Search results for: industrial Internet of things
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5281

Search results for: industrial Internet of things

3031 Synthesis and Characterization of Chitosan Microparticles for Scaffold Structure and Bioprinting

Authors: J. E. Mendes, T. T. de Barros, O. B. G. de Assis, J. D. C. Pessoa

Abstract:

Chitosan, a natural polysaccharide of β-1,4-linked glucosamine residues, is a biopolymer obtained primarily from the exoskeletons of crustaceans. Interest in polymeric materials increases year by year. Chitosan is one of the most plentiful biomaterials, with a wide range of pharmaceutical, biomedical, industrial and agricultural applications. Chitosan nanoparticles were synthesized via the ionotropic gelation of chitosan with sodium tripolyphosphate (TPP). Two concentrations of chitosan microparticles (0.1 and 0.2%) were synthesized. In this study, it was possible to synthesize and characterize microparticles of chitosan biomaterial and this will be used for future applications in cell anchorage for 3D bioprinting.

Keywords: chitosan microparticles, biomaterial, scaffold, bioprinting

Procedia PDF Downloads 318
3030 Application of Constructivist-Based (5E’s) Instructional Approach on Pupils’ Retention: A Case Study in Primary Mathematics in Enugu State

Authors: Ezeamagu M.U, Madu B.C

Abstract:

This study was designed to investigate the efficacy of 5Es constructivist-based instructional model on students’ retention in primary Mathematics. 5Es stands for Engagement, Exploration, Explanation, Elaboration and Evaluation. The study adopted the pre test post test non-equivalent control group quasi-experimental research design. The sample size for the study was one hundred and thirty four pupils (134), seventy six male (76) and fifty eight female (58) from two primary schools in Nsukka education zone. Two intact classes in each of the sampled schools comprising all the primary four pupils were used. Each of the schools was given the opportunity of being assigned randomly to either experimental or control group. The Experimental group was taught using 5Es model while the control group was taught using the conventional method. Two research questions were formulated to guide the study and three hypotheses were tested at p ≤ 0. 05. A Fraction Achievement Test (FAT) of ten (10) questions were used to obtain data on pupils’ retention. Research questions were answered using mean and standard deviation while hypotheses were tested using analysis of covariance (ANCOVA). The result revealed that the 5Es model was more effective than the conventional method of teaching in enhancing pupils’ performance and retention in mathematics, secondly there is no significant difference in the mean retention scores of male and female students taught using 5Es instructional model. Based on the findings, it was recommended among other things, that the 5Es instructional model should be adopted in the teaching of mathematics in primary level of the educational system. Seminar, workshops and conferences should be mounted by professional bodies, federal and state ministries of education on the use of 5Es model. This will enable the mathematics educator, serving teachers, students and all to benefit from the approach.

Keywords: constructivist, education, mathematics, primary, retention

Procedia PDF Downloads 448
3029 Microalgae for Plant Biostimulants on Whey and Dairy Wastewaters

Authors: Sergejs Kolesovs, Pavels Semjonovs

Abstract:

Whey and dairy wastewaters if disposed in the environment without proper treatment, cause serious environmental risks contributing to overall and particular environmental pollution and climate change. Biological treatment of wastewater is considered to be most eco-friendly approach, as compared to the chemical treatment methods. Research shows, that dairy wastewater can potentially be remediated by use of microalgae thussignificantly reducing the content of carbohydrates, P, N, K and other pollutants. Moreover, it has been shown, that use of dairy wastewaters results in higher microalgae biomass production. In recent decades microalgal biomass has entailed a big interest for its potential applications in pharmaceuticals, biomedicine, health supplementation, cosmetics, animal feed, plant protection, bioremediation and biofuels. It was shown, that lipids productivity on whey and dairy wastewater is higher as compared with standard cultivation media and occurred without the necessity of inducing specific stress conditions such as N starvation. Moreover, microalgae biomass production as usually associated with high production costs may benefit from perspective of both reasons – enhanced microalgae biomass or target substances productivity on cheap growth substrate and effective management of whey and dairy wastewaters, which issignificant for decrease of total production costs in both processes. Obviously, it became especially important when large volume and low cost industrial microalgal biomass production is anticipated for further use in agriculture of crops as plant growth stimulants, biopesticides soil fertilisers or remediating solutions. Environmental load of dairy wastewaters can be significantly decreased when microalgae are grown in coculture with other microorganisms. This enhances the utilisation of lactose, which is main C source in whey and dairy wastewaters when it is not metabolised easily by most microalgal species chosen. Our study showsthat certain microalgae strains can be used in treatment of residual sugars containing industrial wastewaters and decrease of their concentration thus approving that further extensive research on dairy wastewaters pre-treatment optionsfor effective cultivation of microalgae, carbon uptake and metabolism, strain selection and choice of coculture candidates is needed for further optimisation of the process.

