scholarly journals Anytime Autonomous English MALL App Engagement

Author(s):  
Jason Byrne

Mobile assisted language learning (MALL) apps are often said to be 'Anytime' activities. But, when is 'Anytime' exactly? The objective of the paper is to provide evidence for the when of MALL activity around the world. The research method involved the collection and analysis of an EFL app’s time data from 44 countries. The findings were surprising in the actual consistency of usage, 24/7, across 43 of the 44 countries. The 44th country was interesting in that it differed significantly in terms of night time usage. The research also noted differences in Arab, East Asian and Post Communist country usage, to what might be construed to be a general worldwide app time usage norm. The results are of interest as the time data findings appear to inform the possibility of a potentially new innovative pedagogy based on an emerging computational awareness of context and opportunity, suggesting a possible future language learning niche within the Internet of Things (IoT), of prompted, powerful, short-burst, mobile learning.

Author(s):  
C.K. Gomathy ◽  
Priya, G G Lasya ◽  
Hemanth Kumar

Over the past few years we can see there is an occurrence of floods at different parts of the world almost every year. The technical advancements in recent years have made it easier to get a solution for these natural disasters. One of such technologies which takes us much closer to the internet is the “Internet of Things”. This paper consists of flood detection and avoidance system using the iot technology. The sensors present in this are used to estimate the water levels, humidity, and temperature and send the real-time data to the cloud and the users can access the data via the mobile app. This model is widely used to alarm the people before a flood occurs and necessary precautions could be taken.


2020 ◽  
Vol 9 (2) ◽  
pp. 136-138 ◽  
Author(s):  
Md. Siddikur Rahman ◽  
Noah C. Peeri ◽  
Nistha Shrestha ◽  
Rafdzah Zaki ◽  
Ubydul Haque ◽  
...  

Author(s):  
Wendy W. Fok ◽  

Minerva Tantoco was named New York City’s first chief technology officer last year, charged with developing a coordinated citywide strategy on technology and innovation. We’re likely to see more of that as cities around the country, and around the world, consider how best to use innovation and technology to operate as “smart cities.”The work has major implications for energy use and sustainability, as cities take advantage of available, real-time data – from ‘smart’ phones, computers, traffic monitoring, and even weather patterns — to shift the way in which heating and cooling systems, landscaping, flow of people through cities, and other pieces of urban life are controlled. But harnessing Open Innovation and the Internet of Things can promote sustainability on a much broader and deeper scale. The question is, how do you use all the available data to create a more environmentally sound future? The term “Internet of Things” was coined in 1999 by Kevin Ashton, who at the time was a brand manager trying to find a better way to track inventory. His idea? Put a microchip on the packaging to let stores know what was on the shelves.


Author(s):  
Leila Zemmouchi-Ghomari

Industry 4.0 is a technology-driven manufacturing process that heavily relies on technologies, such as the internet of things (IoT), cloud computing, web services, and big real-time data. Industry 4.0 has significant potential if the challenges currently being faced by introducing these technologies are effectively addressed. Some of these challenges consist of deficiencies in terms of interoperability and standardization. Semantic Web technologies can provide useful solutions for several problems in this new industrial era, such as systems integration and consistency checks of data processing and equipment assemblies and connections. This paper discusses what contribution the Semantic Web can make to Industry 4.0.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


2020 ◽  
Vol 7 (1) ◽  
pp. 22-28
Author(s):  
Vladimir Eliseev ◽  
Anastasiya Gurina

  Abstract— The paper investigates the causes of widespread use by cybercriminals of the Internet of Things for organizing network attacks and other illegal use. An analysis of existing approaches and technologies for protecting networked computer devices is presented, as well as the main factors that prevent their use in the world of Internet of Things. An approach is suggested that ensures the integration of protective mechanisms directly into the composition of Things. Various variants of technology implementation are considered. Key aspects and potential ways of implementing the proposed approach are noted.Tóm tắt— Bài báo nghiên cứu về các phương thức được tội phạm mạng sử dụng rộng rãi trong Internet vạn vật (IoT), để tổ chức các tấn công mạng và các hành vi bất hợp pháp khác. Bài báo phân tích các phương pháp và công nghệ hiện có để bảo vệ các thiết bị kết nối mạng, cũng như các yếu tố chính để ngăn chặn việc sử dụng chúng trong IoT. Cách tiếp cận được đề xuất là đảm bảo việc tích hợp các cơ chế bảo vệ trực tiếp vào cấu trúc của IoT. Bài báo cũng xem xét các biến thể khác của việc thực hiện công nghệ này. Từ đó, đưa ra lưu ý về các khía cạnh chính và cách thức cài đặt tiềm năng để thực hiện phương pháp được đề xuất. 


2022 ◽  
pp. 168-180
Author(s):  
Sasikumar Gurumoorthy ◽  
L. Venkateswara Reddy ◽  
Sudhakaran Periakaruppan

Art colonnades and museums all over the world are the first option for individuals to visit for the enhancement of the cultural life of people. To ensure their safety, museums have established numerous cultural security measures. Traditional strategies do not obstruct their pace entirely. They only use a computer in the museum to check individuals at the entrance and exit. Therefore, the authors proposed a gallery anti-stealing device created on the internet-of-things (IoT) technology that ensures security through passive readers/writers of RFID. Radio frequency identification (RFID) remains a system that practices isolated data storing and recovery and offers object tracking with a unique identity code. The system then sends sound and light warning information, while the photographic camera structure is triggered to capture a picture at the same time. The recognition of the accuracy in the hardware component of the device can be additionally enhanced by the use of this technology to increase the safety of museum equipment.


2022 ◽  
pp. 67-89
Author(s):  
Shanru Yang

In a mobile society where information and knowledge become accessible to anyone, anywhere, and anytime on the internet, online education has been transformed fundamentally. By the end of 2020, Mandarin Chinese was taught to over 20 million people in over 180 countries around the world. By critically reviewing 15 recent studies from 2013 to 2021 on mobile-assisted language learning (MALL) in teaching and learning Chinese as a second or foreign language (CSL/CFL), this chapter emphasizes the need for pedagogical diversity in goals, practices, and context. In the second theme of ‘connectivity', the new theory of online education connectivism is applied to evaluate the official Chinese language learning mobile app named ‘e-Learn Chinese'. In the final theme of ‘sustainability', it demonstrates an ecosystem of MALL through an ecological perspective based on a critical discussion of the mostly reviewed ten mobile language learning apps, which could innovate sustainable pedagogies in a life-long learning society.


Author(s):  
Patrice Seuwou ◽  
Vincent F. Adegoke

The opportunities offered by digital technology are enormous. The global social and economic system is being reconfigured at an incredible rate. Connectivity is increasingly reshaping our world and redefining the way we interact with our environment. The rise of digital technologies is transforming almost every aspect of modern life. More and more of our interactions are mediated by machines. Along with the rapid evolution comes the risks, threats, and vulnerabilities in the system for those who plan to exploit it. In this chapter, firstly, the authors explore the role of 5G, big data, the internet of things (IoT), artificial intelligence (AI), autonomous vehicles (AV), and cloud computing play in the context of smart societies; secondly, they analyse how the synergy between these technologies will be used by governments and other stakeholders around the world to improve the safety of citizens albeit increasingly relinquishing privacy rights and encouraging mass surveillance at the expense of liberty.


Sign in / Sign up

Export Citation Format

Share Document