Search results for: internet of things technologies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5329

Search results for: internet of things technologies

2869 Meditation Applied to Chronic Pain

Authors: John Davodi, Maryam Davodi-Far

Abstract:

The human body is the most elaborate of all machines and technologies on Earth, while the human mind is the interdependent source that expels and absorbs the five senses: touch, smell, sight, sound, and taste. Meditation is an ancient form of mind power that has many variations. In fact, those who practice meditation may bring about a positive change in their five senses, depending on the aim of the practitioner. This paper examines the research related to meditation and its effects on individuals suffering from chronic pain. Moreover, consideration is given to whether perceptions of pain can be changed by the practice of meditation as well as whether meditation can have a noticeable and long-term positive effect on the human body. Lastly, the paper examines the type of meditation that is best suited to minimize pain sensations for those who suffer from chronic pain.

Keywords: meditation, pain, relaxation, suffering

Procedia PDF Downloads 70
2868 Exploring Equity and Inclusion in the Context of Distance Education Using a Social Location Perspective

Authors: Boadi Agyekum

Abstract:

In this study, a social location perspective is used to explore the challenges of creating opportunities that will foster lifelong education, inclusion, and equity for residents of rural communities in Ghana. The differentiated experiences of rural adults are under-researched and often unacknowledged in lifelong education literature and distance education policy. There is a need to examine carefully the structural inequalities that create disadvantages for residents of rural communities and women in pursuing distance education in designated cities in Ghana. The paper uses in-depth interviews to explore participants’ experiences of learning at a distance and to scrutinise the narratives of lifelong education. The paper reflects on the implications of the framework employed for educators and social justice in lifelong education. It further recommends the need to provide IT laboratories and fully online programs that would require stable and regular internet and access to ICT equipment for potential learning in rural communities. The social location approach presented a number of axes of diversity as comparatively more important than others; these included gender, age, education, work commitment, geography, and degree of social connectedness. This can inform lifelong education policy and programs to sustain quality education.

Keywords: equity, distance education, lifelong learning, social location, intersectionality, rural communities

Procedia PDF Downloads 89
2867 The Effect of Mobile Technology Use in Education: A Meta-Analysis Study

Authors: Şirin Küçük, Ayşe Kök, İsmail Şahin

Abstract:

Mobile devices are very popular and useful tools for assisting people in daily life. With the advancement of mobile technologies, the issue of mobile learning has been widely investigated in education. Many researches consider that it is important to integrate pedagogical and technical strengths of mobile technology into learning environments. For this reason, the purpose of this research is to examine the effect of mobile technology use in education with meta-analysis method. Meta-analysis is a statistical technique which combines the findings of independent studies in a specific subject. In this respect, the articles will be examined by searching the databases for researches which are conducted between 2005 and 2014. It is expected that the results of this research will contribute to future research related to mobile technology use in education.

Keywords: mobile learning, meta-analysis, mobile technology, education

Procedia PDF Downloads 717
2866 The Sociocultural Adaptation, Openness, and Success of Sojourn of Foreign Students in Tarlac City, Philippines

Authors: Maria Sheila S. Garcia

Abstract:

A good number of researches indicate that living in another country may create different and unexpected adjustment problems, and foreign students are not exempted from this. To provide an understanding of this process, 30 foreign college students studying English in Tarlac City were asked to answer questionnaires. This is to determine their sociocultural adaptation, openness to the host culture and success of sojourn. Through statistical analysis, it was found that the students experience greater difficulty in the academic area. Moderate difficulty was attributed to everyday life and social interactions. Albeit difficult, what they like best is the school’s methods of teaching English while the areas that need improvement are the libraries and internet connection. The only significant relationship was found between sociocultural adaptation and success of sojourn. Negatively correlated, if students experience greater difficulties in their host country, they are likely to regret their stay and will not recommend it to anyone. Openness to the host culture did not have an effect on the adaptation and success of sojourn. The short period of time that the students have are spent in studying rather than making friends. Nonetheless, this indicates the need to look deeper into the academic, extra-curricular activities and facilities provided by learning institutions.

Keywords: foreign students, sociocultural adaptation, success of sojourn, Tarlac Philippines

Procedia PDF Downloads 590
2865 Assessing the Impact of Electronic Payment Systems on the Service Delivery of Banks: Case of Nigeria

Authors: Idris lawal

Abstract:

The most recent development in the Nigerian payment system is the venture into “electronic payment system”. Electronic payment system is simply a payment or monetary transaction made over the internet or a network of computers. This study was carried out in order to assess how electronic payment system has impacted on banks service delivery, to examine the efficiency of electronic payment system in Nigeria and to determine the level of customer’s satisfaction as a direct result of the deployment of electronic payment systems. The study was conducted using structured questionnaire distributed to 50 bank officials and customers of Access Bank plc. Chi-square(x2) was adopted for the purpose of data analysis. The result of the study showed that the development of electronic payment system offer great benefit to bank customers including; improved services, reduced turn-around time, ease of banking transaction, significant cost saving etc. The study recommend that customer protection laws should be properly put in place to safeguard the interest of end users of e-payment instruments, the banking industry and government should show strong commitment and effort to educate the populace on the benefit of patronizing e-payment system to facilitate economic development.

Keywords: electronic payment system, service delivery, bank, Nigeria

Procedia PDF Downloads 274
2864 Designing AI-Enabled Smart Maintenance Scheduler: Enhancing Object Reliability through Automated Management

Authors: Arun Prasad Jaganathan

Abstract:

In today's rapidly evolving technological landscape, the need for efficient and proactive maintenance management solutions has become increasingly evident across various industries. Traditional approaches often suffer from drawbacks such as reactive strategies, leading to potential downtime, increased costs, and decreased operational efficiency. In response to these challenges, this paper proposes an AI-enabled approach to object-based maintenance management aimed at enhancing reliability and efficiency. The paper contributes to the growing body of research on AI-driven maintenance management systems, highlighting the transformative impact of intelligent technologies on enhancing object reliability and operational efficiency.

Keywords: AI, machine learning, predictive maintenance, object-based maintenance, expert team scheduling

Procedia PDF Downloads 48
2863 To Study the New Invocation of Biometric Authentication Technique

Authors: Aparna Gulhane

Abstract:

Biometrics is the science and technology of measuring and analyzing biological data form the basis of research in biological measuring techniques for the purpose of people identification and recognition. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. Biometric systems are used to authenticate the person's identity. The idea is to use the special characteristics of a person to identify him. These papers present a biometric authentication techniques and actual deployment of potential by overall invocation of biometrics recognition, with an independent testing of various biometric authentication products and technology.

Keywords: types of biometrics, importance of biometric, review for biometrics and getting a new implementation, biometric authentication technique

Procedia PDF Downloads 312
2862 Practical Simulation Model of Floating-Gate MOS Transistor in Sub 100 nm Technologies

Authors: Zina Saheb, Ezz El-Masry

Abstract:

As CMOS technology scaling down, Silicon oxide thickness (SiO2) become very thin (few Nano meters). When SiO2 is less than 3nm, gate direct tunneling (DT) leakage current becomes a dormant problem that impacts the transistor performance. Floating gate MOSFET (FGMOSFET) has been used in many low-voltage and low-power applications. Most of the available simulation models of FGMOSFET for analog circuit design does not account for gate DT current and there is no accurate analysis for the gate DT. It is a crucial to use an accurate mode in order to get a realistic simulation result that account for that DT impact on FGMOSFET performance effectively.

Keywords: CMOS transistor, direct-tunneling current, floating-gate, gate-leakage current, simulation model

Procedia PDF Downloads 521
2861 The Role of Establishing Zakat-Based Finance in Alleviating Poverty in the Muslim World

Authors: Khan Md. Abdus Subhan, Rabeya Bushra

Abstract:

The management of Intellectual Property (IP) in museums can be complex and challenging, as it requires balancing access and control. On the one hand, museums must ensure that they have balanced permissions to display works in their collections and make them accessible to the public. On the other hand, they must also protect the rights of creators and owners of works and ensure that they are not infringing on IP rights. Intellectual property has become an increasingly important aspect of museum operations in the digital age. Museums hold a vast array of cultural assets in their collections, many of which have significant value as IP assets. The balanced management of IP in museums can help generate additional revenue and promote cultural heritage while also protecting the rights of the museum and its collections. Digital technologies have greatly impacted the way museums manage IP, providing new opportunities for revenue generation through e-commerce and licensing while also presenting new challenges related to IP protection and management. Museums must take a comprehensive approach to IP management, leveraging digital technologies, protecting IP rights, and engaging in licensing and e-commerce activities to maximize income and the economy of countries through the strong management of cultural institutions. Overall, the balanced management of IP in museums is crucial for ensuring the sustainability of museum operations and for preserving cultural heritage for future generations. By taking a balanced approach to identifying museum IP assets, museums can generate revenues and secure their financial sustainability to ensure the long-term preservation of their cultural heritage. We can divide IP assets in museums into two kinds: collection IP and museum-generated IP. Certain museums become confused and lose sight of their mission when trying to leverage collections-based IP. This was the case at the German State Museum in Berlin when the museum made 100 replicas from the Nefertiti bust and wrote under the replicas all rights reserved to the Berlin Museum and issued a certificate to prevent any person or Institution from reproducing any replica from this bust. The implications of IP in museums are far-reaching and can have significant impacts on the preservation of cultural heritage, the dissemination of information, and the development of educational programs. As such, it is important for museums to have a comprehensive understanding of IP laws and regulations and to properly manage IP to avoid legal liability, damage to reputation, and loss of revenue. The research aims to highlight the importance and role of intellectual property in museums and provide some illustrative examples of this.

Keywords: zakat, economic development, Muslim world, poverty alleviation.

Procedia PDF Downloads 28
2860 Strategies to Achieve Deep Decarbonisation in Power Generation: A Review

Authors: Abdullah Alotaiq

Abstract:

The transition to low-carbon power generation is essential for mitigating climate change and achieving sustainability. This process, however, entails considerable costs, and understanding the factors influencing these costs is critical. This is necessary to cater to the increasing demand for low-carbon electricity across the heating, industry, and transportation sectors. A crucial aspect of this transition is identifying cost-effective and feasible paths for decarbonization, which is integral to global climate mitigation efforts. It is concluded that hybrid solutions, combining different low-carbon technologies, are optimal for minimizing costs and enhancing flexibility. These solutions also address the challenges associated with phasing out existing fossil fuel-based power plants and broadening the spectrum of low-carbon power generation options.

Keywords: review, power generation, energy transition, decarbonisation

Procedia PDF Downloads 46
2859 A Research Analysis on the Source Technology and Convergence Types

Authors: Kwounghee Choi

Abstract:

Technological convergence between the various sectors is expected to have a very large impact on future industrial and economy. This study attempts to do empirical approach between specific technologies’ classification. For technological convergence classification, it is necessary to set the target technology to be analyzed. This study selected target technology from national research and development plan. At first we found a source technology for analysis. Depending on the weight of source technology, NT-based, BT-based, IT-based, ET-based, CS-based convergence types were classified. This study aims to empirically show the concept of convergence technology and convergence types. If we use the source technology to classify convergence type, it will be useful to make practical strategies of convergence technology.

Keywords: technology convergence, source technology, convergence type, R&D strategy, technology classification

Procedia PDF Downloads 479
2858 Block Mining: Block Chain Enabled Process Mining Database

Authors: James Newman

Abstract:

Process mining is an emerging technology that looks to serialize enterprise data in time series data. It has been used by many companies and has been the subject of a variety of research papers. However, the majority of current efforts have looked at how to best create process mining from standard relational databases. This paper is the first pass at outlining a database custom-built for the minimal viable product of process mining. We present Block Miner, a blockchain protocol to store process mining data across a distributed network. We demonstrate the feasibility of storing process mining data on the blockchain. We present a proof of concept and show how the intersection of these two technologies helps to solve a variety of issues, including but not limited to ransomware attacks, tax documentation, and conflict resolution.

Keywords: blockchain, process mining, memory optimization, protocol

Procedia PDF Downloads 91
2857 Hydrometallurgical Production of Nickel Ores from Field Bugetkol

Authors: A. T. Zhakiyenova, E. E. Zhatkanbaev, Zh. K. Zhatkanbaeva

Abstract:

Nickel plays an important role in mechanical engineering and creation of military equipment; practically all steel are alloyed by nickel and other metals for receiving more durable, heat-resistant, corrosion-resistant steel and cast iron. There are many ways of processing of nickel in the world. Generally, it is igneous metallurgy methods. In this article, the review of majority existing ways of technologies of processing silicate nickel - cobalt ores is considered. Leaching of ores of a field Bugetkol is investigated by solution of sulfuric acid. We defined a specific consumption of sulfuric acid in relation to the mass of ore and to the mass of metal.

Keywords: cobalt, degree of extraction, hydrometallurgy, igneous metallurgy, leaching, matte, nickel

Procedia PDF Downloads 370
2856 Electro-Optic Parameters of Ferroelectric Particles- Liquid Crystal Composites

Authors: T. D. Ibragimov, A. R. Imamaliyev, G. M. Bayramov

Abstract:

Influence of barium titanate particles on electro-optic properties of liquid crystal 4-cyano-4′-pentylbiphenyl (5CB) with positive dielectric anisotropy and the liquid crystalline (LC) mixture Н-37 consisting of 4-methoxybezylidene-4'–butylaniline and 4-ethoxybezylidene-4'–butylaniline with negative dielectric anisotropy was investigated. It was shown that a presence of particles inside 5СВ and H-37 decreased the clearing temperature from 35.2 °С to 32.5°С and from 61.2 oC to 60.1oC, correspondingly. The threshold voltage of the Fredericksz effect became 0.3 V for the BaTiO3-5CB colloid while the beginning of this effect of the pure 5СВ was observed at 2.1 V. Threshold voltage of the Fredericksz effect increased from 2.8 V to up 3.1 V at additive of particles into H-37. A rise time of the BaTiO3-5CB colloid improved while a decay time worsened in comparison with the pure 5CB at all applied voltages. The inverse trends were observed for the H-37 matrix, namely, a rise time worsened and a decay time improved. Among other things, the effect of fast light modulation was studied at application of the rectangular impulse with direct bias to an electro-optical cell with the BaTiO3 particles+5CB and the pure 5CB. At this case, a rise time of the composite worsened, a decay time improved in comparison with the pure 5CB. The pecularities of electrohydrodynamic instability (EHDI) formation was also investigated into the composite with the H-37 matrix. It was found that the voltage of the EHDI formation decreased, a rise time increased and a decay time decreased in comparison with the pure H-37. First of all, experimental results are explained by appearance of local electric fields near the polarized ferroelectric particles at application of external electric field and an existence of the additional obstacles (particles) for movement of ions.

Keywords: liquid crystal, ferroelectric particles, composite, electro-optics

Procedia PDF Downloads 697
2855 Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm

Authors: Vahid Bayrami Rad

Abstract:

Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data.

Keywords: arduino board, artificial intelligence, image processing, solenoid lock

Procedia PDF Downloads 63
2854 OSEME: A Smart Learning Environment for Music Education

Authors: Konstantinos Sofianos, Michael Stefanidakis

Abstract:

Nowadays, advances in information and communication technologies offer a range of opportunities for new approaches, methods, and tools in the field of education and training. Teacher-centered learning has changed to student-centered learning. E-learning has now matured and enables the design and construction of intelligent learning systems. A smart learning system fully adapts to a student's needs and provides them with an education based on their preferences, learning styles, and learning backgrounds. It is a wise friend and available at any time, in any place, and with any digital device. In this paper, we propose an intelligent learning system, which includes an ontology with all elements of the learning process (learning objects, learning activities) and a massive open online course (MOOC) system. This intelligent learning system can be used in music education.

Keywords: intelligent learning systems, e-learning, music education, ontology, semantic web

Procedia PDF Downloads 306
2853 Real Fictions: Converging Landscapes and Imagination in an English Village

Authors: Edoardo Lomi

Abstract:

A problem of central interest in anthropology concerns the ethnographic displacement of modernity’s conceptual sovereignty over that of native collectives worldwide. Part of this critical project has been the association of Western modernity with a dualist, naturalist ontology. Despite its demonstrated value for comparative work, this association often comes at the cost of reproducing ideas that lack an empirical ethnographic basis. This paper proposes a way forward by bringing to bear some of the results produced by an ethnographic study of a village in Wiltshire, South England. Due to its picturesque qualities, this village has served for decades as a ready-made set for fantasy movies and a backdrop to fictional stories. These forms of mediation have in turn generated some apparent paradoxes, such as fictitious characters that affect actual material changes, films that become more real than history, and animated stories that, while requiring material grounds to unfold, inhabit a time and space in other respects distinct from that of material processes. Drawing on ongoing fieldwork and interviews with locals and tourists, this paper considers the ways villagers engage with fiction as part of their everyday lives. The resulting image is one of convergence, in the same landscape, of people and things having different ontological status. This study invites reflection on the implications of this image for diversifying our imagery of Western lifeworlds. To this end, the notion of ‘real fictions’ is put forth, connecting the ethnographic blurring of modernist distinctions–such as sign and signified, mind and matter, materiality and immateriality–with discussions on anthropology’s own reliance on fictions for critical comparative work.

