Search results for: internet data science
27340 Analysis of Education Faculty Students’ Attitudes towards E-Learning According to Different Variables
Authors: Eyup Yurt, Ahmet Kurnaz, Ismail Sahin
Abstract:
The purpose of the study is to investigate the education faculty students’ attitudes towards e-learning according to different variables. In current study, the data were collected from 393 students of an education faculty in Turkey. In this study, theattitude towards e‐learning scale and the demographic information form were used to collect data. The collected data were analyzed by t-test, ANOVA and Pearson correlation coefficient. It was found that there is a significant difference in students’ tendency towards e-learning and avoidance from e-learning based on gender. Male students have more positive attitudes towards e-learning than female students. Also, the students who used the internet lesshave higher levels of avoidance from e-learning. Additionally, it is found that there is a positive and significant relationship between the number of personal mobile learning devices and tendency towards e-learning. On the other hand, there is a negative and significant relationship between the number of personal mobile learning devices and avoidance from e-learning. Also, suggestions were presented according to findings.Keywords: education faculty students, attitude towards e-learning, gender, daily internet usage time, m-learning
Procedia PDF Downloads 30727339 Development of Energy Management System Based on Internet of Things Technique
Authors: Wen-Jye Shyr, Chia-Ming Lin, Hung-Yun Feng
Abstract:
The purpose of this study was to develop an energy management system for university campuses based on the Internet of Things (IoT) technique. The proposed IoT technique based on WebAccess is used via network browser Internet Explore and applies TCP/IP protocol. The case study of IoT for lighting energy usage management system was proposed. Structure of proposed IoT technique included perception layer, equipment layer, control layer, application layer and network layer.Keywords: energy management, IoT technique, sensor, WebAccess
Procedia PDF Downloads 33327338 Secondary Science Teachers' Views about Purposes of Practical Works in School Science
Authors: Kew-Cheol Shim, Sung-Hwan Moon, Ji-Hyon Kil, Kyoungho Kim
Abstract:
The purpose of this paper was to examine views of secondary school science teachers about purposes to use practical works in school science. The instrument to survey consisted eighteen items, which were categorized into four components as follows: ‘Scientific inquiry’, ‘Scientific knowledge’, ‘Science-related attitude’, and ‘STS (science-technology-society)’. Subjects were 152 secondary school science teachers (male 70 and female 82; middle school 50 and high school 102), who are teaching in 42 schools of 8 provinces. On the survey, science teachers were asked to answer on 5-point Lickert scale (from 1 to 5) how they thought of using practical works on purposes with domains of science objectives in school. They had positive views about using practical works for improving scientific inquiry process skills, science-related attitudes, and perceptions about STS literacy, and acquiring scientific knowledge. They would have the most willingness of using practical works for ‘Scientific Inquiry’ among domains of science objectives in school.Keywords: secondary school, science teacher, practical work, scientific inquiry, scientific knowledge, scientific attitude, STS
Procedia PDF Downloads 49027337 The Effect of Multimedia Use on Students’ Academic Achievement and Course-Oriented Self-Efficacy
Authors: Hasan Coruk, Recep Cakir
Abstract:
This study aimed at investigating the effect of multimedia containing ‘the structure and properties of matter’ unit on students’ academic achievement level and self-efficacy relating to science and technology course. The study used an experimental design with pre-test and post-test groups. The data collection tools were ‘Science and Technology Course Achievement Test’ and ‘Science and Technology Self-Efficacy Scale’. The sample of the study consisted of 8th grade students at a primary school in Tokat Province. The study was carried out with 42 students from two classes, 21 (8 males, 13 females) from experimental group and 21 (13 males and 8 females) from control group. The data were analyzed in SPSS.18 software. The findings of the study indicated that the use of multimedia increased the students’ academic achievement in science and technology course in comparison with traditional teaching methods. It was also determined that there was not a significant difference in students’ course-oriented self-efficacy levels regarding the two methods. Necessary and feasible suggestions were put forward for whom it concerns.Keywords: multimedia learning, science and technology, the structure-properties of matter, self-efficacy, academic achievement
Procedia PDF Downloads 45327336 Secure Network Coding against Content Pollution Attacks in Named Data Network
Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang
Abstract:
Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.Keywords: named data networking, content polloution attack, network coding signature, internet architecture
Procedia PDF Downloads 33727335 Commercial Automobile Insurance: A Practical Approach of the Generalized Additive Model
Authors: Nicolas Plamondon, Stuart Atkinson, Shuzi Zhou
Abstract:
The insurance industry is usually not the first topic one has in mind when thinking about applications of data science. However, the use of data science in the finance and insurance industry is growing quickly for several reasons, including an abundance of reliable customer data, ferocious competition requiring more accurate pricing, etc. Among the top use cases of data science, we find pricing optimization, customer segmentation, customer risk assessment, fraud detection, marketing, and triage analytics. The objective of this paper is to present an application of the generalized additive model (GAM) on a commercial automobile insurance product: an individually rated commercial automobile. These are vehicles used for commercial purposes, but for which there is not enough volume to apply pricing to several vehicles at the same time. The GAM model was selected as an improvement over GLM for its ease of use and its wide range of applications. The model was trained using the largest split of the data to determine model parameters. The remaining part of the data was used as testing data to verify the quality of the modeling activity. We used the Gini coefficient to evaluate the performance of the model. For long-term monitoring, commonly used metrics such as RMSE and MAE will be used. Another topic of interest in the insurance industry is to process of producing the model. We will discuss at a high level the interactions between the different teams with an insurance company that needs to work together to produce a model and then monitor the performance of the model over time. Moreover, we will discuss the regulations in place in the insurance industry. Finally, we will discuss the maintenance of the model and the fact that new data does not come constantly and that some metrics can take a long time to become meaningful.Keywords: insurance, data science, modeling, monitoring, regulation, processes
Procedia PDF Downloads 7527334 A Comparative Study between Different Techniques of Off-Page and On-Page Search Engine Optimization
Authors: Ahmed Ishtiaq, Maeeda Khalid, Umair Sajjad
Abstract:
In the fast-moving world, information is the key to success. If information is easily available, then it makes work easy. The Internet is the biggest collection and source of information nowadays, and with every single day, the data on internet increases, and it becomes difficult to find required data. Everyone wants to make his/her website at the top of search results. This can be possible when you have applied some techniques of SEO inside your application or outside your application, which are two types of SEO, onsite and offsite SEO. SEO is an abbreviation of Search Engine Optimization, and it is a set of techniques, methods to increase users of a website on World Wide Web or to rank up your website in search engine indexing. In this paper, we have compared different techniques of Onpage and Offpage SEO, and we have suggested many things that should be changed inside webpage, outside web page and mentioned some most powerful and search engine considerable elements and techniques in both types of SEO in order to gain high ranking on Search Engine.Keywords: auto-suggestion, search engine optimization, SEO, query, web mining, web crawler
Procedia PDF Downloads 14927333 The Internet and Transformation of Epistemic Communities: An Exploratory Review of Communication Research between 2002 and 2022
Authors: Dayei Oh, Feeza Vasudeva, Narges Azizi Fard
Abstract:
Drawing on the Foucauldian conception of episteme, epistemic communities refer to a community in which members share common frames of epistemic reference, delineating the proper construction of social realities for their members. One of the most cited definitions of epistemic communities is a group of professionals possessing acknowledged expertise and proficiency in a specific field, influencing policymaking and governance. More recently, the advancement of the Internet has changed the way society produces, disseminates, and consumes knowledge. Against this backdrop, this literature review explores the ways in which online epistemic communities are studied in communication scholarship between 2002 and 2022. Examining 92 peer-reviewed journal articles from the Web of Science database, three research objectives have been addressed: (1) geographical contexts, platforms, and methods that are studied in communication research, (2) different types of epistemic communities, and (3) prevailing themes and concepts that are related to the research of the chosen epistemic communities. This research demonstrates increasing scholarly attention towards the lay public as prominent online epistemic communities along with more conventional epistemic communities such as academia and journalists, hinting at how the Internet provides epistemic capacities for negotiating the boundaries of epistemic authority and competencies between experts and lay people. Through qualitative reading of these papers, the findings show that communication research tends to approach epistemic communities of the political left and right asymmetrically: The right-wing epistemic communities are studied in connection with mis/disinformation, conspiracy theories, populist rejection of authoritative epistemologies, whereas the left-wing communities are studied as emancipatory epistemic struggles and activism against Western, colonial, white, and male-centric knowledge systems. This points to a grave need for communication and multidisciplinary scholarship to investigate such uncharted characters of right- and left-wing epistemic communities.Keywords: communication research, internet, knowledge, online epistemic communities
Procedia PDF Downloads 5127332 Residential and Care Model for Elderly People Based on “Internet Plus”
Authors: Haoyi Sheng
Abstract:
China's aging tendency is becoming increasingly severe, which leads to the embarrassing situation of "getting old before getting wealthy". The traditional pension model does not comply with the need of today. Relying on "Internet Plus", it can efficiently integrate information and resources and meet the personalized needs of elderly care. It can reduce the operating cost of community elderly care facilities and lay a technical foundation for providing better services for the elderly. The key for providing help for the elderly in the future is to effectively integrate technology, make good use of technology, and improve the efficiency of elderly care services. The effective integration of traditional home care, community care, intelligent elderly care equipment and medical resources to create the "Internet Plus" community intelligent pension service mode has become the future development trend of aging care. The research method of this paper is to collect literature and conduct theoretical research on community pension firstly. Secondly, the combination of suitable aging design and "Internet Plus" is elaborated through research. Finally, this paper states the current level of intelligent technology in old-age care and looks into the future by understanding multiple levels of "Internet Plus". The development of community intelligent pension mode and content under "Internet Plus" has enormous development potential. In addition to the characteristics and functions of ordinary houses, residential design of endowment housing has higher requirements for comfort and personalization, and the people-oriented is the principle of design.Keywords: ageing tendency, 'Internet Plus', community intelligent elderly care, elderly care service model, technology
Procedia PDF Downloads 13727331 An Assessment of the Digital Transformation of Radio
Authors: Fatih Sogut
Abstract:
Developments in information technologies have caused significant changes in terms of radio and television broadcasting. With these changes in terms of production format, transmission techniques and service delivery, the distinction between traditional media and New Media has emerged. The viewer/listener, who was in a passive position before, is now in an active position and has a say in many matters, including content production. Visual and auditory data transfer has diversified and become easier thanks to the convergence phenomenon. These transformations and developments also affected one of the oldest electronic communication tools, radio. In this study, in order to adapt to the new era that emerged with the digital age, the change in radio broadcasting and the factors that led to this change were tried to be explained.Keywords: Internet, radio broadcasting, digital transformation, Internet broadcasting
Procedia PDF Downloads 17027330 The Rise of Darknet: A Call for Understanding Online Communication of Terrorist Groups in Indonesia
Authors: Aulia Dwi Nastiti
Abstract:
A number of studies and reports on terrorism have continuously addressed the role of internet and online activism to support terrorist and extremist groups. In particular, they stress on social media’s usage that generally serves for the terrorist’s propaganda as well as justification of their causes. While those analyses are important to understand how social media is a vital tool for global network terrorism, they are inadequate to explain the online communication patterns that enable terrorism acts. Beyond apparent online narratives, there is a deep cyber sphere where the very vein of terrorism movement lies. That is a hidden space in the internet called ‘darknet’. Recent investigations, particularly in Middle Eastern context, have shed some lights that this invisible space in the internet is fundamental to maintain the terrorist activities. Despite that, limited number of research examines darknet within the issue of terrorist movements in Indonesian context—where the country is considered quite a hotbed for extremist groups. Therefore, this paper attempts to provide an insight of darknet operation in Indonesian cases. By exploring how the darknet is used by the Indonesian-based extremist groups, this paper maps out communication patterns of terrorist groups on the internet which appear as an intermingled network. It shows the usage of internet is differentiated in different level of anonymity for distinctive purposes. This paper further argues that the emerging terrorist communication network calls for a more comprehensive counterterrorism strategy on the Internet.Keywords: communication pattern, counterterrorism, darknet, extremist groups, terrorism
Procedia PDF Downloads 29327329 Using Vocabulary Instructional Materials in Improving the Grade Four Students' Learning in Science
Authors: Shirly May Balais
Abstract:
This study aims to evaluate the effects of vocabulary instruction in improving the students’ learning in science. The teacher-researcher utilized the vocabulary instructional materials in enriching the science vocabulary of grade four learners. The students were also given an achievement test to determine the effects of vocabulary instructional materials. The assessment indicated that students had shown improvement in comprehension and science literacy. This also helps the students to grasp, understand, and communicate appropriate science concepts and the integration of imagery makes learning science fun. In this research, descriptive qualitative methods and observation interviews were used to describe the effects of using vocabulary instructional materials in improving the science vocabulary of grade four learners. The students’ perceptions were studied, analyzed, and interpreted qualitatively.Keywords: instruction, learning, science, vocabulary
Procedia PDF Downloads 19827328 Information Technology Approaches to Literature Text Analysis
Authors: Ayse Tarhan, Mustafa Ilkan, Mohammad Karimzadeh
