Search results for: experienced web user
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3807

Search results for: experienced web user

3537 Searchable Encryption in Cloud Storage

Authors: Ren Junn Hwang, Chung-Chien Lu, Jain-Shing Wu

Abstract:

Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This study proposes a protocol for performing multikeyword searches for encrypted cloud data by applying k-nearest neighbor technology. The protocol ranks the relevance scores of encrypted files and keywords, and prevents cloud servers from learning search keywords submitted by a cloud user. To reduce the costs of file transfer communication, the cloud server returns encrypted files in order of relevance. Moreover, when a cloud user inputs an incorrect keyword and the number of wrong alphabet does not exceed a given threshold; the user still can retrieve the target files from cloud server. In addition, the proposed scheme satisfies security requirements for outsourced data storage.

Keywords: fault-tolerance search, multi-keywords search, outsource storage, ranked search, searchable encryption

Procedia PDF Downloads 383
3536 Design and Implementation of an Image Based System to Enhance the Security of ATM

Authors: Seyed Nima Tayarani Bathaie

Abstract:

In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.

Keywords: face detection algorithm, Haar features, security of ATM

Procedia PDF Downloads 419
3535 Determinants for Discontinuing Contraceptive Use and Regional Variations in Bangladesh: A Sociological Perspective

Authors: Md. Shahriar Sabuz

Abstract:

Bangladesh, a South Asian developing country, has experienced an increasing rate of contraceptive use in the last few decades. But one-third of the pregnancies are still unintended, and the fertility rate surpasses the desired rate of children. It may be because of the discontinuation of the use of contraceptive methods. So, it is necessary to find out the reasons for the discontinuation of the use of contraceptives. Moreover, the rate of contraception discontinuation varies from rural to urban, region to region. In this study, our objectives are to find out the reasons behind the discontinuation of the use of the contraceptive method, and the regional variations of the rate of those reasons. We are using the dataset of Bangladesh Demographic and Health Surveys (BDHS) 2014 for this study and the ever-married women of Bangladesh who have discontinued the use of contraceptive methods aged 15-49. The data was collected from the seven districts of the country. The finding shows that currently there are 23% of women have stopped using their contraception. The most common reasons for stopping using the method are that either they are pregnant or want to be pregnant. A significant number of people are not using the contraceptive method because of the fear of side effects. Though the rate of non-user is higher in rural areas than in urban areas, reasons for method discontinuation are not significantly different between urban and rural areas. However, reasons for discontinuing contraceptive methods significantly vary from region to region.

Keywords: discontinuation of contraceptive, health, pregnant, fertility

Procedia PDF Downloads 95
3534 Comparative Learning Challenges Experienced by Students in Universities of Developing Nations in Sub-Saharan Africa

Authors: Chinaza Uleanya, Martin Duma, Bongani Gamede

Abstract:

The study investigated learning challenges experienced by students in universities situated in developing sub-Saharan African countries using selected universities in South Africa and Nigeria. Questionnaires were administered to 2,335 randomly selected students from selected universities in South Africa and Nigeria. The outcome of the study shows that six common learning challenges are visible in developing sub-Sahara African universities. The causes of these learning challenges cut across the failure in responsibilities of the various stakeholders in the field of education and the effects are monumental both to the students and society. This paper suggests recommendations to university administrators, education policy makers and implementers on the need to take education more seriously, to review and implement appropriate policies, and to ensure provision of quality education through the supply of adequate amenities and other motivating factors.

Keywords: learning, challenges, learning challenges, access with success, participatory access

Procedia PDF Downloads 299
3533 Analyse of User Interface Design in Mobile Teaching Apps

Authors: Asma Ashoul

Abstract:

Nowadays, smartphones are playing a major role in our lives, by communicating with family, friends or using them to learn different things in life. Using smartphones to learn and teach today is something common to see in places like schools or colleges. Therefore, thinking about developing an app that teaches Arabic language may help some categories in society to learn a second language. For example, kids under the age of five or older would learn fast by using smartphones. The problem is based on the Arabic language, which is most like to be not used anymore. The developer assumed to develop an app that would help the younger generation on their learning the Arabic language. A research was completed about user interface design to help the developer choose appropriate layouts and designs. Developing the artefact contained different stages. First, analyzing the requirements with the client, which is needed to be developed. Secondly, designing the user interface design based on the literature review. Thirdly, developing and testing the application after it is completed contacting all the tools that have been used. Lastly, evaluation and future recommendation, which contained the overall view about the application followed by the client’s feedback. Gathering the requirements after having client meetings based on the interface design. The project was done following an agile development methodology. Therefore, this methodology helped the developer to manage to finish the work on time.