Keywords: microalgae, whey, dairy wastewaters, sustainability, plant biostimulants

Procedia PDF Downloads 90
3028 Children Protection in the Digital Space

Authors: Beverly Komen

Abstract:

Online crimes have been on the rise in the recent days, especially with the hit of the covid-19 pandemic. The coronavirus pandemic has led to an unprecedented rise in screen time, this means more families are relying on technology and digital solutions to keep children learning, spending more time on the virtual platforms can leave children vulnerable to online abuse and exploitation. With ease access of affordable phones, internet, and increased online activities, all children are at risk of being abused online hence making the digital space unsafe for children. With these increased use of technology and its accessibility, children are at risk of facing challenges such as access to inappropriate content, online grooming, identity theft, cyber bullying, among other risks. The big question is; as we enjoy the benefits brought in by technology, how do we ensure that our children are save in this digital space? With the analysis of the current trends, there is a gap in knowledge on people’s understanding on child online protection and safety measures when using the digital space. A survey conducted among 50 parents in Nairobi in Kenya indicated that there is a gap in knowledge on online protection of children and over 50 % of the participants shared that for sure they have no idea on how to protect children online. This paper seeks to address the concept of child protection in the digital space and come up with viable solutions in protecting children from online vices.

Keywords: child protection, digital space, online risks, online grooming, cyber bulying, online child sexual exploitation, and abuse

Procedia PDF Downloads 180
3027 Influence of Sodium Acetate on Electroless Ni-P Deposits and Effect of Heat Treatment on Corrosion Behavior

Authors: Y. El Kaissi, M. Allam, A. Koulou, M. Galai, M. Ebn Touhami

Abstract:

The aim of our work is to develop an industrial bath of nickel alloy deposit on mild steel. The optimization of the operating parameters made it possible to obtain a stable Ni-P alloy deposition formulation. To understand the reaction mechanism of the deposition process, a kinetic study was performed by cyclic voltammetry and by electrochemical impedance spectroscopy (EIS). The coatings obtained have a very high corrosion resistance in a very aggressive acid medium which increases with the heat treatment.

Keywords: cyclic voltammetry, EIS, electroless Ni–P coating, heat treatment, potentiodynamic polarization

Procedia PDF Downloads 296
3026 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 262
3025 Developing a Video Game (Historia’s Nightmare) and Finding Out if We Can Use It to Raise Social Awareness and Improve Learning

Authors: Hasibul Kabir, Samin Shahriar Tokey, Md. Tofazzal Hossain

Abstract:

One of the most necessary things in the present time is raising social awareness about global warming and climate change among the people. Though many types of mediums and techniques have been used to teach people about this global phenomenon, there are still more effective ways to reach people with useful information about global warming. As many traditional methods to teach people about global warming and climate change did not work well, video games were overdue. To learn how effective a video game can be in this regard, we developed a Video game, "Historia's Nightmare," that teaches people about Global warming and climate change. The game was designed to entertain people and give them an idea about the reasons and consequences of global warming and climate change while not being like traditional educational games. The game threw a mini quiz consisting of two MCQs based on the information shown in the game, where a gamer had to pass the quiz to reach the next level. We published the game on different platforms to let all types of people play and complete our experiment effectively. The game continuously communicated with our server to send data about gamers' performance. We observed the data, including the participants' performance, time spent, quiz score, and the in-game feedback on a regular basis, and finally came to a verdict. In our experiment, we have found that most participants positively accepted the game and learned something new. The participants who spent more on our game performed better in both quiz and the game. Our experiment's result demonstrates that video games can be a great way to teach people something, particularly to raise social awareness about global warming and climate change. It also demonstrates that the game can be a significant element in education and learning improvement.

Keywords: video game, global warming, social awareness, climate change, education, feedback

Procedia PDF Downloads 131
3024 Online Graduate Students’ Perspective on Engagement in Active Learning in the United States

Authors: Ehi E. Aimiuwu

Abstract:

As of 2017, many researchers in educational journals are still wondering if students are effectively and efficiently engaged in active learning in the online learning environment. The goal of this qualitative single case study and narrative research is to explore if students are actively engaged in their online learning. Seven online students in the United States from LinkedIn and residencies were interviewed for this study. Eleven online learning techniques from research were used as a framework.  Data collection tools were used for the study that included a digital audiotape, observation sheet, interview protocol, transcription, and NVivo 12 Plus qualitative software.  Data analysis process, member checking, and key themes were used to reach saturation. About 85.7% of students preferred individual grading. About 71.4% of students valued professor’s interacting 2-3 times weekly, participating through posts and responses, having good internet access, and using email.  Also, about 57.1% said students log in 2-3 times weekly to daily, professor’s social presence helps, regular punctuality in work submission, and prefer assessments style of research, essay, and case study.  About 42.9% appreciated syllabus usefulness and professor’s expertise.

