首页 > 最新文献

Global Journal of Information Technology: Emerging Technologies最新文献

英文 中文
Investigation of Efficient Backup Tecniques To Reduce Late In Cloud Systems: A Modeling Study 减少云系统后期的有效备份技术的研究:建模研究
Pub Date : 2023-04-01 DOI: 10.18844/gjit.v13i1.8863
From the formation stages of the information society to the present day, new developments have been experienced in many areas such as data formation, processing, storage and sharing of data in electronic environments. In this context, many new technological concepts have been included in our lives. When it comes to data storage environments, the concept of "Cloud Computing", which has been developing and increasing in popularity in recent years, comes to our minds. Cloud computing, with its known definition, is an internet-based technology service that provides access to the data stored on its servers at any time through internet access and allows users to benefit from the services offered by the system to the extent they want. While the advantages of cloud computing systems such as low cost, high performance, not requiring physical materials and being flexible can be mentioned, it is also emphasized that it brings many problems in terms of system. The most important of these problems; the lack of resources in cloud computing service providers, causing unpredictable delays in server response times. Based on all this information, this research is structured on the development of solution processes on these delays. In this sense, it is possible to consider three areas of cloud infrastructure; cloud computing, distributed storage and streaming communications. One of the first solutions that comes to mind is duplicating a task on multiple machines and waiting for the earliest copy to finish can reduce service latency; but intuitively, it costs additional computing resources and increases the queue load on servers. In this context, the effect of redundancy on the tail will be analyzed in the first part of the research. As a solution proposal, in this section, it will be discussed that service delays and queue load can be reduced by using the replication method, thus making the system more efficient. In a similar way, by requesting more than one copy of a file and waiting for any of them to arrive, the cloud storage requests will be accelerated for content download. In the second part of the research, generalization will be made from replication to coding and the (n, k) fork-join model will be studied to analyze the delay in accessing a storage system with (n, k) deletion code. This analysis will provide practical information that several users can access a content at the same time and provide faster service to the relevant users. Achieving low latency in streaming communication is even more difficult, as packets must be transmitted quickly and sequentially. Based on this structure, in the third part of the research, it is aimed to develop deletion codes to transmit redundant packet combinations and ensure smooth playback. Experimental modeling method was used as a research method in the study. In general, the aim of the research is to blend various mathematical tools from queuing, theory coding and renewal processes. It is foreseen that the techniques
从信息社会的形成阶段到今天,在电子环境中数据的形成、处理、存储和共享等许多领域都有了新的发展。在这种背景下,许多新的技术概念被纳入我们的生活。说到数据存储环境,我们就会想到近年来不断发展和普及的“云计算”概念。云计算,就其已知的定义而言,是一种基于互联网的技术服务,它可以随时通过互联网访问存储在其服务器上的数据,并允许用户在他们想要的程度上受益于系统提供的服务。虽然可以提到云计算系统的低成本、高性能、不需要物理材料、灵活等优点,但也强调它在系统方面带来了许多问题。这些问题中最重要的;云计算服务提供商缺乏资源,导致服务器响应时间出现不可预测的延迟。基于所有这些信息,本研究的结构是开发这些延迟的解决方案流程。从这个意义上讲,可以考虑云基础设施的三个方面:云计算、分布式存储和流通信。首先想到的解决方案之一是在多台机器上复制任务并等待最早的副本完成可以减少服务延迟;但直观地说,它会消耗额外的计算资源,并增加服务器上的队列负载。在此背景下,研究的第一部分将分析冗余对尾部的影响。作为一种解决方案,本节将讨论使用复制方法可以减少服务延迟和队列负载,从而提高系统的效率。以类似的方式,通过请求一个文件的多个副本并等待其中任何一个到达,云存储请求将加速内容下载。在研究的第二部分,将从复制推广到编码,并研究(n, k) fork-join模型,以分析(n, k)个删除码访问存储系统的延迟。这种分析将为多个用户同时访问一个内容提供实用信息,并为相关用户提供更快的服务。在流通信中实现低延迟更加困难,因为数据包必须快速且顺序地传输。基于这种结构,在第三部分的研究中,旨在开发删除码,以传输冗余分组组合并确保顺利回放。本研究采用实验建模方法作为研究方法。总的来说,研究的目的是混合从排队,理论编码和更新过程的各种数学工具。可以预见,通过这些研究维度开发的技术和见解可以应用于具有随机变化组件的其他系统,并且可以在此背景下进行综合研究并为文献做出贡献。