Keywords: developer, application, interface design, layout, Agile, client

Procedia PDF Downloads 115
3532 LIZTOXD: Inclusive Lizard Toxin Database by Using MySQL Protocol

Authors: Iftikhar A. Tayubi, Tabrej Khan, Mansoor M. Alsubei, Fahad A. Alsaferi

Abstract:

LIZTOXD provides a single source of high-quality information about proteinaceous lizard toxins that will be an invaluable resource for pharmacologists, neuroscientists, toxicologists, medicinal chemists, ion channel scientists, clinicians, and structural biologists. We will provide an intuitive, well-organized and user-friendly web interface that allows users to explore the detail information of Lizard and toxin proteins. It includes common name, scientific name, entry id, entry name, protein name and length of the protein sequence. The utility of this database is that it can provide a user-friendly interface for users to retrieve the information about Lizard, toxin and toxin protein of different Lizard species. These interfaces created in this database will satisfy the demands of the scientific community by providing in-depth knowledge about Lizard and its toxin. In the next phase of our project we will adopt methodology and by using A MySQL and Hypertext Preprocessor (PHP) which and for designing Smart Draw. A database is a wonderful piece of equipment for storing large quantities of data efficiently. The users can thus navigate from one section to another, depending on the field of interest of the user. This database contains a wealth of information on species, toxins, toxins, clinical data etc. LIZTOXD resource that provides comprehensive information about protein toxins from lizard toxins. The combination of specific classification schemes and a rich user interface allows researchers to easily locate and view information on the sequence, structure, and biological activity of these toxins. This manually curated database will be a valuable resource for both basic researchers as well as those interested in potential pharmaceutical and agricultural applications of lizard toxins.

Keywords: LIZTOXD, MySQL, PHP, smart draw

Procedia PDF Downloads 162
3531 Numerical Performance Evaluation of a Savonius Wind Turbines Using Resistive Torque Modeling

Authors: Guermache Ahmed Chafik, Khelfellah Ismail, Ait-Ali Takfarines

Abstract:

The Savonius vertical axis wind turbine is characterized by sufficient starting torque at low wind speeds, simple design and does not require orientation to the wind direction; however, the developed power is lower than other types of wind turbines such as Darrieus. To increase these performances several studies and researches have been developed, such as optimizing blades shape, using passive controls and also minimizing power losses sources like the resisting torque due to friction. This work aims to estimate the performance of a Savonius wind turbine introducing a User Defined Function to the CFD model analyzing resisting torque. This User Defined Function is developed to simulate the action of the wind speed on the rotor; it receives the moment coefficient as an input to compute the rotational velocity that should be imposed on computational domain rotating regions. The rotational velocity depends on the aerodynamic moment applied on the turbine and the resisting torque, which is considered a linear function. Linking the implemented User Defined Function with the CFD solver allows simulating the real functioning of the Savonius turbine exposed to wind. It is noticed that the wind turbine takes a while to reach the stationary regime where the rotational velocity becomes invariable; at that moment, the tip speed ratio, the moment and power coefficients are computed. To validate this approach, the power coefficient versus tip speed ratio curve is compared with the experimental one. The obtained results are in agreement with the available experimental results.

Keywords: resistant torque modeling, Savonius wind turbine, user-defined function, vertical axis wind turbine performances

Procedia PDF Downloads 155
3530 HTML5 Online Learning Application with Offline Web, Location Based, Animated Web, Multithread, and Real-Time Features

Authors: Sheetal R. Jadhwani, Daisy Sang, Chang-Shyh Peng

Abstract:

Web applications are an integral part of modem life. They are mostly based upon the HyperText Markup Language (HTML). While HTML meets the basic needs, there are some shortcomings. For example, applications can cease to work once user goes offline, real-time updates may be lagging, and user interface can freeze on computationally intensive tasks. The latest language specification HTML5 attempts to rectify the situation with new tools and protocols. This paper studies the new Web Storage, Geolocation, Web Worker, Canvas, and Web Socket APIs, and presents applications to test their features and efficiencies.

Keywords: HTML5, web worker, canvas, web socket

Procedia PDF Downloads 300
3529 The Role of Data Protection Officer in Managing Individual Data: Issues and Challenges

Authors: Nazura Abdul Manap, Siti Nur Farah Atiqah Salleh

Abstract:

For decades, the misuse of personal data has been a critical issue. Malaysia has accepted responsibility by implementing the Malaysian Personal Data Protection Act 2010 to secure personal data (PDPA 2010). After more than a decade, this legislation is set to be revised by the current PDPA 2023 Amendment Bill to align with the world's key personal data protection regulations, such as the European Union General Data Protection Regulations (GDPR). Among the other suggested adjustments is the Data User's appointment of a Data Protection Officer (DPO) to ensure the commercial entity's compliance with the PDPA 2010 criteria. The change is expected to be enacted in parliament fairly soon; nevertheless, based on the experience of the Personal Data Protection Department (PDPD) in implementing the Act, it is projected that there will be a slew of additional concerns associated with the DPO mandate. Consequently, the goal of this article is to highlight the issues that the DPO will encounter and how the Personal Data Protection Department should respond to this subject. The study result was produced using a qualitative technique based on an examination of the current literature. This research reveals that there are probable obstacles experienced by the DPO, and thus, there should be a definite, clear guideline in place to aid DPO in executing their tasks. It is argued that appointing a DPO is a wise measure in ensuring that the legal data security requirements are met.

