首页 > 最新文献

Int. J. Interact. Mob. Technol.最新文献

英文 中文
CNN-Based Smart Parking System 基于cnn的智能停车系统
Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.37033
Hiba A. Abu-Alsaad
Due to the increased number of cars, outdoor parking is one of the critical problems. Moreover, the management of the parking system is also considered a difficult task. Humans, on the other hand, were acclimated to efficiently parking their automobiles by providing them with the precise location of parking in advance of their arrival. As a result of human inefficiency, it was unsuccessful and ultimately increased the compliance cost. As a result of the development of the notion of the Internet of Things. A lot of systems were installed regarding smart parking systems that are decreasing the cost but also contain a huge impact on the reduction of emissions from cars. While it is possible to integrate Internet of Things (IoT) devices into automobiles, such an approach will necessitates the deployment of additional infrastructure, which will raise the cost, and also it is not feasible within current infrastructure configurations. Then there's the fact that CCTV technology is widely available and also small enough to fit into any parking area without being noticeable. In this paper, Convolution Neural Network (CNN) based smart parking system is designed and implemented. The CNN is used to detect vacant and occupied parking spaces through CCTV cameras and provide feedback to the passengers. Furthermore, the proposed approach is using CNR and PKLot datasets for ensuring the effectiveness of the model. This was developed to solve the issues of time, cost, and accuracy with the existing systems. As a result, the proposed model provides excellent results in terms of accuracy. Moreover, it is cost-effective and saves time.
由于汽车数量的增加,室外停车成为关键问题之一。此外,停车系统的管理也被认为是一项艰巨的任务。另一方面,人类已经习惯了通过在车辆到达之前提供准确的停车位置来有效地停车。由于人为的低效率,它没有成功,并最终增加了合规成本。由于物联网概念的发展。许多系统都安装了智能停车系统,这些系统正在降低成本,但也对减少汽车排放产生了巨大影响。虽然可以将物联网(IoT)设备集成到汽车中,但这种方法需要部署额外的基础设施,这将增加成本,而且在现有的基础设施配置下也不可行。还有一个事实是,闭路电视技术随处可见,而且足够小,可以放在任何停车场都不会被发现。本文设计并实现了基于卷积神经网络(CNN)的智能停车系统。CNN通过闭路电视摄像头检测空置和占用的停车位,并向乘客提供反馈。此外,该方法使用CNR和PKLot数据集来确保模型的有效性。这是为了解决现有系统的时间、成本和准确性问题而开发的。结果表明,所提出的模型在精度方面提供了很好的结果。此外,它是具有成本效益和节省时间。
{"title":"CNN-Based Smart Parking System","authors":"Hiba A. Abu-Alsaad","doi":"10.3991/ijim.v17i11.37033","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.37033","url":null,"abstract":"Due to the increased number of cars, outdoor parking is one of the critical problems. Moreover, the management of the parking system is also considered a difficult task. Humans, on the other hand, were acclimated to efficiently parking their automobiles by providing them with the precise location of parking in advance of their arrival. As a result of human inefficiency, it was unsuccessful and ultimately increased the compliance cost. As a result of the development of the notion of the Internet of Things. A lot of systems were installed regarding smart parking systems that are decreasing the cost but also contain a huge impact on the reduction of emissions from cars. While it is possible to integrate Internet of Things (IoT) devices into automobiles, such an approach will necessitates the deployment of additional infrastructure, which will raise the cost, and also it is not feasible within current infrastructure configurations. Then there's the fact that CCTV technology is widely available and also small enough to fit into any parking area without being noticeable. In this paper, Convolution Neural Network (CNN) based smart parking system is designed and implemented. The CNN is used to detect vacant and occupied parking spaces through CCTV cameras and provide feedback to the passengers. Furthermore, the proposed approach is using CNR and PKLot datasets for ensuring the effectiveness of the model. This was developed to solve the issues of time, cost, and accuracy with the existing systems. As a result, the proposed model provides excellent results in terms of accuracy. Moreover, it is cost-effective and saves time.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85928910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Impact of a Collaborative IoT Framework for Smart Cities and Environmental Monitoring 协作物联网框架对智慧城市和环境监测的影响
Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.36277
Suzan Husein, Darun Mudhafar, Saravana Balaji B
this paper proposed an architecture that is SenSquare, it is capable to carry various data sources which is coming through an open IOT program and throng sensor campaign, as well as displaying an integrated access for the utilizers. The goals of smart cities are to progress the quality of citizen in life through leveraging details on process of the urban scales that removed by diverse data source gathered at city broad deployment. In this paper checking the whole surfaces of a compound system, traversing through problems of various quality, this paper contract with the diverse data ranking, the Mobile Crowd sensing (MCS) administration to data ecological, acting information and integration, the services of IOT installation and redeployments. This study explained the suggested resolutions in cooperation with a functions and current ways to sitting unlock defies. Eventually, it pretends the ability of the SenSquare by jointly the desktop client and mobile.