Keywords: class facilitation, course management, online teaching, online education, student engagement

Procedia PDF Downloads 124
3023 Future Education: Changing Paradigms

Authors: Girish Choudhary

Abstract:

Education is in a state of flux. Not only one need to acquire skills in order to cope with a fast changing global world, an explosive growth in technology, on the other hand is providing a new wave of teaching tools - computer aided video instruction, hypermedia, multimedia, CD-ROMs, Internet connections, and collaborative software environments. The emerging technology incorporates the group qualities of interactive, classroom-based learning while providing individual students the flexibility to participate in an educational programme at their own time and place. The technology facilitating self learning also seems to provide a cost effective solution to the dilemma of delivering education to masses. Online education is a unique learning domain that provides for many to many communications as well. The computer conferencing software defines the boundaries of the virtual classroom. The changing paradigm provides access of instruction to a large proportion of society, promises a qualitative change in the quality of learning and echoes a new way of thinking in educational theory that promotes active learning and open new learning approaches. Putting it to practice is challenging and may fundamentally alter the nature of educational institutions. The subsequent part of paper addresses such questions viz. 'Do we need to radically re-engineer the curriculum and foster an alternate set of skills in students?' in the onward journey.

Keywords: on-line education, self learning, energy and power engineering, future education

Procedia PDF Downloads 324
3022 Chat-Based Online Counseling for Enhancing Wellness of Undergraduates with Emotional Crisis Tendency

Authors: Arunya Tuicomepee

Abstract:

During the past two decades, there have been the increasing numbers of studies on online counseling, especially among adolescents who are familiar with the online world. This can be explained by the fact that via this channel enables easier access to the young, who may not be ready for face-to-face service, possibly due to uneasiness to reveal their personal problems with a stranger, the feeling that their problems are to be shamed, or the need to protect their images. Especially, the group of teenagers prone to suicide or despair, who tend to keep things to or isolate from the society to themselves, usually prefer types of services that require no face-to-face encounter and allow their anonymity, such as online services. This study aimed to examine effectiveness of chat-based online counseling for enhancing wellness of undergraduates with emotional crisis tendency. Experimental with pretest-posttest control group design was employed. Participants were 47 undergraduates (10 males and 37 females) with high emotional crisis tendency. They were randomly assigned to experimental group (24 students) and control group (23 students). Participants in the experimental group received a 60-minute, 4-sessions of individual chat-based online counseling led by counselor. Those in control group received no counseling session. Instruments were the Emotional Crisis Scale and Wellness Scales. Two-way mixed-design multivariate analysis of variance was used for data analysis. Finding revealed that the posttest scores on wellness of those in the experimental group were higher than the scores of those in the control group. The posttest scores on emotional crisis tendency of those in the experimental group were lower than the scores of those in the control group. Hence, this study suggests chat-based online counseling services can become a helping source that increasing more adolescents would recognize and turn to in the future and that will receive more attention.

Keywords: chat-based online counseling, emotional crisis, undergraduate student, wellness

Procedia PDF Downloads 237
3021 Regional Identity Construction of Acehnese English Teachers in Professional Practice

Authors: Ugahara Bin Mahyuddin Yunus

Abstract:

In English Language Teaching, it cannot be denied that the backgrounds of English teachers do affect the way they teach English to their students, which in turn will affect their students’ English learning itself. Thus, it is very important to understand who the English teachers are so that how they teach English to their students can be understood. One of their backgrounds that is essential to be highlighted is their culture. Certainly, they wittingly or not will bring the perspectives and values of their culture into their daily teaching practices. In other words, their cultural identities do shape how they teach their students. Cultural identities themselves actually consist of some elements, one of which is regional identity. Indeed, the culture of the region in which English teachers identify with has impact on their beliefs and actions during teaching. For this reason, this study aims to understand how the regional identity of English teachers influence the way they teach English to their students. This study is a qualitative study conducted in a multilingual and multicultural setting, namely Aceh, Indonesia. Here, four Acehnese English teachers were involved as the research participants. In addition, this study adopted poststructuralist perspective to identity as the theoretical framework. Three research instruments were used in this study, namely semi-structured interviews, classroom observation, and teacher journal. The data gained from these instruments were then analyzed by using thematic analysis. Obviously, the research about the regional identity of English teachers in English Language Teaching has been studied worldwide. However, little is still known about it in Indonesian context, let alone Indonesia itself is a super diverse country with 34 regions. As a result, this study presents a good opportunity to advance the knowledge of how the regional identity construction of English teachers in this setting is. The findings of the study revealed that their regional identity construction in teaching was highly influenced by their indigenous language and religious faith. Even, how they teach English in classroom, in fact, is related to these two things. The conclusion that can be drawn from this study is for these English teachers, in fact, their regional identity itself constitutes their use of local language and religious identity, which are considered by them as their core identity.

