Journal articles on the topic 'Web information fora'

To see the other types of publications on this topic, follow the link: Web information fora.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Web information fora.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zangani, Caroline, Fabrizio Schifano, Flavia Napoletano, Davide Arillotta, Liam Gilgar, Amira Guirguis, John M. Corkery, Orsola Gambini, and Alessandro Vento. "The e-Psychonauts’ ‘Spiced’ World; Assessment of the Synthetic Cannabinoids’ Information Available Online." Current Neuropharmacology 18, no. 10 (November 4, 2020): 966–1051. http://dx.doi.org/10.2174/1570159x18666200302125146.

Full text
Abstract:
Background: A wide range of novel psychoactive substances (NPS) is regularly searched and discussed online by web-based drug enthusiasts (i.e. the e-psychonauts). Among NPS, the range of synthetic cannabinoids (SC; ‘Spice’) currently represents a challenge for governments and clinicians. Methods: Using a web crawler (i.e. the NPS.Finder®), the present study aimed at assessing psychonauts’ fora/platforms to better understand the online mentions of SC. Results: The open-web crawling/navigating software identified here some 1,103 synthetic cannabinoids. Of these, 863 molecules were not listed in either the international or the European NPS databases. Conclusions: A web crawling approach helped here in identifying a large range of unknown SC likely to possess a misuse potential. Most of these novel/emerging molecules are still relatively unknown. This is a reason for concern; each of these analogues potentially presents different toxicodynamic profiles and there is a lack of docking, preclinical, and clinical observations. Strengthening multidisciplinary collaboration between clinicians and bioinformatics may prove useful in better assessing SC-associated public health risks.
APA, Harvard, Vancouver, ISO, and other styles
2

El Balkhi, Souleiman, Caroline Monchaud, Frédéric Herault, Hélène Géniaux, and Franck Saint-Marcoux. "Designer benzodiazepines’ pharmacological effects and potencies: How to find the information." Journal of Psychopharmacology 34, no. 9 (January 23, 2020): 1021–29. http://dx.doi.org/10.1177/0269881119901096.

Full text
Abstract:
Background: Scientific data on the psychopharmacological effects of new psychoactive substances (NPSs) are scarce. Web fora contain a wealth of information posted by users as trip reports (TRs), but the reliability of the reports remains questionable because of the nature of the used molecule and the potential for dose inaccuracies. We focused on the TRs of designer benzodiazepine (DBZD) users since their psychopharmacological effects are similar to prescription benzodiazepines (BZDs). Moreover, the impact of functional groups on the BZD rings with regards to the potency has been fairly/quite studied, allowing structural analysis. Methods: DBZDs offering more than 15 TRs with at least two accounts on experienced effects were included. Data were analyzed with the empirical phenomenological psychological method. Reported effects were analyzed and the pharmacological potencies of DBZDs were compared by calculating a ‘potency score’. Results: In total, 197 TRs for clonazolam, deschloroetizolam, diclazepam, etizolam, flubromazepam, flubromazolam, meclonazepam, metizolam, nifoxipam and pyrazolam were analyzed. Effects similar to prescription BZDs were reported for all the selected DBZDs. Pyrazolam was reported to be the most anxiolytic DBZD, flubromazolam the most hypnotic, etizolam the most euphoric and flubromazolam and clonazolam as the most amnesic DBZDs. Diclazepam and pyrazolam were not reported to induce euphoria. Flubromazepam, flubromazolam, clonazolam and meclonazepam were the most potent and deschloroetizolam, nifoxipam, metizolam and pyrazolam the least potent. The chemical structure of the different DBZDs and the functional groups on the BZD rings confirmed this ranking, except for nifoxipam. Conclusions: When information on NPSs obtained from Internet fora are abundant, it could be considered as an appreciable data source.
APA, Harvard, Vancouver, ISO, and other styles
3

Al-Imam, Ahmed, and Ban A. AbdulMajeed. "NBOMe Compounds: Systematic Review and Data Crunching of the Surface Web." Global Journal of Health Science 9, no. 11 (September 18, 2017): 126. http://dx.doi.org/10.5539/gjhs.v9n11p126.

Full text
Abstract:
BACKGROUND: NBOMe compounds, some of which commercially known as “N-Bomb” or “Smiles” signifying their potency, represent a uniquely potent group of phenethylamine derivatives. These have been recently used in the past decade for their powerful hallucinogenic properties to induce a “psychedelic trip”.METHODS: This study is an analytics of the surface web incorporating data from; the published literature, grey literature, drug fora, and trends’ databases. The study aims to review the pharmacodynamic effects of three most popular N-Bombs (25b, 25c, and 25i), analyse reported cases of intoxications and fatalities, and correlate these incidents with data retrieved from Google Trends.RESULTS: The potency and popularity of NBOMe compounds are tallied worldwide, 25b-NBOMe (least potent and least popular), 25i-NBOMe (most potent and most popular), while the 25c-NBOMe is in the middle. The popularity of each has been on the rise since 2011-2012, these compounds are most popular in the United States and the United Kingdom, while data from the developing world and the densely-populated India and China are either lacking or inadequate. The reported cases of intoxications and deaths were statistically proven to be correlated with the trends’ dataCONCLUSION: Inferential statistical information has associated cases of NBOMe(s)’ morbidities-mortalities with the public interest of surface web users in these hallucinogens. This study can serve a blueprint for an early warning system to be activated based on changes in trends’ data.
APA, Harvard, Vancouver, ISO, and other styles
4

França, Maira Nani, Angela Maria Grossi, and Ana R. Pacios. "Mídias sociais e bibliotecas na produção científica dos Estados Unidos." RDBCI Revista Digital de Biblioteconomia e Ciência da Informação 19 (February 25, 2021): 1–28. http://dx.doi.org/10.20396/rdbci.v19i00.8661286.

Full text
Abstract:
Introdução: Como organizações responsáveis por disponibilizarem informações precisas e atualizadas, as bibliotecas estão continuamente experimentando novos recursos tecnológicos e remodelando seus serviços para atender expectativas de seus usuários. No início do século XXI, as mídias sociais surgiram como mais uma oportunidade para eles se conectarem a esses espaços e acessarem seus recursos informacionais. Objetivo: Diante disso, este estudo busca identificar as características de investigações sobre mídias sociais e bibliotecas na produção científica estadunidense, de modo a acompanhar sua evolução e apontar tendências. Metodologia: Para tanto, optou-se pela pesquisa descritiva, de natureza qualiquantitativa, fundamentada na análise de domínio, proposta por Hjørland. O corpus é constituído por 69 artigos, publicados em periódicos científicos da Ciência da Informação dos EUA. Nesse sentido, constatou-se que a temática mídias sociais e bibliotecas tem sido discutida no contexto observado desde 2006, principalmente no âmbito das bibliotecas universitárias. Resultados: Identificou-se, ainda, uma possível comunidade epistêmica em formação. Por sua vez, o conceito Library 2.0 surgiu como uma das contribuições teóricas que influenciou bibliotecários e impactou serviços realizados no segmento. Além da Ciência da Informação, o conhecimento produzido sobre o interdomínio analisado circula por vários campos, como Comunicação Social, Educação, Ciência da Computação, Sociologia, dentre outros. Fora o termo Web 2.0, redes sociais é o mais usado por essa comunidade discursiva, embora mídias sociais se destaque como uma tendência. Há também uma predisposição para pesquisas de aplicações práticas, seguida de estudos teóricos. Conclusão: Foram identificados termos emergentes e representantes do interdomínio analisado ainda não contemplados nos principais tesauros utilizados por pesquisadores da área.
APA, Harvard, Vancouver, ISO, and other styles
5

Teixeira da Silva, Elaine. "O ensino de língua espanhola mediado pelas novas tecnologias: da sala de aula ao Facebook." Texto Livre: Linguagem e Tecnologia 7, no. 2 (October 7, 2014): 76–85. http://dx.doi.org/10.17851/1983-3652.7.2.76-85.

