adherence to antiretroviral treatment (ART). Clients received their ART refills from nearby local pharmacies; as such, the need for continuous engagement through mobile phone appointment reminders and health messages. We share learnings from the implementation of mobile text reminders and voice call follow-ups among ART clients attending the CRPDDP program in northern Uganda. Methods: A retrospective data review of electronic medical records from four pharmacies allocated for CRPDDP in the Lira and Apac districts of the Lango sub-region in Northern Uganda was done from February to August 2022. The process involved collecting phone contacts of eligible clients from the health facility appointment register and uploading them onto a messaging platform customized by Rapid-pro, an open-source software. Client information, including code name, phone number, next appointment date, and the allocated pharmacy for ART refill, was collected and kept confidential. Contacts received appointment reminder messages and other messages on positive living as an ART client. Routine voice call follow-ups were done to ascertain the picking of ART from the refill pharmacy. Findings: In total, 1,354 clients were reached from the four allocated pharmacies found in urban centers. 972 clients received short message service (SMS) appointment reminders, and 382 were followed up through voice calls. The majority (75%) of the clients returned for refills on the appointed date, 20% returned within four days after the appointment date, and the remaining 5% needed follow-up where they reported that they were not in the district by the appointment date due to other engagements. Conclusion: The use of mobile text reminders and voice call follow-ups improves the attendance of community retail pharmacy refills.Keywords: antiretroviral treatment, community retail drug distribution points, mobile text reminders, voice call follow-up
Procedia PDF Downloads 998344 Effect of Mindfulness Training on Psychological Well-Being: An Experimental Study Using a Mobile App as Intervention
Authors: Beeto W. C. Leung, Nicole C. Y. Lee
Abstract:
It was well known that college students experienced a high level of stress and anxiety. College athletes, a special group of college students, may even encounter a higher level of pressure and distress due to their dual endeavors in academic and athletic settings. Due to the high demands and costs of mental health services, easily accessible, web-based self-help interventions are getting more popular. The aim of the present experimental study was to examine the potential intervention effect of a mindfulness-based self-help mobile App, called 'Smiling Mind', on mindfulness and psychological well-being. Forty-six college athletes, recruited from athletic teams of two local universities in Hong Kong, were randomly assigned to the Mindfulness App Group (MAG) and the Control Group (CG). All participants were administered the Mindful Attention Awareness Scale, Geriatric Depression Scale, and Perceived Stress Scale-10 before the study (Time 1, T1) and after the 4-week intervention (Time 2, T2). MAG was requested to use the app and follow the instructions every day for at least 5 days per week. Participants were also asked to record their daily app usage time. Results showed that, for MAG, from T1 to T2, mindfulness has been increased from 3.25 to 3.92; depressive symptoms and stress has been significantly decreased from 8.6 to 5.1 and 24.8 to 13.5 respectively while for the CG, mindfulness has been decreased slightly from 3.29 to 3.13; depressive symptoms and stress has been slightly increased from 7.1 to 7.3 and 24.1 to 27.1 respectively. Three mixed-design ANOVAs with time (T1, T2) as the within-subjects factor and intervention group (MAG, CG) as the between-subjects factor revealed a main effect of time on mindfulness, F(1, 41) = 10.28, p < 0.01, depressive symptoms, F(1, 41) = 6.55, p < 0.02 and stress, F(1, 41) = 16.96, p < 0.001 respectively. Both predicted interaction between time and intervention group on mindfulness, F(1, 41) = 26.6, p < 0.001, ηp 2 =0.39, depressive symptoms, F(1, 41) = 8.00, p < 0.01, ηp 2 =0.16 and Stress F(1, 41) = 49.3, p < 0.001, ηp 2 =0.55 were significant meaning that participants using the Mindfulness Mobile App in the intervention did experienced a significant increase in mindfulness and significant decrease in depressive symptoms and perceived level of stress after the 4-week intervention when compared with the control group. The present study provided encouraging empirical support for using Smiling Mind, a self-help mobile app, to promote mindfulness and mental health in a cost-effective way. Further studies should examine the potential use of Smiling Mind in different samples, including children and adolescence, as well as, investigate the lasting effects of using the app on other psychosocial outcomes such as emotional regulations.Keywords: college athletes, experimental study, mindfulness mobile apps, psychological well-being
