Proceedings of 7th ASRES International Conference on Intelligent Technologies: ICIT 2022, Jakarta, Indonesia 9819919118, 9789819919116

This book gathers the proceedings of the 7th International Conference on Intelligent Technologies (ICIT 2022) held on De

317 81 13MB

English Pages 362 [363] Year 2023

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Preface
Contents
Intelligent Electrical and Electronic Systems
Post Quantum Cryptography Algorithms: A Review and Applications
1 Introduction
2 Vulnerability of Classical Cryptosystems
3 Various PQC Algorithms
3.1 Hash Based Digital Signature Schemes
3.2 Code Based Schemes
3.3 Lattice Based Cryptosystems
3.4 Multivariate Public Key Cryptography Schemes
3.5 Chaos Based PQCs
4 Conclusion
References
Performance Analysis of Hetero-Dielectric Buried Oxide Double Gate Vertical TFET
1 Introduction
2 Architure of Device and Specifications
3 Simulation results and Discussion
3.1 DC Characteristics
3.2 Analog Characteristics
4 Conclusion
References
Biodigester Application to Generate Electricity and Improve the Quality of Life
1 Introduction
2 Literature Review
2.1 Biodigester
2.2 Biogás
2.3 Biol
3 Materials and Methods
3.1 Social Aspects
3.2 Environmental Aspects
4 Results
4.1 Location of the Proposal
4.2 Estimation of Energy Demand and Supply
4.3 Lines of Action
4.4 Scenery
5 Discussion
6 Conclusion
7 Recomendacione
References
Design and Analysis of Permanent Magnet Linear Generator Using FEM Based Software
1 Introduction
2 Permanent Magnet Linear Generator
2.1 Construction
2.2 Working
3 Designing PMLG in MAXWELL 2D
3.1 Designing of 2D Model
3.2 Results
4 Designing PMLG Prototype in Maxwell 3D
4.1 Designed Model
4.2 Results
5 Conclusion
References
Power Allocation for Non-orthogonal Multiple Access (PA-NOMA) Strategy Under Rayleigh Fading Channel and User Mobility
1 Introduction
2 System Model and Problem Formulation
2.1 Problem Formulation
3 Simulation Results
4 Conclusion
References
Comparative Analysis of Bridgeless Interleaved Boost PFC and Interleaved Boost PFC for 3.3 kW Battery Charger
1 Introduction
2 Interleaved Boost PFC (IB PFC)
2.1 Control Technique for IB PFC
2.2 Design Various Parameter of Interleaved Boost PFC
3 Bridgeless Interleaved Boost PFC
3.1 Working Operation of Bridgeless IB PFC
3.2 Control Technique for Bridgeless IB PFC
3.3 Design the Simulation Parameters of Bridgeless Interleaved Boost PFC
4 Simulation and Results
4.1 Simulation Model:
4.2 Simulation Results:
4.3 Comparison Between Interleaved Boost PFC and Bridgeless Interleaved Boost PFC
5 Conclusion
References
Modeling of Energy-Saving Technologies in Traction Rolling Stock Projects
1 Introduction
2 Formulation of the Problem
3 Research Materials
3.1 Methods of Modeling Energy-Saving Technologies
References
Support in the Neurorehabilitation for Older People Using a Mobile Application
1 Introduction
2 Research Background
3 Implementation
4 Results
5 Conclusions
References
Influencer Detection Through Social Network Analysis on Twitter of the Indonesian Smartphone Industry
1 Introduction
2 Literature Review
2.1 Influencer
2.2 Social Media
2.3 Social Network Analysis
2.4 Graph
2.5 Measurement of Influence
3 Methodology
3.1 Data Collection
3.2 Data Crawling and Data Cleansing
3.3 Data Preprocessing
3.4 Data Analysis
4 Analysis and Result
5 Conclusion
References
Intelligent Computational Systems
A Gaussian process regression-based Noise level Prediction technique for assisting Image Super-resolution
1 Introduction
1.1 Gaussian Process Regression (GPR)
2 The Proposed Work
2.1 Data Processing
2.2 Identification of Input and Output Features
2.3 Implementation of GNLP Model Based Image Noise Level Prediction Technique
3 Performance Evaluation and Result Discussion of the Proposed Technique
4 Conclusions and Future Work
References
Cross-Lingual Reverse Dictionary Using Multilingual mBART and mT5 Models
1 Introduction
2 Related Work
3 Methodology
3.1 Data Processing and Tokenization
3.2 Model Building for the Cross-Lingual Prediction
3.3 The Model Fine-Tuning
4 Experimental Setup
4.1 Dataset
4.2 Performance Evaluation Metrics
4.3 Hyper-Parameter Settings
5 Results and Analysis
6 Conclusion
References
Federated Learning for Wearable Sensor-Based Human Activity Recognition
1 Introduction
2 Methodology
2.1 Federated Learning
2.2 Transformer Model for Human Activity Recognition
3 Results and Discussion
3.1 Dataset
3.2 Implementation and Evaluation Details
4 Conclusion
References
Building Career Path Using Dijkstra’s Algorithm
1 Introduction
2 Literature Review
3 Problem Definition/Formulation
4 Method of Analysis
5 Results and Discussion
6 Conclusion
References
Research of Methods of Detecting Network Anomalies of Computer System Network States
1 Introduction
2 Research Materials
2.1 Mathematical Models of Detection of Network Anomalies
2.2 Algorithm for Solving the Problem of Detecting Network Anomalies
3 Ways to Solve the Problem of Packet Fragmentation
4 Conclusions
References
Face Super Resolution Through Face Semantic and Structural Prior
1 Introduction
2 Related Work
3 Proposed Work
3.1 Facial Semantic Attribute Transformation
3.2 Facial Structure Transformation
4 Performance Evaluation
5 Conclusion
References
Technological Coefficient to Improve Research Development and Innovation Factors in the World
1 Introduction
2 Methods and Materials
2.1 Factors, Dimensions, and Variables Aspects
2.2 Technological Coefficient (T)
2.3 Calculation of World Economic Forum indicators
2.4 Measured Variables
2.5 Statistical Design
2.6 Instruments
3 Results
4 Discussion
5 Conclusion
References
Pneumonia Detection Using Gradient Boosting on Selected Features Extracted from DenseNet
1 Introduction
2 Literature Review
3 Methodology
3.1 System Architecture
3.2 Data Augmentation
3.3 DenseNet-201
3.4 Feature Selection
3.5 Gradient Boosting Classifier
4 Results
4.1 Dataset
4.2 Evaluation Measures
4.3 Evaluation Description
4.4 Results and Discussion
5 Conclusions and Future Work
5.1 Conclusions
5.2 Future Work
References
Overview of Possible Applications for the Complex 3D Objects Restoration Technologies
1 Introduction
2 Watershed Transformation
3 Rapid-Batch Reconstruction
4 Simultaneous Localization and Mapping
5 Depth Mapping
6 Synthetic Data
7 Conclusion
References:
Prior Guided Face Super Resolution Using Convolution LSTM
1 Introduction
2 Literature Survey
3 Proposed Model
3.1 Loss Functions
4 Performance Evaluation
4.1 Dataset and Training Details
4.2 Experimental Results and Analysis
4.3 Comparison to Other SR Models
5 Conclusion
References
Metamorphic Cryptography Using Concept of Spiral Transposition and LSBs Approach Using Audio as Carrier Medium
1 Introduction
2 Proposed Work
2.1 Encryption Procedure.
2.2 Hiding Procedure (Steganography)
2.3 Unhiding Procedure
2.4 Decryption Procedure
3 Proposed Algorithm
3.1 Encryption-Hiding Algorithm
3.2 Unhiding-Decryption Algorithm
4 Results
5 Conclusion
References
Neural Network Strategies and Models for Voice Cloning in a Multi-speaker Mode: An Overview
1 Introduction
2 Methodology
2.1 Approach
2.2 Methods
2.3 Materials
3 Proposal
3.1 Architecture
4 Results
5 Conclusion
References
Automatic Chest Radiology Report Generation Using Reinforcement Learning
1 Introduction
1.1 Chest Anatomy
1.2 Radiology Report Structure
2 Literature Review
3 Problem Definition
4 Experimental Results
4.1 Dataset
4.2 Experimental Results Analysis
4.3 Comparative Analysis
5 Conclusions
References
A Machine Learning Approach for Segmentation and Classification of Brain Tumor Cells
1 Introduction
2 Motivation
3 Related Work
4 Methodology
4.1 Data Set Used
4.2 Pre-processing of Image
4.3 Image Segmentation
4.4 Feature Extraction
4.5 Convolution Neural Network
5 Proposed Framework
6 Results
7 Conclusion and Discussion
References
Three Stage Weighted-Mean Filter Using Euclidean Distance
1 Introduction
2 Proposed Work
2.1 Pre-Processing
2.2 Proposed Filter
2.3 Post-processing
3 Proposed Algorithm
4 Illustration of the Proposed Algorithm
5 Experimental Results
6 Conclusion
References
Extended Reality (XR) Environments for Flood Risk Management with 3D GIS and Open Source 3D Graphics Cross-Platform Game Engines: Advances in Immersive Sea Level Rise Planning Technologies for Student Learning and Community Engagement
1 Extended Reality for Sea Level Rise (SLR)
1.1 Extended Reality Overview
1.2 Augmented Reality (AR): Most Widespread SLR XR Technology
1.3 Virtual Reality (VR): Headsets and Haptic Feedback for SLR
1.4 Mixed Reality (MR): Virtual and Augmented Reality Hybrid
2 Serious Games for Disaster Relief (SGDR) and Flood Management
3 XR for Sea Level Rise Modeling in Hawaii
4 Results
References
Intelligent Mechanical Systems
Design of Eco-Friendly Road Cleaning Machine
1 Introduction
2 Literature Review
3 Problem Definition
4 Method of Analysis
4.1 Model Description
4.2 Calculations
4.3 Material Selection and Cost Estimation
5 Results and Discussion
6 Conclusion
References
Parkinson’s Disease Tremor Suppression Using Gyroscopic Effect
1 Introduction
2 Tremors in Parkinson’s Disease
3 Frequency Analysis of Tremors
3.1 Portable Mobile-based tool
4 Tremor Suppression Technique
4.1 Mathematical Modelling of Gyroscopic Wheel
4.2 Simulation of Gyroscope
5 Simulation Results
6 Conclusion
References
Vibration Analysis Method for Fault Diagnosis and Predictive Maintenance on Sporadic Operation Machinery
1 Introduction
2 Literature Review
3 Overview of Gear-Idler-Sprocket System
4 Proposed Method and Experiment Results
5 Conclusions
6 Future Works
References
Intelligent Social Systems
Preservation of Flora and Fauna in an Environmental Ecological Interpretation Center - Loreto – Peru
1 Introduction
2 Methodology
2.1 Subsection
2.2 Place of Study
2.3 Climatology
2.4 Flora and Fauna
3 Results
3.1 Project Location and Topography
3.2 Volumetric Proposal
3.3 Planimetry and Program
3.4 Materiality
3.5 Strategies Applied to the Project
4 Discussion
5 Conclusion
References
Communication and Technology into Product Design
1 Introduction
2 Methodology
3 Result and Discussion
4 Conclusion
References
How Current Chatbots Applications Impact Education: An Overview
1 Introduction
2 Definitions
3 Applications Approaches
3.1 Pattern Matching Approach
3.2 Pattern Matching Approach
4 Chatbot in Education
5 Best Practices
6 Methodology
6.1 Obtained Items
6.2 Analysis
7 Conclusion
References
The Role of Online Media to Improve Student Understanding in the Merdeka Belajar Kampus Merdeka Program
1 Introduction
2 Research Methods
2.1 Study Location
2.2 Data Analysis
3 Results and Analysis
4 Discussion
5 Conclusion
References
Technology and Children’s Books: Digital Talking Books as a Media for Communicating 21st-Century Skills
1 Introduction
2 Literature Review
3 Problem Definition/Formulation
4 Method
5 Results and Discussion
6 Conclusion
References
Recommend Papers

Proceedings of 7th ASRES International Conference on Intelligent Technologies: ICIT 2022, Jakarta, Indonesia
 9819919118, 9789819919116

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

Lecture Notes in Networks and Systems 685

Karm Veer Arya Vipin Kumar Tripathi Ciro Rodriguez Eddy Yusuf   Editors

Proceedings of 7th ASRES International Conference on Intelligent Technologies ICIT 2022, Jakarta, Indonesia

Lecture Notes in Networks and Systems Volume 685

Series Editor Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland Advisory Editors Fernando Gomide, Department of Computer Engineering and Automation—DCA, School of Electrical and Computer Engineering—FEEC, University of Campinas— UNICAMP, São Paulo, Brazil Okyay Kaynak, Department of Electrical and Electronic Engineering, Bogazici University, Istanbul, Türkiye Derong Liu, Department of Electrical and Computer Engineering, University of Illinois at Chicago, Chicago, USA Institute of Automation, Chinese Academy of Sciences, Beijing, China Witold Pedrycz, Department of Electrical and Computer Engineering, University of Alberta, Alberta, Canada Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland Marios M. Polycarpou, Department of Electrical and Computer Engineering, KIOS Research Center for Intelligent Systems and Networks, University of Cyprus, Nicosia, Cyprus Imre J. Rudas, Óbuda University, Budapest, Hungary Jun Wang, Department of Computer Science, City University of Hong Kong, Kowloon, Hong Kong

The series “Lecture Notes in Networks and Systems” publishes the latest developments in Networks and Systems—quickly, informally and with high quality. Original research reported in proceedings and post-proceedings represents the core of LNNS. Volumes published in LNNS embrace all aspects and subfields of, as well as new challenges in, Networks and Systems. The series contains proceedings and edited volumes in systems and networks, spanning the areas of Cyber-Physical Systems, Autonomous Systems, Sensor Networks, Control Systems, Energy Systems, Automotive Systems, Biological Systems, Vehicular Networking and Connected Vehicles, Aerospace Systems, Automation, Manufacturing, Smart Grids, Nonlinear Systems, Power Systems, Robotics, Social Systems, Economic Systems and other. Of particular value to both the contributors and the readership are the short publication timeframe and the world-wide distribution and exposure which enable both a wide and rapid dissemination of research output. The series covers the theory, applications, and perspectives on the state of the art and future developments relevant to systems and networks, decision making, control, complex processes and related areas, as embedded in the fields of interdisciplinary and applied sciences, engineering, computer science, physics, economics, social, and life sciences, as well as the paradigms and methodologies behind them. Indexed by SCOPUS, INSPEC, WTI Frankfurt eG, zbMATH, SCImago. All books published in the series are submitted for consideration in Web of Science. For proposals from Asia please contact Aninda Bose ([email protected]).

Karm Veer Arya · Vipin Kumar Tripathi · Ciro Rodriguez · Eddy Yusuf Editors

Proceedings of 7th ASRES International Conference on Intelligent Technologies ICIT 2022, Jakarta, Indonesia

Editors Karm Veer Arya Indian Institute of Information Technology and Management, Gwalior Gwalior, Madhya Pradesh, India Ciro Rodriguez Universidad Nacional Mayor de San Marcos Lima, Peru

Vipin Kumar Tripathi National Institute of Technology, Agartala Agartala, Tripura, India Eddy Yusuf University of Pembangunan Jaya, Jakarta Jakarta, Indonesia

ISSN 2367-3370 ISSN 2367-3389 (electronic) Lecture Notes in Networks and Systems ISBN 978-981-99-1911-6 ISBN 978-981-99-1912-3 (eBook) https://doi.org/10.1007/978-981-99-1912-3 © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023 This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore

Preface

Knowledge has no boundaries. When new knowledge is generated, the boundaries of disciplines of study cannot prevent its use in various disciplines. Research scholar always want to promote new technologies developed by them in new or unconventional fields of study. Therefore, the interdisciplinary and multi-disciplinary studies have attracted special interest of scholars. Intelligent techniques add smartness in analysis of a problem and functioning of a system. Intelligent techniques of computational analysis, statistical analysis, etc., are commonly used in the problems from different disciplines of engineering and science like electrical and electronics engineering, computer science and engineering, mechanical engineering, etc. During the period of spread of COVID-19, research scholars and teachers working in the fields like education, social sciences and humanities also explored the use of intelligent techniques for the solution of problems from these fields. This has opened a new area for application of intelligent technologies, which is very encouraging for the scholars working with these techniques. The content in this book is divided into different areas of applications of intelligent technologies. Chapter 1 includes studies related to intelligent electrical and electronic systems. Chapter 2 includes studies related to intelligent computational systems. Chapter 3 has studies related to intelligent mechanical systems. Chapter 4 includes interesting studies related to the new field of societal applications. Hope this book will give scholars an exposure to the new problems and boost the research in the field of techno-societal applications of intelligent technologies. Best wishes, Editors

v

Contents

Intelligent Electrical and Electronic Systems Post Quantum Cryptography Algorithms: A Review and Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bikram Paul and Gaurav Trivedi

3

Performance Analysis of Hetero-Dielectric Buried Oxide Double Gate Vertical TFET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Sudakar Singh Chauhan and Seema

19

Biodigester Application to Generate Electricity and Improve the Quality of Life . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Vanessa Raymundo, Doris Esenarro, Ciro Rodríguez, Susana Davila, Manuel Prado, and María Veliz

29

Design and Analysis of Permanent Magnet Linear Generator Using FEM Based Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Rushikesh R. Nakure and Archana G. Thosar

43

Power Allocation for Non-orthogonal Multiple Access (PA-NOMA) Strategy Under Rayleigh Fading Channel and User Mobility . . . . . . . . . . Sandeep Singh Rana, Gaurav Verma, and O. P. Sahu

55

Comparative Analysis of Bridgeless Interleaved Boost PFC and Interleaved Boost PFC for 3.3 kW Battery Charger . . . . . . . . . . . . . . . Mohan N. Patil and Archana G. Thosar

65

Modeling of Energy-Saving Technologies in Traction Rolling Stock Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Halyna Holub, Mykola Dmytrychenko, Ivan Kulbovskyi, and Svitlana Sapronova

77

vii

viii

Contents

Support in the Neurorehabilitation for Older People Using a Mobile Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ronaldo Velez-Villanueva, Hugo Vega-Huerta, Percy De-La-Cruz, Javier Gamboa-Cruzado, Ernesto Cancho-Rodriguez, and Adegundo Cámara-Figueroa Influencer Detection Through Social Network Analysis on Twitter of the Indonesian Smartphone Industry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Retiana Fadma Pertiwi Sinaga and Indra Budi

85

97

Intelligent Computational Systems A Gaussian process regression-based Noise level Prediction technique for assisting Image Super-resolution . . . . . . . . . . . . . . . . . . . . . . . 111 Deepak Rai and Shyam Singh Rajput Cross-Lingual Reverse Dictionary Using Multilingual mBART and mT5 Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Akshat Mangal, Santosh Singh Rathore, and K. V. Arya Federated Learning for Wearable Sensor-Based Human Activity Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 D. N. Sachin, B. Annappa, and Sateesh Ambesenge Building Career Path Using Dijkstra’s Algorithm . . . . . . . . . . . . . . . . . . . . 141 Tio Sampurno and Abdan Syakuro Research of Methods of Detecting Network Anomalies of Computer System Network States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 Halyna Holub, Olexsandr Gorobchenko, Volodymyr Muraviov, Iryna Hannoshyna, Yurii Lushchai, and Liudmyla Dovhopoliuk Face Super Resolution Through Face Semantic and Structural Prior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 Ninad Sunil Kalanke, Anurag Singh Tomar, K. V. Arya, Zoila Mercedes Collantes Inga, and Ciro Rodriguez Technological Coefficient to Improve Research Development and Innovation Factors in the World . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Roberto Santos, Paula Santos, Preeta Sharan, and Ciro Rodriguez Pneumonia Detection Using Gradient Boosting on Selected Features Extracted from DenseNet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 Shikhar Shukla, K. V. Arya, Bharat Garg, and Pedro Lezama Overview of Possible Applications for the Complex 3D Objects Restoration Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 Roman Dyachenko, Konstantin Savvidi, Dmitry Gura, and Jean Doumit

Contents

ix

Prior Guided Face Super Resolution Using Convolution LSTM . . . . . . . . 207 Niketan Mangulley, Anurag Singh Tomar, K. V. Arya, Yuri Pomachagua, and Ciro Rodriguez Metamorphic Cryptography Using Concept of Spiral Transposition and LSBs Approach Using Audio as Carrier Medium . . . . . . . . . . . . . . . . . 217 Munesh Chandra Trivedi, Sudeshna Das, Renu Prasad, and Ranjana Joshi Neural Network Strategies and Models for Voice Cloning in a Multi-speaker Mode: An Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 Marco Fura-Mendoza, Isabel Moscol-Albañil, Ciro Rodriguez, Pedro Lezama, Diego Rodriguez, and Yuri Pomachagua Automatic Chest Radiology Report Generation Using Reinforcement Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Mohit Kourav, Saurabh Agarwal, K. V. Arya, Ivan Petrlik, and Ciro Rodriguez A Machine Learning Approach for Segmentation and Classification of Brain Tumor Cells . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249 Nandita Goyal, Munesh C. Trivedi, Chinu Mog Choudhary, and Sonam Saluja Three Stage Weighted-Mean Filter Using Euclidean Distance . . . . . . . . . . 259 Mohit Soni, K. V. Arya, Bharat Garg, and Ivan Petrlik Extended Reality (XR) Environments for Flood Risk Management with 3D GIS and Open Source 3D Graphics Cross-Platform Game Engines: Advances in Immersive Sea Level Rise Planning Technologies for Student Learning and Community Engagement . . . . . . 271 Jason Levy and Dingyi Liu Intelligent Mechanical Systems Design of Eco-Friendly Road Cleaning Machine . . . . . . . . . . . . . . . . . . . . . . 289 Vipin K. Tripathi, Priyabrata Saha, Subham Jena, Jaggeeri Varun Raju, and P. Rohith Parkinson’s Disease Tremor Suppression Using Gyroscopic Effect . . . . . 299 Abhishek S. Bandsode and Archana G. Thosar Vibration Analysis Method for Fault Diagnosis and Predictive Maintenance on Sporadic Operation Machinery . . . . . . . . . . . . . . . . . . . . . . 311 Byounghee Kim, Sinwoo Song, Jeongsang Kim, and Hyokmin Yoon

x

Contents

Intelligent Social Systems Preservation of Flora and Fauna in an Environmental Ecological Interpretation Center - Loreto – Peru . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321 Doris Esenarro, Vanessa Raymundo, Diego Mancilla, Prinsel Becerra, María Loja, and Susana Dávila Communication and Technology into Product Design . . . . . . . . . . . . . . . . . 335 Donna Angelina Sugianto, Hari Nugraha, Zita Nadia, and Andrea Valerie How Current Chatbots Applications Impact Education: An Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345 Saroff Yataco-Irrazábal, Isabel Moscol-Albañil, Ciro Rodriguez, Pedro Lezama, Diego Rodriguez, and Yuri Pomachagua The Role of Online Media to Improve Student Understanding in the Merdeka Belajar Kampus Merdeka Program . . . . . . . . . . . . . . . . . . 355 Johannes Hamonangan Siregar, Edi Purwanto, Clarissa Katheline Tengkulung, Iffat Dwi Ananto, Richard Alpeus, and Daffa Nurhata Erlangga Technology and Children’s Books: Digital Talking Books as a Media for Communicating 21st-Century Skills . . . . . . . . . . . . . . . . . . . 369 Clara Evi C. Citraningtyas, Isti Purwi Tyas Utami, and Fathiya Nur Rahmi

Intelligent Electrical and Electronic Systems

Post Quantum Cryptography Algorithms: A Review and Applications Bikram Paul and Gaurav Trivedi

Abstract Recent development in the field of quantum computing pushed classical cryptosystem on the verge of serious security threat. Quantum cryptography employing quantum channel and post-quantum cryptography algorithms are two probable solutions to check the security problem. Among them post-quantum algorithms can be easily implemented on conventional computer systems and exhibit better resistant to classical as well as quantum computer based crypto-attacks and also can be realized using current VLSI technology. Hash, code, lattice or multivariate polynomial, chaotic dynamic system based cryptographic algorithms can be employed as cryptographic algorithms with optimal parameters such as key length, encryption speed etc. The choice of a suitable algorithm as per the requirement aids in the development of a robust system invincible against various malicious intrusion. Here a comparative study of various post quantum cryptography algorithms are presented along with our proposed lattice an chaotic dynamic system based encryption schemes. Keywords Quantum computing · post-quantum cryptography · security

1 Introduction With the advancement in the field of quantum computing, classical encryption algorithms such as RSA, DES, Deffie-Hellman, ECC, AES etc. cannot withstand attacks [12, 23] generated from it. Post Quantum Cryptography (PQC) [10] exhibits desired performance against the well-known quantum Shor [80] and Grover [33] algorithm employed to breach security algorithms. PQC algorithms can be categorized in different classes, viz., hash [24], code [30, 42, 53], lattice multivariate [18, 74, 86], chaos based cryptography algorithms. B. Paul · G. Trivedi (B) Indian Institute of Technology Guwahati, Assam 781039, India e-mail: [email protected] B. Paul e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023 K. V. Arya et al. (eds.), Proceedings of 7th ASRES International Conference on Intelligent Technologies, Lecture Notes in Networks and Systems 685, https://doi.org/10.1007/978-981-99-1912-3_1

3

4

B. Paul and G. Trivedi

Here a comparative study of above mentioned PQC algorithms is presented, based on their characteristics, advantage over classical algorithms and their resilience towards quantum computer based crypto attacks. In this regard, the vulnerability of existing classical algorithms is discussed in detail. Later, a few algorithms based on lattice and chaos are discuses which are designed by us are also elaborated. The organization of rest of the paper is as follows. In Sect. 2, a brief note on the vulnerability of classical crypto-systems is presented. Section 3, present a brief discussion of hash, code, lattice multivariate and chaos based PQC algorithms. Finally, Sect. 4 concludes indicating merits and demerits of the PQC algorithms, and their possible area of applications.

