Search results for: internet filtering
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1948

Search results for: internet filtering

1078 The Egyptian eGovernment Journey

Authors: Ali Abdelsattar Elshabrawy

Abstract:

The Egyptian government is struggling to build it's eGovernment project. They succeeded to build the Egyptian digital portal, which contain links for number of services provided by different ministries. For achieving such success, their are requirements necessary to build such a project such as: internet dissemination, IT literacy, Strategy, disqualification of paper based services. This paper is going to clarify the main obstacles to the Egyptian eGovernment project from both the supply and demand sides. Also will clarify the most critical requirements in this phase of the project lifecycle. This paper should be in great value for the project team and also for many other developing countries that share the same obstacles.

Keywords: the egyptian egovernment project lifecycle, supply side barriers, demand side barriers, egovernment project requirements

Procedia PDF Downloads 137
1077 Ensuring Cyber Security Using Kippo Honeypots

Authors: S. Vivekananda Pandian

Abstract:

A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.

Keywords: attackers, security, Kippo Honeypots, virtual machine

Procedia PDF Downloads 409
1076 Analysing Competitive Advantage of IoT and Data Analytics in Smart City Context

Authors: Petra Hofmann, Dana Koniel, Jussi Luukkanen, Walter Nieminen, Lea Hannola, Ilkka Donoghue

Abstract:

The Covid-19 pandemic forced people to isolate and become physically less connected. The pandemic has not only reshaped people’s behaviours and needs but also accelerated digital transformation (DT). DT of cities has become an imperative with the outlook of converting them into smart cities in the future. Embedding digital infrastructure and smart city initiatives as part of normal design, construction, and operation of cities provides a unique opportunity to improve the connection between people. The Internet of Things (IoT) is an emerging technology and one of the drivers in DT. It has disrupted many industries by introducing different services and business models, and IoT solutions are being applied in multiple fields, including smart cities. As IoT and data are fundamentally linked together, IoT solutions can only create value if the data generated by the IoT devices is analysed properly. Extracting relevant conclusions and actionable insights by using established techniques, data analytics contributes significantly to the growth and success of IoT applications and investments. Companies must grasp DT and be prepared to redesign their offerings and business models to remain competitive in today’s marketplace. As there are many IoT solutions available today, the amount of data is tremendous. The challenge for companies is to understand what solutions to focus on and how to prioritise and which data to differentiate from the competition. This paper explains how IoT and data analytics can impact competitive advantage and how companies should approach IoT and data analytics to translate them into concrete offerings and solutions in the smart city context. The study was carried out as a qualitative, literature-based research. A case study is provided to validate the preservation of company’s competitive advantage through smart city solutions. The results of the research contribution provide insights into the different factors and considerations related to creating competitive advantage through IoT and data analytics deployment in the smart city context. Furthermore, this paper proposes a framework that merges the factors and considerations with examples of offerings and solutions in smart cities. The data collected through IoT devices, and the intelligent use of it, can create competitive advantage to companies operating in smart city business. Companies should take into consideration the five forces of competition that shape industries and pay attention to the technological, organisational, and external contexts which define factors for consideration of competitive advantages in the field of IoT and data analytics. Companies that can utilise these key assets in their businesses will most likely conquer the markets and have a strong foothold in the smart city business.

Keywords: data analytics, smart cities, competitive advantage, internet of things

Procedia PDF Downloads 111
1075 Electronic Resources and Information Literacy in Higher Education Library

Authors: Nirmal Singh, Rajesh Kumar

Abstract:

Abstract- Information literacy aims to develop both critical understanding and active participation in scholars. It enables scholars to interpret and make informed judgments as users of information sources, and it also enables them to become producers of information in their own right, and thereby to become more powerful participants in society. Information literacy is about developing people‘s critical and creative abilities. Digital media – and particularly the Internet – significantly increase the potential for such active participation of the individual, provided scholars have the means and training to effectively access and use them. This paper provides definition, standards and importance of information literacy (IL). Keywords: Information literacy, Digital Media, Training, Communications Technologies.

Keywords: Information literacy, Digital Media, Training, , Communications Technologies

Procedia PDF Downloads 133
1074 Comparison of the Amount of Resources and Expansion Support Policy of Photovoltaic Power Generation: A Case on Hokkaido and Aichi Prefecture, Japan

Authors: Hiroaki Sumi, Kiichiro Hayashi

Abstract:

Now, the use of renewable energy power generation has been advanced. In this paper, we compared the expansion support policy of photovoltaic power generation which was researched using The internet and the amount of resource for photovoltaic power generation which was estimated using the NEDO formula in the municipality level in Hokkaido and Aichi Prefecture, Japan. This paper will contribute to grasp the current situation especially about the policy. As a result, there were municipalities which seemed to be no consideration of the amount of resources. We think it would need to consider the suitability between the policies and resources.