本文提出了SenSquare架构,它能够通过开放的物联网程序和大量传感器活动携带各种数据源,并为使用者显示集成访问。智慧城市的目标是通过利用城市规模过程的细节来提高公民的生活质量,这些细节是在城市广泛部署中收集的各种数据源所消除的。本文通过对一个复合系统的整体表面进行检查,遍历各种质量问题,从数据的多样性排序、移动人群感知(MCS)管理到数据生态、行为信息和集成、物联网服务的安装和重新部署等方面进行研究。本研究解释了建议的解决方案与功能和当前的坐姿解锁方式的合作。最终,它通过联合桌面客户端和移动端来模拟SenSquare的能力。
{"title":"The Impact of a Collaborative IoT Framework for Smart Cities and Environmental Monitoring","authors":"Suzan Husein, Darun Mudhafar, Saravana Balaji B","doi":"10.3991/ijim.v17i11.36277","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.36277","url":null,"abstract":"this paper proposed an architecture that is SenSquare, it is capable to carry various data sources which is coming through an open IOT program and throng sensor campaign, as well as displaying an integrated access for the utilizers. The goals of smart cities are to progress the quality of citizen in life through leveraging details on process of the urban scales that removed by diverse data source gathered at city broad deployment. In this paper checking the whole surfaces of a compound system, traversing through problems of various quality, this paper contract with the diverse data ranking, the Mobile Crowd sensing (MCS) administration to data ecological, acting information and integration, the services of IOT installation and redeployments. This study explained the suggested resolutions in cooperation with a functions and current ways to sitting unlock defies. Eventually, it pretends the ability of the SenSquare by jointly the desktop client and mobile.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86259780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study for SDN Security Based on Machine Learning 基于机器学习的SDN安全比较研究
Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.39065
K. Alheeti, Abdulkareem Alzahrani, Maha Alamri, Aythem Khairi Kareem, Duaa Al-Dosary
In the past decade, traditional networks have been utilized to transfer data between more than one node. The primary problem related to formal networks is their stable essence, which makes them incapable of meeting the requirements of nodes recently inserted into the network. Thus, formal networks are substituted by a Software Defined Network (SDN). The latter can be utilized to construct a structure for intensive data applications like big data. In this paper, a comparative investigation of Deep Neural Network (DNN) and Machine Learning (ML) techniques that uses various feature selection techniques is undertaken. The ML techniques employed in this approach are decision tree (DT), Naïve Bayes (NB), Support Vector Machine (SVM). The proposed approach is tested experimentally and evaluated using an available NSL–KDD dataset. This dataset includes 41 features and 148,517 samples. To evaluate the techniques, several estimation measurements are calculated. The results prove that DT is the most accurate and effective approach. Furthermore, the evaluation measurements indicate the efficacy of the presented approach compared to earlier studies.
