Help ?

IGMIN: あなたがここにいてくれて嬉しいです. お願いクリック '新しいクエリを作成してください' 当ウェブサイトへの初めてのご訪問で、さらに情報が必要な場合は.

すでに私たちのネットワークのメンバーで、すでに提出した質問に関する進展を追跡する必要がある場合は, クリック '私のクエリに連れて行ってください.'

科学、技術、工学、医学(STEM)分野に焦点を当てています | ISSN: 2995-8067  G o o g l e  Scholar

logo image

IgMin Research | マルチディシプリナリーオープンアクセスジャーナルは、科学、技術、工学、医学(STEM)の広範な分野における研究と知識の進展に貢献することを目的とした権威ある多分野のジャーナルです.

Engineering

Technology and Society at IgMin Research | Engineering Group

私たちの使命は、学際的な対話を促進し、広範な科学領域にわたる知識の進展を加速することです.

について

Exploring the Nexus of Progress and Impact

In an era defined by rapid technological advancement, the relationship between Technology and Society stands at the forefront of human experience. This segment of IgMin Research endeavors to decipher the multifaceted influences of technology on the social, cultural, ethical, and economic dimensions of our lives. By dissecting the ethical dilemmas, digital divide, and socio-political ramifications, we navigate the path to a more holistic understanding of the digital age.

  • Ethical Considerations in Technological Advancement
  • Digital Divide and Technological Inequality
  • Socio-Cultural Impacts of Technology
  • Privacy and Security in the Digital Age
  • Technological Determinism and Social Change
  • Artificial Intelligence and Society
  • Digital Citizenship and Online Behavior
  • Information Overload and Media Literacy
  • Technology and Education
  • E-Governance and Civic Participation
  • Social Media and Networked Societies
  • Technology's Role in Healthcare Systems
  • Environmental Impacts of Technological Innovation
  • Cultural Preservation in a Digital World
  • Human-Machine Interaction and Ethics
  • Technological Impact on Work and Employment
  • Technological Innovations in Developing Societies
  • Socio-Economic Effects of Automation
  • Technology
  • Democracy
  • and Governance
  • Technological Challenges in Global Health
  • Social Implications of Biotechnology
  • Digital Transformation and Business Models
  • Technological Influence on Arts and Culture
  • Case Studies in Technology and Society Dynamics
  • Emerging Trends in Tech-Society Interface

Engineering Group (10)

Review Article Article ID: igmin250
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

Artificial Intelligence & the Capacity for Discrimination: The Imperative Need for Frameworks, Diverse Teams & Human Accountability
by Destiny J Hunter

The increasing integration of Artificial Intelligence (AI) in various industries has led to concerns about how these systems can perpetuate discrimination, particularly in fields like employment, healthcare, and public policy. Multiple academic and business perspectives on AI discrimination, focusing on the need for global policy coordination and ethical oversight to mitigate biased outcomes, ask for our technical innovators to create contingencies that will better protect humanity’s experience with AI’s ever-expanding reach. Centra...l to the key constructs such as biased datasets, algorithmic transparency, and the global governance of AI systems can function as a harmful drawback to these systems. Without adequate data governance and transparency, AI systems can perpetuate discrimination. AI's ability to discriminate stems primarily from biased data and the opacity of machine learning models, necessitating proactive research and policy implementation on a global scale. These frameworks must transcend the limitations of the experiences or perspectives of their programmers to ensure that AI innovations are ethically sound and that their use in global organizations adheres to principles of fairness and accountability. This synthesis will explore how these articles advocate for comprehensive, continuous monitoring of AI systems and policies that address both local and international concerns, offering a roadmap for organizations to innovate responsibly while mitigating the risks of AI-driven discrimination.

