Search results for: Internet of Thing
890 Cursive Handwriting in an Internet Age
Authors: Karen Armstrong
Abstract:
Recent concerns about the value of teaching cursive handwriting in the classroom are based on the belief that cursive handwriting or penmanship is an outdated and unnecessary skill in today’s online world. The discussion of this issue begins with a description of current initiatives to eliminate handwriting instruction in schools. This is followed by a brief history of cursive writing through the ages. Next considered is a description of its benefits as a preliminary process for younger children as compared with immediate instruction in keyboarding, particularly in the areas of vision, cognition, motor skills and automatic fluency. Also considered, is cursive’s companion, paper itself, and the impact of a paperless, “screen and keyboard” environment. The discussion concludes with a consideration of the unique contributions of cursive and keyboarding as written forms of communication, along with their respective surfaces, paper and screen. Finally, an assessment of the practical utility of each skill is followed by an informal assessment of what is lost and what remains as we move from a predominantly paper and pen world of handwriting to texting and keyboarding in an environment of screens.Keywords: asemic writing, cursive, handwriting, keyboarding, paper
Procedia PDF Downloads 262889 E-Hailing Taxi Industry Management Mode Innovation Based on the Credit Evaluation
Authors: Yuan-lin Liu, Ye Li, Tian Xia
Abstract:
There are some shortcomings in Chinese existing taxi management modes. This paper suggests to establish the third-party comprehensive information management platform and put forward an evaluation model based on credit. Four indicators are used to evaluate the drivers’ credit, they are passengers’ evaluation score, driving behavior evaluation, drivers’ average bad record number, and personal credit score. A weighted clustering method is used to achieve credit level evaluation for taxi drivers. The management of taxi industry is based on the credit level, while the grade of the drivers is accorded to their credit rating. Credit rating determines the cost, income levels, the market access, useful period of license and the level of wage and bonus, as well as violation fine. These methods can make the credit evaluation effective. In conclusion, more credit data will help to set up a more accurate and detailed classification standard library.Keywords: credit, mobile internet, e-hailing taxi, management mode, weighted cluster
Procedia PDF Downloads 303888 Interactive and Innovative Environments for Modeling Digital Educational Games and Animations
Authors: Ida Srdić, Luka Mandić, LidijaMandić
Abstract:
Digitization and intensive use of tablets, smartphones, the internet, mobile, and web applications have massively disrupted our habits, and the way audiences (especially youth) consume content. To introduce educational content in games and animations, and at the same time to keep it interesting and compelling for kids, is a challenge. In our work, we are comparing the different possibilities and potentials that digital games could provide to successfully mitigate direct connection with education. We analyze the main directions and educational methods in game-based learning and the possibilities of interactive modeling through questionnaires for user experience and requirements. A pre and post-quantitative survey will be conducted in order to measure levels of objective knowledge as well as the games perception. This approach enables quantitative and objective evaluation of the impact the game has on participants. Also, we will discuss the main barriers to the use of games in education and how games can be best used for learning.Keywords: Bloom’s taxonomy, epistemic games, learning objectives, virtual learning environments
Procedia PDF Downloads 77887 Semi-automatic Design and Fabrication of Ring-Bell Control by IoT
Authors: Samart Rungjarean, Benchalak Muangmeesri, Dechrit Maneetham
Abstract:
Monks' and Novices' chimes may have some restrictions, such as during the rain when a structure or location chimes or at a certain period. Alternately, certain temple bells may be found atop a tall, difficult-to-reach bell tower. As a result, the concept of designing a brass bell for use with a mobile phone over great distances was proposed. The Internet of Things (IoT) system will be used to regulate the bell by testing each of the three beatings with a wooden head. A stone-beating head and a steel beater. The sound resonates nicely, with the distance and rhythm of the hit contributing to this. An ESP8266 microcontroller is used by the control system to manage its operations and will communicate with the pneumatic system to convey a signal. Additionally, a mobile phone will be used to operate the entire system. In order to precisely direct and regulate the rhythm, There is a resonance of roughly 50 dB for this test, and the operating distance can be adjusted. Timing and accuracy were both good.Keywords: automatic ring-bell, microcontroller, ring-bell, iot
Procedia PDF Downloads 92886 Auteur 3D Filmmaking: From Hitchcock’s Protrusion Technique to Godard’s Immersion Aesthetic
Authors: Delia Enyedi
Abstract:
Throughout film history, the regular return of 3D cinema has been discussed in connection to crises caused by the advent of television or the competition of the Internet. In addition, the three waves of stereoscopic 3D (from 1952 up to 1983) and its current digital version have been blamed for adding a challenging technical distraction to the viewing experience. By discussing the films Dial M for Murder (1954) and Goodbye to Language (2014), the paper aims to analyze the response of recognized auteurs to the use of 3D techniques in filmmaking. For Alfred Hitchcock, the solution to attaining perceptual immersion paradoxically resided in restraining the signature effect of 3D, namely protrusion. In Jean-Luc Godard’s vision, 3D techniques allowed him to explore perceptual absorption by means of depth of field, for which he had long advocated as being central to cinema. Thus, both directors contribute to the foundation of an auteur aesthetic in 3D filmmaking.Keywords: Alfred Hitchcock, authorship, 3D filmmaking, Jean-Luc Godard, perceptual absorption, perceptual immersion
Procedia PDF Downloads 273885 Improving Fingerprinting-Based Localization (FPL) System Using Generative Artificial Intelligence (GAI)
Authors: Getaneh Berie Tarekegn, Li-Chia Tai
Abstract:
With the rapid advancement of artificial intelligence, low-power built-in sensors on Internet of Things devices, and communication technologies, location-aware services have become increasingly popular and have permeated every aspect of people’s lives. Global navigation satellite systems (GNSSs) are the default method of providing continuous positioning services for ground and aerial vehicles, as well as consumer devices (smartphones, watches, notepads, etc.). However, the environment affects satellite positioning systems, particularly indoors, in dense urban and suburban cities enclosed by skyscrapers, or when deep shadows obscure satellite signals. This is because (1) indoor environments are more complicated due to the presence of many objects surrounding them; (2) reflection within the building is highly dependent on the surrounding environment, including the positions of objects and human activity; and (3) satellite signals cannot be reached in an indoor environment, and GNSS doesn't have enough power to penetrate building walls. GPS is also highly power-hungry, which poses a severe challenge for battery-powered IoT devices. Due to these challenges, IoT applications are limited. Consequently, precise, seamless, and ubiquitous Positioning, Navigation and Timing (PNT) systems are crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a novel semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. We also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 0.39 m, and more than 90% of the errors are less than 0.82 m. According to numerical results, SRCLoc improves positioning performance and reduces radio map construction costs significantly compared to traditional methods.Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine
Procedia PDF Downloads 24884 Influence and Dissemination of Solecism among Moroccan High School and University Students
Authors: Rachid Ed-Dali, Khalid Elasri
Abstract:
Mass media seem to provide a rich content for language acquisition. Exposure to television, the Internet, the mobile phone and other technological gadgets and devices helps enrich the student’s lexicon positively as well as negatively. The difficulties encountered by students while learning and acquiring second languages in addition to their eagerness to comprehend the content of a particular program prompt them to diversify their methods so as to achieve their targets. The present study highlights the significance of certain media channels and their involvement in language acquisition with the employment of the Natural Approach to further grasp whether students, especially secondary and high school students, learn and acquire errors through watching subtitled television programs. The chief objective is investigating the deductive and inductive relevance of certain programs beside the involvement of peripheral learning while acquiring mistakes.Keywords: errors, mistakes, Natural Approach, peripheral learning, solecism
Procedia PDF Downloads 105883 Evaluation and Selection of SaaS Product Based on User Preferences
Authors: Boussoualim Nacira, Aklouf Youcef
Abstract:
Software as a Service (SaaS) is a software delivery paradigm in which the product is not installed on-premise, but it is available on Internet and Web. The customers do not pay to possess the software itself but rather to use it. This concept of pay per use is very attractive. Hence, we see increasing number of organizations adopting SaaS. However, each customer is unique, which leads to a very large variation in the requirements off the software. As several suppliers propose SaaS products, the choice of this latter becomes a major issue. When multiple criteria are involved in decision making, we talk about a problem of «Multi-Criteria Decision-Making» (MCDM). Therefore, this paper presents a method to help customers to choose a better SaaS product satisfying most of their conditions and alternatives. Also, we know that a good method of adaptive selection should be based on the correct definition of the different parameters of choice. This is why we started by extraction and analysis the various parameters involved in the process of the selection of a SaaS application.Keywords: cloud computing, business operation, Multi-Criteria Decision-Making (MCDM), Software as a Service (SaaS)
Procedia PDF Downloads 464882 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities
Authors: Mehmet Kargaci
Abstract:
Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning
Procedia PDF Downloads 320881 Utilizing IoT for Waste Collection: A Review of Technologies for Eco-Friendly Waste Management
Authors: Fatemehsadat Mousaviabarbekouh
Abstract:
Population growth and changing consumption patterns have led to waste management becoming a significant global challenge. With projections indicating that nearly 67% of the Earth's population will live in megacities by 2050, there is a pressing need for smart solutions to address citizens' demands. Waste collection, facilitated by the Internet of Things (IoT), offers an efficient and cost-effective approach. This study aims to review the utilization of IoT for waste collection and explore technologies that promote eco-friendly waste management. The research focuses on information and communication technologies (ICTs), including spatial, identification, acquisition, and data communication technologies. Additionally, the study examines various energy harvesting technologies to further reduce costs. The findings indicate that the application of these technologies can lead to significant cost savings, energy efficiency, and ultimately reshape the future of waste management.Keywords: waste collection, IoT, smart cities, eco-friendly, information and communication technologies, energy harvesting
Procedia PDF Downloads 82880 Critical Review of Web Content Mining Extraction Mechanisms
Authors: Rabia Bashir, Sajjad Akbar
Abstract:
There is an inevitable demand of web mining due to rapid increase of huge information on the Internet, but the striking variety of web structures has made required content retrieval a difficult task. To counter this issue, Web Content Mining (WCM) emerges as a potential candidate which extracts and integrates suitable resources of data to users. In past few years, research has been done on several extraction techniques for WCM i.e. agent-based, template-based, assumption-based, statistic-based, wrapper-based and machine learning. However, it is still unclear that either these approaches are efficiently tackling the significant challenges of WCM or not. To answer this question, this paper identifies these challenges such as language independency, structure flexibility, performance, automation, dynamicity, redundancy handling, intelligence, relevant content retrieval, and privacy. Further, mapping of these challenges is done with existing extraction mechanisms which helps to adopt the most suitable WCM approach, given some conditions and characteristics at hand.Keywords: content mining challenges, web content mining, web content extraction approaches, web information retrieval
Procedia PDF Downloads 531879 Privacy Preserving Data Publishing Based on Sensitivity in Context of Big Data Using Hive
Authors: P. Srinivasa Rao, K. Venkatesh Sharma, G. Sadhya Devi, V. Nagesh
Abstract:
Privacy Preserving Data Publication is the main concern in present days because the data being published through the internet has been increasing day by day. This huge amount of data was named as Big Data by its size. This project deals the privacy preservation in the context of Big Data using a data warehousing solution called hive. We implemented Nearest Similarity Based Clustering (NSB) with Bottom-up generalization to achieve (v,l)-anonymity. (v,l)-Anonymity deals with the sensitivity vulnerabilities and ensures the individual privacy. We also calculate the sensitivity levels by simple comparison method using the index values, by classifying the different levels of sensitivity. The experiments were carried out on the hive environment to verify the efficiency of algorithms with Big Data. This framework also supports the execution of existing algorithms without any changes. The model in the paper outperforms than existing models.Keywords: sensitivity, sensitive level, clustering, Privacy Preserving Data Publication (PPDP), bottom-up generalization, Big Data
Procedia PDF Downloads 277878 Research into Factors Affecting the Attitudes of University Students towards WeChat Marketing Based on AISAS Mode
Authors: Du Zhiqin
Abstract:
WeChat is an instant messaging service similar to WhatsApp developed by Tencent, one of China's largest and most used Internet service portals. This paper investigates the penetration of WeChat among university students through a questionnaire, analyzes the effect of brand influence, information quality, interactivity, opinions of opinion-leaders, promotion, personal interests on the attitudes of university students towards WeChat marketing. This paper concludes that the penetration rate of WeChat marketing among university students is generally high enough, WeChat has generally been accepted by students as a way for businesses to market their products, and that all the above-mentioned five factors play a positive role in the process of WeChat marketing. It also proposes that businesses could maximize the effect of WeChat marketing by focusing more resources on the increase of brand influence, and the interactivity of WeChat contents and the use of opinions of opinion-leaders.Keywords: WeChat, university students, marketing, AISAS
Procedia PDF Downloads 576877 Importance of Ethics in Cloud Security
Authors: Pallavi Malhotra
Abstract:
This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education
Procedia PDF Downloads 310876 Innovation and Entrepreneurship Skills Attainment for the Growth of Industry: Panacea for Economic Development
Authors: Ademoyegun Olusegun
Abstract:
The advancement of industry in any given state involves a range of processes that entail entrepreneurship and innovative skill attainment, among others, for the development of an economy. This article studied the impact of innovative and entrepreneurship skill attainment as the panacea of the growth of industry for economic development in Nigeria. Content analysis was employed as an instrument on data obtained from secondary resources which include journals, magazines, Workshop Articles, the Internet, interviewing etc. this is preferred because of the absence of sequential data related to entrepreneurship and innovation on sustainable economic growth in Nigeria. The theory of innovative Entrepreneurship was used as a theoretical framework. Findings revealed that Entrepreneurship skill attainment will induce innovation that will accelerate the growth of Industry for the advancement of the Economy. The study recommended that the government should invest adequately in entrepreneurship skill attainment and create an enabling environment for innovation.Keywords: entrepreneurship, innovation, skill attainment, panacea, sustainable development
Procedia PDF Downloads 56875 The Scientific Phenomenon Revealed in the Holy Quran - an Update
Authors: Arjumand Warsy
Abstract:
The Holy Quran was revealed to Prophet Mohammad (May Peace and Blessings of Allah be upon Him) over fourteen hundred years ago, at a time when majority of the people in Arabia were illiterate and very few could read or write. Any knowledge about medicine, anatomy, biology, astronomy, physics, geology, geophysics or other sciences were almost non-existent. Many superstitious and groundless believes were prevalent and these believes were passed down through past generations. At that time, the Holy Quran was revealed and it presented several phenomenon that have been only currently unveiled, as scientists have worked endlessly to provide explanation for these physical and biological phenomenon applying scientific technologies. Many important discoveries were made during the 20th century and it is interesting to note that many of these discoveries were already present in the Holy Quran fourteen hundred years ago. The Scientific phenomenon, mentioned in the Holy Quran, cover many different fields in biological and physical sciences and have been the source of guidance for a number of scientists. A perfect description of the creation of the universe, the orbits in space, the development process, development of hearing process prior to sight, importance of the skin in sensing pain, uniqueness of fingerprints, role of males in selection of the sex of the baby, are just a few of the many facts present in the Quran that have astonished many scientists. The Quran in Chapter 20, verse 50 states: قَالَ رَبُّنَا الَّذِيۤ اَعْطٰى كُلَّ شَيْءٍ خَلْقَهٗ ثُمَّ هَدٰى ۰۰ (He said "Our Lord is He, Who has given a distinctive form to everything and then guided it aright”). Explaining this brief statement in the light of the modern day Molecular Genetics unveils the entire genetic basis of life and how guidance is stored in the genetic material (DNA) present in the nucleus. This thread like structure, made of only six molecules (sugar, phosphate, adenine, thymine, cytosine and guanine), is so brilliantly structured by the Creator that it holds all the information about each and every living thing, whether it is viruses, bacteria, fungi, plants, animals or humans or any other living being. This paper will present an update on some of the physical and biological phenomena’ presented in the Holy Quran, unveiled using advanced technologies during the last century and will discuss how the need to incorporate this information in the curricula.Keywords: The Holy Quran, scientific facts, curriculum, Muslims
Procedia PDF Downloads 341874 Participation of Students and Lecturers in Social Networking for Teaching and Learning in Public Universities in Rivers State, Nigeria
Authors: Nkeiruka Queendarline Nwaizugbu
Abstract:
The use of social media and mobile devices has become acceptable in virtually all areas of today’s world. Hence, this study is a survey that was carried out to find out if students and lecturers in public universities in Rivers State use social networking for educational purposes. The sample of the study comprised of 240 students and 99 lecturers from the University of Port Harcourt and the Rivers State University of science and Technology. The study had five research questions, two hypotheses and the instrument for data collection was a 4-point Likert-type rating scale questionnaire. The data was analysed using mean, standard deviation and z-test. The findings gotten from the analysed data shows that students participate in social networking using different types of web applications but they hardly use them for educational purposes. Some recommendations were also made.Keywords: internet access, mobile learning, participation, social media, social networking, technology
Procedia PDF Downloads 407873 Freedom with Limitations: The Nature of Free Expression in the European Case-Law
Authors: Laszlo Vari
Abstract:
In the digital age, the spread of the mobile world and the nature of the cyberspace, offers many new opportunities for the prevalence of the fundamental right to free expression, and therefore, for free speech and freedom of the press; however, these new information communication technologies carry many new challenges. Defamation, censorship, fake news, misleading information, hate speech, breach of copyright etc., are only some of the violations, all of which can be derived from the harmful exercise of freedom of expression, all which become more salient in the internet. Here raises the question: how can we eliminate these problems, and practice our fundamental freedom rightfully? To answer this question, we should understand the elements and the characteristic of the nature of freedom of expression, and the role of the actors whose duties and responsibilities are crucial in the prevalence of this fundamental freedom. To achieve this goal, this paper will explore the European practice to understand instructions found in the case-law of the European Court of Human rights for the rightful exercise of freedom of expression.Keywords: collision of rights, European case-law, freedom opinion and expression, media law, freedom of information, online expression
Procedia PDF Downloads 127872 Efficient Manageability and Intelligent Classification of Web Browsing History Using Machine Learning
Authors: Suraj Gururaj, Sumantha Udupa U.
Abstract:
Browsing the Web has emerged as the de facto activity performed on the Internet. Although browsing gets tracked, the manageability aspect of Web browsing history is very poor. In this paper, we have a workable solution implemented by using machine learning and natural language processing techniques for efficient manageability of user’s browsing history. The significance of adding such a capability to a Web browser is that it ensures efficient and quick information retrieval from browsing history, which currently is very challenging. Our solution guarantees that any important websites visited in the past can be easily accessible because of the intelligent and automatic classification. In a nutshell, our solution-based paper provides an implementation as a browser extension by intelligently classifying the browsing history into most relevant category automatically without any user’s intervention. This guarantees no information is lost and increases productivity by saving time spent revisiting websites that were of much importance.Keywords: adhoc retrieval, Chrome extension, supervised learning, tile, Web personalization
Procedia PDF Downloads 354871 The Image of Uganda in Germany: Assessing the Perceptions of Germans about Uganda as a Tourist Destination
Authors: K. V. Nabichu
Abstract:
The rationale of this research was to review how Germans perceive Uganda as a tourism destination, after German visitors arrivals to Uganda remain few compared to other destinations like Kenya. It was assumed that Uganda suffers a negative image in Germany due to negative media influence. The study findings indicate that Uganda is not a popular travel destination in Germany, there is generally lack of travel information about Uganda. Despite the respondents’ hearing about Uganda’s and her beautiful attractions, good climate and friendly people, they also think Uganda is unsafe for travel. Findings further show that Uganda is a potential travel destination for Germans due to her beautifull landscape, rich culture, wild life, primates and the Nile, however political unrest, insecurity, the fear for diseases and poor hygiene hinder Germans from travelling to Uganda. The media, internet as well as friends and relatives were the major primary sources of information on Uganda while others knew about Uganda through their school lessons and sports. Uganda is not well advertised and promoted in Germany.Keywords: destination Uganda and Germany, image, perception, negative media influence
Procedia PDF Downloads 322870 The Legal Framework for Solid Waste Disposal and Management in Kwara State, Nigeria
Authors: Alabi Odunayo Mayowa, Ajayi Oluwasola Felix
Abstract:
Solid waste such as “garbage” “trash” “refuse” “slug” and “rubbish” is disposed off or is required to be disposed off in accordance with national law. The study relies on primary and secondary sources of information. The primary sources include the Constitution, statutes and subsidiary legislation. The secondary sources of information include books, journals, conference proceedings, newspapers, magazines and internet materials. The information obtained from these sources is subjected to content and contextual analysis. The study examines the Kwara State Environmental Protection Agency Law, 1992 and other laws on waste disposal and management in Kwara State, Nigeria. The study also examines the regulations and the agency i.e. the Kwara State Environmental Protection Agency created by the law with a view to determine the inadequacies in the law.Keywords: solid waste, waste disposal, waste management, domestic waste
Procedia PDF Downloads 453869 Semi-Automatic Design and Fabrication of Water Waste Cleaning Machine
Authors: Chanida Tangjai Benchalak Muangmeesri, Dechrit Maneetham
Abstract:
Collection of marine garbage in the modern world, where technology is vital to existence. Consequently, technology can assist in reducing the duplicate labor in the subject of collecting trash in the water that must be done the same way repeatedly owing to the consequence of suffering an emerging disease or COVID-19. This is due to the rapid advancement of technology. As a result, solid trash and plastic garbage are increasing. Agricultural gardens, canals, ponds, and water basins are all sources of water. Building boat-like instruments for rubbish collection in the water will be done this time. It has two control options, boat control via remote control and boat control via an Internet of Things system. A solar panel with a power output of 40 watts powers the system being able to store so accurate and precise waste collection, allowing for thorough water cleaning. The primary goals are to keep the water's surface clean and assess its quality to support the aquatic ecology.Keywords: automatic boat, water treatment, cleaning machine, iot
Procedia PDF Downloads 79868 Analysis of the Attitude of Students in the Use of Simulation in Physics Teaching
Authors: Ricardo Merlo
Abstract:
The use of simulation as a digital didactic tool allowed students to reproduce the laws of Physics in order to improve their academic performance. The didactic resource of simulation also favored the motivation of most of the young people, depending on the subject of Physics to be developed in the classroom and in that sense, it was significant to know the favorable or unfavorable attitude that the students presented about the use of simulation resources to maximize the anchorage of the contents planned for the different classes developed in the classroom. The different real-time simulation applications that were offered free of charge through the Internet were not presented as a specific resource that could be used in a didactic model, and in that framework, the teachers of Physics at the university level did not apply these resources in a systematic way with the knowledge of the favorable or unfavorable attitude of the students towards these didactic resources. For this reason, this work proposed the design and application of attitude questionnaires to enhance the use of those simulation resources that allowed for improving the quality of the class and the academic performance of the students.Keywords: physics teaching, attitude, motivation, didactic resources
Procedia PDF Downloads 48867 Changing Arbitrary Data Transmission Period by Using Bluetooth Module on Gas Sensor Node of Arduino Board
Authors: Hiesik Kim, Yong-Beom Kim, Jaheon Gu
Abstract:
Internet of Things (IoT) applications are widely serviced and spread worldwide. Local wireless data transmission technique must be developed to rate up with some technique. Bluetooth wireless data communication is wireless technique is technique made by Special Inter Group (SIG) using the frequency range 2.4 GHz, and it is exploiting Frequency Hopping to avoid collision with a different device. To implement experiment, equipment for experiment transmitting measured data is made by using Arduino as open source hardware, gas sensor, and Bluetooth module and algorithm controlling transmission rate is demonstrated. Experiment controlling transmission rate also is progressed by developing Android application receiving measured data, and controlling this rate is available at the experiment result. It is important that in the future, improvement for communication algorithm be needed because a few error occurs when data is transferred or received.Keywords: Arduino, Bluetooth, gas sensor, IoT, transmission
Procedia PDF Downloads 263866 Status of Hazardous Waste Generation and Its Impacts on Environment and Human Health: A Study in West Bengal
Authors: Sk Ajim Ali
Abstract:
The present study is an attempt to overview on the major environmental and health impacts due to hazardous waste generation and poor management. In present scenario, not only hazardous waste, but as a common term ‘Waste’ is one of the acceptable and thinkable environmental issues. With excessive increasing population, industrialization and standardization of human’s life style heap in extra waste generation which is directly or indirectly related with hazardous waste generation. Urbanization and population growth are solely responsible for establishing industrial sector and generating various Hazardous Waste (HW) and concomitantly poor management practice arising adverse effect on environment and human health. As compare to other Indian state, West Bengal is not too much former in HW generation. West Bengal makes a rank of 7th in HW generation followed by Maharashtra, Gujarat, Tamil Nadu, U.P, Punjab and Andhra Pradesh. During the last 30 years, the industrial sectors in W.B have quadrupled in size, during 1995 there were only 440 HW generating Units in West Bengal which produced 129826 MTA hazardous waste but in 2011, it rose up into 609 units and it produced about 259777 MTA hazardous waste. So, the notable thing is that during a 15 year interval there increased 169 waste generating units but it produced about 129951 MTA of hazardous waste. Major chemical industries are the main sources of HW and causes of adverse effect on the environment and human health. HW from industrial sectors contains heavy metals, cyanides, pesticides, complex aromatic compounds (i.e. PCB) and other chemical which are toxic, flammable, reactive, and corrosive and have explosive properties which highly affect the surrounding environment and human health in and around he disposal sites. The main objective of present study is to highlight on the sources and components of hazardous waste in West Bengal and impacts of improper HW management on health and environment. This study is carried out based on a secondary source of data and qualitative method of research. The secondary data has been collected annual report of WBPCB, WHO’s report, research paper, article, books and so on. It has been found that excessive HW generation from various sources and communities has serious health hazards that lead to the spreading of infectious disease and environmental change.Keywords: environmental impacts, existing HW generation and management practice, hazardous waste (HW), health impacts, recommendation and planning
Procedia PDF Downloads 263865 Sustainability Model for Rural Telecenter Using Business Intelligence Technique
Authors: Razak Rahmat, Azizah Ahmad, Rafidah Razak, Roshidi Din, Azizi Abas
Abstract:
Telecenter is a place where communities can access computers, the Internet, and other digital technologies to enable them to gather information, create, learn, and communicate with others. However, previous studies found that sustainability issues related to economic, political and institutional, social and technology is one of the major problem faced by the telecenter. Based on that problem, this research is planning to design a possible solution on rural telecenters sustainability with the support of business intelligence (BI). The empirical study will be conducted through the qualitative and quantitative method including interviews and observations with a range of stakeholders including ministry officers, telecenters managers and operators. Result from the data collection will be analyze using the causal modeling approach of SEM SmartPLS for the validity. The expected finding from this research is the Business Intelligent Requirement Model as a guild for sustainability of the rural telecenters.Keywords: Rural ICT Telecenter(RICTT), business intelligence, sustainability, requirement analysis modal
Procedia PDF Downloads 473864 Creating and Using Videos in a Teacher Education Programme: Success Stories in a Mexican Public University
Authors: Carla Michelle Gastelum Knight
Abstract:
In an era where teacher educators and student teachers have almost unrestricted access to all kinds of sources through the internet, a research project carried out with a group of student-teachers has revealed how self-made videos are an exciting new way to motivate and engage students. The project was carried out at Universidad de Sonora, a public university in Northern Mexico, where 39 students of the Bachelor in Arts in English Language Teaching (B.A. in ELT) programme participated creating their own videos. In the process, they worked collaboratively, they exploited their creativity, they were highly motivated and showed more interest in the subject. The videos were shared in a private YouTube channel where students had the opportunity to review their peers’ work and where videos are available at any time for later viewing. This experience has led course instructor to face the challenge of planning and designing meaningful tasks that can and to find ways of exploiting the use of these resources for learning and training purposes.Keywords: self-made materials, student-teachers, teacher education programme, teacher training
Procedia PDF Downloads 207863 Data Poisoning Attacks on Federated Learning and Preventive Measures
Authors: Beulah Rani Inbanathan
Abstract:
In the present era, it is vivid from the numerous outcomes that data privacy is being compromised in various ways. Machine learning is one technology that uses the centralized server, and then data is given as input which is being analyzed by the algorithms present on this mentioned server, and hence outputs are predicted. However, each time the data must be sent by the user as the algorithm will analyze the input data in order to predict the output, which is prone to threats. The solution to overcome this issue is federated learning, where the models alone get updated while the data resides on the local machine and does not get exchanged with the other local models. Nevertheless, even on these local models, there are chances of data poisoning, and it is crystal clear from various experiments done by many people. This paper delves into many ways where data poisoning occurs and the many methods through which it is prevalent that data poisoning still exists. It includes the poisoning attacks on IoT devices, Edge devices, Autoregressive model, and also, on Industrial IoT systems and also, few points on how these could be evadible in order to protect our data which is personal, or sensitive, or harmful when exposed.Keywords: data poisoning, federated learning, Internet of Things, edge computing
Procedia PDF Downloads 72862 A Blockchain-Based Privacy-Preserving Physical Delivery System
Authors: Shahin Zanbaghi, Saeed Samet
Abstract:
The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme
Procedia PDF Downloads 135861 An Examination of Low Engagement in a Group-Based ACT Intervention for Chronic Pain Management: Highlighting the Need for User-Attainment Focused Digitalised Interventions
Authors: Orestis Kasinopoulos, Maria Karekla, Vasilis Vasiliou, Evangelos Karademas
Abstract:
Acceptance and Commitment Therapy (ACT) is an empirically supported intervention for treating Chronic Pain Patients, yet its effectiveness for some chronic conditions or when adapted to other languages, has not been explored. An ACT group intervention was designed to explore the effectiveness of treating a Greek speaking heterogeneous sample of Chronic Pain patients with the aim of increasing quality of life, acceptance of pain and functionality. Sixty-nine patients were assessed and randomly assigned to an ACT or control group (relaxation techniques) for eight, 90-minute, sessions. Results are currently being analysed and follow-ups (6 and 12 month) are being completed. Low adherence rates and high attrition rates observed in the study, however point to the direction of future modified interventions. Such modifications may include web-based and smartphone interventions and their benefits in being implemented in chronic pain patients.Keywords: chronic pain, ACT, internet-delivered, digitalised intervention, adherence, attrition
Procedia PDF Downloads 349