在过去的十年中,传统网络被用来在多个节点之间传输数据。形式网络的主要问题是其稳定性,这使得它们不能满足新插入网络的节点的需求。因此,正式网络被软件定义网络(SDN)所取代。后者可以用来构建大数据等密集数据应用的结构。本文对使用各种特征选择技术的深度神经网络(DNN)和机器学习(ML)技术进行了比较研究。在这种方法中使用的ML技术是决策树(DT), Naïve贝叶斯(NB),支持向量机(SVM)。所提出的方法在实验中进行了测试,并使用可用的NSL-KDD数据集进行了评估。该数据集包括41个特征和148,517个样本。为了评估这些技术,计算了几个估计测量值。结果表明,DT是最准确、最有效的方法。此外,与早期研究相比,评估测量表明所提出的方法的有效性。
{"title":"A Comparative Study for SDN Security Based on Machine Learning","authors":"K. Alheeti, Abdulkareem Alzahrani, Maha Alamri, Aythem Khairi Kareem, Duaa Al-Dosary","doi":"10.3991/ijim.v17i11.39065","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.39065","url":null,"abstract":"In the past decade, traditional networks have been utilized to transfer data between more than one node. The primary problem related to formal networks is their stable essence, which makes them incapable of meeting the requirements of nodes recently inserted into the network. Thus, formal networks are substituted by a Software Defined Network (SDN). The latter can be utilized to construct a structure for intensive data applications like big data. In this paper, a comparative investigation of Deep Neural Network (DNN) and Machine Learning (ML) techniques that uses various feature selection techniques is undertaken. The ML techniques employed in this approach are decision tree (DT), Naïve Bayes (NB), Support Vector Machine (SVM). The proposed approach is tested experimentally and evaluated using an available NSL–KDD dataset. This dataset includes 41 features and 148,517 samples. To evaluate the techniques, several estimation measurements are calculated. The results prove that DT is the most accurate and effective approach. Furthermore, the evaluation measurements indicate the efficacy of the presented approach compared to earlier studies.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80704038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game-Based Learning and Gamification Technologies in the Preparation of Future Mathematics Teachers 游戏学习与游戏化技术在未来数学教师培养中的应用
Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.39227
P. Vankúš
Our paper advocates the preparation of future mathematics teachers for the use of game-based learning and gamification technologies. For this purpose, we created a university course that is dedicated to familiarizing the students with basic concepts of game-based learning and gamification and to conveying direct experience with their use. We support the concept and activities in this course by the positive results of the research on the opinions of 115 students. We hope that the positive results and our description of the course will be an inspiration for the broader incorporation of game-based learning and gamification technologies into the training of future mathematics teachers. Limitations of our research are the research sample, we investigated students’ reactions only at the author’s home university. Therefore, in the future, the research could be done with a broader sample and studying more in detail the students’ beliefs related to game-based learning and gamification before and after the course to get a better view of their development.
我们的论文提倡培养未来的数学教师使用基于游戏的学习和游戏化技术。为此,我们创建了一门大学课程,致力于让学生熟悉基于游戏的学习和游戏化的基本概念,并通过它们的使用传达直接经验。我们通过对115名学生的意见调查得出的积极结果来支持这门课程的概念和活动。我们希望积极的结果和我们对课程的描述将对更广泛地将基于游戏的学习和游戏化技术纳入未来数学教师的培训起到启发作用。我们研究的局限性在于研究样本,我们只调查了作者所在大学的学生的反应。因此,在未来的研究中,可以在更大的样本范围内,更详细地研究学生在课程前后对游戏学习和游戏化的相关信念,以更好地了解他们的发展情况。
{"title":"Game-Based Learning and Gamification Technologies in the Preparation of Future Mathematics Teachers","authors":"P. Vankúš","doi":"10.3991/ijim.v17i11.39227","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.39227","url":null,"abstract":"Our paper advocates the preparation of future mathematics teachers for the use of game-based learning and gamification technologies. For this purpose, we created a university course that is dedicated to familiarizing the students with basic concepts of game-based learning and gamification and to conveying direct experience with their use. We support the concept and activities in this course by the positive results of the research on the opinions of 115 students. We hope that the positive results and our description of the course will be an inspiration for the broader incorporation of game-based learning and gamification technologies into the training of future mathematics teachers. Limitations of our research are the research sample, we investigated students’ reactions only at the author’s home university. Therefore, in the future, the research could be done with a broader sample and studying more in detail the students’ beliefs related to game-based learning and gamification before and after the course to get a better view of their development.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75128848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Intrusion Detection System Based on SVM 基于SVM的云入侵检测系统
Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.39063
K. Alheeti, Ali Azawii Abdul lateef, Abdulkareem Alzahrani, Azhar Imran, Duaa Al-Dosary
The demand for better intrusion detection and prevention solutions has elevated due to the current global uptick in hacking and computer network attacks. The Intrusion Detection System (IDS) is essential for spotting network attacks and anomalies, which have increased in size and scope. A detection system has become an effective security method that monitors and investigates security in cloud computing. However, several existing methods have faced issues such as low classification accuracy, high false positive rates, and low true positive rates. To solve these problems, a detection system based on Support Vector Machine (SVM) is proposed in this paper. In this method, the SVM classifier is utilized for network data classification into normal and abnormal behaviors. The Cloud Intrusion Detection Dataset is used to test the effectiveness of the suggested system. The experimental results show which the suggested system can detect abnormal behaviors with high accuracy.
由于目前全球黑客和计算机网络攻击的上升,对更好的入侵检测和预防解决方案的需求已经上升。入侵检测系统(IDS)是发现规模和范围不断扩大的网络攻击和异常的必要手段。检测系统已成为云计算安全监测和调查的有效安全手段。然而,现有的几种方法存在分类准确率低、假阳性率高、真阳性率低等问题。为了解决这些问题,本文提出了一种基于支持向量机的检测系统。该方法利用支持向量机分类器将网络数据分类为正常行为和异常行为。利用云入侵检测数据集对建议系统的有效性进行了测试。实验结果表明,该系统能够以较高的准确率检测出异常行为。
{"title":"Cloud Intrusion Detection System Based on SVM","authors":"K. Alheeti, Ali Azawii Abdul lateef, Abdulkareem Alzahrani, Azhar Imran, Duaa Al-Dosary","doi":"10.3991/ijim.v17i11.39063","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.39063","url":null,"abstract":"The demand for better intrusion detection and prevention solutions has elevated due to the current global uptick in hacking and computer network attacks. The Intrusion Detection System (IDS) is essential for spotting network attacks and anomalies, which have increased in size and scope. A detection system has become an effective security method that monitors and investigates security in cloud computing. However, several existing methods have faced issues such as low classification accuracy, high false positive rates, and low true positive rates. To solve these problems, a detection system based on Support Vector Machine (SVM) is proposed in this paper. In this method, the SVM classifier is utilized for network data classification into normal and abnormal behaviors. The Cloud Intrusion Detection Dataset is used to test the effectiveness of the suggested system. The experimental results show which the suggested system can detect abnormal behaviors with high accuracy.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85645152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposed Hybrid Secured Method to Protect Against DDOS in n Vehicular Adhoc Network (VANET) 车载自组网(VANET)中DDOS防护的混合安全方法
Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.38907
Tuka Kareem Jebur
Security and safety are critical concerns in Vehicular Adhoc Networks.  vulnerable to Distributed Denial of Service (DDoS) attacks, which occur when multiple vehicles carry out various tasks. This cause disrupts the normal functioning of legitimate routes. In this work, the Hybrid PSO-BAT Optimization Algorithm (HBPSO) Algorithm based on modified chaos -cellular neural network (Chaos - CNN) approaches has been proposed to overcome DDoS attacks. The suggest approaches consists of three-part which are hybrid optimization search algorithm to enhance the route from source to destination, chaos theory module is used to detect the abnormal nodes, then on Modified Chaotic CNN (MCCN) employed to prevent a malicious node from sending data to the destination by determining node that consumer more resource, packets lose or the victim could reset the path between the attacker and itself. CICIDS dataset has been used to test and evaluate the performance of the proposed approach based on the criteria of accuracy, packet loss, and jitter.  The Chaos - CNN approached results to outperform similar models of the related work and the approach protects the VANETs with high accuracy of 0.8736, specificity of 0.9959, TPR of 0.9561, and FPR of 0.78, Detection rate 0.9561.
