Search results for: internet crimes
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1869

Search results for: internet crimes

1119 A Survey of Dynamic QoS Methods in Sofware Defined Networking

Authors: Vikram Kalekar

Abstract:

Modern Internet Protocol (IP) networks deploy traditional and modern Quality of Service (QoS) management methods to ensure the smooth flow of network packets during regular operations. SDN (Software-defined networking) networks have also made headway into better service delivery by means of novel QoS methodologies. While many of these techniques are experimental, some of them have been tested extensively in controlled environments, and few of them have the potential to be deployed widely in the industry. With this survey, we plan to analyze the approaches to QoS and resource allocation in SDN, and we will try to comment on the possible improvements to QoS management in the context of SDN.

Keywords: QoS, policy, congestion, flow management, latency, delay index terms-SDN, delay

Procedia PDF Downloads 189
1118 Distributed Key Management With Less Transmitted Messaged In Rekeying Process To Secure Iot Wireless Sensor Networks In Smart-Agro

Authors: Safwan Mawlood Hussien

Abstract:

Internet of Things (IoT) is a promising technology has received considerable attention in different fields such as health, industry, defence, and agro, etc. Due to the limitation capacity of computing, storage, and communication, IoT objects are more vulnerable to attacks. Many solutions have been proposed to solve security issues, such as key management using symmetric-key ciphers. This study provides a scalable group distribution key management based on ECcryptography; with less transmitted messages The method has been validated through simulations in OMNeT++.

Keywords: elliptic curves, Diffie–Hellman, discrete logarithm problem, secure key exchange, WSN security, IoT security, smart-agro

Procedia PDF Downloads 116
1117 Trafficking of Women in International Migration: Issues and Major Challenges in Present Scenario

Authors: Neha Singh, Anshuman Rana

Abstract:

Gender-Based Violence (GBV) is a violation of human rights and a form of discrimination which reinforces inequalities between men and women. It is defined as violence that is directed against a person on the basis of gender. There has been increased attention to human trafficking that has exposed to illegal migration. Trafficking is complex, but it generally takes place due to “push and pull factors”. India is both a source as well as a transit country for trafficking. Women are bought and sold with impunity and trafficked to other countries. They are forced to work as sex worker, forced labour and other practices of slavery. Trafficked victims often suffer from serious abuse and physical exhaustion. The effects of violence on women vary widely. GBV typically has physical, psychological and social effects. They face unwanted pregnancies, miscarriages, high rate of infertility and sexually transmitted disease. The social exclusion of women is so great that it constitutes a new form of apartheid. Women are considered as lesser value and deprived of their fundamental rights. Violation of human rights and fundamental freedom such as- trafficking of women, girls for sex trade, forced prostitution and sex tourism have become the focus of internationally organized crimes. My paper will analyse the impact of violence on society as well. Law alone cannot change the scenario and problem of gender-biasness. The whole issue of gender violence needs social awakening and change in attitude of masses, so that due respect and equal status is given to women.

Keywords: gender-based violence, trafficking, migration, violence impact, social exclusion, law enforcement

Procedia PDF Downloads 279
1116 Performance Evaluation of a Wireless 433 MHz Link in Underwater-Freshwater Communication

Authors: Xavi Vilajosana Guillen, Emilio José Pérez Salgado

Abstract:

This document presents experimental results obtained in a realistic environment using an underwater LoRa link. It aims to analyze the behavior of electromagnetic waves underwater and determine this communication capability. With this it has been tried to empirically evaluate the results obtained in the mathematical model using a commercial device with low cost and low consumption that works at frequency 433Mhz. The mathematical results obtained for wireless communication at 433Mhz underwater indicate that a communication of up to 7.5 m is possible, however experimentally 8 m has been achieved.

Keywords: 433Mhz link, internet of things, LoRa link, underwater communication

Procedia PDF Downloads 60
1115 Developing a Cloud Intelligence-Based Energy Management Architecture Facilitated with Embedded Edge Analytics for Energy Conservation in Demand-Side Management

Authors: Yu-Hsiu Lin, Wen-Chun Lin, Yen-Chang Cheng, Chia-Ju Yeh, Yu-Chuan Chen, Tai-You Li

Abstract:

Demand-Side Management (DSM) has the potential to reduce electricity costs and carbon emission, which are associated with electricity used in the modern society. A home Energy Management System (EMS) commonly used by residential consumers in a down-stream sector of a smart grid to monitor, control, and optimize energy efficiency to domestic appliances is a system of computer-aided functionalities as an energy audit for residential DSM. Implementing fault detection and classification to domestic appliances monitored, controlled, and optimized is one of the most important steps to realize preventive maintenance, such as residential air conditioning and heating preventative maintenance in residential/industrial DSM. In this study, a cloud intelligence-based green EMS that comes up with an Internet of Things (IoT) technology stack for residential DSM is developed. In the EMS, Arduino MEGA Ethernet communication-based smart sockets that module a Real Time Clock chip to keep track of current time as timestamps via Network Time Protocol are designed and implemented for readings of load phenomena reflecting on voltage and current signals sensed. Also, a Network-Attached Storage providing data access to a heterogeneous group of IoT clients via Hypertext Transfer Protocol (HTTP) methods is configured to data stores of parsed sensor readings. Lastly, a desktop computer with a WAMP software bundle (the Microsoft® Windows operating system, Apache HTTP Server, MySQL relational database management system, and PHP programming language) serves as a data science analytics engine for dynamic Web APP/REpresentational State Transfer-ful web service of the residential DSM having globally-Advanced Internet of Artificial Intelligence (AI)/Computational Intelligence. Where, an abstract computing machine, Java Virtual Machine, enables the desktop computer to run Java programs, and a mash-up of Java, R language, and Python is well-suited and -configured for AI in this study. Having the ability of sending real-time push notifications to IoT clients, the desktop computer implements Google-maintained Firebase Cloud Messaging to engage IoT clients across Android/iOS devices and provide mobile notification service to residential/industrial DSM. In this study, in order to realize edge intelligence that edge devices avoiding network latency and much-needed connectivity of Internet connections for Internet of Services can support secure access to data stores and provide immediate analytical and real-time actionable insights at the edge of the network, we upgrade the designed and implemented smart sockets to be embedded AI Arduino ones (called embedded AIduino). With the realization of edge analytics by the proposed embedded AIduino for data analytics, an Arduino Ethernet shield WizNet W5100 having a micro SD card connector is conducted and used. The SD library is included for reading parsed data from and writing parsed data to an SD card. And, an Artificial Neural Network library, ArduinoANN, for Arduino MEGA is imported and used for locally-embedded AI implementation. The embedded AIduino in this study can be developed for further applications in manufacturing industry energy management and sustainable energy management, wherein in sustainable energy management rotating machinery diagnostics works to identify energy loss from gross misalignment and unbalance of rotating machines in power plants as an example.

Keywords: demand-side management, edge intelligence, energy management system, fault detection and classification

Procedia PDF Downloads 247
1114 The Relationship between Mobile Phone Usage and Secondary School Students’ Academic Performance: Work Experience at an International School

Authors: L. N. P. Wedikandage, Mohamed Razmi Zahir

Abstract:

Technology is a global imperative because of its contributions to human existence and because it has improved global socioeconomic relations. As a result, the mobile phone has become the most important mode of communication today. Smartphones, Internet-enabled devices with built-in computer software and applications, are one of the most significant inventions of the twenty-first century. Technology is advantageous to many people, especially those involved in education. It is an important learning tool for today's schoolchildren. It enables students to access online learning platforms and course resources and interact digitally. Senior secondary students, in particular, have some of the most expensive and sophisticated mobile phones, tablets, and iPads capable of connecting to the internet and various social media platforms, other websites, and so on. At present, the use of mobile phones' potential for effective teaching and learning is growing. This is due to the benefits of mobile learning, including the ability to share knowledge without any limits in space or Time and the capacity to facilitate the development of critical thinking, participatory learning, problem-solving, and the development of lifelong communication skills. However, it is yet unclear how mobile devices may affect education and how they may affect opportunities for learning. As a result, the purpose of this research was to ascertain the relationship between mobile phone usage and the academic Performance of secondary-level students at an international school in Sri Lanka. The study's sample consisted of 523 secondary-level students from an international school, ranging from Form 1 to Upper 6. For the study, a survey research design and questionnaires were used. Google Forms was used to create the students' survey. There were three hypotheses tested to find out the relationship between mobile phone usage and academic preference. The findings show that there is a positive relationship between mobile phone usage and academic performance among secondary school students (the number of students obtaining simple passes is significantly higher when mobile phones are being used for more than 7 hours), no relationship between mobile phone usage and academic performance among secondary school students of different parents' occupations, and a relationship between the frequency of mobile phone usage and academic performance among secondary school students.

Keywords: mobile phone, academic performance, secondary level, international schools

Procedia PDF Downloads 78
1113 Development of Internet of Things (IoT) with Mobile Voice Picking and Cargo Tracing Systems in Warehouse Operations of Third-Party Logistics

Authors: Eugene Y. C. Wong

Abstract:

The increased market competition, customer expectation, and warehouse operating cost in third-party logistics have motivated the continuous exploration in improving operation efficiency in warehouse logistics. Cargo tracing in ordering picking process consumes excessive time for warehouse operators when handling enormous quantities of goods flowing through the warehouse each day. Internet of Things (IoT) with mobile cargo tracing apps and database management systems are developed this research to facilitate and reduce the cargo tracing time in order picking process of a third-party logistics firm. An operation review is carried out in the firm with opportunities for improvement being identified, including inaccurate inventory record in warehouse management system, excessive tracing time on stored products, and product misdelivery. The facility layout has been improved by modifying the designated locations of various types of products. The relationship among the pick and pack processing time, cargo tracing time, delivery accuracy, inventory turnover, and inventory count operation time in the warehouse are evaluated. The correlation of the factors affecting the overall cycle time is analysed. A mobile app is developed with the use of MIT App Inventor and the Access management database to facilitate cargo tracking anytime anywhere. The information flow framework from warehouse database system to cloud computing document-sharing, and further to the mobile app device is developed. The improved performance on cargo tracing in the order processing cycle time of warehouse operators have been collected and evaluated. The developed mobile voice picking and tracking systems brings significant benefit to the third-party logistics firm, including eliminating unnecessary cargo tracing time in order picking process and reducing warehouse operators overtime cost. The mobile tracking device is further planned to enhance the picking time and cycle count of warehouse operators with voice picking system in the developed mobile apps as future development.

