CINXE.COM
Search results for: hacking technologies
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: hacking technologies</title> <meta name="description" content="Search results for: hacking technologies"> <meta name="keywords" content="hacking technologies"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="hacking technologies" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="hacking technologies"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 3646</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: hacking technologies</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3646</span> Approaches to Ethical Hacking: A Conceptual Framework for Research</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lauren%20Provost">Lauren Provost</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ethical%20hacking" title="ethical hacking">ethical hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=literature%20review" title=" literature review"> literature review</a>, <a href="https://publications.waset.org/abstracts/search?q=penetration%20testing" title=" penetration testing"> penetration testing</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20engineering" title=" social engineering"> social engineering</a> </p> <a href="https://publications.waset.org/abstracts/136658/approaches-to-ethical-hacking-a-conceptual-framework-for-research" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/136658.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">218</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3645</span> Client Hacked Server</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bagul%20Abhijeet">Bagul Abhijeet</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hacking" title="Hacking">Hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=Vulnerabilities" title=" Vulnerabilities"> Vulnerabilities</a>, <a href="https://publications.waset.org/abstracts/search?q=Dummy%20request" title=" Dummy request"> Dummy request</a>, <a href="https://publications.waset.org/abstracts/search?q=Virus" title=" Virus"> Virus</a>, <a href="https://publications.waset.org/abstracts/search?q=Server%20monitoring" title=" Server monitoring"> Server monitoring</a> </p> <a href="https://publications.waset.org/abstracts/36777/client-hacked-server" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36777.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">251</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3644</span> Understanding the Basics of Information Security: An Act of Defense</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sharon%20Q.%20Yang">Sharon Q. Yang</a>, <a href="https://publications.waset.org/abstracts/search?q=Robert%20J.%20Congleton"> Robert J. Congleton</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybercrimes" title="cybercrimes">cybercrimes</a>, <a href="https://publications.waset.org/abstracts/search?q=hacking%20technologies" title=" hacking technologies"> hacking technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=higher%20education" title=" higher education"> higher education</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a>, <a href="https://publications.waset.org/abstracts/search?q=libraries" title=" libraries"> libraries</a> </p> <a href="https://publications.waset.org/abstracts/131942/understanding-the-basics-of-information-security-an-act-of-defense" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/131942.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3643</span> Hacking's 'Between Goffman and Foucault': A Theoretical Frame for Criminology </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tom%C3%A1s%20Speziale">Tomás Speziale</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper aims to analyse how Ian Hacking states the theoretical basis of his research on the classification of people. Although all his early philosophical education had been based in Foucault, it is also true that Erving Goffman’s perspective provided him with epistemological and methodological tools for understanding face-to-face relationships. Hence, all his works must be thought of as social science texts that combine the research on how the individuals are constituted ‘top-down’ (as in Foucault), with the inquiry into how people renegotiate ‘bottom-up’ the classifications about them. Thus, Hacking´s proposal constitutes a middle ground between the French Philosopher and the American Sociologist. Placing himself between both authors allows Hacking to build a frame that is expected to adjust to Social Sciences’ main particularity: the fact that they study interactive kinds. These are kinds of people, which imply that those who are classified can change in certain ways that prompt the need for changing previous classifications themselves. It is all about the interaction between the labelling of people and the people who are classified. Consequently, understanding the way in which Hacking uses Foucault’s and Goffman’s theories is essential to fully comprehend the social dynamic between individuals and concepts, what Bert Hansen had called dialectical realism. His theoretical proposal, therefore, is not only valuable because it combines diverse perspectives, but also because it constitutes an utterly original and relevant framework for Sociological theory and particularly for Criminology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=classification%20of%20people" title="classification of people">classification of people</a>, <a href="https://publications.waset.org/abstracts/search?q=Foucault%27s%20archaeology" title=" Foucault's archaeology"> Foucault's archaeology</a>, <a href="https://publications.waset.org/abstracts/search?q=Goffman%27s%20interpersonal%20sociology" title=" Goffman's interpersonal sociology"> Goffman's interpersonal sociology</a>, <a href="https://publications.waset.org/abstracts/search?q=interactive%20kinds" title=" interactive kinds"> interactive kinds</a> </p> <a href="https://publications.waset.org/abstracts/67919/hackings-between-goffman-and-foucault-a-theoretical-frame-for-criminology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67919.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">343</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3642</span> A Study on Automotive Attack Database and Data Flow Diagram for Concretization of HEAVENS: A Car Security Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Se-Han%20Lee">Se-Han Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Kwang-Woo%20Go"> Kwang-Woo Go</a>, <a href="https://publications.waset.org/abstracts/search?q=Gwang-Hyun%20Ahn"> Gwang-Hyun Ahn</a>, <a href="https://publications.waset.org/abstracts/search?q=Hee-Sung%20Park"> Hee-Sung Park</a>, <a href="https://publications.waset.org/abstracts/search?q=Cheol-Kyu%20Han"> Cheol-Kyu Han</a>, <a href="https://publications.waset.org/abstracts/search?q=Jun-Bo%20Shim"> Jun-Bo Shim</a>, <a href="https://publications.waset.org/abstracts/search?q=Geun-Chul%20Kang"> Geun-Chul Kang</a>, <a href="https://publications.waset.org/abstracts/search?q=Hyun-Jung%20Lee"> Hyun-Jung Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, with the advent of smart cars and the expansion of the market, the announcement of 'Adventures in Automotive Networks and Control Units' at the DEFCON21 conference in 2013 revealed that cars are not safe from hacking. As a result, the HEAVENS model considering not only the functional safety of the vehicle but also the security has been suggested. However, the HEAVENS model only presents a simple process, and there are no detailed procedures and activities for each process, making it difficult to apply it to the actual vehicle security vulnerability check. In this paper, we propose an automated attack database that systematically summarizes attack vectors, attack types, and vulnerable vehicle models to prepare for various car hacking attacks, and data flow diagrams that can detect various vulnerabilities and suggest a way to materialize the HEAVENS model. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=automotive%20security" title="automotive security">automotive security</a>, <a href="https://publications.waset.org/abstracts/search?q=HEAVENS" title=" HEAVENS"> HEAVENS</a>, <a href="https://publications.waset.org/abstracts/search?q=car%20hacking" title=" car hacking"> car hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20model" title=" security model"> security model</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a> </p> <a href="https://publications.waset.org/abstracts/84442/a-study-on-automotive-attack-database-and-data-flow-diagram-for-concretization-of-heavens-a-car-security-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/84442.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">362</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3641</span> Terrorist Financing through Ilegal Fintech Hacking: Case Study of Rizki Gunawan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ishna%20Indika%20Jusi">Ishna Indika Jusi</a>, <a href="https://publications.waset.org/abstracts/search?q=Rifana%20Meika"> Rifana Meika</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Terrorism financing method in Indonesia is developing at an alarming rate, to the point, it is now becoming more complex than before. Terrorists traditionally use conventional methods like robberies, charities, and courier services to fund their activities; today terrorists are able to utilize modern methods in financing their activities due to the rapid development in financial technology nowadays; one example is by hacking an illegal Fintech Company. Therefore, this research is conducted in order to explain and analyze the consideration behind the usage of an illegal fintech company to finance terrorism activities and how to prevent it. The analysis in this research is done by using the theory that is coined by Michael Freeman about the reasoning of terrorists when choosing their financing method. The method used in this research is a case study, and the case that is used for this research is the terrorism financing hacking of speedline.com in 2011 by Rizki Gunawan. Research data are acquired from interviews with the perpetrators, experts from INTRAC (PPATK), Special Detachment 88, reports, and journals that are relevant to the research. As a result, this study found that the priority aspects in terms of terrorist financing are security, quantity, and simplicity while obtaining funds. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fintech" title="Fintech">Fintech</a>, <a href="https://publications.waset.org/abstracts/search?q=illegal" title=" illegal"> illegal</a>, <a href="https://publications.waset.org/abstracts/search?q=Indonesia" title=" Indonesia"> Indonesia</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism%20financing" title=" terrorism financing"> terrorism financing</a> </p> <a href="https://publications.waset.org/abstracts/130175/terrorist-financing-through-ilegal-fintech-hacking-case-study-of-rizki-gunawan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/130175.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3640</span> Machines Hacking Humans: Performances Practices in Electronic Music during the 21st Century</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zimasa%20Siyasanga%20Gysman">Zimasa Siyasanga Gysman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper assesses the history of electronic music and its performance to illustrate that machines and technology have largely influenced how humans perform electronic music. The history of electronic music mainly focuses on the composition and production of electronic music with little to no attention paid to its performance by the majority of scholars in this field. Therefore, establishing a history of performance involves investigating what compositions of electronic music called for in the production of electronic music performance. This investigation into seminal works in the history of electronic music, therefore, illustrates the aesthetics of electronic music performance and the aesthetics established in the very beginnings of electronic music performance demonstrate the aesthetics of electronic music which are still prevalent today. The key aesthetics are the repurposing of technology and the hybridisation of technology. Performers take familiar technology (technology that society has become accustomed to using in daily life), not necessarily related to music or performance and use it as an instrument in their performances, such as a rotary dial telephone. Likewise, since the beginnings of electronic music, producers have always experimented with the latest technologies available to them in their compositions and performances. The spirit of performers of electronic music, therefore, revolves around repurposing familiar technologies and using them in new ways, whilst similarly experimenting with new technologies in their performances. This process of hybridisation plays a key role in the production and performance of electronic music in the twentieth century. Through various interviews with performers of electronic music, it is shown that these aesthetics are driving performance practices in the twenty-first century. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=body" title="body">body</a>, <a href="https://publications.waset.org/abstracts/search?q=hybridisation" title=" hybridisation"> hybridisation</a>, <a href="https://publications.waset.org/abstracts/search?q=performance" title=" performance"> performance</a>, <a href="https://publications.waset.org/abstracts/search?q=sound" title=" sound"> sound</a> </p> <a href="https://publications.waset.org/abstracts/102904/machines-hacking-humans-performances-practices-in-electronic-music-during-the-21st-century" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/102904.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3639</span> Stochastic Analysis of Linux Operating System through Copula Distribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vijay%20Vir%20Singh">Vijay Vir Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work is focused studying the Linux operating system connected in a LAN (local area network). The STAR topology (to be called subsystem-1) and BUS topology (to be called subsystem-2) are taken into account, which are placed at two different locations and connected to a server through a hub. In the both topologies BUS topology and STAR topology, we have assumed n clients. The system has two types of failures i.e. partial failure and complete failure. Further, the partial failure has been categorized as minor and major partial failure. It is assumed that the minor partial failure degrades the sub-systems and the major partial failure make the subsystem break down mode. The system may completely fail due to failure of server hacking and blocking etc. The system is studied using supplementary variable technique and Laplace transform by using different types of failure and two types of repair. The various measures of reliability for example, availability of system, reliability of system, MTTF, profit function for different parametric values have been discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=star%20topology" title="star topology">star topology</a>, <a href="https://publications.waset.org/abstracts/search?q=bus%20topology" title=" bus topology"> bus topology</a>, <a href="https://publications.waset.org/abstracts/search?q=blocking" title=" blocking"> blocking</a>, <a href="https://publications.waset.org/abstracts/search?q=hacking" title=" hacking"> hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux%20operating%20system" title=" Linux operating system"> Linux operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=Gumbel-Hougaard%20family%20copula" title=" Gumbel-Hougaard family copula"> Gumbel-Hougaard family copula</a>, <a href="https://publications.waset.org/abstracts/search?q=supplementary%20variable" title=" supplementary variable"> supplementary variable</a> </p> <a href="https://publications.waset.org/abstracts/48060/stochastic-analysis-of-linux-operating-system-through-copula-distribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48060.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">370</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3638</span> Performance Analysis of LINUX Operating System Connected in LAN Using Gumbel-Hougaard Family Copula Distribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20V.%20Singh">V. V. Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper we have focused on the study of a Linux operating system connected in a LAN (local area network). We have considered two different topologies STAR topology (subsystem-1) and BUS topology (subsystem-2) which are placed at two different places and connected to a server through a hub. In both topologies BUS topology and STAR topology, we have assumed 'n' clients. The system has two types of failure partial failure and complete failure. Further the partial failure has been categorized as minor partial failure and major partial failure. It is assumed that minor partial failure degrades the subsystem and the major partial failure brings the subsystem to break down mode. The system can completely failed due to failure of server hacking and blocking etc. The system is studied by supplementary variable technique and Laplace transform by taking different types of failure and two types of repairs. The various measures of reliability like availability of system, MTTF, profit function for different parametric values has been discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=star%20topology" title="star topology">star topology</a>, <a href="https://publications.waset.org/abstracts/search?q=bus%20topology" title=" bus topology"> bus topology</a>, <a href="https://publications.waset.org/abstracts/search?q=hacking" title=" hacking"> hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=blocking" title=" blocking"> blocking</a>, <a href="https://publications.waset.org/abstracts/search?q=linux%20operating%20system" title=" linux operating system"> linux operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=Gumbel-Hougaard%20family%20copula" title=" Gumbel-Hougaard family copula"> Gumbel-Hougaard family copula</a>, <a href="https://publications.waset.org/abstracts/search?q=supplementary%20variable" title=" supplementary variable "> supplementary variable </a> </p> <a href="https://publications.waset.org/abstracts/33606/performance-analysis-of-linux-operating-system-connected-in-lan-using-gumbel-hougaard-family-copula-distribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33606.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">577</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3637</span> The Impact of the Information Technologies on the Accounting Department of the Romanian Companies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dumitru%20Valentin%20Florentin">Dumitru Valentin Florentin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The need to use high volumes of data and the high competition are only two reasons which make necessary the use of information technologies. The objective of our research is to establish the impact of information technologies on the accounting department of the Romanian companies. In order to achieve it, starting from the literature review we made an empirical research based on a questionnaire. We investigated the types of technologies used, the reasons which led to the implementation of certain technologies, the benefits brought by the use of the information technologies, the difficulties brought by the implementation and the future effects of the applications. The conclusions show that there is an evolution in the degree of implementation of the information technologies in the Romanian companies, compared with the results of other studies conducted a few years before. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20technologies" title="information technologies">information technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=impact" title=" impact"> impact</a>, <a href="https://publications.waset.org/abstracts/search?q=company" title=" company"> company</a>, <a href="https://publications.waset.org/abstracts/search?q=Romania" title=" Romania"> Romania</a>, <a href="https://publications.waset.org/abstracts/search?q=empirical%20study" title=" empirical study"> empirical study</a> </p> <a href="https://publications.waset.org/abstracts/22404/the-impact-of-the-information-technologies-on-the-accounting-department-of-the-romanian-companies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22404.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">424</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3636</span> The Effect of Information Technologies on Business Performance: An Application on Small Hotels</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdullah%20Karaman">Abdullah Karaman</a>, <a href="https://publications.waset.org/abstracts/search?q=Kursad%20Sayin"> Kursad Sayin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this research, which information technologies are used in small hotel businesses, and the information technologies-performance perception of the managers are pointed out. During the research, the questionnaire was prepared and the small scale hotel managers were interviewed face to face and they filled out the questionnaire and the answers acquired were evaluated. As the result of the research, it was obtained that the managers do not care much about the information technologies usage in practice even though they accepted that the information technologies are important in terms of performance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20technologies" title="information technologies">information technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=managers" title=" managers"> managers</a>, <a href="https://publications.waset.org/abstracts/search?q=performance" title=" performance"> performance</a>, <a href="https://publications.waset.org/abstracts/search?q=small%20hotels" title=" small hotels"> small hotels</a> </p> <a href="https://publications.waset.org/abstracts/60356/the-effect-of-information-technologies-on-business-performance-an-application-on-small-hotels" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60356.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">489</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3635</span> Information Technologies in Automotive Assembly Industry in Thailand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jirarat%20Teeravaraprug">Jirarat Teeravaraprug</a>, <a href="https://publications.waset.org/abstracts/search?q=Usawadee%20Inklay"> Usawadee Inklay</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper gave an attempt in prioritizing information technologies that organizations should give concentration. The case study was organizations in the automotive assembly industry in Thailand. Data were first collected to gather all information technologies known and used in the automotive assembly industry in Thailand. Five experts from the industries were surveyed based on the concept of fuzzy DEMATEL. The information technologies were categorized into six groups, which were communication, transaction, planning, organization management, warehouse management, and transportation. The cause groups of information technologies for each group were analysed and presented. Moreover, the relationship between the used and the significant information technologies was given. Discussions based on the used information technologies and the research results are given. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20technology" title="information technology">information technology</a>, <a href="https://publications.waset.org/abstracts/search?q=automotive%20assembly%20industry" title=" automotive assembly industry"> automotive assembly industry</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20DEMATEL" title=" fuzzy DEMATEL"> fuzzy DEMATEL</a> </p> <a href="https://publications.waset.org/abstracts/2498/information-technologies-in-automotive-assembly-industry-in-thailand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2498.