{"title":"Investigation of Efficient Backup Tecniques To Reduce Late In Cloud Systems: A Modeling Study","authors":"","doi":"10.18844/gjit.v13i1.8863","DOIUrl":"https://doi.org/10.18844/gjit.v13i1.8863","url":null,"abstract":"From the formation stages of the information society to the present day, new developments have been experienced in many areas such as data formation, processing, storage and sharing of data in electronic environments. In this context, many new technological concepts have been included in our lives. When it comes to data storage environments, the concept of \"Cloud Computing\", which has been developing and increasing in popularity in recent years, comes to our minds. Cloud computing, with its known definition, is an internet-based technology service that provides access to the data stored on its servers at any time through internet access and allows users to benefit from the services offered by the system to the extent they want. While the advantages of cloud computing systems such as low cost, high performance, not requiring physical materials and being flexible can be mentioned, it is also emphasized that it brings many problems in terms of system. The most important of these problems; the lack of resources in cloud computing service providers, causing unpredictable delays in server response times. Based on all this information, this research is structured on the development of solution processes on these delays. In this sense, it is possible to consider three areas of cloud infrastructure; cloud computing, distributed storage and streaming communications. One of the first solutions that comes to mind is duplicating a task on multiple machines and waiting for the earliest copy to finish can reduce service latency; but intuitively, it costs additional computing resources and increases the queue load on servers. In this context, the effect of redundancy on the tail will be analyzed in the first part of the research. As a solution proposal, in this section, it will be discussed that service delays and queue load can be reduced by using the replication method, thus making the system more efficient. In a similar way, by requesting more than one copy of a file and waiting for any of them to arrive, the cloud storage requests will be accelerated for content download. In the second part of the research, generalization will be made from replication to coding and the (n, k) fork-join model will be studied to analyze the delay in accessing a storage system with (n, k) deletion code. This analysis will provide practical information that several users can access a content at the same time and provide faster service to the relevant users. Achieving low latency in streaming communication is even more difficult, as packets must be transmitted quickly and sequentially. Based on this structure, in the third part of the research, it is aimed to develop deletion codes to transmit redundant packet combinations and ensure smooth playback. Experimental modeling method was used as a research method in the study. In general, the aim of the research is to blend various mathematical tools from queuing, theory coding and renewal processes. It is foreseen that the techniques","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127106458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Security for Small Business Course Proposal and Design 中小企业信息安全课程方案与设计
Pub Date : 2023-04-01 DOI: 10.18844/gjit.v13i1.8495
Wenjuan Xu
These days small businesses deploy different information systems to be more competitive and efficient, at the same time , which leads to different cyber attacks. To reduce the possible infrastructure damage and financial loss,  business owners need to be aware of and recognize these various attacks, and know how to reduce or prevent them.  In this paper, to help with the local small business owners, we propose an information security course especially designed for educating the business owners in cyber security for small business-related fields. This paper examines the course design details including the course structure, main contents, different exercises and main challenges. 