Keywords: photovoltaic power generation, dissemination and support policy, amount of resources, Japan

Procedia PDF Downloads 544
1073 The Use of Computer-Aided Design in Small Contractors in a Local Area of Korea

Authors: Myunghoun Jang

Abstract:

A survey of small-size contractors in Jeju was conducted to investigate college graduate's computer-aided design (CAD) competence. Most of small-size contractors use CAD software to review and update drawings submitted from an architect. This research analyzed the curriculum of the architectural engineering in several national universities. The CAD classes have 4 or 6 hours per week and use AutoCAD primarily. This paper proposes that a CAD class needs 6 hours per week, 2D drawing is the main theme in the curriculum, and exercises to make 3D models are also included in the CAD class. An improved method, for example Internet cafe and real time feedbacks using smartphones, to evaluate the reports and exercise results is necessary.

Keywords: CAD (Computer Aided Design), CAD education, education improvement, small-size contractor

Procedia PDF Downloads 253
1072 Development of Modular Shortest Path Navigation System

Authors: Nalinee Sophatsathit

Abstract:

This paper presents a variation of navigation systems which tallies every node along the shortest path from start to destination nodes. The underlying technique rests on the well-established Dijkstra Algorithm. The ultimate goal is to serve as a user navigation guide that furnishes stop over cost of every node along this shortest path, whereby users can decide whether or not to visit any specific nodes. The output is an implementable module that can be further refined to run on the Internet and smartphone technology. This will benefit large organizations having physical installations spreaded over wide area such as hospitals, universities, etc. The savings on service personnel, let alone lost time and unproductive work, are attributive to innovative navigation system management.

Keywords: navigation systems, shortest path, smartphone technology, user navigation guide

Procedia PDF Downloads 315
1071 Stimulating Effects of Media in Improving Quality of Distance Education: A Literature Based Study

Authors: Tahzeeb Mahreen

Abstract:

Distance education refers to giving instruction in which students are remote from the institution and once in a while go to formal demonstration classes, and teaching sessions. Segments of media, for example, radio, TV, PC and Internet and so on are the assets and method for correspondence being utilized as a part of learning material by many open and distance learning institutions. Media has a great part in maximizing the learning opportunities thus enabling distance education, a mode of increased literacy rate of the country. This study goes for analyzing how media had affected distance education through its different mediums. The objectives of the study were (i) to determine the direct impact of media on distance education? (ii) To know how media effects distance education pedagogy (iii) To find out how media works to increase student’s achievement. Literature-based methodology was used, and books, peer-reviewed articles, press reports and internet-based materials were studied as a result. By using descriptive qualitative research analysis, the researcher has interpreted that distance education programs are progressively utilizing mixes of media to convey training that has a positive impact on learning along with a few challenges. In addition, the perception of the researcher varied depending on the programs of distance learning but generally believed that electronic media were moderately more supportive in enhancing the overall performance of the learners. It was concluded that the intellectual style, identity qualities, and self-expectations are the three primary enhanced areas in a student’s educational life in distance education programs. It was portrayed that a comprehension of how individual learners approach learning may make it workable for the distance educator to see an example of learning styles and arrange or modify course presentations through media. Moreover, it is noticed that teaching in distance education address the developing role of the instructor, the requirement for diminishing resistance as conventional teachers utilize remove conveyance frameworks lastly, staff state of mind toward the utilization of innovation. Furthermore, the results showed that media had assumed its part to make distance learning educators more dynamic, capable and concerned about their individual works. The study also indicated a high positive relationship between the media available at study centers and media used by the distance education. The challenge pointed out by the researcher was the clash of distance and time with communication as the life situations of every learner are varied. Recommendations included the realization of the duty of distance learning instructor to help students understand the effective use of media for their study lessons and also to develop online learning communities to be in instant connection with the students.

