Search results
1 – 10 of over 2000Dianne Chambers and Richard G. Berlach
This chapter focuses on the increasing use of both assistive technology (AT) and teacher assistants (TAs) to support students with disabilities within the inclusive classroom, and…
Abstract
This chapter focuses on the increasing use of both assistive technology (AT) and teacher assistants (TAs) to support students with disabilities within the inclusive classroom, and why it is vital that teacher assistants have appropriate training in the area of AT. A description of assistive technology and its role in inclusion of students with special needs is provided along with a description of training in assistive technology that was undertaken with teacher assistants. Implications for training and support of teacher assistants in the area of assistive technology are also discussed.
Details
Keywords
Shannon Stuart and Kris Van Handel
This chapter presents ways in which educators can use technology to enhance learning for students with autism spectrum disorder (ASD). The chapter begins with an overview of the…
Abstract
This chapter presents ways in which educators can use technology to enhance learning for students with autism spectrum disorder (ASD). The chapter begins with an overview of the communicative and social challenges that students with ASD typically experience. Next, it defines technology-aided instruction and intervention (TAII) and offers suggestions for educators planning to incorporate TAII into their classroom. The third section offers specific supports on using TAII to enhance communication while the final section offers specific supports on using TAII to enhance affective and social learning. Case studies and tables with clearly defined supports are included throughout the chapter. Educators may combine the supports presented because each support addresses more than one characteristic or need. In addition, educators will find that these supports benefit students with neurodiverse learning needs who may not be identified with ASD.
Details
Keywords
The “4th Industrial Revolution” is characterized by a rapidly developing integration of digital technology and “cyber-physical” capability. Diffusion of open source technology has…
Abstract
The “4th Industrial Revolution” is characterized by a rapidly developing integration of digital technology and “cyber-physical” capability. Diffusion of open source technology has been cited by security and policing theorists, who note an emerging array of technology-enabled challenges to status quo security regimes. What characteristics define post-industrial crime, and how do post-industrial criminal methods challenge industrial-era security and policing regimes? This chapter opens with an overview of the “4th Industrial Revolution” and its theoretic challenges to conventional security and crime controls. Several pathways of impact are defined in terms of their challenges to industrial-era security, policing, and social controls, and in the complications posed by expanding state countermeasures to combat them. The chapter describes a series of practical, legal, ethical, and technical challenges to be considered for policing and security policy as the 4th Industrial Revolution proceeds.
Details
Keywords
Introduction: Digitalization has become crucial in our daily lives. The rapid rise of new technologies and high interest levels of individuals enforces companies to invest in…
Abstract
Introduction: Digitalization has become crucial in our daily lives. The rapid rise of new technologies and high interest levels of individuals enforces companies to invest in these technologies. Nowadays, as customers are willing to try new experiences, companies dynamically start to find new ways to develop their products and services. One of the most popular technologies used by companies to improve their services is the Internet of Things (IoT) technologies. Education, health, transportation, retail, and energy are some of the industries in which the IoT is frequently being used. As security concerns of individuals arose and willingness to remote control increases, innovative and technological projects with IoT applications are engaged in the construction and real estate sector.
Aim: The purpose of this chapter is to explore IoT applications within the new generation smart home systems. In this framework, the effect of IoT technologies on architectural structure of the smart home and operating systems as well as IoT and mobile-supported customer-focused applications and difficulties are analyzed.
Method: The study is designed as an exploratory study. The data are obtained from face-to-face interviews with companies operating on technology-based commercial and residential projects. Descriptive analysis method is used to analyze data. Sample selection was carried out by the judicial sampling technique.
Findings: The results showed that smart home systems offer several customer-oriented experiences to their users like personalized accessibility, comfort, time control, and energy savings. Wired and wireless communication protocols are included in the architecture of the system. Linux core software-based Android and iOS operating systems are used in order to enhance personal accessibility. However, some difficulties are noticed in the sector. Lack of information and internet infrastructure of companies that install electrical set-up are mentioned. Contractors, after sales service support, and customer-oriented applications are evaluated.