Full text
Abstract:
RESUMO: Este artigo tem por objetivo mostrar as possibilidades que as novas Tecnologias da Informação e Comunicação digitais, auxiliadas pela Web 2.0, oferecem ao ensino e aprendizagem de Língua Espanhola tanto dentro como fora da sala de aula. Utilizou-se a rede social Facebook, por ter grande número de usuários que nela passam significativa parte de seu tempo navegando, seja conversando com amigos, seja publicando seus comentários, seja curtindo fotos, páginas, participando de grupos e/ou comunidades. Essa rede social virtual também permite que o professor encontre ferramentas que o ajudarão na tarefa de ensinar, ao mesmo tempo em que permite ao aluno desenvolver autonomia para (re)aprender a pensar. Demonstra-se que o Facebook apresenta características da EaD e, portanto, pode ser considerado um instrumento adicional disponível para essa modalidade de ensino.PALAVRAS-CHAVE: Ensino de Língua Espanhola; TIC; Web 2.0; Facebook; EaD. ABSTRACT: This article aims to describe the possibilities provided by the use of new digital Information and Communication Technologies (ICT), aided by Web 2.0, on Spanish teaching both inside and outside classroom. We analyzed the social network Facebook because it has a large number of users who spend a significant amount of time on the site chatting with friends, posting comments, liking photos and profiles and participating in groups. This social network also provides teaching tools that will help students to develop their autonomy to (re) learn how to think. It is shown that Facebook presents EaD characteristics and therefore can be considered an additional tool on language teaching and education.KEYWORDS: Spanish Language Teaching; ICT; Web 2.0; Facebook; Distance Education.
APA, Harvard, Vancouver, ISO, and other styles
6

Thouez, Colleen. "Cities as Emergent International Actors in the Field of Migration." Global Governance: A Review of Multilateralism and International Organizations 26, no. 4 (November 23, 2020): 650–72. http://dx.doi.org/10.1163/19426720-02604007.

Full text
Abstract:
Abstract Cities are fast becoming actors on issues of transnational import. This is also true in the field of migration governance where their scope of responsibility has traditionally been perceived as entirely domestic in nature. As mayors act and advocate transnationally on migration, they are supported by a growing web of intercity networks spanning knowledge sharing, to lobbying, to operational work. In parallel, cities’ agency is rising as they begin to acquire access and influence in interstate deliberations and decision-making fora. Their active presence impacts policy instruments like the UN Global Compact for Migration and Global Compact on Refugees, and policy frameworks like the Global Forum on Migration and Development. In turn, as cities provide more information on challenges faced locally, we may expect more pragmatic approaches to migration. This article outlines this expansion of cities’ agency and what it could mean for international migration governance.
APA, Harvard, Vancouver, ISO, and other styles
7

Ackerman, Steven, Margaret Mooney, Stefanie Morrill, Joshua Morrill, Mary Thompson, and Lika K. Balenovich. "Libraries, massive open online courses and the importance of place." New Library World 117, no. 11/12 (November 14, 2016): 688–701. http://dx.doi.org/10.1108/nlw-08-2016-0054.

Full text
Abstract:
Purpose Web-based courses are a practical way to engage in meaningful discussions with learners from a diverse set of communities. By gathering online to learn about a topic, learners can form communities that transcend geographic and political boundaries. This paper aims to investigate a partnership between the University of Wisconsin-Madison (UW-Madison) and Wisconsin Library Services, which brought open access online learning to thousands of lifelong learners around the state of Wisconsin. “Changing Weather and Climate in the Great Lakes Region”, a massive open online course the UW-Madison launched in 2015, paired a regional focus with face-to-face discussions at 21 public libraries to deepen learners’ personal connections to the subject matter. Through strategic partnership, targeted course development and marketing of events, intimate local discussion sessions and statewide events provided fora in which Wisconsin residents would explore changing weather and climate with university faculty, staff and students. Design/methodology/approach This paper uses a case study approach and firsthand interview feedback from librarians, library staff and university faculty and staff who were leading the effort. Findings This paper explores the lessons learned and practical implications from the project and offers insight into libraries and universities looking to engage specific communities in non-credit online learning projects into the future. Originality/value This effort was a first of its kind partnership for the University and the State of Wisconsin.
APA, Harvard, Vancouver, ISO, and other styles
8

Miliano, Cristina, Giulia Margiani, Liana Fattore, and Maria De Luca. "Sales and Advertising Channels of New Psychoactive Substances (NPS): Internet, Social Networks, and Smartphone Apps." Brain Sciences 8, no. 7 (June 29, 2018): 123. http://dx.doi.org/10.3390/brainsci8070123.

Full text
Abstract:
In the last decade, the trend of drug consumption has completely changed, and several new psychoactive substances (NPS) have appeared on the drug market as legal alternatives to common drugs of abuse. Designed to reproduce the effects of illegal substances like cannabis, ecstasy, cocaine, or ketamine, NPS are only in part controlled by UN conventions and represent an emerging threat to global public health. The effects of NPS greatly differ from drug to drug and relatively scarce information is available at present about their pharmacology and potential toxic effects. Yet, compared to more traditional drugs, more dangerous short- and long-term effects have been associated with their use, and hospitalizations and fatal intoxications have also been reported after NPS use. In the era of cyberculture, the Internet acts as an ideal platform to promote and market these compounds, leading to a global phenomenon. Hidden by several aliases, these substances are sold across the web, and information about consumption is shared by online communities through drug fora, YouTube channels, social networks, and smartphone applications (apps). This review intends to provide an overview and analysis of social media that contribute to the popularity of NPS especially among young people. The possibility of using the same channels responsible for their growing diffusion to make users aware of the risks associated with NPS use is proposed.
APA, Harvard, Vancouver, ISO, and other styles
9

Muadhah, Eman Mohammed Bin. "A WEB based Information System for Pregnancy Women." International Journal of Psychosocial Rehabilitation 23, no. 4 (December 20, 2019): 1291–302. http://dx.doi.org/10.37200/ijpr/v23i4/pr190455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gutiérrez, Claudia. "Diseño web y arquitectura de información para sitios 2.0." Cuadernos.info, no. 22 (2008): 58–65. http://dx.doi.org/10.7764/cdi.22.90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Abdulhameed, Islam Sami, Intisar Al-Mejibli, and Jolan Rokan Naif. "Improving Security and Privacy for Health Information and Images." Webology 19, no. 1 (January 20, 2022): 2435–57. http://dx.doi.org/10.14704/web/v19i1/web19164.

Full text
Abstract:
Recently, the wireless devices and information technology have been evolved greatly and used in many sectors such as health and military. Employing these technologies in health system require to transmitting the patient’s information over the Internet. Hence, there is an urgent need to provide a high degree of security and privacy for patient information. This paper presents new encryption method to protect the information that are transmitted and stored in electronic health records (EHR) with maintaining its privacy. The proposal employs AES and ECC algorithms for security purpose and HMAC-SHA3 algorithm for privacy purpose. The suggested strategy was applied in different stages. ECC algorithm had been used to provides very fast key generation, and fast key agreement. A different key is generated for each session where both sender and receiver has the ability to generate the same private key. The obtained results show high level of security in both ends(Sender & receiver) as they have the role of encryption and decoding according to the query. The results were analyzed and tested according to the NIST test group and thirteen steps have been successfully passed.
APA, Harvard, Vancouver, ISO, and other styles
12

JÚNIOR, E. G. S. L., R. F. MAIA, F. M. F. LOBATO, and A. F. L. J. JUNIOR. "UMA SOLUÇÃO EM FUSÃO DE INFORMAÇÃO PARA GERENCIAMENTO DE RECLAMAÇÕES FEITAS NA WEB." Revista SODEBRAS 15, no. 176 (August 2020): 28–33. http://dx.doi.org/10.29367/issn.1809-3957.15.2020.176.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Kanjanakuha, N., C. Techawut, R. Sukhahuta, and P. Janecek. "VSDR: Visualization of Semantic Data Representation for Information Search over Semantic Web." International Journal of Machine Learning and Computing 7, no. 5 (October 2017): 105–9. http://dx.doi.org/10.18178/ijmlc.2017.7.5.629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ramazanovna, Gafurova Dilshoda. "Methodology for Evaluating the Management of Innovative Processes in the Field of Information and Communication Technologies." Webology 17, no. 1 (May 29, 2020): 365–76. http://dx.doi.org/10.14704/web/v17i1/web17010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

DeLuca, Lisa. "Where do FOIA responses live? Electronic Reading Rooms and web sources." College & Research Libraries News 80, no. 1 (January 3, 2019): 42. http://dx.doi.org/10.5860/crln.80.1.42.

