Search results for: Internet of Thing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1826

Search results for: Internet of Thing

1016 Interoperable Platform for Internet of Things at Home Applications

Authors: Fabiano Amorim Vaz, Camila Gonzaga de Araujo

Abstract:

With the growing number of personal devices such as smartphones, tablets, smart watches, among others, in addition to recent devices designed for IoT, it is observed that residential environment has potential to generate important information about our daily lives. Therefore, this work is focused on showing and evaluating a system that integrates all these technologies considering the context of a smart house. To achieve this, we define an architecture capable of supporting the amount of data generated and consumed at a residence and, mainly, the variety of this data presents. We organize it in a particular cloud containing information about robots, recreational vehicles, weather, in addition to data from the house, such as lighting, energy, security, among others. The proposed architecture can be extrapolated to various scenarios and applications. Through the core of this work, we can define new functionality for residences integrating them with more resources.

Keywords: cloud computing, IoT, robotics, smart house

Procedia PDF Downloads 381
1015 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 455
1014 Analyzing Keyword Networks for the Identification of Correlated Research Topics

Authors: Thiago M. R. Dias, Patrícia M. Dias, Gray F. Moita

Abstract:

The production and publication of scientific works have increased significantly in the last years, being the Internet the main factor of access and distribution of these works. Faced with this, there is a growing interest in understanding how scientific research has evolved, in order to explore this knowledge to encourage research groups to become more productive. Therefore, the objective of this work is to explore repositories containing data from scientific publications and to characterize keyword networks of these publications, in order to identify the most relevant keywords, and to highlight those that have the greatest impact on the network. To do this, each article in the study repository has its keywords extracted and in this way the network is  characterized, after which several metrics for social network analysis are applied for the identification of the highlighted keywords.

Keywords: bibliometrics, data analysis, extraction and data integration, scientometrics

Procedia PDF Downloads 257
1013 Internet of Things Based Process Model for Smart Parking System

Authors: Amjaad Alsalamah, Liyakathunsia Syed

Abstract:

Transportation is an essential need for many people to go to their work, school, and home. In particular, the main common method inside many cities is to drive the car. Driving a car can be an easy job to reach the destination and load all stuff in a reasonable time. However, deciding to find a parking lot for a car can take a long time using the traditional system that can issue a paper ticket for each customer. The old system cannot guarantee a parking lot for all customers. Also, payment methods are not always available, and many customers struggled to find their car among a numerous number of cars. As a result, this research focuses on providing an online smart parking system in order to save time and budget. This system provides a flexible management system for both parking owner and customers by receiving all request via the online system and it gets an accurate result for all available parking and its location.

Keywords: smart parking system, IoT, tracking system, process model, cost, time

Procedia PDF Downloads 336
1012 Examining Cyber Crime and Its Impacts on E-Banking in Nigeria

Authors: Auwal Nata'ala

Abstract:

The Information and Communication Technology (ICT) has had impacts in almost every area human endeavor. From business, industries, banks to none profit organizations. ICT has simplified business process such as sorting, summarizing, coding, updating and generating a report in a real-time processing mode. However, the use of these ICT facilities such as computer and internet has also brought unintended consequences of criminal activities such as spamming, credit card frauds, ATM frauds, phishing, identity theft, denial of services and other related cyber crimes. This study sought to examined cyber-crime and its impact on the banking institution in Nigeria. It also examined the existing policy framework and assessed the success of the institutional countermeasures in combating cyber crime in the banking industry. This paper X-ray’s cyber crimes, policies issues and provides insight from a Nigeria perspective.