Keywords: England, ethnography, landscape, modernity, mediation, ontology, post-structural theory

Procedia PDF Downloads 112
2852 Research on the Aesthetic Characteristics of Calligraphy Art Under The Cross-Cultural Background Based on Eye Tracking

Authors: Liu Yang

Abstract:

Calligraphy has a unique aesthetic value in Chinese traditional culture. Calligraphy reflects the physical beauty and the dynamic beauty of things through the structure of writing and the order of strokes to standardize the style of writing. In recent years, Chinese researchers have carried out research on the appreciation of calligraphy works from the perspective of psychology, such as how Chinese people appreciate the beauty of stippled lines, the beauty of virtual and real, and the beauty of the composition. However, there is currently no domestic research on how foreigners appreciate Chinese calligraphy. People's appreciation of calligraphy is mainly in the form of visual perception, and psychologists have been working on the use of eye trackers to record eye tracking data to explore the relationship between eye tracking and psychological activities. The purpose of this experimental study is to use eye tracking recorders to analyze the eye gaze trajectories of college students with different cultural backgrounds when they appreciate the same calligraphy work to reveal the differences in cognitive processing with different cultural backgrounds. It was found that Chinese students perceived calligraphy as words when viewing calligraphy works, so they first noticed fonts with easily recognizable glyphs, and the overall viewed time was short. Foreign students perceived calligraphy works as graphics, and they first noticed novel and abstract fonts, and the overall viewing time is longer. The understanding of calligraphy content has a certain influence on the appreciation of calligraphy works by foreign students. It is shown that when foreign students who understand the content of calligraphy works. The eye tracking path is more consistent with the calligraphy writing path, and it helps to develop associations with calligraphy works to better understand the connotation of calligraphy works. This result helps us understand the impact of cultural background differences on calligraphy appreciation and helps us to take more effective strategies to help foreign audiences understand Chinese calligraphy art.

Keywords: Chinese calligraphy, eye-tracking, cross-cultural, cultural communication

Procedia PDF Downloads 103
2851 Side Effects of Dental Whitening: Published Data from the Literature

Authors: Ilma Robo, Saimir Heta, Emela Dalloshi, Nevila Alliu, Vera Ostreni

Abstract:

The dental whitening process, beyond the fact that it is a mini-invasive dental treatment, has effects on the dental structure, or on the pulp of the tooth, where it is applied. The electronic search was performed using keywords to find articles published within the last 10 years about side effects, assessed as such, of minimally invasive dental bleaching treatment. Methodology: In selected articles, the other aim of the study was to evaluate the side effects of bleaching based on the percentage and type of solution used, where the latter was evaluated on the basic solution used for bleaching. Results: The side effects of bleaching are evaluated in selected articles depending on the method of bleaching application, which means it is carried out with recommended solutions, or with mixtures of alternative solutions or substances based on Internet information. Short conclusion: The dental bleaching process has side effects which have not yet been definitively evaluated, experimentally in large samples of individuals or animals (mice or cattle) to arrive at accurate numerical conclusions. The trend of publications about this topic is increasing in recent years, as long as the trend for aesthetic facial treatments, including dental ones, is increasing.

Keywords: teeth whitening, side effects, permanent teeth, formed dental apex

Procedia PDF Downloads 58
2850 GenAI Agents in Product Management: A Case Study from the Manufacturing Sector

Authors: Aron Witkowski, Andrzej Wodecki

Abstract:

Purpose: This study aims to explore the feasibility and effectiveness of utilizing Generative Artificial Intelligence (GenAI) agents as product managers within the manufacturing sector. It seeks to evaluate whether current GenAI capabilities can fulfill the complex requirements of product management and deliver comparable outcomes to human counterparts. Study Design/Methodology/Approach: This research involved the creation of a support application for product managers, utilizing high-quality sources on product management and generative AI technologies. The application was designed to assist in various aspects of product management tasks. To evaluate its effectiveness, a study was conducted involving 10 experienced product managers from the manufacturing sector. These professionals were tasked with using the application and providing feedback on the tool's responses to common questions and challenges they encounter in their daily work. The study employed a mixed-methods approach, combining quantitative assessments of the tool's performance with qualitative interviews to gather detailed insights into the user experience and perceived value of the application. Findings: The findings reveal that GenAI-based product management agents exhibit significant potential in handling routine tasks, data analysis, and predictive modeling. However, there are notable limitations in areas requiring nuanced decision-making, creativity, and complex stakeholder interactions. The case study demonstrates that while GenAI can augment human capabilities, it is not yet fully equipped to independently manage the holistic responsibilities of a product manager in the manufacturing sector. Originality/Value: This research provides an analysis of GenAI's role in product management within the manufacturing industry, contributing to the limited body of literature on the application of GenAI agents in this domain. It offers practical insights into the current capabilities and limitations of GenAI, helping organizations make informed decisions about integrating AI into their product management strategies. Implications for Academic and Practical Fields: For academia, the study suggests new avenues for research in AI-human collaboration and the development of advanced AI systems capable of higher-level managerial functions. Practically, it provides industry professionals with a nuanced understanding of how GenAI can be leveraged to enhance product management, guiding investments in AI technologies and training programs to bridge identified gaps.

Keywords: generative artificial intelligence, GenAI, NPD, new product development, product management, manufacturing

Procedia PDF Downloads 40
2849 Determining the Direction of Causality between Creating Innovation and Technology Market

Authors: Liubov Evstigneeva

Abstract:

In this paper an attempt is made to establish causal nexuses between innovation and international trade in Russia. The topicality of this issue is determined by the necessity of choosing policy instruments for economic modernization and transition to innovative development. The vector auto regression (VAR) model and Granger test are applied for the Russian monthly data from 2005 until the second quartile of 2015. Both lagged import and export at the national level cause innovation, the latter starts to stimulate foreign trade since it is a remote lag. In comparison to aggregate data, the results by patent’s categories are more diverse. Importing technologies from foreign countries stimulates patent activity, while innovations created in Russia are only Granger causality for import to Commonwealth of Independent States.

Keywords: export, import, innovation, patents

Procedia PDF Downloads 317
2848 Proxisch: An Optimization Approach of Large-Scale Unstable Proxy Servers Scheduling

Authors: Xiaoming Jiang, Jinqiao Shi, Qingfeng Tan, Wentao Zhang, Xuebin Wang, Muqian Chen

Abstract:

Nowadays, big companies such as Google, Microsoft, which have adequate proxy servers, have perfectly implemented their web crawlers for a certain website in parallel. But due to lack of expensive proxy servers, it is still a puzzle for researchers to crawl large amounts of information from a single website in parallel. In this case, it is a good choice for researchers to use free public proxy servers which are crawled from the Internet. In order to improve efficiency of web crawler, the following two issues should be considered primarily: (1) Tasks may fail owing to the instability of free proxy servers; (2) A proxy server will be blocked if it visits a single website frequently. In this paper, we propose Proxisch, an optimization approach of large-scale unstable proxy servers scheduling, which allow anyone with extremely low cost to run a web crawler efficiently. Proxisch is designed to work efficiently by making maximum use of reliable proxy servers. To solve second problem, it establishes a frequency control mechanism which can ensure the visiting frequency of any chosen proxy server below the website’s limit. The results show that our approach performs better than the other scheduling algorithms.

Keywords: proxy server, priority queue, optimization algorithm, distributed web crawling

Procedia PDF Downloads 207
2847 Emerging Technology for 6G Networks

Authors: Yaseein S. Hussein, Victor P. Gil Jiménez, Abdulmajeed Al-Jumaily

Abstract:

Due to the rapid advancement of technology, there is an increasing demand for wireless connections that are both fast and reliable, with minimal latency. New wireless communication standards are developed every decade, and the year 2030 is expected to see the introduction of 6G. The primary objectives of 6G network and terminal designs are focused on sustainability and environmental friendliness. The International Telecommunication Union-Recommendation division (ITU-R) has established the minimum requirements for 6G, with peak and user data rates of 1 Tbps and 10-100 Gbps, respectively. In this context, Light Fidelity (Li-Fi) technology is the most promising candidate to meet these requirements. This article will explore the various advantages, features, and potential applications of Li-Fi technology, and compare it with 5G networking, to showcase its potential impact among other emerging technologies that aim to enable 6G networks.

Keywords: 6G networks, artificial intelligence (AI), Li-Fi technology, Terahertz (THz) communication, visible light communication (VLC)

Procedia PDF Downloads 86
2846 Three Visions of a Conflict: The Case of La Araucania, Chile

Authors: Maria Barriga

Abstract:

The article focuses on the analysis of three images of the last five years that represent different visions of social groups in the context of the so call “Conflicto Mapuche” in la Araucanía, Chile. Using a multimodal social semiotic approach, we analyze the meaning making of these images and the social groups strategies to achieve visibility and recognition in political contexts. We explore the making and appropriation of symbols and concepts and analyze the different strategies that groups use to built hegemonic views. Among these strategies, we compare the use of digital technologies in design these images and the influence of Chilean Estate's vision on the Mapuche political conflict. Finally, we propose visual strategies to improve basic conditions for dialogue and recognition among these groups.

Keywords: visual culture, power, conflict, indigenous people

Procedia PDF Downloads 281
2845 Pharmacy-Station Mobile Application

Authors: Taissir Fekih Romdhane

Abstract:

This paper proposes a mobile web application named Pharmacy-Station that sells medicines and permits user to search for medications based on their symptoms, making it is easy to locate a specific drug online without the need to visit a pharmacy where it may be out of stock. This application is developed using the jQuery Mobile framework, which uses many web technologies and languages such as HTML5, PHP, JavaScript and CSS3. To test the proposed application, we used data from popular pharmacies in Saudi Arabia that included important information such as location, contact, and medicines in stock, etc. This document describes the different steps followed to create the Pharmacy-Station application along with screenshots. Finally, based on the results, the paper concludes with recommendations and further works planned to improve the Pharmacy-Station mobile application.

Keywords: pharmacy, mobile application, jquery mobile framework, search, medicine

Procedia PDF Downloads 150
2844 Hierarchical Filtering Method of Threat Alerts Based on Correlation Analysis

Authors: Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, Shaohua Lv

Abstract:

Nowadays, the threats of the internet are enormous and increasing; however, the classification of huge alert messages generated in this environment is relatively monotonous. It affects the accuracy of the network situation assessment, and also brings inconvenience to the security managers to deal with the emergency. In order to deal with potential network threats effectively and provide more effective data to improve the network situation awareness. It is essential to build a hierarchical filtering method to prevent the threats. In this paper, it establishes a model for data monitoring, which can filter systematically from the original data to get the grade of threats and be stored for using again. Firstly, it filters the vulnerable resources, open ports of host devices and services. Then use the entropy theory to calculate the performance changes of the host devices at the time of the threat occurring and filter again. At last, sort the changes of the performance value at the time of threat occurring. Use the alerts and performance data collected in the real network environment to evaluate and analyze. The comparative experimental analysis shows that the threat filtering method can effectively filter the threat alerts effectively.

Keywords: correlation analysis, hierarchical filtering, multisource data, network security

Procedia PDF Downloads 196
2843 Contextualizing Policing in Local Communities: The Way Forward for Ghana Police Service

Authors: Bernard Owusu Asare

Abstract:

This study investigates the implementation and efficacy of community policing within the Ghana Police Service, with a focus on its impact on local communities. Emphasizing the goal of creating safer environments and improving the overall quality of life, the research engages opinion leaders from selected communities in Ghana, as well as members of the police force stationed within these communities. Employing a semi-structured interview guide as the primary research instrument, data collection involves face-to-face interviews conducted at respondents' residences and policing centers. The preliminary findings underscore the pivotal role of collaborative efforts between community elders and police personnel in the successful execution of community policing initiatives. Furthermore, the study identifies gainful employment for the youth as a key determinant of effective policing, highlighting the interconnectedness of socioeconomic factors with law enforcement outcomes. The study further reveals that access to the internet emerges as a factor influencing both policing practices and the overall quality of life within these communities. By contextualizing the dynamics of community policing in the local Ghanaian context, this research aims to contribute valuable insights to the ongoing discourse on effective law enforcement strategies and their impact on community well-being.

