Search results for: scholarly communication
1051 Performance Evaluation of Routing Protocol in Cognitive Radio with Multi Technological Environment
Authors: M. Yosra, A. Mohamed, T. Sami
Abstract:
Over the past few years, mobile communication technologies have seen significant evolution. This fact promoted the implementation of many systems in a multi-technological setting. From one system to another, the Quality of Service (QoS) provided to mobile consumers gets better. The growing number of normalized standards extends the available services for each consumer, moreover, most of the available radio frequencies have already been allocated, such as 3G, Wifi, Wimax, and LTE. A study by the Federal Communications Commission (FCC) found that certain frequency bands are partially occupied in particular locations and times. So, the idea of Cognitive Radio (CR) is to share the spectrum between a primary user (PU) and a secondary user (SU). The main objective of this spectrum management is to achieve a maximum rate of exploitation of the radio spectrum. In general, the CR can greatly improve the quality of service (QoS) and improve the reliability of the link. The problem will reside in the possibility of proposing a technique to improve the reliability of the wireless link by using the CR with some routing protocols. However, users declared that the links were unreliable and that it was an incompatibility with QoS. In our case, we choose the QoS parameter "bandwidth" to perform a supervised classification. In this paper, we propose a comparative study between some routing protocols, taking into account the variation of different technologies on the existing spectral bandwidth like 3G, WIFI, WIMAX, and LTE. Due to the simulation results, we observe that LTE has significantly higher availability bandwidth compared with other technologies. The performance of the OLSR protocol is better than other on-demand routing protocols (DSR, AODV and DSDV), in LTE technology because of the proper receiving of packets, less packet drop and the throughput. Numerous simulations of routing protocols have been made using simulators such as NS3.Keywords: cognitive radio, multi technology, network simulator (NS3), routing protocol
Procedia PDF Downloads 631050 Pediatricians as a Key Channel of Influence for Infant Formula Purchases
Authors: Matthew Heidman, Susan Dallabrida, Analice Costa
Abstract:
For infant caregivers, choosing an infant formula for their child can be a difficult task in an already stressful environment of caring for a newborn. There exist several channels that influence purchasing decision of infant formula such as, friends and family and their experiences, health care professionals, social media influencers, as well as standard media marketing. This study sought to identify the key channels by which caregivers obtain information regarding infant formula and help them make their purchasing decision. A digital survey was issued for 90 days in the US (n=121) and 30 days in Mexico (n=88) targeting respondents with children ≤4 years of age. Respondents were asked two key questions regarding the influences on their purchasing decisions: 1) “When choosing a formula brand, what do you do to help you make your decision?”, and 2) “When choosing a formula brand, what is most important to you?”. A list of potential answers was provided for each question and respondents were asked to select all that apply to them. Lastly, respondents were provided a 5-point Likert scale and asked to respond to the statement 3) “I am more likely to buy a particular formula brand if my pediatrician recommends it to me”. For question 1, in the US and Mexico, 76% and 95% of respondents respectively, selected “I ask my pediatrician” which represented the top selection. For question 2, 52% and 45% of respondents respectively, selected “On package “Pediatrician Recommended” claim…” which also represented the top selection. For statement 3, 82% and 89% of respondents respectively, stated that they either “somewhat agree” or “strongly agree” with the statement. For infant caregivers, the pediatrician is a very important channel of influence when it comes to purchasing decision of infant formula. Caregivers clearly see the pediatrician as the arbiter of their child’s nutrition and seek their recommendations for infant formula use. For infant formula manufacturers, it is important that they see the pediatrician as the gatekeeper to this market, and they put resources into medical marketing communication to this health care professional group to ensure success.Keywords: infant formula, pediatrician, purchasing driver, caregiver
Procedia PDF Downloads 941049 Branding Good Corporate Governance: A Pathway to Strengthen Investors’ Perception and Brand Equity
Authors: Azaz Zaman, Imtiaz Uddin Chowdhury, Mohammad Shariful Islam
Abstract:
Corporate governance has become a crucial issue in both the business and academic world as a result of world-wide financial scandals and lack of trust in corporate practices. There is no doubt that in order to thrive and attain growth in the market, a company must earn the trust of its stakeholders by consistently delivering on its commitments. Directors of the companies thus comprehend the importance of upfront communication with relevant stakeholders to increase their confidence. The authors of this article argue that practicing good corporate governance is not enough in this highly competitive market place; corporate leaders need to market their good corporate governance practices in order to make the company more attractive to investors. This article also contends that the strength of corporate governance relies wholly upon the extent to which it is communicated simply, effectively and unceasingly to its stakeholders. The main objective of this study, therefore, is to explore the importance of branding good corporate governance in order to increase corporate brand equity, attract investors, and capture market share. A structured questionnaire comprising three sections and a total of 34 questions was prepared and surveyed by the authors among respondents residing in Bangladesh and who also have an academic and corporate background, to investigate the potential impact of branding good corporate governance in the market place. High mean values for individual questions and overall section depict that communicating and branding good corporate governance to the stakeholders will not only boost the investors’ confidence but also increase the corporate brand equity, yielding both profitable and sustainable business environment.Keywords: brand equity, investors’ preference, good corporate governance, sustainable business environment
Procedia PDF Downloads 1141048 The Design Method of Artificial Intelligence Learning Picture: A Case Study of DCAI's New Teaching
Authors: Weichen Chang
Abstract:
To create a guided teaching method for AI generative drawing design, this paper develops a set of teaching models for AI generative drawing (DCAI), which combines learning modes such as problem-solving, thematic inquiry, phenomenon-based, task-oriented, and DFC . Through the information security AI picture book learning guided programs and content, the application of participatory action research (PAR) and interview methods to explore the dual knowledge of Context and ChatGPT (DCAI) for AI to guide the development of students' AI learning skills. In the interviews, the students highlighted five main learning outcomes (self-study, critical thinking, knowledge generation, cognitive development, and presentation of work) as well as the challenges of implementing the model. Through the use of DCAI, students will enhance their consensus awareness of generative mapping analysis and group cooperation, and they will have knowledge that can enhance AI capabilities in DCAI inquiry and future life. From this paper, it is found that the conclusions are (1) The good use of DCAI can assist students in exploring the value of their knowledge through the power of stories and finding the meaning of knowledge communication; (2) Analyze the transformation power of the integrity and coherence of the story through the context so as to achieve the tension of ‘starting and ending’; (3) Use ChatGPT to extract inspiration, arrange story compositions, and make prompts that can communicate with people and convey emotions. Therefore, new knowledge construction methods will be one of the effective methods for AI learning in the face of artificial intelligence, providing new thinking and new expressions for interdisciplinary design and design education practice.Keywords: artificial intelligence, task-oriented, contextualization, design education
Procedia PDF Downloads 341047 A Project-Based Learning Approach in the Course of 'Engineering Skills' for Undergraduate Engineering Students
Authors: Armin Eilaghi, Ahmad Sedaghat, Hayder Abdurazzak, Fadi Alkhatib, Shiva Sadeghi, Martin Jaeger
Abstract:
A summary of experiences, recommendations, and lessons learnt in the application of PBL in the course of “Engineering Skills” in the School of Engineering at Australian College of Kuwait in Kuwait is presented. Four projects were introduced as part of the PBL course “Engineering Skills” to 24 students in School of Engineering. These students were grouped in 6 teams to develop their skills in 10 learning outcomes. The learning outcomes targeted skills such as drawing, design, modeling, manufacturing and analysis at a preliminary level; and also some life line learning and teamwork skills as these students were exposed for the first time to the PBL (project based learning). The students were assessed for 10 learning outcomes of the course and students’ feedback was collected using an anonymous survey at the end of the course. Analyzing the students’ feedbacks, it is observed that 67% of students preferred multiple smaller projects than a single big project because it provided them with more time and