Keywords: cyber crimes, e-banking, policies, ICT

Procedia PDF Downloads 407
1011 Experimental Investigation on the Role of Thermoacoustics on Soot Formation

Authors: Sambit Supriya Dash, Rahul Ravi R, Vikram Ramanan, Vinayak Malhotra

Abstract:

Combustion in itself is a complex phenomenon that involves the interaction and interplay of multiple phenomena, the combined effect of which gives rise to the common flame that we see and use in our daily life applications from cooking to propelling our vehicles to space. The most important thing that goes unnoticed about these flames is the effect of the various phenomena from its surrounding environment that affects its behavior and properties. These phenomena cause a variety of energy interactions that lead to various types of energy transformations which in turn affect the flame behavior. This paper focuses on experimentally investigating the effect of one such phenomenon, which is the acoustics or sound energy on diffusion flames. The subject in itself is extensively studied upon as thermo-acoustics globally, whereas the current work focuses on studying its effect on soot formation on diffusion flames. The said effect is studied in this research work by the use of a butane as fuel, fitted with a nozzle that houses 3 arrays consisting of 4 holes each that are placed equidistant to each other and the resulting flame impinged with sound from two independent and similar sound sources that are placed equidistant from the centre of the flame. The entire process is systematically video graphed using a 60 fps regular CCD and analysed for variation in flame heights and flickering frequencies where the fuel mass flow rate is maintained constant and the configuration of entrainment holes and frequency of sound are varied, whilst maintaining constant ambient atmospheric conditions. The current work establishes significant outcomes on the effect of acoustics on soot formation; it is noteworthy that soot formation is the main cause of pollution and a major cause of inefficiency of current propulsion systems. This work is one of its kinds, and its outcomes are widely applicable to commercial and domestic appliances that utilize combustion for energy generation or propulsion and help us understand them better, so that we can increase their efficiency and decrease pollution.

Keywords: thermoacoustics, entrainment, propulsion system, efficiency, pollution

Procedia PDF Downloads 161
1010 Development of a Web Exploration Support System Focusing on Accumulation of Search Contexts

Authors: T. Yamazaki, R. Onuma, H. Kaminaga, Y. Miyadera, S. Nakamura

Abstract:

Web exploration has increasingly diversified in accordance with the development of browsing environments on the Internet. Moreover, advanced exploration often conducted in intellectual activities such as surveys in research activities. This kind of exploration is conducted for a long period with trials and errors. In such a case, it is extremely important for a user to accumulate the search contexts and understand them. However, existing support systems were not effective enough since most systems could not handle the various factors involved in the exploration. This research aims to develop a novel system to support web exploration focusing on the accumulation of the search contexts. This paper mainly describes the outline of the system. An experiment using the system is also described. Finally, features of the system are discussed based on the results.

Keywords: web exploration context, refinement of search intention, accumulation of context, exploration support, information visualization

Procedia PDF Downloads 309
1009 Ads on Social Issues: A Tool for Improving Critical Thinking Skills in a Foreign Language Classroom

Authors: Fonseca Jully, Chia Maribel, Rodríguez Ilba

Abstract:

This paper is a qualitative research report. A group of students form a public university in a small town in Colombia participated in this study which aimed at describing to what extend the use of social ads, published on the internet, helped to develop their critical thinking skills. Students’ productions, field notes, video recordings and direct observation were the instruments and techniques used by the researches in order to gather the data which was analyzed under the principles of grounded theory and triangulation. The implementation of social ads into the classroom evidenced a noticeable improvement in students’ ability to interpret and argue social issues, as well as, their self-improvement in oral and written production in English, as a foreign language.

Keywords: Ads, critical argumentation, critical thinking, social issues

Procedia PDF Downloads 339
1008 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 451
1007 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 330
1006 Development of a Real Time Axial Force Measurement System and IoT-Based Monitoring for Smart Bearing

Authors: Hassam Ahmed, Yuanzhi Liu, Yassine Selami, Wei Tao, Hui Zhao

Abstract:

The purpose of this research is to develop a real time axial force measurement system for a smart bearing through the use of strain-gauges, whereby the data acquisition is performed by an Arduino microcontroller due to its easy manipulation and low-cost. The measured signal is acquired and then discretized using a Wheatstone Bridge and an Analog-Digital Converter (ADC) respectively. For bearing monitoring, a real time monitoring system based on Internet of things (IoT) and Bluetooth were developed. Experimental tests were performed on a bearing within a force range up to 600 kN. The experimental results show that there is a proportional linear relationship between the applied force and the output voltage, and the error R squared is within 0.9878 based on the regression analysis.