如今,小型企业部署了不同的信息系统,以提高竞争力和效率,同时也导致了不同的网络攻击。为了减少可能的基础设施破坏和财务损失,企业所有者需要了解和识别这些不同的攻击,并知道如何减少或防止它们。在本文中,为了帮助当地的小企业主,我们提出了一个专门为小企业相关领域的企业主提供网络安全教育的信息安全课程。本文从课程结构、主要内容、不同练习和主要挑战等方面详细介绍了课程设计。
{"title":"Information Security for Small Business Course Proposal and Design","authors":"Wenjuan Xu","doi":"10.18844/gjit.v13i1.8495","DOIUrl":"https://doi.org/10.18844/gjit.v13i1.8495","url":null,"abstract":"These days small businesses deploy different information systems to be more competitive and efficient, at the same time , which leads to different cyber attacks. To reduce the possible infrastructure damage and financial loss,  business owners need to be aware of and recognize these various attacks, and know how to reduce or prevent them.  \u0000In this paper, to help with the local small business owners, we propose an information security course especially designed for educating the business owners in cyber security for small business-related fields. This paper examines the course design details including the course structure, main contents, different exercises and main challenges. ","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121347914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and privacy concerns in mobile payment services 移动支付服务中的安全和隐私问题
Pub Date : 2022-10-31 DOI: 10.18844/gjit.v12i2.8264
Nadire Cavus, Adeoluwa Atanda
Mobile technology is becoming more central to human life, especially with the current ongoing global pandemic which points out that there will be an increasing need for mobile payment service as it requires little or no contact in making payments. However, mobile payment is not among the most commonly used mobile utilities because of the security and privacy concerns posed by mobile payment. The prime aim of this study is to determine the security and privacy concerns with the highest existence and then address them by identifying a rational and objectively agreed approach on how to resolve the problems discovered. A sensitive Analytical Hierarchy Process (AHP) Pairwise Comparison approach will be used to solve the security and privacy challenges associated with mobile payment services. This study shows that leakage of personal data is the highest risk concern by most users of the mobile payment system (MPS) while loss of “intended purchase” has the lowest risk concern from what we could derive.Keywords: AHP Model; Mobile Technology; Mobile Payment Services; Pairwise Comparison.
移动技术正在成为人类生活的核心,特别是目前正在进行的全球大流行指出,移动支付服务的需求将越来越大,因为它在支付过程中几乎不需要接触。然而,由于移动支付带来的安全和隐私问题,移动支付并不是最常用的移动公用事业之一。本研究的主要目的是确定最高存在的安全和隐私问题,然后通过确定如何解决发现的问题的理性和客观同意的方法来解决这些问题。一种敏感的分析层次过程(AHP)两两比较方法将用于解决与移动支付服务相关的安全和隐私挑战。这项研究表明,个人数据泄露是大多数移动支付系统(MPS)用户最担心的风险,而“预定购买”的损失是我们所能得出的最低风险。关键词:AHP模型;移动技术;移动支付服务;成对比较。
{"title":"Security and privacy concerns in mobile payment services","authors":"Nadire Cavus, Adeoluwa Atanda","doi":"10.18844/gjit.v12i2.8264","DOIUrl":"https://doi.org/10.18844/gjit.v12i2.8264","url":null,"abstract":"Mobile technology is becoming more central to human life, especially with the current ongoing global pandemic which points out that there will be an increasing need for mobile payment service as it requires little or no contact in making payments. However, mobile payment is not among the most commonly used mobile utilities because of the security and privacy concerns posed by mobile payment. The prime aim of this study is to determine the security and privacy concerns with the highest existence and then address them by identifying a rational and objectively agreed approach on how to resolve the problems discovered. A sensitive Analytical Hierarchy Process (AHP) Pairwise Comparison approach will be used to solve the security and privacy challenges associated with mobile payment services. This study shows that leakage of personal data is the highest risk concern by most users of the mobile payment system (MPS) while loss of “intended purchase” has the lowest risk concern from what we could derive.\u0000Keywords: AHP Model; Mobile Technology; Mobile Payment Services; Pairwise Comparison.","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132732227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-teaching and E-learning challenges during the coronavirus: Case study of an Algerian University 冠状病毒期间的电子教学和电子学习挑战:一所阿尔及利亚大学的案例研究
Pub Date : 2022-10-31 DOI: 10.18844/gjit.v12i2.8471
Sihem Boubekeur
Information and communication technologies have become vital in the educational realm over the past two decades and a significant subject in the English language educational system. E-materials are not available for all the students, and that causes an impediment for foreign language teachers at Dr. Moulay Tahar University of Saida-Algeria. This research paper aims at investigating e-teaching and e-learning effectiveness in the Algerian university. The researcher only describes the existing phenomenon based on personal classroom observations and interviews with some teachers at Dr. Moulay Tahar University. The findings revealed that e-teaching and online learning are in vain as they are still new for both tutors and learners. Thus, e-education ought to start at an early age so that learners will get used to it. Both students and teachers should be trained in virtual learning and teaching methods. Keywords: EFL students; English; ICT; online; language; learning; teaching.  
