Search results for: information and communication technology
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 18487

Search results for: information and communication technology

17557 One Step Further: Pull-Process-Push Data Processing

Authors: Romeo Botes, Imelda Smit

Abstract:

In today’s modern age of technology vast amounts of data needs to be processed in real-time to keep users satisfied. This data comes from various sources and in many formats, including electronic and mobile devices such as GPRS modems and GPS devices. They make use of different protocols including TCP, UDP, and HTTP/s for data communication to web servers and eventually to users. The data obtained from these devices may provide valuable information to users, but are mostly in an unreadable format which needs to be processed to provide information and business intelligence. This data is not always current, it is mostly historical data. The data is not subject to implementation of consistency and redundancy measures as most other data usually is. Most important to the users is that the data are to be pre-processed in a readable format when it is entered into the database. To accomplish this, programmers build processing programs and scripts to decode and process the information stored in databases. Programmers make use of various techniques in such programs to accomplish this, but sometimes neglect the effect some of these techniques may have on database performance. One of the techniques generally used,is to pull data from the database server, process it and push it back to the database server in one single step. Since the processing of the data usually takes some time, it keeps the database busy and locked for the period of time that the processing takes place. Because of this, it decreases the overall performance of the database server and therefore the system’s performance. This paper follows on a paper discussing the performance increase that may be achieved by utilizing array lists along with a pull-process-push data processing technique split in three steps. The purpose of this paper is to expand the number of clients when comparing the two techniques to establish the impact it may have on performance of the CPU storage and processing time.

Keywords: performance measures, algorithm techniques, data processing, push data, process data, array list

Procedia PDF Downloads 237
17556 Science Communication: A Possible Dialogue between Researchers and Agribusiness Farmers

Authors: Cristiane Hengler Corrêa Bernardo

Abstract:

The communication is an essential part of the process that characterizes scientific research. It should be present in every stage of research in a systemic way. However, this process is not always efficient and effective. Reports of researchers focused on agribusiness point to difficulties in communicating with farmers that negatively impact on research results and may cause distortions and even quite significant inconsistencies. This research aims at identifying the main noise and barriers in communication between agribusiness researchers and farmers. It discusses the possibility of creating a specific strategy to correct or minimize such failures. The main research question: what features of the communication process will be decisive for the communication between agribusiness researcher and farmer occur with greater efficiency? It is expected that the research will result in processes that may correct or minimize such problems, promoting dialogues more efficient knowledge. The research will adopt a qualitative approach, using action research as a form of investigative action for social and educational nature, aiming at promoting understanding and interaction between researchers and members of the investigated situations. To collect and analyze data to document analysis will be used; questionnaires and interviews and content analysis.

Keywords: agribusiness farmers, researchers, science communication, analysis

Procedia PDF Downloads 269
17555 Introduction to Techno-Sectoral Innovation System Modeling and Functions Formulating

Authors: S. M. Azad, H. Ghodsi Pour, F. Roshannafasa

Abstract:

In recent years ‘technology management and policymaking’ is one of the most important problems in management science. In this field, different generations of innovation and technology management are presented which the earliest one is Innovation System (IS) approach. In a general classification, innovation systems are divided in to 4 approaches: Technical, sectoral, regional, and national. There are many researches in relation to each of these approaches in different academic fields. Every approach has some benefits. If two or more approaches hybrid, their benefits would be combined. In addition, according to the sectoral structure of the governance model in Iran, in many sectors such as information technology, the combination of three other approaches with sectoral approach is essential. Hence, in this paper, combining two IS approaches (technical and sectoral) and using system dynamics, a generic model is presented for a sample of software industry. As a complimentary point, this article is introducing a new hybrid approach called Techno-Sectoral Innovation System. This TSIS model is accomplished by Changing concepts of the ‘functions’ which came from Technological IS literature and using them into sectoral system as measurable indicators.

Keywords: innovation system, technology, techno-sectoral system, functional indicators, system dynamics

Procedia PDF Downloads 432
17554 Sex and Sexuality Communication in African Families: The Dynamics of Openness and Closedness

Authors: Victorine Mbong Shu

Abstract:

Very little research exists on family sex and sexuality communication and identity formation and how communication is helping adolescents in forming their sexual identities in South Africa. This study is designed to explore the impact of sexual communication in African families and the dynamics that influence the openness or closedness of adolescent sexual identities. The primary objectives of this study are threefold; to understand how sexuality communication in African families impacts the closedness and/or openness of adolescent African identities; to explore the nature of African children's sexuality given the status of their families’ communications on sex; to describe how parental or adult sexual knowledge, attitudes, values of sex, etc. are translated to children in African families, if at all. This study seeks answers to challenges faced by African parents and caregivers of adolescent children in South Africa regarding sex-sexuality communication and their shifting identities in different spaces. Its outcome seeks to empower these families on how to continue to effectively communicate sex and sexuality at different stages and circumstances. Two sets of people are interviewed separately in order to explore issues of familial communication and how to understand how together with religion and culture, adolescents are socialised to form the social and gender identities that they take to adulthood. They were parents of adolescents and young adult children who spoke in retrospect on when they were adolescents. The results of this study will fill knowledge gaps considering the chosen theory of communication that gives clarity to the topic of sex and sexuality communication in African families in South Africa and the dynamics of privacy that influence identity formation. A subset of the 40 conversations, 5 female parents, 5 male parents, 5 young female adults, and 5 male young adults, was used for this analysis. The preliminary results revealed five emergent themes informed by research questions and the theoretical framework of this study: Open communication, Discomfort discussing sex and sexuality, The importance of sex communication to African parents, Factors influencing African families’ communication about sex and sexuality and Privacy and boundaries.

Keywords: sex, sexuality, communication, African families, adolescents

Procedia PDF Downloads 75
17553 The Influence of Teacher’s Non-Verbal Communication on Ondo State Secondary School Students’ Learning Outcomes in English Language

Authors: Bola M. Tunde-Awe

Abstract:

The study investigated the influence of teacher’s non-verbal communication on secondary school students’ learning outcomes in English language. The study was a survey research. Participants were three hundred Senior Secondary School II students randomly selected from ten schools in Akoko South West Local Government Area of Ondo State, Nigeria. The instrument used for data collection was a questionnaire containing twenty items on a four-point Likert scale which measured teacher’s use of three types of non-verbal communication modes: body movement, eye contact and spatial distance. The data collected was analysed using simple percentage. Findings revealed that teacher’s use of these non-verbal communication modes enhanced learners’ learning outcomes in English language: a total of 271 (90.33%) participants affirmed that teacher’s body language influenced their learning of English; 224 (74.66%) maintained the same stand for eye contact; while 202 (67.33%) affirmed that teacher’s spatial distance had positive influence. Consequent upon these findings, it was recommended that teachers of English language should constantly utilize non-verbal communication in their instructional delivery. Also, non-verbal communication modes should be included in teacher education programme to equip prospective pre-service teachers with the art of non-verbal communication.

Keywords: non-verbal communication, body language, eye contact, spatial distance, learning outcomes

Procedia PDF Downloads 412
17552 The Teaching and Learning Process and Information and Communication Technologies from the Remote Perspective

Authors: Rosiris Maturo Domingues, Patricia Luissa Masmo, Cibele Cavalheiro Neves, Juliana Dalla Martha Rodriguez

Abstract:

This article reports the experience of the pedagogical consultants responsible for the curriculum development of Senac São Paulo courses when facing the emergency need to maintain the pedagogical process in their schools in the face of the Covid-19 pandemic. The urgent adjustment to distance education resulted in the improvement of the process and the adoption of new teaching and learning strategies mediated by technologies. The processes for preparing and providing guidelines for professional education courses were also readjusted. Thus, a bank of teaching-learning strategies linked to digital resources was developed, categorized, and identified by their didactic-pedagogical potential, having as an intersection didactic planning based on learning objectives based on Bloom's taxonomy (revised), given its convergence with the competency approach adopted by Senac. Methodologically, a relationship was established between connectivity and digital networks and digital evolution in school environments, culminating in new paradigms and processes of educational communication and new trends in teaching and learning. As a result, teachers adhered to the use of digital tools in their practices, transposing face-to-face classroom methodologies and practices to online media, whose criticism was the use of ICTs in an instrumental way, reducing methodologies and practices to teaching only transmissive. There was recognition of the insertion of technology as a facilitator of the educational process in a non-palliative way and the development of a web curriculum, now and fully, carried out in contexts of ubiquity.

Keywords: technologies, education, teaching-learning strategies, Bloom taxonomy

Procedia PDF Downloads 75
17551 Inter-Cell-Interference Mitigation Scheme in Wireless Communication System

Authors: Jae-Hyun Ro, Yong-Jun Kim, Eui-Hak Lee, Hyoung-Kyu Song

Abstract:

Mobile communication has been developing very rapidly since it appeared. However, although mobile communication market has been rapidly developing, many mobile users are not offered good quality of service (QoS) due to increment of the amount of data traffic. Recently, femtocell is very hot issue in mobile communication because femtocell can solve the problems of data traffic and offer better QoS to mobile users. However, the deployment of femtocell in existing macrocell coverage area is not so simple due to the influence of inter-cell-interference (ICI) with existing macrocell. Thus, this paper proposes femtocell scheme which is able to reduce the influence of ICI to deploy femtocell easily.