Keywords: distance education, education, media, teaching and learning

Procedia PDF Downloads 125
1070 Assessment of the Number of Damaged Buildings from a Flood Event Using Remote Sensing Technique

Authors: Jaturong Som-ard

Abstract:

The heavy rainfall from 3rd to 22th January 2017 had swamped much area of Ranot district in southern Thailand. Due to heavy rainfall, the district was flooded which had a lot of effects on economy and social loss. The major objective of this study is to detect flooding extent using Sentinel-1A data and identify a number of damaged buildings over there. The data were collected in two stages as pre-flooding and during flood event. Calibration, speckle filtering, geometric correction, and histogram thresholding were performed with the data, based on intensity spectral values to classify thematic maps. The maps were used to identify flooding extent using change detection, along with the buildings digitized and collected on JOSM desktop. The numbers of damaged buildings were counted within the flooding extent with respect to building data. The total flooded areas were observed as 181.45 sq.km. These areas were mostly occurred at Ban khao, Ranot, Takhria, and Phang Yang sub-districts, respectively. The Ban khao sub-district had more occurrence than the others because this area is located at lower altitude and close to Thale Noi and Thale Luang lakes than others. The numbers of damaged buildings were high in Khlong Daen (726 features), Tha Bon (645 features), and Ranot sub-district (604 features), respectively. The final flood extent map might be very useful for the plan, prevention and management of flood occurrence area. The map of building damage can be used for the quick response, recovery and mitigation to the affected areas for different concern organization.

Keywords: flooding extent, Sentinel-1A data, JOSM desktop, damaged buildings

Procedia PDF Downloads 170
1069 Knowledge Management for Competitiveness and Performances in Higher Educational Institutes

Authors: Jeyarajan Sivapathasundram

Abstract:

Knowledge management has been recognised as an emerging factor for being competitive among institutions and performances in firms. As such, being recognised as knowledge rich institution, higher education institutes have to be recognised knowledge management based resources for achieving competitive advantages. Present research picked result out of postgraduate research conducted in knowledge management at non-state higher educational institutes of Sri Lanka. Besides, the present research aimed to discover knowledge management for competition and firm performances of higher educational institutes out of the result produced by the postgraduate study. Besides, the results are found in a pair that developed out of knowledge management practices and the reason behind the existence of the practices. As such, the present research has developed a filter to pick the pairs that satisfy its condition of competition and performance of the firm. As such, the pair, such as benchmarking is practised to be ethically competing through conducting courses. As the postgraduate research tested results of foreign researches in a qualitative paradigm, the finding of the present research are generalise fact for knowledge management for competitiveness and performances in higher educational institutes. Further, the presented research method used attributes which explain competition and performance in its filter to discover the pairs relevant to competition and performances. As such, the fact in regards to knowledge management for competition and performances in higher educational institutes are presented in the publication that the presentation is out of the generalised result. Therefore, knowledge management for competition and performance in higher educational institutes are generalised.

Keywords: competition in and among higher educational institutes, performances of higher educational institutes, noun based filtering, production out of generalisation of a research

Procedia PDF Downloads 120
1068 Assess the Risk Behaviours and Safer Sex Practices among Male Attendees in a Sexual Health Setting

Authors: B. M. M. D. Mendis, L. I. Rajapaksa, P. S. K. Gunathunga, R. C. Fernando, M. Jayalath

Abstract:

Background / introduction: During the year 2011, 8511 males received services from the sexual health clinics island wide. At present there is only limited information on the risk behaviours of male attendees. Information on risk behaviours related to STI /HIV transmission is helpful in planning suitable prevention interventions. Aim(s)/objectives: The objectives were to determines the sexual partners (other than the marital partner and regular partners) responsible for transmitting STI( Sexually transmitted infections)/ HIV and to understand the practice of safer sex. Methods: Study was a clinic based prospective study conducted for a one year period using an interviewer administered questionnaire. Results: 983 attendees were interviewed. . Mean age was 34.02 years. 75% of the sample had completed GCE O/L (ordinary level examination). Skilled labourers, drivers and forces/police comprised 40% of the sample. 50% admitted sex with a casual female, 12% with a casual male, and 13% with CSW (commercial sex workers) while MSW (male sex workers) exposures were minimal. It was identified that younger males had more contacts with males, and regular female partners while more older males with CSW. Anal sex among males was reported by 11.5%. 20.5% used alcohol frequently and 5.9% used drugs and 1.4% injected. Common STI were genital herpes (7.9%), Non gonococcal urethritis (6.2%) and gonorrhoea (6.2%). Among those who had contacts with FSW 6.7% gonorrhoea (GC), 8.2% non gonococcal urethritis (NGU), 7.5% genital herpes and 0.7% HIV. Non regular partner exposures 3.7% had gonorrhoea, 8.3% NGU, 6.6% genital herpes and 0.8% HIV. Among MSM contacts 10.6% had GC, 4.5% NGU, 5.3% genital herpes, 5.3% secondary syphilis and 0.8% HIV. Only 9.0% used condoms correctly. Friends, doctors, newspapers, internet, and forces were important sources of information on condoms. Non use of condoms were due to worry about satisfaction (24.6%) and faith in the partner (25.6%). Discussion/conclusion: Casual partners for unsafe sex is a concern. MSM and CSW are remained as an important source of infection. Early Syphilis and gonorrhoea infections were mostly seen among MSM exposures. The findings indicate that the male population in the sample had satisfactory education. However, still the unsafe sexual contacts are common. . Newspapers, internet were more important sources of information on condoms. Low condom use remains another concern.. More males contracted STI through casual partners. Therefore strategies used for prevention need to be revisited also emphasizing on general population where casual partners represent. . Increasing awareness of men and women through mass media and primary health care teams may be important strategies that can be used to keep the HIV epidemic in a low level.