Keywords: bearing, force measurement, IoT, strain gauge

Procedia PDF Downloads 142
1005 Measuring e-Business Activities of SMEs in Yemen

Authors: Ahmed Abdullah, Lyndon Murphy, Brychan Thomas

Abstract:

Increasingly, in developed and developing countries, small and medium-sized enterprises (SMEs) are becoming more important to national economies due to their strategic significance in developing different industrial sectors Worldwide. SMEs play a major role in an economy by significantly contributing to the enhancement of the countries’ gross domestic product and its labor force by creating more job opportunities and developing skilled labor. Rapid development has been witnessed in the World within different aspects of life, especially the technological revolution such as e-business. This has become a feature of this era requiring us to ‘keep-up’ in our daily society, losing the traditional pattern of our daily lives and combining scientific methodology of an analytical and experimental nature. In the past few years the emergence of e-business and e-commerce in the world has been carefully surveyed. There is widespread use of the internet in every aspect and phase of business.

Keywords: e-business, e-business activities, SMEs, e-adoption ladder

Procedia PDF Downloads 530
1004 Economized Sensor Data Processing with Vehicle Platooning

Authors: Henry Hexmoor, Kailash Yelasani

Abstract:

We present vehicular platooning as a special case of crowd-sensing framework where sharing sensory information among a crowd is used for their collective benefit. After offering an abstract policy that governs processes involving a vehicular platoon, we review several common scenarios and components surrounding vehicular platooning. We then present a simulated prototype that illustrates efficiency of road usage and vehicle travel time derived from platooning. We have argued that one of the paramount benefits of platooning that is overlooked elsewhere, is the substantial computational savings (i.e., economizing benefits) in acquisition and processing of sensory data among vehicles sharing the road. The most capable vehicle can share data gathered from its sensors with nearby vehicles grouped into a platoon.

Keywords: cloud network, collaboration, internet of things, social network

Procedia PDF Downloads 194
1003 Multi-Level Meta-Modeling for Enabling Dynamic Subtyping for Industrial Automation

Authors: Zoltan Theisz, Gergely Mezei

Abstract:

Modern industrial automation relies on service oriented concepts of Internet of Things (IoT) device modeling in order to provide a flexible and extendable environment for service meta-repository. However, state-of-the-art meta-modeling techniques prefer design-time modeling, which results in a heavy usage of class sometimes unnecessary static subtyping. Although this approach benefits from clear-cut object-oriented design principles, it also seals the model repository for further dynamic extensions. In this paper, a dynamic multi-level modeling approach is introduced that enables dynamic subtyping through a more relaxed partial instantiation mechanism. The approach is demonstrated on a simple sensor network example.

Keywords: meta-modeling, dynamic subtyping, DMLA, industrial automation, arrowhead

Procedia PDF Downloads 360
1002 Implementation of a Web-Based Wireless ECG Measuring and Recording System

Authors: Onder Yakut, Serdar Solak, Emine Dogru Bolat

Abstract:

Measuring the Electrocardiogram (ECG) signal is an essential process for the diagnosis of the heart diseases. The ECG signal has the information of the degree of how much the heart performs its functions. In medical diagnosis and treatment systems, Decision Support Systems processing the ECG signal are being developed for the use of clinicians while medical examination. In this study, a modular wireless ECG (WECG) measuring and recording system using a single board computer and e-Health sensor platform is developed. In this designed modular system, after the ECG signal is taken from the body surface by the electrodes first, it is filtered and converted to digital form. Then, it is recorded to the health database using Wi-Fi communication technology. The real time access of the ECG data is provided through the internet utilizing the developed web interface.

Keywords: ECG, e-health sensor shield, Raspberry Pi, wiFi technology

Procedia PDF Downloads 401
1001 Innovation of Teaching Methods in Vocational Education with Popularity Development Process

Authors: Hong Zeng

Abstract:

In the process of popularization of higher education, it is necessary to innovate teaching methods in order to make the students cultivated suitable for the needs of social development. This paper discusses the limitations and shortcomings of the traditional teaching method of teaching approach to a person's aptitude, personality, and interest and introduces the new teaching method of teaching approach to a person's personality. The teaching approach to a person's personality is a target teaching method that aims to develop students' potential and cultivate professional talents. Therefore, teachers should be professional and can adopt modern teaching methods from the Internet so that students can clearly understand the course and the knowledge structure. Finally, the students using new teaching methods can enhance their motivation to study and quickly acquire professional skills.