2 Vulnerability of Classical Cryptosystems Breaking classical cryptographic algorithms is made possible by the quantum algorithms which are practically impossible to crack by its classical counterparts. Large prime number factoring and discrete logarithm problems [80] which are the cornerstone of many classical encryption algorithms such as RSA cryptosystem [75] and Diffie-Hellman key- exchange [19] can easily be solved by using Shor’s quantum algorithm [81]. Quantum algorithms running on quantum computers utilize subroutines like quantum Fourier transforms [63], quantum Grover’s search algorithm [33], Shor’s algorithm [80] etc. which can solve mathematical problems in near linear or polynomial time compared to exponential time required by the classical computers. Factoring of any large integer number is a long-studied mathematical problem which falls in between NP and NP-complete. The number field sieve [3] is the best for factoring ) large numbers. The time complexity of this known classical algorithm ( 1 2 3 3 algorithm is ex p c (log n) (log log n) , where the constant c depends upon length of the input number. On the other hand, Shor’s quantum algorithm can solve this type of problem in polynomial time [85] which is very less as compared to the best known algorithm lowers complexity of conventional classical algorithm. Grover’s search /

N and can be utilized to find collisions test for one search algorithm by a factor of M or multiple functions. Since security of the classical symmetric encryption algorithms such as AES [11], DES [20] rely on a large data set search problems or collision detection problems, these can be solved by Grover’s algorithms [43].

3 Various PQC Algorithms This sections discuses about various algorithms of different PQC systems and their resilience to quantum computer based attacks.

Post Quantum Cryptography Algorithms: A Review and Applications ...

5

3.1 Hash Based Digital Signature Schemes According to Shannon’s information theorem, one-time generated and key having same size as that of the message is an absolute secure system. One of the initial PQC proposed is Lamport-Diffie one time signature scheme (LD-OTS) [49] which employs a one-way function given by, f : {0, 1}n → {0, 1}n , where n is a positive integer, and the cryptographic hash function is, g : {0, 1}∗ → {0, 1}n . The second popular one-time signature scheme is Winternitz one-time signature algorithm (W-OTS) [24]. W-OTS applies one string in one signature key and generates several numbers of message digest. The cryptographic hash function is similar as LD-OTS which is represented by, f : {0, 1}n → {0, 1}n and g : {0, 1}∗ → {0, 1}n . The limitation of one-time signature schemes is its incapability to reuse the same key-pair for security. which is infeasible for most of the practical applications. Merkle’s scheme employs root of the binary tree as the public key which can be utilized multiple times. The Merkle signature scheme (MSS)[56] comprises of two-parts, a suitable cryptography hash function and one-time signature scheme. Here, public key is the root of Merkle root node and the private key is the sequence of 2 H one-time signature keys. The general term of the tree node is Vh [i] = g(Vh−1 [2i]||Vh−1 [2i + 1]), and 1 ≤ h ≤ H, 0 ≤ i < 2 H −h . For the public key generation, root of the Merkle tree needs be computed and it is imperative to store the whole hash tree in the memory. The central idea is to successively compute the leaves of Merkle tree and whenever possible evaluate their parents. Moreover, the security features of MSS can be enhanced by introducing Channing MSS (CMSS) [14] and Generalized Merkle Signature Scheme GMSS [1].

3.2 Code Based Schemes Code-based cryptography is one of the few cryptosystems which are secure against attacks generated from quantum computers. McEliece encryption scheme [54] is an asymmetric cryptosystem derived from coding theory based encryption scheme. The private key used in the scheme is a random binary irreducible Goppa code [79]. The public key for the scheme is generated by adding error code with randomly permuted version of the code and the key is stored in matrix form. Only the owner of the private key (the Goppa code) is able to remove errors and find plain-text in McEliece encryption scheme. Therefore, one-way trapdoor function employed in the McEliece cryptosystem is the knowledge of the error correcting code together with permutation which is available for each Goppa code. Niederreiter Public Key Cryptosystem (PKC) [67] is a slight upgraded version of McEliece scheme which represents the coded message as word encoded into an error vector function φn,t and φn,t : {0, 1}l → Wn,t , where n, t are parameters to generate key; Wn,t = {e ∈ Fn2 |wt (e) = t}; l = |log2 |Wn,t || and wt (e) is the function for error coefficient. This trapdoor function

6

B. Paul and G. Trivedi

Table 1 Comparison of McEliece and Niederreiter Encryption Schemes McEliece scheme[64]

Niederreiter scheme[54]

(n, t)

(2048,32)

(2048,40)

(4096,22)

(4096,45)

plaintext sizea

1928

1888

4024

3904

ciphertext sizea 2048

2048

4096

4096

encryption rateb

176

222

145

192

decryption rateb

1780

2260

600

1650

plaintext sizea

232

280

192

352

chipertext sizea 352

440

264

540

encryption rateb

360

370

320

340

decryption rateb

13600

16700

9800

16900

public key sizec

73 KB

86 KB

123 KB

234 KB

key generationd

6.70 107

9.55 107

7.93 107

23.1 107

98

93

140

security bitsc,d 91 a c

plaintext and cipher-text sizes in bits, b cycles per plaintext bytes common to both algorithm scheme, d log2 of the non-quantum binary work factor

is quite inefficient to compute and time complexity is O(n 2 . log2 n), whereas, the En E −1 (e) = i=1 ei .(i/ ij=0 e j ). A comparison between inverse is easy to define: φn,t McEliece and Niederreiter schemes based on the sizes of plaintext, ciphertext and key is shown in the Table 1. The Courtois, Finiasz, and Sendrier (CFS) [16] signature scheme is another code based cryptosystem which is intact in both classical and quantum computers. CFS scheme repeatedly hash portions of the document and randomize upto a fixed count until the output is a decryptable ciphertext. There exists other newer codes, Gabidulin codes [28], Bose-Chaudhuri-Hocquenghem (BCH) codes [29], Reed-Muller codes [82], GRS codes [67], Algebraic geometric codes [42], Graph based Low-density parity-check code (LDPC), Luby transform (LT) or turbo code, Goppa/alternate codes [53] etc. which can also be incorporated as code based PQCs.

3.3 Lattice Based Cryptosystems Lattice based PQCs [48, 59, 66, 74] are more secure against quantum computing based security attacks. These algorithms can also be efficiently implemented due to their simple structures compared to other PQC schemes. Shor’s algorithm achieves

Post Quantum Cryptography Algorithms: A Review and Applications ...

7

a very little success in finding periods in lattice and there are no known polynomial time quantum algorithms that can approximate the lattice problems. Computationally hard lattice problems which can be utilized to construct PQCs are as follows. ∗ Shortest Vector problem (SVP) [4, 71]: Finding the shortest nonzero vector L( A) for a given lattice basis vector A ∗ Closest Vector Problem (CVP) [57, 60]: For a fixed target vector t which is not necessarily situated in the given lattice, finding lattice point v ∈ L(A) closest to the target vector t, where A in the basis vector for the given lattice ∗ Shortest Independent Vector Problem (SIVP): Find n linearly independent lattice vectors S = [s1 , . . . , sn ] (where si ∈ L( A) for all i ) minimizing the value of ||S|| ≡ maxi ||si || For an instance, to find the exact solutions for SVP or approximate factors in the polynomial range poly(n) deploying the best-known algorithm, still time complexity is 2 O(n) , which requires exponential time, thus practically impossible to be analyzed for a large lattice structure in polynomial time. Finding the shortest vector in m dimensional lattice is essential to determine security of lattice based cryptographic algorithm. Let us consider a random matrix A ∈ Zqn×m with parameters q, n and m ≥ n. The length of the vector obtained by the Lattice reduction algorithm to find the shortest vector for random q-array and m-dimension is denoted by the Eq. 1, where /\ n/m all nonzero vectors coordinates and bounded by the value λ∞ ( q⊥ ( A)) ≈ q 2 −1 . min{q, (det (λ1 (

⊥ /\ m (A)))1/m .δ m } = min{q, q n/mδ }

(1)

q

A cryptographically efficient hash function means the ciphertext mapping domain is smaller with respect to plaintext and also very hard to find collisions. For two inputs x1 , x2 ∈ D and x1 /= x2 , finding h(x1 ) = h(x2 ) should be harder, where h(x) denotes the hash function. There are a few well-known lattice hash functions such as, Ajtai’s [31] hash function based on cyclic and ideal lattice, the SWIFFT hash function [27] etc. In Ajtai’s work [31], a family of one-way trapdoor function is introduced. Security of this scheme depends upon the worst-case hardness of SVP of n c , where c is a constant parameter of lattice. Ajtai’s proposed method can solve any instance of SVP of n c if the function is chosen from the family with non-negligible probability. These types of functions are stronger than the conventional trapdoor functions (security factor depends upon c). The worst case hardness of these problems are NP-hard because of c ≥ 21 . Peikert, Rosen and Lyubashevsky, Micciancio [50] solved the problem of turning any one-way function into a collision resistance hash function efficiently based on lattice based matrix. Using Fast Fourier transformation over complex numbers, the above discussed lattice hash functions can be computed asymptotically in ˜ The SWIFFT hash algorithm [27] is an optimized version of the previous O(m). algorithms and highly efficient in practical hardware implementations.

8

B. Paul and G. Trivedi

Table 2 Security Estimation for NTRU Public Key Cryptosystem[37] Estimated n q df Security (bits) 80 80 256 256

257 449 797 14303

210 28 210 28

77 24 84 26

key size (bits) 2570 3592 7970 114424

Using hardness of lattice structures several public key encryption schemes have been proposed. GGH scheme [32] proposed by Goldreich, Goldwasser and Halevi is based on the hardness of decoding linear codes over finite fields, whereas, the HNF scheme [65] can be defined using upper triangular matrices problem in lattice structures. The correctness of GGH/HNF Cryptosystem [50] depends on error vector r . If the error vector r is short enough then the lattice point v can be recovered from ciphertext v + r using a private key or basis B by employing Babai’s rounding procedure [8]. NTRU proposed by Hoffstein, Pipher and Silverman is based on a ring-based lattice cryptosystem [38, 58]. The NTRU scheme parameters are prime dimension n, integer modulus q, small integer p and weight bound d f . There are a few international recommendations for selecting the values of NTRU parameters for optimized security and efficiency. As NTRU is considered one of the strongest lattice based PQC scheme, its security estimation is presented in the Table 2. The most efficient lattice based cryptosystem is Learning with Errors (LWE) which is developed by Regev [44, 73] and LWE problems are very hard to solve. This algorithm can be made stronger by introducing noise with the original construction known as Learning Parity with the noise problem. Even with a quantum computer the hardness still remains as equivalent to the problem of SIVP or SVP. The security of LWE-based encryption schemes is based on the fact that the hardness of the LWE problem can be reduced to that of the problems in lattices known to be NP-Hard. It is shown in [73, 74] that there exists a quantum reduction from the decisional Shortest Vector Problem (GapSVPγ ) over lattices to the LWE problem for a proper choice of parameters (the approximation factor is denoted by γ ). Further, [13, 72] convert this reduction to a classical one. The time complexity of the best-known algorithms for the GapSVPγ problem is 2Ω(n/logγ ) to find any solution with non-negligible probability [61, 78]. In recent time one of the most prominent work is presented in [70] where two secure and hardware efficient LWE based lattice homomorphic encryption scheme is proposed. In [70], two implementations of hardware accelerators for partially homomorphic encryption (PHE) schemes based on the LWE-HSM problem are proposed. Lattice based digital signature schemes are also sufficiently hard to crack. Major variants of lattice based digital signature schemes are GGH and NTRU-Sign scheme [36], preimage sample based trapdoor functions and collision resistance lattice based

Post Quantum Cryptography Algorithms: A Review and Applications ...

9

hash functions [51]. For the GGH and NTRUSign digital signature scheme, the message is mapped to points m ∈ Rn by applying the hash or one-way function. Thereafter, m is rounded-off (s = B|B −1 m| [8]) and approximated to a nearby lattice point s ∈ L(B) applying the secret key.

3.4 Multivariate Public Key Cryptography Schemes Multivariate PQC algorithms are preferred due to N P-hardness in solving quadratic polynomial over a finite field (act as public map). Although a few multivariate PQC algorithms are not as secure as these algorithms illustrate theoretically, but most of them can be employed practically after minor modifications. Multivariate public key cryptography (MPKC) proposed by Shigeo and Hideki [2], the trapdoor functions are converted in the form of multivariate quadratic polynomial map over a specific finite field. The public keys for these functions can be written in the form of polynomials given in Eq. 2, where, each of the pi in the form of nonlinear polynomial in w = (w1 , . . . , wn ). P = ( p1 (w1 , . . . , wn ), . . . , pm (w1 , . . . , wn )) E E E Pik wi + Q ik wi2 Ri jk wi w j Zk = pk (w) := i

i

(2)

i> j

Besides these there are few notable multivariate PQC signature algorithms which are discussed below. The Rainbow (28 , 18, 12, 12) [22] is a Tame Transformation Signatures (TTS) scheme of sparse Q polynomial space. Perturbation and adding polynomials in Perturbed Matsumoto-Imai plus PMI+(136,6,18,8) [21] provide more security compared to Rainbow scheme. The QUARTZ [17] or HFEv(2, 129, 103, 3, 4) signature scheme [68] is an extension of previously discussed signature schemes. The Table 3 illustrates comparison of the size and speed of the various multivariate public key cryptosystem with classical asalgorithms.

3.5 Chaos Based PQCs Chaotic systems are distinguished by their higher sensitivity to the initial conditions, statistical similarity to random signals, and a continuous broadband power spectrum. These properties garnered interest from cryptanalysts to propose various chaos-based cryptographic systems. The piecewise linear chaotic map (PLCM) based 1−D chaotic map is implemented in [41], whose security vulnerabilities are improved by introducing logistic polynomial map derived piecewise nonlinear chaotic maps [5, 45]. Recently, many real-world chaotic phenomena are being modeled to generate ideal chaotic characteristics [7, 83]. A chaotic tent map-based single iterative

10

B. Paul and G. Trivedi

Table 3 Multivariate PKC Comparison[12] Scheme Result Secret Key RSA-1024 ECDSA-F2163 PMI+(136,6,18,8) Rainbow (28 ,18,12,12) Rainbow (24 ,24,20,20) QUARTZ

1024 b 320 b 144 b 336 b 256 b 128 b

128 B 48 B 5.5 kB 24.8 kB 91.5 kB 71.0 kB

Public Key

Key Gen

secret Map

Public Map

320 B 24 B 165 kB 22.5 kB 83 kB 3.9 kB

2.7 sec 1.6 mc 1.1 sec 0.3 sec 1.6 sec 3.1 sec

84 ms 1.9 ms 1.23 ms 0.43 ms 0.93 ms 11 sec

2.0 ms 5.1 ms 0.18 ms 0.40 ms 0.74 ms 0.24 ms

encryption scheme is proposed in [34], which is further generalized in [46], and multiple iterative-based dynamical chaotic system models are presented in [47]. A novel symmetric block cipher algorithm based on invertible two-dimensional chaotic maps on a torus is presented in [26], whereas schemes formulated by employing iterative logistic equation and synchronized chaotic systems are discussed in [87], and [15], respectively. Different chaotic attractors for a random chunk of binary plain-text data are presented [6] in order to implement a chaotic-based encryption scheme. Hyperchaotic temperature fluctuation model based on the circuit analysis is proposed for image encryption [83], first order differential equations based a new 3D chaotic system [76], two circles of equilibrium points and its multistability [77] based cryptosystem are also develop. Similarly, [52] showcased a new discrete chaotic system merging multiple linear systems, whereas the Hénon map and the multistable hyper-chaotic system are designed in [55, 84]. A new modified scheme using a skew tent map to overcome drawbacks in conventional PRN sequences with strong cryptographic

Table 4 Key-Size for Various PQC Encryption Algorithms [69] Symmetric Key Asymmetric Key Algorithm Lattice Multivariate NTRU Rainbow Hash Signature Goppa McEliece Quasi-cyclic MDPC McEliece SIDH Triple Pendulum (single precision) Triple Pendulum (double precision)

Key Memory

14000-bit 6743-bit 740000-bit 36000-bit 92027-bit 4384-bit

6595-bit 6130-bit 991000-bit 36000-bit 8373911-bit 65542-bit

< 1KB < 1KB 125KB 5KB 1MB 8KB

6144-bit 672-bit

6144 –

< 1KB < 1KB

1344-bit



< 1KB

5. Triple Pendulum

4. Hyperchaotic temp fluctuation

3. Iterative dynamic system

2. Logistic polynomial map

1. PLCM

5. Polly-cracker

4. Unbalanced oil-vinegar

3. Quartz / HFEv (2, 129, 103, 3, 4)

2. PMI+ (136, 6, 18, 8)

1. Rainbow (28 , 18, 12, 12)

6. GGH-NTRU digital signature

5. LWE

4. NTRU

3. GGH/HNF

2. SWIFFT

1. The Ajtai-Dwork lattice

4. Stern’s identification scheme

3. CFS

2. Niederreiter PKC

1. McEliece PKC

5. Distributed sign. generation

4. PRNG OTS

3. Merkle’s tree authentication

2. Winternitz OTS

1. Lamport- Diffie OTS

Algorithm

Chaos based crypto system

Multivariate crypto system

Lattice based crypto system

Code based crypto system

Hash based crypto system

Type

Higher sensitivity to the initial conditions, statistical similarity to random signals, and a continuous broadband power spectrum; no known quantum attack exists.

Subset of lattice schemes, these are homomorphic and compatible with cloud computing.

NP-hard and no known attacks in polynomial time, simple to design due to its structures are periodicity.

No known crypto analytical attacks on code based crypto algorithms till date.

OTSs are faster, more secure regardless of the underlying hash function. Merkle’s tree, other distributed sign use same key for multiple encryptions reducing key size.

Advantage

Table 5 Comparison Between Different Types of PQC Algorithms

While implementations takes more resource, key size is bigger and key generation is time consuming

There are some algebraic and differential Rank attacks against Multivariate algorithms, so designer has to pay extra effort to design cryptographic systems.

Key length is large, larger number of parameters are needed to generate the key.

Huge key-size and slower than the other PQC algorithms.

Brute force attacks take 2n/2 and 2n/3 with classical and Grover’s algorithm to crack the key; for collision test classical and quantum is (2n/2 , 1/2n/2 ) and (2n/3 , 1/2n/3 ).

Limitations

Low latency, performance, secure cation.

highappli-

Battery operated small devices (e.g. IoT devices) which require online secure authentication can use these schemes.

Utilized in symmetric and asymmetric key cryptography applications, LWE with lattice are most popular PQC.

High security applications and as public key cryptography schemes.

Replacement of RSA and ECC based signature algorithms.

Areas of use

Post Quantum Cryptography Algorithms: A Review and Applications ... 11

12

B. Paul and G. Trivedi

properties is introduced in [25]. In [9] chaos-based encryption scheme for medical images is developed utilizing SHA-256 hash function, block-based permutation, pixel-based substitution, DNA encoding complementing and decoding, and bit-level diffusion. [35] presented a PRN sequence generator algorithm based on a combination of the three coordinates of the Chen chaotic orbits. A fast RGB image encryption algorithm based on total plain image characteristics and optimized pseudorandom sequence from a 1D logistic map is present in [62]. The work presented in [40] is an image encryption algorithm derived from a 2D chaotic system based on orthogonal Latin squares. Lastly, [39] 2D-PPCS is constructed from nonlinear polynomials, and a modular chaotification of the phase plane yields 2D chaotic maps with robust chaos and desired dynamic properties. A new nonlinear dynamic system derived from the chaotic behavior of a physical triple pendulum configuration is proposed in [69]. Utilizing the chaotic map a generalpurpose symmetric key encryption scheme is developed and the key-size comparison is presented in the Table 4. Various PQCs and their broad categories are discussed in the subsections earlier and is this regard a consolidated brief comparative analysis is presented in the Table 5. The advantages and limitations and probable application areas are also put up in the table. From the Table 5 it can be observed that, lattice based PQCs are the suitable candidate for various application and chaotic dynamic system based PQCs are also good contender to provide better security and the hardware implementation is comparatively easier than other PQC techniques. Worldwide communication is dominated by IoT driven consumer electronic equipments and majority of these devices are battery operated with lower limited hardware resources. Thus, it is anticipated that in near future compute intense public key cryptosystems will no longer be useful. Therefore, lattice based and chaos based PQCs are likely to be replace the conventional cryptosystem in near future.

4 Conclusion Quantum computing based attack proof security system design is possible by employing either the quantum cryptography or by implementing post quantum cryptography (PQC) algorithms. We have thoroughly discussed almost all the major division of PQCs and predominant algorithms associated in corresponding classes. Hash and code based one-way signature schemes specially PRNGs, Merkle and McEliece’s algorithms are very strong in perspective of security but their hardware implementation of not suitable for practical applications. The lattice based systems are most resilient against the quantum as well as conventional computer based attacks. The lattice based SWIFFT algorithm is lightweight and stronger algorithm for digital signature and verification purpose. The NTRU and LWE based public key cryptosystems are better than conventional RSA algorithm to tackle quantum attacks. Lattice based SVP and SIVP problems are harder and computationally intensive, thus they can be incorporated in the encryption schemes to enhance the security. The comparatively newer addition is chaotic dynamic physical system driven cryptosystems which are

Post Quantum Cryptography Algorithms: A Review and Applications ...

