Search results for: online communication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6225

Search results for: online communication

3015 African Traders Beyond China: Delving Into Their Entrepreneurial Activities Following COVID-19

Authors: Phillip Thebe

Abstract:

African traders in China have generated magnanimous attention from scholars because of their choices to take short-term trips to Guangzhou and other places in search of cheaper products taking advantage of the status of China as a "global manufacturing hub". Nevertheless, their activities only gained traction at the turn of the millennium, with their presence in China incrementally dwindling over the next two decades. Now, with the devastating effects of COVID-19, their journeys have had to be totally cut short by unending lockdowns and stiff migration rules due to China's zero-tolerance of COVID-19 policy. This unfortunate yet untimely occurrence has left many scholars wondering if this marks the end of African traders in China and, indeed, the end of their business careers. Between March and September 2022, 20 traders were followed back to Africa, Zimbabwe, to find out what they are doing after having been shut out of China. Data was collected through ethnographic immersion and purposive in-depth interviewing in and around the city of Bulawayo. Snowballing was employed to reach out to the traders until a saturation point was reached and interview transcripts were filed for analysis. The findings revealed that some still trading online in China, report different opinions and feelings about doing business during COVID-19. Others have left the Chinese marketplace, now pursuing European industries in Turkey and other places. Others are still getting Chinese goods but in African countries such as Tanzania, Mozambique, South Africa, and Botswana. Some are now into the second-hand clothing trade, whereas others have stopped doing business to pursue other life-course interests. These and other issues are addressed in this paper from the anthropology of migration and globalization perspectives.

Keywords: entrepreneurship, African traders, China, COVID-19, Africans in China

Procedia PDF Downloads 78
3014 First Year Experience of International Students in Malaysian Universities

Authors: Nur Hidayah Iwani Mohd Kamal

Abstract:

The higher education institutions in Malaysia is challenged with a more socially and culturally diverse student population than ever before, especially with the increasing number of international students studying in Malaysia in the recent years. First year university is a critical time in students’ lives. Students are not only developing intelectually, they are also establishing and maintaining personal relationships, developing an identity, deciding about career and lifestyle, maintaining personal health and wellness, and developing an integrated philosohy of life. The higher education institutions work as a diverse community of learners to provide a supportive environment for these first year students in assisting them in their transition from high school to university. Although many universities are taking steps to improve the first year experience for their new local and international students, efforts must be taken to ensure organized and coordinated manner in order for the initiatives to be successful. The objectives of the study are to examine the international students’ perceptions and interpretation of their first year experiences in shaping and determining their attitudes toward study and the quality of their entire undergraduate academic career; and identify an appropriate mechanism to encounter the international students’ adjustment in the new environment in order to facilitate cross-functional communication and create a coherent and meaningful first year experience. A key construct in this study is that if universities wish to recruiting and retaining international students, it is their ethical responsibility to determine how they can best meet their needs at the academic and social level, create a supportive ‘learning community’ as a foundation of their educational experience, hence facilitate cross-cultural communication and create a coherent and meaningful first year experience. This study is simultaneously frames in relation to focus on the factors that influence a successful and satisfying transition to university life by the first year international students. The study employs a mixed-method data collection involving semi-structured interviews, questionnaire, classroom observation and document analysis. This study provides valuable insight into the struggles that many international students face as they attempt to make the adjustment not only to a new educational system but factors such as psychosocial and cultural problems. It would discuss some of the factors that impact the international students during their first year in university in their quest to be academically successful. It concludes with some recommendations on how Malaysian universities provide these students with a good first year experience based on some the best practices of universities around the world.

Keywords: first year experience, Malaysian universities, international students, education

Procedia PDF Downloads 271
3013 The Impact of Corporate Social Responsibilities on Employees’ Green Behavior: The Moderating Role of Organizational Trust

Authors: Zubair Ahmad

Abstract:

Drawing from social exchange theory, this study proposes to explore the association between corporate social responsibility as external CSR and Internal CSR with employees' green behavior. Furthermore, the author also analyzed the moderating role of organizational trust among the aforementioned associations. The target respondents for this descriptive study were employees working hotel industry of Pakistan. An online questionnaire link was sent to hotel managers and is requested to share the questionnaire link with employees. The respondents for this study were selected through the convenience sampling technique. The collected data from participants is analyzed through AMOS and SPSS. The findings show that both internal corporate social responsibility and external corporate social responsibility exert a positive and significant influence on employees' green behavior. Thus it is concluded that the key driver behind the green behavior of hotel employees is the social setting of their workplace. Findings also revealed that organizational trust plays a positive role in enhancing the green behavior of hotel employees. This study extends the literature on corporate social responsibility by exploring the boundary role of organizational trust between internal and external corporate social responsibility and employees' green behavior in hotels. Moreover, CSR activities should be performed for attaining a competitive edge and maintaining a balance between progress and sustainability of the environment.

Keywords: corporate social responsibility, internal corporate social responsibility, external corporate social responsibility, social exchange theory, employee green behavior, organizational trust

Procedia PDF Downloads 93
3012 Development of Configuration Software of Space Environment Simulator Control System Based on Linux

Authors: Zhan Haiyang, Zhang Lei, Ning Juan

Abstract:

This paper presents a configuration software solution in Linux, which is used for the control of space environment simulator. After introducing the structure and basic principle, it is said that the developing of QT software frame and the dynamic data exchanging between PLC and computer. The OPC driver in Linux is also developed. This driver realizes many-to-many communication between hardware devices and SCADA software. Moreover, an algorithm named “Scan PRI” is put forward. This algorithm is much more optimizable and efficient compared with "Scan in sequence" in Windows. This software has been used in practical project. It has a good control effect and can achieve the expected goal.

Keywords: Linux OS, configuration software, OPC Server driver, MYSQL database

Procedia PDF Downloads 272
3011 A Middleware Management System with Supporting Holonic Modules for Reconfigurable Management System

Authors: Roscoe McLean, Jared Padayachee, Glen Bright

Abstract:

There is currently a gap in the technology covering the rapid establishment of control after a reconfiguration in a Reconfigurable Manufacturing System. This gap involves the detection of the factory floor state and the communication link between the factory floor and the high-level software. In this paper, a thin, hardware-supported Middleware Management System (MMS) is proposed and its design and implementation are discussed. The research found that a cost-effective localization technique can be combined with intelligent software to speed up the ramp-up of a reconfigured system. The MMS makes the process more intelligent, more efficient and less time-consuming, thus supporting the industrial implementation of the RMS paradigm.

Keywords: intelligent systems, middleware, reconfigurable manufacturing, management system

Procedia PDF Downloads 661
3010 Still a Man’s World? Rape Myth Acceptance, Attitudes Towards Women and Traditional Male Gender Role Beliefs in a Sample of British Military Veterans

Authors: Jessica Beck

Abstract:

Despite efforts to address the issue through prevention and education, sexual assault remains an issue within the military. Rape supportive beliefs have been identified as a risk factor linked to sexually aggressive and coercive behaviours. Rape myth acceptance is part of a wider cognitive framework of attitudes which perpetuate negative sociocultural norms about the male role. Notwithstanding the established links between rape myth acceptance, attitudinal variables, and rape proclivity, relatively little research has been conducted with military samples. In this study, 151 British military veterans completed an online survey measuring their rape myth acceptance, attitudes towards women, belief in male role norms and basic personality traits. Consistent with previous research, male veterans had higher levels of rape myth acceptance, more negative attitudes towards women, and subscribed to more traditional notions of masculinity. The types of myths endorsed also varied by gender, with male veterans significantly more likely to blame rape victims or believe women regularly lie about being raped. A relationship between rape myth acceptance, negative attitudes towards women, and adherence to male norms was found, which explained a significant proportion of the variance in rape myth acceptance. Implications for sexual assault prevention programmes are discussed.

Keywords: rape myths, rape myth acceptance, military sexual assault, sexual assault beliefs

Procedia PDF Downloads 74
3009 Attitudes to Thinking and Learning in Sustainability Education: Case Basics of Natural Stone Industry in Circular Economy

Authors: Anne-Marie Tuomala

Abstract:

Education for sustainable development (ESD) aims to provide students with the attitudes, values, and behaviors necessary for the contribution to sustainability. The research was implemented as a part of the Horizons Europe research project, where each partner organization had at least one pilot project locally. The pilot in question was an online course about the basics of the natural stone industry in Finland and its sustainability and circular economy aspects. The course was open to all students of applied universities in Finland, and it was implemented twice during the research. The Stone from Finland association participated in the course design, and it was also an expert in the local context and real-life provider. The multiple case-study method was chosen, as it enables purposeful sampling of cases that are tailored to the specific study. It was also assumed that it predicts quite comparable results of two different course implementations of the course with the same topic and content. The Curtin University of Technology’s Attitudes Towards Thinking and Learning Survey was adapted. The results show the importance of the trans-disciplinary nature of sustainability education. In addition, the new industry areas with the general - but also industry-specific sustainability issues - must be introduced to students and encourage them to do critically reflective learning. Surveys that guide them to analyze their own attitudes to thinking and learning may expose students to their weaknesses but also result in forms of more active sustainability interaction.

Keywords: education for sustainable development, learning attitudes, learning of circular economy, virtual learning

Procedia PDF Downloads 17
3008 Real-Time Aerial Marine Surveillance System for Safe Navigation

Authors: Vinesh Thiruchelvam, Umar Mumtaz Chowdry, Sathish Kumar Selvaperumal

Abstract:

The prime purpose of the project is to provide a sophisticated system for surveillance specialized for the Port Authorities in the Maritime Industry. The current aerial surveillance does not have a wide dimensioning view. The channels of communication is shared and not exclusive allowing for communications errors or disturbance mainly due to traffic. The scope is to analyze the various aspects as real-time aerial and marine surveillance is one of the most important methods which could ensure the domain security of the sailors. The system will improve real time data as obtained for the controller base station. The key implementation will be based on camera speed, angle and adherence to a sustainable power utilization module.

Keywords: SMS, real time, GUI, maritime industry

Procedia PDF Downloads 476
3007 Apollo Clinical Excellence Scorecard (ACE@25): An Initiative to Drive Quality Improvement in Hospitals

Authors: Anupam Sibal

Abstract:

Whatever is measured tends to improve. With a view to objectively measuring and improving clinical quality across the Apollo Group Hospitals, the initiative of ACE @ 25 (Apollo Clinical Excellence@25) was launched on Jan 09. ACE @ 25 is a clinically balanced scorecard incorporating 25 clinical quality parameters involving complication rates, mortality rates, one-year survival rates and average length of stay after major procedures like liver and renal transplant, CABG, TKR, THR, TURP, PTCA, endoscopy, large bowel resection and MRM covering all major specialties. Also included are hospital acquired infection rates, pain satisfaction and medication errors. Benchmarks have been chosen from the world’s best hospitals. There are weighted scores for outcomes color coded green, orange and red. The cumulative score is 100. Data is reported monthly by 43 Group Hospitals online on the Lighthouse platform. Action taken reports for parameters falling in red are submitted quarterly and reviewed by the board. An audit team audits the data at all locations every six months. Scores are linked to appraisal of the medical head and there is an “ACE @ 25” Champion Award for the highest scorer. Scores for different parameters were variable from green to red at the start of the initiative. Most hospitals showed an improvement in scores over the last four years for parameters where they had showed scores in red or orange at the start of the initiative. The overall scores for the group have shown an increase from 72 in 2010 to 81 in 2015.

Keywords: benchmarks, clinical quality, lighthouse, platform, scores

Procedia PDF Downloads 284
3006 Human Trafficking In North East India

Authors: Neimenuo Kengurusie

Abstract:

Human trafficking is considered a form of slavery in modern day era and a gross violation of human rights and one of the most organized crimes of the day transcending cultures, geography and time. Human trafficking is a highly complex phenomenon involving many actors like victims, survivors, their families, communities and third parties that recruit, transport and exploit the trafficked victims. It takes different forms such as child trafficking, trafficking for labour, trafficking for sexual exploitation, trafficking for organ transplantation etc. and affects virtually every corner of the world. This research draws on a variety of sources, including books, articles, journals, newspaper reports, human rights reports, online materials and interviews. In India, particularly the North East region, the issue of human trafficking has become a concern regionally, nationally and internationally. The focus of this paper is on the North Eastern part of India as it is a socially and economically backward region of the country which makes women and children susceptible to trafficking. Women and children from these regions are trafficked within and outside the state. Therefore, the paper seeks to explore the issue of human trafficking, especially trafficking of women and children in North East India, which receives insufficient attention in literature. The paper seeks to analyze and understand the trend and patterns of trafficking and the mechanisms that reinforces the process and perpetuates the phenomenon of trafficking considering the nature and scope of the problem. The paper also analyzes the anti-trafficking laws initiated by India and the North East states in particular for combating human trafficking in North East India.

Keywords: children, human trafficking, North East India, women

Procedia PDF Downloads 475
3005 The Effective Use of the Network in the Distributed Storage

Authors: Mamouni Mohammed Dhiya Eddine

Abstract:

This work aims at studying the exploitation of high-speed networks of clusters for distributed storage. Parallel applications running on clusters require both high-performance communications between nodes and efficient access to the storage system. Many studies on network technologies led to the design of dedicated architectures for clusters with very fast communications between computing nodes. Efficient distributed storage in clusters has been essentially developed by adding parallelization mechanisms so that the server(s) may sustain an increased workload. In this work, we propose to improve the performance of distributed storage systems in clusters by efficiently using the underlying high-performance network to access distant storage systems. The main question we are addressing is: do high-speed networks of clusters fit the requirements of a transparent, efficient and high-performance access to remote storage? We show that storage requirements are very different from those of parallel computation. High-speed networks of clusters were designed to optimize communications between different nodes of a parallel application. We study their utilization in a very different context, storage in clusters, where client-server models are generally used to access remote storage (for instance NFS, PVFS or LUSTRE). Our experimental study based on the usage of the GM programming interface of MYRINET high-speed networks for distributed storage raised several interesting problems. Firstly, the specific memory utilization in the storage access system layers does not easily fit the traditional memory model of high-speed networks. Secondly, client-server models that are used for distributed storage have specific requirements on message control and event processing, which are not handled by existing interfaces. We propose different solutions to solve communication control problems at the filesystem level. We show that a modification of the network programming interface is required. Data transfer issues need an adaptation of the operating system. We detail several propositions for network programming interfaces which make their utilization easier in the context of distributed storage. The integration of a flexible processing of data transfer in the new programming interface MYRINET/MX is finally presented. Performance evaluations show that its usage in the context of both storage and other types of applications is easy and efficient.

Keywords: distributed storage, remote file access, cluster, high-speed network, MYRINET, zero-copy, memory registration, communication control, event notification, application programming interface

Procedia PDF Downloads 205
3004 Identifying Project Delay Factors in the Australian Construction Industry

Authors: Syed Sohaib Bin Hasib, Hiyam Al-Kilidar

Abstract:

Meeting project deadlines is a major challenge for most construction projects. In this study, perceptions of contractors, clients, and consultants are compared relative to a list of factors derived from the review of the extant literature on project delay. 59 causes (categorized into 8 groups) of project delays were identified from the literature. A survey was devised to get insights and ranking of these factors from clients, consultants & contractors in the Australian construction industry. Findings showed that project delays in the Australian construction industry are mainly the result of skill shortages, interference in execution, and poor coordination and communication between the project stakeholders.

Keywords: construction, delay factors, time delay, australian construction industry

Procedia PDF Downloads 162
3003 Multimodal Database of Retina Images for Africa: The First Open Access Digital Repository for Retina Images in Sub Saharan Africa

Authors: Simon Arunga, Teddy Kwaga, Rita Kageni, Michael Gichangi, Nyawira Mwangi, Fred Kagwa, Rogers Mwavu, Amos Baryashaba, Luis F. Nakayama, Katharine Morley, Michael Morley, Leo A. Celi, Jessica Haberer, Celestino Obua

Abstract:

Purpose: The main aim for creating the Multimodal Database of Retinal Images for Africa (MoDRIA) was to provide a publicly available repository of retinal images for responsible researchers to conduct algorithm development in a bid to curb the challenges of ophthalmic artificial intelligence (AI) in Africa. Methods: Data and retina images were ethically sourced from sites in Uganda and Kenya. Data on medical history, visual acuity, ocular examination, blood pressure, and blood sugar were collected. Retina images were captured using fundus cameras (Foru3-nethra and Canon CR-Mark-1). Images were stored on a secure online database. Results: The database consists of 7,859 retinal images in portable network graphics format from 1,988 participants. Images from patients with human immunodeficiency virus were 18.9%, 18.2% of images were from hypertensive patients, 12.8% from diabetic patients, and the rest from normal’ participants. Conclusion: Publicly available data repositories are a valuable asset in the development of AI technology. Therefore, is a need for the expansion of MoDRIA so as to provide larger datasets that are more representative of Sub-Saharan data.

Keywords: retina images, MoDRIA, image repository, African database

Procedia PDF Downloads 104
3002 Comparing Breast Cancer Risk and the Risk Factors between Heterosexual Women and Sexual Minority Women in Taiwan: A Preliminary Result

Authors: Ya-Ching Wang, Yi-Maun Subeq

Abstract:

Background: There is a lack of evidence to understand differences in risk for developing breast cancer between sexual minority women and heterosexual women in Taiwan. The purpose of this study is to compare differences in risk for developing breast cancer between the two groups of Taiwanese women. Methods: An online cross-sectional survey was used to collect data. A total of 238 Taiwanese women (mean age 30.69 years old, SD=8.231, range 20-60) were recruited between December 2016 and February 2017, including 115 heterosexual women and 123 sexual minority women. Results: There were no significant differences between heterosexual women and sexual minority women in body mass index, history of non-malignant breast disease, age at menarche and menopause, use of hormone replacement therapy, use of hormone replacement therapy, nor the prevalence of breast cancer. The sexual minority women had higher rates of current drinking, smoking and using breast-bindings and also reported exercise more a week; the heterosexual women had higher rates of pregnancy, children, breastfeed, miscarriages, abortion and use of birth control pills. Discussion/Conclusion: There were significant differences between heterosexual women and sexual minority women in reproductive factors and behavioral risk factors for the development of breast cancer. In particular, the finding that the sexual minority women had higher rate of using breast-bindings (56.6%) than the heterosexual women (4.7%) should be further explore, in order to understand whether long-term breast compression is associated with the development of breast cancer.

Keywords: breast cancer, risk, sexual orientation, Taiwan

Procedia PDF Downloads 352
3001 Enabling UDP Multicast in Cloud IaaS: An Enterprise Use Case

Authors: Patrick J. Kerpan, Ryan C. Koop, Margaret M. Walker, Chris P. Swan

Abstract:

The User Datagram Protocol (UDP) multicast is a vital part of data center networking that is being left out of major cloud computing providers' network infrastructure. Enterprise users rely on multicast, and particularly UDP multicast to create and connect vital business operations. For example, UPD makes a variety of business functions possible from simultaneous content media updates, High-Performance Computing (HPC) grids, and video call routing for massive open online courses (MOOCs). Essentially, UDP multicast's technological slight is causing a huge effect on whether companies choose to use (or not to use) public cloud infrastructure as a service (IaaS). Allowing the ‘chatty’ UDP multicast protocol inside a cloud network could have a serious impact on the performance of the cloud as a whole. Cloud IaaS providers solve the issue by disallowing all UDP multicast. But what about enterprise use cases for multicast applications in organizations that want to move to the cloud? To re-allow multicast traffic, enterprises can build a layer 3 - 7 network over the top of a data center, private cloud, or public cloud. An overlay network simply creates a private, sealed network on top of the existing network. Overlays give complete control of the network back to enterprise cloud users the freedom to manage their network beyond the control of the cloud provider’s firewall conditions. The same logic applies if for users who wish to use IPsec or BGP network protocols inside or connected into an overlay network in cloud IaaS.

Keywords: cloud computing, protocols, UDP multicast, virtualization

Procedia PDF Downloads 575
3000 Subjectivity in Miracle Aesthetic Clinic Ambient Media Advertisement

Authors: Wegig Muwonugroho

Abstract:

Subjectivity in advertisement is a ‘power’ possessed by advertisements to construct trend, concept, truth, and ideology through subconscious mind. Advertisements, in performing their functions as message conveyors, use such visual representation to inspire what’s ideal to the people. Ambient media is advertising medium making the best use of the environment where the advertisement is located. Miracle Aesthetic Clinic (Miracle) popularizes the visual representation of its ambient media advertisement through the omission of face-image of both female mannequins that function as its ambient media models. Usually, the face of a model in advertisement is an image commodity having selling values; however, the faces of ambient media models in Miracle advertisement campaign are suppressed over the table and wall. This face concealing aspect creates not only a paradox of subjectivity but also plurality of meaning. This research applies critical discourse analysis method to analyze subjectivity in obtaining the insight of ambient media’s meaning. First, in the stage of textual analysis, the embedding attributes upon female mannequins imply that the models are denoted as the representation of modern women, which are identical with the identities of their social milieus. The communication signs aimed to be constructed are the women who lose their subjectivities and ‘feel embarrassed’ to flaunt their faces to the public because of pimples on their faces. Second, in the stage of analysis of discourse practice, it points out that ambient media as communication media has been comprehensively responded by the targeted audiences. Ambient media has a role as an actor because of its eyes-catching setting, and taking space over the area where the public are wandering around. Indeed, when the public realize that the ambient media models are motionless -unlike human- stronger relation then appears, marked by several responses from targeted audiences. Third, in the stage of analysis of social practice, soap operas and celebrity gossip shows on the television become a dominant discourse influencing advertisement meaning. The subjectivity of Miracle Advertisement corners women by the absence of women participation in public space, the representation of women in isolation, and the portrayal of women as an anxious person in the social rank when their faces suffered from pimples. The Ambient media as the advertisement campaign of Miracle is quite success in constructing a new trend discourse of face beauty that is not limited on benchmarks of common beauty virtues, but the idea of beauty can be presented by ‘when woman doesn’t look good’ visualization.

Keywords: ambient media, advertisement, subjectivity, power

Procedia PDF Downloads 303
2999 Developing Cultural Competence as Part of Nursing Studies: Language, Customs and Health Issues

Authors: Mohammad Khatib, Salam Hadid

Abstract:

Introduction: Developing nurses' cultural competence begins in their basic training and requires them to participate in an array of activities which raise their awareness and stimulate their interest, desire and curiosity about different cultures, by creating opportunities for intercultural meetings promoting the concept of 'culture' and its components, including recognition of cultural diversity and the legitimacy of the other. Importantly, professionals need to acquire specific cultural knowledge and thorough understanding of the values, norms, customs, beliefs and symbols of different cultures. Similarly, they need to be given opportunities to practice the verbal and non-verbal communication skills of other cultures according to their cultural codes. Such a system is being implemented as part of nursing studies at Zefat Academic College in two study frameworks; firstly, a course integrating nursing theory and practice in multicultural nursing; secondly, a course in learning the languages spoken in Israel focusing on medical and nursing terminology. Methods: Students participating in the 'Transcultural Nursing' course come from a variety of backgrounds: Jews, or Arabs, religious, or secular; Muslim, Christian, new immigrants, Ethiopians or from other cultural affiliations. They are required to present and discuss cultural practices that affect health. In addition, as part of the language course, students learn and teach their friends 5 spoken languages (Arabic, Russian, Amharian, Yidish, and Sign language) focusing on therapeutic interaction and communication using the vocabulary and concepts necessary for the therapeutic encounter. An evaluation of the process and the results was done using a structured questionnaire which includes series of questions relating to the contributions of the courses to their cultural knowledge, awareness and skills. 155 students completed the questionnaire. Results: A preliminary assessment of this educational system points an increase in cultural awareness and knowledge among the students as well as in their willingness to recognize the other's difference. A positive atmosphere of multiculturalism is reflected in students' mutual interest and respect was created. Students showed a deep understanding of cultural issues relating to health and care (consanguinity and genetics, food customs; cultural events, reincarnation, traditional treatments etc.). Most of the students were willing to recommend the courses to others and suggest some changes relating learning methods (more simulations, role playing and activities).

Keywords: cultural competence, nursing education, culture, language

Procedia PDF Downloads 259
2998 Spatial Information and Urbanizing Futures

Authors: Mohammad Talei, Neda Ranjbar Nosheri, Reza Kazemi Gorzadini

Abstract:

Today municipalities are searching for the new tools for increasing the public participation in different levels of urban planning. This approach of urban planning involves the community in planning process using participatory approaches instead of the long traditional top-down planning methods. These tools can be used to obtain the particular problems of urban furniture form the residents’ point of view. One of the tools that is designed with this goal is public participation GIS (PPGIS) that enables citizen to record and following up their feeling and spatial knowledge regarding main problems of the city, specifically urban furniture, in the form of maps. However, despite the good intentions of PPGIS, its practical implementation in developing countries faces many problems including the lack of basic supporting infrastructure and services and unavailability of sophisticated public participatory models. In this research we develop a PPGIS using of Web 2 to collect voluntary geodataand to perform spatial analysis based on Spatial OnLine Analytical Processing (SOLAP) and Spatial Data Mining (SDM). These tools provide urban planners with proper informationregarding the type, spatial distribution and the clusters of reported problems. This system is implemented in a case study area in Tehran, Iran and the challenges to make it applicable and its potential for real urban planning have been evaluated. It helps decision makers to better understand, plan and allocate scarce resources for providing most requested urban furniture.

Keywords: PPGIS, spatial information, urbanizing futures, urban planning

Procedia PDF Downloads 709
2997 A Fuzzy Control System for Reducing Urban Stormwater Runoff by a Stormwater Storage Tank

Authors: Pingping Zhang, Yanpeng Cai, Jianlong Wang

Abstract:

Stormwater storage tank (SST) is a popular low impact development technology for reducing stormwater runoff in the construction of sponge city. At present, it is difficult to perform the automatic control of SST for reducing peak flow. In this paper, fuzzy control was introduced into the peak control of SST to improve the efficiency of reducing stormwater runoff. Firstly, the design of SST was investigated. A catchment area and a return period were assumed, a SST model was manufactured, and then the storage capacity of the SST was verified. Secondly, the control parameters of the SST based on reducing stormwater runoff were analyzed, and a schematic diagram of real-time control (RTC) system based on peak control SST was established. Finally, fuzzy control system of a double input (flow and water level) and double output (inlet and outlet valve) was designed. The results showed that 1) under the different return periods (one year, three years, five years), the SST had the effect of delayed peak control and storage by increasing the detention time, 2) rainfall, pipeline flow, the influent time and the water level in the SST could be used as RTC parameters, and 3) the response curves of flow velocity and water level fluctuated very little and reached equilibrium in a short time. The combination of online monitoring and fuzzy control was feasible to control the SST automatically. This paper provides a theoretical reference for reducing stormwater runoff and improving the operation efficiency of SST.

Keywords: stormwater runoff, stormwater storage tank, real-time control, fuzzy control

Procedia PDF Downloads 185
2996 Radio Frequency Identification Encryption via Modified Two Dimensional Logistic Map

Authors: Hongmin Deng, Qionghua Wang

Abstract:

A modified two dimensional (2D) logistic map based on cross feedback control is proposed. This 2D map exhibits more random chaotic dynamical properties than the classic one dimensional (1D) logistic map in the statistical characteristics analysis. So it is utilized as the pseudo-random (PN) sequence generator, where the obtained real-valued PN sequence is quantized at first, then applied to radio frequency identification (RFID) communication system in this paper. This system is experimentally validated on a cortex-M0 development board, which shows the effectiveness in key generation, the size of key space and security. At last, further cryptanalysis is studied through the test suite in the National Institute of Standards and Technology (NIST).

Keywords: chaos encryption, logistic map, pseudo-random sequence, RFID

Procedia PDF Downloads 385
2995 Private Coded Computation of Matrix Multiplication

Authors: Malihe Aliasgari, Yousef Nejatbakhsh

Abstract:

The era of Big Data and the immensity of real-life datasets compels computation tasks to be performed in a distributed fashion, where the data is dispersed among many servers that operate in parallel. However, massive parallelization leads to computational bottlenecks due to faulty servers and stragglers. Stragglers refer to a few slow or delay-prone processors that can bottleneck the entire computation because one has to wait for all the parallel nodes to finish. The problem of straggling processors, has been well studied in the context of distributed computing. Recently, it has been pointed out that, for the important case of linear functions, it is possible to improve over repetition strategies in terms of the tradeoff between performance and latency by carrying out linear precoding of the data prior to processing. The key idea is that, by employing suitable linear codes operating over fractions of the original data, a function may be completed as soon as enough number of processors, depending on the minimum distance of the code, have completed their operations. The problem of matrix-matrix multiplication in the presence of practically big sized of data sets faced with computational and memory related difficulties, which makes such operations are carried out using distributed computing platforms. In this work, we study the problem of distributed matrix-matrix multiplication W = XY under storage constraints, i.e., when each server is allowed to store a fixed fraction of each of the matrices X and Y, which is a fundamental building of many science and engineering fields such as machine learning, image and signal processing, wireless communication, optimization. Non-secure and secure matrix multiplication are studied. We want to study the setup, in which the identity of the matrix of interest should be kept private from the workers and then obtain the recovery threshold of the colluding model, that is, the number of workers that need to complete their task before the master server can recover the product W. The problem of secure and private distributed matrix multiplication W = XY which the matrix X is confidential, while matrix Y is selected in a private manner from a library of public matrices. We present the best currently known trade-off between communication load and recovery threshold. On the other words, we design an achievable PSGPD scheme for any arbitrary privacy level by trivially concatenating a robust PIR scheme for arbitrary colluding workers and private databases and the proposed SGPD code that provides a smaller computational complexity at the workers.

Keywords: coded distributed computation, private information retrieval, secret sharing, stragglers

Procedia PDF Downloads 106
2994 Tracing the Evolution of English and Urdu Languages: A Linguistic and Cultural Analysis

Authors: Aamna Zafar

Abstract:

Through linguistic and cultural analysis, this study seeks to trace the development of the English and Urdu languages. Along with examining how the vocabulary and syntax of English and Urdu have evolved over time and the linguistic trends that may be seen in these changes, this study will also look at the historical and cultural influences that have shaped the languages throughout time. The study will also look at how English and Urdu have changed over time, both in terms of language use and communication inside each other's cultures and globally. We'll research how these changes affect social relations and cultural identity, as well as how they might affect the future of these languages.

Keywords: linguistic and cultural analysis, historical factors, cultural factors, vocabulary, syntax, significance

Procedia PDF Downloads 58
2993 The Influence of Mobile Phone Addiction on Academic Performance among Teenagers in Shah Alam, Malaysia

Authors: Jamaluddin Abd Rashid, Aris Abdul Rahman

Abstract:

Mobile phones have become the most popular way to communicate with other individuals and it has created an unspoken social dependency. Making phone calls, instant messaging, playing online games and accessing the Internet are among the features added to a mobile phone, attracting teenagers to spend more hours fixated on their gadgets. As such, this study attempted to examine the frequency of time spent on mobile phones and how this influenced academic performance. A quantitative methodology was applied in this study, where face to face survey through the distribution of questionnaires was facilitated onto a group of 200 secondary school students from the Shah Alam community in Selangor,Malaysia. Both genders, male and females were assessed equally to find out if there exists a correlation between genders when measuring higher or lower frequency of attachment to mobile phones. It can also be seen that 100% correspondents have a mobile phone in their possession. The adolescents uses mobile phones daily, which shows students being somewhat addicted, as they tend to feel that it is necessary to use a mobile phone. The main findings of this research found out that, students that are mobile phone addictive received a lower grade in schools. Mobile phone addiction does affect academic performance negatively. As this study discusses the modern-day phenomenon, it is hoped that the findings and discussion could add to present literary works and help future researchers understand the relationship between mobile phone addiction and academic performance.

Keywords: academic performance, mobile phone addiction, social media, student

Procedia PDF Downloads 323
2992 Digimesh Wireless Sensor Network-Based Real-Time Monitoring of ECG Signal

Authors: Sahraoui Halima, Dahani Ameur, Tigrine Abedelkader

Abstract:

DigiMesh technology represents a pioneering advancement in wireless networking, offering cost-effective and energy-efficient capabilities. Its inherent simplicity and adaptability facilitate the seamless transfer of data between network nodes, extending the range and ensuring robust connectivity through autonomous self-healing mechanisms. In light of these advantages, this study introduces a medical platform harnessed with DigiMesh wireless network technology characterized by low power consumption, immunity to interference, and user-friendly operation. The primary application of this platform is the real-time, long-distance monitoring of Electrocardiogram (ECG) signals, with the added capacity for simultaneous monitoring of ECG signals from multiple patients. The experimental setup comprises key components such as Raspberry Pi, E-Health Sensor Shield, and Xbee DigiMesh modules. The platform is composed of multiple ECG acquisition devices labeled as Sensor Node 1 and Sensor Node 2, with a Raspberry Pi serving as the central hub (Sink Node). Two communication approaches are proposed: Single-hop and multi-hop. In the Single-hop approach, ECG signals are directly transmitted from a sensor node to the sink node through the XBee3 DigiMesh RF Module, establishing peer-to-peer connections. This approach was tested in the first experiment to assess the feasibility of deploying wireless sensor networks (WSN). In the multi-hop approach, two sensor nodes communicate with the server (Sink Node) in a star configuration. This setup was tested in the second experiment. The primary objective of this research is to evaluate the performance of both Single-hop and multi-hop approaches in diverse scenarios, including open areas and obstructed environments. Experimental results indicate the DigiMesh network's effectiveness in Single-hop mode, with reliable communication over distances of approximately 300 meters in open areas. In the multi-hop configuration, the network demonstrated robust performance across approximately three floors, even in the presence of obstacles, without the need for additional router devices. This study offers valuable insights into the capabilities of DigiMesh wireless technology for real-time ECG monitoring in healthcare applications, demonstrating its potential for use in diverse medical scenarios.

Keywords: DigiMesh protocol, ECG signal, real-time monitoring, medical platform

Procedia PDF Downloads 61
2991 Accessible Sustainability Assessment Tools and Approach of the University level Academic Programs

Authors: S. K. Ashiquer Rahman

Abstract:

The innovative knowledge threshold significantly shifted education from traditional to an online version which was an emergent state of arts for academic programs of any higher education institutions; the substantive situation thus raises the importance of deliberative integration of education, Knowledge, technology and sustainability as well as knowledge platforms, e.g., ePLANETe. In fact, the concept of 'ePLANETe' an innovative knowledge platform and its functionalities as an experimental digitized platform for contributing sustainable assessment of academic programs of higher education institution(HEI). Besides, this paper assessed and define the common sustainable development challenges of higher education(HE) and identified effective approach and tools of 'ePLANETe’ that is enable to practices sustainability assessment of academic programs through the deliberation methodologies. To investigate the effectiveness of knowledge tools and approach of 'ePLANETe’, I have studied sustainable challenges digitized pedagogical content as well as evaluation of academic programs of two public universities in France through the 'ePLANETe’ evaluation space. The investigation indicated that the effectiveness of 'ePLANETe’s tools and approach perfectly fit for the quality assessment of academic programs, implementation of sustainable challenges, and dynamic balance of ecosystem within the university communities and academic programs through 'ePLANETe’ evaluation process and space. The study suggests to the relevant higher educational institution’s authorities and policymakers could use this approach and tools for assessing sustainability and enhancing the sustainability competencies of academic programs for quality education

Keywords: ePLANETe, deliberation, evaluation, competencies

Procedia PDF Downloads 91
2990 The Use of Social Media and Its Impact on the Learning Behavior of ESL University Students for Sustainable Education in Pakistan

Authors: Abdullah Mukhtar, Shehroz Mukhtar, Amina Mukhtar, Choudhry Shahid, Hafiz Raza Razzaq, Saif Ur Rahman

Abstract:

The aim of this study is to find out the negative and positive impacts of social media platforms on the attitude of learning and educational environment of student’s community. Social Media platforms have become a source of collaboration with one another throughout the globe making it a small world. This study performs focalized investigation of the adverse and constructive factors that have a strong impact not only on the psychological adjustments but also on the academic performance of peers. This study is a quantitative research adopting random sampling method in which the participants were the students of university. Researcher distributed 1000 questionnaires among the university students from different departments and asked them to fill the data on Lickert Scale. The participants are from the age group of 18-24 years. Study applies user and gratification theory in order to examine behavior of students practicing social media in their academic and personal life. Findings of the study reveal that the use of social media platforms in Pakistani context has less positive impact as compared to negative impacts on the behavior of students towards learning. The research suggests that usage of online social media platforms should be taught to students; awareness must the created among the users of social media by the means of seminars, workshops and by media itself to overcome the negative impacts of social media leading towards sustainable education in Pakistan.

Keywords: social media, positive impact, negative impact, learning behaviour

Procedia PDF Downloads 44
2989 Adult Attachment Security as a Predictor of Career Decision-Making Self-Efficacy among College Students in the United States

Authors: Mai Kaneda, Sarah Feeney

Abstract:

This study examined the association between adult attachment security and career decision-making self-efficacy (CDMSE) among college students in the United States. Previous studies show that attachment security is associated with levels of CDMSE among college students. Given that a majority of studies examining career development variables have used parental attachment measures, this study adds to understanding of this phenomenon by utilizing a broader measure of attachment. The participants included 269 college students (76% female) between the ages of 19-29. An anonymous survey was distributed online via social media as well as in hard copy format in classrooms. Multiple regression analyses were conducted to determine the relationship between anxious and avoidant attachment and CDMSE. Results revealed anxious attachment was a significant predictor of CDMSE (B = -.13, p = .01), such that greater anxiety in attachment was associated with lower levels of CDMSE. When accounting for anxious attachment, avoidant attachment was no longer significant as a predictor of CDMSE (B = -.12, p = .10). The variance in college CDMSE explained by the model was 7%, F(2,267) = 9.51, p < .001. Results for anxious attachment are consistent with existing literature that finds insecure attachment to be related to lower levels of CDMSE, however the non-significant results for avoidant attachment as a predictor of CDMSE suggest not all types of attachment insecurity are equally related to CDMSE. Future research is needed to explore the nature of the relationship between different dimensions of attachment insecurity and CDMSE.

Keywords: attachment, career decision-making, college students, self-efficacy

Procedia PDF Downloads 204
2988 Virtual Customer Integration in Innovation Development: A Systematic Literature Review

Authors: Chau Nguyen Pham Minh

Abstract:

The aim of this study is to answer the following research question: What do we know about virtual customer integration in innovation development based on existing empirical research? The paper is based on a systematic review of 136 articles which were published in the past 16 years. The analysis focuses on three areas: what forms of virtual customer integration (e.g. netnography, online co-creation, virtual experience) have been applied in innovation development; how have virtual customer integration methods effectively been utilized by firms; and what are the influences of virtual customer integration on innovation development activities? Through the detailed analysis, the study provides researchers with broad understanding about virtual customer integration in innovation development. The study shows that practitioners and researchers increasingly pay attention on using virtual customer integration methods in developing innovation since those methods have dominant advantages in interact with customers in order to generate the best ideas for innovation development. Additionally, the findings indicate that netnography has been the most common method in integrating with customers for idea generation; while virtual product experience has been mainly used in product testing. Moreover, the analysis also reveals the positive and negative influences of virtual customer integration in innovation development from both process and strategic perspectives. Most of the review studies examined the phenomenon from company’s perspectives to understand the process of applying virtual customer integration methods and their impacts; however, the customers’ perspective on participating in the virtual interaction has been inadequately studied; therefore, it creates many potential interesting research paths for future studies.

Keywords: innovation, virtual customer integration, co-creation, netnography, new product development

Procedia PDF Downloads 317
2987 Cryptocurrency Forensics: Analysis on Bitcoin E-Wallet from Computer Source Evidence

Authors: Muhammad Nooraiman bin Noorashid, Mohd Sharizuan bin Mohd Omar, Mohd Zabri Adil bin Talib, Aswami Fadillah bin Mohd Ariffin

Abstract:

Nowadays cryptocurrency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The cryptocurrency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin cryptocurrency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage.

Keywords: cryptocurrency, bitcoin, digital wallet, digital forensics

Procedia PDF Downloads 320
2986 A Named Data Networking Stack for Contiki-NG-OS

Authors: Sedat Bilgili, Alper K. Demir

Abstract:

The current Internet has become the dominant use with continuing growth in the home, medical, health, smart cities and industrial automation applications. Internet of Things (IoT) is an emerging technology to enable such applications in our lives. Moreover, Named Data Networking (NDN) is also emerging as a Future Internet architecture where it fits the communication needs of IoT networks. The aim of this study is to provide an NDN protocol stack implementation running on the Contiki operating system (OS). Contiki OS is an OS that is developed for constrained IoT devices. In this study, an NDN protocol stack that can work on top of IEEE 802.15.4 link and physical layers have been developed and presented.

Keywords: internet of things (IoT), named-data, named data networking (NDN), operating system

Procedia PDF Downloads 152