Keywords: higher education, personality, target education, student-centered

Procedia PDF Downloads 119
1000 Comparative Analysis between Thailand and the United States of a Wholesale Exemption for Vertical Restraint Regarding Intellectual Property Licensing

Authors: Sanpetchuda Krutkrua, Suphawatchara Malanond

Abstract:

Competition law is not a new thing in Thailand. Thailand first passed the first competition law during the Second World War in order to stop business operator monopolizing food and basic living supplies. The competition law in Thailand has been amended several times during the past eighty years in order to make it suitable for the current economic and social condition. In 2017, Thailand enacted the current Trade Competition Act of B.E. 2560, which contain several changes to the regime in order to enhance a prevention of collusive practices and monopolization through both vertical restraints and horizontal restraints. Section 56 of the Act provides exemptions for the vertical relationship; i.e., the arrangement in form of complementary relationship, between business operators, franchising agreements between franchisor and franchisee, and licensing agreement between licensor and licensee. The key is that such agreements must not be excessive, create monopolization or attempt to monopolize, or cause any impacts the consumers regarding price, quality, quantity of the goods. The goal of the paper is to explore the extent of the exemption under Section 56 and its sequential regulations regarding vertical trade restraints in the case intellectual property licensing. The research will be conducted in form of a comparative analysis on exemptions for collusive practices under the United States Antitrust law and the Thai Competition Act of B.E. 2560. The United Antitrust law, fairly similar to the Thai Competition Act of B.E. 2561, views the intellectual property licensing to have pro-competitive benefits to the market as long as the intellectual property licensing agreement does not harm the competition amongst the business operators that could have or would have been competitors. The United States Antitrust law identifies the relationship between the parties of the agreement whether such agreement is horizontal or vertical or both. Even though the nature of licensing agreements is primarily vertical, the relationship between licensor and licensees can also be horizontal if they could have been potential competitors in the market as well. The United States Antitrust law frowns upon, if not prohibits, the horizontal restraints regarding the intellectual property licensing but does not impose the same restrictions on the vertical trade restraints regarding intellectual property licensing.

Keywords: antitrust, competition law, vertical restraint, intellectual property, intellectual property licensing, comparative law

Procedia PDF Downloads 165
999 Rethinking Africa's 'Great Runner': Authoritarianism and Development in Post-Cold War Ethiopia

Authors: Frew Yirgalem Mane

Abstract:

This study has examined Africa’s experiment with authoritarian model of development drawing from the experience of Ethiopia. With the tectonic crisis of neoliberal ideology, the dominant policy agenda in Africa pertains to bringing the state back to development. More concretely, countries epitomized by Ethiopia, Rwanda and Uganda have been constructing a highly interventionist state with authoritarian character. The central motive appears to facilitate development and salvage people out of appalling and grinding poverty. Each country warrants closer inspection. However, this study focuses on Ethiopia- a country often applauded as ‘Africa’s Great Run’ for delivering socio-economic success over the past two decades. In fact, inspired by East Asia’s including Chinese model of authoritarian development, Ethiopia orchestrated a vanguard party, centralized rent control system with politicized bureaucracy and militaristic mobilization resources for development. This arrangement may explain Ethiopia economic success story as one the fastest growing countries in the world. However, this paper detected, Ethiopia’s attempt to bring the state back in development has precipitated institutionalization of a new breed of authoritarianism and informalization of public institutions. Ethiopia’s model of state-led development may constitute a noticeable shift away from the vengeful adherence to neoliberal policies. However, the manner the model has been practiced proved to be neither smooth nor appears to address Ethiopia’s aspiration for political and economic transformation. Partly, this can be illustrated by recent widespread grievances that fed into the popular uprising and animated opposition against the state. Sources of the grievance are complex, but they are highly ingrained with the way the authoritarian model of development is functioning and also the model’s dis-functioning in terms of benefiting people. In light of these findings, the study has arrived at the following conclusion. Africa’s attempt to emulate development models from other countries is not such a ‘bad’ thing. However, emulation makes sense if it is contextualized and sensitive to complex local socio-economic interests.