安全和安全是车辆自组织网络的关键问题。容易受到分布式拒绝服务(DDoS)攻击,这种攻击发生在多个车辆执行各种任务时。导致正常路由功能中断。本文提出了一种基于改进混沌细胞神经网络(chaos - CNN)方法的混合PSO-BAT优化算法(HBPSO)来克服DDoS攻击。该方法由混合优化搜索算法增强源到目的路由,混沌理论模块检测异常节点,改进混沌CNN (Modified Chaotic CNN, MCCN)通过确定消耗资源较多、数据包丢失或受害者可以重置攻击者与自身之间路径的节点来阻止恶意节点向目的发送数据三部分组成。CICIDS数据集已被用于测试和评估基于准确性、丢包和抖动标准的所提出方法的性能。Chaos - CNN处理的结果优于同类模型的相关工作,该方法保护VANETs的准确率为0.8736,特异性为0.9959,TPR为0.9561,FPR为0.78,检出率为0.9561。
{"title":"Proposed Hybrid Secured Method to Protect Against DDOS in n Vehicular Adhoc Network (VANET)","authors":"Tuka Kareem Jebur","doi":"10.3991/ijim.v17i11.38907","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.38907","url":null,"abstract":"Security and safety are critical concerns in Vehicular Adhoc Networks.  vulnerable to Distributed Denial of Service (DDoS) attacks, which occur when multiple vehicles carry out various tasks. This cause disrupts the normal functioning of legitimate routes. In this work, the Hybrid PSO-BAT Optimization Algorithm (HBPSO) Algorithm based on modified chaos -cellular neural network (Chaos - CNN) approaches has been proposed to overcome DDoS attacks. The suggest approaches consists of three-part which are hybrid optimization search algorithm to enhance the route from source to destination, chaos theory module is used to detect the abnormal nodes, then on Modified Chaotic CNN (MCCN) employed to prevent a malicious node from sending data to the destination by determining node that consumer more resource, packets lose or the victim could reset the path between the attacker and itself. CICIDS dataset has been used to test and evaluate the performance of the proposed approach based on the criteria of accuracy, packet loss, and jitter.  The Chaos - CNN approached results to outperform similar models of the related work and the approach protects the VANETs with high accuracy of 0.8736, specificity of 0.9959, TPR of 0.9561, and FPR of 0.78, Detection rate 0.9561.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90785700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile E-Portfolios on Google Sites: A Tool for Enhancing Project-Based Learning 谷歌网站上的移动电子作品集:一个增强基于项目的学习的工具
Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.39673
Thi Kim Anh Tran, Truong Nguyen Ngoc
Project-based learning is a student-centered approach to learning that emphasizes hands-on experiences, collaboration, and real-world problem-solving. The process of evaluating students' learning outcomes in a learning project, however, faces numerous challenges. This study investigates the potential of mobile e-portfolios on the Google Sites platform as a means of enhancing project-based learning in the field of physics education. The study utilized a quasi-experimental design with two groups: an experimental group and a control group. The data collected from the pre-test and post-test were analyzed using a t-test to determine the significance of the difference in the mean scores between the experimental group and the control group. The questionnaire data were analyzed using descriptive statistics to identify patterns and trends in student feedback. The results show that the use of mobile e-portfolios on the Google Sites platform significantly enhanced student interest and learning outcomes. After the pedagogical experiment, the experimental group's test scores (7.92) were higher than the control group's (5.22). According to the findings of the survey questionnaire given to the experimental group, the majority of students indicated that using mobile e-portfolios boosted their involvement and motivation to learning, as well as their ability to plan and present their project work. In conclusion, the findings of this study suggest that mobile e-portfolios on Google Sites can be an effective tool for enhancing project-based learning.