13

also shown resilience against quantum algorithms running on theoretical large scale quantum computers. Considering all the aspects, it can be discerned that, since the field of quantum cryptanalysis and post quantum cryptography is still in developing phase, and many of the algorithms proposed by the researcher are only theoretically proven their security, therefore, more research is needed to improve different classes of PQCs. Finally, we can consummate that lattice based PKC schemes (e.g. NTRU, LWE, lattice based multivariate polynomial) and chaotic dynamic system based cryptosystems (e.g. PLCM, different types of logistic map based systems, iterative dynamic system, hyperchaotic fluctuation based systems, triple pendulum based systems etc.) are promising alternative for conventional cryptosystems (e.g. RSA, AES, DES etc.) providing resilience against quantum computer based attacks.

References 1. URL https://www.sav.sk/journals/uploads/0728120003-7-StSt.ps 2. URL https://www.candc.or.jp/en/2014/group_a.html 3. Lenstra AK, Lenstra HW (1993) The Development of the Number Field Sieve. Lecture Notes in Mathematics, vol. 1544. Springer, Heidelberg. https://doi.org/10.1007/BFb0091534 4. Ajtai M (1998) The shortest vector problem in l2 is np-hard for randomized reductions (extended abstract). In: Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, STOC 1998, pp. 10–19. ACM, New York, NY, USA. https://doi.org/10.1145/276698.276705, http://doi.acm.org/10.1145/276698.276705 5. Akhavan A, Mahmodi H, Akhshani A (2006) A new image encryption algorithm based on onedimensional polynomial chaotic maps. In: Levi A, Sava¸s E, Yenigün H, Balcısoy S, Saygın Y (eds) ISCIS 2006, vol 4263. LNCS. Springer, Heidelberg, pp 963–971. https://doi.org/10. 1007/11902140_100 6. Alvarez E, Fernandez A, Garcıa P, Jiménez J, Marcano A (1999) New approach to chaotic encryption. Phys. Lett. A 263(4–6):373–375 7. Askar SS, Karawia AA, Alshamrani A (2015) Image encryption algorithm based on chaotic economic model. Math. Probl. Eng. 2015:341–729. https://doi.org/10.1155/2015/341729 8. Babai L (1986) On lovász lattice reduction and the nearest lattice point problem. Combinatorica 6:1–13 9. Belazi A, Talha M, Kharbech S, Xiang W (2019) Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7:36667–36681. https://doi.org/10.1109/ ACCESS.2019.2906292 10. Bernstein, D.J., Buchmann, J., Dahmen, E.: Springer, USA (2009) 11. Bertoni G, Breveglieri L, Koren I, Maistri P, Piuri V (2003) Error analysis and detection procedures for a hardware implementation of the advanced encryption standard. IEEE Trans. Comput. 52(4):492–505. https://doi.org/10.1109/TC.2003.1190590 12. Bo-Yin Y, Jiun-Ming C (2004) Tts: Rank attacks in tame-like multivariate PKCS. Int. Conf. Inf. Commun. Secur. 6:413–434. http://eprint.iacr.org/2004/061.pdf 13. Brakerski Z, Langlois A, Peikert C, Regev O, Stehl’e D (2013) Classical hardness of learning with errors. In: Proceedings of the Forty-fifth Annual ACM Symposium on Theory of Computing 14. Buchmann J, García LCC, Dahmen E, Döring M, Klintsevich E (2006) CMSS – an improved Merkle signature scheme. In: Barua R, Lange T (eds) INDOCRYPT 2006, vol 4329. LNCS. Springer, Heidelberg, pp 349–363. https://doi.org/10.1007/11941378_25 15. Chu YH, Chang S (1999) Dynamical cryptography based on synchronized chaotic systems. Electron. Lett. 35(12):974–975

14

B. Paul and G. Trivedi

16. Courtois N, Finiasz M, Sendrier N (2001) How to achieve a mceliece-based digital signature scheme. In: Advances in Cryptology - ASIACRYPT 2001, vol. 2248, pp. 157–174 17. Courtois N, Goubin L, Patarin J (2001) Quartz: Primitive specification (second revised version) p. 18. https://www.cosic.esat.kuleuven.be/nessie 18. Courtois N, Klimov A, Patarin J, Shamir A (2000) Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Preneel B (ed) EUROCRYPT 2000, vol 1807. LNCS. Springer, Heidelberg, pp 392–407. https://doi.org/10.1007/3-540-45539-6_27 19. Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans. Inf. Theory 22(6):644–654. https://doi.org/10.1109/TIT.1976.1055638 20. Diffie W, Hellman ME (1977) Special feature exhaustive cryptanalysis of the NBS data encryption standard. Computer 10(6):74–84. https://doi.org/10.1109/C-M.1977.217750 21. Ding J (2004) A new variant of the Matsumoto-Imai cryptosystem through perturbation. In: Bao F, Deng R, Zhou J (eds) Public Key Cryptography - PKC 2004. Springer, Heidelberg, pp 305–318 22. Ding J, Schmidt D (2005) Rainbow, a new multivariable polynomial signature scheme. In: Ioannidis J, Keromytis A, Yung M (eds) ACNS 2005, vol 3531. LNCS. Springer, Heidelberg, pp 164–175. https://doi.org/10.1007/11496137_12 23. Ding J, Yang B-Y, Chen C-HO, Chen M-S, Cheng C-M (2008) New differential-algebraic attacks and reparametrization of rainbow. In: Bellovin SM, Gennaro R, Keromytis A, Yung M (eds) ACNS 2008, vol 5037. LNCS. Springer, Heidelberg, pp 242–257. https://doi.org/10. 1007/978-3-540-68914-0_15 24. Dods C, Smart NP, Stam M (2005) Hash based digital signature schemes. In: Smart NP (ed) Cryptography and Coding 2005, vol 3796. LNCS. Springer, Heidelberg, pp 96–115. https:// doi.org/10.1007/11586821_8 25. Elmanfaloty RA, Abou-Bakr E (2019) Random property enhancement of a 1d chaotic PRNG with finite precision implementation. Chaos, Solitons Fract. 118:134–144. https://doi.org/10.1016/j.chaos.2018.11.019, https://www.sciencedirect.com/science/article/ pii/S0960077918308373 26. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. chaos 8(06):1259–1284 27. Granlund D, Ahlund C, Holmlund P (2015) Eap-swift: An efficient authentication and key generation mechanism for resource constrained wsns. Int J Distrib Sens Netw. 460914, 12p. http://dx.doi.org/10.1155/2015/460914 28. Gabidulin EM, Paramonov AV, Tretjakov OV (1991) Ideals over a non-commutative ring and their application in cryptology. In: Davies DW (ed) EUROCRYPT 1991, vol 547. LNCS. Springer, Heidelberg, pp 482–489. https://doi.org/10.1007/3-540-46416-6_41 29. Gaborit P (2005) Shorter keys for code based cryptography. pp. 81–90 30. Gaborit P, Laudaroux C, Sendrier N (2007) Synd: a very fast code-based cipher stream with a security reduction. In: IEEE Conference, ISIT 2007, pp. 186–190 31. Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, STOC 2008, pp. 197–206. ACM, New York, NY, USA. https://doi.org/10.1145/ 1374376.1374407, http://doi.acm.org/10.1145/1374376.1374407 32. Goldreich O, Goldwasser S, Halevi S (1997) Public-key cryptosystems from lattice reduction problems. Adv Cryptol LNCS 1294:112–131 33. Grover LK (1996) A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, STOC 1996, pp. 212–219. ACM, New York, NY, USA 34. Habutsu T, Nishio Y, Sasase I, Mori S (1991) A secret key cryptosystem by iterating a chaotic map. In: Davies DW (ed) EUROCRYPT 1991, vol 547. LNCS. Springer, Heidelberg, pp 127– 140. https://doi.org/10.1007/3-540-46416-6_11 35. Hamza R (2017) A novel pseudo random sequence generator for image-cryptographic applications. J Inf Secur Appl. 35:119–127. https://doi.org/10.1016/j.jisa.2017.06.005. https://www. sciencedirect.com/science/article/pii/S2214212617303174

Post Quantum Cryptography Algorithms: A Review and Applications ...

15

36. Hoffstein J, Graham N, Pipher J, Silverman J, Whyte W (2003) NTRUSIGN: Digital signatures using the NTRU lattice. Proc. CT-RSA LNCS 2612:122–140 37. Hoffstein J, Howgrave-Graham N, Pipher J, Silverman JH (2007) Hybrid lattice reduction and meet in the middle resistant parameter selection for NTRU-encrypt. IEEE NTRU Cryptosyst Inc. 2:1363. http://grouper.ieee.org/groups/1363/lattPK/submissions.html/2007-02 38. Hoffstein J, Pipher J, Silverman J (1998) NTRU: a ring based public key cryptosystem. Proc ANTS-III LNCS 1423:267–288 39. Hua Z, Chen Y, Bao H, Zhou Y (2022) Two-dimensional parametric polynomial chaotic system. IEEE Trans Syst Man Cybern Syst 52(7):4402–4414. https://doi.org/10.1109/TSMC.2021. 3096967 40. Hua Z, Zhu Z, Chen Y, Li Y (2021) Color image encryption using orthogonal Latin squares and a new 2d chaotic system. Nonlinear Dyn 104(4):4505–4522. https://doi.org/10.1007/s11071021-06472-6 41. Huang F, Guan ZH (2005) A modified method of a class of recently presented cryptosystems. Chaos Solitons Fractals 23(5):1893–1899 42. Janwa H, Moreno O (1996) Mceliece public key cryptosystems using algebraic-geometric codes. Des Codes Cryptogr 8:293–307 43. Kaplan M, Leurent G, Leverrier A, Naya-Plasencia M (2016) Breaking symmetric cryptosystems using quantum period finding. In: Robshaw M, Katz J (eds) Advances in Cryptology CRYPTO 2016. Springer, Heidelberg, pp 207–237 44. Kawachi A, Tanaka K, Xagawa K (2007) Multi-bit cryptosystems based on lattice problems. In: Okamoto T, Wang X (eds) PKC 2007, vol 4450. LNCS. Springer, Heidelberg, pp 315–329. https://doi.org/10.1007/978-3-540-71677-8_21 45. Kocarev L, Jakimoski G (2001) Logistic map as a block encryption algorithm. Phys Lett A 289(4–5):199–206 46. Kotulski Z, Szczepa´nski J (1997) Discrete chaotic cryptography. Annalen der Physik 509(5):381–394 47. Kotulski Z, Szczepa´nski J, Górski K, Paszkiewicz A, Zugaj A (1999) Application of discrete chaotic dynamical systems in cryptography-DCC method. Int J Bifurc Chaos 9(06):1121–1135 48. Kumar R, Sivakumar D (2001) Complexity of SVP - a reader’s digest. SIGACT 32(3):40–52. https://doi.org/10.1145/582475.582484 49. Lipmaa H (2002) On optimal hash tree traversal for interval time-stamping. In: Chan AH, Gligor V (eds) ISC 2002, vol 2433. LNCS. Springer, Heidelberg, pp 357–371. https://doi.org/ 10.1007/3-540-45811-5_28 50. Lyubashevsky V, Micciancio D (2006) Generalized compact knapsacks are collision resistant. In: 33rd International Colloquium on Automata 51. Lyubashevsky V, Micciancio D (2008) Asymptotically efficient lattice-based digital signatures. In: Canetti R (ed) TCC 2008, vol 4948. LNCS. Springer, Heidelberg, pp 37–54. https://doi. org/10.1007/978-3-540-78524-8_3 52. Maazouz M, Toubal A, Bengherbia B, Houhou O, Batel N (2022) Fpga implementation of a chaos-based image encryption algorithm. J King Saud University - Computer and Information Sciences (2022). https://doi.org/10.1016/j.jksuci.2021.12.022, https://www.sciencedirect. com/science/article/pii/S1319157821003682 53. McEliece R (1978) A public key cryptosystem based on algebraic coding theory. DSN progress report pp. 42–44, 114–116 (1978) 54. McEliece R (1978) A public key cryptosystem based on algebraic coding theory. DSN Progr Rep 42(44):114–116 55. Meranza-Castillón M, Murillo-Escobar M, López-Gutiérrez R, Cruz-Hernández C (2019) Pseudorandom number generator based on enhanced hénon map and its implementation. AEU - Int J Electron Commun. 107:239–251. https://doi.org/10.1016/j.aeue.2019.05.028, https://www. sciencedirect.com/science/article/pii/S1434841119303814 56. Merkle RC (1990) A certified digital signature. In: Brassard G (ed) CRYPTO 1989, vol 435. LNCS. Springer, New York, pp 218–238. https://doi.org/10.1007/0-387-34805-0_21

16

B. Paul and G. Trivedi

57. Micciancio D (2001) The hardness of the closest vector problem with preprocessing. IEEE Trans Inf Theory 47(3):1212–1215. https://doi.org/10.1109/18.915688 58. Micciancio D (2001) Improving lattice based cryptosystems using the Hermite normal form. Cryptogr Latt Conf CaLC 2001(2146):126–145 59. Micciancio, D.: Cryptographic functions from worst-case complexity assumptions (2007) 60. Micciancio D, Goldwasser S (2002) Closest Vector Problem, pp. 45–68. Springer US, Boston, MA. https://doi.org/10.1007/978-1-4615-0897-7-3 61. Micciancio D, Voulgaris P (2013) A deterministic single exponential time algorithm for most lattice problems based on voronoi cell computations. SIAM J Comput. 42(3) (2013) 62. Murillo-Escobar M, Cruz-Hernández C, Abundiz-Pérez F, López-Gutiérrez R, Acosta Del Campo O (2015) A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process. 109:119–131. https://doi.org/10.1016/j.sigpro.2014.10.033, https:// www.sciencedirect.com/science/article/pii/S0165168414004976 63. Namias V (1980) The fractional order Fourier transform and its application to quantum mechanics. IMA J Appl Math 25(3):241. https://doi.org/10.1093/imamat/25.3.241 64. Ng H (2005) Simple Pseudorandom Number Generator with Strengthened Double Encryption, vol. 2. https://eprint.iacr.org/2005/086 65. Nguyen P, Stern J (1998) Cryptanalysis of the Ajtai-Dwork cryptosystem. Adv Cryptol (CRYPTO) 1462:223–242 66. Nguyen P, Stern J (2001) The two faces of lattices in cryptology. In: Cryptography and Lattices, (CaLC 2001) (2146), pp. 146–180 67. Niederreiter H (1986) Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inform. Theory 15:19–34 68. Patarin J (1996) Hidden field equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms. In: Advances in Cryptology- EUROCRYPT 1996. LNCS, vol. 1070, pp. 33–48. http://www.minrank.org/hfe.pdf 69. Paul B (2021) A novel low-power encryption scheme based on chaotic dynamic triple pendulum system for wide range of applications. TechRxiv, Preprint, pp. 1–15. https://doi.org/10.36227/ techrxiv.14778129.v1 70. Paul B, Yadav TK, Singh B, Krishnaswamy S, Trivedi G (2022) A resource efficient softwarehardware co-design of lattice-based homomorphic encryption scheme on the FPGA. IEEE Trans Comput, pp. 1–14. https://doi.org/10.1109/TC.2022.3198628 71. Peikert C (2009) Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. In: Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, STOC 2009, pp. 333–342. ACM, New York, NY, USA. https://doi.org/10.1145/ 1536414.1536461 72. Peikert C (2009) Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. In: Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, STOC 2009, pp. 333–342. ACM, New York, NY, USA. https://doi.org/10.1145/ 1536414.1536461 73. Regev O (2005) On lattices, learning with errors, random linear codes, and cryptography. In: Proceedings of 37th ACM Symposium on Theory of Computing (STOC), pp. 84–93 74. Regev O (2006) Lattice-based cryptography. Advances in cryptology (CRYPTO), pp. 131–141 75. Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2):120–126 76. Sambas A, et al (2020) A 3-d multi-stable system with a peanut-shaped equilibrium curve: Circuit design, FPGA realization, and an application to image encryption. IEEE Access. 8:137,116–137,132. https://doi.org/10.1109/ACCESS.2020.3011724 77. Sambas A, et al (2019) A novel chaotic system with two circles of equilibrium points: Multistability, electronic circuit and FPGA realization. Electronics. 8(11). https://doi.org/10.3390/ electronics8111211, https://www.mdpi.com/2079-9292/8/11/1211 78. Schnorr C (1987) A hierarchy of polynomial time lattice basis reduction algorithms. Theoret Comput Sci 53 (1987)

Post Quantum Cryptography Algorithms: A Review and Applications ...

17

79. Sendrier N (2002) On the security of the mceliece public-key cryptosystem. In: Proceedings of Workshop Honoring Prof. Bob McEliece on his 60th Birthday ,pp. 141–163 80. Shor PW (1997) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J Comput 26(5):1484–1509 81. Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303–332. https://doi.org/10.1137/S0036144598347011 82. Sidelnikov V (1994) A public-key cryptosystem based on binary reed-muller codes 83. Vaidyanathan S, Azar AT, Rajagopal K, Sambas A, Kacar S, Cavusoglu U (2018) A new hyperchaotic temperature fluctuations model, its circuit simulation, FPGA implementation and an application to image encryption. Int J Simul Process Modelling 13(3):281–296 84. Vaidyanathan S, et al (2021) A new 4-d multi-stable hyperchaotic system with no balance point: bifurcation analysis, circuit simulation, FPGA realization and image cryptosystem. IEEE Access. 9:144,555–144,573. https://doi.org/10.1109/ACCESS.2021.3121428 85. Vandersypen LMK, Steffen M, Breyta G, Yannoni CS, Sherwood MH, Chuang IL (2001) Experimental realization of Shor’s quantum factoring algorithm using nuclear magnetic resonance. Nat Int J Sci 414:883–887. https://doi.org/10.1038/414883a 86. Wang L-C, Yang B-Y, Hu Y-H, Lai F (2006) A medium-field multivariate public-key encryption scheme. In: Pointcheval D (ed) CT-RSA 2006, vol 3860. LNCS. Springer, Heidelberg, pp 132– 149. https://doi.org/10.1007/11605805_9 87. Ward LM, West RL (1998) Modeling human chaotic behavior: nonlinear forecasting analysis of logistic iteration. Nonlinear Dyn Psychol Life Sci 2(4):261–282

Performance Analysis of Hetero-Dielectric Buried Oxide Double Gate Vertical TFET Sudakar Singh Chauhan and Seema

Abstract The main concern of Tunnel Field Effect Transistor (TFET) are to attain high drain current & steeper Subthreshold swing (SS) by keeping high I O N /I O F F ratio. In order to address these problems, double gate hetero-dielectric buried oxide TFET based on vertical tunneling is proposed. This work comprises the concept of double gate and hetero-dielectric buried oxide (HDB) to evaluate the electrical and analog features. DG HDB Vertical TFET (VTFET) consisting of HfO2 under channel and drain region provides the higher ON current as well as the higher ratio of I O N /I O F F . DG HDB VTFET consisting of HfO2 under source and underlapped channel regions provides excellent subthreshold swing (SS). Keywords Hetero-dielectric buried oxide (HDB) · VTFET · OFF current · ON current · work-function

1 Introduction Tunnel field effect transistor (TFET) has replaced the MOSFETs for small power utilization that is the major constraint for equipment authenticity in semiconductor cooperation due to faster switching capability (SS less than 60 mV/dec at RT), superior resistance against short channel effects (SCEs) and higher I O N /I O F F ratio because of the BTBT mechanism [1–3]. However, TFETs have several advantages, but some problems like ambipolar behavior [4–6], SS and low on current (I O N ) [7] needs to be solved. Various structures of TFET are designed to solve these problems. The two basic topologies are Lateral TFET (LTFET) [8–11] and Vertical TFET (VTFET) [12–15]. In recent years, different LTFET structures are designed with S. S. Chauhan (B) Department of ECE, Guru Ghasidas Vishwavidyalaya, Bilaspur, India e-mail: [email protected] Seema Department of ECE, DCE, Gurugram, India e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023 K. V. Arya et al. (eds.), Proceedings of 7th ASRES International Conference on Intelligent Technologies, Lecture Notes in Networks and Systems 685, https://doi.org/10.1007/978-981-99-1912-3_2

19

20

S. S. Chauhan and Seema

the use of doping-less concept [16–18], Junction-less concept [19], high-k dielectric materials [20], hetero-junction concept with narrow bandgap materials [21–25] and source-pocket concept [26] to boost the DC and Analog performance. However, LTFETs have not offered the greater enhancement in DC and Analog characteristics. Conversely, VTFETs have attracted the researchers and proved that it the best alternative concerning excellent achievement in terms of large ON current [27–31]. In this attempt, the double gate hetero-dielectric buried oxide (DG HDB) VTFET is recommended to boost ON-state current with maintaining high I O N /I O F F ratio. This device also provides steeper value of subthreshold swing (SS) and reduces the SCEs. In this device, the probability of tunneling increases due to the wider space at the source-epitaxial junction. Therefore, drain current is achieved of the order of 10−5 .

2 Architure of Device and Specifications The 2-D picture of DG HDB VTEFET as shown in Fig. 1 (a-d) and based on the HDB length under source (S), channel (Ch) & drain (D) regions, the different architecture can be defined. When SiO2 is taken under S-Ch zones and HfO2 under Ch-D zones then the architecture is termed as DG-SH-UCD-HDB VTFET. When SiO2 is taken under S zone and HfO2 under Ch-D zones, then the architecture is termed as DG-SH-CD-HDB VTFET. Similarly, the architecture can be defined as DG-HSUCD-HDB VTFET & DG-HS-CD-HDB VTFET if the position of SiO2 & HfO2 are interchanged. The metal M1 at gate (G) plate with ϕ M1 = 4.8eV . In all architectures, HfO2 spacer lengths of 20 nm are used at G-D plate and 40 nm at S-G plate. All considered architectures comprise of platinum metal (M2 ) with ϕ M2 = 5.93eV at S boundary, molybdenum metal (M3 ) with ϕ M3 = 3.9eV at D boundary. In all architectures, the length of S (L S = 80 nm), the length of Ch (L C = 20 nm) & the length of D (L D = 50 nm) is considered. The thickness of Oxide (tox = 2 nm), thickness of BOX (tbox = 8 nm) & thickness of Si (tsi = 10 nm) are also considered.

Performance Analysis of Hetero-Dielectric Buried Oxide Double Gate …

21

Fig. 1 Proposed Structure of VTFETs a DH-SH-UCD-HDB b DH-SH-CD-HDB c DG-HS-UCDHDB-HDB d DH-HS-CD-HDB

22

S. S. Chauhan and Seema

3 Simulation results and Discussion 3.1 DC Characteristics Simulated energy band diagrams of different VTFETs in the OFF-state and in the ON-state are illustrated in Fig. 2(a) and Fig. 2(b). As the increase in gate voltage, source-epitaxial junction becomes wider, thereby, tunneling current increases. At the source side, higher work-function increases tunneling current owing to increase in carrier concentration. The transfer characteristics shows enhancement in I O N of the order of 10–5 as illustrated in Fig. 3. DG-SH-CD-HDB VTFET gives the excellent I O N /I O F F ratio than other three schematics. DG-HS-UCD-HDB VTFET simulated at L B H = 60 nm and L B S = 110 nm gives the optimized results with superior SS. Figure 4 represents the electric field for all DG HDB VTFET. It is observed that sharper the energy band (due to high electric filed), the tunneling barrier decreases and hence the tunneling probability increases which is responsible for the large drain current.