Abstract:
Science was considered as part of philosophy in ancient Greece. By the nineteenth century, it was understood that philosophy was very inclusive and that social and human sciences such as literature, history, and psychology should be separated and perceived as an autonomous branch of science. The computer was also first seen as a tool of mathematical science. Over time, computer science has grown by encompassing every area in which technology exists, and its growth compelled the division of computer science into different disciplines, just as philosophy had been divided into different branches of science. Now there is almost no branch of science in which computers are not used. One of the newer autonomous disciplines of computer science is digital humanities, and one of the areas of digital humanities is literature. The material of literature is words, and thanks to the software tools created using computer programming languages, data that a literature researcher would need months to complete, can be achieved quickly and objectively. In this article, three different tools that literary researchers can use in their work will be introduced. These studies were created with the computer programming languages Python and R and brought to the world of literature. The purpose of introducing the aforementioned studies is to set an example for the development of special tools or programs on Ottoman language and literature in the future and to support such initiatives. The first example to be introduced is the Stylometry tool developed with the R language. The other is The Metrical Tool, which is used to measure data in poems and was developed with Python. The latest literature analysis tool in this article is Voyant Tools, which is a multifunctional and easy-to-use tool.Keywords: DH, literature, information technologies, stylometry, the metrical tool, voyant tools
Procedia PDF Downloads 15127327 Heightening Pre-Service Teachers’ Attitude towards Learning and Metacognitive Learning through Information and Communication Technology: Pre-Service Science Teachers’ Perspective
Authors: Abiodun Ezekiel Adesina, Ijeoma Ginikanwa Akubugwo
Abstract:
Information and Communication Technology, ICT can heighten pre-service teachers’ attitudes toward learning and metacognitive learning; however, there is a dearth of literature on the perception of the pre-service teachers on heightening their attitude toward learning and metacognitive learning. Thus, this study investigates the perception of pre-service science teachers on heightening their attitude towards learning and metacognitive learning through ICT. Two research questions and four hypotheses guided the research. A mixed methods research was adopted for the study in concurrent triangulation type of integrating qualitative and quantitative approaches to the study. The cluster random sampling technique was adopted to select 250 pre-service science teachers in Oyo township. Two self-constructed instruments: Heightening Pre-service Science Teachers’ Attitude towards Learning and Metacognitive Learning through Information and Communication Technology Scale (HPALMIS, r=.73), and an unstructured interview were used for data collection. Thematic analysis, frequency counts and percentages, t-tests, and analysis of variance were used for data analysis. The perception level of the pre-service science teachers on heightening their attitude towards learning and metacognitive learning through ICT is above average, with the majority perceiving that ICT can enhance their thinking about their learning. The perception was significant (mean=92.68, SD=10.86, df=249, t=134.91, p<.05). The perception was significantly differentiated by gender (t=2.10, df= 248, p<.05) in favour of the female pre-service teachers and based on the first time of ICTs use (F(5,244)= 9.586, p<.05). Lecturers of science and science related courses should therefore imbibe the use of ICTs in heightening pre-service teachers’ attitude towards learning and metacognitive learning. Government should organize workshops, seminars, lectures, and symposia along with professional bodies for the science education lecturers to keep abreast of the trending ICT.Keywords: pre-service teachers’ attitude towards learning, metacognitive learning, ICT, pre-service teachers’ perspectives
Procedia PDF Downloads 10027326 The Application of Fuzzy Set Theory to Mobile Internet Advertisement Fraud Detection
Authors: Jinming Ma, Tianbing Xia, Janusz Getta
Abstract:
This paper presents the application of fuzzy set theory to implement of mobile advertisement anti-fraud systems. Mobile anti-fraud is a method aiming to identify mobile advertisement fraudsters. One of the main problems of mobile anti-fraud is the lack of evidence to prove a user to be a fraudster. In this paper, we implement an application by using fuzzy set theory to demonstrate how to detect cheaters. The advantage of our method is that the hardship in detecting fraudsters in small data samples has been avoided. We achieved this by giving each user a suspicious degree showing how likely the user is cheating and decide whether a group of users (like all users of a certain APP) together to be fraudsters according to the average suspicious degree. This makes the process more accurate as the data of a single user is too small to be predictable.Keywords: mobile internet, advertisement, anti-fraud, fuzzy set theory
Procedia PDF Downloads 18127325 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children
Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani
Abstract:
Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.Keywords: access control, cyber security, kids, parental monitoring