Full text
Abstract:
The Freedom of Information Act, FOIA (5 U.S.C. 552), generally provides any person with the statutory right, enforceable in court, to obtain access to government information in executive branch agency records. FOIA does not apply to the judicial or legislative branches of the U.S. government. This right to access is limited when information is protected from disclosure by one of FOIA’s nine statutory exemptions and exclusions.The “Electronic Freedom of Information Act Amendments of 1996” required that agencies needed to make eligible records available electronically. As a result, there are dozens of FOIA Libraries and Electronic Reading Rooms that are repositories for responses to agency FOIA requests. These documents are also known as responsive documents. Documents are often posted by agencies with redactions to protect personal privacy, national security, and other FOIA exemptions and exclusions. It is important for researchers, journalists, and citizens to use the terms “FOIA Libraries” and “Electronic Reading Rooms” as part of their search terminology. This will ensure they can find documents that might not be findable through a regular Google search.
APA, Harvard, Vancouver, ISO, and other styles
16

Gascueña, C. M., and R. Guadalupe. "Prototipo para la creación de un Sistema de Información Geográfica WEB para la gestión de elementos universitarios localizados espacialmente." Informes de la Construcción 64, no. 526 (April 20, 2012): 221–32. http://dx.doi.org/10.3989/ic.11.039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Šilerová, E., and K. Lang. "Information systems – tool for changing our future ." Agricultural Economics (Zemědělská ekonomika) 52, No. 10 (February 17, 2012): 447–50. http://dx.doi.org/10.17221/5049-agricecon.

Full text
Abstract:
The article deals with the usage of the information systems and expansion of the portals. In the part “results”, there is elaborated a questionnaire applied on the agrarian sector. Today, the approach to the development of the information systems is oriented to the implementation of the portal solutions, which enables us a web access to the information and applications with an effective possibility of management and administration. Here, we are able to find typical user groups with quite specific information needs, who would find the specialized web portal very useful. This is because such kind of portal could offer them “everything at once and at one place”, it means all of their needs would be satisfied immediately and users do not have to waste time with an information search at other places. 
APA, Harvard, Vancouver, ISO, and other styles
18

Jaitner, Margarita. "Countering Threats." International Journal of Cyber Warfare and Terrorism 4, no. 2 (April 2014): 35–45. http://dx.doi.org/10.4018/ijcwt.2014040103.

Full text
Abstract:
The increased adoption of social media has presented security and law enforcement authorities with significant new challenges. For example, the Swedish Security Service (SÄPO) asserts that a large proportion of radicalization takes place in open fora online. Still, approaches to contain social media-driven challenges to security, particularly in democratic societies, remain little explored. Nonetheless, this type of knowledge may become relevant in European countries in the near future: Amongst other factors, the challenging economic situation has resulted in increased public discontent leading to emergence or manifestation of groups that seek to challenge the existing policies by almost any means. Use of social media multiplies the number of vectors that need law enforcement attention. First, a high level of social media adaption allows groups to reach and attract a wider audience. Unlike previously, many groups today consist of a large but very loosely connected network. This lack of cohesion can present a challenge for authorities, to identify emerging key actors and assess threat levels. Second, a high level of mobile web penetration has allowed groups to ad-hoc organize, amend plans and redirect physical activities. Third, the tool social media is as not exclusive to potential perpetrators of unlawful action, but is as well available to law enforcement authorities. Yet, efficient utilization of social media requires a deep understanding of its nature and a well-crafted, comprehensive approach. Acknowledging the broad functionality of social media, as well as its current status in the society, this article describes a model process for security authorities and law enforcement work with social media in general and security services work in particular. The process is cyclic and largely modular. It provides a set of goals and tasks for each stage of a potential event, rather than fixed activities. This allows authorities to adapt the process to individual legal frameworks and organization setups. The approach behind the process is holistic where social media is regarded as both source and destination of information. Ultimately, the process aims at efficiently and effectively mitigating the risk of virtual and physical violence.
APA, Harvard, Vancouver, ISO, and other styles
19

Nishanov, Akhram Khasanovich, Bakhtiyorjon Bakirovich Akbaraliev, Samandarov Batirbek Satimovich, Akhmedov Oybek Kamarbekovich, and Tajibaev Shukhrat Khudaybergenovich. "An Algorithm for Classification, Localization and Selection of Informative Features in the Space of Politypic Data." Webology 17, no. 1 (May 29, 2020): 341–64. http://dx.doi.org/10.14704/web/v17i1/web17009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Castanheira, Karol Natasha Lourenço, Daniel Bruno Fernandes Conrado, and Edson Vieira Bueno Júnior. "PORTAL CÂMARA VIRTUAL: a participação cidadã no legislativo de frutal." Revista Observatório 5, no. 4 (July 1, 2019): 127–47. http://dx.doi.org/10.20873/uft.2447-4266.2017v5n4p127.

Full text
Abstract:
Apesar das Tecnologias da Informação e Comunicação impulsionarem novas formas de sociabilidade e práticas sociais, as suas aplicações para a formação de uma cidadania interativa (MARTINEZ, 2001), capaz de dirimir as assimetrias entre governo e sociedade civil, ainda são restritivas e pouco exploradas. Como uma alternativa a encurtar essas distâncias e permitir ao cidadão espaço para a deliberação sobre os assuntos competentes aos trâmites legislativos da sua localidade, criou-se o portal Câmara Virtual, uma solução web com foco especial na produção de material de apoio para o entendimento e divulgação das proposições feitas pelos vereadores, em uma linguagem acessível para a população. Foi implementado um projeto piloto na cidade de Frutal (MG), que, no futuro, pode ser aplicado em outras localidades a fim de fomentar a cultura participativa, principalmente da região. Como metodologia, recorreu-se à pesquisa exploratória acerca de governos eletrônicos e de processos de engenharia de software baseados nos Métodos Ágeis, considerados adequados para lidar com adaptações frequentes de funcionalidade. A partir de um teste de usabilidade, percebeu-se uma deficiência no interesse da própria população em consumir e deliberar sobre a política local. Atento a isso, o projeto elencou como pauta prioritária o processo de divulgação e conscientização da população acerca do portal. Embora o portal esteja fora do ar no momento, por questões financeiras e técnicas da universidade, considera-se viável e importante a exploração de outros projetos a partir desta iniciativa. PALAVRAS-CHAVE: Câmara Virtual; Cidadania Interativa; Web; Frutal. ABSTRACT Although Information and Communication Technologies foster new forms of sociability and social practices, their applications for the formation of an interactive citizenship (MARTINEZ, 2001), which is capable of solving the asymmetries between the government and civil society, are still restrictive and little explored. As an alternative to shortening these distances and allowing the citizen space for deliberation on the matters competent to the legislative procedures of their locations, the Câmara Virtual portal was created. It is a web solution with a special focus on the production of support material for the understanding and dissemination of the proposals made by the council members, in a language accessible to the population. A pilot project was implemented in the city of Frutal, State of Minas Gerais (MG), which, in the future, may be applied to other locations in order to foster participatory culture, especially that of the region. As a methodology, we used exploratory research on e-government and software engineering processes based on Agile Methods, considered adequate to deal with frequent adaptations of functionality. From a usability test, we noticed a deficiency in the population’s own interest in consuming and deliberating on local politics. Considering this, the project listed as its priority agenda the process of dissemination and awareness of the population about the portal. Although the portal is currently off-line, due to financial and technical issues of the university, we consider this initiative feasible and important to foster the exploration of other projects. KEYWORDS: Câmara Virtual (Virtual City Council); Interactive Citizenship; Web; Frutal. RESUMEN A pesar de que las Tecnologías de la Información y Comunicación han impulsado nuevas formas de sociabilidad y prácticas sociales, sus aplicaciones para la formación de una ciudadanía interactiva (MARTINEZ, 2001), capaz de resolver las asimetrías entre el gobierno y la sociedad civil, todavía son restrictivas y poco explotadas. A los efectos de acortar estas distancias y ofrecerle al ciudadano un espacio para deliberar sobre los asuntos competentes a los trámites legislativos de su localidad, se ha creado el portal Cámara Virtual, una solución en la web enfocada especialmente en la producción de material de apoyo para la comprensión y divulgación de las propuestas realizadas por los concejales, en un lenguaje accesible a la población en general. Se ha implementado un proyecto piloto en la ciudad de Frutal (MG), que, en el futuro, podrá aplicarse en otras localidades para fomentar la cultura participativa, principalmente de la región. Como metodología, se ha recurrido a la investigación exploratoria sobre gobiernos electrónicos y procesos de ingeniería de software basados en Métodos Ágiles, considerados adecuados para lidiar con adaptaciones frecuentes de funcionalidad. A partir de una prueba de usabilidad, se ha notado una deficiencia notoria en el interés de la propia población en consumir y discutir sobre la política local. Tomando esto en cuenta, el proyecto definió como pauta prioritaria el proceso de divulgación y concientización de la población acerca del portal. Aunque el portal está fuera del aire por el momento, por temas financieros y técnicos de la universidad, se considera viable e importante la investigación de otros proyectos a partir de esta iniciativa. PALABRAS CLAVE: Cámara Virtual; Ciudadanía Interactiva; Web; Frutal.
APA, Harvard, Vancouver, ISO, and other styles
21

Nam, Tran Van, Nguyen Thi Nhu Quynh, Pham Duc Chung, Do Minh Tuan, Dinh Tran Ngoc Huy, and Tran Vu Nhat Ha. "Recommendations for Improvement of Laws and Regulations for Trademark Pricing Services in Vietnam." Webology 19, no. 1 (January 20, 2022): 1504–20. http://dx.doi.org/10.14704/web/v19i1/web19101.