Keywords: Africa, authoritarianism, development, Ethiopia, neoliberalism

Procedia PDF Downloads 203
998 Money Laundering and Governance in Cryptocurrencies: The Double-Edged Sword of Blockchain Technology

Authors: Jiaqi Yan, Yani Shi

Abstract:

With the growing popularity of bitcoin transactions, criminals have exploited the bitcoin like cryptocurrencies, and cybercriminals such as money laundering have thrived. Unlike traditional currencies, the Internet-based virtual currencies can be used anonymously via the blockchain technology underpinning. In this paper, we analyze the double-edged sword features of blockchain technology in the context of money laundering. In particular, the traceability feature of blockchain-based system facilitates a level of governance, while the decentralization feature of blockchain-based system may bring governing difficulties. Based on the analysis, we propose guidelines for policy makers in governing blockchain-based cryptocurrency systems.

Keywords: cryptocurrency, money laundering, blockchain, decentralization, traceability

Procedia PDF Downloads 202
997 Implementation of an IoT Sensor Data Collection and Analysis Library

Authors: Jihyun Song, Kyeongjoo Kim, Minsoo Lee

Abstract:

Due to the development of information technology and wireless Internet technology, various data are being generated in various fields. These data are advantageous in that they provide real-time information to the users themselves. However, when the data are accumulated and analyzed, more various information can be extracted. In addition, development and dissemination of boards such as Arduino and Raspberry Pie have made it possible to easily test various sensors, and it is possible to collect sensor data directly by using database application tools such as MySQL. These directly collected data can be used for various research and can be useful as data for data mining. However, there are many difficulties in using the board to collect data, and there are many difficulties in using it when the user is not a computer programmer, or when using it for the first time. Even if data are collected, lack of expert knowledge or experience may cause difficulties in data analysis and visualization. In this paper, we aim to construct a library for sensor data collection and analysis to overcome these problems.

Keywords: clustering, data mining, DBSCAN, k-means, k-medoids, sensor data

Procedia PDF Downloads 378
996 Recovery of Draw Solution in Forward Osmosis by Direct Contact Membrane Distillation

Authors: Su-Thing Ho, Shiao-Shing Chen, Hung-Te Hsu, Saikat Sinha Ray

Abstract:

Forward osmosis (FO) is an emerging technology for direct and indirect potable water reuse application. However, successful implementation of FO is still hindered by the lack of draw solution recovery with high efficiency. Membrane distillation (MD) is a thermal separation process by using hydrophobic microporous membrane that is kept in sandwich mode between warm feed stream and cold permeate stream. Typically, temperature difference is the driving force of MD which attributed by the partial vapor pressure difference across the membrane. In this study, the direct contact membrane distillation (DCMD) system was used to recover diluted draw solution of FO. Na3PO4 at pH 9 and EDTA-2Na at pH 8 were used as the feed solution for MD since it produces high water flux and minimized salt leakage in FO process. At high pH, trivalent and tetravalent ions are much easier to remain at draw solution side in FO process. The result demonstrated that PTFE with pore size of 1 μm could achieve the highest water flux (12.02 L/m2h), followed by PTFE 0.45 μm (10.05 L/m2h), PTFE 0.1 μm (7.38 L/m2h) and then PP (7.17 L/m2h) while using 0.1 M Na3PO4 draw solute. The concentration of phosphate and conductivity in the PTFE (0.45 μm) permeate were low as 1.05 mg/L and 2.89 μm/cm respectively. Although PTFE with the pore size of 1 μm could obtain the highest water flux, but the concentration of phosphate in permeate was higher than other kinds of MD membranes. This study indicated that four kinds of MD membranes performed well and PTFE with the pore size of 0.45 μm was the best among tested membranes to achieve high water flux and high rejection of phosphate (99.99%) in recovery of diluted draw solution. Besides that, the results demonstrate that it can obtain high water flux and high rejection of phosphate when operated with cross flow velocity of 0.103 m/s with Tfeed of 60 ℃ and Tdistillate of 20 ℃. In addition to that, the result shows that Na3PO4 is more suitable for recovery than EDTA-2Na. Besides that, while recovering the diluted Na3PO4, it can obtain the high purity of permeate water. The overall performance indicates that, the utilization of DCMD is a promising technology to recover the diluted draw solution for FO process.