Keywords: English language teaching, English teachers, identity construction, regional identity

Procedia PDF Downloads 240
3020 The Phatic Function and the Socializing Element of Personal Blogs

Authors: Emelia Noronha, Milind Malshe

Abstract:

The phatic function of communication is a vital element of any conversation. This research paper looks into this function with respect to personal blogs maintained by Indian bloggers. This paper is a study into the phenomenon of phatic communication maintained by bloggers through their blogs. Based on a linguistic analysis of the posts of twenty eight Indian bloggers, writing in English, studied over a period of three years, the study indicates that though the blogging phenomenon is not conversational in the same manner as face-to-face communication, it does make ample provision for feedback that is conversational in nature. Ordinary day to day offline conversations use conventionalized phatic utterances; those on the social media are in a perpetual mode of innovation and experimentation in order to sustain contact with its readers. These innovative methods and means are the focus of this study. Though the personal blogger aims to chronicle his/her personal life through the blog, the socializing function is crucial to these bloggers. In comparison to the western personal blogs which focus on the presentation of the ‘bounded individual self’, we find Indian personal bloggers engage in the presentation of their ‘social selves’. These bloggers yearn to reach out to the readers on the internet and the phatic function serves to initiate, sustain and renew social ties on the blogosphere thereby consolidating the social network of readers and bloggers.

Keywords: personal blogs, phatic, social-selves, blog readers

Procedia PDF Downloads 357
3019 Towards the Management of Cybersecurity Threats in Organisations

Authors: O. A. Ajigini, E. N. Mwim

Abstract:

Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.

Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information

Procedia PDF Downloads 254
3018 Development of Lodging Business Management Standards of Bang Khonthi Community in Samut Songkram Province

Authors: Poramet Saeng-On

Abstract:

This research aims to develop ways of lodging business management of Bang Khonthi community in Samut Songkram province that are appropriate with the cultural context of the Bang Khonthi community. Eight lodging business owners were interviewed. It was found that lodging business that are family business must be done with passion, correct understanding of self, culture, nature, Thai way of life, thorough, professional development, environmentally concerned, building partnerships with various networks both community level, and public sector and business cohorts. Public relations should be done through media both traditional and modern outlets, such as websites and social networks to provide customers convenience, security, happiness, knowledge, love and value when travel to Bang Khonthi. This will also help them achieve sustainability in business, in line with the 10 Home Stay Standard Thailand. Suggestions for operators are as follows: Operators need to improve their public relations work. They need to use technology in public relations such as the internet. Management standards must be improved. Souvenir and local products shops should be arranged in the compound. Product pricing must be set accordingly. They need to join hands to help each other. Quality of the business operation should be raised to meet the standards. Educational measures to reduce the impact caused by tourism on the community such as efforts to reduce energy consumption.

Keywords: homestay, lodging business, management, standard

Procedia PDF Downloads 438
3017 Transit-Oriented Development as a Tool for Building Social Capital

Authors: Suneet Jagdev

Abstract:

Rapid urbanization has resulted in informal settlements on the periphery of nearly all big cities in the developing world due to lack of affordable housing options in the city. Residents of these communities have to travel long distances to get to work or search for jobs in these cities, and women, children and elderly people are excluded from urban opportunities. Affordable and safe public transport facilities can help them expand their possibilities. The aim of this research is to identify social capital as another important element of livable cities that can be protected and nurtured through transit-oriented development, as a tool to provide real resources that can help these transit-oriented communities become self-sustainable. Social capital has been referred to the collective value of all social networks and the inclinations that arise from these networks to do things for each other. It is one of the key component responsible to build and maintain democracy. Public spaces, pedestrian amenities and social equity are the other essential part of Transit Oriented Development models that will be analyzed in this research. The data has been collected through the analysis of several case studies, the urban design strategies implemented and their impact on the perception and on the community´s experience, and, finally, how these focused on the social capital. Case studies have been evaluated on several metrics, namely ecological, financial, energy consumption, etc. A questionnaire and other tools were designed to collect data to analyze the research objective and reflect the dimension of social capital. The results of the questionnaire indicated that almost all the participants have a positive attitude towards this dimensions of building a social capital with the aid of transit-oriented development. Statistical data of the identified key motivators against against demographic characteristics have been generated based on the case studies used for the paper. The findings suggested that there is a direct relation between urbanization, transit-oriented developments, and social capital.

