Arcely Napalit | Holy Angel University (original) (raw)

Papers by Arcely Napalit

Research paper thumbnail of Optimizing a schedule using firefly algorithm with Tabu search algorithm

VII INTERNATIONAL CONFERENCE “SAFETY PROBLEMS OF CIVIL ENGINEERING CRITICAL INFRASTRUCTURES” (SPCECI2021)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Application of Firefly Algorithm in Scheduling

2021 IEEE International Conference on Computing (ICOCO)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Faculty’s perceived readiness, technical competencies, and challenges in online teaching-learning environment

International Journal of Research Studies in Education, 2021

Bookmarks Related papers MentionsView impact

Research paper thumbnail of IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compromising Personal Data Privacy

International Journal of Computer Science and Information Technology, 2020

The Internet is driving force on how we communicate with one another, from posting messages and i... more The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-ofThings, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when a hacker, h...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Faculty's perceived readiness, technical competencies, and challenges in online teaching-learning environment

International Journal of Research Studies in Education, 2021

The purpose of this study was to explore the perceptions of faculty for the implementation of the... more The purpose of this study was to explore the perceptions of faculty for the implementation of the online teaching-learning environment and to determine their readiness, technical competence, and challenges in the new normal teaching-learning method. Survey questionnaires were used to examine the familiarity with the technology used in various social media, video conferencing, and learning management systems of 188 university teachers and the use of descriptive data to explore its findings. The respondents were asked to understand online teaching-learning to course design, course communication, time management, and technical competence. Designing the course learning module and activities should be one of the faculty's important readiness and competencies in delivering an online teaching-learning environment. Managing and creating their course in a limited time before offering the course online are challenges for the faculty. Based on the result of the study, it revealed that ther...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compromising Personal Data Privacy

International Journal of Computer Science & Information Technology (IJCSIT), 2020

The Internet is driving force on how we communicate with one another, from posting messages and i... more The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or "tweeting" your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-of-Things, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Optimizing a schedule using firefly algorithm with Tabu search algorithm

VII INTERNATIONAL CONFERENCE “SAFETY PROBLEMS OF CIVIL ENGINEERING CRITICAL INFRASTRUCTURES” (SPCECI2021)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Application of Firefly Algorithm in Scheduling

2021 IEEE International Conference on Computing (ICOCO)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Faculty’s perceived readiness, technical competencies, and challenges in online teaching-learning environment

International Journal of Research Studies in Education, 2021

Bookmarks Related papers MentionsView impact

Research paper thumbnail of IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compromising Personal Data Privacy

International Journal of Computer Science and Information Technology, 2020

The Internet is driving force on how we communicate with one another, from posting messages and i... more The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-ofThings, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when a hacker, h...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Faculty's perceived readiness, technical competencies, and challenges in online teaching-learning environment

International Journal of Research Studies in Education, 2021

The purpose of this study was to explore the perceptions of faculty for the implementation of the... more The purpose of this study was to explore the perceptions of faculty for the implementation of the online teaching-learning environment and to determine their readiness, technical competence, and challenges in the new normal teaching-learning method. Survey questionnaires were used to examine the familiarity with the technology used in various social media, video conferencing, and learning management systems of 188 university teachers and the use of descriptive data to explore its findings. The respondents were asked to understand online teaching-learning to course design, course communication, time management, and technical competence. Designing the course learning module and activities should be one of the faculty's important readiness and competencies in delivering an online teaching-learning environment. Managing and creating their course in a limited time before offering the course online are challenges for the faculty. Based on the result of the study, it revealed that ther...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compromising Personal Data Privacy

International Journal of Computer Science & Information Technology (IJCSIT), 2020

The Internet is driving force on how we communicate with one another, from posting messages and i... more The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or "tweeting" your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-of-Things, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when ...

Bookmarks Related papers MentionsView impact