Procedia PDF Downloads 1178343 Support for Planning of Mobile Personnel Tasks by Solving Time-Dependent Routing Problems
Authors: Wlodzimierz Ogryczak, Tomasz Sliwinski, Jaroslaw Hurkala, Mariusz Kaleta, Bartosz Kozlowski, Piotr Palka
Abstract:
Implementation concepts of a decision support system for planning and management of mobile personnel tasks (sales representatives and others) are discussed. Large-scale periodic time-dependent vehicle routing and scheduling problems with complex constraints are solved for this purpose. Complex nonuniform constraints with respect to frequency, time windows, working time, etc. are taken into account with additional fast adaptive procedures for operational rescheduling of plans in the presence of various disturbances. Five individual solution quality indicators with respect to a single personnel person are considered. This paper deals with modeling issues corresponding to the problem and general solution concepts. The research was supported by the European Union through the European Regional Development Fund under the Operational Programme ‘Innovative Economy’ for the years 2007-2013; Priority 1 Research and development of modern technologies under the project POIG.01.03.01-14-076/12: 'Decision Support System for Large-Scale Periodic Vehicle Routing and Scheduling Problems with Complex Constraints.'Keywords: mobile personnel management, multiple criteria, time dependent, time windows, vehicle routing and scheduling
Procedia PDF Downloads 3238342 Parent’s Preferences about Technology-Based Therapy for Children and Young People on the Autism Spectrum – a UK Survey
Authors: Athanasia Kouroupa, Karen Irvine, Sivana Mengoni, Shivani Sharma
Abstract:
Exploring parents’ preferences towards technology-based interventions for children on the autism spectrum can inform future research and support technology design. The study aimed to provide a comprehensive description of parents’ knowledge and preferences about innovative technology to support children on the autism spectrum. Survey data were collected from parents (n = 267) internationally. The survey included information about the use of conventional (e.g., smartphone, iPod, tablets) and non-conventional (e.g., virtual reality, robot) technologies. Parents appeared to prefer conventional technologies such as tablets and dislike non-conventional ones. They highlighted the positive contribution technology brought to the children’s lives during the pandemic. A few parents were equally concerned that the compulsory introduction of technology during the pandemic was associated with elongated time on devices. The data suggested that technology-based interventions are not widely known, need to be financially approachable and achieve a high standard of design to engage users.Keywords: autism, intervention, preferences, technology
Procedia PDF Downloads 1338341 Contribution for Rural Development Trough Training in Organic Farming
Authors: Raquel P. F. Guiné, Daniela V. T. A. Costa, Paula M. R. Correia, Moisés Castro, Luis T. Guerra, Cristina A. Costa
Abstract:
The aim of this work was to characterize a potential target group of people interested in participating into a training program in organic farming in the context of mobile-learning. The information sought addressed in particular, but not exclusively, possible contents, formats and forms of evaluation that will contribute to define the course objectives and curriculum, as well as to ensure that the course meets the needs of the learners and their preferences. The sample was selected among different European countries. The questionnaires were delivered electronically for answering online and in the end 135 consented valid questionnaires were obtained. The results allowed characterizing the target group and identifying their training needs and preferences towards m-learning formats, giving valuable tools to design the training offer.Keywords: mobile-learning, organic farming, rural development, survey
Procedia PDF Downloads 5028340 Evolution of Floating Photovoltaic System Technology and Future Prospect
Authors: Young-Kwan Choi, Han-Sang Jeong
Abstract:
Floating photovoltaic system is a technology that combines photovoltaic power generation with floating structure. However, since floating technology has not been utilized in photovoltaic generation, there are no standardized criteria. It is separately developed and used by different installation bodies. This paper aims to discuss the change of floating photovoltaic system technology based on examples of floating photovoltaic systems installed in Korea.Keywords: floating photovoltaic system, floating PV installation, ocean floating photovoltaic system, tracking type floating photovoltaic system
Procedia PDF Downloads 5608339 Energy Efficient Heterogeneous System for Wireless Sensor Networks (WSN)
Authors: José Anderson Rodrigues de Souza, Teles de Sales Bezerra, Saulo Aislan da Silva Eleuterio, Jeronimo Silva Rocha
Abstract:
Mobile devices are increasingly occupying sectors of society and one of its most important features is mobility. However, the use of mobile devices is subject to the lifetime of the batteries. Thus, the use of energy batteries has become an important issue in the study of wireless network technologies. In this context, new solutions that enable aggregate energy efficiency not only through energy saving, and principally they are evaluated from a more realistic model of energy discharge, if easy adaptation to existing protocols. This paper presents a study on the energy needed and the lifetime for Wireless Sensor Networks (WSN) using a heterogeneous network and applying the LEACH protocol.Keywords: wireless sensor networks, energy efficiency, heterogeneous, LEACH protocol
Procedia PDF Downloads 5808338 Uplink Throughput Prediction in Cellular Mobile Networks
Authors: Engin Eyceyurt, Josko Zec
Abstract:
The current and future cellular mobile communication networks generate enormous amounts of data. Networks have become extremely complex with extensive space of parameters, features and counters. These networks are unmanageable with legacy methods and an enhanced design and optimization approach is necessary that is increasingly reliant on machine learning. This paper proposes that machine learning as a viable approach for uplink throughput prediction. LTE radio metric, such as Reference Signal Received Power (RSRP), Reference Signal Received Quality (RSRQ), and Signal to Noise Ratio (SNR) are used to train models to estimate expected uplink throughput. The prediction accuracy with high determination coefficient of 91.2% is obtained from measurements collected with a simple smartphone application.Keywords: drive test, LTE, machine learning, uplink throughput prediction
Procedia PDF Downloads 1578337 Network Mobility Support in Content-Centric Internet
Authors: Zhiwei Yan, Jong-Hyouk Lee, Yong-Jin Park, Xiaodong Lee
Abstract:
In this paper, we analyze NEtwork MObility (NEMO) supporting problems in Content-Centric Networking (CCN), and propose the CCN-NEMO which can well support the deployment of the content-centric paradigm in large-scale mobile Internet. The CCN-NEMO extends the signaling message of the basic CCN protocol, to support the mobility discovery and fast trigger of Interest re-issuing during the network mobility. Besides, the Mobile Router (MR) is extended to optimize the content searching and relaying in the local subnet. These features can be employed by the nested NEMO to maximize the advantages of content retrieving with CCN. Based on the analysis, we compare the performance on handover latency between the basic CCN and our proposed CCN-NEMO. The results show that our scheme can facilitate the content-retrieving in the NEMO scenario with improved performance.Keywords: NEMO, CCN, mobility, handover latency
Procedia PDF Downloads 4708336 Phone Number Spoofing Attack in VoLTE 4G
Authors: Joo-Hyung Oh
Abstract:
The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.Keywords: LTE, 4G, VoLTE, phone number spoofing
Procedia PDF Downloads 4328335 China’s Hotel m-Bookers’ Perceptions of their Booking Experiences
Authors: Weiqi Xia
Abstract:
We assess the perceptions of China’s hotel m-bookers using the E-SERVQUAL model and technology affordance assessment metrics. The data analysis provides insight into Chinese hotel m-bookers’ perceptions of information quality items, system quality items, and functional quality items. Respondents’ perceived value of such items is greatly enhanced via mini-program support and self-service innovation, which are predicted to be of increasing importance in the future. The findings of this study help close the gap between hotel operators’ understanding and customers’ perceptions. Our findings may also provide valuable insights into the functioning of China’s hotel industry.Keywords: mobile hotel booking, hotel m-bookers, user perception, China’s WeChat mini program, hotel booking apps.