Keywords: better opportunities, low-income settlements, social capital, social inclusion, transit oriented development

Procedia PDF Downloads 328
3016 A Holographic Infotainment System for Connected and Driverless Cars: An Exploratory Study of Gesture Based Interaction

Authors: Nicholas Lambert, Seungyeon Ryu, Mehmet Mulla, Albert Kim

Abstract:

In this paper, an interactive in-car interface called HoloDash is presented. It is intended to provide information and infotainment in both autonomous vehicles and ‘connected cars’, vehicles equipped with Internet access via cellular services. The research focuses on the development of interactive avatars for this system and its gesture-based control system. This is a case study for the development of a possible human-centred means of presenting a connected or autonomous vehicle’s On-Board Diagnostics through a projected ‘holographic’ infotainment system. This system is termed a Holographic Human Vehicle Interface (HHIV), as it utilises a dashboard projection unit and gesture detection. The research also examines the suitability for gestures in an automotive environment, given that it might be used in both driver-controlled and driverless vehicles. Using Human Centred Design methods, questions were posed to test subjects and preferences discovered in terms of the gesture interface and the user experience for passengers within the vehicle. These affirm the benefits of this mode of visual communication for both connected and driverless cars.

Keywords: gesture, holographic interface, human-computer interaction, user-centered design

Procedia PDF Downloads 308
3015 Rational Thinking and Forgiveness in Pakistan: The Role of Democratic Values and Mass Media Attitude

Authors: Muhammad Shoaib

Abstract:

Every society has a set of beliefs, norms, values, folkways, mores and laws. All the principles, customs, traditions and procedures of societies are directly or indirectly related to the religion of the society and changed with the passage of time by the mediation of democratic values attitudes and mass media influence. The main objective of the present study is to examine the effects of rational thinking values on forgiveness attitude by the mediation of democratic values and mass media attitude among family members. As many other developing settings, Pakistani society is undergoing a rapid and multifaceted social change, in which traditional thinking coexists and often clashes with modern thinking. Rational thinking attitude has great effects on the forgiveness attitude among family members as well as all the members of Pakistani society. For the present study 520 respondents were sampled from two urban areas of Punjab province; Lahore and Faisalabad, through proportionate random sampling technique. A survey method was used as a technique of data collection and an interview schedule was administered to collect information from the respondents. The results support that the net of other factors, favorable democratic values attitudes are positively associated rational thinking attitudes. The results also provide support that all other things equal, mass media attitudes also have a significant positive effect on rational thinking attitudes. Favorable democratic values attitudes have a significant net positive effect and the effect of mass media attitudes is positive and statistically highly significant. It shows that the effects of both democratic values attitudes and mass media attitudes diminish in magnitude when the rational thinking attitudes scale is included. However, the effect of democratic values remains highly significant. In comparison, the effect of mass media attitudes is only marginally significant.

Keywords: rationality, forgiveness, democratic values, mass media, attitudes, Pakistan

Procedia PDF Downloads 363
3014 Study on the Effect of Coupling Fluid Compressible-Deformable Wall on the Flow of Molten Polymers

Authors: Mohamed Driouich, Kamal Gueraoui, Mohamed Sammouda

Abstract:

The main objective of this work is to establish a numerical code for studying the flow of molten polymers in deformable pipes. Using an iterative numerical method based on finite differences, we determine the profiles of the fluid velocity, the temperature and the apparent viscosity of the fluid. The numerical code presented can also be applied to other industrial applications.

Keywords: numerical code, molten polymers, deformable pipes, finite differences

Procedia PDF Downloads 568
3013 Detecting and Thwarting Interest Flooding Attack in Information Centric Network

Authors: Vimala Rani P, Narasimha Malikarjunan, Mercy Shalinie S

Abstract:

Data Networking was brought forth as an instantiation of information-centric networking. The attackers can send a colossal number of spoofs to take hold of the Pending Interest Table (PIT) named an Interest Flooding attack (IFA) since the in- interests are recorded in the PITs of the intermediate routers until they receive corresponding Data Packets are go beyond the time limit. These attacks can be detrimental to network performance. PIT expiration rate or the Interest satisfaction rate, which cannot differentiate the IFA from attacks, is the criterion Traditional IFA detection techniques are concerned with. Threshold values can casually affect Threshold-based traditional methods. This article proposes an accurate IFA detection mechanism based on a Multiple Feature-based Extreme Learning Machine (MF-ELM). Accuracy of the attack detection can be increased by presenting the entropy of Internet names, Interest satisfaction rate and PIT usage as features extracted in the MF-ELM classifier. Furthermore, we deploy a queue-based hostile Interest prefix mitigation mechanism. The inference of this real-time test bed is that the mechanism can help the network to resist IFA with higher accuracy and efficiency.