attention focus to improve their “soft skills” including project management, risk assessment, and failure analysis. Moreover, it is found that 63% of students preferred to work with different team members during the course to improve their professional communication skills. Among all, 62% of students believed that working with team members from other departments helped them to increase the innovative aspect of projects and improved their overall performance. However, 70% of students counted extra time needed to regenerate momentum with the new teams as the major challenge. Project based learning provided a suitable platform for introducing students to professional engineering practice and meeting the needs of students, employers and educators. It was found that students achieved their 10 learning outcomes and gained new skills developed in this PBL unit. This was reflected in their portfolios and assessment survey.Keywords: project-based learning, engineering skills, undergraduate engineering, problem-based learning
Procedia PDF Downloads 1671046 Overcoming Open Innovation Challenges with Technology Intelligence: Case of Medium-Sized Enterprises
Authors: Akhatjon Nasullaev, Raffaella Manzini, Vincent Frigant
Abstract:
The prior research largely discussed open innovation practices both in large and small and medium-sized enterprises (SMEs). Open Innovation compels firms to observe and analyze the external environment in order to tap new opportunities for inbound and/or outbound flows of knowledge, ideas, work in progress innovations. As SMEs are different from their larger counterparts, they face several limitations in utilizing open innovation activities, such as resource scarcity, unstructured innovation processes and underdeveloped innovation capabilities. Technology intelligence – the process of systematic acquisition, assessment and communication of information about technological trends, opportunities and threats can mitigate this limitation by enabling SMEs to identify technological and market opportunities in timely manner and undertake sound decisions, as well as to realize a ‘first mover advantage’. Several studies highlighted firm-level barriers to successful implementation of open innovation practices in SMEs, namely challenges in partner selection, intellectual property rights and trust, absorptive capacity. This paper aims to investigate the question how technology intelligence can be useful for SMEs to overcome the barriers to effective open innovation. For this, we conduct a case study in four Estonian life-sciences SMEs. Our findings revealed that technology intelligence can support SMEs not only in inbound open innovation (taking into account inclination of most firms toward technology exploration aspects of open innovation) but also outbound open innovation. Furthermore, the results of this study state that, although SMEs conduct technology intelligence in unsystematic and uncoordinated manner, it helped them to increase their innovative performance.Keywords: technology intelligence, open innovation, SMEs, life sciences
Procedia PDF Downloads 1671045 The Impact of Social Media on Urban E-planning: A Review of the Literature
Authors: Farnoosh Faal
Abstract:
The rapid growth of social media has brought significant changes to the field of urban e-planning. This study aims to review the existing literature on the impact of social media on urban e-planning processes. The study begins with a discussion of the evolution of social media and its role in urban e-planning. The review covers research on the use of social media for public engagement, citizen participation, stakeholder communication, decision-making, and monitoring and evaluation of urban e-planning initiatives. The findings suggest that social media has the potential to enhance public participation and improve decision-making in urban e-planning processes. Social media platforms such as Facebook, Twitter, and Instagram can provide a platform for citizens to engage with planners and policymakers, express their opinions, and provide feedback on planning proposals. Social media can also facilitate the collection and analysis of data, including real-time data, to inform urban e-planning decision-making. However, the literature also highlights some challenges associated with the use of social media in urban e-planning. These challenges include issues related to the representativeness of social media users, the quality of information obtained from social media, the potential for bias and manipulation of social media content, and the need for effective data management and analysis. The study concludes with recommendations for future research on the use of social media in urban e-planning. The recommendations include the need for further research on the impact of social media on equity and social justice in planning processes, the need for more research on effective strategies for engaging underrepresented groups, and the development of guidelines for the use of social media in urban e-planning processes. Overall, the study suggests that social media has the potential to transform urban e-planning processes but that careful consideration of the opportunities and challenges associated with its use is essential for effective and ethical planning practice.Keywords: social media, Urban e-planning, public participation, citizen engagement