Procedia PDF Downloads 448334 An Early Attempt of Artificial Intelligence-Assisted Language Oral Practice and Assessment
Authors: Paul Lam, Kevin Wong, Chi Him Chan
Abstract:
Constant practicing and accurate, immediate feedback are the keys to improving students’ speaking skills. However, traditional oral examination often fails to provide such opportunities to students. The traditional, face-to-face oral assessment is often time consuming – attending the oral needs of one student often leads to the negligence of others. Hence, teachers can only provide limited opportunities and feedback to students. Moreover, students’ incentive to practice is also reduced by their anxiety and shyness in speaking the new language. A mobile app was developed to use artificial intelligence (AI) to provide immediate feedback to students’ speaking performance as an attempt to solve the above-mentioned problems. Firstly, it was thought that online exercises would greatly increase the learning opportunities of students as they can now practice more without the needs of teachers’ presence. Secondly, the automatic feedback provided by the AI would enhance students’ motivation to practice as there is an instant evaluation of their performance. Lastly, students should feel less anxious and shy compared to directly practicing oral in front of teachers. Technically, the program made use of speech-to-text functions to generate feedback to students. To be specific, the software analyzes students’ oral input through certain speech-to-text AI engine and then cleans up the results further to the point that can be compared with the targeted text. The mobile app has invited English teachers for the pilot use and asked for their feedback. Preliminary trials indicated that the approach has limitations. Many of the users’ pronunciation were automatically corrected by the speech recognition function as wise guessing is already integrated into many of such systems. Nevertheless, teachers have confidence that the app can be further improved for accuracy. It has the potential to significantly improve oral drilling by giving students more chances to practice. Moreover, they believe that the success of this mobile app confirms the potential to extend the AI-assisted assessment to other language skills, such as writing, reading, and listening.Keywords: artificial Intelligence, mobile learning, oral assessment, oral practice, speech-to-text function
Procedia PDF Downloads 1038333 Barriers to the Uptake of Technology in the Quantity Surveying Industry
Authors: Mnisi Blessing, Christopher Amoah
Abstract:
Purpose: The usage of modern technology is widespread in industrialised nations. The issue still pertains to developing countries since they struggle to use technology in the building sector. The study aims to identify the barriers to technology usage in quantity surveying firms. Methodology: Quantity Surveyors were interviewed via Microsoft teams due to the dispersed nature of the participants. However, where the interview was not possible, the interview guide was emailed to the participants to fill in. In all, 12 participants were interviewed out of the 25 participants contacted. The data received were analysed using the content analysis process. Findings: The study's findings demonstrate that quantity surveyors have access to a wide range of technology that significantly enhances their project activities. However, quantity surveying companies are hesitant to use technology for several reasons, including the cost and maintenance associated with it. Other obstacles include a lack of knowledge, poor market acceptance, legal obstacles, and budgetary constraints. Implication: Despite the advantages associated with modern technology applications, quantity surveying firms are not using them, which may ultimately affect their work output. Therefore, firms need to re-examine these obstacles, inhibiting their adoption of technology in the work process to enhance their production. Value of the Paper: The study reveals the main hindrances to technology usage, which may help firms institute measures to address them.Keywords: barriers, implementation, technology, quantity surveying
Procedia PDF Downloads 848332 Quality of Service Based Routing Algorithm for Real Time Applications in MANETs Using Ant Colony and Fuzzy Logic