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">345</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3634</span> An Examination of the Effects of Implantable Technologies on the Practices of Governmentality</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Benn%20Van%20Den%20Ende">Benn Van Den Ende</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Over the last three decades, there has been an exponential increase in developments in implantable technologies such as the cardiac pacemaker, bionic prosthesis, and implantable chips. The effect of these technologies has been well researched in many areas. However, there is a lack of critical research in security studies. This paper will provide preliminary findings to an ongoing research project which aims to examine how implantable technologies effect the practices of governmentality in the context of security. It will do this by looking at the practices and techniques of governmentality along with different implantable technologies which increase, change or otherwise affect governmental practices. The preliminary research demonstrates that implantable technologies have a profound effect on the practices of governmentality, while also paving the way for further research into a potential ‘new’ form of governmentality in relation to these implantable technologies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20security%20studies" title="critical security studies">critical security studies</a>, <a href="https://publications.waset.org/abstracts/search?q=governmentality" title=" governmentality"> governmentality</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20theory" title=" security theory"> security theory</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20theory" title=" political theory"> political theory</a>, <a href="https://publications.waset.org/abstracts/search?q=Foucault" title=" Foucault "> Foucault </a> </p> <a href="https://publications.waset.org/abstracts/79464/an-examination-of-the-effects-of-implantable-technologies-on-the-practices-of-governmentality" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79464.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">189</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3633</span> Advances in Membrane Technologies for Wastewater Treatment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Deniz%20Sahin">Deniz Sahin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study provides a literature review of the special issue on wastewater treatment technologies, especially membrane technologies. Currently, wastewater is a serious and increasing worldwide problem with an adverse effect on the environment and living organisms. For this reason, many technologies have been developed to treat wastewater before discharging it to water bodies. We have been discussed membrane technologies to remove contaminants from wastewater such as heavy metals, dyes, pesticides, etc., which represent the main pollutants in wastewater. All the properties of these technologies including performance, economics, simplicity, and operability are also compared with other wastewater treatment technologies. The conventional water treatment technologies have the disadvantages of low separation efficiency, high energy consumption, and strict operating temperature. To overcome these difficulties, membrane technologies have been developed and used in wastewater treatment. Membrane technology uses a selectively permeable membrane to remove suspended and dissolved solids from water. This membrane is a very thin film of synthetic organic or inorganic materials, that can allow a very selective separation between a mixture and its components. Examples of membrane technologies include microfiltration (MF), ultrafiltration (UF), nanofiltration (NF), reverse osmosis (RO), electrodialysis (ED), gas separation, etc. Most of these technologies have been used extensively for the treatment of heavy metal wastewater. For instance, wastewater that contains Cu²⁺, Cd²⁺, Pb²⁺, Zn²⁺ was treated by ultrafiltration technology. It was shown that complete removal of metal ions could be achieved. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=industrial%20pollution" title="industrial pollution">industrial pollution</a>, <a href="https://publications.waset.org/abstracts/search?q=membrane%20technologies" title=" membrane technologies"> membrane technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=metal%20ions" title=" metal ions"> metal ions</a>, <a href="https://publications.waset.org/abstracts/search?q=wastewater" title=" wastewater"> wastewater</a> </p> <a href="https://publications.waset.org/abstracts/97532/advances-in-membrane-technologies-for-wastewater-treatment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97532.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">197</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3632</span> Refining Scheme Using Amphibious Epistemologies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=David%20Blaine">David Blaine</a>, <a href="https://publications.waset.org/abstracts/search?q=George%20Raschbaum"> George Raschbaum</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The evaluation of DHCP has synthesized SCSI disks, and current trends suggest that the exploration of e-business that would allow for further study into robots will soon emerge. Given the current status of embedded algorithms, hackers worldwide obviously desire the exploration of replication, which embodies the confusing principles of programming languages. In our research we concentrate our efforts on arguing that erasure coding can be made "fuzzy", encrypted, and game-theoretic. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SCHI%20disks" title="SCHI disks">SCHI disks</a>, <a href="https://publications.waset.org/abstracts/search?q=robot" title=" robot"> robot</a>, <a href="https://publications.waset.org/abstracts/search?q=algorithm" title=" algorithm"> algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=hacking" title=" hacking"> hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=programming%20language" title=" programming language"> programming language</a> </p> <a href="https://publications.waset.org/abstracts/7946/refining-scheme-using-amphibious-epistemologies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7946.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">426</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3631</span> Acceptance of Big Data Technologies and Its Influence towards Employee’s Perception on Job Performance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jia%20Yi%20Yap">Jia Yi Yap</a>, <a href="https://publications.waset.org/abstracts/search?q=Angela%20S.%20H.%20Lee"> Angela S. H. Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the use of big data technologies, organization can get result that they are interested in. Big data technologies simply load all the data that is useful for the organizations and provide organizations a better way of analysing data. The purpose of this research is to get employees’ opinion from films in Malaysia to explore the use of big data technologies in their organization in order to provide how it may affect the perception of the employees on job performance. Therefore, in order to identify will accepting big data technologies in the organization affect the perception of the employee, questionnaire will be distributed to different employee from different Small and medium-sized enterprises (SME) organization listed in Malaysia. The conceptual model proposed will test with other variables in order to see the relationship between variables. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=big%20data%20technologies" title="big data technologies">big data technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=employee" title=" employee"> employee</a>, <a href="https://publications.waset.org/abstracts/search?q=job%20performance" title=" job performance"> job performance</a>, <a href="https://publications.waset.org/abstracts/search?q=questionnaire" title=" questionnaire"> questionnaire</a> </p> <a href="https://publications.waset.org/abstracts/59432/acceptance-of-big-data-technologies-and-its-influence-towards-employees-perception-on-job-performance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59432.