Full text
Abstract:
In Vietnam, there have been many obstacles and difficulties in pricing for trademark transfer. Firstly, there have been the legal drawbacks including the incompatibility, conflicts among the legal instruments governing the same issues, Vietnamese provisions of law being not consistent with international practices and standards, the vagueness of the provisions of law in respect to pricing and bases for price in trademark transfer and so forth that have challenged the application of law. Vietnamese laws have been lack of the provisions to prevent and enforce against transfer price by means of trademark transfer. Besides, the weakness of database infrastructure has considerably affected on the estimation of price in trademark transfer in Vietnam. Furthermore, the shortage of valuation experts who specialize in trademark valuation has been also the big problem in consideration of price in trademark transfer. In order for successful commercialization of trademark, these encumbrances and challenges must be resolved as soon as possible. Research results show us that among vital challenges is quantifying brand asset that contributes to value of shareholders.
APA, Harvard, Vancouver, ISO, and other styles
22

Medeiros Neto, Benedito. "O MODELO DE POLÍTICA PARA SOCIEDADE DA INFORMAÇÃO DO BRASIL." Revista Observatório 3, no. 3 (May 1, 2017): 207. http://dx.doi.org/10.20873/uft.2447-4266.2017v3n3p207.

Full text
Abstract:
Os países em desenvolvimento se empemham em participar da Sociedade da Informação, por reconhecerem sua importância para o desenvolvimento econômico, social e político de uma nação. Este artigo analisou o Modelo Político do Programa Sociedade da Informação no Brasil - SocInfo, cujo percurso aconteceu nitidamente no início deste século. A implantação do Programa contou com avanços e retrocessos, como por exemplo, a baixa articulação política. Uma das justificativas é a efervescência provocada pela forte presença das TIC, ensejando o descobrimento dos novos modos de vida. Ficou demonstrado que o uso apropriado de informações é a peça chave para que um cidadão ser um agente ativo dentro da Sociedade da Informação. Confirma-se que a Internet no Século XXI passou a ser principal traço da sociedade contemporânea, e a Web termina por marcar a conquista dos direitos, quando o cidadão lhe é permitido acessar os serviços oferecidos pelo mercado, ou pelo governo, como por exemplo, educação, comunicação, saúde e segurança. Pode-se afirmar que são os empregos daqueles que estão mais ou menos à margem da sociedade pós-moderna a questão de fundo, pois os que ficarem de fora, de certa maneira, estarão dispostos alterar o curso do uso das TIC, e modular a inovação. Daqui para frente, possuir riquezas e serviços não será mais importante do que o sentimento de direitos mais coletivo, como a sustentabilidade do meio ambiente, que ganha corpo com o suporte das redes sociais. PALAVRAS-CHAVE: Impactos das TIC. Política pública. Tecnologia e trabalho. Desigualdade de acesso. Comunicação ubíqua. ABSTRACT Developing countries have committed to participate in the Information Society, recognizing its importance for the economical, social and political development of a nation. This article analyzed the Political Model of Brazilian Information Society Program - SocInfo, that had sharply initiated in the beginning of this century. The implementation of the Program had advances and setbacks, such as the low political articulation, being justified due to the effervescence provoked for the strong presence of ICT, leading the discovery of new ways of life. It is demonstrated that the appropriate information use is a key piece for citizens to be un active agent inside the Information Society. It is confirmed that internet in 21st Century turned to be the most important feature in the contemporary society, and the Web ends up making the rights achievement, when to citizen is permitted to access the offered services by the marked, government, such as education, health, communication, and safety. We can affirm that the matter of substance is the employment of the ones who are more or less on the margins of a Postmodern Society, once they stayed out of this process, in certain way, they are willing to change the course of ICT, and to modulate the innovation. From now on, having wealth and services will not be more important then the feelings of a more collective rights, such as sustainability of environment, that receives power with the support of social networks. KEY-WORDS: Impacts of ICT. Public policy. Technology and work. Inequality of access. Ubiquitous communication. RESUMEN Los países en desarrollo se empeñan en participar en la Sociedad de la Información, reconociendo su importancia para el desarrollo económico, social y político de una nación. En este artículo se analiza el modelo político del Programa Sociedad de la Información en Brasil - SocInfo cuyo el recorrido comenzó al principio de este siglo. La implementación del programa tuvo avances y retrocesos, como la baja articulación política. Una de las razones es la efervescencia causada por la fuerte presencia de las TIC, que permitió el descubrimiento de nuevas formas de vida. Se demostró que el uso adecuado de la información es la parte clave para que un ciudadano pueda ser un agente activo dentro de la Sociedad de la Información. Se confirma que la Internet en el siglo XXI se ha convertido en la principal característica de la sociedad contemporánea, y la web termina por indicar la realización de los derechos cuando se permite que el ciudadano para acceder a los servicios ofrecidos por el mercado o por el gobierno, tales como la educación, la comunicación, la salud y la seguridad. Se puede decir que son los puestos de trabajo de los que están más o menos en las márgenes de la sociedad postmoderna la cuestión de fondo, para los que se quedan fuera, en cierto modo, estarán dispuestos a cambiar el curso de la utilización de las TIC, y modular la innovación. De este punto adelante, poseer la riqueza y servicios no serán más importantes que el sentimiento de los derechos más colectivos, como la sostenibilidad del medio ambiente, que se materializa con el apoyo de las redes sociales. PALABRAS CLAVE: Impactos de las TIC. política pública. Tecnología y mano de obra. El acceso desigual. La comunicación ubicua.
APA, Harvard, Vancouver, ISO, and other styles
23

Britvin, Artur, Jawad Hammad Alrawashdeh, and Rostyslav Tkachuck. "Client-Server System for Parsing Data from Web Pages." Advances in Cyber-Physical Systems 7, no. 1 (June 27, 2022): 8–14. http://dx.doi.org/10.23939/acps2022.01.008.

Full text
Abstract:
An overview of the basic principles and approaches for extracting information and processing information from web pages has been conducted. A methodology for developing a client-server system based on a tool for automation of work in Selenium web browsers based on the analyzed information about data parsing has been created. A third-party API as a user interface to simplify and speed up system development has been used. User access without downloading additional software has been enabled. Data from web pages have been received and processed. Development has been based on this methodology of its own client-server system, which is used to parse and collect the information presented on web pages. Analysis of cloud technology services for further deployment of data collection system from web pages has been carried out. Assessment and analysis of the viability of the system in an autonomous state have been deployed in the cloud service during long-term operation.
APA, Harvard, Vancouver, ISO, and other styles
24

Yadao, Shivani, Dr Vinaya Babu A., Dr Midhunchakkaravarthy Janarthanan, and Dr Amiya Bhaumik. "A Semantically Enhanced Deep Neural Network Framework for Reputation System in Web Mining for Covid-19 Twitter Dataset." Webology 19, no. 1 (January 20, 2022): 3911–28. http://dx.doi.org/10.14704/web/v19i1/web19258.

Full text
Abstract:
With the web containing a huge amount of information, the extraction of application oriented understandable data has become easier with web mining. Web Mining is the area that is derived from data mining. Unlike data mining, web mining is used to extract interesting patterns from the information available on the web. When used with deep learning, the pattern recognition becomes much easier. Deep learning works in the same way, how a human brain works in terms of predicting the outcomes when a bulk of information is provided. It deals with mathematical models that recognize the patterns efficiently. The different types of web mining techniques, namely: web content mining (WCM), web structure mining (WSM) and web usage mining (WUM) persists. Researchers and economists around the globe are keen in knowing the impact of the pandemic on the society’s economic status; this work helps find the same using reputation system. As twitter is a hub of different opinions of public, we work with covid- 19 data set from twitter. A reputation system helps finding the socio economic status of the tweets regarding covid-19 dataset. This paper has proposed a framework in which the web mining is implemented using a semantic enhanced deep neural network technique for the reputation system.
APA, Harvard, Vancouver, ISO, and other styles
25

Edan, Salam Jabbar, Maryam Nadhim Rasoul, and Amir A. Aljarrah. "A Proposed Technique for Gray Image Colorization." Webology 19, no. 1 (January 20, 2022): 5099–106. http://dx.doi.org/10.14704/web/v19i1/web19343.