Authors: Farahnaz Karami
Abstract:
Routing is an important, challenging task in mobile ad hoc networks due to node mobility, lack of central control, unstable links, and limited resources. An ant colony has been found to be an attractive technique for routing in Mobile Ad Hoc Networks (MANETs). However, existing swarm intelligence based routing protocols find an optimal path by considering only one or two route selection metrics without considering correlations among such parameters making them unsuitable lonely for routing real time applications. Fuzzy logic combines multiple route selection parameters containing uncertain information or imprecise data in nature, but does not have multipath routing property naturally in order to provide load balancing. The objective of this paper is to design a routing algorithm using fuzzy logic and ant colony that can solve some of routing problems in mobile ad hoc networks, such as nodes energy consumption optimization to increase network lifetime, link failures rate reduction to increase packet delivery reliability and providing load balancing to optimize available bandwidth. In proposed algorithm, the path information will be given to fuzzy inference system by ants. Based on the available path information and considering the parameters required for quality of service (QoS), the fuzzy cost of each path is calculated and the optimal paths will be selected. NS2.35 simulation tools are used for simulation and the results are compared and evaluated with the newest QoS based algorithms in MANETs according to packet delivery ratio, end-to-end delay and routing overhead ratio criterions. The simulation results show significant improvement in the performance of these networks in terms of decreasing end-to-end delay, and routing overhead ratio, and also increasing packet delivery ratio.Keywords: mobile ad hoc networks, routing, quality of service, ant colony, fuzzy logic
Procedia PDF Downloads 648331 Rule of Natural Synthetic Chemical on Lead Immobilization in Polluted Sandy Soils
Authors: Saud S. AL Oud
Abstract:
Soil contamination can have dire consequences, such as loss of ecosystem and agricultural productivity, diminished food chain quality, tainted water resources, economic loss, and human and animal illness. In recent years, attention has focused on the development of in situ immobilization methods that are generally less expensive and disruptive to the natural landscape, hydrology, and ecosystems than are conventional excavation treatments, and disposal methods. Soft, inexpensive, and efficient agents were used in the present research to immobilize Pb in polluted sandy soil. Five agents, either naturally occurring or chemically prepared, were used for this purpose. These agents include; iron ore (72% Fe2O3), cement, a mixture of calcite and shale rich in aluminum (CASH), and two chemically prepared amorphous materials of Al- and Fe-gel. These agents were selected due to their ability to specifically adsorb heavy metals onto their surface OH functional groups, which provide permanent immobilization of metal pollutants and reduce the fraction that is potentially mobile or bioavailable. The efficiency of these agents in immobilizing Pb were examined in a laboratory experiment, in which two rates (0.5 and 1.0 %) of tested agents were added to the polluted soils containing total contents of Pb ranging from 17.4-49.8 mg/kg. The results show that all immobilizing agents were succeed in minimizing the mobile form of Pb as extracted by 0.5 N HNO3. The extracted Pb decreased with increasing addition rate of immobilizing agents. At addition rate of 0.5%, HNO3 extractable-Pb varied widely depending on the agents type and were found to represent 21-67% of the initial values. All agents were able to reduce mobile Pb to levels lower than that (2.0 mg/kg) reported for non polluted soil, particularly for soils had initials of mobile Pb less than 10 mg/kg. Both iron oxide and CASH had the highest efficiency in immobilizing Pb, followed by cement, then amorphous materials of Fe and Al hydroxides.Keywords: soil, synthetic chemical, lead, immobilization, polluted
Procedia PDF Downloads 2408330 Integrating Historical Narratives with Merge Games as Tools for Pedagogy In Education
Authors: Aathira H.