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">298</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3630</span> The Relevance of Smart Technologies in Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rachael%20Olubukola%20Afolabi">Rachael Olubukola Afolabi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Immersive technologies known as X Reality or Cross Reality that include virtual reality augmented reality, and mixed reality have pervaded into the education system at different levels from elementary school to adult learning. Instructors, instructional designers, and learning experience specialists continue to find new ways to engage students in the learning process using technology. While the progression of web technologies has enhanced digital learning experiences, analytics on learning outcomes continue to be explored to determine the relevance of these technologies in learning. Digital learning has evolved from web 1.0 (static) to 4.0 (dynamic and interactive), and this evolution of technologies has also advanced teaching methods and approaches. This paper explores how these technologies are being utilized in learning and the results that educators and learners have identified as effective learning opportunities and approaches. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=immersive%20technologoes" title="immersive technologoes">immersive technologoes</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20reality" title=" virtual reality"> virtual reality</a>, <a href="https://publications.waset.org/abstracts/search?q=augmented%20reality" title=" augmented reality"> augmented reality</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20in%20learning" title=" technology in learning"> technology in learning</a> </p> <a href="https://publications.waset.org/abstracts/146219/the-relevance-of-smart-technologies-in-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146219.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">145</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3629</span> Communication Development for Development Communication: Prospects and Challenges of New Media Technologies in South East Zone, Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=O.%20I.%20Ekwueme">O. I. Ekwueme</a> </p> <p class="card-text"><strong>Abstract:</strong></p> New media technologies are noted for their immense contributions in various sectors of the economy which are believed to have resulted in the development of European countries. There is an assumption that we cannot have development communication without communication development, but we are not sure if new media technologies contribute to development in the South-East zone, Nigeria. The study employed mixed method and discovered that new media technologies have a very minimal relationship to development in the South-East zone, Nigeria. It was discovered that the media report on development news is basically informative instead of interactive. The South-East zone is scarcely covered unlike other zones. It argued that the communication technologies introduced in Nigeria was as a result of their struggle for independence. It was recommended that media organisations in the South-East zone should give adequate coverage to the zone, and be more interactive. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=communication" title="communication">communication</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a>, <a href="https://publications.waset.org/abstracts/search?q=new%20media" title=" new media"> new media</a>, <a href="https://publications.waset.org/abstracts/search?q=technologies" title=" technologies"> technologies</a> </p> <a href="https://publications.waset.org/abstracts/7966/communication-development-for-development-communication-prospects-and-challenges-of-new-media-technologies-in-south-east-zone-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7966.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">339</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3628</span> Impact of New Media Technologies to News, Social Interactions, and Traditional Media</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ademola%20Bamgbose">Ademola Bamgbose</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The new media revolution, which encompasses a wide variety of new media technologies like blogs, social networking, visual worlds, wikis, have had a great influence on communications, traditional media and across other disciplines. This paper gives a review of the impact of new media technologies on the news, social interactions and traditional media in developing and developed countries. The study points to the fact that there is a significant impact of new media technologies on the news, social interactions and the traditional media in developing and developed countries, albeit both positively and negatively. Social interactions have been significantly affected, as well as in news production and reporting. It is reiterated that despite the pervasiveness of new media technologies, it would not bring to a total decline of traditional media. This paper contributes to the theoretical framework on the new media and will help to assess the extent of the impact of the new media in different locations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=communication" title="communication">communication</a>, <a href="https://publications.waset.org/abstracts/search?q=media" title=" media"> media</a>, <a href="https://publications.waset.org/abstracts/search?q=news" title=" news"> news</a>, <a href="https://publications.waset.org/abstracts/search?q=new%20media%20technologies" title=" new media technologies"> new media technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20interactions" title=" social interactions"> social interactions</a>, <a href="https://publications.waset.org/abstracts/search?q=traditional%20media" title=" traditional media"> traditional media</a> </p> <a href="https://publications.waset.org/abstracts/92034/impact-of-new-media-technologies-to-news-social-interactions-and-traditional-media" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/92034.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">283</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3627</span> Soil Remediation Technologies towards Green Remediation Strategies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20Petruzzelli">G. Petruzzelli</a>, <a href="https://publications.waset.org/abstracts/search?q=F.%20Pedron"> F. Pedron</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Grifoni"> M. Grifoni</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Barbafieri"> M. Barbafieri</a>, <a href="https://publications.waset.org/abstracts/search?q=I.%20Rosellini"> I. Rosellini</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Pezzarossa"> B. Pezzarossa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As a result of diverse industrial activities, pollution from numerous contaminant affects both groundwater and soils. Many contaminated sites have been discovered in industrialized countries and their remediation is a priority in environmental legislations. The aim of this paper is to provide the evolution of remediation from consolidated invasive technologies to environmental friendly green strategies. Many clean-up technologies have been used. Nowadays the technologies selection is no longer exclusively based on eliminating the source of pollution, but the aim of remediation includes also the recovery of soil quality. “Green remediation”, a strategy based on “soft technologies”, appears the key to tackle the issue of remediation of contaminated sites with the greatest attention to environmental quality, including the preservation of soil functionality. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bioremediation" title="bioremediation">bioremediation</a>, <a href="https://publications.waset.org/abstracts/search?q=Green%20Remediation" title=" Green Remediation"> Green Remediation</a>, <a href="https://publications.waset.org/abstracts/search?q=phytoremediation" title=" phytoremediation"> phytoremediation</a>, <a href="https://publications.waset.org/abstracts/search?q=remediation%20technologies" title=" remediation technologies"> remediation technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=soil" title=" soil"> soil</a> </p> <a href="https://publications.waset.org/abstracts/44439/soil-remediation-technologies-towards-green-remediation-strategies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44439.