Full text
Abstract:
The colorization of the gray-scale image is the process of using color image (has a similar "mood") to add color to a grayscale image. In this paper, we proposed new approach for colorization gray-scale images depending on Singular Value Decomposition (SVD). We used SVD to add color to a grayscale image by determining the best pixel value in the reference image, based on comparing the first column values from the left singular vector matrix of 3x3 block and the pixel value in the center of block of the gray image with other corresponding values in the reference image. Finally, use the best match to transfer color from color image to gray-scale image. The results of the proposed colorization approach are good and plausible.
APA, Harvard, Vancouver, ISO, and other styles
26

Kim, Dubeom, Byung K. Kim, and Sung D. Hong. "Digital Twin for Immersive Exhibition Space Design." Webology 19, no. 1 (January 20, 2022): 4736–44. http://dx.doi.org/10.14704/web/v19i1/web19317.

Full text
Abstract:
This research aimed to find an efficient method of responding to the various variables that may arise during the process of designing and constructing an immersive exhibition space. A digital twin of the exhibition space was generated, a real-time rendering method was applied using a game engine, and the optical phenomena of several typical devices used in immersive exhibitions were simulated. The functions simulated in this study are applicable to the generated digital twin to predict how the various devices installed in the exhibition space would operate in the actual exhibition. Thereby, the possibility that the simulation results of the core elements that constitute the exhibition content be immediately applied to the operation of the various devices in the exhibition space in real-time could be explored. Not all the devices and functions used in an immersive exhibition were simulated, so the model used in the paper must be modified according to the circumstances of the applications. Through additional research, the method of responding to various installations and devices must be expanded.
APA, Harvard, Vancouver, ISO, and other styles
27

Jang, Kyung Bae, and Tae Ho Woo. "Analysis for Nuclear Cyber Security Incorporated with Industrial Research and Development (R&D) for Commercialized Nuclear Power Plants (NPPs)." Webology 19, no. 1 (January 20, 2022): 4370–83. http://dx.doi.org/10.14704/web/v19i1/web19287.

Full text
Abstract:
The multidisciplinary analysis for the training with research and development (R&D) regarding nuclear terrorism is studied. The cyber terror attack on nuclear power plants (NPPs) has provoked necessities of the education importance. The system dynamics (SD) is applied to this work, which was created in MIT around 1950s to promote the corporations of managers to enhance their understandings in industrial and political processes and the SD is nowadays being used throughout the public and private sector for policy analysis and design. SD simulations are shown as Records Retention, New R&D, New Education, Change Control, and Security Program Review. In these simulations, the continuous increasing values are shown in Records Retention. The New R&D and New Education are randomly generated values between 0.0 and 1.0. After the summations with these values, Change Control and Security Program Review are obtained. The effect of simulation is highest in the 10th month. Otherwise, it is minimized in 19th month. The higher values mean in the situation much more secure for the cyber terror in the nuclear industry. Internationally agreed training center could be established for the prevention and preparations for the potential terror cases. Regarding the other kinds of energy facility, the oil and coal powered plants have many susceptible situations. For example, the power line control system could be attacked by the networking computer system. Considering the common characteristics of the cyber terror on industry, the international attacking is possibly done due to the networking of the internet systems. The education program will be constructed and modified reflecting the situations of each nation.
APA, Harvard, Vancouver, ISO, and other styles
28

Alawsi, Wasan A., Hadab Khalid Obayes, and Saba M. Hussain. "A Novel Image Encryption Approach for IoT Applications." Webology 19, no. 1 (January 20, 2022): 1593–606. http://dx.doi.org/10.14704/web/v19i1/web19107.

Full text
Abstract:
The rapid developments observed in the field of Internet of Things (IoT), along with the recently increasing dependence on this technology in home and financial applications, have made it necessary to pay attention to the security of information sent through these IoT applications. The present article proposes a new encryption method for important messages that are sent via IoT applications. The proposed method provides four levels of security for the confidential message (in this case, an image). The first level is represented by applying the Conformal Mapping on the secret image. The second level is represented by encoding the resulting image from the first level using the encryption and decryption (RSA) method, while the third level is the use of Less Significant Bit (LSB) as the hiding method to hide the message inside the cover image. The compression of the stego image using GZIP is the last level of security. The peak signal-to-noise (PNSR) metric was used to measure the quality of the resulting image after the steganography process. The results appear promising and acceptable. Therefore, it is suggested that this method can be applied to send secret messages through applications of special importance across the IoT.
APA, Harvard, Vancouver, ISO, and other styles
29

Kusnadi, Adhi, Leondy ., Lianna Nathania, Ivransa Zuhdi Pane, Marlinda Vasty Overbeek, and Syarief Gerald Prasetya. "Image Processing for Improvement of Facial Keypoints Detector." Webology 19, no. 1 (January 20, 2022): 676–91. http://dx.doi.org/10.14704/web/v19i1/web19048.

Full text
Abstract:
This paper discusses the improvement of facial detection algorithms using the DCT algorithm and image processing. Face key point is very needed in the face recognition system. Some important factors that have effects to detect its result are noise and illuminations. These two factors can be overcome by eliminating some DCT coefficients, both high and low. However, after handling the problem, most likely the image quality will become decrease, which will adversely influence the performance of the feature detector algorithm. Therefore, it is very important to test the performance of the feature detector algorithm on images that are implemented noise and illumination handling and how to improve the quality again. This research implemented Discrete Cosine Transform (DCT), by eliminating the high and low coefficient because there is noise and illumination. However, it is not known at what coefficient level is the most effective, so testing in this study was carried out. Four deblurring algorithms are tested in this research, Blind Deconvolution, Wiener Filter Deconvolution, Lucy-Richardson Deconvolution, and Regularization Deconvolution. And tested the CLAHE algorithm to overcome the effect of removing low coefficient DCT. The best coefficient value to be removed at the DCT frequency is 0.75 with the best SURF algorithm, without the use of other algorithms. Also, the highest F-score is produced by the SURF detector at removing DCT low frequency in combination with the CLAHE algorithm. With the most ideal coefficient of 0.25.
APA, Harvard, Vancouver, ISO, and other styles
30

Sharma, Richa, and Shailendra Narayan Singh. "An Efficient Hybrid Classifier for Prognosing Cardiac Disease." Webology 19, no. 1 (January 20, 2022): 5028–46. http://dx.doi.org/10.14704/web/v19i1/web19338.

Full text
Abstract:
Machine learning (ML) is a powerful tool which empowers the practitioners for predictions upon any existing or real- time data. Here, the Machine first understands the valuable patterns from the dataset and then uses that information to make predictions on the unknown data. Further, classification is the commonly used machine learning approach (ML-Approach) to make such predictions. The objective of this work aims to design and development of an ensemble classifier for prognosing cardiovascular disease (heart disease). The developed classifier integrates Support Vector Machine (SVM), K–Nearest Neighbor (K-NN), and Weighted K-NN. The applicability of ensemble classifier is evaluated on the Cleveland Heart disease dataset. Some other classifiers such as Logistic Regression (LR), Sequential Minimal Optimization (SMO), K-NN+Weighted K-NN are also implemented on the same dataset to make the performance analysis. The results of this study depict the significant improvement in the Sensitivity and Specificity parameter.
APA, Harvard, Vancouver, ISO, and other styles
31

Lee, Sang Young. "Mobile Digital Forensics Framework for Smartphone User Analysis." Webology 19, no. 1 (January 20, 2022): 4335–51. http://dx.doi.org/10.14704/web/v19i1/web19285.

Full text
Abstract:
Blockchain-based digital forensics technology is an efficient way to prevent forgery/modulation of evidence including collecting and analyzing evidential data using the technology in compliance with smartphone forensics procedures after a smartphone is seized. Moreover, the use of large-capacity storage devices and various digital devices have become a realistic solution for its development of IT in situations where the existing digital forensics analysis methods are regarded as limitations. This paper analyzed user’s status on smartphone application and implemented a smartphone user analysis framework that may extract significant digital evidence in a digital forensic way based on a blockchain perspective. In this paper researched a system that may provide important information to digital forensic analysts through these frameworks. It is expected that the proposed system will be expanded by much more structured data and online unstructured data such as SNS reports.
APA, Harvard, Vancouver, ISO, and other styles
32

Hamd, Dr Basheer Alwan, Dr Parzheen Sheikh Muhammad Aziz, and Dr Nabeel Farhan Hamdan. "The Role of the Postgraduate Institute for Accounting and Financial Studies for Providing Graduates that Can Improve the Performance of the Board of Supreme Audit and Reduce Government Spending Costs for the Period 2004-2020." Webology 19, no. 1 (January 20, 2022): 3446–63. http://dx.doi.org/10.14704/web/v19i1/web19227.