3.2 Analog Characteristics Transconductance (gm ) and drain transconductance (G D ) characteristics are investigated to attain better performance. Figure 5(a) portrays the higher value of gm i.e. 4.25 × 10−5 S/µm in DG-SH-UCD-HDB VTEFT as comparison to other three VTFETs. Higher transconductance (gm ) provides the higher amplification ability of the TFET and is calculated as:

gm =

∂ I ds (S/µm) ∂ V gs

Figure 5(b) demonstrates the variation in G D w.r.t drain voltages. Higher value of G D in DG-SH-UCD-HDB VTFET provides the higher intrinsic gain due to higher output resistance. and is formulated by:G D = ∂∂VI dsds (A/V )

Performance Analysis of Hetero-Dielectric Buried Oxide Double Gate …

Fig. 2 Band diagrams of VTFETs in a OFF-state and b ON-state of all HDB VTFET

23

24

Fig. 3 Transfer Characteristics

Fig. 4 Electric Field

S. S. Chauhan and Seema

Performance Analysis of Hetero-Dielectric Buried Oxide Double Gate …

Fig. 5 a Transconductance b Drain transconductance

25

26

S. S. Chauhan and Seema

Table 1. Provides the simulations results of conventional VTFET & different proposed VTFETs devices. Parameters

Conventional V TFET

DG-SH-UCD-HDB

DG-SH-CD-HDB

DG-HS-UCD-HDB

DG-HS-CD-HDB

I O N (A/μm)

5.155 × 10−7

2.076 × 10−5

2.098 × 10−5

1.865 × 10−5

2.018 × 10−5

I O F F (A/μm)

5.443 × 10−17

1.173 × 10−16

3.005 × 10−17

7.230 × 10−17

6.758 × 10−17

I O N /I O F F

9.47 × 109

1.76 × 1011

0.69 × 1012

0.25 × 1012

0.14 × 1012

SS(mV /decade)

45

35.70

26.25

20.81

30.30

D I B L (mV/V)

14

9

9

7

4

The comparison of all proposed devices is shown in Table 1.

4 Conclusion In this research, the concept of HDB facilitates the enhancement in electrical characteristics like higher on current, lower off current, DIBL and steeper SS and also enhances the analog characteristics. This device have been investigated through the simulation and found useful for low-power applications. Device simulation results illustrates that the concept of using HfO2 under channel and drain region provides the higher on current while keeping higher ratio of I O N /I O F F in DG-SH-CD-HDB VTFET. Moreover, the steeper value is offered by DG-HS-UCD-HDB VTFET and smaller value of SS is offered by DG-HS-CD-HDB VTFET. Smaller off current value fulfills the present demand of semiconductor industry. To be brief, it is the capable alternative device that can replace the MOSFETs ICs for better energy efficiency.

References 1. Ionescu AM, Riel H (2011) Tunnel field effect transistors as energy efficient electronic switches. Nature 479:329–337 2. Appenzeller YM, Lin JK,Avouris P (2004) Band-to-band tunneling in carbon nano-tube field effect transistors. Phys Rev Letthttps://doi.org/10.1103/PhysRevLett.93.196805 3. Avci UE, Morris DH, Young LA (2015) Tunnel field-effect transistors: Prospects and challenges. IEEE J Electron Devices Soc 3(3):88–95 4. Jang JS, Choi WY (2011) Ambipolarity factor of tunneling field-effect transistors (TFETs). J. Semicond. Technol. Sci. 11(4):272–277 5. Sahay S, Kumar MJ (2015) Controlling the drain side tunneling width to reduce ambipolar current in tunnel FETs using heterodielectric BOX. IEEE Trans. Electron Devices 62(11):3882– 3886 6. Loan SA, Alharbi AG, Rafat M (2018) Ambipolar leakage suppression in electron–hole bilayer TFET: investigation and analysis. J Comput Electron 17:977–985 7. Chauhan SS, Seema (2018) A new design approach to improve DC, analog/RF and linearity metrics of Vertical TFET for RFIC design. Superlatt Microstruct 122:286–295. https://doi.org/ 10.1016/j.spmi.2018.07.036

Performance Analysis of Hetero-Dielectric Buried Oxide Double Gate …

27

8. Abdi DB, Kumar MJ (2015) PNPN Tunnel FET with controllable drain side tunnel barrier width: proposal and analysis. Superlatt Microstruct 86:121–125 9. Li YC, Zhang HM, Hu HY, Zhang YM, Wang B, Zhou CY (2014) Double-gate tunnel fieldeffect transistor: gate threshold voltage modeling and extraction. J Cent South Univ 21:587–592 10. Sharma N, Chauhan SS (2017) Dual metal drain Ge-source dopingless TFET with enhanced turn-ON steep subthreshold swing and high ON-current. Electron Lett 53(14):960–962 11. Chauhan SS, Sharma N (2017) Enhancing analog performance and suppression of subthreshold swing using hetero-junctionless double gate TFETs. Superlatt Microstruct 112:257–261 12. Paras N, Chauhan SS (2019) Vertical tunneling based tunnel field effect transistors with workfunction engineered hetero-gate to enhance DC characteristics. J Nanoelectron Optoelectron 14(1):50–53 13. Mallik A, Chattopadhyay A, Guin S, Karmakar A (2013) Impact of a spacer-drain overlap on the characteristics of a silicon tunnel field-effect transistor based on vertical tunneling. IEEE Trans. Electron Devices 60(3):935–943 14. Seema, Chauhan SS (2019) Performance investigation of electrode work-function engineered hetero-dielectric buried oxide vertical TFET. IET Circuits Devices Circuits. 13(7):1027–1031 15. Seema, Chauhan SS (2019) Investigation of RF and linearity performance of electrode workfunction engineered HDB vertical TFET. Micro Nano Lett. 14(1):17–21 16. Singh S, Kondekar PN (2014) Dopingless super-steep impact ionisation MOS (dopinglessIMOS) based on work-function engineering. Electron Lett 50(12):888–889 17. Kumar MJ, Janardhanan S (2013) Doping-less tunnel field effect transistor: design and investigation. IEEE Trans. Electron Devices 60(10):3285–3290 18. Juyal R, Chauhan SS (2016) TCAD simulation of Germanium source dopingless Tunnel FET. In: Proceedings of IEEE International conference on advance in computing, communication and automation, Dehradun, Uttarakhand, India, 8–9 April 2016 19. Asthana PK (2015) High-performance 20 nmGaSb/InAs junctionless tunnel field effect transistor for low power supply. J Semiconduct. 36(2): 024003(1)–024003(6) 20. Choi WY, Lee HK (2016) Demonstration of hetero-gate-dielectric tunneling field effect transistors (HG TFETs). Nano Convergence 3(13):1–15 21. Krishnamohan T, Kim D, Raghunathan S, Saraswat K (2008) Double gate strained-Ge heterostructure tunneling FET (TFET) with record high drive currents and Wth b2

(9)

ωid = (2π f )

ωid = 0; 0 < W < Wth

(10)

where, ωid –Ideal rotational speed of rotor f–Frequency ω–Roatational speed of rotor

5 Simulation Results This section assesses the model’s performance when a signal at 4, 5, and 6 Hz is applied to a Simulink model of a Gyroscope-based system. Performance of the system at 4, 5, and 6 Hz is observed in Fig. 7, 8 and 9 respectively.

Fig. 7 A comparison of uncontrolled and controlled performances at 4 Hz

308

A. S. Bandsode and A. G. Thosar

Fig. 8 A comparison of uncontrolled and controlled performances at 5 Hz

Fig. 9 A comparison of uncontrolled and controlled performances at 6 Hz

6 Conclusion This paper designed and developed a method for assessing Parkinson’s diseaseinduced hand tremor using a portable mobile-based model and Wearable for tremor suppression of Parkinson’s disease patients with resting tremors ranging from 3 to 6 Hz. The mobile-based model is more precise than other tremor accessing techniques, and the neurologist can remotely monitor the patient’s condition using this model. The results of gyroscope-based model show that more than 70% of the input reference tremors are suppressed. The proposed wearables are highly accurate, allowing Parkinson’s disease patients to go about their daily lives normally.

Parkinson’s Disease Tremor Suppression Using Gyroscopic Effect

309

References 1. Zhou Y, Jenkins ME, Naish MD, Trejos AL (2018) Development of a wearable tremor suppression glove. In: Proceedings of the IEEE RAS and EMBS International Conference on Biomedical Robotics and Biomechatronics, vol 2018, pp 640–645 2. Rocon E, Ruiz AF, Manto M, Moreno JC, Pons JL (2007) Design and validation of a rehabilitation robotic exoskeleton for tremor assessment and suppression. IEEE Trans Neural Syst Rehabil 15(3):367–378 3. Camara C, Isasi P, Warwick K, Ruiz V, Aziz T, Stein J, Bakˇstein E (2015) Resting tremor classification and detection in Parkinson’s disease patients. Biomed Signal Process Control 16:88–97 4. Levine CB, Fahrbach KR, Siderowf AD, Estok RP, Ludensky VM, Ross SD (2003) Diagnosis and treatment of Parkinson’s disease: a systematic review of the literature: summary. Evid Rep/ Technol Assess 57:03-E039 5. Vidya V, Poornachandran P, Sujadevi VG, Dharmana MM (2017) Suppressing Parkinson’s diseases induced involuntary movements using wearables. Int Conf Technol Adv Power Energy (TAP Energy) 2017:1–4. https://doi.org/10.1109/TAPENERGY.2017.8397267 6. Zulkefli AM, Muthalif AGA, Nordin DNH, Syam TMI (2019) Intelligent glove for suppression of resting tremor in Parkinson’s disease. Vibroengineering PROCEDIA 29:176–181. https:// doi.org/10.21595/vp.2019.21078 7. Kostikis N, Hristu-Varsakelis D, Arnaoutoglou M, Kotsavasiloglou C (2015) A smartphonebased tool for assessing parkinsonian hand tremor. IEEE J Biomed Health Inf 19(6) 8. Zhou Y, Jenkins ME, Naish MD, Trejos AL (2016) The measurement and analysis of parkinsonian hand tremor. In: 2016 IEEE-EMBS International Conference on Biomedical and Health informatics (BHI), Las Vegas, NV, USA 9. https://www.nia.nih.gov/ 10. https://www.precisionmicrodrives.com/ 11. https://medlineplus.gov/parkinsonsdisease.html 12. https://www.niehs.nih.gov/research/supported/health/neurodegenerative/index.cfm 13. https://www.liftware.com/ 14. https://www.real-world-physics-problems.com/gyroscope-physics.html/

Vibration Analysis Method for Fault Diagnosis and Predictive Maintenance on Sporadic Operation Machinery Byounghee Kim, Sinwoo Song, Jeongsang Kim, and Hyokmin Yoon

Abstract Recently, as automation equipment has become high-speed and unmanned, maintenance to maintain safety, consistent performance and quality of automation equipment is emerging as an important factor. In the case of general industrial equipment, it is relatively easy to predict symptoms through data collection and interpretation due to continuous operation. On the other hand, in the case of military equipment, it is difficult to ensure continuity of data due to its characteristics, so it is virtually impossible to predict aura. In this study, a method using the time-synchronized average signal was proposed for fault diagnosis and maintenance of intermittently operated mechanical devices, and the performance of the proposed method was verified by detecting the defect state through frequency conversion. Keywords Vibration Analysis · Fault Diagnosis · Predictive Maintenance

1 Introduction Recently, with the improvement of the performance of the mechanical devices constituting the automated equipment and the development of the control method for controlling the mechanical devices, the automation equipment is gradually changing to high-speed and unmanned. As automation equipment becomes high-speed and unmanned, maintenance to maintain safety, consistent performance and quality of automation equipment is emerging as an important factor. In particular, in the case of military equipment, it is very important to maintain certain equipment performance and quality due to its characteristics. Periodic preventive maintenance currently B. Kim (B) · S. Song Turret Technology Team, Combat Vehicle & Artillery Systems R&D Center, Hanwha Defense, Seongnam 13488, Korea e-mail: [email protected] J. Kim · H. Yoon ISPEC, Changwon 51395, Korea e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023 K. V. Arya et al. (eds.), Proceedings of 7th ASRES International Conference on Intelligent Technologies, Lecture Notes in Networks and Systems 685, https://doi.org/10.1007/978-981-99-1912-3_28

311

312

B. Kim et al.

applied to military equipment is applied based on MTBF (Mean Time Between Failure), and there are factors that may change the maintenance cycle somewhat depending on the actual equipment operating time and environment. Therefore, by applying the aging and deterioration state of the parts according to the MTBF, some normal parts are also replaced uniformly, causing inefficiency factors that can lead to excessive retention of parts according to the type of maintenance parts and wasting human and material resources. As automation equipment becomes high-speed, the problem of vibration of rotating parts of high-speed machines becomes more important. Vibration analysis is useful for identifying, predicting, and preventing failures in rotating machines but requires measurement and analysis of rotating machines using various vibration sensors. A common method for vibration analysis is frequency analysis. In the case of equipment rotating at high speed, however, it is quite difficult to predict the symptoms of failure of the mechanical device even if the frequency analysis is performed. In addition, in the case of industrial equipment, once the equipment is operated, it is usually operated continuously for 24 h, so data collection is easy and prediction of symptoms through interpretation of the data is relatively easy. On the other hand, in the case of military equipment, it is difficult to secure the continuity of data since the military equipment operates when mission occurs, except in special cases. These data are difficult to interpret because of the lack of continuity, and it is virtually impossible to predict symptoms compared to industrial equipment. Due to these characteristics of military equipment, many CBM systems are still not well applied to military equipment. In this study, a method for predicting failure precursors using FFT (Fast Fourier Transform), which is the most commonly used frequency analysis technique for vibration analysis is introduced. In order to verify the performance of the proposed method, the vibration data in the normal state and in the defective state were collected by randomly inserting defects into the bearings in the real equipment consisting of gear-idler-sprocket. Based on the collected data, the performance of the proposed method was analyze using MATLAB. The literature review is introduced in Sect. 2. In Sect. 3, the system configuration is introduced and the proposed method and vibration analysis results is described in Sect. 4. Finally, we made a conclusion in Sect. 5 and describe the future works in Sect. 6.

2 Literature Review One of the most actively studied fields in the field of condition-based maintenance is a system with a rotating body rotating at high speed. To improve several issues which are previously mentioned, a CBM (Condition-Based Maintenance) technique that can perform maintenance according to the condition of equipment or parts has been proposed and researches on maintenance methods through diagnostic and predictive technology by using equipment or system status information is being actively conducted. Lee and Kim [1] reviewed maintenance techniques using big data for condition-based maintenance of railway vehicles. Cho, J.Y Kim and J.M Kim [2] reported bearing failure diagnosis performance using real-time learning with machine

Vibration Analysis Method for Fault Diagnosis and Predictive …

313

learning. In addition, Poonggodai and Reader [3] suggested a rule-based, modelbased, and data-based approach for fault diagnosis using information based on sensor data. Kim, Hong and Han [4] studied how to predict the current activity based on the previous state using the Markov chain model. However, techniques using big data and machine learning have to process a large amount of data and require computing power accordingly. Although various studies for fault diagnosis and maintenance are being conducted, it is still limited to general industrial equipment. Furthermore, application to equipment for special purposes such as military use is limited, and the application range of the applied method is also quite limited.

3 Overview of Gear-Idler-Sprocket System A shell loader mechanism system is considered to collect vibration data. Figure 1 is a 3D model of the actual device which is rotates the motor and drives the shell loading magazine with gear-idler-sprocket. To acquire the vibration data, first, the vibration data was acquired in the normal state, the mechanical device was disassembled, the sprocket bearing was replaced with a defective bearing, and then the mechanical device was reassembled to obtain the vibration data in the defective state. To acquire vibration data, an acceleration sensor was attached to a base equipped with a shell-loading magazine, and the device was operated at 2280 rpm in normal state for 2 h to obtain normal state data. In order to obtain vibration data in a bad state, defects were randomly inserted into the sprocket bearing with a high defect frequency among gear-idler-sprockets to obtain vibration data in a bad state. Defect was induced by making a random 4 mm hole in the outer ring surface of the bearing that supports most of the rotational load. Figure 2 is a Gear-Idler-Sprocket system for vibration data acquisition, and a bearing with random defects induced. In order to check the gradual defect progress of the mechanical device, it is necessary to acquire the defect state data based on natural wear, cracking, etc. It takes a very long time, however, to acquire natural defect data by driving it for a long time in an actual mechanical device, and it is also very difficult to analyze all the data acquired during that time. In this study, therefore, the process of progressively Fig. 1. 3D model of Gear-Idler-Sprocket System

314

B. Kim et al.

Fig. 2 Gear-Idler-Sprocket System and Defect Induced Bearing

Fig. 3 Test Configuration

progressing from the normal state to the defective state was considered through comparative analysis between the data of the normal state and the data of the defect state in which the defect was randomly introduced. Figure 3 is the test configuration for data acquisition.

4 Proposed Method and Experiment Results In this study, a vibration analysis method using FFT which is widely used for vibration analysis is proposed. FFT is the most common method for converting signals into the frequency domain to understand the characteristics of signals that are not easy to identify in the time domain. FFT is a good way to understand the characteristics of a specific signal in the frequency domain, however in the case of a rotating body rotating at high speed, it is difficult to distinguish between normal data and defective data with general FFT even in the frequency domain. In this study, the data acquired in the time domain was first converted into a TSA (Time-Synchronized Signal Average)

Vibration Analysis Method for Fault Diagnosis and Predictive …

315

signal, and then converted to the frequency domain using general FFT to compare and analyze the vibration data in the normal state and defective state[5]. TSA signals are a widely used when analyzing or processing data from rotating machines, as they have the effect of removing noise, disturbances, or periodic signals that do not coincide with rotation. In this study, the vibration data were measured with a period of 2 kHz. The bearing vibration data in the normal state and the bearing vibration data in the defective state in the time domain and frequency domain are shown in Fig. 4. As expected, the difference between the normal state data and the defective state data cannot be distinguished in the time domain, and even if the signal is converted to the frequency domain using FFT. Since it has similar frequency characteristics, the difference between the two data is almost indistinguishable. In this study, therefore, the time-synchronized average signal was first obtained, and the signal was transformed into the frequency domain using general FFT. Figure 5 shows the timesynchronized average signal of the normal state and the defective state in time and frequency domain.

Fig. 4 Vibration data of normal and defective state at time and frequency domain

Fig. 5 TSA Signal of normal and defective state at time and frequency domain

316

B. Kim et al.

It is difficult to distinguish the difference between the two data in the time domain even when converted into a time-synchronized average signal. In the FFT result of the time-synchronized average signal, it can be seen that there is a difference in signal amplitude in the 200 Hz band, but it can’t be determined whether a defect exists only by the difference in amplitude. It can be observed, however, that the frequency of the 400 Hz band moved to the 350 Hz band which means that the frequency band has shifted and it can be seen that a defect has occurred in the rotating body. As a result, it can be seen that the frequency band observed in the normal state gradually shifts as the bearing progresses to being scratched or cracked due to aging. If the test is continued for a long time, it can be predicted that the frequency band of the signal will gradually shift to the 300 Hz range. As shown in Fig. 4, some frequency components are detected in the 300 Hz ~ 400 Hz range even in the result of performing the general FFT. However, in the situation where the actual equipment is operated, noise components are usually introduced and it is difficult to observe with the general FFT results. The method proposed in this study has the effect of amplifying and converting minute signal changes according to some defects, making it easier to determine the presence of defects.

5 Conclusions In this study, a method for detecting defects using FFT, which is generally widely used for fault diagnosis and maintenance of intermittently operated mechanical devices, is presented. To prove the performance of the proposed method, normal state data were obtained by attaching an acceleration sensor to the shell loading device. In addition, random defects were introduced in the outer ring of the bearing, which generally supports the most rotational load, and data on the defective state were obtained. Using the obtained data, a time-synchronized average signal was generated first and the performance of the proposed method was verified through general FFT. Signal processing of the vibration data was performed using Matlab™, and the defect state was detected using the time-synchronized average signal of the normal state and the defective state data. The method using the time-synchronized average signal proposed in this study can be expected to be used not only for equipment operated continuously for 24 h, but also for vibration analysis of various equipment operated intermittently due to the characteristics of equipment.

6 Future Works The vibration analysis method proposed in this study can be applied to general industrial equipment to prove its performance, and it can be expanded to a study that infers the correlation between data acquired by mounting vibration sensors in various parts instead of one place. In addition, by acquiring data from other sensors

Vibration Analysis Method for Fault Diagnosis and Predictive …

317

such as current and studying the interrelationships of different data, it can be used for vibration analysis and maintenance by using current without attaching an additional sensors in the future.