在过去的二十年里,信息和通信技术在教育领域变得至关重要,也是英语语言教育系统的一个重要主题。并非所有学生都能使用电子材料,这对阿尔及利亚赛达-穆莱塔哈尔博士大学的外语教师造成了障碍。本研究论文旨在调查阿尔及利亚大学的电子教学和电子学习效果。研究者仅根据个人课堂观察和对Dr. Moulay Tahar University的一些教师的采访来描述现有的现象。调查结果显示,电子教学和在线学习是徒劳的,因为它们对教师和学习者来说都是新的。因此,电子教育应该从小就开始,这样学习者就会习惯它。学生和教师都应该接受虚拟学习和教学方法的培训。关键词:英语学生;英语;信息通信技术;在线;语言;学习;教学。
{"title":"E-teaching and E-learning challenges during the coronavirus: Case study of an Algerian University","authors":"Sihem Boubekeur","doi":"10.18844/gjit.v12i2.8471","DOIUrl":"https://doi.org/10.18844/gjit.v12i2.8471","url":null,"abstract":"Information and communication technologies have become vital in the educational realm over the past two decades and a significant subject in the English language educational system. E-materials are not available for all the students, and that causes an impediment for foreign language teachers at Dr. Moulay Tahar University of Saida-Algeria. This research paper aims at investigating e-teaching and e-learning effectiveness in the Algerian university. The researcher only describes the existing phenomenon based on personal classroom observations and interviews with some teachers at Dr. Moulay Tahar University. The findings revealed that e-teaching and online learning are in vain as they are still new for both tutors and learners. Thus, e-education ought to start at an early age so that learners will get used to it. Both students and teachers should be trained in virtual learning and teaching methods. \u0000Keywords: EFL students; English; ICT; online; language; learning; teaching. \u0000 ","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"39 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125734884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the editor in Chief 总编辑的留言
Pub Date : 2022-10-15 DOI: 10.18844/gjit.v12i2.8110
E. Yildiz
  The year 2022 promises many exciting developments for the Global Journal of  Information Technology: Emerging Technologies (GJIT). In addition, every year, the number of citations continues to rise strongly in proportion to the increase in the number of articles published. In this respect, first of all, we would like to thank all our authors who have contributed to the success of our journal. While reviewing our new issue, we saw articles from different authors from different countries: Cyprus, Jordan, Iran etc. The multiculturalism policy followed in our globally-focused journal makes us happy with every new issue. We examine the following research areas in the current issue; The topics of “Creating a Mobile Application for Online Shopping that has all the Features Required for the  Process”, “Requirements For The Use Of E-Learning In University Education (Theoretical Study)”, “Attitudes Of Physical Education Teachers InJordan Towards The Use Of The Internet In The Educational Process”, “An Inquest into the Degree of M.A. Translation Students’ Familiarity with Computer-Assisted Translation (CAT) Tools”. We will continue to contribute to the literature within the scope of Educational Technologies with our strong team. Thanks to all our authors the contributors to this issue. Hope to see you in our new issue. Asist. Prof. Dr. Ezgi Pelin YILDIZ Global Journal of Information Technology: Emerging Technologies Chef Editor  
《全球信息技术杂志:新兴技术》(GJIT)有望在2022年取得许多令人兴奋的发展。此外,每年的被引次数与发表文章数量的增长成比例地持续强劲增长。在这方面,首先,我们要感谢所有为本刊的成功做出贡献的作者。在回顾我们的新一期时,我们看到了来自不同国家的不同作者的文章:塞浦路斯,约旦,伊朗等。我们以全球为中心的杂志遵循的多元文化政策使我们对每一期新刊都感到高兴。在本期中,我们考察了以下几个研究领域;主题为“创建一个具有所有过程所需功能的在线购物移动应用程序”,“在大学教育中使用电子学习的要求(理论研究)”,“约旦体育教师对在教育过程中使用互联网的态度”,“调查硕士翻译学生对计算机辅助翻译(CAT)工具的熟悉程度”。我们将继续与我们强大的团队一起为教育技术领域的文献做出贡献。感谢我们所有的作者和贡献者。希望在我们的新一期中见到你。milwaukee Asist。Ezgi Pelin YILDIZ全球信息技术杂志:新兴技术首席编辑