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">230</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3626</span> Utilizing IoT for Waste Collection: A Review of Technologies for Eco-Friendly Waste Management</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fatemehsadat%20Mousaviabarbekouh">Fatemehsadat Mousaviabarbekouh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Population growth and changing consumption patterns have led to waste management becoming a significant global challenge. With projections indicating that nearly 67% of the Earth's population will live in megacities by 2050, there is a pressing need for smart solutions to address citizens' demands. Waste collection, facilitated by the Internet of Things (IoT), offers an efficient and cost-effective approach. This study aims to review the utilization of IoT for waste collection and explore technologies that promote eco-friendly waste management. The research focuses on information and communication technologies (ICTs), including spatial, identification, acquisition, and data communication technologies. Additionally, the study examines various energy harvesting technologies to further reduce costs. The findings indicate that the application of these technologies can lead to significant cost savings, energy efficiency, and ultimately reshape the future of waste management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=waste%20collection" title="waste collection">waste collection</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20cities" title=" smart cities"> smart cities</a>, <a href="https://publications.waset.org/abstracts/search?q=eco-friendly" title=" eco-friendly"> eco-friendly</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20and%20communication%20technologies" title=" information and communication technologies"> information and communication technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20harvesting" title=" energy harvesting"> energy harvesting</a> </p> <a href="https://publications.waset.org/abstracts/167946/utilizing-iot-for-waste-collection-a-review-of-technologies-for-eco-friendly-waste-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/167946.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">111</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3625</span> Investigating the Use of Advanced Manufacturing Technologies in the Assembly Type Manufacturing Companies in Trinidad and Tobago</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nadine%20Sangster">Nadine Sangster</a>, <a href="https://publications.waset.org/abstracts/search?q=Akil%20James"> Akil James</a>, <a href="https://publications.waset.org/abstracts/search?q=Rondell%20Duke"> Rondell Duke</a>, <a href="https://publications.waset.org/abstracts/search?q=Aaron%20Ameerali"> Aaron Ameerali</a>, <a href="https://publications.waset.org/abstracts/search?q=Terrence%20Lalla"> Terrence Lalla</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The market place of the 21st century is evolving into one of merging national markets, fragmented consumer markets, and rapidly changing product technologies. The use of new technologies has become vital to the manufacturing industry for their survival and sustainability. This work focused on the assembly type industry in a small developing country and aimed at identifying the use of advanced manufacturing technologies and their impact on this sector of the manufacturing industry. It was found that some technologies were being used and that they had improved the effectiveness of those companies but there was still quite a bit of room for improvements. Some of the recommendations included benchmarking against international standards, the adoption of a “made in TT” campaign and the effective utilisation of the technologies to improve manufacturing effectiveness and thus improve competitive advantages and strategies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=advanced%20manufacturing%20technology" title="advanced manufacturing technology">advanced manufacturing technology</a>, <a href="https://publications.waset.org/abstracts/search?q=Trinidad%20and%20Tobago" title=" Trinidad and Tobago"> Trinidad and Tobago</a>, <a href="https://publications.waset.org/abstracts/search?q=manufacturing" title=" manufacturing"> manufacturing</a>, <a href="https://publications.waset.org/abstracts/search?q=industrial%20engineering" title=" industrial engineering"> industrial engineering</a> </p> <a href="https://publications.waset.org/abstracts/6597/investigating-the-use-of-advanced-manufacturing-technologies-in-the-assembly-type-manufacturing-companies-in-trinidad-and-tobago" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6597.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">493</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3624</span> Empowering Minority Students Through the use of Critical Educational Technologies: Latinos in the United States</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Oscar%20Guerra">Oscar Guerra</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Educational technologies have great potential as tools for student empowerment, particularly for members of a marginalized population such as immigrant Latino children in the American public education system. It is not merely a matter of access to the necessary technological devices; rather, it is development and implementation under a critical lens that may prompt a positive change. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=education" title="education">education</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20technologies" title=" critical technologies"> critical technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=minorities" title=" minorities"> minorities</a>, <a href="https://publications.waset.org/abstracts/search?q=higher%20education" title=" higher education"> higher education</a> </p> <a href="https://publications.waset.org/abstracts/6365/empowering-minority-students-through-the-use-of-critical-educational-technologies-latinos-in-the-united-states" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6365.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">323</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3623</span> High-Value Health System for All: Technologies for Promoting Health Education and Awareness</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20P.%20Sebastian">M. P. Sebastian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Health for all is considered as a sign of well-being and inclusive growth. New healthcare technologies are contributing to the quality of human lives by promoting health education and awareness, leading to the prevention, early diagnosis and treatment of the symptoms of diseases. Healthcare technologies have now migrated from the medical and institutionalized settings to the home and everyday life. This paper explores these new technologies and investigates how they contribute to health education and awareness, promoting the objective of high-value health system for all. The methodology used for the research is literature review. The paper also discusses the opportunities and challenges with futuristic healthcare technologies. The combined advances in genomics medicine, wearables and the IoT with enhanced data collection in electronic health record (EHR) systems, environmental sensors, and mobile device applications can contribute in a big way to high-value health system for all. The promise by these technologies includes reduced total cost of healthcare, reduced incidence of medical diagnosis errors, and reduced treatment variability. The major barriers to adoption include concerns with security, privacy, and integrity of healthcare data, regulation and compliance issues, service reliability, interoperability and portability of data, and user friendliness and convenience of these technologies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=big%20data" title="big data">big data</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare" title=" healthcare"> healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20communication%20technologies%20%28ICT%29" title=" information communication technologies (ICT)"> information communication technologies (ICT)</a>, <a href="https://publications.waset.org/abstracts/search?q=patients" title=" patients"> patients</a>, <a href="https://publications.waset.org/abstracts/search?q=technologies" title=" technologies"> technologies</a> </p> <a href="https://publications.waset.org/abstracts/71725/high-value-health-system-for-all-technologies-for-promoting-health-education-and-awareness" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71725.