Full text
Abstract:
Institutions, institutes and colleges of higher education are the first pioneers for the outputs of specialized medical, engineering and social cadres, including accounting cadres. The Higher Institute for Accounting and Financial Studies is the Department of Accounting Studies, the main tributary for the preparation of specialized professional cadres holding a legal accounting certificate and a certificate of costs and administration, which is the highest specialized professional accounting certificate in the field Auditing and costing. The importance of these specialized cadres comes from the two certificate holders to provide the Federal Financial Supervision Bureau with these specialized accounting professional cadres for the purpose of monitoring government spending and calculating costs in productive institutions and cost and benefit in service institutions in the public and private sectors to monitor the achievement of political and social objectives of government public spending and private spending. The research investigated the study of the problem of the low percentage of the number of graduates of the Accounting Studies Department in the Legal, Cost and Administrative Accounting sub-section compared to the number of bodies and employees, which reduces the ability of the Federal Financial Supervision Bureau to follow local and international auditing standards in the pressure of public expenditures to achieve the political and social objectives of the public budget. The research reached the most important recommendations: 1. Increasing the number of legal, cost and administrative accounting graduates in the Office of Financial and Federal Supervision. 2. Developing cost-benefit and cost-benefit studies in auditing government agencies and institutions in the public and private sectors in accordance with international standards.
APA, Harvard, Vancouver, ISO, and other styles
33

S, Thylashri, Manikandaprabu N, Jayakumar T, Vijayachitra S, and Kiruthiga G. "Effective Techniques for Pedestrian Detection in Smart Autonomous Vehicles." Webology 18, no. 05 (October 29, 2021): 1176–83. http://dx.doi.org/10.14704/web/v18si05/web18298.

Full text
Abstract:
Pedestrians are essential objects in computer vision. Pedestrian detection in images or videos plays an important role in many applications such as real-time monitoring, counting pedestrians at various events, detecting falls of the elderly, etc. It is formulated as a problem of the automatic identification and location of pedestrians in pictures or videos. In real images, the art of pedestrian detection is an important task for major applications such as video surveillance, autonomous driving systems, etc. Pedestrian detection is also an important feature of the autonomous vehicle driving system because it identifies pedestrians and minimizes accidents between vehicles and pedestrians. The research trend in the field of vehicle electronics and driving safety, vision-based pedestrian recognition technologies for smart vehicles have established themselves loudly or slowing down the vehicle. In general, the visual pedestrian detection progression capable of be busted down into three consecutive steps: pedestrian detection, pedestrian recognition, and pedestrian tracking. There is also visual pedestrian recognition in the vehicle. Finally, we study the challenges and evolution of research in the future.
APA, Harvard, Vancouver, ISO, and other styles
34

Almhanna, Mahdi S., and Firas Sabah Al-Turaihi. "Efficient Bandwidth Management for Load Balancing in Grid Computing." Webology 19, no. 1 (January 20, 2022): 218–28. http://dx.doi.org/10.14704/web/v19i1/web19017.

Full text
Abstract:
Incoming Information Technology (IT) services appear with cloud computing perspectives that provide users access to IT resources anytime, anywhere. These services should be good enough for the user with some advantages for the cloud service provider. To achieve this goal, you must face many challenges, load balancing is one of these challenges. The most convenient option for some functions does not mean that option is always a good choice to achieve the entire work all the time. Resource overload and bad traffic that can lead to time exhaustion should be avoided, this can be obtained through appropriate load balancing mechanisms. This paper offers a simple solution for choosing the preferred server to distribute functions based on minimum bandwidth consumption.
APA, Harvard, Vancouver, ISO, and other styles
35

AL-Oudat, Mohammad, Mohammad Azzeh, Hazem Qattous, Ahmad Altamimi, and Saleh Alomari. "Image Segmentation based Deep Learning for Biliary Tree Diagnosis." Webology 19, no. 1 (January 20, 2022): 1834–49. http://dx.doi.org/10.14704/web/v19i1/web19123.

Full text
Abstract:
Dilation of biliary tree can be an indicator of several diseases such as stones, tumors, benign strictures, and some cases cancer. This dilation can be due to many reasons such as gallstones, inflammation of the bile ducts, trauma, injury, severe liver damage. Automatic measurement of the biliary tree in magnetic resonance images (MRI) is helpful to assist hepatobiliary surgeons for minimally invasive surgery. In this paper, we proposed a model to segment biliary tree MRI images using a Fully Convolutional Neural (FCN) network. Based on the extracted area, seven features that include Entropy, standard deviation, RMS, kurtosis, skewness, Energy and maximum are computed. A database of images from King Hussein Medical Center (KHMC) is used in this work, containing 800 MRI images; 400 cases with normal biliary tree; and 400 images with dilated biliary tree labeled by surgeons. Once the features are extracted, four classifiers (Multi-Layer perceptron neural network, support vector machine, k-NN and decision tree) are applied to predict the status of patient in terms of biliary tree (normal or dilated). All classifiers show high accuracy in terms of Area Under Curve except support vector machine. The contributions of this work include introducing a fully convolutional network for biliary tree segmentation, additionally scientifically correlate the extracted features with the status of biliary tree (normal or dilated) that have not been previously investigated in the literature from MRI images for biliary tree status determinations.
APA, Harvard, Vancouver, ISO, and other styles
36

Rasheed, Ali Fathel, and Ahmed M. Alkababji. "A Novel Method for Signature Verification Using Deep Learning." Webology 19, no. 1 (January 20, 2022): 1561–72. http://dx.doi.org/10.14704/web/v19i1/web19104.

Full text
Abstract:
In general, signatures are used to authenticate an individual's authenticity. A solid way of certifying the legitimacy of a signature is still waiting for. The approach offered in this paper will allow people to identify signatures to determine whether a signature is forged or genuine. We have tried to automate the signature verification procedure using Convolutionary Neural Networks in our system. In computer applications such as picture registration and identification of objects, image classification and recovery, feature detectors and descriptors have a key role to play. This article discusses the performance analysis of numerous characteristic and descriptor detectors like SIFT, SURF, ORB, BRIEF, BRISK, FREAK. The number of matching points in areas overlapping between images and subjective stitching accuracy were analysed in terms of the number of features. The removal of varied symmetrical characteristics of the image enhances the possibility that different scene views can reliably satisfy the requirements. One experiment result show that the maximum number of detected key points is AGAST, FAST and BRISK detection, but the lesser number of extracted key points is STAR, AKAZE and MSER. In addition, each algorithm's speed is recorded.
APA, Harvard, Vancouver, ISO, and other styles
37

Kim, Dongkyun, and Yong-Hwan Kim. "A Network Federation Scheme for Inter-Domain SDN Communications." Webology 19, no. 1 (January 20, 2022): 4515–26. http://dx.doi.org/10.14704/web/v19i1/web19298.

Full text
Abstract:
Recently, a variety of the integrated service platforms demand the innovative network technologies such as software-defined networking (SDN). However, it is problematic and complicated to provide interconnectivity and reachability between inter-domain SDNs. Thus, this paper proposes a scheme for the inter-SDN federation and communication based on the abstracted network information exchange and automated peer network configuration for the integrated network services. The proposed scheme is implemented and verified over the de-facto wide-area SDN infrastructure (KREONET-S) which is deployed on Korea Research Environment Open Network (KREONET), a representative national research network in Korea. The proposed method is implemented and experimented based on the distributed and layer-2 oriented network architecture by using the abstracted message exchanges between local SDN controllers in order to provide low message overheads and high federation scalability. Our research work contributes to more efficient inter-SDN communications by means of the data modeling abstraction of the local SDN network information and the simplified interactions between individual controllers by the automated configurations through the specific application interfaces. The proposed scheme also contributes to the development of the integrated service platforms which are demanded to provide IoT, Big Data, AI, and cloud services in the tightly coupled manner over the inter-SDN domains.
APA, Harvard, Vancouver, ISO, and other styles
38

Byeon, Gongkyu, and Sunjin Yu. "Mobile AR Contents Production Technique for Long Distance Collaboration." Webology 19, no. 1 (January 20, 2022): 4491. http://dx.doi.org/10.14704/web/v19i1/web19296.