Details
Keywords
Syahril Efendi, Baihaqi Siregar and Heru Pranoto
Innovation in a decentralized blockchain infrastructure can be used by medicine as a prerequisite for the exchange of patient data. Developments in the medical device industry…
Abstract
Innovation in a decentralized blockchain infrastructure can be used by medicine as a prerequisite for the exchange of patient data. Developments in the medical device industry that support the technology of the internet of things and wireless sensor networks also facilitate the examination of patient medical records that no longer require visits to the practice of doctors or hospitals which in some cases takes in a considerable time. Not to mention the consideration of traffic congestion and busy routine in the work. Patients can check their healthcare concerns using only sensors such as e-Health Sensor Shield Platform which then sends recording results through the transmission line to the data lakes. However, this patient’s medical record data is very confidential and may only be accessed by certain parties only. This required the design of the concept of security in the transmission of data so that the data does not leak to parties who are not eligible. This paper attempts to provide an overview of the concept of using encryption with an asymmetric key for securing data from sensors to data lakes before forwarding to a decentralized, interconnected blockchain infrastructure.
Details
Keywords
The objective of this chapter is to identify the key characteristics of Global Services businesses that will thrive and achieve success in the future. These factors are integrated…
Abstract
The objective of this chapter is to identify the key characteristics of Global Services businesses that will thrive and achieve success in the future. These factors are integrated into three main pillars, which we refer to as the Triple-Win. The first and most obvious pillar is technology as a tool. The second pillar is the design and sustainability of the business model, without which the previous factor would be merely a cost and not an investment. And last but not the least, there is the purpose which gives meaning to the proposal, focusing on the human being and their environment. The DIDPAGA business model sits at the intersection of these three elements.
Details
Keywords
Anshu Aradhna, Saurabh Kumar and Arvind Kumar Shukla
Purpose: Progression is an unpreventable reality of presence, and banking is no exclusion. Cash transformers and moneylenders from times gone past are great agents today. Cash…
Abstract
Purpose: Progression is an unpreventable reality of presence, and banking is no exclusion. Cash transformers and moneylenders from times gone past are great agents today. Cash held in trust became store taking, and money advancing became credit making; over an extended time, banks transformed into a need, and the occupation of banks, transformed into a critical piece of monetary reality. Banks’ turn of events and headway has been mind-boggling, with the latest frenzy being intuitive media banking. The chapter additionally framed the amazing open doors and dangers for banks because of the presentation of innovations and how banks are making the most of the open doors and endeavouring to cure the risks. The financial area in India is a lifesaver for the country. Indian banks could become the fifth most prominent on earth by 2020 and the third most prominent by 2025.
Methodology: This study has given auxiliary information. Furthermore, it’s gathered from the holding bank of India concerning utilisation by various banks. Which utilised graphic review including mean mode middle.
Finding: After the review, we find that sight, sound, and green banking have become fantastic assets for the baking area. During COVID-19, the utilisation of mixed media expanded in contrast to a year ago.
Significance: The review featured sight and sound and green banking sealed spine in COVID -19 and is utilised expanded after this pandemic.
Details
Keywords
Letícia Mendonça Lopes Ribeiro
This study aimed to analyze the most common child’s play of students (approximately seven years old) both during the playtime and the time they are not at school, also considering…
Abstract
This study aimed to analyze the most common child’s play of students (approximately seven years old) both during the playtime and the time they are not at school, also considering the teacher’s interpretation of the child’s play practiced in the school, located in a small slum of the metropolitan area of Belo Horizonte. In this way, the analysis considered the issues that involve the recognition of the essentiality of childhood (Dahlberg, Moss, & Pence, 2003; Sarmento, 2007), in the context of the reality and affectivity of children in the place called slum (Coelho, 2007; Perez & Jardim, 2015, Tuan, 1983), as well as in aspects that demonstrate the control of their bodies through the child’s play performed in the school (Brighente & Mesquida, 2011; Foucault, 2009). As a methodological basis, participant observation was chosen because it was believed that from this practice it was possible to extract important experiences and reflections from the research participants, know our actions and, by observing these people, their behaviours and attitudes in routine situations (Lüdke & André, 1986). The results suggested that the slum children’s play, both in school and outside, are different among boys and girls. In the open areas of the slum, the boys explore more spaces than girls, who prefer child’s play in the domestic sphere. At school, educators try to censure some behaviours and attitudes of children, suggesting the pursuit of obedient postures and disciplined bodies. In this context, it is crucial that educators do not convert the school into a place of censorship of the child’s play that resides in the slums and thus transforming the school into a space that reinforces the domestication of bodies from the earliest stages of childhood.
Details