Technology and Society
Review Article Article ID: igmin247
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

Use of Extraterrestrial Resources and Recycling Water: Curb Your Enthusiasm
by Donald Rapp

The NASA approach for technology development for missions is to (1) wait for a mission need, and (2) upgrade the technology available at that time, however inadequate. This is illustrated with two important NASA technologies: in situ resource utilization (ISRU) and recycling wastewater. It also serves as a review with 49 references provided. NASA funding for ISRU has been sporadic and minimal, probably because no mission was being implemented that used ISRU. The state of the technology remains underdeveloped. For example, CO2 in the M...ars atmosphere supplies carbon and oxygen. However, we still do not have a viable system to acquire CO2 and compress it with acceptable power requirements and adequate lifetime.NASA technology for recycling wastewater was developed for the International Space Station. It requires frequent attention with replenishment and replacement of subsystems. This system appears to be inadequate for Mars missions and there is no evidence that NASA has a viable plan to fix that.

Technology and Society RoboticsMaterials Science
Review Article Article ID: igmin176
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

The Dibia in Igbo Traditional Socio-political and Metaphysical Economy: An Interrogation
by Kingsley Okoro and Kenneth Igbo Nwokike

This work is carried out to fill the epistemic and hermeneutical gap within Igbo socio-metaphysical space. Notable works have been done in Igbo studies, however, the place of the Dibia in Igbo ontology has been neglected, hence the current work. The researchers combined library and fieldwork approaches in executing this work. In the end, the research notes that modern Igbo people have neglected the place and activities of the Dibia. Noting that the Dibia being the active presence of the God[s] among the people is an indispensable persona in the... Igbo existence. Therefore, the current crisis of relevance the people are experiencing is a result of this neglect. The works, therefore, conclude that if the Dibia and her activities are brought back to the centre stage of Igbo existence, the socio-political and economic crises of the moment would have been a history.

Technology and Society
Research Article Article ID: igmin169
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

Cyber Threat Analysis (CTA) in Current Conflicts
by Zbigniew Ciekanowski and Sławomir Żurawski

Cyber Threat Analysis (CTA) in current conflicts focuses on identifying, monitoring, and assessing potential cyber threats. The main objective is to understand how the parties to the conflict use information and network technologies to conduct warfare, espionage, disinformation, or attacks on digital infrastructure. This analysis includes the identification of actors involved in conflicts and their targets in cyberspace, as well as the analysis of techniques and tools used in cyber activities. The aim of the article is to identify the role of c...yber threat analysis in the context of two current conflicts - the war in Ukraine and the Hamas attack on Israel. The article describes the essence of cyber threat analysis. The research problem focuses on identifying and understanding the role of cyber threat analysis in these conflicts and their potential consequences for international security and regional stability. Through the analysis of reports, online sources, and scientific literature, the article aims to familiarize readers with the role of cyber threat analysis in the context of these conflicts and to propose possible strategies for cyber risk management in the face of contemporary armed conflicts. The results of the analysis of cyber threats (CTA) in current conflicts include the identification of specific actors operating in cyberspace, their modus operandi, their objectives, and the techniques and tools used. In addition, the analysis can reveal existing vulnerabilities in digital security and areas that are particularly vulnerable to attacks. To sum up, it is necessary to create recommendations and directions for changes regarding the strengthening of digital security measures, such as software updates, implementation of network security, and increasing staff awareness of cyber threats. In addition, the CTA may suggest the need for better international cooperation to combat cyber threats and the need to develop strategies to prevent and respond to cyber-attacks.

Information Security Technology and SocietyNetwork Security
Mini Review Article ID: igmin156
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

The University Sector is Converging on Manufacturing in UK
by Kevin Kendall

Many UK inhabitants now adopt careers working in both university and manufacturing sectors. In a typical engineering career, a young student may now start at university, spend time in factories, often in research and development, and then return to university in later life to teach evolving innovation principles of industry. It is clear to such people that universities are expanding rapidly whereas manufacturing has declined and reached an equilibrium of output but with lower job numbers due to robotics. Manufacturing in 2022 was approximately ...8% of British GDP whereas the university sector was only about 2%. This paper analyses the growing connections and co-locations with numerous universities/manufacturing companies, predicting that convergence in both jobs and GDP contribution will occur around 2050.

