Search results for: SMART phone
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1621

Search results for: SMART phone

781 Reed: An Approach Towards Quickly Bootstrapping Multilingual Acoustic Models

Authors: Bipasha Sen, Aditya Agarwal

Abstract:

Multilingual automatic speech recognition (ASR) system is a single entity capable of transcribing multiple languages sharing a common phone space. Performance of such a system is highly dependent on the compatibility of the languages. State of the art speech recognition systems are built using sequential architectures based on recurrent neural networks (RNN) limiting the computational parallelization in training. This poses a significant challenge in terms of time taken to bootstrap and validate the compatibility of multiple languages for building a robust multilingual system. Complex architectural choices based on self-attention networks are made to improve the parallelization thereby reducing the training time. In this work, we propose Reed, a simple system based on 1D convolutions which uses very short context to improve the training time. To improve the performance of our system, we use raw time-domain speech signals directly as input. This enables the convolutional layers to learn feature representations rather than relying on handcrafted features such as MFCC. We report improvement on training and inference times by atleast a factor of 4x and 7.4x respectively with comparable WERs against standard RNN based baseline systems on SpeechOcean's multilingual low resource dataset.

Keywords: convolutional neural networks, language compatibility, low resource languages, multilingual automatic speech recognition

Procedia PDF Downloads 113
780 Effect of Co-Parenting Support on Duration of Exclusive Breastfeeding in a Developing Nation: A Randomised Controlled Trial

Authors: Phomid Techi, L. N. Padmasini, Mohan Mathew

Abstract:

Objective: To evaluate the effectiveness of co-parent support on the duration of exclusive breastfeeding by a randomized control trial. Introduction: The current rates of exclusive breastfeeding for 6 months in India is 46% (NFHS3 2008.). The purpose of the study is to evaluate the effectiveness of co-parenting support on duration of exclusive breastfeeding in primi mothers. Design: RCT: Willing parents of healthy TAGA babies born in our hospital were explained about the study purpose and randomly assigned to either trial or control group. The control group was given the usual care. The intervention group received usual care and in addition the trial intervention. Follow-up data was collected at the end of 6 mon. Intervention: Face to face 30-minute discussion in post partum unit on breast feeding benefits, techniques, and problem-solving information followed up by phone calls to mother every 4 weeks to answer questions/concerns. Outcome measures: Duration of exclusive breastfeeding Baseline demographic variables were measured. Results: After obtaining IEC approval a total of 100 couples were recruited, 100 is each group. In the intervention group, the rate of exclusive breastfeeding was 97.2% while in the control group it was 64% (p-value 0.00). Conclusion: Co-parenting support has an important role in promoting exclusive breastfeeding.

Keywords: co-parenting, exclusive breastfeeding, developing nation, randomised control trial

Procedia PDF Downloads 231
779 Security of Internet of Things: Challenges, Requirements and Future Directions

Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi

Abstract:

The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.

Keywords: Internet of Things (IoT), IoT security challenges, IoT security requirements, IoT security architecture

Procedia PDF Downloads 367
778 A Named Data Networking Stack for Contiki-NG-OS

Authors: Sedat Bilgili, Alper K. Demir

Abstract:

The current Internet has become the dominant use with continuing growth in the home, medical, health, smart cities and industrial automation applications. Internet of Things (IoT) is an emerging technology to enable such applications in our lives. Moreover, Named Data Networking (NDN) is also emerging as a Future Internet architecture where it fits the communication needs of IoT networks. The aim of this study is to provide an NDN protocol stack implementation running on the Contiki operating system (OS). Contiki OS is an OS that is developed for constrained IoT devices. In this study, an NDN protocol stack that can work on top of IEEE 802.15.4 link and physical layers have been developed and presented.

Keywords: internet of things (IoT), named-data, named data networking (NDN), operating system

Procedia PDF Downloads 165
777 Internet of Things based AquaSwach Water Purifier

Authors: Karthiyayini J., Arpita Chowdary Vantipalli, Darshana Sailu Tanti, Malvika Ravi Kudari, Krtin Kannan

Abstract:

This paper is propelled from the generally existing undertaking of the smart water quality management, which addresses an IoT (Internet of things) based brilliant water quality observing (SWQM) framework which we call it AquaSwach that guides in the ceaseless estimation of water conditions dependent on five actual boundaries i.e., temperature, pH, electric conductivity and turbidity properties and water virtue estimation each time you drink water. Six sensors relate to Arduino-Mega in a discrete way to detect the water parameters. Extracted data from the sensors are transmitted to a desktop application developed in the NET platform and compared with the WHO (World Health Organization) standard values.