References 1. Lee, K.-S, Kim, J-W (2016). A study on condition based maintenance for rolling stock. In: Proceedings of the Korean Society for Railway, pp 1218–1221 2. Cho Y-J, Kim J-Y, Kim J-M (2017) Performance improvement of bearing fault diagnosis using a real-time training method. Asia-Pacific J. Multimedia Serv Convergent Art Humanit Soc 7(4):551–559 3. Poongodai A, Reader SB (2013) AI technique in diagnostics and prognostics. In: Proceedings of 2nd National Conference on Future Computing 4. Kim DW, Hong SS, Han MM (2018) A study on classification of insider threat using markov chain model. KSII Trans Internet Inf Syst 12(4):1887–1898 5. Kim B, Cheon S, Song S, Rho K, Park I, Lee J (2019) Vibration analysis method for fault diagnosis and predictive maintenance. In: Proceedings of Korea Institute of Military Science and Technology, pp 1678–1679

Intelligent Social Systems

Preservation of Flora and Fauna in an Environmental Ecological Interpretation Center - Loreto – Peru Doris Esenarro , Vanessa Raymundo , Diego Mancilla , Prinsel Becerra , María Loja , and Susana Dávila

Abstract In the present research work, the objective is to propose a proposal for an Interpretation Center that allows the flowering and environmental fauna in Yurimaguas. Taking into consideration the existing problems such as the lack of tourism, natural disasters and hunting (which has extinguished a large part of the flora and fauna species), the project uses a methodology that begins with the review and general analysis of the study area, which was also based on the climatic analysis in which the bioclimatic chart was used (Olgyay, Givany-Milne and the Mahoney Table); For this reason, bioclimatic strategies and clean technologies are applied with local—ecological materials that seek to improve the comfort and quality of life of its inhabitants. Based on the results and its close proximity to the Paranapura River, areas such as: A viewpoint, which has spaces such as restaurants and stalls selling typical foods and craft products, are implemented. Likewise, the implementation of a biodigester that allows the generation of clean energy for the lighting of public spaces from the excreta of the guinea pigs. The sensory garden for incidents and the children’s garden, spaces necessary for social inclusion. The nurseries and greenhouses, tours where the user can find out about the biodiversity of species that Yurimaguas has. Finally, the areas used in the project promote tourism, educate the population and allow visitors to the area to raise environmental awareness. Keywords botanical garden · environmental awareness · sustainability · bioclimatic strategies

1 Introduction The Botanical Gardens are a place where living plants from the different ecosystems of a country, area, climatic zone, etc., are collected, cultivated and maintained, which is at the service of the systematic study of plant species and their ecosystems. D. Esenarro (B) · V. Raymundo · D. Mancilla · P. Becerra · M. Loja · S. Dávila University Ricardo Palma, Santiago de Surco, Peru e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023 K. V. Arya et al. (eds.), Proceedings of 7th ASRES International Conference on Intelligent Technologies, Lecture Notes in Networks and Systems 685, https://doi.org/10.1007/978-981-99-1912-3_29

321

322

D. Esenarro et al.

In addition, these house herbarium specimens in order to have the cadastre of the species that exist in a certain place and thus facilitate taxonomic, genetic, etc., studies about plants [1]. Loreto is the largest department in the country, it is also home to a large number of ethnic groups and native communities, protector of the richest area in biodiversity of amphibians, birds, mammals and plants [2, 3]. One of the cities that reflects this biodiversity through its landscapes is Yurimaguas, which is located in the province of Alto Amazonas, in the department of Loreto, and is located at 148 m above sea level, with an area of almost 2718.00 km2 of Amazonian territory [4]. Loreto experiences an equatorial climate, the meteorological entity of Peru, calls the climate of the region as warm humid tropical [5]. Reaching a maximum temperature of 32 ºC, with a maximum relative humidity between 97 or 98% and the recorded rainfall is between 200 and 300 mm per year [6]. The population settled in Loreto uses many forest species and plants existing in natural forests to be able to satisfy their basic needs, however, these resources do not constitute an important base for industrial development, nor do they contribute significantly to improving their quality of life [7, 8]. Also today, these resources are threatened by overexploitation and do not yield benefits in a sustained manner, nor do they contribute to comprehensive human development. The presence of deforestation and forest degradation, loss of soil quality, illegal logging, loss of biodiversity due to the presence of heavy metals such as lead, cadmium and arsenic in the soil [9], loss of capacity to produce environmental services, are a constant problem in the Loreto region [10]. Under these problems, it is proposed to significantly improve the quality of life of the inhabitants, planning spaces and architectural elements that propose a solution to the problems by disseminating the management, conservation and use of plant species in the territory, spaces dedicated exclusively to the conservation of species that are in some category of conservation in our Amazon jungle, such as nurseries, arboretums, gardens of vulnerable plants, etc. [11, 12]. That is why in the present investigation the objective is to propose an architectural design of a botanical garden that allows environmental awareness in Loreto, being the place of study the territory that limits to the north with the Paranapura river and to the east with the river Huallaga [13]. Environmental awareness is the process of raising awareness among citizens of all countries in environmental matters. Its objective is to create a philosophy of life that is based on respect for the planet, its protection and conservation and on a sustainable use of the natural resources that we have available, in addition to creating awareness of the situation that our environment is going through, which would imply a change in everyone’s behavior and especially in our lifestyle [14, 15]. The Botanic gardens promote research related to conservation in aspects such as seed production, dispersal, pollination mechanisms and phenology. Botanic gardens should also be places where themes related to botany are exhibited for the public, and for this reason they should organize their exhibitions mainly using native plants. It is convenient to distribute the plants in attractive ways that at the same time demonstrate the fundamental principles of ecology and the importance of plants for man [16]. And then the word biodiversity, contraction of biological diversity, is a relatively young term that began to be widely used in ecology and conservation in the mid-eighties of the last century. Some refer to biodiversity as a measure of the number of species in a given locality, while

Preservation of Flora and Fauna in an Environmental Ecological …

323

Phase 1

Phase 2

Phase 3

• Background review and analysis, findings, literature review.

. Analysis and evaluation of the place of study through the use of digital tools.

. Proposal for the botanical garden, applying the bioclimatic criteria for uscaa comfort.

Fig. 1 Study phase

others consider it to be all of the diversity and variability of nature that occurs on Earth. Currently, the term contemplates the multiple manifestations of life on Earth at all its levels of organization, from genes to ecosystems, as well as the ecological, evolutionary and cultural processes that regulate and maintain it. In this sense, rare species, threatened species, those in danger of extinction and, of course, the human species are included [17]. Clean technologies are those that, when applied, do not produce any secondary effect, or any transformation to the environmental balance. They are based on sustainability [18], they mainly use natural and renewable resources such as aerothermal, geothermal and hydrothermal. The main reason for the existence of the so-called “clean technologies” is none other than to reverse the situation of environmental imbalance worldwide that affects us all [19].

2 Methodology 2.1 Subsection The study was carried out by reviewing the biography and collecting information from the study area (Fig 1).

2.2 Place of Study Yurimaguas is located in northeastern Peru. It belongs to the province of Alto Amazonas in the department of Loreto, made up of almost 2,718.00 km2 of Amazonian territory. It has an area of 271,800 hectares. Its geographical coordinates are 5° 53' 38'' South Latitude and 76° 6' 25'' West Longitude [20]. Figure 2 shows the geographical location and delimitation of the department of Loreto, which borders the departments of San Martín, Huánuco and Ucayali, and the countries of Brazil, Colombia and Ecuador. The study site is bordered to the north by the Paranapura River and to the east by the Huallaga River [21].

324

D. Esenarro et al.

Fig. 2 Study site map [20].

2.3 Climatology 2.3.1

Solar Radiation

Figure 3 shows the variation of Loreto’s radiation, the levels it has so much so that in February it has a solar radiation of 4.0–5.5 Kw h/m2 , likewise it can be seen that it practically follows the same radiation until in the month of October, in the month of November the intensity of solar radiation is very high, reaching 5.0–7.0 Kw h/m2 [21].

2.4 Flora and Fauna The Province of Alto Amazonas presents at least 396 botanical species that are included in 80 families and 225 botanical genera [19]. In Fig. 4(a) the four most abundant flora species in Yurimaguas were identified and the concentration of species was located with numbers in the vegetation map referring to the types of forests, complexes and populated centers, also in the lower part for each image of the species, a brief explanation is given in which areas of the district they predominate. In Fig. 4(b) seven more abundant species of fauna

FEBRURARY

Fig. 3 Solar radiation graph [21, 22]

MAY

AUGUST

NOVEMBER

Preservation of Flora and Fauna in an Environmental Ecological …

325

were identified, which were represented by numbers to identify them in the fauna map classified as primary, secondary, tertiary and residual fauna, as well as the flora graph, in the lower part of each image of the species gives a brief explanation of the specific place where they abound [23].

3 Results 3.1 Project Location and Topography The chosen land is located in Yurimaguas, which belongs to the province of Alto Amazonas in the department of Loreto, the lot has an area of 67,000 m2 . Figure 5(a) shows us the land that has an area of 67,000 m2 , since we will propose spaces that represent a larger area of our surface, such as the arboretum and nurseries, which we will explain in more detail in the proposed spaces. In Fig. 5(b) the image of the volume of the topography, which shows that the study area has mostly a flat topography and without excessive slopes. In the image of the topography, the delimitation of the land chosen for the proposal and the symbols of the cuts can be more accurately noted. A cross section and a longitudinal section were made on the ground, in the longitudinal section there is a slope with a height variation of 137 m to 140 m, and in the cross section there is a slope with a height variation of 128 m to 139 m. meters. In Fig. 6(c), which is the longitudinal section, it can be identified that the maximum height reaches 139 m and the lowest 128 m.

3.2 Volumetric Proposal 3.2.1

Solar Path

3.2.2

Proposed Spaces

– Greenhouse, Topiary, and Kindergarten The greenhouse of our proposal was raised for species that require special care. This presents a series of benefits such as the precocity in the growth of the fruits, allowing production out of season, saving water and fertilizers, facilitating the control of insects and pests [24]. Figure 7(a) shows us how we are proposing and managing the shape of the greenhouse; in (b), it does not lose its shape even in the interior paths. Figure 7(b) show us the topiary that we include in the proposal is an environment of reception or welcome to the botanical garden. In it, we also include different species of trees that have a particular shape for the visual aesthetics of the botanical garden [25].

326

D. Esenarro et al.

Fig. 4 a Map of the concentration of vegetation. b The most abundant species of fauna [23].

Preservation of Flora and Fauna in an Environmental Ecological …

327

Fig. 5 a Terrain, image of the topography of the ground in plane b. Section A-A, B-B section

Fig. 6 Solar Path

Fig. 7 Exterior a and interior b design of the greenhouse. Views of the topiary trail

Figure 9(c) shows us The kindergarten included in the proposal is dedicated to the children of the town of Yurimaguas. – Sensory Garden (Fig. 8)

328

D. Esenarro et al.

Fig. 8 a y b Views of the Sensory Gaden

Fig. 9 a Photo of the plan proposal for the Botanical Garden. b Photo of the vegetable tours

Sensory gardens are proposed in our project especially for disabled people and with the aim that they can enjoy the botanical garden as well as other users [26].

3.3 Planimetry and Program For the proposal, it was proposed to connect the entrances with the streets of San Miguel Street and Pasaje Requia-702. The viewpoint and recreational spaces would be favored by the views offered by the Paranapura River. The arboretum and palmetum are planned on the edges of the land to take advantage of the connection of trees that are also installed on the land and favor the image of the facades.

Preservation of Flora and Fauna in an Environmental Ecological …

329

Fig. 10 Materials used in the project

3.4 Materiality Figure 10 shows that the local materials used in much of the project were identified.

3.5 Strategies Applied to the Project 3.5.1

Reservoirs in the Form of Piles and Solar Power System oFF GRID

The reservoirs in the form of piles are a storage structure, being its water storage structure that is built buried in the ground. The reservoir is designed in such a way that it can be supplied through a hose, direct rainwater harvesting, or by runoff, through ditches [27]. In addition, trees can be planted in the area adjacent to the reservoir, but not species such as eucalyptus, because it would absorb the water. It is necessary to plant plants that help conserve the liquid, so it will be very helpful for our Botanical Garden (Fig. 11 and Table 1). A system isolated from the electrical grid or also called an off-grid system refers to a power generation system with solar radiation to generate electricity autonomously through solar panels. This is today one of the best alternatives to supply energy in remote places quickly and safely, through solar panels. This, due to its simple

Fig. 11 a Reservoir Design, b Solar panels istalled in Cuyisea

330 Table 1 Calculation for the amount of water in liters that our reservoir will store

D. Esenarro et al. Surface area (m2 )

mean water depth (m) Volume (m3 ) 1.5 m =

2 250 m3

Volume (m3 )

Liters of water (L)

Total reservoir water (L)

2 250 m3 x

1000 L =

2 250 000 L

1 500

m2

x

1 m3 = 1000 L agua

Table 2 Calculation of solar panels

Table 3 Solar Panel Features

Table 4 Calculation of energy demand

Cuyisea area

143. 91 m2

Photovoltaic panel performance

275.23 kW

Solar Panel Potential

2000 W

Dimensions

955 × 530 × 25 mm

Type

monocrystalline

HSP

Work Efficiency Module Peak (W) Potential (W)

Potential Module (Wh/day)

1.3

275,230

715598 × 103

2000

operation and installation. It can be installed in rural places for various applications: residential, agricultural and industrial in any part of Peru (Tables 2, 3, 4, 5 and 6).

Table 5 Energy demand per day

Table 6 Monthly energy demand

Wh/day

units

Wh/day

715598 × 103

138

9.88 × 1010

To transmit a Kwh/day Wh/día 9.88 × 1010

Conversion 1000.00

Kwh/day 9.88 × 107

Kwh/day 9.88 × 107

Daily (Kwh) 30.00

Monthly (Kwh) 3,293,333.33

Preservation of Flora and Fauna in an Environmental Ecological …

3.5.2

331

Cuyisea

• biogas and cuy cuyisea hatchery Two metallic cylindrical biodigesters were designed and built, with the same dimensions and characteristics, each with an internal volume of 227 L. and we worked with a mixture of substrate formed by guinea pig droppings, stubble from the guinea pig vegetable food and water (Fig. 12). The guinea pig hatcheries will be proposed for the collection of guinea pig droppings, they will also be used as a source of food for the guinea pigs. These are raised around the Botanical Garden to meet the needs of the people who visit this space, in addition to taking advantage of the meat of the guinea pigs of our cuyisea. The gas and light of these guinea pigs will clearly be provided by our biogases and their structure is made from bamboo material (Tables 7, 8, 9 and 10).

4 Discussion In the present research work, the objective is the revaluation of the species in flora, which has been affected by deforestation; For this reason, it motivated the proposal of the Botanical Garden, which not only houses different types of species, but also sensitizes the population about the care of these species. Deforestation is an effect of the chain of causes that is having a significant impact on the forests of

Fig. 12 a Biodigester design, b Design of the guinea pig hatchery

Table 7 Characteristics of 1 biodigester

Internal volume of 1 biodigester

227 L

Table 8 Solid waste volume Volume of guinea pig excrement for 1 biodigester

30 L

Volume of stubble of vegetable food from the guinea pig for 1 biodigester

60 L

Tap water volume

30 L

332

D. Esenarro et al.

Table 9 Calculation of the amount of biodigesters and components for 1 Cuyería Biodigesters for 1 Cuyeria

Volume of guinea pig droppings

Volume of vegetable food stubble of guinea pig

Tap water volume

4

120 L

240 L

120 L

Table 10 Calculation of the number of guinea pigs for 4 biodigesters Biodigesters for 1 restaurant

Volume of guinea pig droppings

Volume of vegetable food stubble of guinea pig

Tap water volume

4

120 k

240 L

120 L

Volume of guinea pig droppings

Total guinea pigs

120 L

1200 guinea pig

The amount of manure produced by 1 guinea pig = 100 g/d

the Loreto Region. The more intense and recurrent the deforestation and degradation, the recovery capacity of the vegetation decreases and the balance of these three elements (forest, soil and water) is broken, making its degradation irreversible. Likewise, within this proposal, different clean energies are proposed that will help save energy throughout the proposal [9].

5 Conclusion The Botanical Gardens are spaces that take advantage of the cultivation of plants with the aim of researching, conserving and disseminating them. In the city of Yurimaguas, a space with great utility and potential to serve the community was identified. The intervention of this area requires a process of sociocultural, physical and environmental study that allows the generation of a botanical garden model that impacts environmental sensitivity. The city has a variety of flora and fauna that is not used; we will make a botanical garden to attract tourists (since there are no tourist attractions or places to attract the public there). The sustainability criteria considered in the proposal: Accessibility, comfort, landscaping, connectivity, economy and uses. The botanical garden has a positive effect on environmental awareness.

References 1. Mac Kinnon G (2016) Botanical gardens: much more than plants 2. Rodriguez A (2021) Did you know that Loreto has 43 protected natural areas that ensure resources such as water?

Preservation of Flora and Fauna in an Environmental Ecological …

333

3. Filomeno E, Ricardo Z, Tony M (2014) Vegetation. Ecological and economic zoning of the province of Alto Amazonas. Department of Loreto 4. Mapnall (s.f.) Mapa - Yurimaguas. http://www.mapnall.com/es/Mapa-Yurimaguas_1145788. html 5. Clima de Loreto (s.f.) iperu.org. https://www.iperu.org/clima-de-loreto-peru 6. Wieser M (2011) Notebooks 14 bioclimatic considerations in architectural design: the peruvian case 7. Esenarro D, Rodriguez C, Arteaga J, Garcia G, Flores F (2021) Sustainable use of natural resources to improve the quality of life in the Alto Palcazu population center, Iscozazin-Peru. Int J Environ Sci Dev 12(5):146–149 8. Valderrama H (2003) Plants of economic and ecological importance in the botanical garden Arboretum El Huayo, Iquitos, Peru 9. Grados C, Pacheco E (2016) The impact of oil extractive activity on access to water: the case of two Kukama Kukamiria communities in the Marañón basin, Loreto, Peru 10. Kometter R (2013) Loreto Region forest and wildlife diagnosis 11. Tafur I, Esenarro D, Ascue J, Rodriguez C, Alfaro J, Quispe W (2020) Environmental vulnerability of the fragile ecosystem and the sustained development of the Huancaro-district micro-basin of Santiago, Cusco 12. García H, Moreno L, Londoño C, Sofrony C (2010) National strategy for plant conservation 13. Mapa De Rutas De Evacuación (2015). https://portal.indeci.gob.pe/wp-content/uploads/2018/ 07/RioHuallaga.pdf 14. Lagos J, Esenarro D, Aquije C, Bringas J (2021) Formative method for the development of environmental behavior in university students Lima-Peru. 3C Empresa. Investigación y pensamiento crítico 10(4):107–125 15. Rolleat (2020) Definition and effective activities for environmental awareness 16. Forero E (2011) Botanical gardens and nature conservation 17. Quispe W, Esenarro D, Quiroz L, Davila S, Garagatti MV, Aparicio R (2021) Beekeeping production in three life zones as a strategy for environmental sustainability in Apurimac, Peru–2021. Nat Volatiles Essent Oils 8(5):8417–8424 18. Herreriana (2019) Biodiversity and geodiversity: a reflection on its conceptualization, vol 1, No 1 19. International Diamond Group (2021) Do you know what clean technologies are? https://www. gdiuniformes.com/sabes-que-son-las-tecnologias-limpias/ 20. Yurimaguas, Distrito.pe (2022). https://www.distrito.pe/distrito-yurimaguas.html 21. Clima en Loreto (Perú) (s.f.) Datosmundial.com. https://www.datosmundial.com/america/ peru/clima-loreto.php 22. Simulated historical weather and climate data for Iquitos (s.f.) Meteoblue. https://www.met eoblue.com/es/tiempo/historyclimate/climatemodelled/iquitos 23. Fauna AR (2013) Ecological and economic zoning of the province of Alto Amazonas. Department of Loreto 24. Ministerio de trabajo y economía social (Gobierno de España) (s.f.) Instituto Nacional de seguridad y salud en el trabajo (INSST). https://www.insst.es/-/-que-es-un-invernader-1 25. Bonells J (2017) Introducción al arte topiario. https://jardinessinfronteras.com/2017/10/24/int roduccion-al-arte-topiario/ 26. Eugenio de Jesús MF (s.f) The botanist’s areas. https://botanicodesantiago.com/las-areas-delbotanico/ 27. Contexto ganadero (2014) Reservorios de agua: ventajas, consejos y mantenimiento. https:/ /www.contextoganadero.com/ganaderia-sostenible/reservorios-de-agua-ventajas-consejos-ymantenimiento

Communication and Technology into Product Design Implementation of Craft Design to Modern Jewelry as an Awareness Product Donna Angelina Sugianto, Hari Nugraha, Zita Nadia, and Andrea Valerie

Abstract As social beings, human need interaction to meet their needs in terms of carrying out their lives in daily activities. Human who tends to be individualistic makes the existing sense of empathy eroded, especially in the modern as today. No matter how individualistic a person is, there will be times when humans need help or assistance from others. For example, when someone is experiencing an urgent medical experience or when a crime is being committed. Sometimes, many communication barriers regarding asking for help in these situations. This study is a pilot project that tries to create a jewelry product that has additional functions as a means of communication to ask for help from people around and provide medical information for the emergency needs of the disease suffered by the user of the product. The features developed are jewelry products with designs that can be used to make sounds as a signal to ask for help and the provision of medical information that can be accessed via a QR code that can be scanned using a smartphone device. The method uses a behavioral observation approach and design thinking methodology for the design process. The study and testing of product prototypes show that the sound signal generated from the jewelry product can attract the attention of people around the user and easier to hear. The QR code can be accessed and provide medical information from smartphone devices through the Revive application (mobile or desktop). Keywords Wearable Device · Medical Information · Communication

D. A. Sugianto (B) · H. Nugraha · A. Valerie Future Craft Lab, Product Design Department, Universitas Pembangunan Jaya, South Tangerang, Indonesia e-mail: [email protected] Z. Nadia Visual Communication Design Department, Universitas Pembangunan Jaya, South Tangerang, Indonesia © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023 K. V. Arya et al. (eds.), Proceedings of 7th ASRES International Conference on Intelligent Technologies, Lecture Notes in Networks and Systems 685, https://doi.org/10.1007/978-981-99-1912-3_30

335

336

D. A. Sugianto et al.

1 Introduction Emergency situations can happen to anyone and anywhere. Crisis and catastrophes are included as natural disaster, social and economic adversity, political situations, as well as public health issues. Based on ready.gov and Weston.org sites, matters that are considered as urgent situations are snowstorm, chemical spillage, dam failure, droughts, earthquake, severe weather, fire, floods, hurricanes, child kidnapping and death, family members with Alzheimer disease, pandemics, local rabies situation, terrorist attacks, thunderstorms, medical emergencies, and tornadoes [1]. In 2014, there are 196 reported cases to Indonesian National Administration of Children’s Safety, which includes forty-five cases of child abduction, and 15 cases of missing children [2]. 618 cases of missing elderly caused by dementia in Surabaya were reported through January 2017 to July 2019 [3]. Additionally, there are numerous data retained from the urgent cases that were reported to Indonesia’s National Commission Against Woman Violence in 2021. There are 1,731 reported public violence [4] that happened toward women in 2021, whereas there are seventyseven reported cases of woman with physical and intellectual disabilities in 2020 [4]. There are also a rise of reported children missing in 2014. Other urgent cases similar to being exposed to a particular disease outbreak or animal zoonotic disease, missing person case during natural disaster or being under a terrifying situation can happen to anyone at any part of the world in anytime. Communication is an essential part of each individual to inform their thoughts. In the case of emergency, communication is a vital and can be done with verbal, nonverbal, writings, noise, and visuals [5]. Noise travels through wave and amplifies when it touches surrounding object to give out information. When we are unable to look at our surrounding, there is no one to talk to, noises can be an effective alternative way to help us in conveying information to the surrounding area. Making a whine, hoarse noise, and sniffing noise are one of the ways of social communication to give away emergency signal. This method of communication is utilized to transfer emotion without verbal communication. The previous statement stated that communication serves as a link. In the present day, information technology is essential, including connectivity as an element of the IoT ecosystem [6]. The range of sound waves has limitations and creates movement that needs to be seen by possible relief agents. It was necessary to have a digital technology application that functions to serve information, namely a QR code, as shown in Fig. 1 for the intended user. The use of QR codes as a provider of information about public health history is commonly applied to hospital patients [7]. QR code may provide information about the patient’s medical history, pre-existing illnesses or allergies, medical conditions, types of medications prescribed by the hospital, and other details [8]. This digital technology facilitates the shift of communication interactions that are limited by time and environment into unlimited communication patterns. With the absolute continuity of information that can be accessed and broadcast through digital media, emergencies can be handled or responded to with an immediate approach.

Communication and Technology into Product Design

337

Fig. 1 QR Code sample. Source: Author doc

A product that serves as a daily wear and attaches to the body like jewelry, can be used as an option to operate as wearable device. Not only being worn as a jewelry, but the device can also be worn as a method of communication by sending emergency signal and as a media of communication through a digital device such as a smartphone. This communication device hopes to resolve urgent and emergency situations, such as medical emergency, prevent crime, and other urgent conditions through vocal communication and digitally accessed information. The benefit of using jewelry as communication device is the device always attach to the user’s body. Many of safety wearable devices today have major disadvantage where they can easily fall because they are not wearable device for the user [9]. This research is focusing on jewelry as a device but still has their luxury value for the wearer. Just like its name, jewelry supposed to be made with precious metal, for example silver. Alarm devices and scanning devices are two different things. Each has its own effectiveness value as shown in the following Table 1: Table 1 The effectiveness of alarm and scanning devices Effectiveness No Alarm (communication) Devices

Scanning Devices

1

Whistle sound

Fast responding for the surroundings, Quick with 110-120db the sound of whistle Response can be heard at least 800 m. Whistle (QR) code sound also known as an alert sign of something

2

Walkie talkie

Information to only one person, in this case the person holding the walkie talkie

Effectiveness

fast in terms of operation

Manual Need several time method (by for input the data input data to a device)

338

D. A. Sugianto et al.

2 Methodology This research begins with the observation to collect data on the needs of product users. Furthermore, using the Design Thinking methodology [10] for the design process. The first step is to conduct an empathy study by observing the information needed in an emergency. The observations describe the problems obtained from the victim and those closest persons. The next stage is to process the findings from the study of empathy and existing trials into several creative and innovative ideas through the steps of the design process based on user needs, behavior, and usage. The study phase continued with the implementation of the solution through the manufacture of jewelry prototypes made of Silver material. QR code creation on the product surface using laser engraving technology. The QR code scan presents the simple interface of the Revive application on the smartphone screen. The finished prototype was tested in terms of user behavior and operational devices. The trial’s final results will find several things that need to be reviewed for future improvements.

