Search results for: internet usage
3137 Insight on Passive Design for Energy Efficiency in Commercial Building for Hot and Humid Climate
Authors: Aravind J.
Abstract:
Passive design can be referred to a way of designing buildings that takes advantage of the prevailing climate and natural energy resources. Which will be a key to reduce the increasing energy usage in commercial buildings. Most of the small scale commercial buildings made are merely a thermal mass inbuilt with active systems to bring lively conditions. By bringing the passive design strategies for energy efficiency in commercial buildings will reduce the usage of active systems. Thus the energy usage can be controlled through analysis of daylighting and improved living conditions in the indoor spaces by using passive techniques. And comparative study on different passive design systems and conventional methods will be approached for commercial buildings in hot and humid region. Possible effects of existing risks implied with solution for those problems is also a part of the paper. The result will be carried on with the design programme to prove the workability of the strategies.Keywords: passive design, energy efficiency, commercial buildings, hot and humid climate
Procedia PDF Downloads 3673136 Integrating Blockchain and Internet of Things Platforms: An Empirical Study on Immunization Cold Chain
Authors: Fawzia Abujalala, Asma Elmangoush, Majdi Ashibani
Abstract:
The adoption of Blockchain technology introduces the possibility to decentralize cold chain systems. This adaptation enhances them to be more efficient, accessible, verifiable, and data security. Additionally, the Internet of Things (IoT) concept is considered as an added-value to various application domains. Cargo tracking and cold chain are a few to name. However, the security of the IoT transactions and integrated devices remains one of the key challenges to the IoT application’s success. Consequently, Blockchain technology and its consensus protocols have been used to solve many information security problems. In this paper, the researchers discussed the advantages of integrating Blockchain technology into IoT platform to improve security and provide an overview of existing literature on integrating Blockchain and IoT platforms. Then, presented the immunization cold chain solution as a use-case that could apply to any critical goods based on integrating hyperledger fabric platform and IoT platform.Keywords: blockchain, hyperledger fabric, internet of things, security, traceability
Procedia PDF Downloads 1493135 Software Quality Promotion and Improvement through Usage of a PSP Oriented Information System
Authors: Gaoussou Doukoure Abdel Kader, Mnkandla Ernest
Abstract:
This research aims to investigate the usage of a personal software process oriented information system in order to facilitate the promotion of software quality and its improvement in organizations. In this light, at the term of a literature review on software quality and related concepts, the personal software process is discussed, more particularly in terms of software quality. Semi-structured interviews will be conducted with a team of software engineers on the first hand to establish a baseline on their understanding of what quality entails for them. The PSP methodology will then be presented to the engineers in its most basic aspects. The research will then proceed to practical case study where a PSP oriented information system is submitted to engineers for usage throughout their development process. Reports from the PSP information system as well as feedback from the engineers will be used in conjunction with the theoretical foundation to establish a PSP inspired framework for software quality promotion and improvement.Keywords: information communication technology, personal software process, software quality, process quality, software engineering
Procedia PDF Downloads 4943134 Effectiveness of Internet Psychological Counseling in Reducing Social Shyness Symptoms among Students of University of Tabuk
Authors: Khawla Saad Albalawi
Abstract:
The aim of this research was to explore the effectiveness of the internet counseling in reducing social shyness among the university's students. The sample consisted of 40 students and was divided into two groups: an experimental group and a control group. The social shyness scale (SSS) was administered to both groups before applying the counseling to the experimental group (as a pre-test). After that, the internet counseling was applied to the experimental group. Next, the SSS was administered to both groups (as a post-test). Finally, the SSS was administered to the experimental group (as an iterative application). Results suggest that: 1. There is a significant difference between the two groups in the post-test in all dimensions and the total score of the (SSS) in favor of the experimental group in all cases. 2. There is a significant difference between the pre- and the post-test of the experimental group in all dimensions and the total score of the (SSS) in favor of the post-test in all cases. 3. There is no significant difference between the post-test and the iterative application of the experimental group in all dimensions and the total score of the (SSS). The above results were discussed in light of previous research. Recommendations and future researches were suggested.Keywords: internet psychological clinics, social interaction disorders, shyness, Twitter, Facebook
Procedia PDF Downloads 4973133 Nitrous Oxide Wastage: Putting Strategies “In the Pipeline” to Reduce Carbon Emissions from Nitrous Oxide
Authors: F. Gallop, C. Ward, M. Zaky, M. Vaghela, R. Sabaratnam
Abstract:
Nitrous oxide (N₂O) has been used in anaesthesia for over 150 years owing to advantageous physical and pharmacological properties. However, with a global warming potential of 310, we have an urgent responsibility to reduce its usage and emission. Anecdotal evidence in our hospital trust suggests minimal N₂O usage, yet our theatres receive a staggering supply. This warranted further investigation. We used a data collection tool to prospectively capture quantitative and qualitative data regarding N₂O cases during one week: this recorded demographics, N₂O indications, clinical management, and total N₂O consumption in litres. In addition, N₂O usage in dental sedation suites and paediatric theatres was separately quantified. Pipeline supply data was acquired from British Oxygen Company accounts. We captured 490 cases. 4% (n=19) used N₂O, 63% (n=12) of these in dental theatres. Common N₂0 indications were induction speed (37%) and rapidly increasing anaesthesia depth (32%). In adult cases, N₂O was always used intraoperatively rather than solely at induction. 74% (n=14) of anaesthetists reported environmental concern over using N₂O. The week’s total N₂O usage was 8109 litres, amounting to 421,668 litres annually. However, the annual N₂O pipeline supply is 2,997,000 litres; an enormous 1.8 million Kg of CO₂. Our results supportively demonstrate that the N₂O pipeline supply greatly exceeds its clinical use. Acknowledging clinical areas not audited, the discrepancy between supply and usage suggests approximately 2.5 million litres of yearly wastage. We consequently recommend terminating the N₂O pipeline supply in minimally used areas, eliminating 1.5 million Kg of CO₂ emissions. High usage clinical areas could consider portable N₂O cylinders as an alternative. In Sweden, N₂O destruction technology is routinely used to minimise CO₂ emissions. Our results support National Health System investment in similar infrastructure.Keywords: anaesthesia, environment, medical gases, nitrous oxide, sustainability
Procedia PDF Downloads 1383132 Impact of ICT on Efficient Services Providing to Users by LIPs in NCR India
Authors: Mani Gupta
Abstract:
This study deals with question: i) Whether ICT plays a positive role in improvement of efficiency of LIPs in terms of providing efficient services to the Users in LICs? and ii) Role of finance in terms of required technological logistics and infrastructure for usage of ICT based services to comfort in accessing databases by Users in LICs. This is based on primary data which are collected from various libraries and Information Centers of NCR Delhi. The survey conducted during December 15 and 31, 2010 on 496 respondents across 96 libraries and information centers in NCR Delhi through electronic data collection method. There is positive and emphatic relationship between ICT and its effect on improving the level of efficient services providing by LIPs in LICs in NCR Delhi. This is divided into 6 sub-headings and finally the outcomes.Keywords: modern globalization, linear correlation, efficient service, internet revolution, logistics
Procedia PDF Downloads 3573131 Evaluation of Water Efficiency in Farming: Empirical Evidence from a Semi-Arid Region
Authors: Laura Piedra-Munoz, Angeles Godoy-Duran, Emilio Galdeano-Gomez, Juan C. Perez-Mesa
Abstract:
Spain is very sensitive to water management issues due to its climatic characteristics and the deficit of this resource in many areas of its territory. This study examines the characteristics of the family farms that are more efficient in the use of water, focusing on a semi-arid area located in Almeria, southeast of Spain. In the case of irrigated agriculture, water usage efficiency usually indicates water productivity in terms of yield (kg/m³), or in economic terms (euros/m³). These two water usage indicators were considered to analyse water usage efficiency according to other studies on water efficiency in the horticultural area under analysis. This work also takes into account other water usage characteristics such as water supplied, innovative irrigation practices, water-efficient technology, and water-saving practices. The results show that the most water efficient farms have technical advisors and use irrigation on demand, that measures the water needs of the crops and are considered the most technological irrigation system. These farms are more technological and less labor intensive. They are also aware of water scarcity and the need to conserve the environment. This approach allow managers to identify the principal factors and best practices related to water efficiency in order to promote and implement them in inefficient farms and promote sustainability.Keywords: cluster analysis, family farms, Spain, sustainability, water-use efficiency
Procedia PDF Downloads 2853130 Impact of Electronic Guest Relationship Management (e-GRM) on Brand Loyalty: The Case of Croatian Hotels
Authors: Marina Laškarin, Vlado Galičić
Abstract:
Quick adoption of e-business and emerging influence of “Electronic Word of Mouth e-WOM” communication on guests made leading hotel brands successful examples of electronic guest relationship management. Main reasons behind such success are well established procedures in collection, analysis and usage of highly valuable data available on the Internet, generated through some form of e-GRM programme. E-GRM is more than just a technology solution. It’s a system which balance respective guest demands, hotel technological capabilities and organizational culture of employees, discharging the universal approach in guest relations “same for all”. The purpose of this research derives from the necessity of determining the importance of monitoring and applying e-WOM communication as one of the methods used in managing guest relations. This paper analyses and compares different hotelier’s opinions on e-WOM communication.Keywords: brand loyalty, e-WOM communication, GRM programmes, organizational culture
Procedia PDF Downloads 2903129 Effects of Cell Phone Usage on Psychological Health of Students
Authors: Avadhesh Kumar
Abstract:
Background: The cell phone has rapidly become an integral, and, for some, an essential communication tool that is being used worldwide. Their use without any knowledge of their harmful effects like cancers and other health effects is not ‘quite’ safe. Studies on cancers due to electromagnetic radiations from cell phones are available, but there is a need to research on the detrimental physical and psychological effects on users like students. This study focused on certain psychological or mental health effects of cell phone usage amongst students. Materials and methods: The present study will be carried out on all the students of Banaras Hindu University. Students of both sexes from urban and rural backgrounds were selected at random and administered a pre- tested questionnaire which included aspects related to few common adverse psychological health signs and symptoms attributed to cell phone over-usage. Results: Stress was found to be the commonest symptom (51.47%) followed by irritability/anger (43.79%). Other common mental symptoms included lack of concentration and academic performance, insomnia, anxiety etc. Suggestions: This study confirms that the younger generation, who are the most frequent cell phone users, needs to be aware of the adverse health effects of cell phone usage especially the mental aspects and take preventive measures to minimize and control the same. Less dependence on the device, a curtailing time period spent on talking, communicating more by texting, etc. are some of the practical measures suggested.Keywords: cell phones, psychological health effects, students, mental health
Procedia PDF Downloads 3093128 Factors Influencing University Students' Online Disinhibition Behavior: The Moderating Effects of Deterrence and Social Identity
Authors: Wang, Kuei-Ing, Jou-Fan Shih
Abstract:
This study adopts deterrence theory as well as social identities as moderators, and explores their moderating affects on online toxic disinhibition. Survey and Experimental methodologies are applied to test the research model and four hypotheses are developed in this study. The controllability of identity positively influenced the behavior of toxic disinhibition both in experimental and control groups while the fluidity of the identity did not have significant influences on online disinhibition. Punishment certainty, punishment severity as well as social identity negatively moderated the relation between the controllability of the identity and the toxic disinhibition. The result of this study shows that internet users hide their real identities when they behave inappropriately on internet, but once they acknowledge that the inappropriate behavior will be found and punished severely, the inappropriate behavior then will be weakened.Keywords: seductive properties of internet, online disinhibition, punishment certainty, punishment severity, social identity
Procedia PDF Downloads 5083127 Chaos Cryptography in Cloud Architectures with Lower Latency
Authors: Mohammad A. Alia
Abstract:
With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.Keywords: chaos, cloud computing, security, cryptography
Procedia PDF Downloads 3453126 Ethical Concerns in the Internet of Things and Smart Devices: Case Studies and Analysis
Authors: Mitchell Browe, Oriehi Destiny Anyaiwe, Zahraddeen Gwarzo
Abstract:
The Internet of Things (IoT) is a major evolution of technology and of the internet, which has the power to revolutionize the way people live. IoT has the power to change the way people interact with each other and with their homes; It has the ability to give people new ways to interact with and monitor their health; It can alter socioeconomic landscapes by providing new and efficient methods of resource management, saving time and money for both individuals and society as a whole; It even has the potential to save lives through autonomous vehicle technology and smart security measures. Unfortunately, nearly every revolution bears challenges which must be addressed to minimize harm by the new technology upon its adopters. IoT represents an internet technology revolution which has the potential to risk privacy, safety, and security of its users, should devices be developed, implemented, or utilized improperly. This article examines past and current examples of these ethical faults in an attempt to highlight the importance of consumer awareness of potential dangers of these technologies in making informed purchasing and utilization decisions, as well as to reveal how deficiencies and limitations of IoT devices should be better addressed by both companies and by regulatory bodies. Aspects such as consumer trust, corporate transparency, and misuse of individual data are all factors in the implementation of proper ethical boundaries in the IoT.Keywords: IoT, ethical concerns, privacy, safety, security, smart devices
Procedia PDF Downloads 853125 Survey on Malware Detection
Authors: Doaa Wael, Naswa Abdelbaky
Abstract:
Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.Keywords: malware analysis, blockchain, malware attacks, malware detection approaches
Procedia PDF Downloads 873124 Internet Protocol Television: A Research Study of Undergraduate Students Analyze the Effects
Authors: Sabri Serkan Gulluoglu
Abstract:
The study is aimed at examining the effects of internet marketing with IPTV on human beings. Internet marketing with IPTV is emerging as an integral part of business strategies in today’s technologically advanced world and the business activities all over the world are influences with the emergence of this modern marketing tool. As the population of the Internet and on-line users’ increases, new research issues have arisen concerning the demographics and psychographics of the on-line user and the opportunities for a product or service. In recent years, we have seen a tendency of various services converging to the ubiquitous Internet Protocol based networks. Besides traditional Internet applications such as web browsing, email, file transferring, and so forth, new applications have been developed to replace old communication networks. IPTV is one of the solutions. In the future, we expect a single network, the IP network, to provide services that have been carried by different networks today. For finding some important effects of a video based technology market web site on internet, we determine to apply a questionnaire on university students. Recently some researches shows that in Turkey the age of people 20 to 24 use internet when they buy some electronic devices such as cell phones, computers, etc. In questionnaire there are ten categorized questions to evaluate the effects of IPTV when shopping. There were selected 30 students who are filling the question form after watching an IPTV channel video for 10 minutes. This sample IPTV channel is “buy.com”, it look like an e-commerce site with an integrated IPTV channel on. The questionnaire for the survey is constructed by using the Likert scale that is a bipolar scaling method used to measure either positive or negative response to a statement (Likert, R) it is a common system that is used is the surveys. By following the Likert Scale “the respondents are asked to indicate their degree of agreement with the statement or any kind of subjective or objective evaluation of the statement. Traditionally a five-point scale is used under this methodology”. For this study also the five point scale system is used and the respondents were asked to express their opinions about the given statement by picking the answer from the given 5 options: “Strongly disagree, Disagree, Neither agree Nor disagree, Agree and Strongly agree”. These points were also rates from 1-5 (Strongly disagree, Disagree, Neither disagree Nor agree, Agree, Strongly agree). On the basis of the data gathered from the questionnaire some results are drawn in order to get the figures and graphical representation of the study results that can demonstrate the outcomes of the research clearly.Keywords: IPTV, internet marketing, online, e-commerce, video based technology
Procedia PDF Downloads 2403123 Load Balancing Algorithms for SIP Server Clusters in Cloud Computing
Authors: Tanmay Raj, Vedika Gupta
Abstract:
For its groundbreaking and substantial power, cloud computing is today’s most popular breakthrough. It is a sort of Internet-based computing that allows users to request and receive numerous services in a cost-effective manner. Virtualization, grid computing, and utility computing are the most widely employed emerging technologies in cloud computing, making it the most powerful. However, cloud computing still has a number of key challenges, such as security, load balancing, and non-critical failure adaption, to name a few. The massive growth of cloud computing will put an undue strain on servers. As a result, network performance will deteriorate. A good load balancing adjustment can make cloud computing more productive and in- crease client fulfillment execution. Load balancing is an important part of cloud computing because it prevents certain nodes from being overwhelmed while others are idle or have little work to perform. Response time, cost, throughput, performance, and resource usage are all parameters that may be improved using load balancing.Keywords: cloud computing, load balancing, computing, SIP server clusters
Procedia PDF Downloads 1233122 A Pervasive System Architecture for Smart Environments in Internet of Things Context
Authors: Patrick Santos, João Casal, João Santos Luis Varandas, Tiago Alves, Carlos Romeiro, Sérgio Lourenço
Abstract:
Nowadays, technology makes it possible to, in one hand, communicate with various objects of the daily life through the Internet, and in the other, put these objects interacting with each other through this channel. Simultaneously, with the raise of smartphones as the most ubiquitous technology on persons lives, emerge new agents for these devices - Intelligent Personal Assistants. These agents have the goal of helping the user manage and organize his information as well as supporting the user in his/her day-to-day tasks. Moreover, other emergent concept is the Cloud Computing, which allows computation and storage to get out of the users devices, bringing benefits in terms of performance, security, interoperability and others. Connecting these three paradigms, in this work we propose an architecture for an intelligent system which provides an interface that assists the user on smart environments, informing, suggesting actions and allowing to manage the objects of his/her daily life.Keywords: internet of things, cloud, intelligent personal assistant, architecture
Procedia PDF Downloads 5143121 Features for Measuring Credibility on Facebook Information
Authors: Kanda Runapongsa Saikaew, Chaluemwut Noyunsan
Abstract:
Nowadays social media information, such as news, links, images, or VDOs, is shared extensively. However, the effectiveness of disseminating information through social media lacks in quality: less fact checking, more biases, and several rumors. Many researchers have investigated about credibility on Twitter, but there is no the research report about credibility information on Facebook. This paper proposes features for measuring credibility on Facebook information. We developed the system for credibility on Facebook. First, we have developed FB credibility evaluator for measuring credibility of each post by manual human’s labelling. We then collected the training data for creating a model using Support Vector Machine (SVM). Secondly, we developed a chrome extension of FB credibility for Facebook users to evaluate the credibility of each post. Based on the usage analysis of our FB credibility chrome extension, about 81% of users’ responses agree with suggested credibility automatically computed by the proposed system.Keywords: facebook, social media, credibility measurement, internet
Procedia PDF Downloads 3563120 Communication Strategies of Russian-English Asymmetric Bilinguals Given Insufficient Language Faculty
Authors: Varvara Tyurina
Abstract:
In the age of globalization Internet communication as a new format of interactions have become an integral part of our daily routine. Internet environment allows for new conditions and provides participants to a communication act with extra communication tools which can be used on Internet forums or in chat rooms. As a result communicants tend to alternate their behavior patterns in contrast to those practiced in live communication. It is not yet clear which communication strategies participants to Internet communication abide by and what determines their choices. Given the continually changing environment of a forum or a chat the behavior of a communicant can be interpreted in terms of autopoiesis theory which sees adaptation as the major tool for coexistence between the living system and its niche. Each communication act is seen as interaction between the communicant (i.e. the living system) and the overall environment of the forum (i.e. the niche) rather than one particular interlocutor. When communicating via the Internet participants are believed to aim at reaching a balance between themselves and the environment of a forum or a chat. The research focuses on unveiling the adaptation strategies employed by a communicant in particular cases and looks into the reasons they are employed. There is a correlation between language faculty of the communicants and the strategies they opt for when communicating on Internet forums and in chat rooms. The research included an experiment with a sample of Russian-English asymmetric bilinguals aged 16-25. Respondents were given two texts of equivalent contents, but of different language complexity. They had to respond to the texts as if they were making a reciprocal comment at a forum. It has been revealed that when communicants realize that their language faculty is not sufficient to understand the initial text they tend to amend their communication strategy in order to maintain the balance with the niche (remain involved in the communication). Most common strategies for responding to a difficult-to-understand text were self-presentation, veiling poor language faculty and response evasion. The research has so far focused on a very narrow aspect of correlation between language faculty and communication behavior, namely the syntactic and lexicological complexity of initial texts. It is essential to conduct a series of experiments that dwell on other characteristics of the texts to determine the range of cases when language faculty determines the choice of adaptation strategy.Keywords: adaptation, communication strategies, internet communication, verbal interaction, autopoiesis theory
Procedia PDF Downloads 3623119 The Development of E-Commerce in Mexico: An Econometric Analysis
Authors: Alma Lucero Ortiz, Mario Gomez
Abstract:
Technological advances contribute to the well-being of humanity by allowing man to perform in a more efficient way. Technology offers tangible advantages to countries with the adoption of information technologies, communication, and the Internet in all social and productive sectors. The Internet is a networking infrastructure that allows the communication of people throughout the world, exceeding the limits of time and space. Nowadays the internet has changed the way of doing business leading to a digital economy. In this way, e-commerce has emerged as a commercial transaction conducted over the Internet. For this inquiry e-commerce is seen as a source of economic growth for the country. Thereby, these research aims to answer the research question, which are the main variables that have affected the development of e-commerce in Mexico. The research includes a period of study from 1990 to 2017. This inquiry aims to get insight on how the independent variables influence the e-commerce development. The independent variables are information infrastructure construction, urbanization level, economic level, technology level, human capital level, educational level, standards of living, and price index. The results suggest that the independent variables have an impact on development of the e-commerce in Mexico. The present study is carried out in five parts. After the introduction, in the second part, a literature review about the main qualitative and quantitative studies to measure the variables subject to the study is presented. After, an empirical study is applied through time series data, and to process the data an econometric model is performed. In the fourth part, the analysis and discussion of results are presented, and finally, some conclusions are included.Keywords: digital economy, e-commerce, econometric model, economic growth, internet
Procedia PDF Downloads 2393118 Comparison of Authentication Methods in Internet of Things Technology
Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud
Abstract:
Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter. Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol
Procedia PDF Downloads 2643117 Designing Affect-Aware Virtual Worlds for Marine Education Using Legacy Internet of Things Gaming Devices: Teaching through Fisheries and Conflicts
Authors: Jonathan Bishop, Kamal Bechkoum, Frederick Bishop
Abstract:
This study proposes a framework for marine education, leveraging legacy Internet of Things (IoT) gaming devices and affect-aware technology to create immersive virtual worlds. Focused on addressing challenges in fisheries and marine conflict resolution, this approach integrates the unique capabilities of these devices to enhance learner engagement and understanding. By repurposing existing technology, we aim to deliver personalised educational experiences that adapt to users' emotional states. Preliminary results indicate significant potential in utilising these technologies to foster a deeper comprehension of marine conservation issues, promoting sustainable practices and conflict resolution skills. This interdisciplinary effort underscores the importance of innovative educational tools in environmental stewardship.Keywords: marine education, marine technology, internet of things, fisheries, conflict management
Procedia PDF Downloads 593116 Emotional Analysis for Text Search Queries on Internet
Authors: Gemma García López
Abstract:
The goal of this study is to analyze if search queries carried out in search engines such as Google, can offer emotional information about the user that performs them. Knowing the emotional state in which the Internet user is located can be a key to achieve the maximum personalization of content and the detection of worrying behaviors. For this, two studies were carried out using tools with advanced natural language processing techniques. The first study determines if a query can be classified as positive, negative or neutral, while the second study extracts emotional content from words and applies the categorical and dimensional models for the representation of emotions. In addition, we use search queries in Spanish and English to establish similarities and differences between two languages. The results revealed that text search queries performed by users on the Internet can be classified emotionally. This allows us to better understand the emotional state of the user at the time of the search, which could involve adapting the technology and personalizing the responses to different emotional states.Keywords: emotion classification, text search queries, emotional analysis, sentiment analysis in text, natural language processing
Procedia PDF Downloads 1413115 Mistakes in Translation Causing Translation Problems for Undergraduate Students in Thailand
Authors: Benjawan Tipprachaban
Abstract:
This research aims to investigate mistakes in translation, particularly from Thai to English, which cause translation problems for undergraduate students in Thailand. The researcher had the non-English major students of Suratthani Rajabhat University as samples. The data were collected by having 27 non-English major students translate 50 Thai sentences into English. After the translation, lots of mistakes were found and the researcher categorized them into 3 main types which were the grammatical mistake, the usage mistake, and the spelling mistake. However, this research is currently in the process of analyzing the data and shall be completed in August. The researcher, nevertheless, predicts that, of all the mistakes, the grammatical mistake will principally be made, the usage mistake and the spelling one respectively, which will support the researcher’s hypothesizes, i.e. 1) the grammatical mistake, mainly caused by language transfer, essentially leads to considerable translation problems; 2) the usage mistake is another critical problem that causes translation problems; 3) basic knowledge in Thai to English translation of undergraduate students in Thailand is at low level.Keywords: English, language, Thai, translation
Procedia PDF Downloads 4583114 The Audience’s Satisfaction through Radio Channel Broadcasting of Suan Sunandha Rajabhat University
Authors: Piyakarn Apichaikul, Thep Muanfoo
Abstract:
This research study aimed to survey the audience’s satisfaction of the radio channel broadcasting of Suan Sunandha Rajabhat University and to investigate the relationship between the satisfaction and the usage of the listeners to the news program. The study was a quantitative research using a survey research method and a cross-sectional description study to examine the satisfaction and the usage of the listeners. The instrument of the research was questionnaires which were delivered to 300 respondents by simple random sampling. For the analytical part, descriptive statistics and inferential statistic were used in this research. The result found that respondents agreed that they were satisfied with the news program (mean = 3.60). Moreover, respondents agreed that they used information from the news program in their daily life (mean = 3.47). However, the relationship between the satisfaction and the usage of the respondents were contrary.Keywords: news program, radio channel broadcasting, Suan Sunandha Rajabhat University, audience satisfaction
Procedia PDF Downloads 2513113 Calculate Product Carbon Footprint through the Internet of Things from Network Science
Authors: Jing Zhang
Abstract:
To reduce the carbon footprint of mankind and become more sustainable is one of the major challenges in our era. Internet of Things (IoT) mainly resolves three problems: Things to Things (T2T), Human to Things, H2T), and Human to Human (H2H). Borrowing the classification of IoT, we can find carbon prints of industries also can be divided in these three ways. Therefore, monitoring the routes of generation and circulation of products may help calculate product carbon print. This paper does not consider any technique used by IoT itself, but the ideas of it look at the connection of products. Carbon prints are like a gene or mark of a product from raw materials to the final products, which never leave the products. The contribution of this paper is to combine the characteristics of IoT and the methodology of network science to find a way to calculate the product's carbon footprint. Life cycle assessment, LCA is a traditional and main tool to calculate the carbon print of products. LCA is a traditional but main tool, which includes three kinds.Keywords: product carbon footprint, Internet of Things, network science, life cycle assessment
Procedia PDF Downloads 1163112 Receptiveness of Market Segmentation Towards Online Shopping Attitude: A Quality Management Strategy for Online Passenger Car Market
Authors: Noor Hasmini Abdghani, Nik Kamariah Nikmat, Nor Hayati Ahmad
Abstract:
Rapid growth of the internet technology led to changes in the consumer lifestyles. This involved customer buying behaviour-based internet that create new kind of buying strategy. Hence, it has summoned many of world firms including Malaysia to generate new quality strategy in preparation to face new customer buying lifestyles. Particularly, this study focused on identifying online customer segment of automobile passenger car customers. Secondly, the objective is to understand online customer’s receptiveness towards internet technologies. This study distributed 700 questionnaires whereby 582 were returned representing 83% response rate. The data were analysed using factor and regression analyses. The result from the factor analysis precipitates four online passenger car segmentations in Malaysia, which are: Segment (1)- Automobile Online shopping Preferences, Segment (2)- Automobile Online Brand Comparison, Segment (3)- Automobile Online Information Seeking and Segment (4)- Automobile Offline Shopping Preferences. In understanding the online customer’s receptiveness towards internet, the regression result shows that there is significant relationship between each of four segments of online passenger car customer with attitude towards automobile online shopping. This implies that, for online customers to have receptiveness toward internet technologies, he or she must have preferences toward online shopping or at least prefer to browse any related information online even if the actual purchase is made at the traditional store. With this proposed segmentation strategy, the firms especially the automobile firms will be able to understand their online customer behavior. At least, the proposed segmentation strategy will help the firms to strategize quality management approach for their online customers’ buying decision making.Keywords: Automobile, Market Segmentation, Online Shopping Attitude, Quality Management Strategy
Procedia PDF Downloads 5403111 Commentary on Successful and Emerging Bullying Control Programs: A Comparison between Eighteen Bullying Interventions Applied Worldwide
Authors: Sohni Siddiqui, Anja Schultze-Krumbholz
Abstract:
Our lives now revolve more around online-related tasks, as the internet has become a necessity. One of the disturbance concerns with high internet usage is the multiplication of cyber-associated risky behaviors such as cyber aggression and/or cyberbullying. Cyber Bullying is an emerging issue that needs immediate attention from many stakeholders such as parents, doctors, school administrators, policymakers, researchers, and others, especially in the COVID-19 pandemic when online learning has been adopted as an instructional strategy, and there is a continuous rise in cyberbullying cases. The aim of the article is to review existing successful and emerging interventions designed to control bullying and cyberbullying by engaging individuals through teachers’ professional development and adopting a whole-school approach. The study identified the strengths and limitations of the programs and suggested improvements to existing interventions. Preparing interventions with a strong theoretical framework, integrating applications of emerging theories in interventions, promoting proactive and reactive strategies in combination, beginning with the baseline needs assessment surveys, reducing digital time and digital divide among parents and children, promoting the concept of lead trainer, peer trainer, and hot spots, focusing on physical activities, use of landmarks are some of the recommendations proposed by authors. In addition to face-to-face intervention, the researchers recommend updating and improving previous intervention programs with games and apps. Especially in the time of pandemic crises, when face-to-face interactions are limited and cyberbullying is triggered, the use of apps, web-based interventions, and games can be an effective way to control electronic perpetration and victimization.Keywords: anti bullying programs, cyber bullying, individualized trainings, teachers’ professional development, whole school interventions
Procedia PDF Downloads 1503110 Water's Role in Creating a Sense of Belonging
Authors: Narges Nejati
Abstract:
Nowadays as science hasten toward technology, only quantity of construction noticed and there is a little attention toward quality of construction and there is no usage for element which was prevalent in traditional architecture. This is the cause of this issue that nowadays we see building that most of them just keep you from heat and cold of outside environment and there is no trace of any culture of their country or nation in it. And although we know that man is a creature that adores beauty by his nature, but this spiritual need of him is ignored. And designers by taking an enormous price instead of planning (spiritual designing) to release peace, they attend to planning which make a human soul bothered and ill. The present research is trying to illustrate price of concepts and principles of water usage as one of the elements of nature and also shows the water application in some of the Iranian constructions and the results show the motif of using water in constructions and also some benefits of using it in constructions. And also this matter can causes a reconnection between nature and constructing of a beautiful environment which is consonant and proportional with man’ physical, spiritual and cultural needs. And causes peace and comfort of men. A construction which man feels a friendly atmosphere in them which he has a sense of belonging to them not a construction which arouses feeling of weariness and fatigue.Keywords: water usage, belonging, sustainable architecture, urban design
Procedia PDF Downloads 3843109 Implications on Informed Consent of Information Available to Patients on the Internet Regarding Hip and Knee Osteoarthritis
Authors: R. W. Walker, J. M. Lynch, K. Anderson, R. G. Middleton
Abstract:
Hip and knee arthritis are two of the commonest conditions that result in elective orthopaedic outpatient referral. At clinic appointments advice given regarding lifestyle modifications or treatment options may not be fully understood by patients. The majority of patients now use the internet to research their condition and use this to inform their decision about treatments. This study assessed the quality of patient information regarding hip and knee arthritis. To assess the quality of patient information regarding knee and hip arthritis available on the internet. Two internet searches were carried out one month apart using the search terms “knee arthritis” and “hip arthritis” on Google, a search engine that accounts for over 90% or internet searches in the UK. Sites were evaluated using the DISCERN instrument, a validated tool for measuring the quality of consumer health information. The first 50 results for each search were analysed by two different observers and discrepancies in scores were reviewed by both observers together and a score was agreed upon. In total 200 search result websites were assessed, of which 84 fulfilled the inclusion criteria. 53% (n=44) were funded directly by commercial healthcare businesses and of these, 70% (n=31) were funded by a surgeon/hospital promoting end-user purchase of surgical intervention. Overall 35% (n=29) websites were “for-profit” information websites where funding was from advertising revenues from pharmaceutical and prosthesis companies. 81% (n=67) offered information about surgical treatments however only 43% (n=36) mentioned the risk of complications of surgery. 67% (n=56) did not have any reference to sources for the information they detailed and 57% (n=47) had no apparent date for the production of the information they offered. Overall 17% (n=14) of websites were judged as being of high quality, with 29% (n=24) being of moderate quality and 54% (n=45) being of low quality. The quality of health information regarding hip and knee arthritis on the internet is highly variable and the majority of websites assessed were of poor quality. A preponderance of websites were funded by a commercial surgical service offering athroplasty at consumer cost, with a further third being funded indirectly via advertising revenues from commercial businesses. The vast majority of websites only mentioned surgery as a treatment and nearly half of all websites did not mention the risks or complications of surgical intervention at all. This has implications for the consent process. As such, Clinicians should be aware of the heterogeneous nature of patient information on the internet and be prepared to advise their patients about good quality websites where further reliable information can be sought.Keywords: hip osteoarthritis, informed consent, knee osteoarthritis, patient information
Procedia PDF Downloads 933108 A Self-Built Corpus-Based Study of Four-Word Lexical Bundles in Native English Teachers’ EFL Classroom Discourse in Northeast China: The Significance of Stance
Authors: Fang Tan
Abstract:
This research focuses on the appropriate use of lexical bundles in spoken discourse, particularly in English as a Foreign Language (EFL) classrooms in Northeast China. While previous studies have mainly examined lexical bundles in written discourse, there is a need to investigate their usage in spoken discourse due to the limited availability of spoken discourse corpora. English teachers’ use of lexical bundles is crucial for effective teaching and communication in the EFL classroom. The aim of this study is to investigate the functions of four-word lexical bundles in native English teachers’ EFL oral English classes in Northeast China. Specifically, the research focuses on the usage of stance bundles, which were found to be the most significant type of bundle in the analyzed corpus. By comparing the self-built university spoken English classroom discourse corpus with the other self-built university English for General Purposes (EGP) corpus, the study aims to highlight the difference in bundle usage between native and non-native teachers in EFL classrooms. The research employs a corpus-based study. The observed corpus consists of more than 300,000 tokens, in which the data has been collected in the past five years. The reference corpus is composed of over 800,000 tokens, in which the data has been collected over 12 years. All the primary data collection involved transcribing and annotating spoken English classes taught by native English teachers. The analysis procedures included identifying and categorizing four-word lexical bundles, with specific emphasis on stance bundles. Frequency counts, and comparisons with the Chinese English teachers’ corpus were conducted to identify patterns and differences in bundle usage. The research addresses the following questions: 1) What are the functions of four-word lexical bundles in native English teachers’ EFL oral English classes? 2) How do stance bundles differ in usage between native and non-native English teachers’ classes? 3) What implications can be drawn for English teachers’ professional development based on the findings? In conclusion, this study provides valuable insights into the usage of four-word lexical bundles, particularly stance bundles, in native English teachers’ EFL oral English classes in Northeast China. The research highlights the difference in bundle usage between native and non-native English teachers’ classes and provides implications for English teachers’ professional development. The findings contribute to the understanding of lexical bundle usage in EFL classroom discourse and have theoretical importance for language teaching methodologies. The self-built university English classroom discourse corpus used in this research is a valuable resource for future studies in this field.Keywords: EFL classroom discourse, four-word lexical bundles, stance, implication
Procedia PDF Downloads 65