Keywords: STI, HIV, Males, safe sex practices

Procedia PDF Downloads 321
1067 Complex Event Processing System Based on the Extended ECA Rule

Authors: Kwan Hee Han, Jun Woo Lee, Sung Moon Bae, Twae Kyung Park

Abstract:

ECA (Event-Condition-Action) languages are largely adopted for event processing since they are an intuitive and powerful paradigm for programming reactive systems. However, there are some limitations about ECA rules for processing of complex events such as coupling of event producer and consumer. The objective of this paper is to propose an ECA rule pattern to improve the current limitations of ECA rule, and to develop a prototype system. In this paper, conventional ECA rule is separated into 3 parts and each part is extended to meet the requirements of CEP. Finally, event processing logic is established by combining the relevant elements of 3 parts. The usability of proposed extended ECA rule is validated by a test scenario in this study.

Keywords: complex event processing, ECA rule, Event processing system, event-driven architecture, internet of things

Procedia PDF Downloads 516
1066 A Non-Invasive Blood Glucose Monitoring System Using near-Infrared Spectroscopy with Remote Data Logging

Authors: Bodhayan Nandi, Shubhajit Roy Chowdhury

Abstract:

This paper presents the development of a portable blood glucose monitoring device based on Near-Infrared Spectroscopy. The system supports Internet connectivity through WiFi and uploads the time series data of glucose concentration of patients to a server. In addition, the server is given sufficient intelligence to predict the future pathophysiological state of a patient given the current and past pathophysiological data. This will enable to prognosticate the approaching critical condition of the patient much before the critical condition actually occurs.The server hosts web applications to allow authorized users to monitor the data remotely.

Keywords: non invasive, blood glucose concentration, microcontroller, IoT, application server, database server

Procedia PDF Downloads 200
1065 Ecological Implication of Air Pollution From Quarrying and Stone Cutting Industries on Agriculture and Plant Biodiversity Around Quarry Sites in Mpape, Bwari Area Council, FCT, Abuja

Authors: Muhammed Rabiu, Moses S. Oluyomi, Joshua Olorundare

Abstract:

Quarry activities are important to modern day life and the socio-economic development of local communities. Unfortunately, this industry is usually associated with air pollution. To assess the impact of quarry dust on plant biodiversity and agriculture, PM2.5, PM10 and some meteorological parameters were measured using Gas analyzer, handheld thermometer and Multifunction Anemometer (PCE-EM 888) as well as taking a social survey. High amount of particulate matters that exceeded the international standard were recorded at the study locations which include the Julius Berger Quarry and 1km away from the quarry site which serve as the base for the farmlands. The correlation coefficient between the particulate matters with the meteorological parameters of the locations all show a strong relationship with temperature recording a stronger value of 0.952 and 0.931 for PM2.5 and PM10 respectively. Similarly, the coefficient of determination 0.906 and 0.866 shows that temperature has the highest meteorological percentage variation on PM2.5 and PM10. Furthermore, a notable negative impact of quarrying on plant biodiversity and local farm crops are also revealed based on respondents’ results where wide range of local plants were affected with Maize and Azadiracta indica (Neem) been the most with respondent of 31.5% and 27.5%. According to the obtained results, it is highly recommended to develop green belt surrounding the quarrying using pollutant-tolerant trees (usually with broad leaves) in order to restrict spreading of quarrying dust via intercepting, filtering and absorbing pollutants.