Technology and Society Materials ScienceEducational Technology
Research Article Article ID: igmin132
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

Methodology of the Professional-Business Game for the Development of a Cadet Leader in Professional Training Courses (L-1B) of the Tactical Level of Military Education
by Igor Kozubtsov

The aim of the study is to develop a methodology for a professional-business game for the development of a cadet leader in professional training courses (L-1B) of the tactical level of military education on the example of teaching the discipline “Combat use of military communication systems and complexes”. After all, the most important prerequisite for the combat potential of the Armed Forces of Ukraine is a comprehensively trained officer-leader, his consciousness, knowledge, skills, military-technical qualifications, creative and ...innovative activity, developed emotional and volitional sphere of the psyche, beliefs, motivation, and ideals. The article summarizes the research on the state of development of a cadet leader in Ukraine. In the context of a full-scale war, there is a need to strengthen the development of the personality of a cadet leader (a future officer of the tactical level of military education). Today’s cadet-leader is tomorrow’s officer-leader, capable of integrating knowledge and solving complex problems in new or unfamiliar environments with incomplete or limited information, being a leader and authority for the personnel. Therefore, the scientific and practical task arises to consider aspects of the development of the personality of a cadet leader and to modernize the process of his development, for example, in the courses of professional military education L-1B (tactical level of military education) in terms of the disciplines of the Department of Combat Use of Communication Units. The periodization of cadets’ adaptation to the new educational space and service activities is considered, the optimal period of leader growth is determined, and the mechanism itself is proposed. The article separately identifies the key tasks for the selection of academic staff and admission to the educational process. The methodology of the professional and business game for the development of a cadet leader in professional training courses (L-1B) of the tactical level of military education is developed on the example of teaching the discipline “Combat use of military communication systems and complexes”. The scientific novelty of the work is the improved educational process of training and development of a cadet leader in professional training courses (L-1B) of the tactical level of military education by reformatting group classes in the traditional format into a professional business game for the positions of officers with the introduction of typical and atypical (force majeure) training tasks for cadets in everyday activities in new or unfamiliar environments in the presence of incomplete or limited information.

Educational Technology Technology and Society
Literature Review Article ID: igmin131
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

Educational Innovation amidst Globalization: Higher Education Institutions and Societal Integration
by Zainab Rasheed

The contemporary landscape of higher education resonates with the dynamic interplay of globalization’s monumental forces, cultural diversity, and transformative educational paradigms. This scholarly inquiry navigates the complex terrain of higher education institutions (HEIs) within the context of the United Arab Emirates (UAE), unraveling the intricate tapestry of educational challenges amidst globalization’s pervasive influence. The research embarks on an odyssey through a holistic examination of HEIs’ responses to global fo...rces, aiming to decipher the transformative journey and its implications for societal transformation. Globalization, a multifaceted phenomenon, has revolutionized higher education, driving a shift from traditional to diversified pedagogical models. However, this transformative journey presents a myriad of challenges and opportunities for HEIs. The study underscores the pivotal role of internationalization and cultural inclusivity in reshaping the educational landscape. Challenges faced by HEIs in adapting to globalized learning environments, reluctance to embrace cultural diversity, and limitations in fostering cross-cultural competencies among students emerge as focal points. This research contributes a novel perspective by delineating the barriers hindering the internationalization of educational settings, offering insights into strategies for fostering inclusive learning environments. Emphasizing the significance of embracing cultural diversity, the study recommends recalibrating institutional policies and practices. These findings resonate beyond academic discourse, influencing practical implications for real-world educational settings. In conclusion, this research emphasizes the imperative for HEIs to adapt and innovate in response to globalization, fostering inclusive learning environments to equip students with the requisite skills for navigating a diverse, interconnected world. Leveraging these insights, institutions can contribute to societal transformation and the holistic development of students, shaping a future aligned with global competencies and enriched cultural understanding.