Keywords: CDD, femtocell, interference, macrocell, OFDM

Procedia PDF Downloads 498
17550 Evaluation of Technology Tools for Mathematics Instruction by Novice Elementary Teachers

Authors: Christopher J. Johnston

Abstract:

This paper presents the finding of a research study in which novice (first and second year) elementary teachers (grades Kindergarten – six) evaluated various mathematics Virtual Manipulatives, websites, and Applets (tools) for use in mathematics instruction. Participants identified the criteria they used for evaluating these types of resources and provided recommendations for or against five pre-selected tools. During the study, participants participated in three data collection activities: (1) A brief Likert-scale survey which gathered information about their attitudes toward technology use; (2) An identification of criteria for evaluating technology tools; and (3) A review of five pre-selected technology tools in light of their self-identified criteria. Data were analyzed qualitatively using four theoretical categories (codes): Software Features (41%), Mathematics (26%), Learning (22%), and Motivation (11%). These four theoretical categories were then grouped into two broad categories: Content and Instruction (Mathematics and Learning), and Surface Features (Software Features and Motivation). These combined, broad categories suggest novice teachers place roughly the same weight on pedagogical features as they do technological features. Implications for mathematics teacher educators are discussed, and suggestions for future research are provided.

Keywords: mathematics education, novice teachers, technology, virtual manipulatives

Procedia PDF Downloads 127
17549 Social Communication Problems, Social Anxiety, and Mood Problems among Students with Autism Spectrum Disorder from Teachers' Perspective

Authors: Naila Tallas Mahajna, Jamal Al Khateeb

Abstract:

This study examined the level of social communication problems, social anxiety, and mood problems among children with ASD (age 6-13 years) enrolled in special classes (n=46) and regular classes (n=36) from teachers' perspective in the schools of a part of Palestine. Teachers responded to three questionnaires - social communication problems, social anxiety and mood problems- that were used to answer the research questions. Results: social communication problems, social anxiety and mood problems were of medium rates for students with ASD enrolled in reguler and special classes. No significant differences in the level of social communication problems could be attributed to class type (Regular, Special) or the grade level-(1st – 3rd, 4th - 6th). There were significant differences in social anxiety levels that could be attributed to grade level in favor of the 4th - 6th grades but there were no significant differences according to class type (Regular, Special). There were statistically significant differences in mood problems levels that could be attributed to the class type in favor of special classes, but no differences were found according to grade level. There was a direct significant relationship between communication problems, social anxiety, and mood problems. Conclusion: social communication problems may be an important risk factor for the development of social anxiety and mood problems among students with ASD.

Keywords: social communication problems, social anxiety, mood problems, autism spectrum disorders

Procedia PDF Downloads 170
17548 Sampling Effects on Secondary Voltage Control of Microgrids Based on Network of Multiagent

Authors: M. J. Park, S. H. Lee, C. H. Lee, O. M. Kwon

Abstract:

This paper studies a secondary voltage control framework of the microgrids based on the consensus for a communication network of multiagent. The proposed control is designed by the communication network with one-way links. The communication network is modeled by a directed graph. At this time, the concept of sampling is considered as the communication constraint among each distributed generator in the microgrids. To analyze the sampling effects on the secondary voltage control of the microgrids, by using Lyapunov theory and some mathematical techniques, the sufficient condition for such problem will be established regarding linear matrix inequality (LMI). Finally, some simulation results are given to illustrate the necessity of the consideration of the sampling effects on the secondary voltage control of the microgrids.

Keywords: microgrids, secondary control, multiagent, sampling, LMI

Procedia PDF Downloads 326
17547 Facilitating Familial Support of Saudi Arabians Living with HIV/AIDS

Authors: Noor Attar

Abstract:

This paper provides an overview of the current situation of HIV/AIDS patients in the Kingdom of Saudi Arabia (KSA) and a literature review of the concepts of stigma communication, communication of social support. These concepts provide the basis for the proposed methods, which will include conducting a textual analysis of materials that are currently distributed to family members of people living with HIV/AIDS (PLWHIV/A) in KSA and creating an educational brochure. The brochure will aim to help families of PLWHIV/A in KSA (1) understand how stigma shapes the experience of PLWHIV/A, (2) realize the role of positive communication as a helpful social support, and (3) develop the ability to provide positive social support for their loved ones.