Keywords: agriculture, air pollution, biodiversity, quarry

Procedia PDF Downloads 67
1064 Information Overload, Information Literacy and Use of Technology by Students

Authors: Elena Krelja Kurelović, Jasminka Tomljanović, Vlatka Davidović

Abstract:

The development of web technologies and mobile devices makes creating, accessing, using and sharing information or communicating with each other simpler every day. However, while the amount of information constantly increasing it is becoming harder to effectively organize and find quality information despite the availability of web search engines, filtering and indexing tools. Although digital technologies have overall positive impact on students’ lives, frequent use of these technologies and digital media enriched with dynamic hypertext and hypermedia content, as well as multitasking, distractions caused by notifications, calls or messages; can decrease the attention span, make thinking, memorizing and learning more difficult, which can lead to stress and mental exhaustion. This is referred to as “information overload”, “information glut” or “information anxiety”. Objective of this study is to determine whether students show signs of information overload and to identify the possible predictors. Research was conducted using a questionnaire developed for the purpose of this study. The results show that students frequently use technology (computers, gadgets and digital media), while they show moderate level of information literacy. They have sometimes experienced symptoms of information overload. According to the statistical analysis, higher frequency of technology use and lower level of information literacy are correlated with larger information overload. The multiple regression analysis has confirmed that the combination of these two independent variables has statistically significant predictive capacity for information overload. Therefore, the information science teachers should pay attention to improving the level of students’ information literacy and educate them about the risks of excessive technology use.

Keywords: information overload, computers, mobile devices, digital media, information literacy, students

Procedia PDF Downloads 260
1063 Prosperous Digital Image Watermarking Approach by Using DCT-DWT

Authors: Prabhakar C. Dhavale, Meenakshi M. Pawar

Abstract:

In this paper, everyday tons of data is embedded on digital media or distributed over the internet. The data is so distributed that it can easily be replicated without error, putting the rights of their owners at risk. Even when encrypted for distribution, data can easily be decrypted and copied. One way to discourage illegal duplication is to insert information known as watermark, into potentially valuable data in such a way that it is impossible to separate the watermark from the data. These challenges motivated researchers to carry out intense research in the field of watermarking. A watermark is a form, image or text that is impressed onto paper, which provides evidence of its authenticity. Digital watermarking is an extension of the same concept. There are two types of watermarks visible watermark and invisible watermark. In this project, we have concentrated on implementing watermark in image. The main consideration for any watermarking scheme is its robustness to various attacks

Keywords: watermarking, digital, DCT-DWT, security

Procedia PDF Downloads 410
1062 Sources of Water Supply and Water Quality for Local Consumption: The Case Study of Eco-Tourism Village, Suan Luang Sub- District Municipality, Ampawa District, Samut Songkram Province, Thailand

Authors: Paiboon Jeamponk, Tasanee Ponglaa, Patchapon Srisanguan

Abstract:

The aim of this research paper was based on an examination of sources of water supply and water quality for local consumption, conducted at eco-tourism villages of Suan Luang Sub- District Municipality of Amphawa District, Samut Songkram Province. The study incorporated both questionnaire and field work of water testing as the research tool and method. The sample size of 288 households was based on the population of the district, whereas the selected sample water sources were from 60 households: 30 samples were ground water and another 30 were surface water. Degree of heavy metal contamination in the water including copper, iron, manganese, zinc, cadmium and lead was investigated utilizing the Atomic Absorption- Direct Aspiration method. The findings unveiled that 96.0 percent of household water consumption was based on water supply, while the rest on canal, river and rain water. The household behaviour of consumption revealed that 47.2 percent of people routinely consumed water without boiling or filtering prior to consumption. The investigation of water supply quality found that the degree of heavy metal contamination including metal, lead, iron, copper, manganese and cadmium met the standards of the Department of Health.

Keywords: sources of water supply, water quality, water supply, Thailand

Procedia PDF Downloads 282
1061 Design of Digital IIR Filter Using Opposition Learning and Artificial Bee Colony Algorithm

Authors: J. S. Dhillon, K. K. Dhaliwal

Abstract:

In almost all the digital filtering applications the digital infinite impulse response (IIR) filters are preferred over finite impulse response (FIR) filters because they provide much better performance, less computational cost and have smaller memory requirements for similar magnitude specifications. However, the digital IIR filters are generally multimodal with respect to the filter coefficients and therefore, reliable methods that can provide global optimal solutions are required. The artificial bee colony (ABC) algorithm is one such recently introduced meta-heuristic optimization algorithm. But in some cases it shows insufficiency while searching the solution space resulting in a weak exchange of information and hence is not able to return better solutions. To overcome this deficiency, the opposition based learning strategy is incorporated in ABC and hence a modified version called oppositional artificial bee colony (OABC) algorithm is proposed in this paper. Duplication of members is avoided during the run which also augments the exploration ability. The developed algorithm is then applied for the design of optimal and stable digital IIR filter structure where design of low-pass (LP) and high-pass (HP) filters is carried out. Fuzzy theory is applied to achieve maximize satisfaction of minimum magnitude error and stability constraints. To check the effectiveness of OABC, the results are compared with some well established filter design techniques and it is observed that in most cases OABC returns better or atleast comparable results.

Keywords: digital infinite impulse response filter, artificial bee colony optimization, opposition based learning, digital filter design, multi-parameter optimization

Procedia PDF Downloads 459
1060 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 13
1059 Simulation of the Collimator Plug Design for Prompt-Gamma Activation Analysis in the IEA-R1 Nuclear Reactor

Authors: Carlos G. Santos, Frederico A. Genezini, A. P. Dos Santos, H. Yorivaz, P. T. D. Siqueira

Abstract:

The Prompt-Gamma Activation Analysis (PGAA) is a valuable technique for investigating the elemental composition of various samples. However, the installation of a PGAA system entails specific conditions such as filtering the neutron beam according to the target and providing adequate shielding for both users and detectors. These requirements incur substantial costs, exceeding $100,000, including manpower. Nevertheless, a cost-effective approach involves leveraging an existing neutron beam facility to create a hybrid system integrating PGAA and Neutron Tomography (NT). The IEA-R1 nuclear reactor at IPEN/USP possesses an NT facility with suitable conditions for adapting and implementing a PGAA device. The NT facility offers a thermal flux slightly colder and provides shielding for user protection. The key additional requirement involves designing detector shielding to mitigate high gamma ray background and safeguard the HPGe detector from neutron-induced damage. This study employs Monte Carlo simulations with the MCNP6 code to optimize the collimator plug for PGAA within the IEA-R1 NT facility. Three collimator models are proposed and simulated to assess their effectiveness in shielding gamma and neutron radiation from nucleon fission. The aim is to achieve a focused prompt-gamma signal while shielding ambient gamma radiation. The simulation results indicate that one of the proposed designs is particularly suitable for the PGAA-NT hybrid system.

Keywords: MCNP6.1, neutron, prompt-gamma ray, prompt-gamma activation analysis

Procedia PDF Downloads 49
1058 Strategies to Enhance Export Performance of Thai Furniture Industry

Authors: Khomsan Laosillapacharoen

Abstract:

This research paper was aimed to analyze the current situation of the furniture industry and embark a plan to enhance the export volume of Thai furniture. This is a qualitative research which utilized meta-analysis and focus group. A total of 24 experts in both government and private sectors were interviewed. The findings revealed that Thai furniture had some advantages of access to raw material, high quality of labors, and have a unique skill. However, the threat included a tendency to have more foreign competitors in domestic market. In addition, the strategies to enhance the level of export included increase the standard quality of Thai furniture, offer new and modern designs, use marketing on the internet, use modern technology, and gain tax incentive from the government.

Keywords: export, furniture, strategies, marketing

Procedia PDF Downloads 386
1057 A Review of the Fundamental Principles of the National Transport Policy and Developmental Implementation Programmes

Authors: Charles Asenime, Asaju Joel, Fagbenro Abiola, Adetoyese Oguntimehin, Agosu Rebecca

Abstract:

This paper examines the fundamental principles of the National Transport Policy (NTP) and determined its role in the execution of transport projects, and the establishment of ministries, departments, and agencies. Data used for the paper are from secondary sources of commissioned reports, studies, internet sources, and government releases. Results of the analysis show that the draft NTP has been used to establish transport schemes, master plans, and transport infrastructure. The paper concludes that though, the national transport Policy is still in a draft form, its production, however, has shaped the transport system in Nigeria and has shown how transport has improved the economy through the efficient utilisation of resources, improved mobility, and lifestyle.

Keywords: principles, draft, system, resources

Procedia PDF Downloads 116
1056 Using Educational Gaming as a Blended Learning Tool in South African Education

Authors: Maroonisha Maharajh

Abstract:

Based on the Black Swan and Disruptive Innovation Theories, this study proposes an educational game based learning model within the context of the traditional classroom learning environment. In the proposed model, the perceived e-learning component is decomposed into accessibility, perceived quality and perceived usability within the traditional rural classroom environment. A sample of 92 respondents took part in this study. The results suggest that users’ continuance intention is determined by both economic and grassroots internet accessibility, which in turn is jointly determined by perceived usefulness, information quality, service quality, system quality, perceived ease of use and cognitive absorption of learning.