Procedia PDF Downloads 13727324 Adoption of Big Data by Global Chemical Industries
Authors: Ashiff Khan, A. Seetharaman, Abhijit Dasgupta
Abstract:
The new era of big data (BD) is influencing chemical industries tremendously, providing several opportunities to reshape the way they operate and help them shift towards intelligent manufacturing. Given the availability of free software and the large amount of real-time data generated and stored in process plants, chemical industries are still in the early stages of big data adoption. The industry is just starting to realize the importance of the large amount of data it owns to make the right decisions and support its strategies. This article explores the importance of professional competencies and data science that influence BD in chemical industries to help it move towards intelligent manufacturing fast and reliable. This article utilizes a literature review and identifies potential applications in the chemical industry to move from conventional methods to a data-driven approach. The scope of this document is limited to the adoption of BD in chemical industries and the variables identified in this article. To achieve this objective, government, academia, and industry must work together to overcome all present and future challenges.Keywords: chemical engineering, big data analytics, industrial revolution, professional competence, data science
Procedia PDF Downloads 8527323 An Application of a Machine Monitoring by Using the Internet of Things to Improve a Preventive Maintenance: Case Study of an Automated Plastic Granule-Packing Machine
Authors: Anek Apipatkul, Paphakorn Pitayachaval
Abstract:
Preventive maintenance is a standardized procedure to control and prevent risky problems affecting production in order to increase work efficiency. Machine monitoring also routinely works to collect data for a scheduling maintenance period. This paper is to present the application of machine monitoring by using the internet of things (IOTs) and a lean technique in order to manage with complex maintenance tasks of an automated plastic granule packing machine. To organize the preventive maintenance, there are several processes that the machine monitoring was applied, starting with defining a clear scope of the machine, establishing standards in maintenance work, applying a just-in-time (JIT) technique for timely delivery in the maintenance work, solving problems on the floor, and also improving the inspection process. The result has shown that wasted time was reduced, and machines have been operated as scheduled. Furthermore, the efficiency of the scheduled maintenance period was increased by 95%.Keywords: internet of things, preventive maintenance, machine monitoring, lean technique
Procedia PDF Downloads 10227322 Receptiveness of Market Segmentation Towards Online Shopping Attitude: A Quality Management Strategy for Online Passenger Car Market
Authors: Noor Hasmini Abdghani, Nik Kamariah Nikmat, Nor Hayati Ahmad
Abstract:
Rapid growth of the internet technology led to changes in the consumer lifestyles. This involved customer buying behaviour-based internet that create new kind of buying strategy. Hence, it has summoned many of world firms including Malaysia to generate new quality strategy in preparation to face new customer buying lifestyles. Particularly, this study focused on identifying online customer segment of automobile passenger car customers. Secondly, the objective is to understand online customer’s receptiveness towards internet technologies. This study distributed 700 questionnaires whereby 582 were returned representing 83% response rate. The data were analysed using factor and regression analyses. The result from the factor analysis precipitates four online passenger car segmentations in Malaysia, which are: Segment (1)- Automobile Online shopping Preferences, Segment (2)- Automobile Online Brand Comparison, Segment (3)- Automobile Online Information Seeking and Segment (4)- Automobile Offline Shopping Preferences. In understanding the online customer’s receptiveness towards internet, the regression result shows that there is significant relationship between each of four segments of online passenger car customer with attitude towards automobile online shopping. This implies that, for online customers to have receptiveness toward internet technologies, he or she must have preferences toward online shopping or at least prefer to browse any related information online even if the actual purchase is made at the traditional store. With this proposed segmentation strategy, the firms especially the automobile firms will be able to understand their online customer behavior. At least, the proposed segmentation strategy will help the firms to strategize quality management approach for their online customers’ buying decision making.Keywords: Automobile, Market Segmentation, Online Shopping Attitude, Quality Management Strategy
Procedia PDF Downloads 54027321 Thai Teenage Prostitution Online
Authors: Somdech Rungsrisawat
Abstract:
The purposes of this research are to investigate Thai teens’ attitude toward prostitution on the internet, to discover the causes of teenage prostitution and to study the relationship between teenage promiscuity and the causes of teenage prostitution. This study is a mixed research which utilized both qualitative and quantitative approach. The population of this study included teenagers and early adults between 14-21 years old who were studying in high schools, colleges, or universities. A total of 600 respondents was sampled for interviews using a questionnaire, and 48 samples were chosen for an in-depth interview. The findings revealed that the majority of respondents recognized that teenage prostitution on line was real. The reasons for choosing the internet to contact with customers included easy, convenient, safe, and anonymous. Moreover, the internet allowed teen prostitutes to contact customers anywhere and anytime. The correlation showed that promiscuity was related to the trend of teen prostitution. Other factors that contributed to increasing widespread teen prostitution online included their need for quick money to buy luxurious products and to support their extravagant behavior.Keywords: internet, prostitutes, online, Thai teens