Full text
Abstract:
This study proposes that mobile AR users with different physical spaces can use one collaboration coordinate by synchronizing each other's coordinates. When each user uses mobile AR remote contents from a distance, it is difficult to maintain the same working environment depending on their physical environment. In order for physical spaces to maintain the same working environment in different situations, the coordinates of the virtual object must be matched to the direction of each client. To solve this problem, this paper proposes a coordinate synchronization technology using a shared coordinate flag. Through this technique, the interaction of all subsequent objects can be performed based on the shared coordinate system of the local client. The user installs a coordinate synchronization flag on a map formed based on each physical space. Through this flag, the location of the virtual object may be synchronized based on each client to perform collaboration. To verify the proposed technology, the mobile AR remote technology was implemented as a painting contents application. Three users synchronized the coordinate system together on three Android mobile devices to verify the feasibility of the technology proposed in this paper.
APA, Harvard, Vancouver, ISO, and other styles
39

Jung, In Hwan, Jae Moon Lee, and Kitae Hwang. "MQTT Protocol Extension for Real Time Location based Service." Webology 19, no. 1 (January 20, 2022): 4706–15. http://dx.doi.org/10.14704/web/v19i1/web19314.

Full text
Abstract:
This paper introduces an extension of the MQTT protocol to reduce communication overhead in real-time location-based service system where mobile MQTT clients move and change their administrative district location frequently. The MQTT protocol was extended to handle UNSUBSCRIBE and SUBSCRIBE processing with a single step and the LBS server was revised to handle the extended protocol. Instead of directly processing SUBSCRIBE and UNSUBSCRIBE, mobile clients need to send their GPS location to the LBS server. LBS Server communicate with MQTT Broker to using extended protocol on behalf of each client. In an environment where large number of clients frequently move, the extended MQTT protocol can drastically reduce the number of messages between MQTT Broker and clients. This is mainly because clients do not need to issue SUBSCRIBE and UNSUBSCRIBE request to MQTT Broker. In addition, in contrast to our previous study where clients receive new administrative area name after sending its GPS location to LBS server, in this research, using extended MQTT protocol, mobile clients do not need to receive new administrative name even though they move across different district areas and as a result, the number of message exchanges can also be reduced. The LBS system applying the extended MQTT protocol can be used as a real-time location-based information service for large-scale mobile devices, such as real-time pedestrian population and vehicle traffic analysis, and location-based message delivery.
APA, Harvard, Vancouver, ISO, and other styles
40

Byun, Siwoo. "A Sensor-aware Offloading Model for IoT Edge Computing." Webology 19, no. 1 (January 20, 2022): 4505–14. http://dx.doi.org/10.14704/web/v19i1/web19297.

Full text
Abstract:
In IoT sensor network environment, offloading is an important factor that affects all design objectives. Since massive amounts of data are collected every second to the gateway and so immediate processing is difficult, offloading is critical to quickly eliminate worthless data in advance. Similar sensor data are continuously generated except in abnormal situations such as sudden changes and failure events. Therefore, the amount of data processing and frequency of data transmission can be greatly reduced by classifying, filtering, and compressing the data. In addition, more meaningful IoT context can be analyzed by combining multiple sensor data, since the sensor values generated by each sensor has its own characteristics. The previous offloading techniques mainly focused on minimizing latency without using data context and data resizing. Therefore, a new filtering technique is required to enhance the offloading efficiency through precision control using sensor context patterns. This paper proposes a new sensor-aware context offloading model called SCOM to support efficient data filtering services for the edge-based IoT environment. The architecture of SCOM consists of three layers of sensor context, pattern context and transmission context. SCOM exploits context-aware stream pattern matching using general string matching based on slide window for sensor stream offloading. Experiments show that the performance gain of SCOM reaches to 14.8% with respect to the operation throughput. Since proposed data layering and pattern-based offloading scheme can improve the sensor data filtering performance in edge gateways, it can be used for IoT sensor monitoring applications.
APA, Harvard, Vancouver, ISO, and other styles
41

Orakwue, Stella Ifeoma, Hamza Mohammed Ridha Al-Khafaji, and Mays Zahid Chabuk. "IoT Based Smart Monitoring System for Efficient Poultry Farming." Webology 19, no. 1 (January 20, 2022): 4105–12. http://dx.doi.org/10.14704/web/v19i1/web19270.

Full text
Abstract:
This paper presents a smart system using Internet of things (IoT) for monitoring and controlling environmental conditions of poultry farming. Environmental parameters such as temperature, humidity, and air quality in a poultry house which are vital for the survival of poultry birds were monitored in order to adequately nurture poultry birds, reduce mortality rate and improve production. The system utilizes ESP32 microcontroller which has embedded Wi-Fi function, DHT11 temperature and humidity sensor, the PIR motion detector sensor, and MQ135 gas detector sensor. In addition, a buzzer was added to alert the farmer in the event of an intruder, while the integrated Wi-Fi unit would send a message to the farmer. Furthermore, the proposed system controls the brightness of a lamp inside the poultry house to either increase or reduce its temperature. This work which is a prototype, was implemented in a small poultry house. All the tests carried out illustrated that the designed system is sufficient and that the aim has been achieved.
APA, Harvard, Vancouver, ISO, and other styles
42

Lim, Mika. "Learner Model for AI Convergence Education in Technology Subject." Webology 19, no. 1 (January 20, 2022): 4352–69. http://dx.doi.org/10.14704/web/v19i1/web19286.

Full text
Abstract:
This study devises a model of learner for individualized learning of AI convergence in technological problem solving on technology subjects. It uses the Kolb's research method, which derives four learning styles by synthesizing the correlation between two types of information perception methods and two types of information processing methods. In this study, a creativity-execution model was devised in consideration of the ‘adaptation-innovation type’ of the creativity level and the ‘reflection-action type’ of the execution level. In addition, an interactive-attitude model was devised in which the 'independent-cooperative type' in the interaction dimension and the 'avoidance-participation type' in the attitude dimension act dynamically. Furthermore, a three-factor learner model was developed considering the dimensions of cognitive judgment, creativity, and execution. Also, a five-factor learner model for technological problem-solving was devised and presented, with all five dimensions of cognition-judgment, creativity, execution, interaction, and attitude of the technological problem-solving learning style as factors. The learner characteristics defined through the model design suggested the direction of AI convergence education considering individual characteristics of learners and provided basic data for it. In the future, it is suggested that specific individualized teaching and learning development research be conducted in AI convergence education, considering the characteristics of learners according to the learning style of technological problem-solving.
APA, Harvard, Vancouver, ISO, and other styles
43

Joshi, Ravindra V., and handrashekhar N. "PACS.i - A Complexity Theory based Framework for Battle Management." Webology 19, no. 1 (January 20, 2022): 3330–47. http://dx.doi.org/10.14704/web/v19i1/web19219.

Full text
Abstract:
A Platform based on Complexity Theory will consist of domain specific framework, dynamics, and systems. PACS.i is a framework through modern combat missions can be conveniently managed. PACS stand for Planner, Analyst, Commander and Soldier. While Planner and Analyst define pre and post battle view, soldier models frog’s view of combat in execution and commander bird’s view of same. These roles should handle Population, Spatial, Temporal and Causal dynamics (with their sub-classes). Also four types of Systems - regular, complex, chaos-based and stochastic can realize these architectures with varied benefits and losses. This paper explores the relation between roles, dynamics, and systems. PACS.i framework is result of synergy between all three of these.
APA, Harvard, Vancouver, ISO, and other styles
44

Seo, Aria, Yunsik Son, Yangsu Lee, and Junho Jeong. "Personal Donation System Using a Blockchain for Enhanced Transparency." Webology 19, no. 1 (January 20, 2022): 4761–77. http://dx.doi.org/10.14704/web/v19i1/web19319.