Keywords: membrane distillation, forward osmosis, draw solution, recovery

Procedia PDF Downloads 185
995 Behavioral Experiments of Small Societies in Social Media: Facebook Expressions of Anchored Relationships

Authors: Nuran Öze

Abstract:

Communities and societies have been changing towards computer mediated communication. This paper explores online and offline identities and how relationships are formed and negotiated within internet environments which offer opportunities for people who know each other offline and move into relationships online. The expectations and norms of behavior within everyday life cause people to be embodied self. According to the age categories of Turkish Cypriots, their measurements of attitudes in Facebook will be investigated. Face-to-face field research and semi-structured interview methods are used in the study. Face-to-face interview has been done with Turkish Cypriots who are using Facebook already. According to the study, in constructing a linkage between real and virtual identities mostly affected from societal relations serves as a societal grooming tool for Turkish Cypriots.

Keywords: facebook, identity, social media, virtual reality

Procedia PDF Downloads 302
994 Personal Information Classification Based on Deep Learning in Automatic Form Filling System

Authors: Shunzuo Wu, Xudong Luo, Yuanxiu Liao

Abstract:

Recently, the rapid development of deep learning makes artificial intelligence (AI) penetrate into many fields, replacing manual work there. In particular, AI systems also become a research focus in the field of automatic office. To meet real needs in automatic officiating, in this paper we develop an automatic form filling system. Specifically, it uses two classical neural network models and several word embedding models to classify various relevant information elicited from the Internet. When training the neural network models, we use less noisy and balanced data for training. We conduct a series of experiments to test my systems and the results show that our system can achieve better classification results.

Keywords: artificial intelligence and office, NLP, deep learning, text classification

Procedia PDF Downloads 200
993 Students’ Perspectives on Learning Science Education amidst COVID-19

Authors: Rajan Ghimire

Abstract:

One of the diseases caused by the coronavirus shook the whole world. This situation challenged the education system across the world and compelled educators to shift to an online mode of teaching. Many academic institutions that were persistent to keep their traditional pedagogical approach were also forced to change their teaching methods. This study aims to assess science education students' experiences and perceptions of this global issue, especially on the science teaching and learning process. The study is based on qualitative research and through in-depth interviews with respondents and data is analyzed. Online distance teaching and learning processes meet the requirements of students who cannot or prefer not to participate in conventional classroom settings. But there are some challenges for the students and teachers in the science teaching learning process. This study recommends some points to all stakeholders.

Keywords: electronic devices, internet, online and distance learning, science education, educational policy

Procedia PDF Downloads 53
992 Mitigating Self-Regulation Issues in the Online Instruction of Math

Authors: Robert Vanderburg, Michael Cowling, Nicholas Gibson

Abstract:

Mathematics is one of the core subjects taught in the Australian K-12 education system and is considered an important component for future studies in areas such as engineering and technology. In addition to this, Australia has been a world leader in distance education due to the vastness of its geographic landscape. Despite this, research is still needed on distance math instruction. Even though delivery of curriculum has given way to online studies, and there is a resultant push for computer-based (PC, tablet, smartphone) math instruction, much instruction still involves practice problems similar to those original curriculum packs, without the ability for students to self-regulate their learning using the full interactive capabilities of these devices. Given this need, this paper addresses issues students have during online instruction. This study consists of 32 students struggling with mathematics enrolled in a math tutorial conducted in an online setting. The study used a case study design to understand some of the blockades hindering the students’ success. Data was collected by tracking students practice and quizzes, tracking engagement of the site, recording one-on-one tutorials, and collecting data from interviews with the students. Results revealed that when students have cognitively straining tasks in an online instructional setting, the first thing to dissipate was their ability to self-regulate. The results also revealed that instructors could ameliorate the situation and provided useful data on strategies that could be used for designing future online tasks. Specifically, instructors could utilize cognitive dissonance strategies to reduce the cognitive drain of the tasks online. They could segment the instruction process to reduce the cognitive demands of the tasks and provide in-depth self-regulatory training, freeing mental capacity for the mathematics content. Finally, instructors could provide specific scheduling and assignment structure changes to reduce the amount of student centered self-regulatory tasks in the class. These findings will be discussed in more detail and summarized in a framework that can be used for future work.