{"title":"Message from the editor in Chief","authors":"E. Yildiz","doi":"10.18844/gjit.v12i2.8110","DOIUrl":"https://doi.org/10.18844/gjit.v12i2.8110","url":null,"abstract":"  \u0000The year 2022 promises many exciting developments for the Global Journal of  Information Technology: Emerging Technologies (GJIT). In addition, every year, the number of citations continues to rise strongly in proportion to the increase in the number of articles published. In this respect, first of all, we would like to thank all our authors who have contributed to the success of our journal. While reviewing our new issue, we saw articles from different authors from different countries: Cyprus, Jordan, Iran etc. \u0000The multiculturalism policy followed in our globally-focused journal makes us happy with every new issue. We examine the following research areas in the current issue; The topics of “Creating a Mobile Application for Online Shopping that has all the Features Required for the  Process”, “Requirements For The Use Of E-Learning In University Education (Theoretical Study)”, “Attitudes Of Physical Education Teachers InJordan Towards The Use Of The Internet In The Educational Process”, “An Inquest into the Degree of M.A. Translation Students’ Familiarity with Computer-Assisted Translation (CAT) Tools”. We will continue to contribute to the literature within the scope of Educational Technologies with our strong team. Thanks to all our authors the contributors to this issue. \u0000Hope to see you in our new issue. Asist. Prof. Dr. Ezgi Pelin YILDIZ \u0000Global Journal of Information Technology: Emerging Technologies Chef Editor \u0000 ","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125509465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attitudes of physical education teachers in Jordan towards the use of the Internet in the educational process 约旦体育教师对在教育过程中使用互联网的态度
Pub Date : 2022-10-14 DOI: 10.18844/gjit.v12i2.7879
Randa Saleh Jawarneh, M. Al-Momani
The study aimed to identify the attitudes of physical education teachers in Jordan towards Internet use in teaching-learning process; where the descriptive approach was used in addition to the use of the questionnaire as a tool for the study which has been applied to the study sample made up of 328 teachers and educator and that in class in the second academic year school 2021–2022. The study, after carrying out the necessary statistical treatment, concluded: The presence of positive attitudes among teachers towards the use of the Internet in the educational process. There is a disparity in the use of the Internet in the educational process. Keywords: Internet, the educational process, physical education subject, physical education teachers;
本研究旨在了解约旦体育教师对在教学过程中使用互联网的态度;除了使用问卷作为研究工具外,还使用了描述性方法,该研究已应用于由328名教师和教育工作者组成的研究样本,以及2021-2022学年第二学年的课堂。该研究在进行了必要的统计处理后得出结论:教师对在教育过程中使用互联网持积极态度。在教育过程中,互联网的使用存在差异。关键词:互联网;教育过程;体育学科;
{"title":"Attitudes of physical education teachers in Jordan towards the use of the Internet in the educational process","authors":"Randa Saleh Jawarneh, M. Al-Momani","doi":"10.18844/gjit.v12i2.7879","DOIUrl":"https://doi.org/10.18844/gjit.v12i2.7879","url":null,"abstract":"The study aimed to identify the attitudes of physical education teachers in Jordan towards Internet use in teaching-learning process; where the descriptive approach was used in addition to the use of the questionnaire as a tool for the study which has been applied to the study sample made up of 328 teachers and educator and that in class in the second academic year school 2021–2022. The study, after carrying out the necessary statistical treatment, concluded: The presence of positive attitudes among teachers towards the use of the Internet in the educational process. There is a disparity in the use of the Internet in the educational process.\u0000 \u0000Keywords: Internet, the educational process, physical education subject, physical education teachers;","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133607208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interactive storytelling for the retelling of autobiographical memory in children: A social robotics approach 儿童自传体记忆复述的互动叙事:一种社会机器人方法