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">210</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3622</span> Quantum Technologies, the Practical Challenges to It, and Ideas to Build an Inclusive Quantum Platform, Shoonya Ecosystem (Zero-Point Energy)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Partha%20Pratim%20Kalita">Partha Pratim Kalita</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As sound can be converted to light, light can also be deduced to sound. There are technologies to convert light to sound, but there are not many technologies related to the field where sound can be converted to a distinct vibrational sequence of light. Like the laws under which the principles of sound work, there are principles for the light to become quantum in nature. Thus, as we move from sound to the subtler aspects of light, we are moving from 3D to 5D. Either we will be making technologies of 3D in today’s world, or we will be really interested in making technologies of the 5D, depends on our understanding of how quantum 5D works. Right now, the entire world is talking about quantum, which is about the nature and behavior of subatomic particles, which is 5D. In practice, they are using metals and machines based on atomic structures. If we talk of quantum without taking note of the technologies of 5D and beyond, we will only be reinterpreting relative theories in the name of quantum. This paper, therefore, will explore the possibilities of moving towards quantum in its real essence with the Shoonya ecosystem (zero-point energy). In this context, the author shall highlight certain working models developed by him, which are currently in discussion with the Indian government. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=quantum%20mechanics" title="quantum mechanics">quantum mechanics</a>, <a href="https://publications.waset.org/abstracts/search?q=quantum%20technologies" title=" quantum technologies"> quantum technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare" title=" healthcare"> healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=shoonya%20ecosystem" title=" shoonya ecosystem"> shoonya ecosystem</a>, <a href="https://publications.waset.org/abstracts/search?q=energy" title=" energy"> energy</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20consciousness" title=" human consciousness"> human consciousness</a> </p> <a href="https://publications.waset.org/abstracts/141841/quantum-technologies-the-practical-challenges-to-it-and-ideas-to-build-an-inclusive-quantum-platform-shoonya-ecosystem-zero-point-energy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141841.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">195</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3621</span> A Study of Key Technologies for the Realization of Smart Grid and Its Research Situation in Pakistan and Abroad</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arjmand%20Khaliq">Arjmand Khaliq</a>, <a href="https://publications.waset.org/abstracts/search?q=Pemra%20Sohaib"> Pemra Sohaib</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper smart grid technologies which converts conventional grid into smart grid has been discussed. Integration of advanced technologies including two way communication, advanced control system, sensors, smart metering system and other provide opportunity to make conventional grid a intelligent and automatic system which is named as smart grid. This paper gives the concept of smart grid and functional characteristics of smart grid technology, summed up the research progress in Pakistan and abroad and the significance of developing smart grid. Based on the analysis of the smart grid, smart grid technologies will result a reliable and energy efficient power system in the future. On the other hand smart grid technologies have been reviewed in this paper highlighting the key technologies of smart grid, and points out the problems and challenges in the realization of smart grid. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=energy" title="energy">energy</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20system%20reliability" title=" power system reliability"> power system reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20system%20monitoring%20and%20control" title=" power system monitoring and control"> power system monitoring and control</a>, <a href="https://publications.waset.org/abstracts/search?q=sensor" title=" sensor"> sensor</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20grid" title=" smart grid"> smart grid</a>, <a href="https://publications.waset.org/abstracts/search?q=two-way%20communication" title=" two-way communication "> two-way communication </a> </p> <a href="https://publications.waset.org/abstracts/40935/a-study-of-key-technologies-for-the-realization-of-smart-grid-and-its-research-situation-in-pakistan-and-abroad" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40935.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">396</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3620</span> Approach for an Integrative Technology Assessment Method Combining Product Design and Manufacturing Process</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20Schuh">G. Schuh</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Woelk"> S. Woelk</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20Schraknepper"> D. Schraknepper</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Such"> A. Such</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The systematic evaluation of manufacturing technologies with regard to the potential for product designing constitutes a major challenge. Until now, conventional evaluation methods primarily consider the costs of manufacturing technologies. Thus, the potential of manufacturing technologies for achieving additional product design features is not completely captured. To compensate this deficit, final evaluations of new technologies are mainly intuitive in practice. Therefore, an additional evaluation dimension is needed which takes the potential of manufacturing technologies for specific realizable product designs into account. In this paper, we present the approach of an evaluation method for selecting manufacturing technologies with regard to their potential for product designing. This research is done within the Fraunhofer innovation cluster »AdaM« (Adaptive Manufacturing) which targets the development of resource efficient and adaptive manufacturing technology processes for complex turbo machinery components. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=manufacturing" title="manufacturing">manufacturing</a>, <a href="https://publications.waset.org/abstracts/search?q=product%20design" title=" product design"> product design</a>, <a href="https://publications.waset.org/abstracts/search?q=production" title=" production"> production</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20assessment" title=" technology assessment"> technology assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20management" title=" technology management"> technology management</a> </p> <a href="https://publications.waset.org/abstracts/16517/approach-for-an-integrative-technology-assessment-method-combining-product-design-and-manufacturing-process" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16517.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">534</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3619</span> Digital Skepticism In A Legal Philosophical Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=dr.%20Bendes%20%C3%81kos">dr. Bendes Ákos</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital skepticism, a critical stance towards digital technology and its pervasive influence on society, presents significant challenges when analyzed from a legal philosophical perspective. This abstract aims to explore the intersection of digital skepticism and legal philosophy, emphasizing the implications for justice, rights, and the rule of law in the digital age. Digital skepticism arises from concerns about privacy, security, and the ethical implications of digital technology. It questions the extent to which digital advancements enhance or undermine fundamental human values. Legal philosophy, which interrogates the foundations and purposes of law, provides a framework for examining these concerns critically. One key area where digital skepticism and legal philosophy intersect is in the realm of privacy. Digital technologies, particularly data collection and surveillance mechanisms, pose substantial threats to individual privacy. Legal philosophers must grapple with questions about the limits of state power and the protection of personal autonomy. They must consider how traditional legal principles, such as the right to privacy, can be adapted or reinterpreted in light of new technological realities. Security is another critical concern. Digital skepticism highlights vulnerabilities in cybersecurity and the potential for malicious activities, such as hacking and cybercrime, to disrupt legal systems and societal order. Legal philosophy must address how laws can evolve to protect against these new forms of threats while balancing security with civil liberties. Ethics plays a central role in this discourse. Digital technologies raise ethical dilemmas, such as the development and use of artificial intelligence and machine learning algorithms that may perpetuate biases or make decisions without human oversight. Legal philosophers must evaluate the moral responsibilities of those who design and implement these technologies and consider the implications for justice and fairness. Furthermore, digital skepticism prompts a reevaluation of the concept of the rule of law. In an increasingly digital world, maintaining transparency, accountability, and fairness becomes more complex. Legal philosophers must explore how legal frameworks can ensure that digital technologies serve the public good and do not entrench power imbalances or erode democratic principles. Finally, the intersection of digital skepticism and legal philosophy has practical implications for policy-making. Legal scholars and practitioners must work collaboratively to develop regulations and guidelines that address the challenges posed by digital technology. This includes crafting laws that protect individual rights, ensure security, and promote ethical standards in technology development and deployment. In conclusion, digital skepticism provides a crucial lens for examining the impact of digital technology on law and society. A legal philosophical approach offers valuable insights into how legal systems can adapt to protect fundamental values in the digital age. By addressing privacy, security, ethics, and the rule of law, legal philosophers can help shape a future where digital advancements enhance, rather than undermine, justice and human dignity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=legal%20philosophy" title="legal philosophy">legal philosophy</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=ethics" title=" ethics"> ethics</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20skepticism" title=" digital skepticism"> digital skepticism</a> </p> <a href="https://publications.waset.org/abstracts/186430/digital-skepticism-in-a-legal-philosophical-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186430.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">43</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3618</span> Smartphones in the (Class) Room in Pandemic and Post-pandemic Times: a Study in an Ecological Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Junia%20Braga">Junia Braga</a>, <a href="https://publications.waset.org/abstracts/search?q=Antonio%20carlos%20Martins"> Antonio carlos Martins</a>, <a href="https://publications.waset.org/abstracts/search?q=Marcos%20Racilan"> Marcos Racilan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Drawing on the ecological approach, this paper reports a qualitative study that aims to understand how mobile technologies were integrated during the pandemic in the context of language teaching and the use of these technologies in post-pandemic times. Seventy-six teachers answered a questionnaire about their experiences. The findings show how the network with peers scaffolded this experience and played a crucial role in their appropriation of those technologies. They also suggest that this network may have contributed to the normalisation of digital technology use. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ecological%20perspective" title="ecological perspective">ecological perspective</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20teaching" title=" language teaching"> language teaching</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20technologies" title=" mobile technologies"> mobile technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=teacher%20education" title=" teacher education"> teacher education</a> </p> <a href="https://publications.waset.org/abstracts/152099/smartphones-in-the-class-room-in-pandemic-and-post-pandemic-times-a-study-in-an-ecological-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152099.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">108</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3617</span> The Environmental Impact of Wireless Technologies in Nigeria: An Overview of the IoT and 5G Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Powei%20Happiness%20Kerry">Powei Happiness Kerry</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introducing wireless technologies in Nigeria have improved the quality of lives of Nigerians, however, not everyone sees it in that light. The paper on the environmental impact of wireless technologies in Nigeria summarizes the scholarly views on the impact of wireless technologies on the environment, beaming its searchlight on 5G and internet of things in Nigeria while also exploring the theory of the Technology Acceptance Model (TAM). The study used a qualitative research method to gather important data from relevant sources and contextually draws inference from the derived data. The study concludes that the Federal Government of Nigeria, before agreeing to any latest development in the world of wireless technologies, should weigh the implications and deliberate extensively with all stalk holders putting into consideration the confirmation it will receive from the National Assembly. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title="Internet of Things">Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=radiofrequency" title=" radiofrequency"> radiofrequency</a>, <a href="https://publications.waset.org/abstracts/search?q=electromagnetic%20radiation" title=" electromagnetic radiation"> electromagnetic radiation</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20and%20communications%20technology" title=" information and communications technology"> information and communications technology</a>, <a href="https://publications.waset.org/abstracts/search?q=ICT" title=" ICT"> ICT</a>, <a href="https://publications.waset.org/abstracts/search?q=5G" title=" 5G "> 5G </a> </p> <a href="https://publications.waset.org/abstracts/127650/the-environmental-impact-of-wireless-technologies-in-nigeria-an-overview-of-the-iot-and-5g-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/127650.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hacking%20technologies&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hacking%20technologies&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hacking%20technologies&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hacking%20technologies&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hacking%20technologies&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hacking%20technologies&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hacking%20technologies&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hacking%20technologies&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hacking%20technologies&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hacking%20technologies&page=121">121</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hacking%20technologies&page=122">122</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hacking%20technologies&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>