Educational Technology Technology and Society
Review Article Article ID: igmin123
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

A Survey of Motion Data Processing and Classification Techniques Based on Wearable Sensors
by Xiaoqiong Xiong, Xuemei Xiong, Chao Lian and Keda Zeng

The rapid development of wearable technology provides new opportunities for action data processing and classification techniques. Wearable sensors can monitor the physiological and motion signals of the human body in real-time, providing rich data sources for health monitoring, sports analysis, and human-computer interaction. This paper provides a comprehensive review of motion data processing and classification techniques based on wearable sensors, mainly including feature extraction techniques, classification techniques, and future developmen...t and challenges. First, this paper introduces the research background of wearable sensors, emphasizing their important applications in health monitoring, sports analysis, and human-computer interaction. Then, it elaborates on the work content of action data processing and classification techniques, including feature extraction, model construction, and activity recognition. In feature extraction techniques, this paper focuses on the content of shallow feature extraction and deep feature extraction; in classification techniques, it mainly studies traditional machine learning models and deep learning models. Finally, this paper points out the current challenges and prospects for future research directions. Through in-depth discussions of feature extraction techniques and classification techniques for sensor time series data in wearable technology, this paper helps promote the application and development of wearable technology in health monitoring, sports analysis, and human-computer interaction.Index Terms: Activity recognition, Wearable sensor, Feature extraction, Classification

Data Mining Technology and SocietyMachine Learning
Mini Review Article ID: igmin121
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

The Educational Role of Cinema in Physical Sciences
by Maria Sagri, Denis Vavougios and Filippos Sofos

Cinema, apart from its entertaining prospect, can flourish knowledge in various fields of daily life and, in particular, in the understanding of the natural world. It could be even embedded in the educational system, at all levels, so as to convey concepts that may be difficult for students in an enjoyable and understandable way. In this mini-review, the educational dimension of the cinema and the related television series is discussed, through the presentation of concepts and phenomena relevant to the natural sciences that have been approached... with characteristic scenes of popular cinema movies of our times. We present case studies from physics and astronomy, mathematics, materials science, and engineering that can be easily embedded in the educational curriculum. Notwithstanding the fact that watching movies cannot replace the traditional educational method, it can pose as an alternative, complementary tool for educators.

Educational Technology Technology and Society
Research Article Article ID: igmin120
Cite

Open Access Policy refers to a set of principles and guidelines aimed at providing unrestricted access to scholarly research and literature. It promotes the free availability and unrestricted use of research outputs, enabling researchers, students, and the general public to access, read, download, and distribute scholarly articles without financial or legal barriers. In this response, I will provide you with an overview of the history and latest resolutions related to Open Access Policy.

A Comprehensive Methodology for Assessing the Business Reputation of Industrial and Production Personnel
by Filatov EA

The currently existing Russian and other legislation, as well as special literature, do not contain a methodology for the formation of the business reputation of the organization’s personnel and as a result, there is no unambiguous perception of the business, professional qualities of personnel as an object of evaluation of the organization in the market system. Therefore, it is impossible to single out the share of the results of intellectual advantage in the goods and services produced. This confirms the requirements formulated in para...graph 4 of Accounting Regulation 14/2007 «Accounting for intangible assets», which states that the intellectual and business qualities of the organization’s personnel, their qualifications, and their ability to work are not included in the intangible assets (since they are inseparable from their carriers and cannot be used without them). Meanwhile, the interests of the leading economically developed countries of the world lie in the field of accelerated growth of knowledge acquisition and application of professional skills. This trend of development of economically developed countries forms the basis of competitiveness and efficiency of their work. It should be noted that in the world economy, there is insufficient theoretical elaboration and a special practical significance and relevance of the issue of assessing the business reputation of the personnel of an economic entity. The article presents a comprehensive methodology for evaluating the performance of industrial and production personnel (the standard-production methodology), which contributes to the formation of accounting and information support for the analysis of the activities of both structural divisions, responsibility centers, business segments and commercial organizations as a whole. The author’s standard-production methodology makes it possible to determine the business reputation of industrial and production personnel, which contradicts the official economic paradigm.

Technology and Society Information SecurityData Mining