3 Result and Discussion This research is divided into several parts, namely users, objects as solutions and technology-based information media. This process involves a consumer of a jewelry company CV. Adhiluhung Kausa Anugerah Laksmi (CV AKAL) located in Pondok Aren Tangerang Selatan, Craftsmen and team from Revive who play a role in terms of IT and User Experience. These stages are described as follows: a. Empathy Studies. The empathy studies conducted were aimed at 2 different personas, namely from the side of the victim (person A) with a disguised name, where this person has auto-immunity that can weaken this person’s body if the disease recurs and also from the side of the person who receives an emergency signal or finds the victim is suffering from a relapse. Is in an emergency condition (person B). The things studied can be seen in the following Table 2: b. Define. In the victim’s position, it was conveyed that there was a need for an alert system to give a signal to their surroundings if they were in an emergency and if they did not have time to ask for help, an easy and effective information system was needed. Then from the side of people who get an emergency signal or find a victim who is in an emergency condition, they argue that basic information is needed from the victim in the form of a telephone number of a person who can be contacted and data on the main illness suffered. c. Ideate. From the results of behavioral observations made to users, objects that can be used as a means to provide warning signals and information are jewelry in the form of necklaces. Based on the body location as seen on Fig. 2, the placement of jewelry on the neck is much easier for the victim to use, easy for the rescuer to see and easy to reach by hand when carrying out its function as a signaler. In order for this jewelry to produce a resonant sound, a hollow or volume shape is

Communication and Technology into Product Design

339

Table 2 Empathy study output No

Variabel

Person A

Person B

1

Actions to take in an emergency

Asking for help from those around us

Contacting the help center

2

How to ask for help

Scream in the hope that someone will hear; Call; seek help in the contact close relatives nearest area

3

Tools you have to ask for help

Smartphone; medical jewelry

Smartphone

4

When an emergency occurs, you don’t have time to ask for help, what to expect

Helpers look at the marks on the medical jewelry that is used; helper Find out my identity in the hope that it can be used as a reference to ask for help from the appropriate party

-

5

What to do when you find a victim who hasn’t had time to ask for help

Seek help in the nearest area; contact the help center; look for the cellphone/identity attached to the victim

required. The shape used is a cylinder where the structure of the inner surface forms a hollow. Surfaces with a concave plane can reflect sound waves that point in one direction [11], the reflection can be seen in Fig. 3. Emergency conditions require quick handling as well. Judging from this need, the information media that is easily accessible and its existence is quite familiar is the QR Code which can be scanned using a smartphone as in Fig. 4 and will later be connected to an application on the smartphone. The application contains basic information such as telephone numbers that can be contacted, a description of the illness suffered, the telephone number of the referral hospital that the victim usually visits. From the basic information contained in the application, it is hoped that it can provide a way out for further actions. To be able to print the QR Code and to make it easy to read, we need a media with a flat surface with a design that can be adjusted to its aesthetic value. Based on this analysis, the jewelry that is applied as a communication medium is a cylindrical necklace like the one in the design process in Fig. 5. This necklace has a pendulum in the form of a whistle that is used by blowing it and has a flat plate as an information medium that can be accessed via QR Code. d. Prototype. After getting a design that is adapted to the stages mentioned above, then a prototyping design is carried out with 2 different sizes with target users, namely men and women. Materials that has a solid (not porous and not perforated), hard and flat surface reflects almost all of the sound energy [13]. The material used is silver with a concentration of 92.5% and has 1.1 mm’s of thickness, which is more than 5% of the tube diameter [13]. This necklace has 3 parts, namely a chain to attach to the human body, a flat plate for information media

340

Fig. 2 Body-map motion impedance [12].

Fig. 3 Reflection of sound through the curved surface. Source: Author doc

Fig. 4 QR code on the silver plate and QR scan process. Source: Author doc

Fig. 5 Sketch and 3D drawing. Source: Author doc

D. A. Sugianto et al.

Communication and Technology into Product Design

341

based on QR Code technology and a whistle with a cylindrical shape. The fabrication process carried out is the manufacture of silver metal plates and whistles. The initial step in this process is to make a metal plate into a cylinder as shown in Fig. 6a. Then proceed with plate making, with the front side being engraved to add aesthetic value to the jewelry and the back side being plain as a medium for placing the QR Code. The chain used will use a chain that is already available in the market. The next step is the installation of decorative elements in the form of cubic zirconia stones at several points, Fig. 6b. After that the stage of printing the QR Code using the laser engraving method. The last stage is the polishing and platting process using chrome and yellow colored rhodium liquid, or in Indonesia it is commonly referred to as white gold and yellow gold. Necklace jewelry ready for trial, Fig. 7. Next, make a prototype user experience that is on a smartphone application. We decided to create high fidelity prototype. The high fidelity prototypes have great visuals that able to show the idea to others [14]. To enter the stage of making UX Design, you need a UX mapping. This stage is far from perfect, and

Fig. 6 Fabrication and stone setting process. Source: Author doc

Fig. 7 Final prototype. Source: Author doc

342

D. A. Sugianto et al.

will continue to develop in the future. Figure 8 below is a display of the results of the UX Design which is still temporary. e. Test. The trial process was carried out to measure the following five variables (Table 3): Basically, this necklace can carry out its function, it’s just that the test is carried out when the surrounding environment is not crowded, so that the whistle is not so distracted from other sounds around it. More testing is needed when it’s in a more crowded situation. The volume produced on a necklace with a small diameter

Fig. 8 UX Design for Revive Application’s plan. Source: Author doc

Table 3 Test result No

Variabel

Result

1

Whistle can work

The whistle made a sound

2

Sound volume

Men’s necklace: the result of the sound has a heavier tone of voice (low pitch) Women’s necklace: the result of the sound has a higher tone of voice (high pitch)

3

Sound coverage radius

Women’s necklaces can be reached well up to an average radius of 8 m

4

Information system via QR Code can be detected by HP camera

QR code can be detected easily by cellphone camera

5

UX Design on Apps

For starters there are still some parts that need to be shown on the page in more detail, for example when tapping on Medical Record

6

necklace weight

Men’s necklace: a bit heavier than women’s Women’s necklaces: their weight is still within the tolerance limit category (appropriate)

7

Finishing resistance (rhodium plating on silver)

The color change in the oxidation process of necklaces that use yellow gold is faster than those of white gold

Communication and Technology into Product Design

343

(necklace for women) is easier to hear than on a necklace with a larger diameter (necklace for men). The range of sound on men’s necklaces needs to be reviewed in order to function optimally. By detecting the QR code on the silver metal surface, it means that the information system at this early stage is running well, it’s just that the UX Design needs to be mapped further. The weight of a men’s necklace is also determined from the overall material used, in this case the lighter chain necklace should be chosen. The final layer which is easy to change due to the oxidation process needs to be explored again from the side of the coating process or from the use of other chemicals, whether it needs to be added or replaced with other chemicals.

4 Conclusion Jewelry with a cylindrical shape that produces sound and has an IoT-based information system in the form of a QR Code is a combination of metal-based jewelry crafts and technology as a communication medium to convey emergency signals. The weight of the necklace is 15 g for women’s necklace and 30 g for men’s necklace. The final result of this trial reached approximately 80% of the target at the initial research stage. The benefits are quite positive, because it can be used as a medical alert only, but it can also be useful as an awareness product, for example for women as crime prevention, for children and the elderly as a communication aid during an emergency. This research can still be developed more widely. The next plan, apart from improving the results of the initial trial, also tries to test the market demand for this product with a simple application that is already running, and we will try to create another experiment to do some comparative study to compare the effectiveness between scanning and alarming devices. There is also some future research that can be conducted from other field, be-cause we have so many limitations and many factors are not covered in our research such as; study the health effect of scanning process through metal media on human body and also try to find some other alternatives to create the jewelry, and research that focusing the technical aspect of the sound that produce by our jewelry.

References 1. WESTON. https://www.weston.org/420/Types-of-Emergencies. Accessed 22 Oct 2022 2. Liputan6. https://www.liputan6.com/news/read/2277256/pengaduan-anak-hilang-sepanjang2014-hampir-200-kasus. Accessed 22 Oct 2022 3. Suara Surabaya. https://www.suarasurabaya.net/kelanakota/2019/Sejak-2017-SS-MencatatAda-293-Kasus-Lansia-Hilang-Karena-Demensia/. Accessed 22 Oct 2022 4. Komnas Perempuan. https://komnasperempuan.go.id/siaran-pers-detail/catahu-2020-komnasperempuan-lembar-fakta-dan-poin-kunci-5-maret-2021. Accessed 23 Oct 2022 5. Drexel. https://drexel.edu/graduatecollege/professional-development/blog/2018/July/Fivetypes-of-communication/. Accessed 23 Oct 2022

344

D. A. Sugianto et al.

6. Wuryanta AGEW (2004) Digitalisasi Masyarakat: Menilik Kekuatan dan Kelemahan Dinamika Era Informasi Digital dan Masyarakat Informasi. Jurnal Imu Komunikasi 1(2):132–133 7. Uzun V, Bilgin S (2016) Evaluation and implementation of QR code identity tag system for healthcare in Turkey. Springerplus 5:1–24 8. Dube S, Ndlovu S, Nyathi T, Sibanda K (2015) QR code based patient medical health records transmission: Zimbabwean case. https://doi.org/10.28945/2233 9. Kashyap M, Saxena S, Agarwal S, Singh R (2020) Review on child safety wearable devices. Int J Sci Res Manag Stud 4(3):60–64 10. Interaction Design. https://www.interaction-design.org/literature/article/stage-3-in-the-des ign-thinking-process-ideate. Accessed 24 Oct 2022 11. Tschimmel K (2012) Design thinking as an effective toolkit for innovation. In: ISPIM conference proceedings. The International Society for Professional Innovation Management (ISPIM), p1 12. Zeagler C (2017) Where to wear it: functional, technical, and social considerations in onbody location for wearable technology 20 years of desigining for wearibility. In: International Symposium, on Wearable Computers. Georgia Institute of Technology. Maui, Hawaii (2017) 13. Zakri KW, Muntini MS, Indrawati S (2015) Pengaruh Variasi Jenis Bahan terhadap Pola Hamburan pada Difuser MLS (Maximum Length Sequence) Dua Dimensi. Jurnal Sains dan Seni ITS 4(1):11–16 14. Bahri S, Manik TN Suryajaya (2016) Pengukuran Sifat Akustik Material Dengan Metode Tabung Impedansi Berbasis Platform Arduino. Jurnal Fisika FLUX 2(13):148–154

How Current Chatbots Applications Impact Education: An Overview Saroff Yataco-Irrazábal, Isabel Moscol-Albañil , Ciro Rodriguez , Pedro Lezama , Diego Rodriguez , and Yuri Pomachagua

Abstract The implementation of chatbots in multiple platforms with which man interacts has allowed automating processes and being able to respond to requests, one of its applications is the educational field, where they are still experimenting with good results in some areas and in others analyzing their feasibility, the deployment of this technology has been used both in basic education and in higher education, the former mainly addresses the resolution of simple queries facilitating the work of the teacher, and the latter seeks to go further by offering itself as a learning assistant. This work focuses on understanding the impact that chatbots have on education and their integration in some areas of the educational process, analyzing the results offered by other research and real applications. Chatbots have proved to be effective and increase user efficiency by providing information and being a support, evaluation, and follow-up tool. They have even shown favorable results in several learning levels, being a source that centralizes information without the need for the user to access multiple sources to learn a subject or to monitor the level of learning of students or their own. Keywords Chatbots · Education · Learning

S. Yataco-Irrazábal · C. Rodriguez (B) Department of Software Engineering, Universidad Nacional Mayor de San Marcos UNMSM, Calle Germán Amézaga N° 375, 15081 Lima, Peru e-mail: [email protected] I. Moscol-Albañil Mechanical Technology Laboratory, Department of Mechanical and Electrical Engineering, Universidad de Piura UDEP, Av. Ramón Mugica 131, 20009 Piura, Peru C. Rodriguez · P. Lezama · Y. Pomachagua System Engineering Faculty, Universidad Nacional Federico Villarreal UNFV, Av. Óscar R. Benavides 450, 15082 Lima, Peru D. Rodriguez Medicine, Faculty of Health Sciences, Universidad Peruana de Ciencias Aplicadas UPC, Av. Alameda San Marcos 11, 15067 Chorrillos, Lima, Peru © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023 K. V. Arya et al. (eds.), Proceedings of 7th ASRES International Conference on Intelligent Technologies, Lecture Notes in Networks and Systems 685, https://doi.org/10.1007/978-981-99-1912-3_31

345

346

S. Yataco-Irrazábal et al.

1 Introduction In the search to improve educational processes and modernize traditional education, different technologies have emerged that support student learning, as well as the teacher, the most common example, is Learning Management Systems (LMS) platforms, now in worldwide, there is a massive incorporation of LMS platforms in teaching practice [1], allowing asynchronous interaction with students. However, if synchronous communication is required, then it is possible to use another complement, such as chatbots, which can be used as a notification tool for registered events [2], automate the teacher’s responsibilities through the generation and review of exams, and maintain a follow-up of student’s grades. Nowadays, chatbots oriented toward education are focused as pedagogical agents that communicate through an interactive interface with the learning material [3, 4], and they also offer an intelligent monitoring system that provides personalized teaching adapted to the student’s abilities. All these advantages and personalization have become feasible due to the development of AI techniques. However, certain unknowns still need to be discovered, such as how efficient the use and adaptability of chatbots to the system managed by each teacher, how effective their generalization for certain subjects are and what their most innovative applications are associated with education. To answer these questions, this research will first examine what a chatbot is with all its theoretical framework based on the definitions, structures, and technologies, and then explain educational applications with real examples and methodologies implemented.

2 Definitions Although the term chatbot is easily deducible to what it refers to, understanding what it is and how it works involves technical issues. First, it is necessary to understand its origin, starting from the fact that the ultimate goal of the chatbot is to establish fluid and understandable communication with the user. It is also part of the foundations of the Turing test, where researchers have tried to overcome said test over time, from simple programs that stored answers to others that answered with counter questions and, over time, adopted new techniques to improve their effectiveness and naturalness. It was in August 1989 that TinyMud was launched; it is a MUD (text-based multiplayer role-playing game) server name which allowed the creation of computercontrolled players called “Chatter Bots” who was able to hold a conversation with other players and answer questions about the game [5]. It was programmed in C language and was structured as described in Fig. 1. Usually, chatbots are considered AI programs [6], in addition to the fact that they are also considered as these “Artificial conversational entities, interactive agents, intelligent bots and digital assistants” [7]. In their origins, such programs could not be considered intelligent since they were limited to storing the answers to

How Current Chatbots Applications Impact Education: An Overview

347

Fig. 1 Chatter Bot architecture for TinyMUD

preprogrammed questions, something similar to a FAQ, but with the imposition they received with AI techniques, it was possible to improve not only the effectiveness of the capture of the message but also the naturalness of the communication, this meant that it could be implemented in various sectors of human activities, not only taking training sectors but also more relevant activities such as business, and e-commerce, and health, and in education, among others [8].

3 Applications Approaches This research will not focus so much on the classification of categories according to the domain they belong to but more on the approaches on which they are based, and that is where their growing popularity could be explained. Such an approach is pattern matching and machine learning [7].

3.1 Pattern Matching Approach They are based on rules or structures; they search for pattern matching to classify the message and send a predefined response through algorithms; this is done when the bot receives the message and searches for the match with a programmed pattern, and sends the template it related to the matching pattern, this action is applicable in a bidirectional way, that is, both have the roles of sender and receiver change, TinyMUD uses this approach with the well-known Chatter Bot [9].

348

S. Yataco-Irrazábal et al.

3.2 Pattern Matching Approach The chatbots that are based on Machine Learning simulate a conversation through text and video and process the information through the inputs they receive; in a certain way, they learn with the messages, and this feedback allows them to make better responses; this is due to the use of natural language processing (NLP), artificial neural networks are typically used for their ability to process text, but current communication involves not only text but also images or videos, which is why they are now beginning to use convolutional neural networks. Due to its ability to process images and being key to PLN. It also includes implementing recurrent neural networks that perform good data sequence analysis, emphasizing conversations [10]. The degenerative model does not depend on programmed responses; it is based on deep learning through automatic translation, which collects information from previous messages and is considered more intelligent. Although that implies, they are also more complicated to program in addition to the possible grammatical error that generates their answers [11].

4 Chatbot in Education The growing application of chatbots in various activities of man has shown that it is a technology adaptable to the needs required by the user, which is why it has begun to be integrated into multiple areas of education, part of current education is carried out partially or totally by remotely, which implies that they receive a large amount of information received, sent and notified, platforms that manage these contents are called LMS and facilitate their use [12], these are complemented by other technologies such as chatbots that offer more direct communication channels, because these can be integrated into instant messaging systems, not only limited to answering questions but also interacting with LMS platforms, even being able to be deployed independently and apply learning strategies with the information obtained from the user, some areas of use are to resolve queries, that is, a direct communication channel to the teacher, automating recurring or simple questions to answer similar to what would be considered an Intelligent Tutoring System (ITS) that facilitates the information requested by the student and serves as a guide in case of doubts or questions that arise [13]. Another application is to complement the services of a learning platform, notifying events, tasks, meetings, and evaluations; another way of using them is as means of evaluation, that is, the evaluation is carried out in the same chat as proposed [14].

How Current Chatbots Applications Impact Education: An Overview

349

5 Best Practices The implementation of chatbots implies a series of issues because an erroneous use leads to misinformation or a failure in a learning model, which has repercussions on the student. Therefore, the need to consider a series of actions that allow a correct application of this technology [15]; being an educational field, there are already pedagogical frameworks that help us establish metrics to define how successful the student is; the best-known example is the seven principles of Gamson and Chickering for higher education [16], which propose to encourage communication between all the actors that participate in the classroom, encourage cooperation, develop active learning and generate immediate feedback, as well as define the tasks well to focus on respecting the different ways that the student learns. Figure 2 shows society’s need for mobile technology based on best practices principles. It will only be necessary to comply with some of the principles to determine the success of the system. Still, it is important to establish which are the most relevant for the operation of the application. Still, for the deployment and operation of the technology, it will be necessary to base ourselves on methodological approaches for the development of software, normally agile methodologies are used (Scrum, ASD, and XP), and each methodology will imply a series of activities to be carried out, and the time that will be distributed in them, even following these steps there will be certain issues that are common in this type of implementation, as the level of initial error in the communication that occurs after the deployment, so it is advisable to focus on a specific area and gradually integrate the other modules [14], in the case that it is sought to develop as a means of evaluation it will be necessary to rethink the current evaluation model and adapt it to the virtual environment, which implies working hand in hand with teachers, in addition to evaluating which natural language understanding platforms are best suited to our proposal in case we decide to use third-party tools. Fig. 2 Areas covered by the society with mobile needs and principles

350

S. Yataco-Irrazábal et al.

6 Methodology To find the advantages and disadvantages of the application of chatbots in education, it will be necessary to take a qualitative approach since it is better to capture human experiences, in this case, those that will be reflected in the students and, in turn, for this reason, it was declined to be exploratory research [17], which seeks to make the first approach to a little-known topic or one that does not have much information, referring to the new areas of application of chatbots in education. The realization of the search implies that we must take certain parameters or criteria, to obtain the appropriate information about the topic of interest; this work decided to collect data from published articles, those that experiment with new application areas, or validate those that are already used, the search was carried out through the Google Scholar search engine for scientific articles, which allows us to carry out certain filters and be able to specify the research more, to find the articles we chose to search for 2 key concepts, The first is the term chatbots and the meanings it can take, the second is the educational term which, depending on the area of application, can vary in meaning, for more detail you can see Table 1.

6.1 Obtained Items In the search for articles, more than 20 results published in a preliminary way were chosen; of these a little more than half had to be eliminated due to various factors; the publication had a date very different from that of its creation, they focused on just one more concept than the other, or they took the term learning in a general way without addressing an educational environment, the selected articles were in Spanish and English, specifically located in Latin America, Europe, and Asia, most papers and some theses, these articles were shown in Table 2. Table 1 Main concepts of chatbots related to education

Concept 1

Concept 2

Chat Bot

Education

Chatbot

University

Educational agent

Education

Bot

Tutor

Virtual assistant

Learning

How Current Chatbots Applications Impact Education: An Overview

351

Table 2 Consolidated preliminary studies about chatbots in education Code

Author

Date

Country

Qualification

P1

György Molnár, Zoltán Sz˝uts

September 2018

Hungary

The role of chatbots in formal education

P2

Donn Emmanuel Gonda, et al

January 2019

Hong Kong

The 7 principles of good teaching are the basis for educational chatbots

P3

Saez Fernandez, M. Marco-Such, G. Candela

November 2019

Spain

Application of chatbots in teacher tutorials

P4

Juanan Pereira, Haritz February Medina, Oscar Diaz 2016

Spain

Use of chatbots in university teaching

P5

Aguilar Mejia, Jose Rafael

May 2020

Mexico

Use of virtual assistant for learning selected topics in physics

P6

Lumps Morillas Carlos Alfredo, Velezmoro Guevara Paola Yadira

April 2020

Peru

Intelligent assistants to improve grades in the communication course of the 4th grade of primary school in an educational institution

P7

Dr. José Medrano, Eng. Cesar Alejandro Castillo, Eng. Mario Alberto Tejerina

December 2018

Argentina

Use of a Chatbot in the classroom as a Support Tool for the Teaching–Learning process

P8

Jeovani M. Morales, Rosana Montes and Francisco Herrera

October 2018

Spain

Detection of Academic Failure and evaluation of teaching practice through automated communication with a chatbot

P9

Sharob Sinha, July 2019 Shyanka Basak, Yajushi Dey, Anupam Mondal

India

An Educational Chatbot for Answering Queries

6.2 Analysis To understand the applications these articles mention, they will be organized according to the parameters that are described in Table 3. It helps to be able to interpret information in a general way. It allows conclusions to be drawn about the areas of interest. All this will be reflected in Table 4, where a comparison of the selected articles will be made, to simplify the comparative table, each article in Table 2 is assigned to a code. Teacher assistant (TA) refers to when the chatbot functions as a support tool for the teacher giving reports of the academic results of the students. A learning evaluator (LE) functions as a tool for the student/learner, serving to review a subject and evaluate learning as a tutor. Table 4 shows the current trend of applying chatbots as teaching assistants, including applying pedagogical concepts [18] to process information and obtain parameters such as the risk of academic failure, these applications generally focus on university educational environments [14], which addresses it as an evaluator of

352

S. Yataco-Irrazábal et al.

Table 3 Description of parameters

Parameter

Description

Bot function

Function bot occupies the educational environment

Entry

Message received. It can be text, image, or voice

Educational environment

Degree institution belongs, to basic or higher education

Good practices

Good practices to validate the learning model

Bot Approach

Type of approach that the chatbot has

Platform

The NLP platform that it uses as the core of the chatbot

Table 4 Comparative table of articles with text entries Code

Bot Function

Educational Environment

Good Practices

Bot Approach

Platform

P1

TA

Academic

Owner

ML, PNL

Wit.ai

P2

LE

Academic

Seven principles

ML, NLP, DeepQA

IBM Watson

P3

TA

Academic

Not specified

ML, PNL

Open Source

P4

LE

Academic

Not specified

ML, PNL

Open Source

P5

TA

Academic

Owner

ML, PNL

DialogFlow

P6

TA

College

Owner

ML, PNL

Open Source

P7

TA/LE

Academic

Not specified

ML, PNL

Open Source

P8

TA

Not specified

Not specified

ML, PNL, L2T

Open Source

P9

TA

Not specified

Not specified

ML, NLP, Clustering

Open Source

learning to topics such as forensic criminology, taking chatbots as actors of the event, the limitations that it offers are built from freely available libraries, limited to only using text, but it allows new techniques to be implemented that offer better precision [19].