Keywords: digital education, distance education, mathematics education, self-regulation

Procedia PDF Downloads 136
991 Hidden Truths of Advertising: An Unspoken Fact in Making Ethical Diffusions

Authors: Mustafa Hyder, Shamaila Burney, Roohi Mumtaz

Abstract:

The aim of this study is to determine the consequences of silent or hidden messages and their effectiveness in deteriorating or altering our ethical norms and values. The study also focuses the repercussions of subconscious messages and possibilities of ethical diffusion in our society. The research based on the question that what are the different factors that motivate advertisers to include subliminal messages and how much these unspoken truths affecting our ethical values silently. What are the causes and effects of the subliminal messages in general and the level of ethical diffusion and its acceptance? The concept of advertising is to promote and highlight the salient features of the products and services, a company offers. Advertising is the best option nowadays to convey the related information to the consumers so that they attracted more towards the products or services proposed. The other thing advertisers concentrate, is the psychological characteristics using to persuade consumers choice. Using skills and tactics of advertising to promote a product in such a way that it creates a sensation, controversy or brand consciousness among the consumers or customers. The purpose to have increase purchase or to gain popularity in comparison to their competitors, they sometimes use such tactics and techniques, which is highly unethical and immoral for any society. These kinds of stuff used very smartly within the ads that only the conscious mind subconsciously catches the meaning of those glittery images, posters, phrases, tag lines and non-verbal clues. This study elucidates the subliminal advertising their repercussions and impact on consumer’s behaviour in our society with the help of few ads embedded subliminally and the trends of profitability. The methods used to accomplish our research are based on qualitative research along with the research articles, books and feedback from focused groups regarding the topic. The basic objective of this study was that, there is no significant change in the behaviour and attitude observed. These messages capture very short-term life on the viewer’s subconscious mind but in long run people get used to it and hence not only have the diffusion power but also has the high level of acceptance as well that reflects mostly through their social behaviours and attitudes.

Keywords: ethical diffusion, subconscious, subliminal advertising, unspoken facts

Procedia PDF Downloads 328
990 Examining the Importance of the Structure Based on Grid Computing Service and Virtual Organizations

Authors: Sajjad Baghernezhad, Saeideh Baghernezhad

Abstract:

Vast changes and developments achieved in information technology field in recent decades have made the review of different issues such as organizational structures unavoidable. Applying informative technologies such as internet and also vast use of computer and related networks have led to new organizational formations with a nature completely different from the traditional, great and bureaucratic ones; some common specifications of such organizations are transfer of the affairs out of the organization, benefiting from informative and communicative networks and centered-science workers. Such communicative necessities have led to network sciences development including grid computing. First, the grid computing was only to relate some sites for short – time and use their sources simultaneously, but now it has gone beyond such idea. In this article, the grid computing technology was examined, and at the same time, virtual organization concept was discussed.

Keywords: grid computing, virtual organizations, software engineering, organization

Procedia PDF Downloads 332
989 Journey to Cybercrime and Crime Opportunity: Quantitative Analysis of Cyber Offender Spatial Decision Making

Authors: Sinchul Back, Sun Ho Kim, Jennifer LaPrade, Ilju Seong

Abstract:

Due to the advantage of using the Internet, cybercriminals can reach target(s) without border controls. Prior research on criminology and crime science has largely been void of empirical studies on journey-to-cybercrime and crime opportunity. Thus, the purpose of this study is to understand more about cyber offender spatial decision making associated with crime opportunity factors (i.e., co-offending, offender-stranger). Data utilized in this study were derived from 306 U.S. Federal court cases of cybercrime. The findings of this study indicated that there was a positive relationship between co-offending and journey-to-cybercrime, whereas there was no link between offender-stranger and journey-to-cybercrime. Also, the results showed that there was no relationship between cybercriminal sex, age, and journey-to-cybercrime. The policy implications and limitations of this study are discussed.