Procedia PDF Downloads 2381044 Motivating Factors of Mobile Device Applications toward Learning
Authors: Yen-Mei Lee
Abstract:
Mobile learning (m-learning) has been applied in the education field not only because it is an alternative to web-based learning but also it possesses the ‘anytime, anywhere’ learning features. However, most studies focus on the technology-related issue, such as usability and functionality instead of addressing m-learning from the motivational perspective. Accordingly, the main purpose of the current paper is to integrate critical factors from different motivational theories and related findings to have a better understand the catalysts of an individual’s learning motivation toward m-learning. The main research question for this study is stated as follows: based on different motivational perspectives, what factors of applying mobile devices as medium can facilitate people’s learning motivations? Self-Determination Theory (SDT), Uses and Gratification Theory (UGT), Malone and Lepper’s taxonomy of intrinsic motivation theory, and different types of motivation concepts were discussed in the current paper. In line with the review of relevant studies, three motivating factors with five essential elements are proposed. The first key factor is autonomy. Learning on one’s own path and applying personalized format are two critical elements involved in the factor of autonomy. The second key factor is to apply a build-in instant feedback system during m-learning. The third factor is creating an interaction system, including communication and collaboration spaces. These three factors can enhance people’s learning motivations when applying mobile devices as medium toward learning. To sum up, in the currently proposed paper, with different motivational perspectives to discuss the m-learning is different from previous studies which are simply focused on the technical or functional design. Supported by different motivation theories, researchers can clearly understand how the mobile devices influence people’s leaning motivation. Moreover, instructional designers and educators can base on the proposed factors to build up their unique and efficient m-learning environments.Keywords: autonomy, learning motivation, mobile learning (m-learning), motivational perspective
Procedia PDF Downloads 1821043 Morpho-Syntactic Pattern in Maithili Urdu
Authors: Mohammad Jahangeer Warsi
Abstract:
This is, perhaps, the first linguistic study of Maithili Urdu, a dialect of Urdu language of Indo-Aryan family, spoken by around four million speakers in Darbhanga, Samastipur, Begusarai, Madhubani, and Muzafarpur districts of Bihar. It has the subject–verb–object (SOV) word order and it lacks script and literature. Needless to say, this work is an attempt to document this dialect so that it should contribute to the field of descriptive linguistics. Besides, it is also spoken by majority of Maithili diaspora community. Maithili Urdu does not have its own script or literature, yet it has maintained an oral history of over many centuries. It has contributed to enriching the Maithili, Hindi and Urdu languages and literature very profoundly. Dialects are the contact languages of particular regions, and they have a deep impact on their cultural heritage. Slowly with time, these dialects begin to take shape of languages. The convergence of a dialect into a language is a symbol and pride of the people who speak it. Although, confined to the five districts of northern Bihar, yet highly popular among the natives, it is the primary mode of communication of the local Muslims. The paper will focus on the structure of expressions about Maithili Urdu that include the structure of words, phrases, clauses, and sentences. There are clear differences in linguistic features of Maithili Urdu vis-à-vis Urdu, Maithili and Hindi. Though being a dialect of Urdu, interestingly, there is only one second person pronoun tu and lack of agentive marker –ne. Although being spoken in the vicinity of Hindi, Urdu and Maithili, it undoubtedly has its own linguistic features, of them, verb conjugation is remarkably unique. Because of the oral tradition of this link language, intonation has become significantly prominent. This paper will discuss the morpho-syntactic pattern of Maithili Urdu and will go through a sample text to authenticate the findings.Keywords: cultural heritage, morpho-syntactic pattern, Maithili Urdu, verb conjugation
Procedia PDF Downloads 2191042 Fatal Attractions: Exploiting Olfactory Communication between Invasive Predators for Conservation