Keywords: warehouse, order picking process, cargo tracing, mobile app, third-party logistics

Procedia PDF Downloads 367
1112 Innovation of e-Learning for Architectural Design Courses at the University of Jordan

Authors: Samer Abu Ghazaleh, Jawdat Gousous

Abstract:

E-learning in general started in Jordan around ten years ago in universities and at different departments and colleges. This paper will investigate the possibility to apply e-learning in architecture department at University of Jordan. As known architecture departments in general depend greatly in its syllabus upon design courses and studios, which consists nearly one third of its total credit hours. A survey has been conducted for architectural students at the University of Jordan and several conclusions have been reached irrespective of age, gender and nationality of the students, where the main problem was the way of the communication between the tutor and the student.

Keywords: cellular telephone, design courses, e-learning, internet

Procedia PDF Downloads 465
1111 Child Homicide Victimization and Community Context: A Research Note

Authors: Bohsiu Wu

Abstract:

Among serious crimes, child homicide is a rather rare event. However, the killing of children stirs up a special type of emotion in society that pales other criminal acts. This study examines the relevancy of three possible community-level explanations for child homicide: social deprivation, female empowerment, and social isolation. The social deprivation hypothesis posits that child homicide results from lack of resources in communities. The female empowerment hypothesis argues that a higher female status translates into a higher level of capability to prevent child homicide. Finally, the social isolation hypothesis regards child homicide as a result of lack of social connectivity. Child homicide data, aggregated by US postal ZIP codes in California from 1990 to 1999, were analyzed with a negative binomial regression. The results of the negative binomial analysis demonstrate that social deprivation is the most salient and consistent predictor among all other factors in explaining child homicide victimization at the ZIP-code level. Both social isolation and female labor force participation are weak predictors of child homicide victimization across communities. Further, results from the negative binomial regression show that it is the communities with a higher, not lower, degree of female labor force participation that are associated with a higher count of child homicide. It is possible that poor communities with a higher level of female employment have a lesser capacity to provide the necessary care and protection for the children. Policies aiming at reducing social deprivation and strengthening female empowerment possess the potential to reduce child homicide in the community.

Keywords: child homicide, deprivation, empowerment, isolation

Procedia PDF Downloads 188
1110 Counselor and Object of Hate: A Case Study of Latina Clinician and Two White Supremacist Patients

Authors: Reagan Rodriguez

Abstract:

The following research is a case study of two white patients with white extremist values and their Latina Clinician. Researchers suggest that white supremacy as an ideology has been documented in the United States since the early 1800s. Ethnicity and race were growing key factors linked to central motives behind hate crimes in U.S., which may suggest that we are living in another wave of white supremacist and domestic terrorism that seek to eradicate a threatening and dangerous “other”. This research seeks to address and contribute a qualitative perspective to white supremacist ideology within a bio-psycho-social framework. The current research seeks to contribute to address the gap in literature on ethnic minority clinicians and white patients with racist ideology. The research also seeks to examine the themes not commonly found in racially matched and gendered matched therapeutic dyads where patients hold white extremist values. This case study examines white supremacist ideology from a psychodynamic perspective, examining themes such as “feeling forgotten”, reduced empathy related to “broken promises”, sexualization of the passing minority counselor, and utilizing minimal autonomy in verbal and non-verbal signals. A thematic analysis of case notes and quotes are used to further contextualize emerging therapeutic themes and the psychodynamic analysis of the manifestation of white supremacist actions ranging from active to passive forms of violence.

Keywords: case study, extremism, race and gender, white supremacist ideology

Procedia PDF Downloads 143
1109 The Impact of Bitcoin and Cryptocurrency on the Development of Community

Authors: Felib Ayman Shawky Salem

Abstract:

Nowadays crypto currency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The crypto currency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin crypto currency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage.

Keywords: cryptocurrency, bitcoin, payment methods, blockchain, appropriation, online retailers, TOE framework, disappropriation, non-appropriationBitCoin, financial protection, crypto currency, money laundering cryptocurrency, digital wallet, digital forensics

Procedia PDF Downloads 28
1108 Criminal Responsibility of Minors in Russia: The Age of Liability and Penalties

Authors: Natalia Selezneva

Abstract:

The level of crime depends on a number of factors, such as political and economic instability, social inequality and ineffective legislation. A special place in the overall level of crime takes juvenile delinquency. United Nations Standard Minimum developed rules for the administration of juvenile justice (The Beijing Rules), in order to ensure the rights of juvenile offenders under the various legal systems. Most countries support these recommendations, and Russia is no exception. Russia's criminal code establishes the minimum age of criminal liability; types of crimes for which the possible involvement of minors to justice; punishment; sentencing and execution of punishment for minors. However, these provisions cause heated debates in the scientific literature. The high level of juvenile crime indicates the ineffectiveness of legal regulation of criminal liability of minors. In order to ensure compliance with international standards require new and modern approaches to improve national legislation and practice of its application. Achieving this goal will be achieved through the following tasks: 1. Create sub-branches of law regulating the legal status of minors; 2. Improving the types of penalties; 3. The possibility of using alternative measures; 4. The introduction of the procedure of extrajudicial settlement of the conflict. The criminal law of each country depends on the historical, national and cultural characteristics. The development of the Russian legislation taking into account international experience is extremely essential and will be a new stage in the formation of a legal state, especially in the sphere of protection of the rights of juvenile offenders.

Keywords: criminal law, juvenile offender, punishment, the age of criminal responsibility

Procedia PDF Downloads 527
1107 Using Implicit Data to Improve E-Learning Systems

Authors: Slah Alsaleh

Abstract:

In the recent years and with popularity of internet and technology, e-learning became a major part of majority of education systems. One of the advantages the e-learning systems provide is the large amount of information available about the students' behavior while communicating with the e-learning system. Such information is very rich and it can be used to improve the capability and efficiency of e-learning systems. This paper discusses how e-learning can benefit from implicit data in different ways including; creating homogeneous groups of student, evaluating students' learning, creating behavior profiles for students and identifying the students through their behaviors.

Keywords: e-learning, implicit data, user behavior, data mining

Procedia PDF Downloads 303
1106 DNA as an Instrument in Constructing Narratives and Justice in Criminal Investigations: A Socio-Epistemological Exploration

Authors: Aadita Chaudhury

Abstract:

Since at least the early 2000s, DNA profiling has achieved a preeminent status in forensic investigations into criminal acts. While the criminal justice system has a long history of using forensic evidence and testing them through establish technoscientific means, the primacy of DNA in establishing 'truth' or reconstructing a series of events is unparalleled in the history of forensic science. This paper seeks to elucidate the ways in which DNA profiling has become the most authoritative instrument of 'truth' in criminal investigations, and how it is used in the legal process to ascertain culpability, create the notion of infallible evidence, and advance the search for justice. It is argued that DNA profiling has created a paradigm shift in how the legal system and the general public understands crime and culpability, but not without limitations. There are indications that even trace amounts of DNA evidence can point to causal links in a criminal investigation, however, there still remains many rooms to create confusion and doubt from empirical evidence within the narrative of crimes. Many of the shortcomings of DNA-based forensic investigations are explored and evaluated with regards to claims of the authority of biological evidence and implications for the public understanding of the elusive concepts of truth and justice in the present era. Public misinformation about the forensic analysis processes could produce doubt or faith in the judgements rooted in them, depending on other variables presented at the trial. A positivist understanding of forensic science that is shared by the majority of the population does not take into consideration that DNA evidence is far from definitive, and can be used to support any theories of culpability, to create doubt and to deflect blame.

Keywords: DNA profiling, epistemology of forensic science, philosophy of forensic science, sociology of scientific knowledge

Procedia PDF Downloads 200
1105 Data, Digital Identity and Antitrust Law: An Exploratory Study of Facebook’s Novi Digital Wallet

Authors: Wanjiku Karanja

Abstract:

Facebook has monopoly power in the social networking market. It has grown and entrenched its monopoly power through the capture of its users’ data value chains. However, antitrust law’s consumer welfare roots have prevented it from effectively addressing the role of data capture in Facebook’s market dominance. These regulatory blind spots are augmented in Facebook’s proposed Diem cryptocurrency project and its Novi Digital wallet. Novi, which is Diem’s digital identity component, shall enable Facebook to collect an unprecedented volume of consumer data. Consequently, Novi has seismic implications on internet identity as the network effects of Facebook’s large user base could establish it as the de facto internet identity layer. Moreover, the large tracts of data Facebook shall collect through Novi shall further entrench Facebook's market power. As such, the attendant lock-in effects of this project shall be very difficult to reverse. Urgent regulatory action is therefore required to prevent this expansion of Facebook’s data resources and monopoly power. This research thus highlights the importance of data capture to competition and market health in the social networking industry. It utilizes interviews with key experts to empirically interrogate the impact of Facebook’s data capture and control of its users’ data value chains on its market power. This inquiry is contextualized against Novi’s expansive effect on Facebook’s data value chains. It thus addresses the novel antitrust issues arising at the nexus of Facebook’s monopoly power and the privacy of its users’ data. It also explores the impact of platform design principles, specifically data portability and data portability, in mitigating Facebook’s anti-competitive practices. As such, this study finds that Facebook is a powerful monopoly that dominates the social media industry to the detriment of potential competitors. Facebook derives its power from its size, annexure of the consumer data value chain, and control of its users’ social graphs. Additionally, the platform design principles of data interoperability and data portability are not a panacea to restoring competition in the social networking market. Their success depends on the establishment of robust technical standards and regulatory frameworks.