Keywords: HIV/AIDS, Saudi Arabia, social support, stigma communication

Procedia PDF Downloads 277
17546 Study of Divalent Phosphate Iron-Oxide Precursor Recycling Technology

Authors: Shinn-Dar Wu

Abstract:

This study aims to synthesize lithium iron phosphate cathode material using a recycling technology involving non-protective gas calcination. The advantages include lower cost and easier production than traditional methods that require a large amount of protective gas. The novel technology may have extensive industrial applications. Given that the traditional gas calcination has a large number of protection free Fe3+ production, this study developed a precursor iron phosphate (Fe2+) material recycling technology and conducted related tests and analyses. It focused on flow field design of calcination and new technology as well as analyzed the best conditions for powder calcination combination. The electrical properties were determined by button batteries and exhibited a capacity of 118 mAh/g (The use of new materials synthesis, capacitance is about 122 mAh/g). The cost reduced to 50% of the original.

Keywords: lithium battery, lithium iron phosphate, calcined technology, recycling technology

Procedia PDF Downloads 458
17545 Level of Sustainability, Environmental Assessment and Life Cycle Assessment of Industrial Technology Research Projects in Carlos Hilado Memorial State College, Alijis Campus, Bacolod City, Negros Occidental, Philippines

Authors: Rene A. Salmingo

Abstract:

In pursuing higher educational institution’s transition to sustainable future, this research initiative was conducted. The study aimed to determine the level of sustainability, environmental impact and life cycle phase assessment of the industrial technology research projects at the Institute of Information Technology, Carlos Hilado Memorial State College (CHMSC), Alijis Campus, Bacolod City, Negros Occidental, Philippines. The research method was descriptive utilizing a researcher made questionnaire to assess the ten (10) industrial technology completed research projects. Mean was used to treat the data and instrument for Good and Scates’ validity through revisions and consultations from the environmental experts, technology specialists; and Cronbach Alpha was used to measure reliability. Results indicated that the level of sustainability and life cycle phase assessment was very high while the environmental impact of the industrial research projects was rated low. Moreover, the current research projects and environmental education courses in the college were relevant to support sustainable industrial technology research projects in the future. Hence, this research initiative will contribute to the transformation of CHMSC as a greening higher educational institution and as a center for sustainable development in the region.

Keywords: environmental impact, industrial technology research projects, life cycle phase assessment, sustainability

Procedia PDF Downloads 183
17544 Inclusive Cultural Heritage Tourism Project

Authors: L. Cruz-Lopes, M. Sell, P. Escudeiro, B. Esteves

Abstract:

It might be difficult for deaf people to communicate since spoken and written languages are different from sign language. When it comes to getting information, going to places of cultural heritage, or using services and infrastructure, there is a clear lack of inclusiveness. By creating assistive technology that enables deaf individuals to get around communication hurdles and encourage inclusive tourism, the ICHT- Inclusive Cultural Heritage Tourism initiative hopes to increase knowledge of sign language. The purpose of the Inclusive Cultural Heritage Tourism (ICHT) project is to develop online and on-site sign language tools and material for usage at popular tourist destinations in the northern region of Portugal, including Torre dos Clérigos, the Lello bookstore, Maia Zoo, Porto wine cellars, and São Pedro do Sul (Viseu) thermae. The ICHT system consists of an application using holography, a mobile game, an online platform for collaboration with deaf and hearing users, and a collection of International Sign training courses. The project also offers a prospect for a more inclusive society by introducing a method of teaching sign languages to tourism industry professionals. As a result, the teaching and learning of sign language along with the assistive technology tools created by the project sets up an inclusive environment for the deaf community, producing results in the area of automatic sign language translation and aiding in the global recognition of the Portuguese tourism industry.

Keywords: inclusive tourism, games, international sign training, deaf community

Procedia PDF Downloads 112
17543 Understanding Cyber Terrorism from Motivational Perspectives: A Qualitative Data Analysis

Authors: Yunos Zahri, Ariffin Aswami

Abstract:

Cyber terrorism represents the convergence of two worlds: virtual and physical. The virtual world is a place in which computer programs function and data move, whereas the physical world is where people live and function. The merging of these two domains is the interface being targeted in the incidence of cyber terrorism. To better understand why cyber terrorism acts are committed, this study presents the context of cyber terrorism from motivational perspectives. Motivational forces behind cyber terrorism can be social, political, ideological and economic. In this research, data are analyzed using a qualitative method. A semi-structured interview with purposive sampling was used for data collection. With the growing interconnectedness between critical infrastructures and Information & Communication Technology (ICT), selecting targets that facilitate maximum disruption can significantly influence terrorists. This work provides a baseline for defining the concept of cyber terrorism from motivational perspectives.