Keywords: community, policing, police service, Ghana

Procedia PDF Downloads 58
2842 Combined Safety and Cybersecurity Risk Assessment for Intelligent Distributed Grids

Authors: Anders Thorsén, Behrooz Sangchoolie, Peter Folkesson, Ted Strandberg

Abstract:

As more parts of the power grid become connected to the internet, the risk of cyberattacks increases. To identify the cybersecurity threats and subsequently reduce vulnerabilities, the common practice is to carry out a cybersecurity risk assessment. For safety classified systems and products, there is also a need for safety risk assessments in addition to the cybersecurity risk assessment in order to identify and reduce safety risks. These two risk assessments are usually done separately, but since cybersecurity and functional safety are often related, a more comprehensive method covering both aspects is needed. Some work addressing this has been done for specific domains like the automotive domain, but more general methods suitable for, e.g., intelligent distributed grids, are still missing. One such method from the automotive domain is the Security-Aware Hazard Analysis and Risk Assessment (SAHARA) method that combines safety and cybersecurity risk assessments. This paper presents an approach where the SAHARA method has been modified in order to be more suitable for larger distributed systems. The adapted SAHARA method has a more general risk assessment approach than the original SAHARA. The proposed method has been successfully applied on two use cases of an intelligent distributed grid.

Keywords: intelligent distribution grids, threat analysis, risk assessment, safety, cybersecurity

Procedia PDF Downloads 147
2841 The Conceptual Exploration of Comfort Zone by Using Content Analysis

Authors: Lilla Szabó Hangya, Szilvia Jambori

Abstract:

The comfort zone is less studied area in the field of psychology. One of the most important definitions is that comfort zone is a psychological state in which things feel familiar to a person with low level of anxiety and stress. But the validity of comfort zone does not confirm till now. The aim of our pilot research is to test which psychological factors could determine how young adults behave during their decision process to stay in one’s comfort zone or to leave it. Every person has a number of comfort zones, so we are not able to measure it directly, only those personality traits which predict if someone leaves his comfort zone easier or harder. In our study at first we wanted to clarify the meaning of comfort zone. 110 young adults (male: 37, female: 73; ages from 18 to 70, average age: 26,6) took part in the study. Beside their demographic datas we asked them what does the comfort zone mean for them. The results showed that the meaning of the comfort zone can be grouped in five dimensions: comfort (49,6 %), leaving it-change (8,1%), ambivalent feelings (10,6%), related to other people (10,6%), pursuit of self-realization (16,8%). Our results demonstrated age related characteristics. For young people at the age of 19 the comfort zone is related to other people, because during adolescents peer relationships become more important. Subjects at the age 20-30 answered that the comfort zone means comfort and stability for them. Their life becomes stable for a while, they are studying or working. But at the age of 25, when they finish university, most of them answered comfort zone means a changing process for them. On the other hand for subjects at the age of 27 the means of the comfort zone is pursuit of self-realization. After that period at the age of 31 when they have families and stable job the stability will also dominant. We saw that the comfort zone has much more meaning besides a pleasant psychological trait. Further we would like to determine which psychological factors relate to comfort zone, and what kind of personality traits could predict leaving or staying in one’s comfort zone. We want to observe the relationship between comfort zone and subjective well-being, life satisfaction self-efficacy or self-esteem.

Keywords: comfort zone, development, personality trait, young adults

Procedia PDF Downloads 332
2840 Intellectual Capital Disclosure: Profiles of Spanish Public Universities

Authors: Yolanda Ramírez, Ángel Tejada, Agustín Baidez

Abstract:

In the higher education setting, there is a current trend in society toward greater openness and transparency. The economic, social and political changes that have occurred in recent years in public sector universities (particularly the New Public Management, the Bologna Process and the emergence of the “third mission”) call for a wider disclosure of value created by universities to support fundraising activities, to ensure accountability in the use of public funds and the outcomes of research and teaching, as well as close relationships with industries and territories. The paper has two purposes: 1) to explore the intellectual capital (IC) disclosure in Spanish universities through their websites, and 2) to identify university profiles. This study applies a content analysis to analyze the institutional websites of Spanish public universities and a cluster analysis. The analysis reveals that Spanish universities’ website content usually relates to human capital, while structural and relational capitals are less widely disclosed. Our research identifies three behavioral profiles of Spanish universities with regard to the online disclosure of IC (universities more proactive, universities less proactive and universities adopt a middle position in this regard. The results can serve as encouragement to university managers to enhance online IC disclosure to meet the information needs of university stakeholders.

Keywords: universities, intellectual capital, disclosure, internet

Procedia PDF Downloads 153