Keywords: antitrust law, data protection law, data portability, data interoperability, digital identity, Facebook

Procedia PDF Downloads 117
1104 Entrepreneurship under the Effect of Information Technology

Authors: Mohammad Hadi Khorashadi Zadeh ‎

Abstract:

An entrepreneur is a manager or the owner of the commercial company that creates resources and money by risking and initiative. The Netpreneur is the capability to run an online business. It needs only the Connectivity. An Entrepreneur, as long as he has a service which the market demands can set up a feasible and viable trade with his Intellectual Capital as the principle input and the Connectivity Infrastructure as the only physical input. The internet is possibly the most significant revolution in science and technology that our generation could fantasize or imagine. It has introduced in various benefits to the society, culture, economics and politics. The entrepreneur is a premium member in the community. She/he provides services to the society and community including employment.

Keywords: entrepreneur, Netpreneur, intellectual capital, infrastructure

Procedia PDF Downloads 313
1103 LIS Students’ Experience of Online Learning During Covid-19

Authors: Larasati Zuhro, Ida F Priyanto

Abstract:

Background: In March 2020, Indonesia started to be affected by Covid-19, and the number of victims increased slowly but surely until finally, the highest number of victims reached the highest—about 50,000 persons—for the daily cases in the middle of 2021. Like other institutions, schools and universities were suddenly closed in March 2020, and students had to change their ways of studying from face-to-face to online. This sudden changed affected students and faculty, including LIS students and faculty because they never experienced online classes in Indonesia due to the previous regulation that academic and school activities were all conducted onsite. For almost two years, school and academic activities were held online. This indeed has affected the way students learned and faculty delivered their courses. This raises the question of whether students are now ready for their new learning activities due to the covid-19 disruption. Objectives: this study was conducted to find out the impact of covid-19 pandemic on the LIS learning process and the effectiveness of online classes for students of LIS in Indonesia. Methodology: This was qualitative research conducted among LIS students at UIN Sunan Kalijaga, Yogyakarta, Indonesia. The population are students who were studying for masters’program during covid-19 pandemic. Results: The study showed that students were ready with the online classes because they are familiar with the technology. However, the Internet and technology infrastructure do not always support the process of learning. Students mention slow WIFI is one factor that causes them not being able to study optimally. They usually compensate themselves by visiting a public library, a café, or any other places to get WIFI network. Noises come from the people surrounding them while they are studying online.Some students could not concentrate well when attending the online classes as they studied at home, and their families sometimes talk to other family members, or they asked the students while they are attending the online classes. The noise also came when they studied in a café. Another issue is that the classes were held in shorter time than that in the face-to-face. Students said they still enjoyed the onsite classes instead of online, although they do not mind to have hybrid model of learning. Conclusion: Pandemic of Covid-19 has changed the way students of LIS in Indonesia learn. They have experienced a process of migrating the way they learn from onsite to online. They also adapted their learning with the condition of internet access speed, infrastructure, and the environment. They expect to have hybrid classes in the future.

Keywords: learning, LIS students, pandemic, covid-19

Procedia PDF Downloads 123
1102 Learners' Perception of Digitalization of Medical Education in a Low Middle-Income Country – A Case Study of the Lecturio Platform

Authors: Naomi Nathan

Abstract:

Introduction Digitalization of medical education can revolutionize how medical students learn and interact with the medical curriculum across contexts. With the increasing availability of the internet and mobile connectivity in LMICs, online medical education platforms and digital learning tools are becoming more widely available, providing new opportunities for learners to access high-quality medical education and training. However, the adoption and integration of digital technologies in medical education in LMICs is a complex process influenced by various factors, including learners' perceptions and attitudes toward digital learning. In Ethiopia, the adoption of digital platforms for medical education has been slow, with traditional face-to-face teaching methods still being the norm. However, as access to technology improves and more universities adopt digital platforms, it is crucial to understand how medical students perceive this shift. Methodology This study investigated medical students' perception of the digitalization of medical education in relation to their access to the Lecturio Digital Medical Education Platform through a capacity-building project. 740 medical students from over 20 medical universities participated in the study. The students were surveyed using a questionnaire that included their attitudes toward the digitalization of medical education, their frequency of use of the digital platform, and their perceived benefits and challenges. Results The study results showed that most medical students had a positive attitude toward digitalizing medical education. The most commonly cited benefit was the convenience and flexibility of accessing course material/curriculum online. Many students also reported that they found the platform more interactive and engaging, leading to a more meaningful learning experience. The study also identified several challenges medical students faced when using the platform. The most commonly reported challenge was the need for more reliable internet access, which made it difficult for students to access content consistently. Overall, the results of this study suggest that medical students in Ethiopia have a positive perception of the digitalization of medical education. Over 97% of students continuously expressed a need for access to the Lecturio platform throughout their studies. Conclusion Significant challenges still need to be addressed to fully realize the Lecturio digital platform's benefits. Universities, relevant ministries, and various stakeholders must work together to address these challenges to ensure that medical students fully participate in and benefit from digitalized medical education - sustainably and effectively.