Abstract:
Digital games can act as catalysts for educational transformation in the current scenario. Children and adolescence acquire this digital knowledge quickly and hence digital games can act as one of the most effective media for technology-mediated learning. Mobile gaming industries have seen the rise of a new trending genre of games, i.e., “Merge games” which is currently thriving in the market. This paper analysis on how gamifying historic and cultural narratives with merge mechanics can be an effective way to educate school children. Through the study of how merge mechanics in games have currently emerged as a trend., this paper argues how it can be integrated with a strong narrative which can convey history in an engaging way for education.Keywords: game-based learning, merge mechanics, historical narratives, gaming innovations
Procedia PDF Downloads 1048329 Mobility Management via Software Defined Networks (SDN) in Vehicular Ad Hoc Networks (VANETs)
Authors: Bilal Haider, Farhan Aadil
Abstract:
A Vehicular Ad hoc Network (VANET) provides various services to end-users traveling on the road at high speeds. However, this high-speed mobility of mobile nodes can cause frequent service disruptions. Various mobility management protocols exist for managing node mobility, but due to their centralized nature, they tend to suffer in the VANET environment. In this research, we proposed a distributed mobility management protocol using software-defined networks (SDN) for VANETs. Instead of relying on a centralized mobility anchor, the mobility functionality is distributed at multiple infrastructural nodes. The protocol is based on the classical Proxy Mobile IP version 6 (PMIPv6). It is evident from simulation results that this work has improved the network performance with respect to nodes throughput, delay, and packet loss.Keywords: SDN, VANET, mobility management, optimization
Procedia PDF Downloads 1708328 Blockchain Technology Security Evaluation: Voting System Based on Blockchain
Authors: Omid Amini
Abstract:
Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election.Keywords: blockchain, technology, security, information, voting system, transparency
Procedia PDF Downloads 1328327 Legal Arrangement on Media Ownership and the Case of Turkey
Authors: Sevil Yildiz
Abstract:
In this study, we will touch upon the legal arrangements issued in Turkey for prevention of condensation and for ensuring pluralism in the media. We will mention the legal arrangements concerning the regulatory and supervisory authority, namely the Radio and Television Supreme Council, for the visual and auditory media. In this context; the legal arrangements, which have been introduced by the Law No 6112 on the Establishment of Radio and Television Enterprises and Their Media Services in relation to the media ownership, will be reviewed through comparison with the Article 29 of the repealed Law No 3984.Keywords: media ownership, legal arrangements, the case for Turkey, pluralism
Procedia PDF Downloads 5108326 Concept for Determining the Focus of Technology Monitoring Activities
Authors: Guenther Schuh, Christina Koenig, Nico Schoen, Markus Wellensiek
Abstract:
Identification and selection of appropriate product and manufacturing technologies are key factors for competitiveness and market success of technology-based companies. Therefore many companies perform technology intelligence (TI) activities to ensure the identification of evolving technologies at the right time. Technology monitoring is one of the three base activities of TI, besides scanning and scouting. As the technological progress is accelerating, more and more technologies are being developed. Against the background of limited resources it is therefore necessary to focus TI activities. In this paper, we propose a concept for defining appropriate search fields for technology monitoring. This limitation of search space leads to more concentrated monitoring activities. The concept will be introduced and demonstrated through an anonymized case study conducted within an industry project at the Fraunhofer Institute for Production Technology. The described concept provides a customized monitoring approach, which is suitable for use in technology-oriented companies especially those that have not yet defined an explicit technology strategy. It is shown in this paper that the definition of search fields and search tasks are suitable methods to define topics of interest and thus to direct monitoring activities. Current as well as planned product, production and material technologies as well as existing skills, capabilities and resources form the basis of the described derivation of relevant search areas. To further improve the concept of technology monitoring the proposed concept should be extended during future research e.g. by the definition of relevant monitoring parameters.Keywords: monitoring radar, search field, technology intelligence, technology monitoring
Procedia PDF Downloads 4748325 The Role of Technology in Entrepreneurship: Key Findings from Women Start-Ups in Kaduna
Authors: Ogola Lois Kange
Abstract:
The study looked at the role technology had previously played and now plays in small and medium scale women-owned businesses starting up in Kaduna, which is an emerging entrepreneurship hub state in Nigeria. The study selected a random population of 20 businesses drawn from the north and south of Kaduna. The selection was based on a survey administered to 100 Women-owned businesses that had started up within the last 3-5years. Questionnaires were administered and analyzed based on the participants’ backgrounds, upbringing, exposure and access to technology. One of the key findings is that women-owned businesses can no longer thrive without the application of basic technology.Keywords: business, entrepreneurship, start-up, technology, women
Procedia PDF Downloads 1918324 Insights into the Perception of Sustainable Technology Adoption among Malaysian Small and Medium-Sized Enterprises
Authors: Majharul Talukder, Ali Quazi
Abstract:
The use of sustainable technology is being increasingly driven by the demand for saving resources, long-term cost savings, and protecting the environment. A transitional economy such as Malaysia is an example where traditional technologies are being replaced by sustainable ones. The antecedents that are driving Malaysian SMEs to integrate sustainable technology into their business operations have not been well researched. This paper addresses this gap in our knowledge through an examination of attitudes and ethics as antecedents of acceptance of sustainable technology among Malaysian SMEs. The database comprised 322 responses that were analysed using the PLS-SEM path algorithm. Results indicated that effective and altruism attitudes have high predictive ability for the usage of sustainable technology in Malaysian SMEs. This paper identifies the implications of the findings, along with the major limitations of the research and explores future areas of research in this field.Keywords: sustainable technology, innovation management, Malaysian SMEs, organizational attitudes and ethical belief
Procedia PDF Downloads 3328323 3D Printing Technology in Housing Projects Construction
Authors: Mohammed F. Haddad, Mohammad A. Albenayyan
Abstract:
Realistically, 3-D printing as a technology has not yet reached the required maturity level to handle construction housing projects for citizens on a country scale. However, potentially, it has all of the required elements for addressing this issue. There are two main high-level elements of this technology that need to be capitalized on in order for the technology to reach its full potential, technical and logistical. This paper aims to cover how 3-D printing can be a viable technical solution for housing projects and describe the impact of 3-D printing technical features on the logistical aspects of completing a housing project. Additionally, a perspective about 3-D printing in Saudi Arabia will be presented in order to give the reader an idea of where the kingdom stands in the deployment of this technology. Finally, a glimpse will be given regarding the potential utilization of this technology for space applications.Keywords: large-scale 3-D printing, additive manufacturing, D- shape, contour crafting
Procedia PDF Downloads 1288322 Space Debris Mitigation: Solutions from the Dark Skies of the Remote Australian Outback Using a Proposed Network of Mobile Astronomical Observatories
Authors: Muhammad Akbar Hussain, Muhammad Mehdi Hussain, Waqar Haider
Abstract:
There are tens of thousands of undetected and uncatalogued pieces of space debris in the Low Earth Orbit (LEO). They are not only difficult to be detected and tracked, their sheer number puts active satellites and humans in orbit around Earth into danger. With the entry of more governments and private companies into harnessing the Earth’s orbit for communication, research and military purposes, there is an ever-increasing need for not only the detection and cataloguing of these pieces of space debris, it is time to take measures to take them out and clean up the space around Earth. Current optical and radar-based Space Situational Awareness initiatives are useful mostly in detecting and cataloguing larger pieces of debris mainly for avoidance measures. Smaller than 10 cm pieces are in a relatively dark zone, yet these are deadly and capable of destroying satellites and human missions. A network of mobile observatories, connected to each other in real time and working in unison as a single instrument, may be able to detect small pieces of debris and achieve effective triangulation to help create a comprehensive database of their trajectories and parameters to the highest level of precision. This data may enable ground-based laser systems to help deorbit individual debris. Such a network of observatories can join current efforts in detection and removal of space debris in Earth’s orbit.Keywords: space debris, low earth orbit, mobile observatories, triangulation, seamless operability
Procedia PDF Downloads 1668321 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network
Authors: Kimaya Subhash Gaikwad, S. B. Waykar
Abstract:
The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.Keywords: communication, MANET, OLSR, QoS
Procedia PDF Downloads 450