Keywords: AquaSwach, IoT, WHO, water quality

Procedia PDF Downloads 205
776 An Empirical Study of Critical Success Factors for the Adoption of M-Government Services in Tanzania

Authors: Fredrick Ishengoma, Leonard Mselle, Hector Mongi

Abstract:

The growing number of mobile phone subscribers in Tanzania offers the government a new channel for the delivery of information and government services to citizens, thus mobile Government (m-Government). In Tanzania, m-Government services usage is in the early stages, and factors that influence its adoption are yet to be known. This study seeks to identify and understand the critical success factors (CSFs) that influence citizens’ behavioural intention (BI) to adopt m-Government services in Tanzania. The study employed the mobile services acceptance model (MSAM) and extends it with external factors relevant in the Tanzanian context. A survey questionnaire was used to collect primary data from users of m-Government services in Dar es salaam and Dodoma cities, and 253 responses were received. Data were analyzed by IBM-SPSS AMOS 23.0 software using structural equation modeling (SEM). The findings of the study indicate that perceived usefulness, trust, perceived mobility, power distance, quality of service, awareness, perceived cost, personal initiatives, and characteristics significantly influence the BI to adopt m-Government services. However, perceived ease of use was found statistically insignificant to predict BI. Furthermore, the interplay between CSFs, discussion on theoretical and practical implications that follow from the results are presented.

Keywords: adoption, critical success factors, structural equation modeling, m-Government, MSAM, Tanzania

Procedia PDF Downloads 141
775 Challenges and Opportunities for M-Government Implementation in Saudi Arabia

Authors: A. Alssbaiheen, S. Love

Abstract:

Mobile government (m-government) is one of the promising technologies for developing the governance of developing countries. While developing countries often have less advanced internet infrastructure compared to the developed world, mobile phone penetration is very high in the Gulf Cooperation Council (GCC) countries and mobile internet use offers a means to transcend traditional logistical barriers to accessing government services. The study explores the challenges and opportunities of the mobile government in Saudi Arabia. Semi-structured interviews were conducted with a diverse cohort of Saudi mobile users. A total of 77 semi-structured interviews were collected and subsequently analysed using open, axial, and selective coding. The participants’ responses revealed that many opportunities exist for the development of m-government in Saudi Arabia, including high popular awareness of government initiatives in e-government, and willingness to use such services, largely due to the time-saving and convenience aspects it offers compared with traditional bureaucratic services. However, numerous barriers were identified, including the low quality and speed of the internet, service customization, and concerns about privacy data security. It was also felt that in addition to infrastructure challenges, the traditional bureaucratic attitude of government department would itself hinder the effective deployment and utilization of m-government services.

Keywords: awareness, barriers, challenges, government services, mobile government, m-government, opportunities

Procedia PDF Downloads 461
774 Population Stereotype Production, User Factors, and Icon Design for Underserved Communities of Rural India

Authors: Avijit Sengupta, Klarissa Ting Ting Cheng, Maffee Peng-Hui Wan

Abstract:

This study investigates the influence of user factors and referent characteristics on representation types generated using the stereotype production method for designing icons. Sixty-eight participants of farming communities were asked to draw images based on sixteen feature referents. Significant statistical differences were found between the types of representations generated for contextual and context-independent referents. Strong correlations were observed between years of formal education and total number of abstract representations produced for both contextual and context-independent referents. However, representation characteristics were not influenced by other user factors such as participants’ experience with mobile phone and years of farming experience. A statistically significant tendency of making concrete representations was observed for both contextual and context-independent referents. These findings provide insights on community members’ involvement in icon design and suggest a consolidated icon design strategy based on population stereotype, particularly for under-served rural communities of India.

Keywords: abstract representation, concrete representation, participatory design, population stereotype

Procedia PDF Downloads 372
773 Criminal Law and Internet of Things: Challenges and Threats

Authors: Celina Nowak

Abstract:

The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.