Keywords: digital medical education, EdTech, LMICs, e-learning

Procedia PDF Downloads 85
1101 Application of Social Media for Promoting Library and Information Services: A Case Study of Library Science Professionals of India

Authors: Payel Saha

Abstract:

Social media is playing an important role for dissemination of information in society. In 21st century most people have a smart phone and used different social media tools like Facebook, Twitter, Instagram, WhatsApp, Skype etc. in day to day life. It is rapidly growing web-based tool for everyone to share thoughts, ideas and knowledge globally using internet. The study highlights the current use of social media tools for promoting library and information services of Library and Information Professionals of India, which are working in Library. The study was conducted during November, 2017. A structured questionnaire was prepared using google docs and shared using different mailing list, sent to individual email IDs and sharing with other social media tools. Only 90 responses received from the different states of India and analyzed via MS-Excel. The data receive from 17 states and 3 union territories of India; however most of the respondents has come from the states Odisha 23, Himachal Pradesh 14 and Assam 10. The results revealed that out 90 respondents 37 Female and 53 male categories and also majority of respondents 71 have come from academic library followed by special library 15, Public library 3 and corporate library 1 respondent. The study indicates that, out of 90 respondent’s majority of 53 of respondents said that their Library have a social media account while 39 of respondents have not their Library social media account. The study also inform that Facebook, YouTube, Google+, LinkedIn, Twitter and Instagram are using by the LIS professional of India and Facebook 86 was popular social media tool among the other social media tools. Furthermore, respondent reported that they are using social media tools for sharing photos of events and programs of library 72, followed by tips for using different services 64, posting of new arrivals 56, tutorials of database 35 and send brief updates to patrons 32, announcement of library holidays 22. It was also reported by respondents that they are sharing information about scholarships training programs and marketing of library events etc. The study furthermore identify that lack of time is the major problem while using social media with 53 of respondents followed by low speed of internet 35, too many social media tools to learn 17 and some 3 respondents reported that there is no problem while using social media tools. The results also revealed that, majority of the respondents reported that they are using social media tools in daily basis 71 followed by weekly basis 16. It was followed by monthly 1 respondent and other 2 of the respondents. In summary, this study is expected to be useful in further promoting the social media for dissemination of library and information services to the general public.

Keywords: application of social media, India, promoting library services, library professionals

Procedia PDF Downloads 154
1100 International Humanitarian Law and the Challenges of New Technologies of Warfare

Authors: Uche A. Nnawulezi

Abstract:

Undoubtedly, despite all efforts made to achieve overall peace through the application of the principles of international humanitarian law, crimes against mankind which are of unprecedented concern to the whole world have remained unabated. The fall back on war as a technique for settling disputes between nations, individuals, countries and ethnic groups with accompanying toll of deaths and destruction of properties have remained a conspicuous component of human history. Indeed, to control this conduct of warfare and the dehumanization of individuals, a body of law aimed at regulating the impacts of conflicts and hostilities in the theater of war has become necessary. Thus, it is to examine the conditions in which international humanitarian law will apply and also to determine the extent of the challenges of new progressions of warfare that this study is undertaken. All through this examination, we grasped doctrinal approach wherein we used text books, journals, international materials and supposition of law specialists in the field of international humanitarian law. This paper shall examine the distinctive factors responsible for the rebelliousness to the rules of International Humanitarian Law and furthermore, shall proffer possible courses of action that will address the challenges of new technologies of warfare all over the world. Essentially, the basic proposals made in this paper if totally utilized may go far in ensuring a sufficient standard in the application of the rules of international humanitarian law as it relates to an increasingly frequent phenomenon of contemporary developments in technologies of warfare which has in recent past, made it more difficult for the most ideal application of the rules of international humanitarian law. This paper deduces that for a sustainable global peace to be achieved, the rules of International Humanitarian Law as it relates to the utilization of new technologies of warfare should be completely clung to and should be made a strict liability offense. Likewise, this paper further recommends the introduction of domestic criminal law punishment of serious contraventions of the rules of international humanitarian law.

Keywords: international, humanitarian law, new technologies, warfare

Procedia PDF Downloads 291
1099 Internet-Of-Things and Ergonomics, Increasing Productivity and Reducing Waste: A Case Study

Authors: V. Jaime Contreras, S. Iliana Nunez, S. Mario Sanchez

Abstract:

Inside a manufacturing facility, we can find innumerable automatic and manual operations, all of which are relevant to the production process. Some of these processes add more value to the products more than others. Manual operations tend to add value to the product since they can be found in the final assembly area o final operations of the process. In this areas, where a mistake or accident can increase the cost of waste exponentially. To reduce or mitigate these costly mistakes, one approach is to rely on automation to eliminate the operator from the production line - requires a hefty investment and development of specialized machinery. In our approach, the center of the solution is the operator through sufficient and adequate instrumentation, real-time reporting and ergonomics. Efficiency and reduced cycle time can be achieved thorough the integration of Internet-of-Things (IoT) ready technologies into assembly operations to enhance the ergonomics of the workstations. Augmented reality visual aids, RFID triggered personalized workstation dimensions and real-time data transfer and reporting can help achieve these goals. In this case study, a standard work cell will be used for real-life data acquisition and a simulation software to extend the data points beyond the test cycle. Three comparison scenarios will run in the work cell. Each scenario will introduce a dimension of the ergonomics to measure its impact independently. Furthermore, the separate test will determine the limitations of the technology and provide a reference for operating costs and investment required. With the ability, to monitor costs, productivity, cycle time and scrap/waste in real-time the ROI (return on investment) can be determined at the different levels to integration. This case study will help to show that ergonomics in the assembly lines can make significant impact when IoT technologies are introduced. Ergonomics can effectively reduce waste and increase productivity with minimal investment if compared with setting up to custom machine.

