Search results for: internet technology
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8834

Search results for: internet technology

7814 A Lightweight Blockchain: Enhancing Internet of Things Driven Smart Buildings Scalability and Access Control Using Intelligent Direct Acyclic Graph Architecture and Smart Contracts

Authors: Syed Irfan Raza Naqvi, Zheng Jiangbin, Ahmad Moshin, Pervez Akhter

Abstract:

Currently, the IoT system depends on a centralized client-servant architecture that causes various scalability and privacy vulnerabilities. Distributed ledger technology (DLT) introduces a set of opportunities for the IoT, which leads to practical ideas for existing components at all levels of existing architectures. Blockchain Technology (BCT) appears to be one approach to solving several IoT problems, like Bitcoin (BTC) and Ethereum, which offer multiple possibilities. Besides, IoTs are resource-constrained devices with insufficient capacity and computational overhead to process blockchain consensus mechanisms; the traditional BCT existing challenge for IoTs is poor scalability, energy efficiency, and transaction fees. IOTA is a distributed ledger based on Direct Acyclic Graph (DAG) that ensures M2M micro-transactions are free of charge. IOTA has the potential to address existing IoT-related difficulties such as infrastructure scalability, privacy and access control mechanisms. We proposed an architecture, SLDBI: A Scalable, lightweight DAG-based Blockchain Design for Intelligent IoT Systems, which adapts the DAG base Tangle and implements a lightweight message data model to address the IoT limitations. It enables the smooth integration of new IoT devices into a variety of apps. SLDBI enables comprehensive access control, energy efficiency, and scalability in IoT ecosystems by utilizing the Masked Authentication Message (MAM) protocol and the IOTA Smart Contract Protocol (ISCP). Furthermore, we suggest proof-of-work (PoW) computation on the full node in an energy-efficient way. Experiments have been carried out to show the capability of a tangle to achieve better scalability while maintaining energy efficiency. The findings show user access control management at granularity levels and ensure scale up to massive networks with thousands of IoT nodes, such as Smart Connected Buildings (SCBDs).

Keywords: blockchain, IOT, direct acyclic graphy, scalability, access control, architecture, smart contract, smart connected buildings

Procedia PDF Downloads 121
7813 Technology Futures in Global Militaries: A Forecasting Method Using Abstraction Hierarchies

Authors: Mark Andrew

Abstract:

Geopolitical tensions are at a thirty-year high, and the pace of technological innovation is driving asymmetry in force capabilities between nation states and between non-state actors. Technology futures are a vital component of defence capability growth, and investments in technology futures need to be informed by accurate and reliable forecasts of the options for ‘systems of systems’ innovation, development, and deployment. This paper describes a method for forecasting technology futures developed through an analysis of four key systems’ development stages, namely: technology domain categorisation, scanning results examining novel systems’ signals and signs, potential system-of systems’ implications in warfare theatres, and political ramifications in terms of funding and development priorities. The method has been applied to several technology domains, including physical systems (e.g., nano weapons, loitering munitions, inflight charging, and hypersonic missiles), biological systems (e.g., molecular virus weaponry, genetic engineering, brain-computer interfaces, and trans-human augmentation), and information systems (e.g., sensor technologies supporting situation awareness, cyber-driven social attacks, and goal-specification challenges to proliferation and alliance testing). Although the current application of the method has been team-centred using paper-based rapid prototyping and iteration, the application of autonomous language models (such as GPT-3) is anticipated as a next-stage operating platform. The importance of forecasting accuracy and reliability is considered a vital element in guiding technology development to afford stronger contingencies as ideological changes are forecast to expand threats to ecology and earth systems, possibly eclipsing the traditional vulnerabilities of nation states. The early results from the method will be subjected to ground truthing using longitudinal investigation.

Keywords: forecasting, technology futures, uncertainty, complexity

Procedia PDF Downloads 113
7812 Deployment of Beyond 4G Wireless Communication Networks with Carrier Aggregation

Authors: Bahram Khan, Anderson Rocha Ramos, Rui R. Paulo, Fernando J. Velez

Abstract:

With the growing demand for a new blend of applications, the users dependency on the internet is increasing day by day. Mobile internet users are giving more attention to their own experiences, especially in terms of communication reliability, high data rates and service stability on move. This increase in the demand is causing saturation of existing radio frequency bands. To address these challenges, researchers are investigating the best approaches, Carrier Aggregation (CA) is one of the newest innovations, which seems to fulfill the demands of the future spectrum, also CA is one the most important feature for Long Term Evolution - Advanced (LTE-Advanced). For this purpose to get the upcoming International Mobile Telecommunication Advanced (IMT-Advanced) mobile requirements (1 Gb/s peak data rate), the CA scheme is presented by 3GPP, which would sustain a high data rate using widespread frequency bandwidth up to 100 MHz. Technical issues such as aggregation structure, its implementations, deployment scenarios, control signal techniques, and challenges for CA technique in LTE-Advanced, with consideration of backward compatibility, are highlighted in this paper. Also, performance evaluation in macro-cellular scenarios through a simulation approach is presented, which shows the benefits of applying CA, low-complexity multi-band schedulers in service quality, system capacity enhancement and concluded that enhanced multi-band scheduler is less complex than the general multi-band scheduler, which performs better for a cell radius longer than 1800 m (and a PLR threshold of 2%).

Keywords: component carrier, carrier aggregation, LTE-advanced, scheduling

Procedia PDF Downloads 198
7811 Transforming Water-Energy-Gas Industry through Smart Metering and Blockchain Technology

Authors: Khoi A. Nguyen, Rodney A. Stewart, Hong Zhang

Abstract:

Advanced metering technologies coupled with informatics creates an opportunity to form digital multi-utility service providers. These providers will be able to concurrently collect a customers’ medium-high resolution water, electricity and gas demand data and provide user-friendly platforms to feed this information back to customers and supply/distribution utility organisations. With the emergence of blockchain technology, a new research area has been explored which helps bring this multi-utility service provider concept to a much higher level. This study aims at introducing a breakthrough system architecture where smart metering technology in water, energy, and gas (WEG) are combined with blockchain technology to provide customer a novel real-time consumption report and decentralized resource trading platform. A pilot study on 4 properties in Australia has been undertaken to demonstrate this system, where benefits for customers and utilities are undeniable.

Keywords: blockchain, digital multi-utility, end use, demand forecasting

Procedia PDF Downloads 170
7810 A Methodology for Developing New Technology Ideas to Avoid Patent Infringement: F-Term Based Patent Analysis

Authors: Kisik Song, Sungjoo Lee

Abstract:

With the growing importance of intangible assets recently, the impact of patent infringement on the business of a company has become more evident. Accordingly, it is essential for firms to estimate the risk of patent infringement risk before developing a technology and create new technology ideas to avoid the risk. Recognizing the needs, several attempts have been made to help develop new technology opportunities and most of them have focused on identifying emerging vacant technologies from patent analysis. In these studies, the IPC (International Patent Classification) system or keywords from text-mining application to patent documents was generally used to define vacant technologies. Unlike those studies, this study adopted F-term, which classifies patent documents according to the technical features of the inventions described in them. Since the technical features are analyzed by various perspectives by F-term, F-term provides more detailed information about technologies compared to IPC while more systematic information compared to keywords. Therefore, if well utilized, it can be a useful guideline to create a new technology idea. Recognizing the potential of F-term, this paper aims to suggest a novel approach to developing new technology ideas to avoid patent infringement based on F-term. For this purpose, we firstly collected data about F-term and then applied text-mining to the descriptions about classification criteria and attributes. From the text-mining results, we could identify other technologies with similar technical features of the existing one, the patented technology. Finally, we compare the technologies and extract the technical features that are commonly used in other technologies but have not been used in the existing one. These features are presented in terms of “purpose”, “function”, “structure”, “material”, “method”, “processing and operation procedure” and “control means” and so are useful for creating new technology ideas that help avoid infringing patent rights of other companies. Theoretically, this is one of the earliest attempts to adopt F-term to patent analysis; the proposed methodology can show how to best take advantage of F-term with the wealth of technical information. In practice, the proposed methodology can be valuable in the ideation process for successful product and service innovation without infringing the patents of other companies.

Keywords: patent infringement, new technology ideas, patent analysis, F-term

Procedia PDF Downloads 265
7809 Inclusive Educational Technology for Students in Rural Areas in Nigeria: Experimenting Micro-Learning and Gamification in Basic Technology Classes

Authors: Efuwape Bamidele Michael, Efuwape Oluwabunmi Asake

Abstract:

Nigeria has some deep rural environments that seem secluded from most of the technological amenities for convenient living and learning. Most schools in such environments are yet to be captured in the educational applications of technological facilities. The study explores the facilitation of basic technology instructions with micro-learning and gamification among students in rural Junior Secondary Schools in the Ipokia Local Government Area (LGA) of Ogun state. The study employed a quasi-experimental design, specifically the pre-test and post-test control group design. The study population comprised all Junior Secondary School students in the LGA. Four Junior Secondary Schools in the LGA were randomly selected for the study and classified into two experimental and two control groups. A total sample of 156 students participated in the study. Basic Technology Achievement Test and Junior School Students’ Attitudinal Scale were instruments used for data collection in the study with reliability coefficients of 0.87 and 0.83, respectively. Five hypotheses guided the study and were tested using Analysis of covariance (ANCOVA) at a 0.05 level of significance. Findings from the study established significant marginal differences in students’ academic performance (F = 644.301; p = .000), learning retention (F = 583.335; p = .000), and attitude towards learning basic technology (F = 491.226; p = .000) between the two groups in favour of the experimental group exposed to micro-learning and gamification. As a recommendation, adequate provisions for inclusive educational practices with technological applications should be ensured for all children irrespective of location within the country, especially to encourage effective learning in rural schools.

Keywords: inclusive education, educational technology, basic technology students, rural areas in Nigeria, micro-learning, gamification

Procedia PDF Downloads 84
7808 A Survey of Digital Health Companies: Opportunities and Business Model Challenges

Authors: Iris Xiaohong Quan

Abstract:

The global digital health market reached 175 billion U.S. dollars in 2019, and is expected to grow at about 25% CAGR to over 650 billion USD by 2025. Different terms such as digital health, e-health, mHealth, telehealth have been used in the field, which can sometimes cause confusion. The term digital health was originally introduced to refer specifically to the use of interactive media, tools, platforms, applications, and solutions that are connected to the Internet to address health concerns of providers as well as consumers. While mHealth emphasizes the use of mobile phones in healthcare, telehealth means using technology to remotely deliver clinical health services to patients. According to FDA, “the broad scope of digital health includes categories such as mobile health (mHealth), health information technology (IT), wearable devices, telehealth and telemedicine, and personalized medicine.” Some researchers believe that digital health is nothing else but the cultural transformation healthcare has been going through in the 21st century because of digital health technologies that provide data to both patients and medical professionals. As digital health is burgeoning, but research in the area is still inadequate, our paper aims to clear the definition confusion and provide an overall picture of digital health companies. We further investigate how business models are designed and differentiated in the emerging digital health sector. Both quantitative and qualitative methods are adopted in the research. For the quantitative analysis, our research data came from two databases Crunchbase and CBInsights, which are well-recognized information sources for researchers, entrepreneurs, managers, and investors. We searched a few keywords in the Crunchbase database based on companies’ self-description: digital health, e-health, and telehealth. A search of “digital health” returned 941 unique results, “e-health” returned 167 companies, while “telehealth” 427. We also searched the CBInsights database for similar information. After merging and removing duplicate ones and cleaning up the database, we came up with a list of 1464 companies as digital health companies. A qualitative method will be used to complement the quantitative analysis. We will do an in-depth case analysis of three successful unicorn digital health companies to understand how business models evolve and discuss the challenges faced in this sector. Our research returned some interesting findings. For instance, we found that 86% of the digital health startups were founded in the recent decade since 2010. 75% of the digital health companies have less than 50 employees, and almost 50% with less than 10 employees. This shows that digital health companies are relatively young and small in scale. On the business model analysis, while traditional healthcare businesses emphasize the so-called “3P”—patient, physicians, and payer, digital health companies extend to “5p” by adding patents, which is the result of technology requirements (such as the development of artificial intelligence models), and platform, which is an effective value creation approach to bring the stakeholders together. Our case analysis will detail the 5p framework and contribute to the extant knowledge on business models in the healthcare industry.

Keywords: digital health, business models, entrepreneurship opportunities, healthcare

Procedia PDF Downloads 182
7807 Machines Hacking Humans: Performances Practices in Electronic Music during the 21st Century

Authors: Zimasa Siyasanga Gysman

Abstract:

This paper assesses the history of electronic music and its performance to illustrate that machines and technology have largely influenced how humans perform electronic music. The history of electronic music mainly focuses on the composition and production of electronic music with little to no attention paid to its performance by the majority of scholars in this field. Therefore, establishing a history of performance involves investigating what compositions of electronic music called for in the production of electronic music performance. This investigation into seminal works in the history of electronic music, therefore, illustrates the aesthetics of electronic music performance and the aesthetics established in the very beginnings of electronic music performance demonstrate the aesthetics of electronic music which are still prevalent today. The key aesthetics are the repurposing of technology and the hybridisation of technology. Performers take familiar technology (technology that society has become accustomed to using in daily life), not necessarily related to music or performance and use it as an instrument in their performances, such as a rotary dial telephone. Likewise, since the beginnings of electronic music, producers have always experimented with the latest technologies available to them in their compositions and performances. The spirit of performers of electronic music, therefore, revolves around repurposing familiar technologies and using them in new ways, whilst similarly experimenting with new technologies in their performances. This process of hybridisation plays a key role in the production and performance of electronic music in the twentieth century. Through various interviews with performers of electronic music, it is shown that these aesthetics are driving performance practices in the twenty-first century.

Keywords: body, hybridisation, performance, sound

Procedia PDF Downloads 159
7806 Design and Application of NFC-Based Identity and Access Management in Cloud Services

Authors: Shin-Jer Yang, Kai-Tai Yang

Abstract:

In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.

Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device

Procedia PDF Downloads 433
7805 Synergy and Complementarity in Technology-Intensive Manufacturing Networks

Authors: Daidai Shen, Jean Claude Thill, Wenjia Zhang

Abstract:

This study explores the dynamics of synergy and complementarity within city networks, specifically focusing on the headquarters-subsidiary relations of firms. We begin by defining these two types of networks and establishing their pivotal roles in shaping city network structures. Utilizing the mesoscale analytic approach of weighted stochastic block modeling, we discern relational patterns between city pairs and determine connection strengths through statistical inference. Furthermore, we introduce a community detection approach to uncover the underlying structure of these networks using advanced statistical methods. Our analysis, based on comprehensive network data up to 2017, reveals the coexistence of both complementarity and synergy networks within China’s technology-intensive manufacturing cities. Notably, firms in technology hardware and office & computing machinery predominantly contribute to the complementarity city networks. In contrast, a distinct synergy city network, underpinned by the cities of Suzhou and Dongguan, emerges amidst the expansive complementarity structures in technology hardware and equipment. These findings provide new insights into the relational dynamics and structural configurations of city networks in the context of technology-intensive manufacturing, highlighting the nuanced interplay between synergy and complementarity.

Keywords: city system, complementarity, synergy network, higher-order network

Procedia PDF Downloads 43
7804 Young People’s Participation in Decision-Making Using Information and Communication Technology

Authors: Marina Diković

Abstract:

By giving personal opinions, suggestions and criticism through e-democracy, young people can reinforce the adoption of decisions which they have an impact on. The purpose of this research was to examine the opinion of university students about the possibility of their decision-making by using information and communication technology (ICT). The questionnaire examined young people's values and behaviour associated with e-democracy and the related decision-making. Students are most active online when it comes to finding information connected with their academic responsibilities, but less frequently take part in democratic processes in society, both at the national and local level. E-democracy as a tool can be learned in programmes of Human Rights Education and Citizenship Education. 

Keywords: active citizens, e-democracy, information and communication technology (ICT), university students

Procedia PDF Downloads 225
7803 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis

Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim

Abstract:

As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.

Keywords: private information, value, users, perceived risk, online information privacy, attributes

Procedia PDF Downloads 237
7802 Introduction to Techno-Sectoral Innovation System Modeling and Functions Formulating

Authors: S. M. Azad, H. Ghodsi Pour, F. Roshannafasa

Abstract:

In recent years ‘technology management and policymaking’ is one of the most important problems in management science. In this field, different generations of innovation and technology management are presented which the earliest one is Innovation System (IS) approach. In a general classification, innovation systems are divided in to 4 approaches: Technical, sectoral, regional, and national. There are many researches in relation to each of these approaches in different academic fields. Every approach has some benefits. If two or more approaches hybrid, their benefits would be combined. In addition, according to the sectoral structure of the governance model in Iran, in many sectors such as information technology, the combination of three other approaches with sectoral approach is essential. Hence, in this paper, combining two IS approaches (technical and sectoral) and using system dynamics, a generic model is presented for a sample of software industry. As a complimentary point, this article is introducing a new hybrid approach called Techno-Sectoral Innovation System. This TSIS model is accomplished by Changing concepts of the ‘functions’ which came from Technological IS literature and using them into sectoral system as measurable indicators.

Keywords: innovation system, technology, techno-sectoral system, functional indicators, system dynamics

Procedia PDF Downloads 438
7801 The Impact of Information Technology Monitoring on Employee Theft and Productivity

Authors: Ajayi Oluwasola Felix

Abstract:

This paper examines how firm investments in technology-based employee monitoring impact both misconduct and productivity. We use unique and detailed theft and sales data from 392 restaurant locations from five firms that adopt a theft monitoring information technology (IT) product. We use difference-in-differences (DD) models with staggered adoption dates to estimate the treatment effect of IT monitoring on theft and productivity. We find significant treatment effects in reduced theft and improved productivity that appear to be primarily driven by changed worker behavior rather than worker turnover. We examine four mechanisms that may drive this productivity result: economic and cognitive multitasking, fairness-based motivation, and perceived increases of general oversight. The observed productivity results represent substantial financial benefits to both firms and the legitimate tip-based earnings of workers. Our results suggest that employee misconduct is not solely a function of individual differences in ethics or morality, but can also be influenced by managerial policies that can benefit both firms and employees.

Keywords: information technology, monitoring, misconduct, employee theft

Procedia PDF Downloads 417
7800 Transforming ESL Teaching and Learning with ICT

Authors: Helena Sit

Abstract:

Developing skills in using ICT in the language classroom has been discussed at all educational levels. Digital tools and learning management systems enable teachers to transform their instructional activities while giving learners the opportunity to engage with virtual communities. In the field of English as a second language (ESL) teaching and learning, the use of technology-enhanced learning and diverse pedagogical practices continues to grow. Whilst technology and multimodal learning is a way of the future for education, second language teachers now face the predicament as to whether implementing these newer ways of learning is, in fact, beneficial or disadvantageous to learners. Research has shown that integrating multimodality and technology can improve students’ engagement and participation in their English language learning. However, students can experience anxiety or misunderstanding when engaging with E-learning or digital-mediated learning. This paper aims to explore how ESL teaching and learning are transformed via the use of educational technology and what impact it has had on student teachers. Case study is employed in this research. The study reviews the growing presence of technology and multimodality in university language classrooms, discusses their impact on teachers’ pedagogical practices, and proposes scaffolding strategies to help design effective English language courses in the Australian education context. The study sheds light on how pedagogical integration today may offer a way forward for language teachers of tomorrow and provides implications to implement an evidence-informed approach that blends knowledge from research, practice and people experiencing the practice in the digital era.

Keywords: educational technology, ICT in higher education, curriculum design and innovation, teacher education, multiliteracies pedagogy

Procedia PDF Downloads 77
7799 To Study the New Invocation of Biometric Authentication Technique

Authors: Aparna Gulhane

Abstract:

Biometrics is the science and technology of measuring and analyzing biological data form the basis of research in biological measuring techniques for the purpose of people identification and recognition. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. Biometric systems are used to authenticate the person's identity. The idea is to use the special characteristics of a person to identify him. These papers present a biometric authentication techniques and actual deployment of potential by overall invocation of biometrics recognition, with an independent testing of various biometric authentication products and technology.

Keywords: types of biometrics, importance of biometric, review for biometrics and getting a new implementation, biometric authentication technique

Procedia PDF Downloads 319
7798 Privacy Paradox and the Internet of Medical Things

Authors: Isabell Koinig, Sandra Diehl

Abstract:

In recent years, the health-care context has not been left unaffected by technological developments. In recent years, the Internet of Medical Things (IoMT)has not only led to a collaboration between disease management and advanced care coordination but also to more personalized health care and patient empowerment. With more than 40 % of all health technology being IoMT-related by 2020, questions regarding privacy become more prevalent, even more so during COVID-19when apps allowing for an intensive tracking of people’s whereabouts and their personal contacts cause privacy advocates to protest and revolt. There is a widespread tendency that even though users may express concerns and fears about their privacy, they behave in a manner that appears to contradict their statements by disclosing personal data. In literature, this phenomenon is discussed as a privacy paradox. While there are some studies investigating the privacy paradox in general, there is only scarce research related to the privacy paradox in the health sector and, to the authors’ knowledge, no empirical study investigating young people’s attitudes toward data security when using wearables and health apps. The empirical study presented in this paper tries to reduce this research gap by focusing on the area of digital and mobile health. It sets out to investigate the degree of importance individuals attribute to protecting their privacy and individual privacy protection strategies. Moreover, the question to which degree individuals between the ages of 20 and 30 years are willing to grant commercial parties access to their private data to use digital health services and apps are put to the test. To answer this research question, results from 6 focus groups with 40 participants will be presented. The focus was put on this age segment that has grown up in a digitally immersed environment. Moreover, it is particularly the young generation who is not only interested in health and fitness but also already uses health-supporting apps or gadgets. Approximately one-third of the study participants were students. Subjects were recruited in August and September 2019 by two trained researchers via email and were offered an incentive for their participation. Overall, results indicate that the young generation is well informed about the growing data collection and is quite critical of it; moreover, they possess knowledge of the potential side effects associated with this data collection. Most respondents indicated to cautiously handle their data and consider privacy as highly relevant, utilizing a number of protective strategies to ensure the confidentiality of their information. Their willingness to share information in exchange for services was only moderately pronounced, particularly in the health context, since health data was seen as valuable and sensitive. The majority of respondents indicated to rather miss out on using digital and mobile health offerings in order to maintain their privacy. While this behavior might be an unintended consequence, it is an important piece of information for app developers and medical providers, who have to find a way to find a user base for their products against the background of rising user privacy concerns.

Keywords: digital health, privacy, privacy paradox, IoMT

Procedia PDF Downloads 136
7797 Assessing Female Students' Understanding of the Solar System Concepts by Implementing I-Cube Technology

Authors: Elham Ghazi Mohammad

Abstract:

This study examined the female students’ understanding for the solar system concepts through the utilization of the I-Cube technology as a virtual reality technology. The study conducted in Qatar University for samples of students of eighth and ninth preparatory grade students in the State of Qatar. The research framework comprises designated quantitative research designs and methods of data collection and analysis including pre- and post-conceptual exams. This research based on experimental method design that focuses on students’ performance and conceptual questions. A group of 120 students from the eighth and ninth groups were divided into two pools of 60 students each, where the two 60-student groups represent the designated control and treatment groups. It must be mentioned that the students were selected randomly from the eighth and ninth grades. The solar system lesson of interest was taught by teacher candidates (senior students at the college of Education at QU), who taught both the experimental group (integrating I-cube) in virtual lab in Qatar University and control group (without integrating this technology) in one of independent school in the State of Qatar. It is noteworthy to mention that the students usually face some difficulties to learn by imagining real situation such as solar system and inner planet lesson. Collected data was statistically analyzed using one-way ANOVA and one-way ANCOVA using SPSS Statistics. The obtained results revealed that integrating I-Cube technology has significantly enhanced female students’ conceptual understanding of the solar system. Interestingly, our findings demonstrated the applicability of utilizing integrating I-Cube technology toward enhancing the students’ understanding regarding subjects of interests within the landscapes of basic sciences.

Keywords: virtual lab, integrating technology, I-Cube, solar system

Procedia PDF Downloads 236
7796 Effects of the Supplementary for Understanding and Preventing Plagiarism on EFL Students’ Writing

Authors: Surichai Butcha, Dararat Khampusaen

Abstract:

As the Internet is recognized as a high potential and powerful educational tool to access sources of knowledge, plagiarism is an increasing unethical issue found in students’ writing. This paper is deriving from the 1st phase of an on-going study investigating the effects of the supplementary on citing sources on undergraduate students’ writing. The 40 participants were divided into 1 experimental group and 1 control group. Both groups were administered with a questionnaire on knowledge and an interview on attitude related to using sources in writing. Only the experimental group undertook the 4 lessons focusing on using outside sources and citing the original work (quoting, synthesizing, summarizing and paraphrasing) were delivered to them via e-learning tools throughout a semester. Participants were required to produce 4 writing tasks after each lesson. The results were concerned with types and factors on using outside sources in writing of Thai undergraduate EFL students from the survey. The interview results supported and clarified the survey result. In addition, the writing rubrics confirmed the types of plagiarism frequently occurred in students’ writing. The results revealed the types and factors on plagiarism including their perceptions on using the outside sources in their writing from the interview. The discussion shed the lights on cultural dimensions of plagiarism in student writing, roles of teachers, library, and university policy on the rate of plagiarism. Also, the findings promoted the awareness on ethics in writing and prevented the rate of potential unintentional plagiarism. Additionally, the results of this phase of study could lead to the appropriate contents to be considered for inclusion in the supplementary on using sources for writing for future research.

Keywords: citing source, EFL writing, e-learning, Internet, plagiarism

Procedia PDF Downloads 148
7795 Contribution of Automated Early Warning Score Usage to Patient Safety

Authors: Phang Moon Leng

Abstract:

Automated Early Warning Scores is a newly developed clinical decision tool that is used to streamline and improve the process of obtaining a patient’s vital signs so a clinical decision can be made at an earlier stage to prevent the patient from further deterioration. This technology provides immediate update on the score and clinical decision to be taken based on the outcome. This paper aims to study the use of an automated early warning score system on whether the technology has assisted the hospital in early detection and escalation of clinical condition and improve patient outcome. The hospital adopted the Modified Early Warning Scores (MEWS) Scoring System and MEWS Clinical Response into Philips IntelliVue Guardian Automated Early Warning Score equipment and studied whether the process has been leaned, whether the use of technology improved the usage & experience of the nurses, and whether the technology has improved patient care and outcome. It was found the steps required to obtain vital signs has been significantly reduced and is used more frequently to obtain patient vital signs. The number of deaths, and length of stay has significantly decreased as clinical decisions can be made and escalated more quickly with the Automated EWS. The automated early warning score equipment has helped improve work efficiency by removing the need for documenting into patient’s EMR. The technology streamlines clinical decision-making and allows faster care and intervention to be carried out and improves overall patient outcome which translates to better care for patient.

Keywords: automated early warning score, clinical quality and safety, patient safety, medical technology

Procedia PDF Downloads 176
7794 ICT for Smart Appliances: Current Technology and Identification of Future ICT Trend

Authors: Abubakar Uba Ibrahim, Ibrahim Haruna Shanono

Abstract:

Smart metering and demand response are gaining ground in industrial and residential applications. Smart Appliances have been given concern towards achieving Smart home. The success of Smart grid development relies on the successful implementation of Information and Communication Technology (ICT) in power sector. Smart Appliances have been the technology under development and many new contributions to its realization have been reported in the last few years. The role of ICT here is to capture data in real time, thereby allowing bi-directional flow of information/data between producing and utilization point; that lead a way for the attainment of Smart appliances where home appliances can communicate between themselves and provide a self-control (switch on and off) using the signal (information) obtained from the grid. This paper depicts the background on ICT for smart appliances paying a particular attention to the current technology and identifying the future ICT trends for load monitoring through which smart appliances can be achieved to facilitate an efficient smart home system which promote demand response program. This paper grouped and reviewed the recent contributions, in order to establish the current state of the art and trends of the technology, so that the reader can be provided with a comprehensive and insightful review of where ICT for smart appliances stands and is heading to. The paper also presents a brief overview of communication types, and then narrowed the discussion to the load monitoring (Non-intrusive Appliances Load Monitoring ‘NALM’). Finally, some future trends and challenges in the further development of the ICT framework are discussed to motivate future contributions that address open problems and explore new possibilities.

Keywords: communication technology between appliances, demand response, load monitoring, smart appliances, smart grid

Procedia PDF Downloads 612
7793 Impact of Social Distancing on the Correlation Between Adults’ Participation in Learning and Acceptance of Technology

Authors: Liu Yi Hui

Abstract:

The COVID-19 pandemic in 2020 has globally affected all aspects of life, with social distancing and quarantine orders causing turmoil and learning in community colleges being temporarily paused. In fact, this is the first time that adult education has faced such a severe challenge. It forces researchers to reflect on the impact of pandemics on adult education and ways to respond. Distance learning appears to be one of the pedagogical tools capable of dealing with interpersonal isolation and social distancing caused by the pandemic. This research aims to examine whether the impact of social distancing during COVID-19 will lead to increased acceptance of technology and, subsequently, an increase in adults ’ willingness to participate in distance learning. The hypothesis that social distancing and the desire to participate in distance learning affects learners’ tendency to accept technology is investigated. Teachers ’ participation in distance education and acceptance of technology are used as adjustment variables with the relationship to “social distancing,” “participation in distance learning,” and “acceptance of technology” of learners. A questionnaire survey was conducted over a period of twelve months for teachers and learners at all community colleges in Taiwan who enrolled in a basic unit course. Community colleges were separated using multi-stage cluster sampling, with their locations being metropolitan, non-urban, south, and east as criteria. Using the G*power software, 660 samples were selected and analyzed. The results show that through appropriate pedagogical strategies or teachers ’ own acceptance of technology, adult learners’ willingness to participate in distance learning could be influenced. A diverse model of participation can be developed, improving adult education institutions’ ability to plan curricula to be flexible to avoid the risk associated with epidemic diseases.

Keywords: social distancing, adult learning, community colleges, technology acceptance model

Procedia PDF Downloads 139
7792 Digital Preservation: A Need of Tomorrow

Authors: Gaurav Kumar

Abstract:

Digital libraries have been established all over the world to create, maintain and to preserve the digital materials. This paper exhibits the importance and objectives of digital preservation. The necessities of preservation are hardware and software technology to interpret the digital documents and discuss various aspects of digital preservation.

Keywords: preservation, digital preservation, conservation, archive, repository, document, information technology, hardware, software, organization, machine readable format

Procedia PDF Downloads 586
7791 Internet-Delivered Cognitive Behaviour Therapy for Depression Comorbid with Diabetes: Preliminary Findings

Authors: Lisa Robins, Jill Newby, Kay Wilhelm, Therese Fletcher, Jessica Smith, Trevor Ma, Adam Finch, Lesley Campbell, Jerry Greenfield, Gavin Andrews

Abstract:

Background:Depression treatment for people living with depression comorbid with diabetes is of critical importance for improving quality of life and diabetes self-management, however depression remains under-recognised and under-treated in this population. Cost—effective and accessible forms of depression treatment that can enhance the delivery of mental health services in routine diabetes care are needed. Provision of internet-delivered Cognitive Behaviour Therapy (iCBT) provides a promising way to deliver effective depression treatment to people with diabetes. Aims:To explore the outcomes of the clinician assisted iCBT program for people with comorbid Major Depressive Disorder (MDD) and diabetes compared to those who remain under usual care. The main hypotheses are that: (1) Participants in the treatment group would show a significant improvement on disorder specific measures (Patient Health Questionnaire; PHQ-9) relative to those in the control group; (2) Participants in the treatment group will show a decrease in diabetes-related distress relative to those in the control group. This study will also examine: (1) the effect of iCBT for MDD on disability (as measured by the SF-12 and SDS), general distress (as measured by the K10), (2) the feasibility of these treatments in terms of acceptability to diabetes patients and practicality for clinicians (as measured by the Credibility/Expectancy Questionnaire; CEQ). We hypothesise that associated disability, and general distress will reduce, and that patients with comorbid MDD and diabetes will rate the program as acceptable. Method:Recruit 100 people with MDD comorbid with diabetes (either Type 1 or Type 2), and randomly allocate to: iCBT (over 10 weeks) or treatment as usual (TAU) for 10 weeks, then iCBT. Measure pre- and post-intervention MDD severity, anxiety, diabetes-related distress, distress, disability, HbA1c, lifestyle, adherence, satisfaction with clinicians input and the treatment. Results:Preliminary results comparing MDD symptom levels, anxiety, diabetes-specific distress, distress, disability, HbA1c levels, and lifestyle factors from baseline to conclusion of treatment will be presented, as well as data on adherence to the lessons, homework downloads, satisfaction with the clinician's input and satisfaction with the mode of treatment generally.

Keywords: cognitive behaviour therapy, depression, diabetes, internet

Procedia PDF Downloads 489
7790 Applying Concurrent Development Process for the Web Using Aspect-Oriented Approach

Authors: Hiroaki Fukuda

Abstract:

This paper shows a concurrent development process for modern web application, called Rich Internet Application (RIA), and describes its effect using a non-trivial application development. In the last years, RIAs such as Ajax and Flex have become popular based mainly on high-speed network. RIA provides sophisticated interfaces and user experiences, therefore, the development of RIA requires two kinds of engineer: a developer who implements business logic, and a designer who designs interface and experiences. Although collaborative works are becoming important for the development of RIAs, shared resources such as source code make it difficult. For example, if a design of interface is modified after developers have finished business logic implementations, they need to repeat the same implementations, and also tests to verify application’s behavior. MVC architecture and Object-oriented programming (OOP) enables to dividing an application into modules such as interfaces and logic, however, developers and/or designers have to write pieces of code (e.g., event handlers) that make these modules work as an application. On the other hand, Aspect-oriented programming (AOP) is ex- pected to solve complexity of application software development nowadays. AOP provides methods to separate crosscutting concerns that are scattered pieces of code from primary concerns. In this paper, we provide a concurrent development process for RIAs by introducing AOP concept. This process makes it possible to reduce shared resources between developers and designers, therefore they can perform their tasks concurrently. In addition, we describe experiences of development for a practical application using our proposed development process to show its availability.

Keywords: aspect-oriented programming, concurrent, development process, rich internet application

Procedia PDF Downloads 300
7789 Criminal Law and Internet of Things: Challenges and Threats

Authors: Celina Nowak

Abstract:

The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.

Keywords: criminal law, internet of things, privacy, security threats

Procedia PDF Downloads 161
7788 Retrofitting Cement Plants with Oxyfuel Technology for Carbon Capture

Authors: Peloriadi Konstantina, Fakis Dimitris, Grammelis Panagiotis

Abstract:

Methods for carbon capture and storage (CCS) can play a key role in the reduction of industrial CO₂ emissions, especially in the cement industry, which accounts for 7% of global emissions. Cement industries around the world have committed to address this problem by reaching carbon neutrality by the year 2050. The aim of the work to be presented was to contribute to the decarbonization strategy by integrating the 1st generation oxyfuel technology in cement production plants. This technology has been shown to improve fuel efficiency while providing one of the most cost-effective solutions when compared to other capture methods. A validated simulation of the cement plant was thus used as a basis to develop an oxyfuel retrofitted cement process. The process model for the oxyfuel technology is developed on the ASPEN (Advanced System for Process Engineering) PLUSTM simulation software. This process consists of an Air Separation Unit (ASU), an oxyfuel cement plant with coal and alternative solid fuel (ASF) as feedstock, and a carbon dioxide processing unit (CPU). A detailed description and analysis of the CPU will be presented, including the findings of a literature review and simulation results, regarding the effects of flue gas impurities during operation. Acknowledgment: This research has been conducted in the framework of the EU funded AC2OCEM project, which investigates first and the second generation oxyfuel concepts.

Keywords: oxyfuel technology, carbon capture and storage, CO₂ processing unit, cement, aspen plus

Procedia PDF Downloads 188
7787 The Application of Data Mining Technology in Building Energy Consumption Data Analysis

Authors: Liang Zhao, Jili Zhang, Chongquan Zhong

Abstract:

Energy consumption data, in particular those involving public buildings, are impacted by many factors: the building structure, climate/environmental parameters, construction, system operating condition, and user behavior patterns. Traditional methods for data analysis are insufficient. This paper delves into the data mining technology to determine its application in the analysis of building energy consumption data including energy consumption prediction, fault diagnosis, and optimal operation. Recent literature are reviewed and summarized, the problems faced by data mining technology in the area of energy consumption data analysis are enumerated, and research points for future studies are given.

Keywords: data mining, data analysis, prediction, optimization, building operational performance

Procedia PDF Downloads 851
7786 Comparative Analysis of Fused Deposition Modeling and Binding-Jet 3D Printing Technologies

Authors: Mohd Javaid, Shahbaz Khan, Abid Haleem

Abstract:

Purpose: Large numbers of 3D printing technologies are now available for sophisticated applications in different fields. Additive manufacturing has established its dominance in design, development, and customisation of the product. In the era of developing technologies, there is a need to identify the appropriate technology for different application. In order to fulfil this need, two widely used printing technologies such as Fused Deposition Modeling (FDM), and Binding-Jet 3D Printing are compared for effective utilisation in the current scenario for different applications. Methodology: Systematic literature review conducted for both technologies with applications and associated factors enabling for the same. Appropriate MCDM tool is used to compare critical factors for both the technologies. Findings: Both technologies have their potential and capabilities to provide better direction to the industry. Additionally, this paper is helpful to develop a decision support system for the proper selection of technologies according to their continuum of applications and associated research and development capability. The vital issue is raw materials, and research-based material development is key to the sustainability of the developed technologies. FDM is a low-cost technology which provides high strength product as compared to binding jet technology. Researcher and companies can take benefits of this study to achieve the required applications in lesser resources. Limitations: Study has undertaken the comparison with the opinion of experts, which may not always be free from bias, and some own limitations of each technology. Originality: Comparison between these technologies will help to identify best-suited technology as per the customer requirements. It also provides development in this different field as per their extensive capability where these technologies can be successfully adopted. Conclusion: FDM and binding jet technology play an active role in industrial development. These help to assist the customisation and production of personalised parts cost-effectively. So, there is a need to understand how these technologies can provide these developments rapidly. These technologies help in easy changes or in making revised versions of the product, which is not easily possible in the conventional manufacturing system. High machine cost, the requirement of skilled human resources, low surface finish, and mechanical strength of product and material changing option is the main limitation of this technology. However, these limitations vary from technology to technology. In the future, these technologies are to be commercially viable for efficient usage in direct manufacturing of varied parts.

Keywords: 3D printing, comparison, fused deposition modeling, FDM, binding jet technology

Procedia PDF Downloads 104
7785 The Role Of Digital Technology In Crime Prevention

Authors: Muhammad Ashfaq

Abstract:

Main theme: This prime focus of this study is on the role of digital technology in crime prevention, with special focus on Cellular Forensic Unit, Capital City Police Peshawar-Khyber Pakhtunkhwa-Pakistan. Objective(s) of the study: The prime objective of this study is to provide statistics, strategies and pattern of analysis used for crime prevention in Cellular Forensic Unit of Capital City Police Peshawar, Khyber Pakhtunkhwa-Pakistan. Research Method and Procedure: Qualitative method of research has been used in the study for obtaining secondary data from research wing and Information Technology (IT) section of Peshawar police. Content analysis was the method used for the conduction of the study. This study is delimited to Capital City Police and Cellular Forensic Unit Peshawar-KP, Pakistan. information technologies. Major finding(s): It is evident that the old traditional approach will never provide solutions for better management in controlling crimes. The best way to control crimes and promotion of proactive policing is to adopt new technologies. The study reveals that technology have transformed police more effective and vigilant as compared to traditional policing. The heinous crimes like abduction, missing of an individual, snatching, burglaries and blind murder cases are now traceable with the help of technology. Recommendation(s): From the analysis of the data, it is reflected that Information Technology (IT) expert should be recruited along with research analyst to timely assist and facilitate operational as well as investigation units of police.A mobile locator should be Provided to Cellular Forensic Unit to timely apprehend the criminals .Latest digital analysis software should be provided to equip the Cellular Forensic Unit.

Keywords: crime prevention, digital technology, pakistan, police

Procedia PDF Downloads 64