Pub Date : 2022-04-30 DOI: 10.18844/gjit.v12i1.7111
Leire Ozaeta, Itsaso Perez, Itziar Rekalde
Memory is one of our fundamental mental functions, which allows us to revive the past in our minds. When memory is mentioned, we usually want to refer to a particular kind of memory, which is autobiographical memory. Access to these memories can be altered by various affective disorders, especially depression. Regarding these techniques, this study aims to focus on storytelling to contribute to the resilience of children using a social robot approach, as they do not perceive the robot as a figure of superiority, but as a peer. The article follows a literature review method.  This paper presents a preliminary scenario for child-robot interaction in three phases, using interactive storytelling as a way to review the children's past experiences. To help those people, particularly children who have faced trauma, to remember the past in a structured and positive way, life review techniques have been developed.Keywords: Autobiographical; memory; robotics; storytelling.
记忆是我们基本的心理功能之一,它使我们能够在脑海中重现过去。当提到记忆时,我们通常想指的是一种特定的记忆,那就是自传式记忆。对这些记忆的访问可能会被各种情感障碍,尤其是抑郁症所改变。关于这些技术,本研究的目的是专注于讲故事,以帮助儿童使用社交机器人的方法,因为他们不认为机器人是一个优越的形象,而是作为一个同伴。本文采用文献综述法。本文提出了一个儿童机器人互动的初步方案,分为三个阶段,使用交互式讲故事作为回顾儿童过去经验的一种方式。为了帮助那些人,特别是那些经历过创伤的儿童,以一种有组织的、积极的方式记住过去,生活回顾技术已经被开发出来。关键词:自传;记忆;机器人技术;讲故事。
{"title":"Interactive storytelling for the retelling of autobiographical memory in children: A social robotics approach","authors":"Leire Ozaeta, Itsaso Perez, Itziar Rekalde","doi":"10.18844/gjit.v12i1.7111","DOIUrl":"https://doi.org/10.18844/gjit.v12i1.7111","url":null,"abstract":"Memory is one of our fundamental mental functions, which allows us to revive the past in our minds. When memory is mentioned, we usually want to refer to a particular kind of memory, which is autobiographical memory. Access to these memories can be altered by various affective disorders, especially depression. Regarding these techniques, this study aims to focus on storytelling to contribute to the resilience of children using a social robot approach, as they do not perceive the robot as a figure of superiority, but as a peer. The article follows a literature review method.  This paper presents a preliminary scenario for child-robot interaction in three phases, using interactive storytelling as a way to review the children's past experiences. To help those people, particularly children who have faced trauma, to remember the past in a structured and positive way, life review techniques have been developed.\u0000Keywords: Autobiographical; memory; robotics; storytelling.","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115873536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Core banking system implementation proposal 核心银行系统实施方案
Pub Date : 2022-04-30 DOI: 10.18844/gjit.v12i1.7434
Gjergji Mulla, Igli Tafa
The purpose of this article is to provide an analysis and a methodology for the implementation of a new CCBS (Centralized Core Banking System) for a Retail Bank. This article has been written based on the highest evaluation standard set by institutions like World Bank for such systems implementation. The scope of work, that will be defined in this article identifies all components and work required for the proposed implementation under this article. The proposed CCBS solution will be implemented based on a phased approach implementation methodology. The implementation team will undertake a confirmatory analysis of functionality during the Inception Reporting period and also illustrate how data will be migrated from the legacy systems into the new CCBS. Banking IT personnel will receive advanced administration training to become experts on subjects matter for using and administrating this product so they can act as the first line of support to the bank.Keywords: Core Banking; Digital payments; Training.