Keywords: information-centric network, pending interest table, interest flooding attack, MF-ELM classifier, queue-based mitigation strategy

Procedia PDF Downloads 202
3012 An Experiential Learning of Ontology-Based Multi-document Summarization by Removal Summarization Techniques

Authors: Pranjali Avinash Yadav-Deshmukh

Abstract:

Remarkable development of the Internet along with the new technological innovation, such as high-speed systems and affordable large storage space have led to a tremendous increase in the amount and accessibility to digital records. For any person, studying of all these data is tremendously time intensive, so there is a great need to access effective multi-document summarization (MDS) systems, which can successfully reduce details found in several records into a short, understandable summary or conclusion. For semantic representation of textual details in ontology area, as a theoretical design, our system provides a significant structure. The stability of using the ontology in fixing multi-document summarization problems in the sector of catastrophe control is finding its recommended design. Saliency ranking is usually allocated to each phrase and phrases are rated according to the ranking, then the top rated phrases are chosen as the conclusion. With regards to the conclusion quality, wide tests on a selection of media announcements are appropriate for “Jammu Kashmir Overflow in 2014” records. Ontology centered multi-document summarization methods using “NLP centered extraction” outshine other baselines. Our participation in recommended component is to implement the details removal methods (NLP) to enhance the results.

Keywords: disaster management, extraction technique, k-means, multi-document summarization, NLP, ontology, sentence extraction

Procedia PDF Downloads 381
3011 Evaluation of Pozzolanic Properties of Micro and Nanofillers Origin from Waste Products

Authors: Laura Vitola, Diana Bajare, Genadijs Sahmenko, Girts Bumanis

Abstract:

About 8 % of CO2 emission in the world is produced by concrete industry therefore replacement of cement in concrete composition by additives with pozzolanic activity would give a significant impact on the environment. Material which contains silica SiO2 or amorphous silica SiO2 together with aluminum dioxide Al2O3 is called pozzolana type additives in the concrete industry. Pozzolana additives are possible to obtain from recycling industry and different production by-products such as processed bulb boric silicate (DRL type) and lead (LB type) glass, coal combustion bottom ash, utilized brick pieces and biomass ash, thus solving utilization problem which is so important in the world, as well as practically using materials which previously were considered as unusable. In the literature, there is no summarized method which could be used for quick waste-product pozzolana activity evaluation without the performance of wide researches related to the production of innumerable concrete contents and samples in the literature. Besides it is important to understand which parameters should be predicted to characterize the efficiency of waste-products. Simple methods of pozzolana activity increase for different types of waste-products are also determined. The aim of this study is to evaluate effectiveness of the different types of waste materials and industrial by-products (coal combustion bottom ash, biomass ash, waste glass, waste kaolin and calcined illite clays), and determine which parameters have the greatest impact on pozzolanic activity. By using materials, which previously were considered as unusable and landfilled, in concrete industry basic utilization problems will be partially solved. The optimal methods for treatment of waste materials and industrial by–products were detected with the purpose to increase their pozzolanic activity and produce substitutes for cement in the concrete industry. Usage of mentioned pozzolanic allows us to replace of necessary cement amount till 20% without reducing the compressive strength of concrete.

Keywords: cement substitutes, micro and nano fillers, pozzolanic properties, specific surface area, particle size, waste products

Procedia PDF Downloads 423
3010 Effectiveness of Research Promotion Organizations in Higher Education and Research (ESR)

Authors: Jonas Sanon

Abstract:

The valorization of research is becoming a transversal instrument linking different sectors (academic, public and industrial). The practice of valorization seems to impact innovation techniques within companies where, there is often the implementation of industrial conventions of training through research (CIFRE), continuous training programs for employees, collaborations and partnerships around joint research and R&D laboratories focused on the needs of companies to improve or develop more efficient innovations. Furthermore, many public initiatives to support innovation and technology transfer have been developed at the international, European and national levels, with significant budget allocations. Thus, in the context of this work, we tried to analyze the way in which research transfer structures are evaluated within the Saclay ecosystem. In fact, the University-Paris-Saclay is one of the best French universities; it is made up of 10 university components, more than 275 laboratories and is in partnership with the largest French research centers This work mainly focused on how evaluations affected research transfer structures, how evaluations were conducted, and what the managers of research transfer structures thought about assessments. Thus, with the aid of the conducted interviews, it appears that the evaluations do not have a significant impact on the qualitative aspect of research and innovation, but is rather present a directive aspect to allow the structures to benefit or not from the financial resources to develop certain research work, sometimes directed and influenced by the market, some researchers might try to accentuate their research and experimentation work on themes that are not necessarily their areas of interest, but just to comply with the calls for proposed thematic projects. The field studies also outline the primary indicators used to assess the effectiveness of valorization structures as "the number of start-ups generated, the license agreements signed, the structure's patent portfolio, and the innovations of items developed from public research.". Finally, after mapping the actors, it became clear that the ecosystem of the University of Paris-Saclay benefits from a richness allowing it to better value its research in relation to the three categories of actors it has (internal, external and transversal), united and linked by a relationship of proximity of sharing and endowed with a real opportunity to innovate openly.