Keywords: guideline, law, data protection officer, personal data

Procedia PDF Downloads 78
3528 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery

Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi

Abstract:

The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.

Keywords: CSRF, CSRF detection extension, attackers, attacks

Procedia PDF Downloads 414
3527 An Analysis of Teacher Knowledge of Recognizing and Addressing the Needs of Traumatized Students

Authors: Tiffany Hollis

Abstract:

Childhood trauma is well documented in mental health research, yet has received little attention in urban schools. Child trauma affects brain development and impacts cognitive, emotional, and behavioral functioning. When educators understand that some of the behaviors that appear to be aggressive in nature might be the result of a hidden diagnosis of trauma, learning can take place, and the child can thrive in the classroom setting. Traumatized children, however, do not fit neatly into any single ‘box.’ Although many children enter school each day carrying with them the experience of exposure to violence in the home, the symptoms of their trauma can be multifaceted and complex, requiring individualized therapeutic attention. The purpose of this study was to examine how prepared educators are to address the unique challenges facing children who experience trauma. Given the vast number of traumatized children in our society, it is evident that our education system must investigate ways to create an optimal learning environment that accounts for trauma, addresses its impact on cognitive and behavioral development, and facilitates mental and emotional health and well-being. The researcher describes the knowledge, attitudes, dispositions, and skills relating to trauma-informed knowledge of induction level teachers in a diverse middle school. The data for this study were collected through interviews with teachers, who are in the induction phase (the first three years of their teaching career). The study findings paint a clear picture of how ill-prepared educators are to address the needs of students who have experienced trauma and the implications for the development of a professional development workshop or series of workshops that train teachers how to recognize and address and respond to the needs of students. The study shows how teachers often lack skills to meet the needs of students who have experienced trauma. Traumatized children regularly carry a heavy weight on their shoulders. Children who have experienced trauma may feel that the world is filled with unresponsive, threatening adults, and peers. Despite this, supportive interventions can provide traumatized children with places to go that are safe, stimulating, and even fun. Schools offer an environment that potentially meets these requirements by creating safe spaces where students can feel at ease and have fun while also learning via stimulating educational activities. This study highlights the lack of preparedness of educators to address the academic, behavioral, and cognitive needs of students who have experienced trauma. These findings provide implications for the creation of a professional development workshop that addresses how to recognize and address the needs of students who have experienced some type of trauma. They also provide implications for future research with a focus on specific interventions that enable the creation of optimal learning environments where students who have experienced trauma and all students can succeed, regardless of their life experiences.

Keywords: educator preparation, induction educators, professional development, trauma-informed

Procedia PDF Downloads 124
3526 Design and Implementation of Machine Learning Model for Short-Term Energy Forecasting in Smart Home Management System

Authors: R. Ramesh, K. K. Shivaraman

Abstract:

The main aim of this paper is to handle the energy requirement in an efficient manner by merging the advanced digital communication and control technologies for smart grid applications. In order to reduce user home load during peak load hours, utility applies several incentives such as real-time pricing, time of use, demand response for residential customer through smart meter. However, this method provides inconvenience in the sense that user needs to respond manually to prices that vary in real time. To overcome these inconvenience, this paper proposes a convolutional neural network (CNN) with k-means clustering machine learning model which have ability to forecast energy requirement in short term, i.e., hour of the day or day of the week. By integrating our proposed technique with home energy management based on Bluetooth low energy provides predicted value to user for scheduling appliance in advanced. This paper describes detail about CNN configuration and k-means clustering algorithm for short-term energy forecasting.

Keywords: convolutional neural network, fuzzy logic, k-means clustering approach, smart home energy management

Procedia PDF Downloads 304
3525 A Research Study of the Inclusiveness of VR Headsets for Higher Education

Authors: Fredrick Forster, Gareth Ward, Matthew Tubby, Pamela Lithgow, Anne Nortcliffe

Abstract:

This paper presents the results from a research study of random adult participants accessing one of four different commercially available Virtual Reality (VR) Head Mounted Displays (HMDs) and completing a post user experience reflection questionnaire. The research sort to understand how inclusive commercially available VR HMDs are and identify any associated barriers that could impact the widespread adoption of the devices, specifically in Higher Education (HE). In the UK, education providers are legally required under the Equality Act 2010 to ensure all education facilities are inclusive and reasonable adjustments can be applied appropriately. The research specifically aimed to identify the considerations that academics and learning technologists need to make when adopting the use of commercial VR HMDs in HE classrooms, namely cybersickness, user comfort, Interpupillary Distance, inclusiveness, and user perceptions of VR. The research approach was designed to build upon previously published research on user reflections on presence, usability, and overall HMD comfort, using quantitative and qualitative research methods by way of a questionnaire. The quantitative data included the recording of physical characteristics such as the distance between eye pupils, known as Interpupillary Distance (IPD). VR HMDs require each user’s IPD measurement to enable the focusing of the VR HMDs virtual camera output to the right position in front of the eyes of the user. In addition, the questionnaire captured users’ qualitative reflections and evaluations of the broader accessibility characteristics of the VR HMDs. The initial research activity was accomplished by enabling a random sample of visitors, staff, and students at Canterbury Christ Church University, Kent to use a VR HMD for a set period of time and asking them to complete the post user experience questionnaire. The study identified that there is little correlation between users who experience cyber sickness and car sickness. Also, users with a smaller IPD than average (typically associated with females) were able to use the VR HMDs successfully; however, users with a larger than average IPD reported an impeded experience. This indicates that there is reduced inclusiveness for the tested VR HMDs for users with a higher-than-average IPD which is typically associated with males of certain ethnicities. As action education research, these initial findings will be used to refine the research method and conduct further investigations with the aim to provide verification and validation of the accessibility of current commercial VR HMDs. The conference presentation will report on the research results of the initial study and subsequent follow up studies with a larger variety of adult volunteers.

Keywords: virtual reality, education technology, inclusive technology, higher education

Procedia PDF Downloads 68
3524 A Graph Library Development Based on the Service-‎Oriented Architecture: Used for Representation of the ‎Biological ‎Systems in the Computer Algorithms

Authors: Mehrshad Khosraviani, Sepehr Najjarpour

Abstract:

Considering the usage of graph-based approaches in systems and synthetic biology, and the various types of ‎the graphs employed by them, a comprehensive graph library based ‎on the three-tier architecture (3TA) was previously introduced for full representation of the biological systems. Although proposing a 3TA-based graph library, three following reasons motivated us to redesign the graph ‎library based on the service-oriented architecture (SOA): (1) Maintaining the accuracy of the data related to an input graph (including its edges, its ‎vertices, its topology, etc.) without involving the end user:‎ Since, in the case of using 3TA, the library files are available to the end users, they may ‎be utilized incorrectly, and consequently, the invalid graph data will be provided to the ‎computer algorithms. However, considering the usage of the SOA, the operation of the ‎graph registration is specified as a service by encapsulation of the library files. In other words, overall control operations needed for registration of the valid data will be the ‎responsibility of the services. (2) Partitioning of the library product into some different parts: Considering 3TA, a whole library product was provided in general. While here, the product ‎can be divided into smaller ones, such as an AND/OR graph drawing service, and each ‎one can be provided individually. As a result, the end user will be able to select any ‎parts of the library product, instead of all features, to add it to a project. (3) Reduction of the complexities: While using 3TA, several other libraries must be needed to add for connecting to the ‎database, responsibility of the provision of the needed library resources in the SOA-‎based graph library is entrusted with the services by themselves. Therefore, the end user ‎who wants to use the graph library is not involved with its complexity. In the end, in order to ‎make ‎the library easier to control in the system, and to restrict the end user from accessing the files, ‎it was preferred to use the service-oriented ‎architecture ‎‎(SOA) over the three-tier architecture (3TA) and to redevelop the previously proposed graph library based on it‎.

Keywords: Bio-Design Automation, Biological System, Graph Library, Service-Oriented Architecture, Systems and Synthetic Biology

Procedia PDF Downloads 311
3523 Automatic Verification Technology of Virtual Machine Software Patch on IaaS Cloud

Authors: Yoji Yamato

Abstract:

In this paper, we propose an automatic verification technology of software patches for user virtual environments on IaaS Cloud to decrease verification costs of patches. In these days, IaaS services have been spread and many users can customize virtual machines on IaaS Cloud like their own private servers. Regarding to software patches of OS or middleware installed on virtual machines, users need to adopt and verify these patches by themselves. This task increases operation costs of users. Our proposed method replicates user virtual environments, extracts verification test cases for user virtual environments from test case DB, distributes patches to virtual machines on replicated environments and conducts those test cases automatically on replicated environments. We have implemented the proposed method on OpenStack using Jenkins and confirmed the feasibility. Using the implementation, we confirmed the effectiveness of test case creation efforts by our proposed idea of 2-tier abstraction of software functions and test cases. We also evaluated the automatic verification performance of environment replications, test cases extractions and test cases conductions.