Keywords: co-offending, crime opportunity, journey-to-cybercrime, offender-stranger

Procedia PDF Downloads 179
988 'CardioCare': A Cutting-Edge Fusion of IoT and Machine Learning to Bridge the Gap in Cardiovascular Risk Management

Authors: Arpit Patil, Atharav Bhagwat, Rajas Bhope, Pramod Bide

Abstract:

This research integrates IoT and ML to predict heart failure risks, utilizing the Framingham dataset. IoT devices gather real-time physiological data, focusing on heart rate dynamics, while ML, specifically Random Forest, predicts heart failure. Rigorous feature selection enhances accuracy, achieving over 90% prediction rate. This amalgamation marks a transformative step in proactive healthcare, highlighting early detection's critical role in cardiovascular risk mitigation. Challenges persist, necessitating continual refinement for improved predictive capabilities.

Keywords: cardiovascular diseases, internet of things, machine learning, cardiac risk assessment, heart failure prediction, early detection, cardio data analysis

Procedia PDF Downloads 11
987 Sexuality and Quality of Life Among Older Adults

Authors: Ahuva Even-Zohar, Shoshi Werner

Abstract:

Context: Sexuality is an important aspect of overall quality of life for individuals across different age groups and health conditions. Sexual interest and activity continue to be important and play a role in people's life as they age. Despite this, there is limited research on the sexual health of older adults. Research Aim: The study aims to examine the knowledge, attitudes, and sexual activity of older adults and to explore the relationship between sexual activity and quality of life among this population. Methodology: The study involved 203 Jewish participants from Israel, with an average age of 69.59. The participants completed questionnaires administered through an Internet panel. The questionnaires measured variables such as knowledge about and attitudes towards sexuality, sexual activity, quality of life, and socio-demographic information. Findings: The study found that a majority of the participants reported engaging in sexual activity, with most of them experiencing full sexual intercourse. Approximately half of the participants expressed high levels of satisfaction with their sexual activity. The results indicated that older adults demonstrated a moderate level of knowledge and permissive attitudes towards sexuality in later life. Moreover, higher levels of knowledge and permissive attitudes were associated with increased sexual activity. The frequency of sexual activity was identified as a predictor of quality of life, with a mediating effect on the relationship between attitudes towards older adults' sexuality and quality of life. Notably, men and older adults who were married or in a relationship reported higher frequencies of sexual activity compared to women and older adults without a partner. Furthermore, a majority of participants did not seek professional help or discuss their sexual concerns with a therapist. Theoretical Importance: This research contributes to our understanding of a topic that is often considered taboo - sexuality among older adults. It highlights that older adults maintain an interest in sexual activity, and that engaging in such activity contributes to their overall quality of life. Data Collection and Analysis Procedures: The data for this study were collected using structured questionnaires administered through an Internet panel. The questionnaires included closed-ended questions, allowing for quantitative data analysis. Descriptive statistics and regression analysis were performed to examine the relationships between the variables. Questions Addressed: This study aimed to address the following questions: What is the level of knowledge and attitudes towards sexuality among older adults? How prevalent is sexual activity among older adults and what factors are associated with it? How does sexual activity impact the quality of life of older adults? Do older adults seek professional help for their sexual concerns? Conclusion: The main conclusion drawn from this research is that sexuality is a crucial aspect of older adults' lives and significantly contributes to their quality of life. The study emphasizes the need for educational programs aimed at older adults and professionals, which promote the understanding and benefits of sexuality in later life. It also suggests that professionals should actively encourage older individuals to seek help and support when experiencing difficulties related to sexuality.

Keywords: men, older adults, quality of life, sexuality, women

Procedia PDF Downloads 71