基于项目的学习是一种以学生为中心的学习方法,强调实践经验、协作和解决现实问题。然而,评估学生在学习项目中的学习成果的过程面临着许多挑战。本研究探讨了谷歌Sites平台上的移动电子作品集作为加强物理教育领域基于项目的学习的一种手段的潜力。本研究采用准实验设计,分为两组:实验组和对照组。对前测和后测收集的数据进行t检验,以确定实验组和对照组的平均得分差异的显著性。使用描述性统计对问卷数据进行分析,以确定学生反馈的模式和趋势。结果表明,在谷歌Sites平台上使用移动电子作品集显著提高了学生的兴趣和学习成果。教学实验结束后,实验组的考试成绩(7.92)高于对照组(5.22)。根据发给实验组的调查问卷的结果,大多数学生表示,使用移动电子档案提高了他们的参与度和学习动机,以及他们计划和展示项目工作的能力。总之,本研究的结果表明,谷歌网站上的移动电子作品集可以成为加强基于项目的学习的有效工具。
{"title":"Mobile E-Portfolios on Google Sites: A Tool for Enhancing Project-Based Learning","authors":"Thi Kim Anh Tran, Truong Nguyen Ngoc","doi":"10.3991/ijim.v17i11.39673","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.39673","url":null,"abstract":"Project-based learning is a student-centered approach to learning that emphasizes hands-on experiences, collaboration, and real-world problem-solving. The process of evaluating students' learning outcomes in a learning project, however, faces numerous challenges. This study investigates the potential of mobile e-portfolios on the Google Sites platform as a means of enhancing project-based learning in the field of physics education. The study utilized a quasi-experimental design with two groups: an experimental group and a control group. The data collected from the pre-test and post-test were analyzed using a t-test to determine the significance of the difference in the mean scores between the experimental group and the control group. The questionnaire data were analyzed using descriptive statistics to identify patterns and trends in student feedback. The results show that the use of mobile e-portfolios on the Google Sites platform significantly enhanced student interest and learning outcomes. After the pedagogical experiment, the experimental group's test scores (7.92) were higher than the control group's (5.22). According to the findings of the survey questionnaire given to the experimental group, the majority of students indicated that using mobile e-portfolios boosted their involvement and motivation to learning, as well as their ability to plan and present their project work. In conclusion, the findings of this study suggest that mobile e-portfolios on Google Sites can be an effective tool for enhancing project-based learning.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88812623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
"Bring-Your-Own-Device" (BYOD) and Productivity: Instrument Development and Validation “自带设备”(BYOD)和生产力:仪器开发和验证
Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.38139
Amira Idayu Mohd Shukry, M. Rosman, Nik Nur Izzati Nik Rosli, Noor Rahmawati Alias, N. Razlan, N. Alimin
Bring-Your-Own-Device (BYOD) is a phenomenon whereby an employee brings their own computing devices to work with them and use them in addition to or instead of company-supplied devices. BYOD helps organization to cut cost and improve the utilization of organizational resources. However, the impacts and phenomenon of BYOD is still unknown and scarcely discuss within the body of knowledge; warrant for further exploration of the topic. Therefore, the purpose of this paper is to develop and validate an instrument to measure BYOD and its productivity. The research went through various empirical stages. Based on other studies, a list of predictors and dependent variables was adopted. Based on the variables that have been identified, a pilot instrument was created in the second step. Third, an expert review process was used to validate the instrument. The face validity and reliability investigation of possible respondents was completed. As a result, a reliable instrument with six variables and thirty items was created to measures BYOD and productivity in the context of universities students in Malaysia.