Keywords: OpenStack, cloud computing, automatic verification, jenkins

Procedia PDF Downloads 486
3522 Interactive Winding Geometry Design of Power Transformers

Authors: Paffrath Meinhard, Zhou Yayun, Guo Yiqing, Ertl Harald

Abstract:

Winding geometry design is an important part of power transformer electrical design. Conventionally, the winding geometry is designed manually, which is a time-consuming job because it involves many iteration steps in order to meet all cost, manufacturing and electrical requirements. Here a method is presented which automatically generates the winding geometry for given user parameters and allows the user to interactively set and change parameters. To achieve this goal, the winding problem is transferred to a mixed integer nonlinear optimization problem. The relevant geometrical design parameters are defined as optimization variables. The cost and other requirements are modeled as constraints. For the solution, a stochastic ant colony optimization algorithm is applied. It is well-known, that an optimizer can get stuck in a local minimum. For the winding problem, we present efficient strategies to come out of local minima, furthermore a reduced variable search range helps to accelerate the solution process. Numerical examples show that the optimization result is delivered within seconds such that the user can interactively change the variable search area and constraints to improve the design.

Keywords: ant colony optimization, mixed integer nonlinear programming, power transformer, winding design

Procedia PDF Downloads 380
3521 Human Computer Interaction Using Computer Vision and Speech Processing

Authors: Shreyansh Jain Jeetmal, Shobith P. Chadaga, Shreyas H. Srinivas

Abstract:

Internet of Things (IoT) is seen as the next major step in the ongoing revolution in the Information Age. It is predicted that in the near future billions of embedded devices will be communicating with each other to perform a plethora of tasks with or without human intervention. One of the major ongoing hotbed of research activity in IoT is Human Computer Interaction (HCI). HCI is used to facilitate communication between an intelligent system and a user. An intelligent system typically comprises of a system consisting of various sensors, actuators and embedded controllers which communicate with each other to monitor data collected from the environment. Communication by the user to the system is typically done using voice. One of the major ongoing applications of HCI is in home automation as a personal assistant. The prime objective of our project is to implement a use case of HCI for home automation. Our system is designed to detect and recognize the users and personalize the appliances in the house according to their individual preferences. Our HCI system is also capable of speaking with the user when certain commands are spoken such as searching on the web for information and controlling appliances. Our system can also monitor the environment in the house such as air quality and gas leakages for added safety.

Keywords: human computer interaction, internet of things, computer vision, sensor networks, speech to text, text to speech, android

Procedia PDF Downloads 362
3520 Level of Gross Motor Development and Age Equivalents of Children 9 Years

Authors: Masri Baharom

Abstract:

The purpose of the study is to identify the age group of children 9 who have experienced delays in gross motor development. Instrument used in this study is Test Gross Motor Development / TGMD-2 (Ulrich, 2000) which was adopted at the international level. Gross motor development data were obtained by video recording (Sony (DRC-SR42 with a 40x optical zoom capability, and software Ultimate Studio 14) on locomotor and manipulative skills. A total n = 192 persons, children of 9 years (9.30 ± .431) at Sekolah Kebangsaan Mutiara Perdana, Bayan Lepas, Penang were involved as subjects. Children age 9 years experienced delays AELS (4.61 ± .69), AEMS (5:52 ± .62) and GMDQ (7.26 ± .2.14). The findings based on descriptive rating indicated that the performance of children age 9 years acquired low levels of AELS, MSS, AEMS and very low in LSS and GMDS.

Keywords: gross motor development score, locomotor standard score, age equivalent locomotor score, manipulative standard score, age equivalent manipulative score

Procedia PDF Downloads 444
3519 Experiencing Scarred Body among Thai Women Living with Breast Cancer

Authors: Dusanee Suwankhong, Pranee Liamputtong

Abstract:

Breast surgery leaves undesirable scars to all women who experienced mastectomy, despite the fact that this could be a principle approach to save one life. This paper explores how Thai women living with breast cancer perceived and experienced a scarred body after breast surgery. In-depth interviews and drawing methods were employed among 20 women diagnosed with breast cancer. The interviewed data were analysed using thematic analysis method. The results showed that all women with breast cancer who underwent breast surgery perceived and experienced scar as a persisting and visible side-effect. This disfigurement appearance presented a negative image of feminine identity and led to emotional burdens among women. They responded to being scarred in different ways relating to their perceptions of body and changes. The older group had less embarrassed feelings towards being scarred comparing to the younger one. All women tried to seek means to cope with such physical impairment and keep balance life related to their condition. For example, they relied on Buddhism practice and tried to heal the keloid using natural products. Scars appeared to be an unpleasant effect for women who underwent breast mastectomy. Nurses and health care professionals in the local health service sectors need to pay close attention to how the women see the scarred body and their experiences of living with the distorted feminine appearance, and to provide sensitive support that meets the needs of these vulnerable women. The suitable supports can reduce the sense of embarrassment and increase their sense of self-confidence about their social femininity.