本文的目的是为零售银行的新CCBS(集中式核心银行系统)的实施提供分析和方法。本文是根据世界银行等机构对此类系统实施设定的最高评估标准编写的。将在本文中定义的工作范围确定了本文所建议的实现所需的所有组件和工作。拟议的CCBS解决方案将基于分阶段的方法实施。实现团队将在初始报告期间对功能进行验证性分析,并说明如何将数据从遗留系统迁移到新的CCBS中。银行IT人员将接受高级管理培训,成为使用和管理该产品的专家,从而成为银行的第一线支持人员。关键词:核心银行;数字支付;培训。
{"title":"Core banking system implementation proposal","authors":"Gjergji Mulla, Igli Tafa","doi":"10.18844/gjit.v12i1.7434","DOIUrl":"https://doi.org/10.18844/gjit.v12i1.7434","url":null,"abstract":"The purpose of this article is to provide an analysis and a methodology for the implementation of a new CCBS (Centralized Core Banking System) for a Retail Bank. This article has been written based on the highest evaluation standard set by institutions like World Bank for such systems implementation. The scope of work, that will be defined in this article identifies all components and work required for the proposed implementation under this article. The proposed CCBS solution will be implemented based on a phased approach implementation methodology. The implementation team will undertake a confirmatory analysis of functionality during the Inception Reporting period and also illustrate how data will be migrated from the legacy systems into the new CCBS. Banking IT personnel will receive advanced administration training to become experts on subjects matter for using and administrating this product so they can act as the first line of support to the bank.\u0000Keywords: Core Banking; Digital payments; Training.","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session hijacking vulnerabilities and prevention algorithms 会话劫持漏洞及防范算法
Pub Date : 2022-04-30 DOI: 10.18844/gjit.v12i1.7749
Elira Hoxha, Igli Tafa, Kristi Ndoni, Islam Tahiraj, Andrea Muco
The concept of Internet security is studied by computer science as a safe medium for exchanging data while minimizing the likelihood of online threats. The extensive use of advanced web-based software in different industries such as education, retail, medical care, and payment systems, represents a security challenge for the programmers and an opportunity for the hackers to attack through session hijacking. Based on recent OWASP guidelines, this kind of attack is indeed one of the most frequent attacks that happens lately. Session hijacking happens as a result of poorly designed websites and a lack of security mechanisms, where the user's identity and session data are exposed. This paper will present this kind of vulnerability with the respective control mechanisms and will propose an approach for avoiding hijacking threats by using one-time cookies along with other prevention strategies.   Keywords:  session hijacking, vulnerability, one-time cookies.