7 Conclusion The exploratory research that use educational chatbots focus on implementing new techniques to validate their models, before they are tested with students, for this reason, open-source libraries are used that allow their programmability and reduce their costs, focusing on small populations (students) at the university level, for this reason, a series of actions of good pedagogical practices are not described, while the applicative research that uses educational chatbots seeks to validate their model through the results obtained from the students, which implies that they have to apply

How Current Chatbots Applications Impact Education: An Overview

353

good practice actions and rethink the learning model, due to this they focus more on the pedagogical part than the technique and it takes more time to capture the results, in general, it is observed that the current trend is that the chatbots adopt a role as a learning assistant, not only being a communication channel but also offering more complete information, and in a certain way become independent from other platforms.

References 1. Fortune Business Insights (2021) GlobeNewswire. https://www.globenewswire.com/newsrelease/2021/08/16/2280848/0/en/Learning-Management-System-Market-to-Reach-USD44-49-Billion-by-2028-Rising-Usage-of-Internet-and-Cloud-Platforms-to-Boost-Growth-For tune-Business-Insights.html. 2. Carayannopoulos S (2018) Using chatbots to aid transition. Int J Inf Learn Technol 35–21 3. Palasundram K, Sharef NM, Nasharuddin N, Kasmiran K, Azman A (2019) Sequence to sequence model performance for education CHATBOT. Int J Emerg Technol Learn (iJET) 14(24):56–68. https://doi.org/10.3991/ijet.v14i24.12187 4. Mauldin ML (1994) Chatterbots, tinymuds, and the turing test entering the loebner prize competition. In: Proceedings of the 12th National Conference on Artificial, pp 16–21 5. Bansal H, Khan R (2018) A review paper on human computer interaction. Int J Adv Res Comput Sci Softw Eng 8(4):53 6. Motta V, Guillen R, Rodriguez C (2019) Artificial neural networks to optimize learning and teaching in engineering careers. In: Proceedings of the 2019 International Symposium on Engineering Accreditation and Education, ICACIT 2019, 2019, 9130296. EID: 2-s2.0– 85084220713 7. Shawar BA (2007) Chatbots: are they really useful? LDV-Forum 2007:29–49 8. Ramesh K, Ravishankaran S, Joshi A, Chandrasekaran K (2017) A survey of design techniques for conversational agents. In: Information, Communication and Computing Technology, pp. 336–350 9. BhashkarK (2019). www.medium.com https://bhashkarkunal.medium.com/conversational-aichatbot-using-deep-learning-how-bi-directional-lstm-machine-reading-38dc5cf5a5a3. 10. Szabo M (2002) CMI theory and practice: historical roots of learning management systems. In: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, pp. 929–936 11. Ahn JW et al (2017) Wizard’s apprentice: cognitive suggestion support for wizard-of-oz question answering. In: International Conference on Artificial Intelligence in Education. Springer, Cham 12. Gonda DE, Luo J, Wong YL, Lei CU (2019) Evaluation of developing educational Chatbots based on the seven principles for good teaching. In: 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), p. 8 13. Young S, Nichols HE (2017) A reflexive evaluation of technology-enhanced learning. Research in Learning Technology, p. 25 14. Petrlik I, Rodriguez C, Gonzales P (2019) M-learning applied to the improvement of the learning of university engineering students. In: Proceedings of the 2019 International Symposium on Engineering Accreditation and Education, ICACIT 2019. https://doi.org/10.1109/ICA CIT46824.2019.9130215 15. Montes R, Herrera F, Nieto JMM (2018) Detection of academic failure and evaluation of teaching practice through automated communication with a Chatbot. In: XVIII Conference of the Spanish Association for Artificial Intelligence (CAEPIA), pp. 245–250

354

S. Yataco-Irrazábal et al.

16. Sinha S, Basak S, Dey Y, Mondal A (2019) An educational Chatbot for answering queries. Emerg Technol Model Graph 17(7):55–60 17. María S, et al (2019) Tutor-bots application of chatbots in teacher tutoring, Unirioja, p. 10 18. Pereira J, Medina, H, Díaz, Ó (2017) Use of Chatbots in University Teaching, Unirioja, pp. 97– 104 19. Rodriguez C, Angeles D, Chafloque R, Kaseng F, Pandey B (2020) Deep learning audio spectrograms processing to the early COVID-19 detection. In: 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN), Bhimtal, India, 2020, pp. 429–434. https://doi.org/10.1109/CICN49253.2020.9242583.

The Role of Online Media to Improve Student Understanding in the Merdeka Belajar Kampus Merdeka Program (Case Study at the Information Systems Study Program at Universitas Pembangunan Jaya) Johannes Hamonangan Siregar, Edi Purwanto, Clarissa Katheline Tengkulung, Iffat Dwi Ananto, Richard Alpeus, and Daffa Nurhata Erlangga

Abstract The Merdeka Belajar Kampus Merdeka Program (MBKM) needs to be clearly understood by students to be able to determine the appropriate program activities from what is offered. The purpose of this study was to determine the role of online media in increasing students’ understanding of the MBKM program. The research method used is a descriptive analysis method using quantitative data collection techniques through questionnaires and interviews in discussion group forums to obtain qualitative data. Analysis of the data to determine the information needs of students in understanding the MBKM program. The subjects of this research are students of the Information Systems Study Program at Pembangunan Jaya University (SIF UPJ Study Program) who are active in the Odd Semester of the Academic Year 2021/ 2022, a total of 221 students. From the results of the questionnaire, it was found that as many as 4% stated that there was a lack of information about the MBKM program so that they did not participate in the MBKM program activities which can cause these students to be less interested in joining the MBKM program. In order to improve understanding of the MBKM program, an online media application design is proposed in this study. Keywords MBKM program · SIF study program · Student understanding · Online media

J. H. Siregar · C. K. Tengkulung · I. D. Ananto · R. Alpeus · D. N. Erlangga Information Systems Study Program, Universitas Pembangunan Jaya, South Tangerang, Banten, Indonesia E. Purwanto (B) Management Study Program, Universitas Pembangunan Jaya, South Tangerang, Banten, Indonesia e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023 K. V. Arya et al. (eds.), Proceedings of 7th ASRES International Conference on Intelligent Technologies, Lecture Notes in Networks and Systems 685, https://doi.org/10.1007/978-981-99-1912-3_32

355

356

J. H. Siregar et al.

1 Introduction From paying attention to the rapid development of information technology at this time has changed the lifestyle and the way humans work. The use of computer hardware for information and communication needs has been made more practical with the artificial intelligence (AI) This situation has brought rapid changes into the industrial world that the current time is called the Industrial Revolution 4.0 era. These changes create new job opportunities that require innovative and creative human resources to work by utilizing modern technology. This demand for human resources requires a serious response from the world of higher education to conduct learning innovations that shape students who will be able to produce outputs with new and creative innovations [1]. The importance of conducting learning innovations as a whole is not only the responsibility for universities. The Indonesian government, in terms of national education, is run by the Ministry of Education, Culture, Research, and Technology (MoECRT); they are also aware of the demands for universities to be able to design and implement innovative learning processes. To answer these demands, the MBKM Policy has been set by the Minister of Education and Culture, with the aim of encouraging students to master various sciences that are useful for entering the workforce. Related to improving the quality of student learning, it is stated in the “Right to Learn for Three Semesters outside the Study Program” policy. The socialization of the MBKM Program has started from January of 2020 through the MoECRT channels, mass media, social media and higher education channels. In the socialization that was carried out through offline and online media, student rights as well as requirements related to the form of learning activities offered to students were explained. There are 8 forms of MBKM activities that can be conducted by students outside of their study program and outside of their university, namely 1). Student Exchange, 2). Internships/Work Practices, 3). Teaching Assistance in Education Units, 4). Study/Research, 5). Humanitarian Projects, 6). Entrepreneurial Activities, 7). Independent Studies/Projects, and 8). Community Service/Thematic Community Services [2]. Socialization from universities to their students is also conducted by UPJ, at the University and Study Program levels. Socialization related to the forms of MBKM activities has been carried out at the University level since March of 2020. The general rules and requirements needed to take part in 8 forms of MBKM program activities are explained to the students so that they can prepare themselves [2]. However, the Covid-19 pandemic which limits direct interaction activities has changed all life aspects, including education [3]. As a consequence, the implementation of the forms of MBKM activity can only be done online. For this reason, Standard Operating Procedures (SOPs) are set so that the implementation of the online activities does not reduce the learning outcomes. The implementation of online MBKM program activities without leaving the house, or Work from Home (WFH) is a solution for learning activities during the pandemic. With WFH, students can learn the materials from the beginning, make plans for carrying out learning activities, and

The Role of Online Media to Improve Student Understanding …

357

focus on positive activities [4]. UPJ, which consists of 10 Study Programs, assigns the responsibility for the technical implementation of determining MBKM activities to each of the Study Program. They are also responsible in determining the calculation of student credits that can be equated with the MBKM activities. In the case study of the SIF Study Program, it has determined what courses can be equated with MBKM program activities, which are: 6th, 7th, 8th Semester Courses and the Study Program’s Elective Courses. The reason being is that if students work in the IT field, it means that they have to experience real life project (not a simulation like in a class), so that students can work quickly as usually companies will accept labor from interns. With the gained work experience, students will have more portfolio needed to work in the IT field. The development of the Study Program curriculum needs to be conducted by adapting the MBKM Program policies which include student study plans, learning processes, assessment of the activity implementation, and learning evaluation [5]. Among the 8 forms of MBKM activities, ones that have been conducted by the SIF Study Program students are Student Exchange, Internships/Work Practices, Teaching Assistance, Studies/Research, and Independent Studies/Projects. From the aforementioned activities, it was found that there was an inadequate understanding of the policies and forms of MBKM activities from both the lecturers and students of the SIF Study Program. The data related to students’ understanding of the MBKM program were obtained using instruments in the form of questions from questionnaires and interviews. Students can acquire a correct understanding of MBKM depending on the lecturer’s own understanding and the student mentoring activities in the MBKM program. As well as student data collection and external partner data verification such as school verification for the Teaching Assistance activities [6]. Based on this background, it is necessary to analyze the constraints in the implementation of MBKM related to the students’ inadequate understanding to be improved by utilizing information media. The Problem Formulation in this study are as follows: a). What is the best method for Improving Student Understanding of the Merdeka Belajar Kampus Merdeka program? b). Can the Role of Online Media Improve Student Understanding of the Merdeka Belajar Kampus Merdeka program? The writing purpose is to provide an explanation for the role of information media in improving student understanding of the MBKM program. The aim of this study is that students will have an adequate understanding of the MBKM program so that they have a high interest and motivation to participate in the MBKM program. The writing system for this study uses the stages of writing which consist of Introduction, Research Methods, Results, and Discussion and Conclusions.

358

J. H. Siregar et al.

2 Research Methods 2.1 Study Location This research took place in the UPJ campus at the SIF Study Program. The research subjects are all students of the UPJ SIF Study Program consisting of those from various years who are actively participating in classes in the Odd semester of the 2021/ 2022 Academic Year, which totaled 371 students. Active students include students who are currently attending lectures at the SIF Study Program and actively participate in the semester academic activities. In terms of carrying out communication between students, there is a discussion group which employ the popular WhatsApp (WA) application. Similarly, the communication between supervisors and students is mostly done through WA groups. The data collection was conducted using a questionnaire with questions that are created by the Spada Dikti web application and the conducted Discussion Group Forum. From the answers of the questions given in the questionnaire, a number of them were taken to process the data related to students’ understanding of the MBKM program.

2.2 Data Analysis The research methodology used for data collection and analysis is the descriptive statistics method. The survey data obtained from the respondents’ answers to the questionnaire inquiries were mapped in the form of pie charts and graphs for further description and analysis. The profile data of the respondents, namely students of SIF Study Program and their batch, is mapped in a pie chart and then described. Regarding the students’ knowledge of the MBKM program, it was measured by levels: not informed, a little informed, partly informed, fully informed. Regarding the information obtained, students are currently given a choice so that the most widely used media can be analyzed. The respondents were asked to give their opinions on choosing a media that could improve their understanding of the MBKM program based on the levels, so that media analysis could be carried out according to the respondent’s wishes. As for the Qualitative Analysis, the clarity regarding the understanding of the respondents as well as the given advice so that the needs of respondents can be analyzed will be obtained from the results of the interview. Based on the results of quantitative and qualitative data analysis, an online media that can improve student understanding of the MBKM program can be designed.

The Role of Online Media to Improve Student Understanding …

359

3 Results and Analysis From the results of the questionnaire obtained from Spada Dikti, there were 221 SIF Study Program students who filled out the questionnaire or 59% of the number of active students. The percentage of the participating respondents per batch is almost evenly distributed as shown in Fig. 1. Table 1 explains the percentage of active SIF students per batch who participated in filling out the MBKM questionnaire through Spada Dikti. From the table, we can see that the most students per batch who responded to the questionnaire were in the 2019 batch, as many as 59%. The large number of students from the 2019 batch who took part in MBKM activities made them interested in filling out this questionnaire. Students in the 2015–2018 batches are final year students who are preparing their Final Project; therefore, the time to respond to the questionnaire is limited and there are obstacles in providing information about this questionnaire to them. Thus, only a small number of students from these batches responded to the questionnaire. The new batch of students (1st semester), even though they have just started their studies, more than half of the students have responded to this questionnaire. From the total number of active students, there are 59% of students who responded to the questionnaire, thus the answers and opinions taken from this questionnaire can represent the students of the SIF Study Program. From the “How much do you know about the Independent Learning-Independent Campus (MBKM) policy?” question, it is known that the number of students who Fig. 1 The Percentage of Respondents per Batch

Table 1 The percentage of the number of respondents out of the number of active students per batch in the SIF Study Program

Semester (batch)

Active students

Respondents

%

1 (2021)

92

55

59

3 (2020)

81

49

60

5/2019)

95

65

70

7(2015–2018)

103

52

50

Total

371

221

59

360

J. H. Siregar et al.

Fig. 2 The Percentage of Respondents knowing MBKM

are informed about the MBKM program is still inadequate. A small number of respondents are aware of the MBKM program, as can be seen in Fig. 2. From respondents’ answers regarding the knowledge possessed about MBKM program, there are more than 30% of respondents who have adequate knowledge. Figure 3 explains where SIF students obtain information about MBKM policies. 186 (84.16%) respondents from a total of 221 respondents answered the question. As many as 28% or 52 respondents received information from online higher education channels (websites, social media). A total of 22% or 41 respondents obtained information from the mass media. There are 21.5% or 40 respondents who received information from offline/online socialization activities organized by universities. A total of 10.2% or 19 respondents received information from the MoECRT’s online channels (website, social media). As many as of 9.7% or 18 respondents received information from community communication channels (e.g. alumni community, lecturer community). A total of 8.6% or 16 respondents received information from offline/ online socialization activities organized by the MoECRT. Figure 4 shows the first rank of the respondent opinions for which information media can improve understanding of MBKM policies. 183 (82.80%) respondents from a total of 221 respondents had filled out the questionnaire. As many as 18% or 33 respondents choose online higher education channels (websites, social media). 12% or 22 respondents choose mass media. A total of 11.5% or 21 respondents choose offline/online socialization activities organized by universities. As many as 37.7% or 69 respondents choose the MoECRT’s online channels (website, social media). 4.4%

Fig. 3 Sources of Information obtained by respondents

The Role of Online Media to Improve Student Understanding …

361

Fig. 4 The 1st rank of Information media according to respondents that can improve their understanding

or 8 respondents think that community communication channels (e.g. alumni community, lecturer community) can improve students’ understanding of MBKM policies. A total of 15.8% or 29 respondents choose offline/online socialization activities organized by the MoECRT. Furthermore, Fig. 5 explains the second rank of respondent opinions about which information media can improve understanding of MBKM policies. 149 (67.42%) respondents from a total of 221 respondents had filled out the questionnaire. As many as 26.8% or 40 respondents choose online higher education channels (websites, social media). A total of 7.4% or 11 respondents choose information from the mass media. A total of 32.2% or 45 respondents choose offline/online socialization activities organized by universities. As many as 6% or 9 respondents choose the MoECRT’s online channels (website, social media). A total of 6.7% or 10 respondents think that community communication channels (e.g. alumni community, lecturer community) can improve students’ understanding of MBKM. A total of 19.5% or 29 respondents choose offline/online socialization activities organized by the MoECRT. Figure 6 shows the third rank of the respondent opinions for which information media can improve understanding of MBKM policies. 146 (66.06%) respondents from a total of 221 respondents had filled out the questionnaire. 17.8% or 26 respondents think that online higher education channels (websites, social media) can improve students’ understanding of MBKM. 17.1% or 25 respondents choose the mass media. 22.6% or 33 respondents choose offline/online socialization activities organized by universities. As many as 15.1% or 22 respondents choose the MoECRT’s online channels (website, social media). A total of 13.7% or 20 Fig. 5 The 2nd rank of Information media that can improve understanding according to respondents

362

J. H. Siregar et al.

Fig. 6 The 3rd rank of Information media that can improve understanding according to respondents

respondents think that community communication channels can improve students’ understanding of MBKM. A total of 13% or 19 respondents choose offline/online socialization activities organized by the MoECRT. Based on respondents’ answers on improving the understanding of MBKM based on rankings, it is shown that respondents choose socialization activities through online channels at the MoECRT. Figure 7 explains the respondents’ opinions, regarding their statement of what becomes a concern when conducting learning activities outside campus. 161 (72.85%) respondents from a total of 221 respondents had filled out the questionnaire. Respondents can give more than one answer, therefore it can be seen whether there is a combination of answers or only one answer. The number of respondents who only answered that they were worried about spending money was the largest amount of respondents at 42.9% or 69 respondents. Moving on, the next most-answered concern is lack of information with 29.6% or 46 respondents. Based on the results of the answers to this questionnaire, it can be clarified that lack of information is enough to make respondents worry about participating in MBKM activities. Thus, it is necessary to make efforts to overcome the lack of information with information that is easily understood by students. From the question of how interested you are in the MBKM program held by the Directorate General of Higher Education, Research, and Technology, the respondents’ answers are shown in Fig. 8. Respondents who stated that they were very interested were 55.2% or more than half of the respondents. This shows that more than half of the students expressed

Fig. 7 The respondents’ concern in joining the MBKM program

The Role of Online Media to Improve Student Understanding …

363

Fig. 8 The respondents’ interest in the MBKM program

an interest in joining the MBKM program. For this reason, the continuation of the MBKM program for students needs to be handled properly by lecturers. From interviews with the students, it is gathered that the understanding of MBKM can be explained easily by students who have participated in the previous MBKM activities. For students who have not participated in the MBKM activity program, they stated that they need a socialization and explanation on what MBKM activities are in accordance with their level of knowledge, the number of credits that will be received after MBKM, and the benefits of participating in MBKM. This effort is necessary so that students are better prepared to enter the work field that has been determined later. Based on the survey results obtained from quantitative and qualitative data, it can be concluded that there is a need to increase student understanding of the MBKM activity program; the information for this understanding can be obtained through online media. This study explains the role of online media in the form of the MBKM information center application design which is described in the following discussion section.

4 Discussion The User Requirements for the applications are 1). Must contains important information about MBKM, 2). Must be easy to access, 3). It becomes a medium for the socialization of MBKM within UPJ. These Requirement divided into: Functional Requirements and Non-Functional Requirements. The Functional Requirements consist of 1). Users can see the information clearly, 2). Admins can add, delete and update data, 3). The system is able to delete and save data changes. The Non-Functional Requirements, consist of 1). The programming languages used are PHP and Javascript. 2). A domain is required so that users can identify the website and access it more easily. Figure 8 describes the activity process of the UPJ MBKM information website (Fig 9). The system displays the latest info page, the MBKM Program in detail, the MBKM Program according to the category of activity form and Guidelines for participating in the MBKM program. The system has two actors, which are User and Admin. Users can access the latest info, MBKM Program Details, MBKM Activity Categories, and

364

J. H. Siregar et al.

Fig. 9 Use Case Diagram of website design MBKM Information

MBKM Guidelines. Admins can manage the latest info, MBKM Program Details, MBKM Activity Categories, and MBKM Guidelines. The following tables from Tables 2, 3, 4 and 5 explain the Use Case descriptions for Users to access the UPJ MBKM Information Center Application website; they can access the latest information, Program Details, and MBKM Guidelines. Tables 6, 7, 8 and 9 explain the Use Case descriptions for Admins to access the UPJ MBKM Information Center Application website; they can manage the latest information, Program Details, and MBKM Guidelines.