Procedia PDF Downloads 30927320 The Hindrances Associated with Internet Banking Services in Nigeria: The Lagos State Perspective
Authors: Patience Oluchi Silas, Yemi Adeshina
Abstract:
Financial transactions involving the use of the internet has become an important practice among commercial banks in Nigeria with the introduction of internet banking and this has improved banking efficiency in rending services to customers. However, customers in Lagos State are enslaved in the fear of insecurity, technical failure, inadequate operational facilities, including improper telecommunications and poor power supply. It is in line with this that this paper explores the obstacles faced by Lagosians, tourists, small scale business owners, companies, customers and the government's attitude in addressing the challenges associated with online banking system in Nigeria through relevant legislations. Internet banking has the potential to transform economic activity and achieve developmental goals. If the associated Challenges are addressed quickly, then it will have the desired impact on the Nigerian economy. In this study, Respondents, mostly bank employees and customers were issued well designed and structured questionnaires to effectively examine the new developments brought about by the introduction of Internet banking and the challenges inhibiting its adoption. Hypotheses were formulated to test assumptions and claims generated from the study. The results were statistically analyzed to address the issues of errors and chances, and at the end, the result of the statistical analysis shows that all especially insecurity, inadequate operational facilities and poor power supply are the significant factors affecting the adoption of internet banking services in Nigeria. The study recommends that for internet banking to assume a developmental dimension in Nigeria and for the country to be fully integrated and respected in global financial environment, the prevalent level of frauds in Lagos State and among Nigerians must first be addressed and the relevant local laws should be put in place and in consonance with international laws and conventions; get the citizens well educated on the intricacies of Internet usage and frauds.Keywords: internet-banking, adoption, challenges, insecurity, legislation, fraud, Lagos state, statistics
Procedia PDF Downloads 34227319 A Study of Issues and Mitigations on Distributed Denial of Service and Medical Internet of Things Devices
Authors: Robin Singh, Jing-Chiou Liou
Abstract:
The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient’s data for their treatment. They are generally considered safe and secure. However, there is some possibility that some loopholes do exist which manufacturers do need to identify before some hacker takes advantage of them. For this study, we focused on two medical IoT devices which are pacemakers and hearing aids. The aim of this paper is to identify if there is any likelihood of these medical devices being hijacked and used as a botnet in Distributed Denial-Of Service attacks. Moreover, some mitigation strategies are being proposed to better secureKeywords: cybersecurity, DDoS, IoT, medical devices
Procedia PDF Downloads 8627318 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation
Authors: Mohammad Hadi Khorashadi Zadeh
Abstract:
Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.Keywords: BYOD, mobile cloud computing, mobile security, information management
Procedia PDF Downloads 31727317 Health Information Needs and Utilization of Information and Communication Technologies by Medical Professionals in a Northern City of India
Authors: Sonika Raj, Amarjeet Singh, Vijay Lakshmi Sharma
Abstract:
Introduction: In 21st century, due to revolution in Information and Communication Technologies (ICTs), there has been phenomenal development in quality and quantity of knowledge in the field of medical science. So, the access to relevant information to physicians is critical to the delivery of effective healthcare services to patients. The study was conducted to assess the information needs and attitudes of the medical professionals; to determine the sources and channels of information used by them; to ascertain the current usage of ICTs and the barriers faced by them in utilization of ICTs in health information access. Methodology: This descriptive cross-sectional study was carried in 2015 on hundred medical professionals working in public and private sectors of Chandigarh. The study used both quantitative and qualitative method for data collection. A semi structured questionnaire and interview schedule was used to collect data on information seeking needs, access to ICTs and barriers to healthcare information access. Five Data analysis was done using SPSS-16 and qualitative data was analyzed using thematic approach. Results: The most preferred sources to access healthcare information were internet (85%), trainings (61%) and communication with colleagues (57%). They wanted information on new drug therapy and latest developments in respective fields. All had access to computer with but almost half assessed their computer knowledge as