计算机科学研究了互联网安全的概念,将其作为交换数据的安全媒介,同时将在线威胁的可能性降至最低。先进的基于web的软件在教育、零售、医疗和支付系统等不同行业的广泛使用,对程序员构成了安全挑战,也为黑客通过会话劫持进行攻击提供了机会。根据最近的OWASP指导方针,这种攻击确实是最近发生的最频繁的攻击之一。会话劫持的发生是由于网站设计不良和缺乏安全机制,用户的身份和会话数据被暴露。本文将介绍这类漏洞及其相应的控制机制,并将提出一种通过使用一次性cookie以及其他预防策略来避免劫持威胁的方法。关键词:会话劫持,漏洞,一次性cookie。
{"title":"Session hijacking vulnerabilities and prevention algorithms","authors":"Elira Hoxha, Igli Tafa, Kristi Ndoni, Islam Tahiraj, Andrea Muco","doi":"10.18844/gjit.v12i1.7749","DOIUrl":"https://doi.org/10.18844/gjit.v12i1.7749","url":null,"abstract":"The concept of Internet security is studied by computer science as a safe medium for exchanging data while minimizing the likelihood of online threats. The extensive use of advanced web-based software in different industries such as education, retail, medical care, and payment systems, represents a security challenge for the programmers and an opportunity for the hackers to attack through session hijacking. Based on recent OWASP guidelines, this kind of attack is indeed one of the most frequent attacks that happens lately. Session hijacking happens as a result of poorly designed websites and a lack of security mechanisms, where the user's identity and session data are exposed. This paper will present this kind of vulnerability with the respective control mechanisms and will propose an approach for avoiding hijacking threats by using one-time cookies along with other prevention strategies. \u0000  \u0000Keywords:  session hijacking, vulnerability, one-time cookies.","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134014305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Digital HR: A study on how game-based assessments can attract talents 数字人力资源:关于基于游戏的评估如何吸引人才的研究
Pub Date : 2022-04-30 DOI: 10.18844/gjit.v12i1.6941
Uğur Gürbüz, Mine Afacan Fındıklı, Sebnem Özdemir
Today, “Talent Gap” poses as one of the biggest problems in the business world. As the ratio of this talent gap increases, so too does the desperation of businesses to alleviate this problem. This study aims to answer the research problem defined as, “Does using game-based assessment provide an advantage to companies in the war of attracting and retaining young talents?” To answer this, the aptitudes and perspectives of 35 candidates towards the companies in terms of some criteria were measured by means of Analytic Hierarchy Process. In conclusion, this study shows that the companies, offering game based assessment, witnessed a 72 percent more advantageous situation than companies offering traditional assessment tests. Keywords: Game Based Assessment, Traditional Assessment, Digital HR, Talent Acquisition
如今,“人才缺口”已成为商界最大的问题之一。随着这一人才缺口比例的增加,企业也越来越迫切地想要缓解这一问题。本研究旨在回答“在吸引和留住年轻人才的战争中,使用基于游戏的评估是否为公司提供了优势”这一研究问题。为了回答这个问题,通过层次分析法测量了35名候选人对公司的一些标准的能力和观点。总之,这项研究表明,提供基于游戏的评估的公司比提供传统评估测试的公司多获得72%的优势。关键词:基于游戏的考核,传统考核,数字化人力资源,人才获取
{"title":"Digital HR: A study on how game-based assessments can attract talents","authors":"Uğur Gürbüz, Mine Afacan Fındıklı, Sebnem Özdemir","doi":"10.18844/gjit.v12i1.6941","DOIUrl":"https://doi.org/10.18844/gjit.v12i1.6941","url":null,"abstract":"Today, “Talent Gap” poses as one of the biggest problems in the business world. As the ratio of this talent gap increases, so too does the desperation of businesses to alleviate this problem. This study aims to answer the research problem defined as, “Does using game-based assessment provide an advantage to companies in the war of attracting and retaining young talents?” To answer this, the aptitudes and perspectives of 35 candidates towards the companies in terms of some criteria were measured by means of Analytic Hierarchy Process. In conclusion, this study shows that the companies, offering game based assessment, witnessed a 72 percent more advantageous situation than companies offering traditional assessment tests. \u0000Keywords: Game Based Assessment, Traditional Assessment, Digital HR, Talent Acquisition","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123032209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Global Journal of Information Technology: Emerging Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1