Keywords: augmented reality visual aids, ergonomics, real-time data acquisition and reporting, RFID triggered workstation dimensions

Procedia PDF Downloads 211
1098 Enhancing Cloud Computing with Security Trust Model

Authors: John Ayoade

Abstract:

Cloud computing is a model that enables the delivery of on-demand computing resources such as networks, servers, storage, applications and services over the internet. Cloud Computing is a relatively growing concept that presents a good number of benefits for its users; however, it also raises some security challenges which may slow down its use. In this paper, we identify some of those security issues that can serve as barriers to realizing the full benefits that cloud computing can bring. One of the key security problems is security trust. A security trust model is proposed that can enhance the confidence that users need to fully trust the use of public and mobile cloud computing and maximize the potential benefits that they offer.

Keywords: cloud computing, trust, security, certificate authority, PKI

Procedia PDF Downloads 477
1097 Biomedical Definition Extraction Using Machine Learning with Synonymous Feature

Authors: Jian Qu, Akira Shimazu

Abstract:

OOV (Out Of Vocabulary) terms are terms that cannot be found in many dictionaries. Although it is possible to translate such OOV terms, the translations do not provide any real information for a user. We present an OOV term definition extraction method by using information available from the Internet. We use features such as occurrence of the synonyms and location distances. We apply machine learning method to find the correct definitions for OOV terms. We tested our method on both biomedical type and name type OOV terms, our work outperforms existing work with an accuracy of 86.5%.

Keywords: information retrieval, definition retrieval, OOV (out of vocabulary), biomedical information retrieval

Procedia PDF Downloads 484
1096 Web-Based Tools to Increase Public Understanding of Nuclear Technology and Food Irradiation

Authors: Denise Levy, Anna Lucia C. H. Villavicencio

Abstract:

Food irradiation is a processing and preservation technique to eliminate insects and parasites and reduce disease-causing microorganisms. Moreover, the process helps to inhibit sprouting and delay ripening, extending fresh fruits and vegetables shelf-life. Nevertheless, most Brazilian consumers seem to misunderstand the difference between irradiated food and radioactive food and the general public has major concerns about the negative health effects and environmental contamination. Society´s judgment and decision making are directly linked to perceived benefits and risks. The web-based project entitled ‘Scientific information about food irradiation: Internet as a tool to approach science and society’ was created by the Nuclear and Energetic Research Institute (IPEN), in order to offer an interdisciplinary approach to science education, integrating economic, ethical, social and political aspects of food irradiation. This project takes into account that, misinformation and unfounded preconceived ideas impact heavily on the acceptance of irradiated food and purchase intention by the Brazilian consumer. Taking advantage of the potential value of the Internet to enhance communication and education among general public, a research study was carried out regarding the possibilities and trends of Information and Communication Technologies among the Brazilian population. The content includes concepts, definitions and Frequently Asked Questions (FAQ) about processes, safety, advantages, limitations and the possibilities of food irradiation, including health issues, as well as its impacts on the environment. The project counts on eight self-instructional interactive web courses, situating scientific content in relevant social contexts in order to encourage self-learning and further reflections. Communication is a must to improve public understanding of science. The use of information technology for quality scientific divulgation shall contribute greatly to provide information throughout the country, spreading information to as many people as possible, minimizing geographic distances and stimulating communication and development.

Keywords: food irradiation, multimedia learning tools, nuclear science, society and education

Procedia PDF Downloads 244
1095 Experiential Learning in an Earthquake Engineering Course Using Online Tools and Shake Table Exercises

Authors: Andres Winston Oreta

Abstract:

Experiential Learning (ELE) is a strategy for enhancing the teaching and learning of courses especially in civil engineering. This paper presents the adaption of the ELE framework in the delivery of various course requirements in an earthquake engineering course. Examples of how ELE is integrated using online tools and hands-on laboratory technology to address the course learning outcomes on earthquake engineering are presented. Student feedback shows that ELE using online tools and technology strengthens students’ understanding and intuition of seismic design and earthquake engineering concepts.

Keywords: earthquake engineering, experiential learning, shake table, online, internet, civil engineering

Procedia PDF Downloads 13
1094 The Colombian Special Jurisdiction for Peace, a Transitional Justice Mechanism That Prioritizes Reconciliation over Punishment: A Content Analysis of the Colombian Peace Agreement

Authors: Laura Mendez

Abstract:

Tribunals for the prosecution of crimes against humanity have been implemented in recent history via international intervention or imposed by one side of the conflict, as in the cases of Rwanda, Iraq, Argentina, and Chile. However, the creation of a criminal tribunal as the result of a peace agreement between formerly warring parties has been unique to the Colombian peace process. As such, the Colombian Jurisdiction for Peace (SJP), or JEP for its Spanish acronym, is viewed as a site of social contestation where actors shape its design and implementation. This study contributes to the literature of transitional justice by analyzing how the framing of the creation of the Colombian tribunal reveals the parties' interests. The analysis frames the interests of the power-brokers, i.e., the government and the Revolutionary Armed Forces of Colombia (FARC), and the victims in light of the tribunal’s functions. The purpose of this analysis is to understand how the interests of the parties are embedded in the designing of the SJP. This paper argues that the creation of the SJP rests on restorative justice, for which the victim, not the perpetrator, is at the center of prosecution. The SJP’s approach to justice moves from prosecution as punishment to prosecution as sanctions. SJP’s alternative sanctions focused on truth, reparation, and restoration are designed to humanize both the victim and the perpetrator in order to achieve reconciliation. The findings also show that requiring the perpetrator to perform labor to repair the victim as an alternative form of sanction aims to foster relations of reintegration and social learning between victims and perpetrators.

Keywords: transitional justice mechanisms, criminal tribunals, Colombia, Colombian Jurisdiction for Peace, JEP

Procedia PDF Downloads 111
1093 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 496
1092 Is There a Group of "Digital Natives" at Secondary Schools?

Authors: L. Janská, J. Kubrický

Abstract:

The article describes a research focused on the influence of the information and communication technology (ICT) on the pupils' learning. The investigation deals with the influences that distinguish between the group of pupils influenced by ICT and the group of pupils not influenced by ICT. The group influenced by ICT should evince a different approach in number of areas (in managing of two and more activities at once, in a quick orientation and searching for information on the Internet, in an ability to quickly and effectively assess the data sources, in the assessment of attitudes and opinions of the other users of the network, in critical thinking, in the preference to work in teams, in the sharing of information and personal data via the virtual social networking, in insisting on the immediate reaction on their every action etc.).

Keywords: ICT influence, digital natives, pupil´s learning

Procedia PDF Downloads 287
1091 AIR SAFE: an Internet of Things System for Air Quality Management Leveraging Artificial Intelligence Algorithms

Authors: Mariangela Viviani, Daniele Germano, Simone Colace, Agostino Forestiero, Giuseppe Papuzzo, Sara Laurita

Abstract:

Nowadays, people spend most of their time in closed environments, in offices, or at home. Therefore, secure and highly livable environmental conditions are needed to reduce the probability of aerial viruses spreading. Also, to lower the human impact on the planet, it is important to reduce energy consumption. Heating, Ventilation, and Air Conditioning (HVAC) systems account for the major part of energy consumption in buildings [1]. Devising systems to control and regulate the airflow is, therefore, essential for energy efficiency. Moreover, an optimal setting for thermal comfort and air quality is essential for people’s well-being, at home or in offices, and increases productivity. Thanks to the features of Artificial Intelligence (AI) tools and techniques, it is possible to design innovative systems with: (i) Improved monitoring and prediction accuracy; (ii) Enhanced decision-making and mitigation strategies; (iii) Real-time air quality information; (iv) Increased efficiency in data analysis and processing; (v) Advanced early warning systems for air pollution events; (vi) Automated and cost-effective m onitoring network; and (vii) A better understanding of air quality patterns and trends. We propose AIR SAFE, an IoT-based infrastructure designed to optimize air quality and thermal comfort in indoor environments leveraging AI tools. AIR SAFE employs a network of smart sensors collecting indoor and outdoor data to be analyzed in order to take any corrective measures to ensure the occupants’ wellness. The data are analyzed through AI algorithms able to predict the future levels of temperature, relative humidity, and CO₂ concentration [2]. Based on these predictions, AIR SAFE takes actions, such as opening/closing the window or the air conditioner, to guarantee a high level of thermal comfort and air quality in the environment. In this contribution, we present the results from the AI algorithm we have implemented on the first s et o f d ata c ollected i n a real environment. The results were compared with other models from the literature to validate our approach.

Keywords: air quality, internet of things, artificial intelligence, smart home

Procedia PDF Downloads 86
1090 The Design of Intelligent Classroom Management System with Raspberry PI

Authors: Sathapath Kilaso

Abstract:

Attendance checking in the classroom for student is object to record the student’s attendance in order to support the learning activities in the classroom. Despite the teaching trend in the 21st century is the student-center learning and the lecturer duty is to mentor and give an advice, the classroom learning is still important in order to let the student interact with the classmate and the lecturer or for a specific subject which the in-class learning is needed. The development of the system prototype by applied the microcontroller technology and embedded system with the “internet of thing” trend and the web socket technique will allow the lecturer to be alerted immediately whenever the data is updated.

Keywords: arduino, embedded system, classroom, raspberry PI

Procedia PDF Downloads 369