average and only 3% had received training regarding usage. Educational status (p=0.004), place of work (p=0.004), number of years in job (p=0.004) and sector of job (p=0.04) of doctors were found to be significantly associated with their active search for information. The major themes that emerged from in-views were need; types and sources of healthcare information; exchange of information among different levels of healthcare providers; usage of ICTs to obtain and share information; barriers to access of healthcare information and quality of health information materials and involvement in their development process Conclusion and Recommendations: The medical professionals need information in their in their due course of work. However, information needs of medical professionals were not being adequately met. There should be training of professional regarding internet skills and the course on bioinformatics should be incorporated in the curricula of medical students. The policy framework must be formulated that will encourage and promote the use of ICTs as tools for health information access and dissemination.Keywords: health information, ICTs, medical professionals, qualitative
Procedia PDF Downloads 34927316 Isolation Preserving Medical Conclusion Hold Structure via C5 Algorithm
Authors: Swati Kishor Zode, Rahul Ambekar
Abstract:
Data mining is the extraction of fascinating examples on the other hand information from enormous measure of information and choice is made as indicated by the applicable information extracted. As of late, with the dangerous advancement in internet, stockpiling of information and handling procedures, privacy preservation has been one of the major (higher) concerns in data mining. Various techniques and methods have been produced for protection saving data mining. In the situation of Clinical Decision Support System, the choice is to be made on the premise of the data separated from the remote servers by means of Internet to diagnose the patient. In this paper, the fundamental thought is to build the precision of Decision Support System for multiple diseases for different maladies and in addition protect persistent information while correspondence between Clinician side (Client side) also, the Server side. A privacy preserving protocol for clinical decision support network is proposed so that patients information dependably stay scrambled amid diagnose prepare by looking after the accuracy. To enhance the precision of Decision Support System for various malady C5.0 classifiers and to save security, a Homomorphism encryption algorithm Paillier cryptosystem is being utilized.Keywords: classification, homomorphic encryption, clinical decision support, privacy
Procedia PDF Downloads 33027315 Managing Data from One Hundred Thousand Internet of Things Devices Globally for Mining Insights
Authors: Julian Wise
Abstract:
Newcrest Mining is one of the world’s top five gold and rare earth mining organizations by production, reserves and market capitalization in the world. This paper elaborates on the data acquisition processes employed by Newcrest in collaboration with Fortune 500 listed organization, Insight Enterprises, to standardize machine learning solutions which process data from over a hundred thousand distributed Internet of Things (IoT) devices located at mine sites globally. Through the utilization of software architecture cloud technologies and edge computing, the technological developments enable for standardized processes of machine learning applications to influence the strategic optimization of mineral processing. Target objectives of the machine learning optimizations include time savings on mineral processing, production efficiencies, risk identification, and increased production throughput. The data acquired and utilized for predictive modelling is processed through edge computing by resources collectively stored within a data lake. Being involved in the digital transformation has necessitated the standardization software architecture to manage the machine learning models submitted by vendors, to ensure effective automation and continuous improvements to the mineral process models. Operating at scale, the system processes hundreds of gigabytes of data per day from distributed mine sites across the globe, for the purposes of increased improved worker safety, and production efficiency through big data applications.Keywords: mineral technology, big data, machine learning operations, data lake
Procedia PDF Downloads 11227314 WebGIS Development Framework With Prioritized Usability Elements
Authors: Ezekiel Mwangi, Stephen Kimani, Agnes Mindila
Abstract:
Usability is one of the key factors that determine the success or failure of any WebGIS (technology normally applied on the internet to analyze and present spatial data on the Internet). However, not all the usability attributes have the same impact on usability. It is, therefore, necessary to prioritize WebGIS usability elements and determine the ones that are more crucial to the success of the WebGIS. This research aims to identify the main elements of WebGIS usability, investigate the order of importance and priority of the usability elements of WebGIS, and propose a WebGIS development framework that incorporates the prioritization of the usability elements. This will be achieved through a literature review. The outcome of this research will help usability specialists and WebGIS developers in determining specific usability elements that should be accorded more emphasis during the design and development of WebGIS.Keywords: framework, prioritization, usability, WebGIS
Procedia PDF Downloads 15827313 Web-Based Tools to Increase Public Understanding of Nuclear Technology and Food Irradiation