Keywords: research valorization, technology transfer, innovation, evaluation, impacts and performances, innovation policy

Procedia PDF Downloads 70
3009 The Use of Modern Technology to Enhance English Language Teaching and Learning: An Analysis

Authors: Fazilet Alachaher (Benzerdjeb)

Abstract:

From the chalkboard to the abacus and beyond, technology has always played an important role in education. Educational technology refers to any teaching tool that helps supports learning, and given the rapid advancements in Information Technology and multimedia applications, the potential to support the teaching of foreign languages in our universities is ever greater. In language teaching and learning, we have a lot of to choose from the world of technology: TV, CDs, DVDs, Computers, the Internet, Email, and Blogs. The use of modern technologies can enrich the experience of learning a foreign language because they provide features that are not present in traditional technology. They can offer a wide range of multimedia resources, opportunities for intensive one-to-one learning in language labs and resources for authentic materials, which can be motivating to both students and teachers. The advent of Information and Communication Technology (ICT) and online interaction can also open up new range of self-access and distance learning opportunities The two last decades have witnessed a revolution due to the onset of technology, and has changed the dynamics of various industries, and has also influenced the way people live and work in society. That is why using the multimedia to create a certain context to teach English has its unique advantages. This paper tries then to analyse the necessity of multimedia technology to language teaching and brings out the problems faced by using these technologies. It also aims at making English teachers aware of the strategies to use it in an effective manner.

Keywords: strategies English teaching, multimedia technology, advantages, disadvantages, English learning

Procedia PDF Downloads 454
3008 Wearable Interface for Telepresence in Robotics

Authors: Uriel Martinez-Hernandez, Luke W. Boorman, Hamideh Kerdegari, Tony J. Prescott

Abstract:

In this paper, we present architecture for the study of telepresence, immersion and human-robot interaction. The architecture is built around a wearable interface, developed here, that provides the human with visual, audio and tactile feedback from a remote location. We have chosen to interface the system with the iCub humanoid robot, as it mimics many human sensory modalities, such as vision, with gaze control and tactile feedback. This allows for a straightforward integration of multiple sensory modalities, but also offers a more complete immersion experience for the human. These systems are integrated, controlled and synchronised by an architecture developed for telepresence and human-robot interaction. Our wearable interface allows human participants to observe and explore a remote location, while also being able to communicate verbally with humans located in the remote environment. Our approach has been tested from local, domestic and business venues, using wired, wireless and Internet based connections. This has involved the implementation of data compression to maintain data quality to improve the immersion experience. Initial testing has shown the wearable interface to be robust. The system will endow humans with the ability to explore and interact with other humans at remote locations using multiple sensing modalities.

Keywords: telepresence, telerobotics, human-robot interaction, virtual reality

Procedia PDF Downloads 282
3007 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan

Authors: Pema Choejey, David Murray, Chun Che Fung

Abstract:

Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.

Keywords: awareness and training, cybersecurity policy, risk management, security risks

Procedia PDF Downloads 335
3006 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 276
3005 Digital Self-Care Intervention Evaluation from the Perspective of Healthcare Users

Authors: Dina Ziadlou, Anthony Sunjaya, Joyzen Cortez Ramos, Romario Muñoz Ramos, Richard Dasselaar

Abstract:

This study aimed to evaluate the opinions of users using digital health technologies to prevent, promote, and maintain their health and well-being with or without the support of a healthcare provider to delineate an overview of the future patient journey while considering the strategic initiatives in the digital transformation era. This research collected the opinions of healthcare clients through a structural questionnaire to collect user accessibility, user knowledge, user experience, user engagement, and personalized medicine to investigate the mindset of the users and illustrate their opinions, expectations, needs, and voices about digital self-care expansion. In the realm of digital transformation, the accessibility of users to the internet, digital health platforms, tools, and mobile health applications have revolutionized the healthcare ecosystem toward nurturing informed and empowered patients who are tech-savvy and can take the initiative to be in charge of their health, involved in medical decision-making, and seek digital health innovations to prevent diseases and promote their healthy lifestyles. Therefore, the future of the patient journey is digital self-care intervention in a healthcare ecosystem where the partnership of patients in healthcare services is tied to their health information and action ownership.