Full text
Abstract:
Driven by the development of information and communication technology (ICT) along with the social consciousness of civil societies, a cultural practice of donation using ICT resources is emerging. However, owing to problems with the trust and transparency of donation systems and public revelations of corruption on the part of some groups accepting donations, the donation participation rate is gradually decreasing. Because social welfare is considered a problem that cannot be solved only by the state, the operation of sound social welfare organizations that individuals can consistently trust and donate to is necessary. In this study, we propose a personal donation system designed to help ensure transparency in the operation of groups accepting donations and to encourage personal donations. To this end, we review the main factors in participant decisions to donate and make continuous donations. The proposed system and detailed module were designed based on a consortium blockchain and implemented by configuring the blockchain channel. We aim to provide a meaningful solution to important social problems using ICT and blockchain technology.
APA, Harvard, Vancouver, ISO, and other styles
45

Ju, Seung-Hwan, and Hee-Suk Seo. "Data Quality Test Method for Factory Energy Management System." Webology 19, no. 1 (January 20, 2022): 4420–27. http://dx.doi.org/10.14704/web/v19i1/web19291.

Full text
Abstract:
Because data is an important factor in the software industry, how to reliably test data is important. This is even more essential for building Industry 4.0 and smart industrial complexes. This study prepares ISO/IEC 25024-based test methods and guidelines and uses them for energy management at the industrial complex level. In order to provide services by collecting energy data from industrial complexes, it is necessary to verify data quality based on data reliability and compatibility of each plant. Data quality technology needs to conform to ISO TC184/SC4/WG13 (industrial data quality standard) based technology. The study defines the data quality evaluation matrix for the energy management system of industrial parks and factories. It defines five categories and maps detailed indicators to each. The category has three detailed items, which are evaluation items for core requirements, interoperability, and conformity to standards. Each data requirement category covers functionality and reliability, usability and efficiency, and portability as data requirements in the system. Core requirements for system operation such as data consistency are basic evaluation items, and interoperability, which is the semantic compatibility of data for integrated operation of multiple sites, is verified. In addition, data quality is evaluated by verifying standard conformance. Through this evaluation system, the requirements for linking the factory energy management system data with the industrial complex energy management system can be evaluated. This can be used to monitor data quality and develop improvement technologies by developing a master data quality management technology standard suitable for industrial sites.
APA, Harvard, Vancouver, ISO, and other styles
46

Jung, Yujin, Eunsun Choi, and Namje Park. "Educational Aids for Teaching Hacking Principles to Strengthen Computational Thinking Skills to Elementary." Webology 19, no. 1 (January 20, 2022): 4527–36. http://dx.doi.org/10.14704/web/v19i1/web19299.

Full text
Abstract:
Modern society is changing into an era of digital transformation with the development of advanced information and communication technology (ICT) and information systems. Various information is digitized and stored, and the value of information is increasing. As the value of information increases, hackers' techniques to take advantage of unfair profits using them are subdivided and advanced, causing unexpected big problems in society. In particular, it was noted that cases in which elementary school students, a digital native generation, are often reported to be involved in crimes. Therefore, based on the basic concepts and principles of computing for elementary school students, we developed a learning teaching tool that can provide hacking-related education in an interesting way using gamification based on computing thinking ability that can efficiently solve unexpected problems. The learning goal was set for the development of educational aids by analyzing the cyber-attack process, and the game material was selected by applying the information security hacking principle learning to Samuel Livingstone's simulation game model. Then, we set game figures, roles, resources, external factors, and goals of the educational game and designed game boards, mission papers, and worksheets. We also established the game rules using the game data designed. Lastly, we found complementary points with security experts and education experts to supplement the learning aid while running the game. This paper helped learners to understand the security equipment applied in the network environment. In the end, we developed a teaching aid that can strengthen learners' computational thinking and understand hacking principles. This game ensures infinite scalability of the challenge by having students perform three missions per challenge. The educational aids proposed in this paper are limited at the primary level that elementary school students can understand. However, it can be designed and extended to infer interleaving by combining transaction and lock functions.
APA, Harvard, Vancouver, ISO, and other styles
47

K., Sivasankari Krishnakumar, and Dr Uma Maheswari K.M. "A Comprehensive Review on Data Anonymization Techniques for Social Networks." Webology 19, no. 1 (January 20, 2022): 380–405. http://dx.doi.org/10.14704/web/v19i1/web19028.

Full text
Abstract:
Many individuals all around the world have been using social media to communicate information. Numerous companies utilize social data mining to deduce many fascinating facts from social data modeled as a complicated network structure. However, releasing social data has a direct and indirect impact on the privacy of many of its users. Recently, several anonymization techniques have been created to safeguard Personal information about users and their relationships in social media. This study presents a comprehensive survey on various data anonymization strategies for social network data and analysis their advantages and disadvantages. It also addresses the major research concerns surrounding the efficiency of anonymization approaches.
APA, Harvard, Vancouver, ISO, and other styles
48

A, Bharathi, Siva C, Suguna Angamuthu, and Thangamani M. "Multi Objective Concerned Network Coding Technique for Optimal Data Transmission." Webology 18, no. 05 (October 29, 2021): 1191–203. http://dx.doi.org/10.14704/web/v18si05/web18300.

Full text
Abstract:
The Internet of Things (IoT) seems to developed in the real-world scenario due to increased utilization of sensor driven technologies. There are various research works has been proposed earlier for the network coding to ensure the reliable data transmission. However, existing research techniques doesn’t focus on the reliable route path selection which might affect the rate of data transmission. These issues are focused in the proposed research method by introducing the method namely Multi-Objective concerned Network Coding Technique (MO-NCT). In this work initially multicast tree construction is performed using Particle Swarm Optimization method. The main goal of this research work is ensuring the reliable and successful data transmission. Here the optimal network nodes will be chosen for constructing the multi cast tree. The multiple objectives considered in this work for the selection of the nodes are residual energy, remaining bandwidth level and throughput of nodes. To ensure the reliable data transmission even with the presence of larger coverage area, this work attempted to select the backup forwarder nodes which will act as intermediate hop relay nodes. The overall analysis of the research work is done in the NS2 simulation environment from which it is proved that the proposed method MO-MRP tends to achieve the optimal data transmission rate.
APA, Harvard, Vancouver, ISO, and other styles
49

Mohammed, Mohammed Ali, Dr Karim Q. Hussein, and Dr Mustafa Dhiaa Al-Hassani. "Real Time Mobile Cloud Audio Reading System for Blind Persons." Webology 19, no. 1 (January 20, 2022): 311–23. http://dx.doi.org/10.14704/web/v19i1/web19024.

Full text
Abstract:
According to the World Health Organization there are approximately 285 million blind people around the world. These people are faced challenges when reading a book. This paper aims to design and implementation new real time mobile cloud audio reading system for blind persons. The proposed methodology consists of following steps: In Client Side, firstly, capture image of text by camera. Secondly, check the page localization. Thirdly, send image to server. In Cloud Side (Server Side), firstly, apply the modify EAST algorithm on received image to text detection. Secondly, apply OCR algorithm to extract text from image. Thirdly, apply post-processing step to correct the in corrected text. Finally, return text to client side to speak it using text-to-speech algorithm.
APA, Harvard, Vancouver, ISO, and other styles
50

Burhan, Iman Mohammed, Rahman Nahi Abid, Mustafa Abdalkhudhur Jasim, and Refed Adnan Jaleel. "Improved Methods for Mammogram Breast Cancer Using by Denoising Filtering." Webology 19, no. 1 (January 20, 2022): 1481–92. http://dx.doi.org/10.14704/web/v19i1/web19099.

Full text
Abstract:
In diagnosing breast cancer, digital mammograms have shown their effectiveness as an appropriate and simple instrument in the early detection of tumor. Mammograms offer helpful cancer symptoms information, including microcalcifications and masses, which are not easy to distinguish because there are some flaws with the mammography images, including low contrast, high noise, fuzzy and blur. Additionally, there is a major problem with mammography because of a high density of the breast which conceals As a result of the mammographic image, it is more difficult to distinguish between the tissues with normal dense and the tissues that are cancerous. Therefore, mammography images need to be improved in order to accurately identify and diagnose breast cancer. The most typical goals of images enhancement are to remove noise and improve image details. With the aid of mammography image processing techniques, a special data including distinctive characteristics of tumors can be differentiated, this could help distinguish between malignant and benign cancers. This work focuses on removing noise of pepper & salt, improving image to increase the quality of mammography and enhance early detection of breast cancer. A specific approach is employed to do this, including of two phases of image denoising base filtration and one phase to improve contrast. The stages of filtering contain the using of wiener and median filters. The contrast enhancement stage utilizes (CLAHE) which is an abbreviation for contrast limited adaptive histogram equalization. Evaluating the performance is done via contrast histogram for the CLAHE and MSE & PSNF for the filters. The results demonstrate that the work technique is doing better when put to comparison with other approaches in term of low MSE (1.1645) and high PSNR (47.4750). The technique will be assessed with additional kinds of noise for future work.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography