As the Museums and Interactivity-oriented Science Centres of the world are reinventing themselves more as creators of culture than just conservators of culture, they are getting keener to explore how various data retrieval and HCI technologies can symbiotically fit into the methods of museology. Museums, since their advent, have used spatial and temporal scanning to present stories that evolve either over time or through space. But these have always remained static timelines that are limited in content, lack interactive exploration, and miss any metaphorical interaction that allows one to have the experience of physically scanning a space or a timeline. In this work, we report how a new HCI technology was used to retrieve all-sky map data and present the multi-wavelength view of the universe to the uninitiated visitor having no skill to navigate through sophisticated astronomy instruments. We describe an intuitive interface that takes no training and learning for the visitors to operate. They can start analyzing multi-wavelength all-sky maps of our galaxy in no time – exactly as professional astronomers do. Stressing upon the ease of usability, reliability of data, and fail-safe operation, visitors are given access to additional layers of information that can be presented in myriad options chosen by the visitor. They can compare thin slices of galactic images in various wavelengths and look for essential radiation sources that are otherwise not apparent in the naked eye or simple optical observations. The public exhibit was based on duplex data communication between a computer and a PIC microprocessor controller using IEEE 1284 parallel port in ECP mode thus making it a generic technology for interactive displays.
{"title":"A New Mode of Interaction to Explore All-sky Maps in Multiple Wavelengths","authors":"Krishnendu Choudhury, Manash Bagchi","doi":"10.46328/ijonest.178","DOIUrl":"https://doi.org/10.46328/ijonest.178","url":null,"abstract":"As the Museums and Interactivity-oriented Science Centres of the world are reinventing themselves more as creators of culture than just conservators of culture, they are getting keener to explore how various data retrieval and HCI technologies can symbiotically fit into the methods of museology. Museums, since their advent, have used spatial and temporal scanning to present stories that evolve either over time or through space. But these have always remained static timelines that are limited in content, lack interactive exploration, and miss any metaphorical interaction that allows one to have the experience of physically scanning a space or a timeline. In this work, we report how a new HCI technology was used to retrieve all-sky map data and present the multi-wavelength view of the universe to the uninitiated visitor having no skill to navigate through sophisticated astronomy instruments. We describe an intuitive interface that takes no training and learning for the visitors to operate. They can start analyzing multi-wavelength all-sky maps of our galaxy in no time – exactly as professional astronomers do. Stressing upon the ease of usability, reliability of data, and fail-safe operation, visitors are given access to additional layers of information that can be presented in myriad options chosen by the visitor. They can compare thin slices of galactic images in various wavelengths and look for essential radiation sources that are otherwise not apparent in the naked eye or simple optical observations. The public exhibit was based on duplex data communication between a computer and a PIC microprocessor controller using IEEE 1284 parallel port in ECP mode thus making it a generic technology for interactive displays.","PeriodicalId":14471,"journal":{"name":"International Journal on Advanced Science, Engineering and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135825525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In 2019 the Mid-Atlantic Athletic Conference signed an agreement with ESPN to stream men’s and women’s basketball games on its affiliated streaming service. In response, the Manhattan College Communication Department developed a Sports Media Production program to teach undergraduate students the basics of live sports production. The goal was for undergraduate students to participate in the production of forty games per year, including shooting, editing, generating replays, inserting graphics, and mixing five tracks of audio. Over the past three years approximately eighty students have taken part in these live productions, with audiences ranging from several hundred to ten thousand. This paper will explore the successes and challenges of developing a program of instruction out of a public/private partnership. Through the implementation of Vygotsky’s Scaffolding theory, students are immersed in both learning and teaching production from the moment each new season begins, while simultaneously exploring significant issues in Sport and Media Studies as part of the curriculum.
{"title":"Producing College Sports for ESPN: A Vygotskian Approach","authors":"Michael J. Quinn","doi":"10.46328/ijonest.175","DOIUrl":"https://doi.org/10.46328/ijonest.175","url":null,"abstract":"In 2019 the Mid-Atlantic Athletic Conference signed an agreement with ESPN to stream men’s and women’s basketball games on its affiliated streaming service. In response, the Manhattan College Communication Department developed a Sports Media Production program to teach undergraduate students the basics of live sports production. The goal was for undergraduate students to participate in the production of forty games per year, including shooting, editing, generating replays, inserting graphics, and mixing five tracks of audio. Over the past three years approximately eighty students have taken part in these live productions, with audiences ranging from several hundred to ten thousand. This paper will explore the successes and challenges of developing a program of instruction out of a public/private partnership. Through the implementation of Vygotsky’s Scaffolding theory, students are immersed in both learning and teaching production from the moment each new season begins, while simultaneously exploring significant issues in Sport and Media Studies as part of the curriculum.","PeriodicalId":14471,"journal":{"name":"International Journal on Advanced Science, Engineering and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135825393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Josep Joan Centelles, Estefania Moreno, Pedro R. De Atauri
The Montessori method was an educational model devised at the beginning of the 20th century by the Italian pedagogue, physician, psychologist, and psychiatrist María Montessori (1870-1952). She observed that her students activated their intelligence and developed their personality by carrying out manual activities. In recent years, one of the activities that she used, gamification, is currently booming in teaching. Games based in words or letters are often used in language learning, either in presential lessons or in mobile applications. In our teaching innovation group (GINDOC-UB/180), we proposed to adapt those word games using codes so that students could achieve a self-learning on the nomenclature of biomolecules, thus improving their knowledge in metabolism. These code-based games were proposed to Biochemistry students at the Chemistry degree of the Universitat de Barcelona. Games were posted on the Virtual Campus using Moodle. A code is part of a communicative system, and it is defined as a set of elements that allows a message to be decoded. In biochemistry, the best-known code is the genetic code that translates 3 nucleotides to an amino acid. The code allows the students to see that it is a degenerated code, and it was the first code-based game used. Nevertheless, only 20 amino acids are involved, and some letters are missing. Thus, we also used other codes such as numeric codes, Morse code, Braille system code, or codes from other alphabets (Japanese katakana or hiragana, Cyrillic alphabet, Arabic alphabet, or runic alphabet). In this work some examples of the games that can be proposed to the students are shown. Proposed games were highly valued by students and allowed a self-learning on the proposed biomolecules. Games based on the genetic code were easier and more enjoyable for the students to solve, and they provided them with additional biochemical knowledge of protein translation.
{"title":"Self-learning by Using Code-Based Games: An Easy Way to Learn Biomolecule’s Nomenclature","authors":"Josep Joan Centelles, Estefania Moreno, Pedro R. De Atauri","doi":"10.46328/ijonest.176","DOIUrl":"https://doi.org/10.46328/ijonest.176","url":null,"abstract":"The Montessori method was an educational model devised at the beginning of the 20th century by the Italian pedagogue, physician, psychologist, and psychiatrist María Montessori (1870-1952). She observed that her students activated their intelligence and developed their personality by carrying out manual activities. In recent years, one of the activities that she used, gamification, is currently booming in teaching. Games based in words or letters are often used in language learning, either in presential lessons or in mobile applications. In our teaching innovation group (GINDOC-UB/180), we proposed to adapt those word games using codes so that students could achieve a self-learning on the nomenclature of biomolecules, thus improving their knowledge in metabolism. These code-based games were proposed to Biochemistry students at the Chemistry degree of the Universitat de Barcelona. Games were posted on the Virtual Campus using Moodle. A code is part of a communicative system, and it is defined as a set of elements that allows a message to be decoded. In biochemistry, the best-known code is the genetic code that translates 3 nucleotides to an amino acid. The code allows the students to see that it is a degenerated code, and it was the first code-based game used. Nevertheless, only 20 amino acids are involved, and some letters are missing. Thus, we also used other codes such as numeric codes, Morse code, Braille system code, or codes from other alphabets (Japanese katakana or hiragana, Cyrillic alphabet, Arabic alphabet, or runic alphabet). In this work some examples of the games that can be proposed to the students are shown. Proposed games were highly valued by students and allowed a self-learning on the proposed biomolecules. Games based on the genetic code were easier and more enjoyable for the students to solve, and they provided them with additional biochemical knowledge of protein translation.","PeriodicalId":14471,"journal":{"name":"International Journal on Advanced Science, Engineering and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135825521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
According to Ofcom, half of children used TikTok in 2021 and it is the third most used platform behind YouTube and WhatsApp. TikTok is a social media app with one billion monthly active users (Cervi et al., 2022; Dellatto, 2021). installed on devices, 3.5 billion times, available in 154 countries and accessible in thirty-nine languages. TikTok is offered to children of 13 years old (Independent Digital News and Media, 2022; Hoegh, 2022). TikTok was founded in 2018 with a mission to inspire creativity and bring joy (TikTok, 2023). However, its screentime consumption for children has experienced revolutionary change. One in five UK internet users are children according to the UK department for science Innovation and Technology, (2021) most of whom are on TikTok. Children are exposed to over one billion videos on TikTok every day This paper seeks to comparatively investigate the cultural differences, approaches, and challenges to parenting, responsible social media use by children in the United Kingdom and Nigeria (Attrill et al., 2016). To ascertain, whether the existing legal framework is sufficient in enforcing safeguarding measures required of TikTok and other social media platforms.
根据Ofcom的数据,2021年有一半的孩子使用抖音,它是仅次于YouTube和WhatsApp的第三大使用平台。TikTok是一款月活跃用户达10亿的社交媒体应用(Cervi et al., 2022;Dellatto, 2021)。在设备上安装了35亿次,可在154个国家使用,并以39种语言访问。TikTok面向13岁的儿童(独立数字新闻和媒体,2022年;赫伊,2022)。TikTok成立于2018年,其使命是激发创造力和带来快乐(TikTok, 2023年)。然而,它的儿童屏幕时间消费经历了革命性的变化。根据英国科学创新技术部(2021年)的数据,英国五分之一的互联网用户是儿童,其中大多数人都在使用TikTok。儿童每天在TikTok上接触超过10亿个视频。本文试图比较调查英国和尼日利亚儿童在养育子女、负责任的社交媒体使用方面的文化差异、方法和挑战(Attrill et al., 2016)。为了确定现有的法律框架是否足以执行TikTok和其他社交媒体平台所需的保护措施。
{"title":"Navigating Parental Duties in a TikTok World, the UK and Nigeria Regulations and the Online Safety Bill","authors":"Macdnald Amaran","doi":"10.46328/ijonest.183","DOIUrl":"https://doi.org/10.46328/ijonest.183","url":null,"abstract":"According to Ofcom, half of children used TikTok in 2021 and it is the third most used platform behind YouTube and WhatsApp. TikTok is a social media app with one billion monthly active users (Cervi et al., 2022; Dellatto, 2021). installed on devices, 3.5 billion times, available in 154 countries and accessible in thirty-nine languages. TikTok is offered to children of 13 years old (Independent Digital News and Media, 2022; Hoegh, 2022). TikTok was founded in 2018 with a mission to inspire creativity and bring joy (TikTok, 2023). However, its screentime consumption for children has experienced revolutionary change. One in five UK internet users are children according to the UK department for science Innovation and Technology, (2021) most of whom are on TikTok. Children are exposed to over one billion videos on TikTok every day This paper seeks to comparatively investigate the cultural differences, approaches, and challenges to parenting, responsible social media use by children in the United Kingdom and Nigeria (Attrill et al., 2016). To ascertain, whether the existing legal framework is sufficient in enforcing safeguarding measures required of TikTok and other social media platforms.","PeriodicalId":14471,"journal":{"name":"International Journal on Advanced Science, Engineering and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135825395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The purpose of this paper is to demonstrate how to extend a web framework (WF) for developing web apps that can meet the diverse needs of different fields. This work aims to provide computer science senior project students with an opportunity to work on a wide range of projects using Apache, HTML, CSS, JavaScript, PHP, and MySQL. The paper presents a WF that manages jokes, based on the book PHP MySQL: Novice to Ninja (6th ed.) by T. Butler and K. Yank. The WF is interactive, responsive, secure, password-protected and database-driven. It consists of generic and specific components that use a MySQL database on the web server-side to store jokes. The specific components can be modified or added to create custom apps. Admin users can log in with their email and password and perform various actions (view, add, delete and edit) on jokes and categories, depending on their level of permission. Admins with full permissions can also edit the permissions of other registered accounts and access the Manage Categories, Manage Jokes, and Manage Authors pages. The original WF is enhanced and expanded for the senior project starting point by adding the following features: a hierarchical main menu with admin menus as the second level, a highlighted selected menu item, responsive design - accessibility on all devices, improved password security (minimum of 8 characters, 1 lowercase letter, 1 uppercase letter, 1 digit, 1 special character), a two-factor authentication security subsystem, cascaded deletion and uploaded and retrieved binary files (images and documents). In conclusion, the project is designed and implemented following the best practices and tested on a web hosting server provider.
{"title":"Web Framework","authors":"Jozef Goetz, Antonio Flores Marquez","doi":"10.46328/ijonest.190","DOIUrl":"https://doi.org/10.46328/ijonest.190","url":null,"abstract":"The purpose of this paper is to demonstrate how to extend a web framework (WF) for developing web apps that can meet the diverse needs of different fields. This work aims to provide computer science senior project students with an opportunity to work on a wide range of projects using Apache, HTML, CSS, JavaScript, PHP, and MySQL. The paper presents a WF that manages jokes, based on the book PHP MySQL: Novice to Ninja (6th ed.) by T. Butler and K. Yank. The WF is interactive, responsive, secure, password-protected and database-driven. It consists of generic and specific components that use a MySQL database on the web server-side to store jokes. The specific components can be modified or added to create custom apps. Admin users can log in with their email and password and perform various actions (view, add, delete and edit) on jokes and categories, depending on their level of permission. Admins with full permissions can also edit the permissions of other registered accounts and access the Manage Categories, Manage Jokes, and Manage Authors pages. The original WF is enhanced and expanded for the senior project starting point by adding the following features: a hierarchical main menu with admin menus as the second level, a highlighted selected menu item, responsive design - accessibility on all devices, improved password security (minimum of 8 characters, 1 lowercase letter, 1 uppercase letter, 1 digit, 1 special character), a two-factor authentication security subsystem, cascaded deletion and uploaded and retrieved binary files (images and documents). In conclusion, the project is designed and implemented following the best practices and tested on a web hosting server provider.","PeriodicalId":14471,"journal":{"name":"International Journal on Advanced Science, Engineering and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135825507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The rapid development of computer-aided design tools, such as MATLAB or Octave, or Mathematica enabled students to solve many complicated problems focusing less on underlying STEM-related concepts that are interdisciplinary. Therefore, it is important to demonstrate how it could be done using specific examples that could be linked to different subjects or even to their everyday life experience. This paper reports on using the COVID-19 pandemic evolution model (Shur, 2022) in my class on the physics of advanced semiconductors devices. I use this model to show how the concepts, such as the Born-Oppenheimer approximation and Fermi-Dirac distribution function could be used in a completely different STEM field. In solid-state physics, the Born-Oppenheimer approximation is used to separate rapid electronic motion, relevant to the electronic states and much slower nuclei motion (since nuclei are thousands of times heavier than electrons). Likewise, the COVID-19 model uses a relatively fast pandemic evolution growth or decay constant, a slow function of time itself. In solid-state physics, the Fermi-Dirac distribution function describes the transition from the occupied electronic states to empty electron states with the temperature determining the transition interval. The COVID-19 model uses the generalized Fermi-distribution function to describe the mitigation measures that determine the transition from a high to a lower infection rate. A more accurate COVID-19 evolution model requires a generalized Fermi-Dirac function that accounts for a slow variation of the effect of the mitigation measures with time. In turn, this generalization could be used in solid-state physics to describe the electron temperature increase in the electric field.
{"title":"Interdisciplinary Fundamental Concepts in STEM: Solid State Physics and COVID-19 Pandemic Evolution","authors":"Michael Shur","doi":"10.46328/ijonest.160","DOIUrl":"https://doi.org/10.46328/ijonest.160","url":null,"abstract":"The rapid development of computer-aided design tools, such as MATLAB or Octave, or Mathematica enabled students to solve many complicated problems focusing less on underlying STEM-related concepts that are interdisciplinary. Therefore, it is important to demonstrate how it could be done using specific examples that could be linked to different subjects or even to their everyday life experience. This paper reports on using the COVID-19 pandemic evolution model (Shur, 2022) in my class on the physics of advanced semiconductors devices. I use this model to show how the concepts, such as the Born-Oppenheimer approximation and Fermi-Dirac distribution function could be used in a completely different STEM field. In solid-state physics, the Born-Oppenheimer approximation is used to separate rapid electronic motion, relevant to the electronic states and much slower nuclei motion (since nuclei are thousands of times heavier than electrons). Likewise, the COVID-19 model uses a relatively fast pandemic evolution growth or decay constant, a slow function of time itself. In solid-state physics, the Fermi-Dirac distribution function describes the transition from the occupied electronic states to empty electron states with the temperature determining the transition interval. The COVID-19 model uses the generalized Fermi-distribution function to describe the mitigation measures that determine the transition from a high to a lower infection rate. A more accurate COVID-19 evolution model requires a generalized Fermi-Dirac function that accounts for a slow variation of the effect of the mitigation measures with time. In turn, this generalization could be used in solid-state physics to describe the electron temperature increase in the electric field.","PeriodicalId":14471,"journal":{"name":"International Journal on Advanced Science, Engineering and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135205770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study investigates the effects of changes in terms of trade (t.o.t) on economic indicators in net oil-importing countries. Findings demonstrate that improving trade conditions lead to increased profitability, investment opportunities, and capital accumulation, although the pace of accumulation slows down after an initial period of rapid growth. The study also highlights the positive impact of trade terms on foreign debt in developing economies, as enhanced terms of trade contribute to higher export revenues and better capacity to service debt obligations. The study suggests two measures: strengthening domestic energy production and implementing hedging strategies to mitigate the impact of oil price fluctuations on foreign debt. Furthermore, the analysis explores the influence of terms of trade on employment, interest rates, capital costs, net oil imports, final output, and agricultural product exports. These indicators are affected by changes in terms of trade, driven by factors such as increased productivity, shifts in comparative advantage, and market dynamics. Overall, this study emphasizes the significance of terms of trade in shaping economic dynamics and provides insights into policy measures to enhance energy security, reduce oil import dependency, and promote economic resilience in net oil-importing countries.
{"title":"The Terms of Trade Effect on Agriculture Export the Case of Indonesia as a Net Oil Importer Country","authors":"Simon Poltak Hamonangan Hutabarat","doi":"10.46328/ijonest.169","DOIUrl":"https://doi.org/10.46328/ijonest.169","url":null,"abstract":"This study investigates the effects of changes in terms of trade (t.o.t) on economic indicators in net oil-importing countries. Findings demonstrate that improving trade conditions lead to increased profitability, investment opportunities, and capital accumulation, although the pace of accumulation slows down after an initial period of rapid growth. The study also highlights the positive impact of trade terms on foreign debt in developing economies, as enhanced terms of trade contribute to higher export revenues and better capacity to service debt obligations. The study suggests two measures: strengthening domestic energy production and implementing hedging strategies to mitigate the impact of oil price fluctuations on foreign debt. Furthermore, the analysis explores the influence of terms of trade on employment, interest rates, capital costs, net oil imports, final output, and agricultural product exports. These indicators are affected by changes in terms of trade, driven by factors such as increased productivity, shifts in comparative advantage, and market dynamics. Overall, this study emphasizes the significance of terms of trade in shaping economic dynamics and provides insights into policy measures to enhance energy security, reduce oil import dependency, and promote economic resilience in net oil-importing countries.","PeriodicalId":14471,"journal":{"name":"International Journal on Advanced Science, Engineering and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135205041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless sensor networks have a broader application range in almost every field of human endeavours, which exposes them to a variety of security threats on a daily basis from cyber criminals. It is a remote monitoring system for events or phenomena in areas such as smart grids, intelligent healthcare, circular economies in smart cities, and underwater surveillance. Cybersecurity threats have long been a source of concern in the field of wireless sensor networks. The goal of cyber security in this era is to certify the authenticity of networks confidentiality, data integrity and availability of network assets. Various security mechanisms, particularly key management cryptographic, authentication mechanisms, and intrusion detection systems have been developed from several machine learning algorithms, and so on, which have been used to ensure network security. In this paper, we focused on outlining diverse application areas of wireless sensor networks with their security threats, major challenges and given some common mechanism to counter security threats for in-depth research insight on security in applications of wireless sensor networks. In addition, an analysis of the common attacks on wireless sensor networks has been provided.
{"title":"Current Security Threats in Applications of Wireless Sensor Network","authors":"Ayuba John, Ismail Fauzi Isnin, Syed Hamid Hussain Madni","doi":"10.46328/ijonest.174","DOIUrl":"https://doi.org/10.46328/ijonest.174","url":null,"abstract":"Wireless sensor networks have a broader application range in almost every field of human endeavours, which exposes them to a variety of security threats on a daily basis from cyber criminals. It is a remote monitoring system for events or phenomena in areas such as smart grids, intelligent healthcare, circular economies in smart cities, and underwater surveillance. Cybersecurity threats have long been a source of concern in the field of wireless sensor networks. The goal of cyber security in this era is to certify the authenticity of networks confidentiality, data integrity and availability of network assets. Various security mechanisms, particularly key management cryptographic, authentication mechanisms, and intrusion detection systems have been developed from several machine learning algorithms, and so on, which have been used to ensure network security. In this paper, we focused on outlining diverse application areas of wireless sensor networks with their security threats, major challenges and given some common mechanism to counter security threats for in-depth research insight on security in applications of wireless sensor networks. In addition, an analysis of the common attacks on wireless sensor networks has been provided.","PeriodicalId":14471,"journal":{"name":"International Journal on Advanced Science, Engineering and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135205042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Image Denoising, Deblurring, and Enhancement techniques are most commonly used on the images to reduce or completely remove the noise. The noisy images are not capable of perfectly using the solution of the desired problems such as object edge detection, object segmentation, and object classification. Because the edges of these objects have much bluer or more noise pixels for clearly stable detection. The main motivation of this study is to solve the problem of detection and elimination of the undesired noisy pixels on the encountered images. These noisy pixels are needed to be removed from the obtained images which are the results of throughout determined image processing steps. The main reason for this study motivation come out that to find the actual inscription fault has some noisy (undesired) pixels when extracting the true difference between the two images has been subtracted from each other. The subtracted image results are used in the inscription inspection process that controls the accuracy of the inscription quality. In the inscription inspection process, subtracted image results are used to determine the accuracy of the inscription quality. These subtracted images are formed by subtraction from each other of reference images and sample images. In these subtracted images if truly exist inscriptions faults or sometimes that could be occurred undesired noisy pixels at the same time in the subtraction process. This study focused on detecting and eliminating the undesired noisy pixels in order to reach actual inscription faults in the images. Thus, the remove pixels as width algorithm (RPW) has been developed and applied to these specified images.
{"title":"Extraction of Actual Faults with Adjusting the Pixel Width Parameter to Remove Undesired Noise Pixels in the Image (RPW)","authors":"Mahmut Sami Yasak, Gizem Keskin","doi":"10.46328/ijonest.159","DOIUrl":"https://doi.org/10.46328/ijonest.159","url":null,"abstract":"Image Denoising, Deblurring, and Enhancement techniques are most commonly used on the images to reduce or completely remove the noise. The noisy images are not capable of perfectly using the solution of the desired problems such as object edge detection, object segmentation, and object classification. Because the edges of these objects have much bluer or more noise pixels for clearly stable detection. The main motivation of this study is to solve the problem of detection and elimination of the undesired noisy pixels on the encountered images. These noisy pixels are needed to be removed from the obtained images which are the results of throughout determined image processing steps. The main reason for this study motivation come out that to find the actual inscription fault has some noisy (undesired) pixels when extracting the true difference between the two images has been subtracted from each other. The subtracted image results are used in the inscription inspection process that controls the accuracy of the inscription quality. In the inscription inspection process, subtracted image results are used to determine the accuracy of the inscription quality. These subtracted images are formed by subtraction from each other of reference images and sample images. In these subtracted images if truly exist inscriptions faults or sometimes that could be occurred undesired noisy pixels at the same time in the subtraction process. This study focused on detecting and eliminating the undesired noisy pixels in order to reach actual inscription faults in the images. Thus, the remove pixels as width algorithm (RPW) has been developed and applied to these specified images.","PeriodicalId":14471,"journal":{"name":"International Journal on Advanced Science, Engineering and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135205765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The importance of location, lighting, and furniture finishes are three areas an interior designer cannot overlook. This presentation stems from a dissertation on the importance of multi-sensory room usage in elementary schools. The researcher found that the location of the autistic classroom is one of the most important aspects that is often overlooked by both school leaders and the architects who design schools. Natural lighting should also not be ignored as it helps support healthy circadian rhythms and can be a source of sensory regulation and an opportunity for stimming. Lighting can be detrimental to those with special needs due to the subtle flickering of fluorescent light fixtures, which may not be noticed by the typical person but can be bothersome and interrupt a child with specific sensory issues. Lastly, acoustics, color, and material and furniture selections are critical when designing for students under the autism spectrum. Acoustic control helps to minimize background noise and echo by specifying materials to absorb sound and eliminate reverberation. Research has resulted in a color palette that students on the spectrum respond well to in addition to the importance of seating choice variation within the classroom. Lastly, visual and tactile characteristics of selected materials are vital to satisfy the sensory needs of the students while eliminating unnecessary distractions within the classroom.
{"title":"The Role of the Interior Designer in the Autistic Classroom: Location and Material Selection are Essential for Success","authors":"Belinda Nuth Sloboda","doi":"10.46328/ijonest.171","DOIUrl":"https://doi.org/10.46328/ijonest.171","url":null,"abstract":"The importance of location, lighting, and furniture finishes are three areas an interior designer cannot overlook. This presentation stems from a dissertation on the importance of multi-sensory room usage in elementary schools. The researcher found that the location of the autistic classroom is one of the most important aspects that is often overlooked by both school leaders and the architects who design schools. Natural lighting should also not be ignored as it helps support healthy circadian rhythms and can be a source of sensory regulation and an opportunity for stimming. Lighting can be detrimental to those with special needs due to the subtle flickering of fluorescent light fixtures, which may not be noticed by the typical person but can be bothersome and interrupt a child with specific sensory issues. Lastly, acoustics, color, and material and furniture selections are critical when designing for students under the autism spectrum. Acoustic control helps to minimize background noise and echo by specifying materials to absorb sound and eliminate reverberation. Research has resulted in a color palette that students on the spectrum respond well to in addition to the importance of seating choice variation within the classroom. Lastly, visual and tactile characteristics of selected materials are vital to satisfy the sensory needs of the students while eliminating unnecessary distractions within the classroom.","PeriodicalId":14471,"journal":{"name":"International Journal on Advanced Science, Engineering and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135205096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}