Keywords: digital health, patient engagement, self-care intervention, digital self-care intervention, digital transformation

Procedia PDF Downloads 29
3004 The Impact of Nonverbal Communication Between Restaurant Staff and Customers on Customer Attraction in Restaurants: A Case Study of Food Courts in Tehran City

Authors: Mahshid Asadollahi, Mohammad Akbari Asl

Abstract:

The restaurant industry is highly competitive, and restaurants are constantly looking for ways to attract new customers and retain their existing ones. Nonverbal communication is an important factor in creating a positive customer experience and can play a significant role in attracting customers to restaurants. Nonverbal communication can include body language, facial expressions, tone of voice, and physical proximity, among other things. The present study aimed to investigate the impact of nonverbal communication between restaurant employees and customers on attracting customers in food courts in Tehran. The research method was descriptive-correlational, and the statistical population of this study included all customers of food court restaurants in Tehran, which was about 30 restaurants. The research sample was selected through probability sampling, and 440 customers completed emotional response, customer satisfaction, and nonverbal communication questionnaires in person. The data obtained were analyzed using multiple regression analysis. The results showed that vocal language, employee proximity, physical appearance, and speech movements, as components of nonverbal communication of restaurant employees, had an impact on attracting customers. Additionally, positive and negative emotions of customers have a significant relationship with customer attraction in Food Court restaurants. The study shows that various nonverbal communication factors can play a significant role in attracting customers, and that positive and negative customer emotions can affect customer satisfaction. Therefore, restaurant owners and managers should pay attention to nonverbal communication and train their employees accordingly to create a positive and welcoming atmosphere for customers.

Keywords: verbal language, proximity of employees, physical appearance, speech gestures, nonverbal communication, customer emotions, customer attraction

Procedia PDF Downloads 92
3003 Evaluation of Relationship between Job Stress Dimensions with Occupational Accidents in Industrial Factories in Southwest of Iran

Authors: Ali Ahmadi, Maryam Abbasi, Mohammad Mehdi Parsaei

Abstract:

Background: Stress in the workplace today is one of the most important public health concerns and a serious threat to the health of the workforce worldwide. Occupational stress can cause occupational events and reduce quality of life. As a result, it has a very undesirable impact on the performance of organizations, companies, and their human resources. This study aimed to evaluate the relationship between job stress dimensions and occupational accidents in industrial factories in Southwest Iran. Materials and Methods: This cross-sectional study was conducted among 200 workers in the summer of 2023 in the Southwest of Iran. To select participants, we used a convenience sampling method. The research tools in this study were the Health and Safety Executive (HSE) stress questionnaire with 35 questions and 7 dimensions and demographic information. A high score on this questionnaire indicates that there is low job stress and pressure. All workers completed the informed consent form. Univariate analysis was performed using chi-square and T-test. Multiple regression analysis was used to estimate the odds ratios (OR) and 95% confidence interval (CI) for the association of stress-related factors with job accidents in participants. Stata 14.0 software was used for analysis. Results: The mean age of the participants was 39.81(6.36) years. The prevalence of job accidents was 28.0% (95%CI: 21.0, 34.0). Based on the results of the multiple logistic regression with the adjustment of the effect of the confounding variables, one increase in the score of the demand dimension had a protective impact on the risk of job accidents(aOR=0.91,95%CI:0.85-0.95). Additionally, an increase in one of the scores of the managerial support (aOR=0.89, 95% CI: 0.83-0.95) and peer support (aOR=0.76, 95%CI: 0.67-87) dimensions was associated with a lower number of job accidents. Among dimensions, an increase in the score of relationship (aOR=0.89, 95%CI: 0.80-0.98) and change (aOR=0.86, 95%CI: 0.74-0.96) reduced the odds of the accident's occurrence among the workers by 11% and 16%, respectively. However, there was no significant association between role and control dimensions and the job accident (p>0.05). Conclusions: The results show that the prevalence of job accidents was alarmingly high. Our results suggested that an increase in scores of dimensions HSE questioners is significantly associated with a decrease the accident occurrence in the workplace. Therefore, planning to address stressful factors in the workplace seems necessary to prevent occupational accidents.

Keywords: HSE, Iran, job stress occupational accident, safety, occupational health

Procedia PDF Downloads 64
3002 Designing and Implementation of MPLS Based VPN

Authors: Muhammad Kamran Asif

Abstract:

MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively.

Keywords: MPLS, VPN, NMS, ATM, asynchronous transfer mode

Procedia PDF Downloads 329