Authors: Denise Levy, Anna Lucia C. H. Villavicencio
Abstract:
Food irradiation is a processing and preservation technique to eliminate insects and parasites and reduce disease-causing microorganisms. Moreover, the process helps to inhibit sprouting and delay ripening, extending fresh fruits and vegetables shelf-life. Nevertheless, most Brazilian consumers seem to misunderstand the difference between irradiated food and radioactive food and the general public has major concerns about the negative health effects and environmental contamination. Society´s judgment and decision making are directly linked to perceived benefits and risks. The web-based project entitled ‘Scientific information about food irradiation: Internet as a tool to approach science and society’ was created by the Nuclear and Energetic Research Institute (IPEN), in order to offer an interdisciplinary approach to science education, integrating economic, ethical, social and political aspects of food irradiation. This project takes into account that, misinformation and unfounded preconceived ideas impact heavily on the acceptance of irradiated food and purchase intention by the Brazilian consumer. Taking advantage of the potential value of the Internet to enhance communication and education among general public, a research study was carried out regarding the possibilities and trends of Information and Communication Technologies among the Brazilian population. The content includes concepts, definitions and Frequently Asked Questions (FAQ) about processes, safety, advantages, limitations and the possibilities of food irradiation, including health issues, as well as its impacts on the environment. The project counts on eight self-instructional interactive web courses, situating scientific content in relevant social contexts in order to encourage self-learning and further reflections. Communication is a must to improve public understanding of science. The use of information technology for quality scientific divulgation shall contribute greatly to provide information throughout the country, spreading information to as many people as possible, minimizing geographic distances and stimulating communication and development.Keywords: food irradiation, multimedia learning tools, nuclear science, society and education
Procedia PDF Downloads 24827312 Effects of Planned Pre-laboratory Discussion on Physics Students’ Acquisition of Science Process Skills in Kontagora, Niger State
Authors: Akano Benedict Ubawuike
Abstract:
This study investigated the effects of pre-laboratory discussion on physics students’ acquisition of science process skills. The study design was quasi-experimental and purposive sampling technique was applied in selecting two schools in Kontagora Town for the research based on the availability of a good physics laboratory. Intact classes already grouped by the school for the sake of small laboratory space and equipment, comprising Thirty (30) students, 15 for experimental group in School A and 15 for control in school B were the subjects for the research. The instrument used for data collection was the lesson prepared for pre – practical discussion and researcher made Science Process Skill Test (SPST ) and two (2) research questions, and two (2) research hypotheses were developed to guide the study. The data collected were analyzed using means and t-Test statistics at 0.05 level of significance. The study revealed that pre-laboratory discussion was found to be more efficacious in enhancing students’ acquisition of science process skills. It also revealed that gender, had no significant effect on students’ acquisition of science process skills. Based on the findings, it was recommended among others that teachers should encourage students to develop interest in practical activities by engaging them in pre-laboratory discussion and providing instructional materials that will challenge them to be actively involved during practical lessons. It is also recommended that Ministries of Education and professional organizations like Science Teachers' Association of Nigeria (STAN) should organize workshops, seminars and conferences for physics teachers and Physics concepts should be taught with practical activity so that the students will do science instead of learning about science.Keywords: physics, laboratory, discussion, students, acquisition, science process skills
Procedia PDF Downloads 13127311 Analysis and Forecasting of Bitcoin Price Using Exogenous Data
Authors: J-C. Leneveu, A. Chereau, L. Mansart, T. Mesbah, M. Wyka
Abstract:
Extracting and interpreting information from Big Data represent a stake for years to come in several sectors such as finance. Currently, numerous methods are used (such as Technical Analysis) to try to understand and to anticipate market behavior, with mixed results because it still seems impossible to exactly predict a financial trend. The increase of available data on Internet and their diversity represent a great opportunity for the financial world. Indeed, it is possible, along with these standard financial data, to focus on exogenous data to take into account more macroeconomic factors. Coupling the interpretation of these data with standard methods could allow obtaining more precise trend predictions. In this paper, in order to observe the influence of exogenous data price independent of other usual effects occurring in classical markets, behaviors of Bitcoin users are introduced in a model reconstituting Bitcoin value, which is elaborated and tested for prediction purposes.Keywords: big data, bitcoin, data mining, social network, financial trends, exogenous data, global economy, behavioral finance
Procedia PDF Downloads 355