Table 2 The login process for user/student

Use Case Name

Login Process

Actor

User

Description

User access to MBKM UPJ Information Centre

Normal Course

User

System

1. User Access to website 2. User Input Student ID and Password

1. Displays Login Page 2. Displays Dashboard

Pre-Condition

Users access the Web

Post-Condition

Systems displays Dashboard Page

Assumption



The Role of Online Media to Improve Student Understanding …

365

Table 3 The User’s Process to access the latest information Use Case Name

Process to Acces Page Info

Actor

User

Description

User access to the latest Information

Normal Course

User

System

User Access to Page Info

Displays about the latest MBKM Information

Pre-Condition

Users access to Page Info

Post-Condition

Systems displays Page Info

Assumption



Table 4 The User’s Process to access Program Details

Table 5 The User’s Process to access MBKM Guide

Use Case Name Process to Acces Program Details Actor

User

Description

User access to the Program Details

Normal Course

User

System

User Access to the Program Details

Displays Page Program Details

Pre-Condition

Users access to Page Program Details

Post-Condition

Systems displays Page Program Details

Assumption



Use Case Name Process to Acces Page MBKM Guides Actor

User

Description

User access to the MBKM Guide

Normal Course

User

System

User Access to the MBKM Guide

Displays Page MBKM Guide

Pre-Condition

Users access to Page MBKM Guide

Post-Condition

Systems displays Page MBKM Guide

Assumption

-

366

J. H. Siregar et al.

Table 6 The login process for Admin Use Case Name

Login Process

Actor

Admin

Description

Admin access to the MBKM UPJ Information Systems

Normal Course

Admin

System

1. Admin Access to Website 2. Admin Input Student ID and Password

1. Systems Displays Login Page 2. Systems Displays Dashboard for Management

Pre-Condition

Admin access the Web

Post-Condition

Systems displays Dashboard Page

Assumption



Table 7 The Admin’s Process to manage MBKM Information Use Case Name Process to Manage MBKM Information Actor

Admin

Description

Admin access to manage MBKM Information

Normal Course

Admin

System

1. Admin Access to the Page for Information Management 3. Admin input Data Info

1. Displays about the latest MBKM Information 2. System displays list of Information with “Update” and “Delete” Action

Pre-Condition

Admin access the Page to manage MBKM Information

Post-Condition

Information stored in the database then updates the system

Assumption



Table 8 The Admin’s Process to manage Program Details Use Case Name

Process to Manage Program Details

Actor

Admin

Description

Admin access to manage the program detail of MBKM

Normal Course

Admin

System

1. Admin Access the Page to manage the Program Detail 2. Admin input Detail Program Data

1. Displays the Page to manage Detail Program 2. System displays list of Detail Program with “Update” and “Delete” Action

Pre-Condition

Admin access the Page to manage Program Details

Post-Condition

Information stored in the database then updates the list of Program detail

Assumption



The Role of Online Media to Improve Student Understanding …

367

Table 9 The Admin’s Process to manage MBKM Guide Use Case Name

Process to Manage MBKM Guide

Actor

Admin

Description

Admin manage the Page MBKM Guide

Normal Course

Admin

System

1. Admin Access the Page to manage the MBKM Guide 2. Admin input Data the MBKM Guide

1. Displays the Page to manage MBKM Guidance 2. System displays list of MBKM Guide with “Update” and “Delete” Action

Pre-Condition

Admin access the Page to manage MBKM Guide

Post-Condition

MBKM Guide stored in database then updates Program detail

Assumption



5 Conclusion Most of the SIF students expressed the opinion that through the Online Channels of UPJ and the Ministry of Education and Culture, the role of online media was to increase understanding of MBKM policies. The MBKM Information System Application Design can be an online media to increase this understanding. Acknowledgements Thank you to the Ministry of Education, Culture, Research, and Technology for providing grants so that this research can run. To the UPJ SIF Study Program Lecturers who have participated in this research. To all students of the UPJ SIF Study Program who have participated in filling out the questionnaire on Spada Dikti.

References 1. Sasikirana V, Herlambang YT (2020) Urgensi merdeka belajar di era revolusi industri 4.0 dan tantangan society 5.0. E-Tech 08(02):1–8 2. Kemendikbud (2020) Buku Panduan Merdeka Belajar - Kampus Merdeka 3. Muslimat et al (2021) Masa Depan Kampus Merdeka & Merdeka Belajar: Sebuah Bunga Rampai Dosen. Bintang Visitama Publisher, Kota Serang 4. Mastuti R (2020) Teaching From Home: dari Belajar Merdeka menuju Merdeka Belajar 5. Baharuddin MR (2021) Adaptasi kurikulum merdeka belajar kampus merdeka (fokus: model mbkm program studi). J Stud Guru dan Pembelajaran 4(1):195–205 6. Widiyono A, Irfana S, Firdausia K (2021) Implementasi merdeka belajar melalui kampus mengajar perintis di sekolah dasar. Metod Didakt J Pendidik Ke-Sd-An 16(2)

Technology and Children’s Books: Digital Talking Books as a Media for Communicating 21st-Century Skills Clara Evi C. Citraningtyas, Isti Purwi Tyas Utami, and Fathiya Nur Rahmi

Abstract Technology is frequently regarded as the defining feature of the twentyfirst century (21st C), and is extensively applied, including in children’s books. The use of digital talking picture books, which is becoming increasingly popular, is one example of the use of technology in children’s books. Picture books have traditionally been used to communicate various information and teach various skills to children whilst entertaining them at the same time. Because key skills evolve and change, the skills communicated in picture books should also change. The skills of the 21st C, in fact, differ significantly from the learning skills needed in the previous century. Learning skills of the 21st C are represented by the four (4) C’s; creative, critical, communication, and collaboration. These skills are deemed important for today’s world as the world faces new challenges that did not earlier exist. The objective of this study is to investigate the presence of 4C components in a selection of talking picture books available on www.letsreadasia.org. The result indicates that the 21st C format books do communicate the 4C skills that appear in high frequency. The study uses media richness theory and encoding decoding theory, while employing a mixed method data analysis. Keywords technology · media richness theory · digital talking books · twenty-first century skills

1 Introduction The 21st C is a technological age in which technology affects almost every aspect of life. New trends emerge and new technologies are introduced. Technology is also playing an important role in education, particularly during the pandemic, when the education system began to shift from face-to-face learning to online learning. E-books C. E. C. Citraningtyas (B) · I. P. T. Utami · F. N. Rahmi Department of Communication Sciences and Jaya Launch Pad, Universitas Pembangunan Jaya, South Tangerang, Indonesia e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023 K. V. Arya et al. (eds.), Proceedings of 7th ASRES International Conference on Intelligent Technologies, Lecture Notes in Networks and Systems 685, https://doi.org/10.1007/978-981-99-1912-3_33

369

370

C. E. C. Citraningtyas et al.

have taken over the role of printed books as learning and entertainment resources. Learning materials in the technology age has also changed. According to the National Education Association (2015), what was once considered a good education is no longer sufficient for success in today’s in college, career, and citizenship. Previously, mastering the “Three Rs” was sufficient (reading, writing, and arithmetic). However, in the 21st C, the “Three Rs” are simply insufficient. To compete in today’s high-tech society, today’s children must master the 21st C skills. The term “21st C skills” refers to a broad set of knowledge, skill sets, behavioral patterns, and personal qualities that educators and experts believe are critical to success in today’s world. In 2015, The Partnership for the 21st Century Skills first identified the 21st C skills, and was reinstated by Consortium for Smarter Balanced Assessment [1]. Keys among those skills are the 4Cs super skills: Critical, Creative, Communication, Collaboration. While there are many tools and techniques to help educators and parents in preparing children for life, one of the simplest and most recommended is reading storybooks. Children’s stories are an important genre in the education of children. It is, in fact, one of the world’s oldest teaching tools. Parents, educators, teachers, and the community educate and communicate a wealth of knowledge to children through children’s stories. [2]. However, as the format of children’s books evolves in the 21st C, an important question arises. Do the teachings follow the new book format? Do the new formats of children’s books incorporate the 21st C skills? To successfully prepare the next generation for citizenship and the global workforce in the 21st C, educators must adopt new teaching materials. There has been a number of researches related to the use of technology in education [3]. However, little research has been conducted to determine whether the digital talking book format of the 21st C communicates the 21st C skills. The purpose of this study is to determine whether the digital “Listen and Learn” collection communicates the twenty-first century skills, and to evaluate the frequency of their appearance. Let’s Read is an Asia Foundation-supported digital library that can be accessed at www.letsreadasia.org. It has 9181 children’s story books (as of September 30th, 2022) exploring important topics such as gender equality, environment and climate action, diversity, understanding and empathy, and STEAM. Fifty-one (0.6%) of the stories are in the “Listen and Learn” collection, which uses a digital talking book format in which children can listen to books read to them while following the words on the page and looking at the illustrations. These books are classified into different reading levels based on the difficulty and complexity of the language, ranging from level 1 to level 5, with level 1 being the lowest.

2 Literature Review Media Richness Theory According to the media richness theory, media has the power to communicate required information. Daft and Lengel (1986) proposed this theory, which is also

Technology and Children’s Books: Digital Talking Books as a Media …

371

known as the Media Richness Theory. Different media, according to the theory, provide varying degrees of information richness. The media is considered rich if the meaning of a communication message can be transmitted more accurately, and vice versa. Text-based media is generally regarded as low, whereas face-to-face communication is regarded as rich. Four factors influence the richness of a medium: instant feedback, signs, varieties of language, and personal focus. [4]. Rich-media communication is defined by these four criteria: synchronous dialogic media; the utilization of more cues such as sight, sound, and touch; a wider selection of words, signs, and symbols; and greater humanization through warmth, responsiveness, and customization using differentiation for the target audience. Encoding and Decoding Theory The communication process is dependent primarily on the encoding and decoding of messages. Encoding refers to the procedure of transforming a body of information in the form of codes from one system to another, while decoding is the process of interpreting the message. Before sending the message, the encoder should generate or reorganize the codes in a meaningful fashion. A variety of factors influence information interpretation and social construction [5]. Stuart Hall’s encoding and decoding model explained that knowledge frameworks, production relations, and technical infrastructure influenced the encoding and decoding process. During the encoding process, the producer encoded the message based on a specific point of view influenced by the knowledge framework and cultural values. Publishers, authors, and illustrators encode messages in books in the context of books as mass media by taking into account the economic and technical aspects of production. The message will then be decoded and interpreted by the target reader, who will then take one of three positions: dominant hegemony, negotiation, or opposition.

3 Problem Definition/Formulation The purpose of this study is to evaluate if the 4C values that summarize the skills necessary for children of the 21st C are present in the 51 digital talking books “Listen and Learn”. It also aims to determine how frequently the 4C skills appear in the collection, which 4C appears most frequently, and which stories contain the highest number of 21st C skills.

4 Method The researchers used primary data in the form of digital talking books in the “Listen and Read” collection on the Let’s Read Asia website to obtain quantitative and qualitative data for this study. The quantitative and qualitative data were then descriptively

372

C. E. C. Citraningtyas et al.

analyzed to determine whether they communicate twenty-first century skills and how frequently these skills appear in the collection.

5 Results and Discussion It is found that the vast majority (90%) of books in the collection contain one or more 4C skills. Figure 1 shows that 46 of the collection’s stories communicate the 4C skills. This high proportion demonstrates the close relationship between the time-relevant technology used and the skills communicated. It is worth noting that the four books (10%) that lack the 4C skills are all Level 1 books. This could be due to the target readers’ elementary reading level, and they are not yet fully prepared for the 4C skills. Collaboration (C4) is discovered to be the most prevalent 4C component in the collection. 36 stories (71%) raised the Collaboration (C4) component, which may reflect the high importance of collaboration in twenty-first century life. According Fig. 1 The presence of 4C (in percentage)

Fig. 2 The 4C’s contained in the stories

Technology and Children’s Books: Digital Talking Books as a Media …

373

Fig. 3 Multiple Combination of 4C’s Contained in the Stories

to the claim, collaboration has numerous benefits over personal conflict resolution because it enables for a variety of efficient and increased creative thinking and quality of alternatives prompted by the insights of other members of the group. [6]. Collaboration has also been associated with higher levels of social competency in students, such as resolving conflicts skills and academic self-concept. [7]. Creativity (C2), on the other hand, is discovered to be the collection’s least common 4C component. Only 26 stories in the collection (51%) contains the creativity component. Creativity falls under the Higher Order Thinking Skills (HOTS) domain, which is the highest level in Bloom’s taxonomy of cognitive learning. Being the highest in the hierarchy, it is also the most difficult because the learner must have mastered the skills of the lower levels. Since these are children’s books, the intended audience may not yet be at that cognitive level (Fig. 2). According to the graph above, as many as 38% of the stories in the research subject included 4Cs skills components, with the most components consisting Critical thinking (C1), Creative (C2), and Collaboration (C3) in as many as 21 stories (Fig. 3). This demonstrates that the story collection meets the requirement of including the skills required to face challenges in the 21st C. It is also found that the 21st C skills presented in the “Listen and Read” use technology digital by combining text, illustrations, and voice advances books as a medium of communication to attain media richness compared to traditional book format. With the use of more cues, children as target readers can reduce the ambiguity and uncertainty of the story message by listening to the narrator’s voice if the text and visuals were insufficient to help them understand the message. The discussion of each of the 21st C skills are as follows: Critical Thinking According to the Partnership for 21st Century Learning [1] nine indicators reflect critical thinking: (1) the use of various types of reasoning; (2) the use of systems thinking; (3) the ability to analyze how parts of a whole interact with each other to produce overall

374

C. E. C. Citraningtyas et al.

outcomes in complex systems; (4) the ability to make judgments and decisions; (5) the ability to effectively analyze and evaluate evidence, arguments, claims, and beliefs; (6) the ability to analyze and evaluate major alternative points of view; (7) the ability to synthesize and make connections between information and arguments; (8) the ability to interpret information and draw conclusions based on the best analysis; and (9) to reflect critically on learning experiences and processes. Twenty seven (53%) of the stories in the collection contain the Critical Thinking (C1) component. Those books include a variety of critical thinking indicators, with at least two of them represented. As seen in Fig. 4, only one story (3.7%) in the collection contains all nine indicators of Critical Thinking. The story is titled Together We’re Strong written by Liesl Jobson and illustrated by Alice Toich. The story is classified as Level 5 reading, which is the highest reading level on the Let’s Read Asia website. It is the story of a powerful woman named Albertina Sisulu who made a stand for her beliefs despite the consequences. She was a brave young woman who dedicated her life to her family, community, and South Africa. Albertina uses various types of reasoning, for example when she had to choose her name. The text describes her reasoning for having to choose a new name, as well as why she chose Albertina as her new name. Meanwhile, the illustration supports this, picturing Albertina as a powerful woman who is looking ahead and holding her head up to demonstrate her strength. Albertina appears much more powerful than the boy sitting next to her. Furthermore, the sound lends support to Albertina’s reasoning. The narrator’s rhythm when she questioned why she needed to take a new name was powerful. Again, the emphasis on each syllable when the name Al-ber-ti-na was pronounced three times demonstrates extra power. Figure 4 also depicts the critical thinking indicator that is used the most in the digital talking book collection. One hundred percent of the stories that depict critical thinking, use the reasoning indicator. Reasoning is an essential component of life

Fig. 4 Number of Stories Containing Critical Thinking Indicators and Number of Critical Thinking Indicators in 51 Stories

Technology and Children’s Books: Digital Talking Books as a Media …

375

because it enables us to make decisions and solve problems. People use reasoning to make sense of their circumstances and make daily decisions. Reading is one way that can assist in the advancement of reasoning abilities. People who improve their reasoning skills become better thinkers and live better lives. As a result, reasoning cannot be avoided. In presenting the critical thinking component, it is clear that technology has advanced media richness of story books. The stories have become richer as a media by including more cues such as text, illustrations, and sound. It also reduces ambiguity and improves comprehension among the intended readers. The encoding process is also present in this situation, in which publishers, authors, and illustrators encode the 21st C skills into texts, illustration, and sound that are ready to be decoded by 21st C target readers. Creative Thinking The following seven components are the indicators for creative thinking: (1) the use of a wide range of idea-creation techniques; (2) Create new and worthwhile ideas, and (3) Elaborate, refine, analyze, and evaluate their own ideas in order to improve and maximize creative efforts, (4) Develop, implement, and communicate new ideas to others effectively, (5) Be open and responsive to new and diverse perspectives; incorporate group input and feedback into the work, (6) Demonstrate originality and inventiveness in work and understand the real-world limits to adopting new ideas, (7) View failure as an opportunity to learn; understand that creativity and innovation is a long-term, cyclical process of small successes and frequent mistakes [1]. Twenty-six (51%) of the stories in the collection teach the skill of Critical Thinking (C1). Each story contains a variety of critical thinking indicators, with at least two of them. As shown in Fig. 5, there are three stories that contain all seven Creative Thinking indicators: Together We’re Strong, Amazing Daisy, and Masky’s Night of Adventure. These stories are classified as level 5 and level 3 books. In Amazing Daisy, a story of a chicken who wants to be able to fly, Daisy creates new and worthwhile ideas. Daisy, according to the text, diligently practices flying while imagining herself soaring high into the sky and gazing at her fellow chickens on the ground. She also imagines herself flying past the birds, who will be amazed because they have never seen a flying chicken before. Meanwhile, the illustration supports the text by depicting Daisy imagining herself flying higher in the sky than the birds. Furthermore, the sound of chickens and birds in the background enhances the comprehension of the story (Fig. 5). Figure 5 also shows that indicator 1 is the most frequently used creative thinking indicator, used in 25 of the collection’s books (96%). Brainstorming can in fact be a powerful tool for looking at projects or problems in new ways, and enhances innovation. It is the benchmark for generating ideas and is widely used in academia, education, as well ad industry. Its popularity derives largely from the conviction that teams working together are more resourceful than a person working on her own. The need

376

C. E. C. Citraningtyas et al.

Fig. 5 Number of Stories Containing Creative Thinking Indicators and Number of Stories Containing Each Creative Thinking Indicators

for collaboration, as well as the social aspect of work, all contribute to the popularity of brainstorming [8]. Technology plays a role again in advancing the media richness of story books when presenting the creative thinking component, the next 21st C skill. The stories have become richer as a medium by incorporating more cues such as text, illustrations, and sound that also reduces ambiguity and improve comprehension among the intended readers. It is worth noting that the background sound of chickens and birds accurately reflects the creativity that it represents. The encoding process is also apparent, in which publishers, authors, and illustrators encode 21st C skills into texts, illustrations, and sound to be decoded by 21st C target readers. Communication The communication component consists of five indicators, there are: (1) Articulate thoughts and ideas effectively using oral, written, and nonverbal communication skills in a variety of forms and contexts; (2) Listen effectively to decipher meaning, including knowledge, values, attitudes, and intentions; (3) Use communication for a range of purposes (e.g. to inform, instruct, motivate, and persuade); (4) Utilize multiple media and technologies, and know how to judge their effectiveness a priority as well as assess their impact; (5) Communicate effectively in diverse environments (including multi-lingual). From Fig. 6, it is known that there are three stories that have all indicators in the Communication (C3) component, and there are two stories that only have two indicators. This study found that the entire story had the first, fourth, and fifth indicators of the Communication (C3) element. So the communications element (C3) is determined by looking at whether the story has one of the second and third indicators. One of the stories that have all the indicators is titled Forest Friends. The first indicator can be seen in the storyline which is supported by the text and visuals of the characters. The second indicator in Forest Friends can be seen by the main character that has the value of helping each other and not giving up easily. The third indicator can be seen in the story entitled Message in The Sand which provides information about environmental

Technology and Children’s Books: Digital Talking Books as a Media …

377

Fig. 6 Number of Stories Containing Communication Indicators & Number of Stories Containing Each Communication Indicators

damage and how to manage environmental crisis. This is in accordance with the purpose of communication that communication is to provide information on certain topics so that communication can also be avoided the existence of communication misses. Communication can also influence the attitude of a person [9]. The fourth and fifth indicators that show the use of various digital and multilingual platforms can be seen from various features in the listening book which show the combination of text, visual, and audio and each story consists of various languages. Based on the explanation of the Communications indicators, it can be known that there is a process of encoding messages. The encoding process is seen by the publishers who are able to analyze various challenges of the twenty-first century and seek to answer these challenges in various features in the book. In twenty-first century, communication challenges will be more severe than in previous generations. The twenty-first century faced challenges in both social and work environments [3]. So, with the indicators contained in talking books, it can prepare readers, especially children as the main audience, to face various challenges in the twenty-first century. This study did not analyze how the audience interpreted the message, so it did not discuss the process of decoding the message. Collaboration Collaboration (4), consists of four indicators: (1) Collaborating with others; (2) Demonstrating ability to work effectively and respectfully with diverse teams; (3) Exercising flexibility and willingness to be helpful in making necessary compromises to accomplish a common goal; (4) Assuming shared responsibility for collaborative work, and value the individual contributions made by each team member (Partnership, 2015). The values of Collaboration in the story were observed through several elements, such as: texts, visual illustrations and audio recordings. In this study, the values of collaboration were found out in 36 out of 51 books (Fig. 7). There were various number of indicators on collaboration category in each book and at least one collaboration value indicator. Characters in stories that introduce the values of collaboration were not limited to human characters, both female and male, but also animal, plant and object characters that were personified as child

378

C. E. C. Citraningtyas et al.

Fig. 7 Number of Stories Containing Collaboration Indicators & Number of Stories Containing Each Collaboration Indicators

figures. Three story books that completely presented all indicators of collaboration values, namely: Forest Friend, Searching for the Spirit of Spring and Living in Harmony. Collaborating with others is the most frequently used indicator in the category of collaboration, with 31 stories using it. This finding emphasizes the significance of collaboration, as discussed previously. Meanwhile, three stories used the indicator on exhibiting the ability to collaborate effectively and thoughtfully with different teams, which was the least used. The book describes all of the indicators using text, visual illustrations, and audio. The values of collaboration with four indicators were included as dominant values, which occurred in 36 stories. This proves that collaboration is one of the important skills should be possessed by children in the twenty-first century in facing the complex challenges. Collaboration skills are related to the ability to cooperate effectively and respect differences with other, being flexible and willing to compromise for a common goal, and believe that collaborative tasks as a shared responsibility and appreciate individual contribution [10]. It is expected that children would be able to socialize and collaborate with their peers as well as adults from various cultural backgrounds. Children learn to recognize their own and others’ potential through collaboration, and then to use it to achieve goals. Collaborative skills as life skills related to human nature as social beings will aid in the development of a generation well prepared to face global challenges.

6 Conclusion The digital talking book format in the “Listen and Read” collection is found to communicate 21st C skills, with the vast majority (90%) of the stories in the collection addressing the 4Cs issue. Thus, it can be concluded that the advancement of technology in book format supports the dissemination of the required skills needed to survive in those times. Collaboration is the most commonly found 4C skills component included in “Listen and Read” collection, followed by Communication, Critical

Technology and Children’s Books: Digital Talking Books as a Media …

379

Thinking, and Creative Thinking. This emphasizes the significance of collaboration, which should bring people together in a supportive environment to systematically solve current and emerging problems that are difficult for one group to handle alone. Technology, in comparison to traditional books, has enabled the digital book in the “Listen and Read” collection to use a broader range of cues: text, illustration, and sound. As a result, the story’s media richness is enhanced. Furthermore, the publishers, authors, and illustrators proof to encode the message based on their understanding of the importance of 4C skills in the 21st C.

References 1. B. for Kids (2022) Partnership for 21st Century Learning (2015). https://www.battelleforkids. org/networks/p21. Accessed 14 Nov 2022 2. Citraningtyas CEC (2022) Once upon a pandemic’: assessing children’s stories endorsed by the Indonesian government to communicate COVID-19 crisis. J. Posit. Sch. Psychol. 6(8):5929– 5939 3. Kivunja C (2015) Exploring the pedagogical meaning and implications of the 4cs ‘super skills’ for the 21st century through bruner’s 5e lenses of knowledge construction to improve pedagogies of the new learning paradigm. Creat Educ 06(02):224–239. https://doi. org/10.4236/ce.2015.62021 4. Ishii K, Lyons MM, Carr SA (2019) Revisiting media richness theory for today and future. Hum Behav Emerg Tech 1:124–131. https://doi.org/10.1002/hbe2.138 5. Xie Y et al (2022) An overview of Stuart hall’s encoding and decoding theory with film communication. Multicult Educ 8(1):190–198. https://doi.org/10.5281/zenodo.5894796 6. OECD (2015) Pisa 2015 Collaborative Problem-solving Framework (2017). chromeextension://efaidnbmnnnibpcajpcglclefindmkaj/https://www.oecd.org/pisa/pisaproducts/Draft PISA 2015 Collaborative Problem Solving Framework .pdf. 7. Child S, Shaw S (2016) Collaboration in the 21st century: implications for assessment. Cambridge Assess Publ 22:17–22 8. Byron K (2012) Creative reflections on brainstorming. London Rev Educ 10(2):201–213. https:/ /doi.org/10.1080/14748460.2012.691284 9. Yuima F, Tamara D, Aziz IA (2022) What is the purpose of Communication? Relig Educ 17(1):3–6 10. Trilling B, Fadel C (2009) 21st Century Skills: Learning for Life in Our Times, 1st edn. HB Printing, Marple