Keywords: criminal law, internet of things, privacy, security threats

Procedia PDF Downloads 159
772 A Framework for Embedding Industry 4.0 in the UAE Defence Manufacturing Industry

Authors: Khalifa Al Baloushi, Hongwei Zhang, Terrence Perera

Abstract:

Over the last few decades, the government of the UAE has been taking actions to consolidate defense manufacturing entities with the view to build a coherent and modern defense manufacturing base. Whilst these actions have significantly improved the overall capabilities of defense manufacturing; further opportunities exist to radically transform the sector. A comprehensive literature review and data collected from a survey identified three potential areas of improvements, (a) integration of Industry 4.0 technologies and other smart technologies, (b) stronger engagement of small and Medium-sized defense manufacturing companies and (c) Enhancing the national defense policies by embedding best practices from other nations. This research paper presents the design and development of a conceptual framework for the UAE defense industrial ecosystem.

Keywords: industry 4.0, defense manufacturing, eco-systems, integration

Procedia PDF Downloads 203
771 Sound Instance: Art, Perception and Composition through Soundscapes

Authors: Ricardo Mestre

Abstract:

The soundscape stands out as an agglomeration of sounds available in the world, associated with different contexts and origins, being a theme studied by various areas of knowledge, seeking to guide their benefits and their consequences, contributing to the welfare of society and other ecosystems. Murray Schafer, the author who originally developed this concept, highlights the need for a greater recognition of sound reality, through the selection and differentiation of sounds, contributing to a tuning of the world and to the balance and well-being of humanity. According to some authors sound environment, produced and created in various ways, provides various sources of information, contributing to the orientation of the human being, alerting and manipulating him during his daily journey, like small notifications received on a cell phone or other device with these features. In this way, it becomes possible to give sound its due importance in relation to the processes of individual representation, in manners of social, professional and emotional life. Ensuring an individual representation means providing the human being with new tools for the long process of reflection by recognizing his environment, the sounds that represent him, and his perspective on his respective function in it. In order to provide more information about the importance of the sound environment inherent to the individual reality, one introduces the term sound instance, in order to refer to the whole sound field existing in the individual's life, which is divided into four distinct subfields, but essential to the process of individual representation, called sound matrix, sound cycles, sound traces and sound interference.

Keywords: sound instance, soundscape, sound art, perception, composition

Procedia PDF Downloads 138
770 Advanced Driver Assistance System: Veibra

Authors: C. Fernanda da S. Sampaio, M. Gabriela Sadith Perez Paredes, V. Antonio de O. Martins

Abstract:

Today the transport sector is undergoing a revolution, with the rise of Advanced Driver Assistance Systems (ADAS), industry and society itself will undergo a major transformation. However, the technological development of these applications is a challenge that requires new techniques and great machine learning and artificial intelligence. The study proposes to develop a vehicular perception system called Veibra, which consists of two front cameras for day/night viewing and an embedded device capable of working with Yolov2 image processing algorithms with low computational cost. The strategic version for the market is to assist the driver on the road with the detection of day/night objects, such as road signs, pedestrians, and animals that will be viewed through the screen of the phone or tablet through an application. The system has the ability to perform real-time driver detection and recognition to identify muscle movements and pupils to determine if the driver is tired or inattentive, analyzing the student's characteristic change and following the subtle movements of the whole face and issuing alerts through beta waves to ensure the concentration and attention of the driver. The system will also be able to perform tracking and monitoring through GSM (Global System for Mobile Communications) technology and the cameras installed in the vehicle.

Keywords: advanced driver assistance systems, tracking, traffic signal detection, vehicle perception system

Procedia PDF Downloads 146
769 Free Vibration of Functionally Graded Smart Beams Based on the First Order Shear Deformation Theory

Authors: A. R. Nezamabadi, M. Veiskarami

Abstract:

This paper studies free vibration of simply supported functionally graded beams with piezoelectric layers based on the first order shear deformation theory. The Young's modulus of beam is assumed to be graded continuously across the beam thickness. The governing equation is established. Resulting equation is solved using the Euler's equation. The effects of the constituent volume fractions, the influences of applied voltage on the vibration frequency are presented. To investigate the accuracy of the present analysis, a compression study is carried out with a known data.

Keywords: mechanical buckling, functionally graded beam, first order shear deformation theory, free vibration

Procedia PDF Downloads 471
768 The Effects of Mobile Phones in Mitigating Cultural Shock amongst Refugees: Case of South Africa

Authors: Sarah Vuningoma, Maria Rosa Lorini, Wallace Chigona

Abstract:

The potential of mobile phones is evident in their ability to address isolation and loneliness, support the improvement of interpersonal relations, and contribute to the facilitation of assimilation processes. Mobile phones can play a role in facilitating the integration of refugees into a new environment. This study aims to evaluate the impact of mobile phone use on helping refugees navigate the challenges posed by cultural differences in the host country. Semi-structured interviews were employed to collect data for the study, involving a sample size of 27 participants. Participants in the study were refugees based in South Africa, and thematic analysis was the chosen method for data analysis. The research highlights the numerous challenges faced by refugees in their host nation, including a lack of local cultural skills, the separation of family and friends from their countries of origin, hurdles in acquiring legal documentation, and the complexities of assimilating into the unfamiliar community. The use of mobile phones by refugees comes with several advantages, such as the advancement of language and cultural understanding, seamless integration into the host country, streamlined communication, and the exploration of diverse opportunities. Concurrently, mobile phones allow refugees in South Africa to manage the impact of culture shock.

Keywords: mobile phones, culture shock, refugees, South Africa

Procedia PDF Downloads 83
767 Bridge the Gap: Livability, Sustainable Development Goals and Pandemics: A Review on Visakhapatnam

Authors: Meenakshi Pappu

Abstract:

The terms like liveability, Sustainable Development Goals and pandemic have been widely analysed in proving sustainable cities and community living in growing urban areas by 2030. The pandemic has made us all ruminate about how we look into different fast-growing cities which vary in geographical location, climatic zones, terrains, land use and varying cultural backgrounds & traditions belong to the mother soil. India has taken up huge steps to move towards achieving UN-SDGs. Smart city missions have played a vital role in moving towards SDG. Visakhapatnam city is the executive capital in the state of Andhra Pradesh. Located on the Eastern Ghats in South India, it is surrounded by a mountain range on three sides and the Indian Ocean on one side. This unique geographical location and fast urbanization in the last two decades, has put up immense pressure on the natural environment and recourses. It's observed that a lot of investigation to address the existing and proposed land-use, spatial, natural resources, air quality, environmental challenges, and a range of socio-economic, economic challenges were identified during the assessment phase. The citizen concerns with quality and quantity of access to water, sewerage, energy, transportation (public & private) and safety for the public were found out through surveying. Urban infrastructure plays a major part in city building. These cities are occupied by people who come for a better living. This paper aims to provide off-center way of approach to citizens-oriented community habits by addressing SDG 11: Sustainable cities & community by enkindling a characteristic framework of amalgamating 1.eco-design principal, 2. three factors of liveability and 3. a local traditional planning solution. Aiming towards a sustainable development utilized with the focus on the quality of the life and experience of the people who live in urban areas integrating life with soil & water. Building strong social agenda that includes affordable housing for all levels of households, secure and place for good quality public realm for the local people with activity in green corridor, open meeting space & adding recreational places for advantage..

Keywords: livability, eco-design, smart city mission, sustainable

Procedia PDF Downloads 180
766 The Perspectives of Adult Learners Towards Online Learning

Authors: Jacqueline Żammit

Abstract:

Online learning has become more popular as a substitute for traditional classroom instruction because of the COVID-19 epidemic. The study aimed to investigate how adult Maltese language learners evaluated the benefits and drawbacks of online instruction. 35 adult participants provided data through semi-structured interviews with open-ended questions. NVivo software was used to analyze the interview data using the thematic analysis method in order to find themes and group the data based on common responses. The advantages of online learning that the participants mentioned included accessing subject content even without live learning sessions, balancing learning with household duties, and lessening vulnerability to problems like fatigue, time-wasting traffic, school preparation, and parking space constraints. Conversely, inadequate Internet access, inadequate IT expertise, a shortage of personal computers, and domestic distractions adversely affected virtual learning. Lack of an Internet connection, IT expertise, a personal computer, or a phone with Internet access caused inequality in access to online learning sessions. Participants thought online learning was a way to resume academic activity, albeit with drawbacks. In order to address the challenges posed by online learning, several solutions are proposed in the research's conclusion.

Keywords: adult learners, online education, e-learning, challenges of online learning, benefits ofonline learning

Procedia PDF Downloads 58
765 Neo-Filipino: A Study on the Impact of Internet and Mobile Technology on the Identity Formation of Selected Filipino Third Culture Kids (TCKs)

Authors: Erika Mae L. Valencia

Abstract:

Third Culture Kids (TCKs) are children who experienced a cross-cultural upbringing – being raised and lived outside their parents’ culture. As a result, TCKs experience the difficulty of building and attaining a concrete cultural identity. However, in the context of globalization and the emergence of ICTs, the internet, and mobile technology creates better ways of constructing cultural identities. This study investigates the social and cultural impacts of the internet and mobile technology on the multi-cultural identity development among selected Filipino TCKs. Moreover, this research seeks to understand how the Filipino TCKs form their identity and address their complex issue of belonging with the use of different internet platforms and mobile technology. To explore the lived experiences of Filipino TCKs, this research employs a transcendental phenomenological design. Also, this study uses purposive and snowball sampling and conduct in-depth interviews through Skype, phone call, or face-to-face. This study utilizes Pierre Bourdieu’s social capital as a theoretical lens to gain understanding of the TCKs’ identity formation process in relation to the said ICTs. This research argues that the internet and mobile technology play a significant role in facilitating multi-cultural identity formation of Filipino TCKs, as well as potentially broadening their social network through its various technological platforms.

Keywords: identity, internet, third culture kids, mobile technology

Procedia PDF Downloads 291
764 Polyvinyl Alcohol Incorporated with Hibiscus Extract Microcapsules as Combined Active and Intelligent Composite Film for Meat Preservation: Antimicrobial, Antioxidant, and Physicochemical Investigations

Authors: Ahmed F. Ghanem, Marwa I. Wahba, Asmaa N. El-Dein, Mohamed A. EL-Raey, Ghada E. A. Awad

Abstract:

Numerous attempts are being performed in order to formulate suitable packaging materials for the meat products. However, to the best of our knowledge, the incorporation of the free hibiscus extract or its microcapsules in the pure polyvinyl alcohol (PVA) matrix as packaging materials for the meats is seldom reported. Therefore, this study aims at the protection of the aqueous crude extract of the hibiscus flowers utilizing the spry drying encapsulation technique. Results of the Fourier transform infrared (FTIR), the scanning electron microscope (SEM), and the particle size analyzer confirmed the successful formation of the assembled capsules via strong interactions, the spherical rough microparticles, and the particle size of ~ 235 nm, respectively. Also, the obtained microcapsules enjoy higher thermal stability than the free extract. Then, the obtained spray-dried particles were incorporated into the casting solution of the pure PVA film with a concentration of 10 wt. %. The segregated free-standing composite films were investigated, compared to the neat matrix, with several characterization techniques such as FTIR, SEM, thermal gravimetric analysis (TGA), mechanical tester, contact angle, water vapor permeability, and oxygen transmission. The results demonstrated variations in the physicochemical properties of the PVA film after the inclusion of the free and the extract microcapsules. Moreover, biological studies emphasized the biocidal potential of the hybrid films against the microorganisms contaminating the meat. Specifically, the microcapsules imparted not only antimicrobial but also antioxidant activities to the PVA matrix. Application of the prepared films on the real meat samples displayed a low bacterial growth with a slight increase in the pH over the storage time which continued up to 10 days at 4 oC, as further evidence to the meat safety. Moreover, the colors of the films did not significantly changed except after 21 days indicating the spoilage of the meat samples. No doubt, the dual-functional of the prepared composite films pave the way towards combined active and smart food packaging applications. This would play a vital role in the food hygiene, including also the quality control and the assurance.

Keywords: PVA, hibiscus, extraction, encapsulation, active packaging, smart and intelligent packaging, meat spoilage

Procedia PDF Downloads 85
763 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 440
762 Perceived Benefits of Technology Enhanced Learning by Learners in Uganda: Three Band Benefits

Authors: Kafuko M. Maria, Namisango Fatuma, Byomire Gorretti

Abstract:

Mobile learning (m-learning) is steadily growing and has undoubtedly derived benefits to learners and tutors in different learning environments. This paper investigates the variation in benefits derived from enhanced classroom learning through use of m-learning platforms in the context of a developing country owing to the fact that it is still in its initial stages. The study focused on how basic technology-enhanced pedagogic innovation like cell phone-based learning is enhancing classroom learning from the learners’ perspective. The paper explicitly indicates the opportunities presented by enhanced learning to a conventional learning environment like a physical classroom. The findings were obtained through a survey of two universities in Uganda in which data was quantitatively collected, analyzed and presented in a three banded diagram depicting the variation in the obtainable benefits. Learners indicated that a smartphone is the most commonly used device. Learners also indicate that straight lectures, student to student plus student to lecturer communication, accessing learning material and assignments are core activities. In a TEL environment support by smartphones, learners indicated that they conveniently achieve the prior activities plus discussions and group work. Learners seemed not attracted to the possibility of using TEL environment to take lectures, as well as make class presentations. The less attractiveness of these two factors may be due to the teacher centered approach commonly applied in the country’s education system.

Keywords: technology enhanced learning, m-learning, classroom learning, perceived benefits

Procedia PDF Downloads 224
761 Feasiblity of Replacing Inductive Instrument Transformers with Non-Conventional Intrument Transformers to replace

Authors: David A. Wallace, Salakjit J. Nilboworn

Abstract:

Secure and reliable transmission and distribution of electrical power is crucial in today’s ever-increasing demand for electricity. Traditional methods of protecting the electrical grid have relied on relaying systems receiving voltage and current inputs from inductive instruments transformers (IT). This method has provided robust and stable performance throughout the years. Today with the advent of new non-conventional transformers (NCIT) and sensors, the electrical landscape is changing. These new systems have to ability to provide the same electrical performance as traditional instrument transformers with the added features of data acquisition, communication, smaller footprint, lower cost and resistance to GMD/GIC events.

Keywords: non-conventional instrument transformers, digital substations, smart grids, micro-grids

Procedia PDF Downloads 76
760 Active Treatment of Water Chemistry for Swimming Pools Using Novel Automated System (NAS)

Authors: Saeed Asiri

Abstract:

The Novel Automated System (NAS) has the control system of the level of chlorine and acid (i.e. pH level) through a feedback in three forms of synchronous alerts. The feedback is in the form of an alert voice, a visible color, and a message on a digital screen. In addition, NAS contains a slide-in container in which chemicals are used to treat the problems of chlorine and acid levels independently. Moreover, NAS has a net in front of it to clean the pool on the surface of the water from leaves and wastes and so on which is controlled through a remote control. The material used is a lightweight aluminum with mechanical and electric parts integrated with each other. In fact, NAS is qualified to serve as an assistant security guard for swimming pools because it has the characteristics that make it unique and smart.

Keywords: novel automated system, pool safety, maintenance, pH level, digital screen

Procedia PDF Downloads 65
759 Using SMS Mobile Technology to Assess the Mastery of Subject Content Knowledge of Science and Mathematics Teachers of Secondary Schools in Tanzania

Authors: Joel S. Mtebe, Aron Kondoro, Mussa M. Kissaka, Elia Kibga

Abstract:

Sub-Saharan Africa is described as the second fastest growing mobile phone penetration in the world more than in the United States or the European Union. Mobile phones have been used to provide a lot of opportunities to improve people’s lives in the region such as in banking, marketing, entertainment, and paying various bills such as water, TV, and electricity. However, the potential of using mobile phones to enhance teaching and learning has not been explored. This study presents an experience of developing and delivering SMS quizzes questions that were used to assess mastery of the subject content knowledge of science and mathematics secondary school teachers in Tanzania. The SMS quizzes were used as a follow up support mechanism to 500 teachers who participated in a project to upgrade subject content knowledge of science and mathematics subjects. Quizzes of 10-15 questions were sent to teachers each week for 8 weeks and the results were analyzed using SPSS. The results showed that chemistry and biology had better performance compared to mathematics and physics. Teachers reported some challenges that led to poor performance, invalid answers, and non-responses and they are presented. This research has several practical implications for those who are implementing or planning to use mobile phones for teaching and learning especially in rural secondary schools in sub-Saharan Africa.

Keywords: mobile learning, elearning, educational technolgies, SMS, secondary education, assessment

Procedia PDF Downloads 275
758 Development of Intelligent Smart Multi Tracking Agent System to Support of Logistics Safety

Authors: Umarov Jamshid, Ju-Su Kim, Hak-Jun Lee, Man-Kyo Han, Ryum-Duck Oh

Abstract:

Recently, it becomes convenient to identify the location information of cargos by using GPS and wireless communication technologies. The development of IoT technologies and tracking system allows us to confirm site situation on an ad hoc basis in all the industries and social environments. Moreover, it allows us to apply IT technologies to a manageable extent. However, there have been many limitations for using the system due to the difficulty of identifying location information in real time and also due to the simple features. To globalize the logistics related tracking system, it is required to conduct a study to resolve the aforementioned problem. On that account, this paper designed and developed the IoT and RTLS based intelligent multi tracking agent system for more secure, accurate and reliable transportation in relation to logistics.

Keywords: GPS, tracking agent system, IoT, RTLS, Logistics

Procedia PDF Downloads 639
757 The Impact of Information and Communication Technology on Bilateral Trade in Goods

Authors: Christina Tay

Abstract:

This paper investigates the impact of Information and Communication Technology (ICT) on bilateral trade in goods. Empirical analysis is performed on the United States and 34 partnering countries from 2000 to 2013. Our econometric model fits the data well, explaining 52% of the variation in trade flows for goods trade, 53.2% of the variation in trade flows for goods export and 48% of the variation in trade flows for goods import. For every 10% increase in fixed broadband Internet subscribers per 100 people increases, goods trade by 7.9% and for every 5% increase in fixed broadband Internet subscribers per 100 people, goods export increases by 11%. For every 1% increase in fixed telephone line penetration per 100 people, goods trade increases by 26.3%, goods export increases by 24.4% and goods import increases by 24.8%. For every 1% increase in mobile-cellular telephone subscriptions, goods trade decreases by 29.6% and goods export decreases by 27.1%, whilst for every 0.01% increase in mobile-cellular telephone subscriptions, goods import decreases by 34.3%. For every 1% increase in the percentage of population who used the Internet from any location in the last 12 months Internet, goods trade increases by 32.5%, goods export increases by 38.9%, goods import increases by 33%. All our trade determinants as well as our ICT variables have significances on goods exports for the US. We can also draw from our study that the US relies more rather heavily on ICT for its goods export compared to goods import.

Keywords: bilateral trade, fixed broadband, fixed telephone, goods trade, information and communicative technologies, Internet, mobile-cellular phone

Procedia PDF Downloads 286
756 Three Tier Indoor Localization System for Digital Forensics

Authors: Dennis L. Owuor, Okuthe P. Kogeda, Johnson I. Agbinya

Abstract:

Mobile localization has attracted a great deal of attention recently due to the introduction of wireless networks. Although several localization algorithms and systems have been implemented and discussed in the literature, very few researchers have exploited the gap that exists between indoor localization, tracking, external storage of location information and outdoor localization for the purpose of digital forensics during and after a disaster. The contribution of this paper lies in the implementation of a robust system that is capable of locating, tracking mobile device users and store location information for both indoor and partially outdoor the cloud. The system can be used during disaster to track and locate mobile phone users. The developed system is a mobile application built based on Android, Hypertext Preprocessor (PHP), Cascading Style Sheets (CSS), JavaScript and MATLAB for the Android mobile users. Using Waterfall model of software development, we have implemented a three level system that is able to track, locate and store mobile device information in secure database (cloud) on almost a real time basis. The outcome of the study showed that the developed system is efficient with regard to the tracking and locating mobile devices. The system is also flexible, i.e. can be used in any building with fewer adjustments. Finally, the system is accurate for both indoor and outdoor in terms of locating and tracking mobile devices.

Keywords: indoor localization, digital forensics, fingerprinting, tracking and cloud

Procedia PDF Downloads 328
755 Effect of On-Road Vehicular Traffic on Noise Pollution in Bhubaneswar City, Eastern India

Authors: Dudam Bharath Kumar, Harsh Kumar, Naveed Ahmed

Abstract:

Vehicular traffic on the road-side plays a significant role in affecting the noise pollution in most of the cities over the world. To assess the correlation of the road-traffic on noise pollution in the city environment, continuous measurements were carried out in an entire daytime starting from 8:00 AM IST to 6:00 PM IST at a single point for each 5 minutes (8:00-8:05, 9:00-9:05, 10:00-10:05 AM, ...) near the KIIT University campus road. Noise levels were observed using a mobile operated app of android cell phone and a handheld noise meter. Calibration analysis shows high correlation about 0.89 for the study location for the day time period. Results show diurnal variability of atmospheric noise pollution levels go hand-in and with the vehicular number which pass through a point of observation. The range of noise pollution levels in the daytime period is observed as 55 to 75 dB(A). As a day starts, sudden upsurge of noise levels is observed from 65 to 71 dB(A) in the early morning, 64 dB(A) in late morning, regains the same quantity 68-71 dB(A) in the afternoon, and rises 70 dB(A) in the early evening. Vehicular number of the corresponding noise levels exhibits 115-120, 150-160, and 140-160, respectively. However, this preliminary study suggests the importance of vehicular traffic on noise pollution levels in the urban environment and further to study population exposed to noise levels. Innovative approaches help curb the noise pollution through modelling the traffic noise pollution spatially and temporally over the city environments.

Keywords: noise pollution, vehicular traffic, urban environment, noise meter

Procedia PDF Downloads 290
754 Designing AI-Enabled Smart Maintenance Scheduler: Enhancing Object Reliability through Automated Management

Authors: Arun Prasad Jaganathan

Abstract:

In today's rapidly evolving technological landscape, the need for efficient and proactive maintenance management solutions has become increasingly evident across various industries. Traditional approaches often suffer from drawbacks such as reactive strategies, leading to potential downtime, increased costs, and decreased operational efficiency. In response to these challenges, this paper proposes an AI-enabled approach to object-based maintenance management aimed at enhancing reliability and efficiency. The paper contributes to the growing body of research on AI-driven maintenance management systems, highlighting the transformative impact of intelligent technologies on enhancing object reliability and operational efficiency.

Keywords: AI, machine learning, predictive maintenance, object-based maintenance, expert team scheduling

Procedia PDF Downloads 48
753 Mental Health and Technology: Evidence Review

Authors: Kylie Henderson

Abstract:

Adapting mental health interventions is important when providing support to those experiencing difficulties. This analysis aimed to explore and evaluate the effectiveness of various forms of mental health interventions. Literature that has analysed face-to-face (F2F), phone (Telehealth), mobile (mHealth) and online (e-interventions) interferences found all interventions were effective in reducing and treating symptoms of mental health disorders. F2F and Telehealth interventions facilitated greater engagement and client satisfaction. Due to accessibility and privacy, mHealth and e-interventions were the preferred methods of engagement with health services for youth and young adults. Regardless, these interventions still identified several barriers of high dropout, low adherence, and lack of awareness. Additionally, a large proportion of interventions lacked evidence-based foundations. Exploration of interventions that utilise a variety of interfaces, as well as incorporated evidence-based literature and clinician experience, show that they benefit those experiencing mental health difficulties. Applications like YourHealth+ provide a combination of interventions (F2F, mHealth, and e-interventions) to improve the wellbeing of job seekers and employment consults. Individuals that have used the application in conjunction with therapy have reported feeling more empowered and demonstrated improved wellbeing. Practitioners have also described improved confidence in their ability to provide support to clients. Therefore, it can be proposed that utilising a variety of interventions as well as incorporating literature and experience is beneficial to those experiencing mental health difficulties and to health practitioners.

Keywords: face-to-face, e-interventions, mHealth, YourHealth+

Procedia PDF Downloads 135
752 A Review Paper for Detecting Zero-Day Vulnerabilities

Authors: Tshegofatso Rambau, Tonderai Muchenje

Abstract:

Zero-day attacks (ZDA) are increasing day by day; there are many vulnerabilities in systems and software that date back decades. Companies keep discovering vulnerabilities in their systems and software and work to release patches and updates. A zero-day vulnerability is a software fault that is not widely known and is unknown to the vendor; attackers work very quickly to exploit these vulnerabilities. These are major security threats with a high success rate because businesses lack the essential safeguards to detect and prevent them. This study focuses on the factors and techniques that can help us detect zero-day attacks. There are various methods and techniques for detecting vulnerabilities. Various companies like edges can offer penetration testing and smart vulnerability management solutions. We will undertake literature studies on zero-day attacks and detection methods, as well as modeling approaches and simulations, as part of the study process.

Keywords: zero-day attacks, exploitation, vulnerabilities

Procedia PDF Downloads 93