BYOD (bring - your - own device)是一种现象,员工带着自己的计算设备上班,并在公司提供的设备之外使用它们。BYOD有助于组织降低成本,提高组织资源的利用率。然而,BYOD的影响和现象仍然是未知的,在知识体系内几乎没有讨论;有理由进一步探讨这个问题。因此,本文的目的是开发和验证一种测量BYOD及其生产力的仪器。研究经历了不同的实证阶段。在其他研究的基础上,采用了一系列预测因子和因变量。根据已确定的变量,在第二步中创建了一个试点仪器。第三,采用专家评审流程对仪器进行验证。完成了可能被调查者的面效度和信度调查。因此,一个具有六个变量和30个项目的可靠工具被创建来衡量马来西亚大学生的BYOD和生产力。
{"title":"\"Bring-Your-Own-Device\" (BYOD) and Productivity: Instrument Development and Validation","authors":"Amira Idayu Mohd Shukry, M. Rosman, Nik Nur Izzati Nik Rosli, Noor Rahmawati Alias, N. Razlan, N. Alimin","doi":"10.3991/ijim.v17i11.38139","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.38139","url":null,"abstract":"Bring-Your-Own-Device (BYOD) is a phenomenon whereby an employee brings their own computing devices to work with them and use them in addition to or instead of company-supplied devices. BYOD helps organization to cut cost and improve the utilization of organizational resources. However, the impacts and phenomenon of BYOD is still unknown and scarcely discuss within the body of knowledge; warrant for further exploration of the topic. Therefore, the purpose of this paper is to develop and validate an instrument to measure BYOD and its productivity. The research went through various empirical stages. Based on other studies, a list of predictors and dependent variables was adopted. Based on the variables that have been identified, a pilot instrument was created in the second step. Third, an expert review process was used to validate the instrument. The face validity and reliability investigation of possible respondents was completed. As a result, a reliable instrument with six variables and thirty items was created to measures BYOD and productivity in the context of universities students in Malaysia.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89752516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Recommender System Model for Service Placement in Wireless Networks 无线网络中服务放置的安全推荐系统模型
Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.37369
Luan Gashi, A. Luma, Halil Snopçe, Ylber Januzaj
Edge or fog computing are being used to reduce latency between end devices and traditional cloud computing. The latest developments that have improved the hardware aspects of wireless sensors and mobile networks, gave the opportunity for other enhancements if such technologies are integrated between them. Regarding this enhanced heterogeneous environment, the approach of placing services needs to reconsider the security aspects. We have developed a baseline method of a solution which fulfills the cybersecurity requirements converging with the proposed multi-tier integrated model, that enhances the K-means algorithm with added processing steps supplying the criteria of the CIA triad.
边缘或雾计算被用来减少终端设备和传统云计算之间的延迟。最新的发展改进了无线传感器和移动网络的硬件方面,如果这些技术在它们之间集成,就有机会进行其他增强。对于这种增强的异构环境,放置服务的方法需要重新考虑安全性方面。我们开发了一种解决方案的基线方法,该方法满足了与所提议的多层集成模型收敛的网络安全要求,该模型通过增加处理步骤来增强K-means算法,从而提供了CIA三位一体的标准。
{"title":"A Secure Recommender System Model for Service Placement in Wireless Networks","authors":"Luan Gashi, A. Luma, Halil Snopçe, Ylber Januzaj","doi":"10.3991/ijim.v17i11.37369","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.37369","url":null,"abstract":"Edge or fog computing are being used to reduce latency between end devices and traditional cloud computing. The latest developments that have improved the hardware aspects of wireless sensors and mobile networks, gave the opportunity for other enhancements if such technologies are integrated between them. Regarding this enhanced heterogeneous environment, the approach of placing services needs to reconsider the security aspects. We have developed a baseline method of a solution which fulfills the cybersecurity requirements converging with the proposed multi-tier integrated model, that enhances the K-means algorithm with added processing steps supplying the criteria of the CIA triad.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80552511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile and Web-Based Security Guard Patrolling, Monitoring and Reporting System to Maintain Safe and Secure Environment at Premises 移动和基于网络的保安巡逻、监控和报告系统,以维持楼宇的安全环境
Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.35483
V. R. Gannapathy, Vigneswaran Narayanamurthy, S. Subramaniam, A. F. T. Ibrahim, Ida Syafiza M. Isa, S. Rajkumar
The guard tour system helps companies and organizations to monitor their security activities such as protecting people, buildings, assets, or equipment. According to the existing system, the patrolling at each checkpoint is being executed by using RFID-based digital data loggers that records and save all patrolling entries internally. The data will be transferred manually by the guard once the patrolling is completed. In some cases, when there is a problem with the device, the system unable to retrieve the patrolling data that has been already stored in the device. In addition, the current system also not be able to track the guard’s movement, patrolling information, and incidents in real-time basis. The developed Security Guard Patrolling, Monitoring and Reporting (eSmartGuard) system is able incorporates many unique and intelligent technologies such as NFC, GPS and IoT to records and save the patrolling data automatically on the cloud/server in real-time basis. An important value-added feature of the system is real-time incidents notification that able to notify any risk of the guards instantly to the in-charged security officer. Furthermore, through the eSmartGuard, the patrolling information such as time, date, GPS coordinate, guard ID can be monitored and retrieved remotely via proposed Mobile Apps and Web at a convenient time. The eSmartGuard patrolling system is proposed to improve the safety of the people and assets by assisting the security guards to perform their patrolling duty efficiently.
保安巡视系统帮助公司和组织监控他们的安全活动,如保护人员、建筑物、资产或设备。根据现有的系统,每个检查站的巡逻都是通过使用基于rfid的数字数据记录器来执行的,该记录器记录并保存所有巡逻条目。一旦巡逻完毕,数据将由保安手动传送。在某些情况下,当设备出现问题时,系统无法检索已经存储在设备中的巡逻数据。此外,目前的系统还不能实时跟踪警卫的活动、巡逻信息和事件。开发的保安巡逻、监控和报告(eSmartGuard)系统能够融合许多独特的智能技术,如NFC、GPS和物联网,实时自动记录和保存巡逻数据在云/服务器上。该系统的一个重要增值功能是实时事件通知,能够将警卫的任何风险立即通知给负责的保安人员。此外,通过eSmartGuard,可以通过建议的移动应用程序和网络远程监控和检索巡逻信息,如时间、日期、GPS坐标、警卫ID。smartguard巡逻系统是为了帮助保安人员高效地执行巡逻任务,提高人员和资产的安全。
{"title":"Mobile and Web-Based Security Guard Patrolling, Monitoring and Reporting System to Maintain Safe and Secure Environment at Premises","authors":"V. R. Gannapathy, Vigneswaran Narayanamurthy, S. Subramaniam, A. F. T. Ibrahim, Ida Syafiza M. Isa, S. Rajkumar","doi":"10.3991/ijim.v17i11.35483","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.35483","url":null,"abstract":"The guard tour system helps companies and organizations to monitor their security activities such as protecting people, buildings, assets, or equipment. According to the existing system, the patrolling at each checkpoint is being executed by using RFID-based digital data loggers that records and save all patrolling entries internally. The data will be transferred manually by the guard once the patrolling is completed. In some cases, when there is a problem with the device, the system unable to retrieve the patrolling data that has been already stored in the device. In addition, the current system also not be able to track the guard’s movement, patrolling information, and incidents in real-time basis. The developed Security Guard Patrolling, Monitoring and Reporting (eSmartGuard) system is able incorporates many unique and intelligent technologies such as NFC, GPS and IoT to records and save the patrolling data automatically on the cloud/server in real-time basis. An important value-added feature of the system is real-time incidents notification that able to notify any risk of the guards instantly to the in-charged security officer. Furthermore, through the eSmartGuard, the patrolling information such as time, date, GPS coordinate, guard ID can be monitored and retrieved remotely via proposed Mobile Apps and Web at a convenient time. The eSmartGuard patrolling system is proposed to improve the safety of the people and assets by assisting the security guards to perform their patrolling duty efficiently.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73147570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Interact. Mob. Technol.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1