Keywords: cyber terrorism, terrorism, motivation, qualitative analysis

Procedia PDF Downloads 410
17542 Efficacy of Technology for Successful Learning Experience; Technology Supported Model for Distance Learning: Case Study of Botho University, Botswana

Authors: Ivy Rose Mathew

Abstract:

The purpose of this study is to outline the efficacy of technology and the opportunities it can bring to implement a successful delivery model in Distance Learning. Distance Learning has proliferated over the past few years across the world. Some of the current challenges faced by current students of distance education include lack of motivation, a sense of isolation and a need for greater and improved communication. Hence the author proposes a creative technology supported model for distance learning exactly mirrored on the traditional face to face learning that can be adopted by distance learning providers. This model suggests the usage of a range of technologies and social networking facilities, with the aim of creating a more engaging and sustaining learning environment to help overcome the isolation often noted by distance learners. While discussing the possibilities, the author also highlights the complexity and practical challenges of implementing such a model. Design/methodology/approach: Theoretical issues from previous research related to successful models for distance learning providers will be considered. And also the analysis of a case study from one of the largest private tertiary institution in Botswana, Botho University will be included. This case study illustrates important aspects of the distance learning delivery model and provides insights on how curriculum development is planned, quality assurance is done, and learner support is assured for successful distance learning experience. Research limitations/implications: While some of the aspects of this study may not be applicable to other contexts, a number of new providers of distance learning can adapt the key principles of this delivery model.

Keywords: distance learning, efficacy, learning experience, technology supported model

Procedia PDF Downloads 241
17541 A Framework for Green Use and Disposal of Information Communication Technology Devices

Authors: Frezer Alem Kebede

Abstract:

The notion of viewing ICT as merely support for the business process has shifted towards viewing ICT as a critical business enabler. As such, the need for ICT devices has increased, contributing to high electronic equipment acquisition and disposal. Hence, its use and disposal must be seen in light of environmental sustainability, i.e., in terms of green use and disposal. However, there are limited studies on green Use and Disposal framework to be used as guiding lens by organizations in developing countries. And this study endeavors to address that need taking one of the largest multinational ICT intensive company in the country. The design and development of this framework passed through several stages, initially factors affecting green use and disposal were identified after quantitative and qualitative data analysis then there were multiple brainstorming sessions for the design enhancement as participative modelling was employed. Given the difference in scope and magnitude of the challenges identified, the proposed framework approaches green use and disposal in four imperatives; strategically, tactically, operationally and through continuous improvement.

Keywords: energy efficiency, green disposal, green ICT, green use, green use and disposal framework, sustainability

Procedia PDF Downloads 198
17540 Evaluation of Information Technology Governance Frameworks for Better Governance in South Africa

Authors: Memory Ranga, Phillip Pretorious

Abstract:

The South African Government has invested a lot of money in Information Technology Governance (ITG) within the Government departments. The ITG framework was spearheaded by the Department of Public Service and Administration (DPSA). This led to the development of a governing ITG DPSA framework and later the Government Wide Enterprise Architecture (GWEA) Framework for assisting the departments to implement ITG. In addition to this, the government departments have adopted the Information Systems Audit and Control Association (ISACA) Control Objectives for Information and Related Technology (COBIT) for ITG processes. Despite all these available frameworks, departments fail to fully capitalise and improve the ITG processes mainly as these are too generic and difficult to apply for specific governance needs. There has been less research done to evaluate the progress on ITG initiatives within the government departments. This paper aims to evaluate the existing ITG frameworks within selected government departments in South Africa. A quantitative research approach was used in this study. Data was collected through an online questionnaire targeting ICT Managers and Directors from government departments. The study is undertaken within a case study and only the Eastern Cape Province was selected for the research. Document review mainly on ITG framework and best practices was also used. Data was analysed using the Google Analytic tools and SPSS. A one–sample Chi-Squared Test was used to verity the evaluation findings. Findings show that there is evidence that the current guiding National governance framework (DPSA) is out dated and does not accommodate the new changes in other governance frameworks. The Eastern Cape Government Departments have spent huge amount of money on ITG but not yet able to identify the benefits of the ITG initiatives. The guiding framework is rigid and does to address some of the departmental needs making it difficult to be flexible and apply the DPSA framework. Furthermore, despite the large budget on ITG, the departments still find themselves with many challenges and unable to improve some of the processes and services. All the engaged Eastern Cape departments have adopted the COBIT framework, but none has been conducting COBIT maturity Assessment which is a functionality of COBIT. There is evidence of too many the ITG frameworks and underutilisation of these frameworks. The study provides a comprehensive evaluation of the ITG frameworks that have been adopted by the South African Government Departments in the Eastern Cape Province. The evaluation guides and recommends the government departments to rethink and adopt ITG frameworks that could be customised to accommodate their needs. The adoption and application of ITG by government departments should assist in better governance and service delivery to the citizens.

Keywords: information technology governance, COBIT, evaluate, framework, governance, DPSA framework

Procedia PDF Downloads 114
17539 Decode and Forward Cooperative Protocol Enhancement Using Interference Cancellation

Authors: Siddeeq Y. Ameen, Mohammed K. Yousif

Abstract:

Cooperative communication systems are considered to be a promising technology to improve the system capacity, reliability and performances over fading wireless channels. Cooperative relaying system with a single antenna will be able to reach the advantages of multiple antenna communication systems. It is ideally suitable for the distributed communication systems; the relays can cooperate and form virtual MIMO systems. Thus the paper will aim to investigate the possible enhancement of cooperated system using decode and forward protocol. On decode and forward an attempt to cancel or at least reduce the interference instead of increasing the SNR values is achieved. The latter can be achieved via the use group of relays depending on the channel status from source to relay and relay to destination respectively. In the proposed system, the transmission time has been divided into two phases to be used by decode and forward protocol. The first phase has been allocated for the source to transmit its data whereas the relays and destination nodes are in receiving mode. On the other hand, the second phase is allocated for the first and second groups of relay nodes to relay the data to the destination node. Simulations results have shown an improvement in performance is achieved compared to the conventional decode and forward in terms of BER and transmission rate.

Keywords: cooperative systems, decode and forward, interference cancellation, virtual MIMO

Procedia PDF Downloads 317
17538 Active Learning Techniques in Engineering Education

Authors: H. M. Anitha, Anusha N. Rao

Abstract:

The current developments in technology and ideas have given entirely new dimensions to the field of research and education. New delivery methods are proposed which is an added feature to the engineering education. Particularly, more importance is given to new teaching practices such as Information and Communication Technologies (ICT). It is vital to adopt the new ICT methods which lead to the emergence of novel structure and mode of education. The flipped classroom, think pair share and peer instruction are the latest pedagogical methods which give students to learn the course. This involves students to watch video lectures outside the classroom and solve the problems at home. Students are engaged in group discussions in the classroom. These are the active learning methods wherein the students are involved diversely to learn the course. This paper gives a comprehensive study of past and present research which is going on with flipped classroom, thinks pair share activity and peer instruction.

Keywords: flipped classroom, think pair share, peer instruction, active learning

Procedia PDF Downloads 380
17537 Barriers to Teachers' Use of Technology in Nigeria and Its Implications in the Academic Performance of Students of Higher Learning: A Case Study of Adeniran Ogunsanya College of Education, Lagos

Authors: Iyabo Aremu

Abstract:

The role of the teacher in stirring a qualitative and distinctive knowledge-driven and value-laden environment with modern teaching practices cannot be over accentuated. In spite of the myriad advantages the use of Information and Communication Technology (ICT) promises, many teachers are still at the rear of this archetypical transition. These teachers; notable forces needed to elicit positive academic performances of students of higher learning are ill-equipped for the task. In view of this, the research work sought to assess how teachers have been able to effectively apply ICT tools to improve students’ academic performance in the higher institution and to evaluate the challenges faced by teachers in using these tools. Thus, the research adopted descriptive survey research design and involved a sample of 25 lecturers from five schools in the study area: Adeniran Ogunsanya College of Education (AOCOED). The barrier to Teachers’ Use of ICT Questionnaire (BTUICTQ) was used to gather data from these respondents. The data gathered was tested with chi-square at 0.05 level of significance. The results revealed that the perception and attitude of teachers towards the use of ICT is not favourable. It was also discovered that teachers suffer from gaps in ICT knowledge and skills. Finally, the research showed that lack of training and inadequate support is a major challenge teacher contend with. The study recommended that teachers should be given adequate training and support and that teachers’ unrestricted access to ICT gadgets should be ensured by schools.

Keywords: ICT, teachers, AOCOED, academic performance

Procedia PDF Downloads 154
17536 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 252
17535 Object Negotiation Mechanism for an Intelligent Environment Using Event Agents

Authors: Chiung-Hui Chen

Abstract:

With advancements in science and technology, the concept of the Internet of Things (IoT) has gradually developed. The development of the intelligent environment adds intelligence to objects in the living space by using the IoT. In the smart environment, when multiple users share the living space, if different service requirements from different users arise, then the context-aware system will have conflicting situations for making decisions about providing services. Therefore, the purpose of establishing a communication and negotiation mechanism among objects in the intelligent environment is to resolve those service conflicts among users. This study proposes developing a decision-making methodology that uses “Event Agents” as its core. When the sensor system receives information, it evaluates a user’s current events and conditions; analyses object, location, time, and environmental information; calculates the priority of the object; and provides the user services based on the event. Moreover, when the event is not single but overlaps with another, conflicts arise. This study adopts the “Multiple Events Correlation Matrix” in order to calculate the degree values of incidents and support values for each object. The matrix uses these values as the basis for making inferences for system service, and to further determine appropriate services when there is a conflict.

Keywords: internet of things, intelligent object, event agents, negotiation mechanism, degree of similarity

Procedia PDF Downloads 285
17534 Energy Unchained: An Analysis of Affordances of the Blockchain Technology in the Energy Sector

Authors: Jonas Kahlert

Abstract:

Blockchain technology has gained importance and momentum in the energy sector. Yet, there is no structured analysis of how specific features of the blockchain technology can create value in the energy sector. We employ a qualitative analysis on insights gained from the current literature and expert interviews. Along the four most prevalent use cases of blockchain technology in the energy sector, we discuss the potential of blockchain technology to support a transition to a more affordable, sustainable and reliable energy system. We show that in its current state, blockchain and adjacent technologies are not a necessity but a sufficiency towards this transition. We also show how current limitations of the blockchain and adjacent technologies can be even counterproductive. Finally, we discuss implications for policy makers and managers.

Keywords: blockchain technology, affordance theory, energy trilemma, sustainability

Procedia PDF Downloads 475
17533 The Status of Precision Agricultural Technology Adoption on Row Crop Farms vs. Specialty Crop Farms

Authors: Shirin Ghatrehsamani

Abstract:

Higher efficiency and lower environmental impact are the consequence of using advanced technology in farming. They also help to decrease yield variability by diminishing weather variability impact, optimizing nutrient and pest management as well as reducing competition from weeds. A better understanding of the pros and cons of applying technology and finding the main reason for preventing the utilization of the technology has a significant impact on developing technology adoption among farmers and producers in the digital agriculture era. The results from two surveys carried out in 2019 and 2021 were used to investigate whether the crop types had an impact on the willingness to utilize technology on the farms. The main focus of the questionnaire was on utilizing precision agriculture (PA) technologies among farmers in some parts of the united states. Collected data was analyzed to determine the practical application of various technologies. The survey results showed more similarities in the main reason not to use PA between the two crop types, but the present application of using technology in specialty crops is generally five times larger than in row crops. GPS receiver applications were reported similar for both types of crops. Lack of knowledge and high cost of data handling were cited as the main problems. The most significant difference was among using variable rate technology, which was 43% for specialty crops while was reported 0% for row crops. Pest scouting and mapping were commonly used for specialty crops, while they were rarely applied for row crops. Survey respondents found yield mapping, soil sampling map, and irrigation scheduling were more valuable for specialty crops than row crops in management decisions. About 50% of the respondents would like to share the PA data in both types of crops. Almost 50 % of respondents got their PA information from retailers in both categories, and as the second source, using extension agents were more common in specialty crops than row crops.

Keywords: precision agriculture, smart farming, digital agriculture, technology adoption

Procedia PDF Downloads 106
17532 Academic Influence of Social Network Sites on the Collegiate Performance of Technical College Students

Authors: Jameson McFarlane, Thorne J. McFarlane, Leon Bernard

Abstract:

Social network sites (SNS) is an emerging phenomenon that is here to stay. The popularity and the ubiquity of the SNS technology are undeniable. Because most SNS are free and easy to use people from all walks of life and from almost any age are attracted to that technology. College age students are by far the largest segment of the population using SNS. Since most SNS have been adapted for mobile devices, not only do you find students using this technology in their study, while working on labs or on projects, a substantial number of students have been found to use SNS even while listening to lectures. This study found that SNS use has a significant negative impact on the grade point average of college students particularly in the first semester. However, this negative impact is greatly diminished by the end of the third semester partly because the students have adjusted satisfactorily to the challenges of college or because they have learned how to adequately manage their time. It was established that the kinds of activities the students are engaged in during the SNS use are the leading factor affecting academic performance. Of those activities, using SNS during a lecture or while studying is the foremost contributing factor to lower academic performance. This is due to “cognitive” or “information” bottleneck, a condition in which the students find it very difficult to multitask or to switch between resources leading to inefficiency in information retention and thus, educational performance.

Keywords: social network sites, social network analysis, regression coefficient, psychological engagement

Procedia PDF Downloads 177
17531 American Sign Language Recognition System

Authors: Rishabh Nagpal, Riya Uchagaonkar, Venkata Naga Narasimha Ashish Mernedi, Ahmed Hambaba

Abstract:

The rapid evolution of technology in the communication sector continually seeks to bridge the gap between different communities, notably between the deaf community and the hearing world. This project develops a comprehensive American Sign Language (ASL) recognition system, leveraging the advanced capabilities of convolutional neural networks (CNNs) and vision transformers (ViTs) to interpret and translate ASL in real-time. The primary objective of this system is to provide an effective communication tool that enables seamless interaction through accurate sign language interpretation. The architecture of the proposed system integrates dual networks -VGG16 for precise spatial feature extraction and vision transformers for contextual understanding of the sign language gestures. The system processes live input, extracting critical features through these sophisticated neural network models, and combines them to enhance gesture recognition accuracy. This integration facilitates a robust understanding of ASL by capturing detailed nuances and broader gesture dynamics. The system is evaluated through a series of tests that measure its efficiency and accuracy in real-world scenarios. Results indicate a high level of precision in recognizing diverse ASL signs, substantiating the potential of this technology in practical applications. Challenges such as enhancing the system’s ability to operate in varied environmental conditions and further expanding the dataset for training were identified and discussed. Future work will refine the model’s adaptability and incorporate haptic feedback to enhance the interactivity and richness of the user experience. This project demonstrates the feasibility of an advanced ASL recognition system and lays the groundwork for future innovations in assistive communication technologies.

Keywords: sign language, computer vision, vision transformer, VGG16, CNN

Procedia PDF Downloads 30
17530 ISIS and Social Media

Authors: Neda Jebellie

Abstract:

New information and communication technologies (ICT) not only has revolutionized the world of communication but has also strongly impacted the state of international terrorism. Using the potential of social media, the new wave of terrorism easily can recruit new jihadi members, spread their violent ideology and garner financial support. IS (Islamic State) as the most dangerous terrorist group has already conquered a great deal of social media space and has deployed sophisticated web-based strategies to promote its extremist doctrine. In this respect the vastly popular social media are the perfect tools for IS to establish its virtual Caliphate (e-caliphate) and e-Ommah (e-citizen).Using social media to release violent videos of beheading journalists, burning their hostages alive and mass killing of prisoners are IS strategies to terrorize and subjugate its enemies. Several Twitter and Facebook accounts which are IS affiliations have targeted young generation of Muslims all around the world. In fact IS terrorists use modern resources of communication not only to share information and conduct operations but also justify their violent acts. The strict Wahhabi doctrine of ISIS is based on a fundamental interpretation of Islam in which religious war against non Muslims (Jihad) and killing infidels (Qatal) have been praised and recommended. Via social media IS disseminates its propaganda to inspire sympathizers across the globe. Combating this new wave of terrorism which is exploiting new communication technologies is the most significant challenge for authorities. Before the rise of internet and social media governments had to control only mosques and religious gathering such as Friday sermons(Jamaah Pray) to prevent spreading extremism among Muslims community in their country. ICT and new communication technologies have heighten the challenge of dealing with Islamic radicalism and have amplified its threat .According to the official reports even some of the governments such as UK have created a special force of Facebook warriors to engage in unconventional warfare in digital age. In compare with other terrorist groups, IS has effectively grasped social media potential. Their horrifying released videos on YouTube easily got viral and were re-twitted and shared by thousands of social media users. While some of the social media such as Twitter and Facebook have shut down many accounts alleged to IS but new ones create immediately so only blocking their websites and suspending their accounts cannot solve the problem as terrorists recreate new accounts. To combat cyber terrorism focusing on disseminating counter narrative strategies can be a solution. Creating websites and providing online materials to propagate peaceful and moderate interpretation of Islam can provide a cogent alternative to extremist views.

Keywords: IS-islamic state, cyber terrorism, social media, terrorism, information, communication technologies

Procedia PDF Downloads 482
17529 The Study of Internship Performances: Comparison of Information Technology Interns towards Students’ Types and Background Profiles

Authors: Shutchapol Chopvitayakun

Abstract:

Internship program is a compulsory course of many undergraduate programs in Thailand. It gives opportunities to a lot of senior students as interns to practice their working skills in the real organizations and also gives chances for interns to face real-world working problems. Interns also learn how to solve those problems by direct and indirect experiences. This program in many schools is a well-structured course with a contract or agreement made with real business organizations. Moreover, this program also offers opportunities for interns to get jobs after completing it from where the internship program takes place. Interns also learn how to work as a team and how to associate with other colleagues, trainers, and superiors of each organization in term of social hierarchy, self-responsibility, and self-disciplinary. This research focuses on senior students of Suan Sunandha Rajabhat University, Thailand whose studying major is information technology program. They practiced their working skills or took internship programs in the real business sector or real operating organizations in 2015-2016. Interns are categorized in to two types: normal program and special program. For special program, students study in weekday evening from Monday to Friday or Weekend and most of them work full-time or part-time job. For normal program, students study in weekday working hours and most of them do not work. The differences of these characters and the outcomes of internship performance were studied and analyzed in this research. This work applied some statistical analytics to find out whether the internship performance of each intern type has different performances statistically or not.

Keywords: internship, intern, senior student, information technology program

Procedia PDF Downloads 257
17528 Maintaining User-Level Security in Short Message Service

Authors: T. Arudchelvam, W. W. E. N. Fernando

Abstract:

Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.

Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication

Procedia PDF Downloads 390