Keywords: breast surgery, emotional response, qualitative study, scars, Thai women

Procedia PDF Downloads 168
3518 My Dress, My Body and My Choice Politics in Kenya

Authors: Emmy Kipsoi

Abstract:

Kenya legalized the Sexual offence bill (2001), after vigorous campaigning and lobbying by feminist both in and out of parliament to ensure that the bill passed with minimal amendments. The sexual offense act provides for a good description on what constitutes sexual offences and the penalties that follow. It is from this context that the paper explores and interrogated the lived experiences of women living and working in Kenyan urban towns, who had experienced some form of sexual harassment. The study employed phenomenology to interpret the experiences of twenty (20) women in an urban town between the ages of 20 to 65 years women who had received at least some formal education and where engaged in some formal form of employment. The findings indicated that various forms of sexual harassment were experienced in the Kenyan town. Secondly, the knowledge about the contents of the bill wanting most of the women interviews were not aware of the protection accorded by law. The number of reported cases of sexual harassment shed light on the isolation, frustration and fear that women live despite a progressive law in print

Keywords: Kenya, phenomenology, sexual harassment, women

Procedia PDF Downloads 308
3517 Foreign Language Teaching Anxiety Among In-Service English Teachers

Authors: Guofang Zeng, Anisa Cheung

Abstract:

Teacher emotions are vitally important for the classroom environment and students’ language attainment; however, studies concerning foreign language teaching anxiety (FLTA) remain scarce. This study examined FLTA by administering questionnaires to 235 in-service teachers to investigate the impacts of educational stages and teaching experience on FLTA. The statistical results show that secondary school teachers exhibit significantly higher levels of FLTA than their primary counterparts, especially in “lack of student interest” and “fear of negative evaluation”. Novice teachers are significantly more anxious than experienced teachers in the dimension of ‘teaching inexperience’, while no other differences are shown in other aspects. No interaction effects are found between the two variables. Pedagogical implications for understanding FLTA in different educational and experiential stages and corresponding anxiety-reducing strategies are discussed.

Keywords: foreign language teaching anxiety, in-service teachers, novice and experienced teachers, primary and secondary school

Procedia PDF Downloads 7
3516 Women Educational Leaders in an Age of Accountability

Authors: Ann Vibert, Heather Hemming

Abstract:

This paper presentation summarizes the findings and implications of research on the plight and practices of women educational leaders in public school systems and in one university. The authors, both women university administrators, are also scholars and researchers of education. The research project on which this paper presentation is based proposed to examine how women educational leaders imagined, experienced, and carried out their leadership roles in the context of a growing local and global accountability-based performativity discourse which is reshaping educational work especially for women, we argue, in both public school and post-secondary sites. The research employed critical ethnographic interviews with 20 women educational leaders in P-12 school systems and three women university level educational leaders. Data were collected on women educational leaders’ perceptions of the effects of accountability and performativity discourses on the nature of their work. Specifically, leaders were asked to speak to whether they experienced a growth in managerial work as a consequence of increased accountability demands; how they experienced their work changing as a consequence of accountability and performativity demands; how these changes impacted the central values they enacted in their work as women educational leaders changes; and how they responded to/negotiated/accommodated changes in the nature of their work developing as a consequence of accountability and performativity frameworks. Findings from the research data and analyses confirm and extend recent scholarly work on the gendered nature of performativity and accountability discourses and frameworks, and their differential effects across differing genders. The oral presentation we propose here focusses on those findings in terms of similarities for women educational leaders across different educational contexts.

Keywords: women in educational leadership, gender and educational performativity, accountability and women leaders, gender and educational leadership

Procedia PDF Downloads 295
3515 Ureteral Stents with Extraction Strings: Patient-Reported Outcomes

Authors: Rammah Abdlbagi, Similoluwa Biyi, Aakash Pai

Abstract:

Introduction: Short-term ureteric stents are commonly placed after ureteroscopy procedures. The removal usually entails having a flexible cystoscopy, which entails a further invasive procedure. There are often delays in removing the stent as departments have limited cystoscopy availability. However, if stents with extraction strings are used, the patient or a clinician can remove them. The aim of the study is to assess the safety and effectiveness of the use of a stent with a string. Method: A retrospective, single-institution study was conducted over a three-month period. Twenty consecutive patients had ureteric stents with string insertion. Ten of the patients had a stent removal procedure previously with flexible cystoscopy. A validated questionnaire was used to assess outcomes. Primary outcomes included: dysuria, hematuria, urinary frequency, and disturbance of the patient’s daily activities. Secondary outcomes included pain experience during the stent removal. Result: Fifteen patients (75%) experienced hematuria and frequency. Two patients experienced pain and discomfort during the stent removal (10%). Two patients had experienced a disturbance in their daily activity (10%). All patients who had stent removal before using flexible cystoscopy preferred the removal of the stent using a string. None of the patients had stent displacement. The median stent dwell time was five days. Conclusion: Patient reported outcomes measures for the indwelling period of a stent with extraction string are equivalent to the published data on stents. Extraction strings mean that the stent dwell time can be reduced. The removal of the stent on extraction strings is more tolerable than the conventional stent.

Keywords: ureteric stent, string flexible cystoscopy, stent symptoms, validated questionnaire

Procedia PDF Downloads 93
3514 Consumer Behaviour Model for Apparel E-Tailers Using Structural Equation Modelling

Authors: Halima Akhtar, Abhijeet Chandra

Abstract:

The paper attempts to analyze the factors that influence the Consumer Behavior to purchase apparel through the internet. The intentions to buy apparels online were based on in terms of user style, orientation, size and reputation of the merchant, social influence, perceived information utility, perceived ease of use, perceived pleasure and attractiveness and perceived trust and risk. The basic framework used was Technology acceptance model to explain apparels acceptance. A survey was conducted to gather the data from 200 people. The measures and hypotheses were analyzed using Correlation testing and would be further validated by the Structural Equation Modelling. The implications of the findings for theory and practice could be used by marketers of online apparel websites. Based on the values obtained, we can conclude that the factors such as social influence, Perceived information utility, attractiveness and trust influence the decision for a user to buy apparels online. The major factors which are found to influence an online apparel buying decision are ease of use, attractiveness that a website can offer and the trust factor which a user shares with the website.

Keywords: E-tailers, consumer behaviour, technology acceptance model, structural modelling

Procedia PDF Downloads 185
3513 The Use of Complementary and Alternative Medicine for Pain Relief in the Elderly: An Investigational Analysis of Seniors Residing in an Independent/Assisted Seniors’ Living Facility

Authors: Carol Cameletti

Abstract:

The goal of this study was to perform a pilot survey to assess pain frequency and intensity in an elderly population and to assess treatment options for chronic pain that include complementary and alternative medicines (CAM). Ten participants were recruited from an independent and supportive living housing facility in Northern Ontario and asked to complete two questionnaires: 1) a self-assessment on pain, and 2) the use of CAM for pain. Results from our study show that 80% of the participants experienced pains other than the regular everyday pains such as minor headaches, sprains or toothaches. Although participants stated that on average the highest level of pain they experienced within the past 24 hours had a score of 6.5 (0=no pain, 10=worst pain imaginable) the level of pain they experienced moderately interfered with their daily activities. Unfortunately, participants stated that they were only able to attain minimal levels of pain relief using treatments or medications causing some of the participants to seek alternative therapies or self-help practices. The most commonly used CAMs were vitamins/minerals, herbs and supplements, and self-help practices such as meditation, prayer, visualization and relaxation techniques. Although some of the participants stated that they had received complementary treatments directly from their physician, four of the nine participants said that they had not disclosed CAM use to their physician thereby indicating a need to open the lines of communication between healthcare providers and patients with regards to CAM use. It is our hope that the data generated from this study will serve as the platform for a pain management clinic that is client-centered, consumer-driven and truly integrative and tailored in order to meet the unique needs of older adults in Great Sudbury, Ontario.

Keywords: alternative, complementary, elderly, medicine

Procedia PDF Downloads 180
3512 Development of a Hamster Knowledge System Based on Android Application

Authors: Satien Janpla, Thanawan Boonpuck, Pattarapan Roonrakwit

Abstract:

In this paper, we present a hamster knowledge system based on android application. The objective of this system is to advice user to upkeep and feed hamsters based on mobile application. We describe the design approaches and functional components of this system. The system was developed based on knowledge based of hamster experts. The results were divided by the research purposes into 2 parts: developing the mobile application for advice users and testing and evaluating the system. Black box technique was used to evaluate application performances and questionnaires were applied to measure user satisfaction with system usability by specialists and users.

Keywords: hamster knowledge, Android application, black box, questionnaires

Procedia PDF Downloads 341
3511 Implementing a Database from a Requirement Specification

Authors: M. Omer, D. Wilson

Abstract:

Creating a database scheme is essentially a manual process. From a requirement specification, the information contained within has to be analyzed and reduced into a set of tables, attributes and relationships. This is a time-consuming process that has to go through several stages before an acceptable database schema is achieved. The purpose of this paper is to implement a Natural Language Processing (NLP) based tool to produce a from a requirement specification. The Stanford CoreNLP version 3.3.1 and the Java programming were used to implement the proposed model. The outcome of this study indicates that the first draft of a relational database schema can be extracted from a requirement specification by using NLP tools and techniques with minimum user intervention. Therefore, this method is a step forward in finding a solution that requires little or no user intervention.

Keywords: information extraction, natural language processing, relation extraction

Procedia PDF Downloads 261
3510 Level Of Gross Motor Development And Age Equivalents Of 9-Year-Old Children

Authors: Ahmad Hashim, Masri Baharom

Abstract:

The purpose of the study is to identify the age group of children 9 who have experienced delays in gross motor development. Instrument used in this study is Test Gross Motor Development / TGMD-2 (Ulrich, 2000) which was adopted at the international level. Gross motor development data were obtained by video recording (Sony (DRC-SR42 with a 40x optical zoom capability, and software Ultimate Studio 14) on locomotor and manipulative skills. A total n = 192 persons, children of 9 years (9.30 ± .431) at Sekolah Kebangsaan Mutiara Perdana, Bayan Lepas, Penang were involved as subjects. Children age 9 years experienced delays AELS (4.61 ± .69), AEMS (5:52 ± .62) and GMDQ (7.26 ± .2.14). The findings based on descriptive rating indicated that the performance of children age 9 years acquired low levels of AELS, MSS, AEMS and very low in LSS and GMDS.

Keywords: gross motor development score, locomotor standard score, age equivalent locomotor score, manipulative standard score, age equivalent manipulative score

Procedia PDF Downloads 410
3509 Design and Implementation of a Software Platform Based on Artificial Intelligence for Product Recommendation

Authors: Giuseppina Settanni, Antonio Panarese, Raffaele Vaira, Maurizio Galiano

Abstract:

Nowdays, artificial intelligence is used successfully in academia and industry for its ability to learn from a large amount of data. In particular, in recent years the use of machine learning algorithms in the field of e-commerce has spread worldwide. In this research study, a prototype software platform was designed and implemented in order to suggest to users the most suitable products for their needs. The platform includes a chatbot and a recommender system based on artificial intelligence algorithms that provide suggestions and decision support to the customer. The recommendation systems perform the important function of automatically filtering and personalizing information, thus allowing to manage with the IT overload to which the user is exposed on a daily basis. Recently, international research has experimented with the use of machine learning technologies with the aim to increase the potential of traditional recommendation systems. Specifically, support vector machine algorithms have been implemented combined with natural language processing techniques that allow the user to interact with the system, express their requests and receive suggestions. The interested user can access the web platform on the internet using a computer, tablet or mobile phone, register, provide the necessary information and view the products that the system deems them most appropriate. The platform also integrates a dashboard that allows the use of the various functions, which the platform is equipped with, in an intuitive and simple way. Artificial intelligence algorithms have been implemented and trained on historical data collected from user browsing. Finally, the testing phase allowed to validate the implemented model, which will be further tested by letting customers use it.

Keywords: machine learning, recommender system, software platform, support vector machine

Procedia PDF Downloads 134
3508 The Relationship between Violence against Women and Levels of Self-Esteem in Urban Informal Settlements of Mumbai, India: A Cross-Sectional Study

Authors: A. Bentley, A. Prost, N. Daruwalla, D. Osrin

Abstract:

Background: This study aims to investigate the relationship between experiences of violence against women in the family, and levels of self-esteem in women residing in informal settlement (slum) areas of Mumbai, India. The authors hypothesise that violence against women in Indian households extends beyond that of intimate partner violence (IPV), to include other members of the family and that experiences of violence are associated with lower levels of self-esteem. Methods: Experiences of violence were assessed through a cross-sectional survey of 598 women, including questions about specific acts of emotional, economic, physical and sexual violence across different time points, and the main perpetrator of each. Self-esteem was assessed using the Rosenberg self-esteem questionnaire. A global score for self-esteem was calculated and the relationship between violence in the past year and Rosenberg self-esteem score was assessed using multivariable linear regression models, adjusted for years of education completed, and clustering using robust standard errors. Results: 482 (81%) women consented to interview. On average, they were 28.5 years old, had completed 6 years of education and had been married 9.5 years. 88% were Muslim and 46% lived in joint families. 44% of women had experienced at least one act of violence in their lifetime (33% emotional, 22% economic, 24% physical, 12% sexual). Of the women who experienced violence after marriage, 70% cited a perpetrator other than the husband for at least one of the acts. 5% had low self-esteem (Rosenberg score < 15). For women who experienced emotional violence in the past year, the Rosenberg score was 2.6 points lower (p < 0.001). It was 1.2 points lower (p = 0.03) for women who experienced economic violence. For physical or sexual violence in the past year, no statistically significant relationship with Rosenberg score was seen. However, for a one-unit increase in the number of different acts of each type of violence experienced in the past year, a decrease in Rosenberg score was seen (-0.62 for emotional, -0.76 for economic, -0.53 for physical and -0.47 for sexual; p < 0.05 for all). Discussion: The high prevalence of violence experiences across the lifetime was likely due to the detailed assessment of violence and the inclusion of perpetrators within the family other than the husband. Experiences of emotional or economic violence in the past year were associated with lower Rosenberg scores and therefore lower self-esteem, but no relationship was seen between experiences of physical or sexual violence and Rosenberg score overall. For all types of violence in the past year, a greater number of different acts were associated with a decrease in Rosenberg score. Emotional violence showed the strongest relationship with self-esteem, but for all types of violence the more complex the pattern of perpetration with different methods used, the lower the levels of self-esteem. Due to the cross-sectional nature of the study causal directionality cannot be attributed. Further work to investigate the relationship between severity of violence and self-esteem and whether self-esteem mediates relationships between violence and poorer mental health would be beneficial.

Keywords: family violence, India, informal settlements, Rosenberg self-esteem scale, self-esteem, violence against women

Procedia PDF Downloads 126