Keywords: blended learning, flipped classroom, e-learning, gaming

Procedia PDF Downloads 236
1055 Information Technology in Assessing Risks and Threats in the Transition of the Brand to the Digital Environment

Authors: Spanova Yerkezhan, Amantay Ayan, Alimzhanova Laura

Abstract:

This article discusses the concept of rebranding and its relationship to cybersecurity. Rebranding is the process of changing the appearance and image of a company or organization in order to appeal to new customers or change the perception of a company. It can be a powerful tool for businesses looking to renew their reputation or expand into new markets. In today's digital age, companies increasingly rely on technology and the internet to conduct business; rebranding can also present significant cybersecurity risks. This is because a rebranding effort can create new vulnerabilities for companies, particularly in terms of their online presence. This article explores the potential hazards associated with rebranding and provides recommendations for mitigating those risks. It also highlights the importance of considering cybersecurity in the rebranding process and how it can be integrated into the overall strategy for a successful and secure rebranding.

Keywords: rebranding, cybersecurity, cyberattack, logo, vulnerability

Procedia PDF Downloads 146
1054 A Systematic Literature Review on the Prevalence of Academic Plagiarism and Cheating in Higher Educational Institutions

Authors: Sozon, Pok Wei Fong, Sia Bee Chuan, Omar Hamdan Mohammad

Abstract:

Owing to the widespread phenomenon of plagiarism and cheating in higher education institutions (HEIs), it is now difficult to ensure academic integrity and quality education. Moreover, the COVID-19 pandemic has intensified the issue by shifting educational institutions into virtual teaching and assessment mode. Thus, there is a need to carry out an extensive and holistic systematic review of the literature to highlight plagiarism and cheating in both prevalence and form among HEIs. This paper systematically reviews the literature concerning academic plagiarism and cheating in HEIs to determine the most common forms and suggest strategies for resolution and boosting the academic integrity of students. The review included 45 articles and publications for the period from February 12, 2018, to September 12, 2022, in the Scopus database aligned with the Systematic Review and Meta-Analysis (PRISMA) guidelines in the selection, filtering, and reporting of the papers for review from which a conclusion can be drawn. Based on the results, out of the studies reviewed, 48% of the quantitative results of students were plagiarized and obtained through cheating, with 84% coming from the fields of Humanities. Moreover, Psychology and Social Sciences studies accumulated 9% and 7% articles respectively. Based on the results, individual factors, institutional factors, and social and cultural factors have contributed to plagiarism and cheating cases in HEIs. The resolution of this issue can be the establishment of ethical and moral development initiatives and modern academic policies and guidelines supported by technological strategies of testing.

Keywords: plagiarism, cheating, systematic review, academic integrity

Procedia PDF Downloads 49
1053 Leading People in a Digital Era: A Theoretical Study of Challenges and Opportunities of Online Networking Platforms

Authors: Pawel Korzynski

Abstract:

Times where leaders communicate mainly while walking along the hallways have passed away. Currently, millennials, people that were born between the early 1980s and the early 2000s, extensively use applications based on Web 2.0 model that assumes content creation and edition by all Internet users in a collaborative fashion. Leaders who are willing to engage their subordinates in a digital era, increasingly often use above-mentioned applications. This paper discusses challenges and opportunities that are related to leaders’ online networking. First, online networking-related terms that appeared in literature are analyzed. Then, types of online networking platforms for leaders and ways how these platforms can be used are discussed. Finally, several trends in online networking studies and extrapolation of some findings to leadership are explained.

Keywords: social media, digital era, leadership, online networking

Procedia PDF Downloads 280
1052 Usability Evaluation of Four Big e-Commerce Websites in Indonesia

Authors: Harry B. Santoso, Lia Sadita, Firlia Sandyta, Musa Alfatih, Nove Spalo, Nu'man Naufal, Nuryahya P. Utomo, Putu A. Paramatha, Rezka Aufar Leonandya, Tommy Anugrah, Aulia Chairunisa, M. Fadly Uzzaki, Riandy D. Banimahendra

Abstract:

The numbers of Internet active users in Indonesia reach out over 88.1 million, where 48% of them are daily active users. Seeing these numbers, it is the best opportunity for IT companies to grow their business, especially e-Commerce. In fact, the growth of e-Commerce companies in Indonesia is proportional with internet daily active users. This phenomenon shows that competition happening among the e-Commerce companies is raising high. It triggers many e-Commerce companies to improve their services. The authors hypothesized that one of the best ways to improve the services is by improving their usability. So, the authors had done a study to evaluate and find out ways to improve usability of those e-Commerce websites. The authors chose four e-Commerce websites which each of them has different business focus and profiles. Each company is labeled as A, B, C, and D. Company A is a fashion-based e-Commerce services with two-million desktop visits Indonesia. Company B is an international online shopping mall for everyday appliances with 48,3-million desktop visits in Indonesia. Company C is a localized online shopping mall with 3,2-million desktop visits in Indonesia. Company D is an online shopping mall with one-million desktop visits in Indonesia. Writers used popular web traffic analytics platform to gain the numbers. There are some approaches to evaluate the usability of e-Commerce websites. In this study, the authors used usability testing method supported by the User Experience Questionnaire. This method involved the user in interacting directly with the services provided by the e-Commerce company. This study was conducted within two months including preparation, data collection, data analysis, and reporting. We used a pair of computers, a screen-capture video application named Smartboard, and User Experience Questionnaire. A team was built to conduct this study. They consisted of one supervisor, two assistants, four facilitators and four observers. For each e-Commerce, three users aged 17-25 years old were invited to do five task scenarios. Data collected in this study included demographic information of the users, usability testing results, and users’ responses to the questionnaire. Some findings were revealed from the usability testing and the questionnaire. Compared to the other three companies, Company D had the least score for the experiences. One of the most painful issues figured out by the authors from the evaluation was most users claimed feeling confused by user interfaces in these e-Commerce websites. We believe that this study will help e-Commerce companies to improve their services and business in the future.

Keywords: e-commerce, evaluation, usability testing, user experience

Procedia PDF Downloads 297
1051 The Role of Demographics and Service Quality in the Adoption and Diffusion of E-Government Services: A Study in India

Authors: Sayantan Khanra, Rojers P. Joseph

Abstract:

Background and Significance: This study is aimed at analyzing the role of demographic and service quality variables in the adoption and diffusion of e-government services among the users in India. The study proposes to examine the users' perception about e-Government services and investigate the key variables that are most salient to the Indian populace. Description of the Basic Methodologies: The methodology to be adopted in this study is Hierarchical Regression Analysis, which will help in exploring the impact of the demographic variables and the quality dimensions on the willingness to use e-government services in two steps. First, the impact of demographic variables on the willingness to use e-government services is to be examined. In the second step, quality dimensions would be used as inputs to the model for explaining variance in excess of prior contribution by the demographic variables. Present Status: Our study is in the data collection stage in collaboration with a highly reliable, authentic and adequate source of user data. Assuming that the population of the study comprises all the Internet users in India, a massive sample size of more than 10,000 random respondents is being approached. Data is being collected using an online survey questionnaire. A pilot survey has already been carried out to refine the questionnaire with inputs from an expert in management information systems and a small group of users of e-government services in India. The first three questions in the survey pertain to the Internet usage pattern of a respondent and probe whether the person has used e-government services. If the respondent confirms that he/she has used e-government services, then an aggregate of 15 indicators are used to measure the quality dimensions under consideration and the willingness of the respondent to use e-government services, on a five-point Likert scale. If the respondent reports that he/she has not used e-government services, then a few optional questions are asked to understand the reason(s) behind the same. Last four questions in the survey are dedicated to collect data related to the demographic variables. An indication of the Major Findings: Based on the extensive literature review carried out to develop several propositions; a research model is prescribed to start with. A major outcome expected at the completion of the study is the development of a research model that would help to understand the relationship involving the demographic variables and service quality dimensions, and the willingness to adopt e-government services, particularly in an emerging economy like India. Concluding Statement: Governments of emerging economies and other relevant agencies can use the findings from the study in designing, updating, and promoting e-government services to enhance public participation, which in turn, would help to improve efficiency, convenience, engagement, and transparency in implementing these services.

Keywords: adoption and diffusion of e-government services, demographic variables, hierarchical regression analysis, service quality dimensions

Procedia PDF Downloads 249
1050 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 40
1049 Cooperative Communication of Energy Harvesting Synchronized-OOK IR-UWB Based Tags

Authors: M. A. Mulatu, L. C. Chang, Y. S. Han

Abstract:

Energy harvesting tags with cooperative communication capabilities are emerging as possible infrastructure for internet of things (IoT) applications. This paper studies about the \ cooperative transmission strategy for a network of energy harvesting active networked tags (EnHANTs), that is adapted to the available energy resource and identification request. We consider a network of EnHANT-equipped objects to communicate with the destination either directly or by cooperating with neighboring objects. We formulate the the problem as a Markov decision process (MDP) under synchronised On/Off keying (S-OOK) pulse modulation format. The simulation results are provided to show the the performance of the cooperative transmission policy and compared against the greedy and conservative policies of single-link transmission.

Keywords: cooperative communication, transmission strategy, energy harvesting, Markov decision process, value iteration

Procedia PDF Downloads 477