Authors: Patrick M. Garvey, Roger P. Pech, Daniel M. Tompkins
Abstract:
Competition is a widespread interaction and natural selection will encourage the development of mechanisms that recognise and respond to dominant competitors, if this information reduces the risk of a confrontation. As olfaction is the primary sense for most mammals, our research tested whether olfactory ‘eavesdropping’ mediates alien species interactions and whether we could exploit our understanding of this behaviour to create ‘super-lures’. We used a combination of pen and field experiments to evaluate the importance of this behaviour. In pen trials, stoats (Mustela erminea) were exposed to the body odour of three dominant predators (cat / ferret / African wild dog) and these scents were found to be attractive. A subsequent field trial tested whether attraction displayed towards predator odour, particularly ferret (Mustela furo) pheromones, could be replicated with invasive predators in the wild. We found that ferret odour significantly improved detection and activity of stoats and hedgehogs (Erinaceus europaeus), while also improving detections of ship rats (Rattus rattus). Our current research aims to identify the key components of ferret odour, using chemical analysis and behavioural experiments, so that we can produce ‘scent from a can’. A lure based on a competitors’ odour would be beneficial in many circumstances including: (i) where individuals display variability in attraction to food lures, (ii) there are plentiful food resources available, (iii) new immigrants arrive into an area, (iv) long-life lures are required. Pest management can therefore benefit by exploiting behavioural responses to odours to achieve conservation goals.Keywords: predator interactions, invasive species, eavesdropping, semiochemicals
Procedia PDF Downloads 4121041 Digital Demands: Addressing the Digital Divide in Basic Education and Its Relation to Academic Performance and Aspirations
Authors: Jose Rodrigo Zubiri, Sofia Carmen Tomacruz
Abstract:
Amidst an increasingly digitalized society, information and communication technologies have been seamlessly integrated into the economic, social, and political life of individuals. Information has been regarded as a primary good, essential to the wellbeing and self-respect of individuals in society. The digital engagements of an individual play a key role in a variety of life outcomes ranging from academic performance to entrepreneurial success to health service uptake. As a result of varying degrees of access to the Internet and ICTs across populations and individuals, a digital divide emerges. Education, a sector pivotal to directing individual life trajectories, has been radically transformed with regards to the learning process and access to information and thus faces the implications of the digital divide, as new waves of inequalities are introduced in the classroom. As the period of basic education is critical to transitioning into civic life or higher education, digital inequalities are capable of aggravating pre-existing social inequalities. Through survey-questionnaires, conducted on 152 high school students from a Philippine public school, the study reveals the correlation of academic performance and aspirations (for their highest academic qualification) to access to digital technologies and the Internet, according to Van Dijk’s four measurements of digital poverty, namely: motivational access, material access, skills access, and usage access. The findings reveal a positive correlation for academic performance whereas no correlation was found between aspirations and digital access. In the study, significant correlational differences were also found between genders, specifically, in terms of skills access and academic performance.Keywords: digital divide, ICTs, inequality, education, life trajectories
Procedia PDF Downloads 2701040 The Security Trade-Offs in Resource Constrained Nodes for IoT Application
Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve
Abstract:
The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation
Procedia PDF Downloads 1691039 The Use of Knowledge Management Systems and Information Communication Technology Service Desk Management to Minimize the Digital Divide Experienced in the Museum Sector
Authors: Ruel A. Welch
Abstract:
Since the introduction of ServiceNow, the UK’s Science Museum Group’s (SMG) ICT service desk portal. There has not been an analysis of the tools available to SMG staff for just-in-time knowledge acquisition (knowledge management systems) and reporting ICT incidents with a focus on an aspect of professional identity, namely, gender. This study is conducted in the milieu of UK museums, galleries, arts, academic, charitable, and cultural heritage sectors. Numerous authors suggest that males and females experience ICT usage differently. Therefore, it is important for SMG to investigate the apparent disparities so that solutions can be derived to minimize this digital divide if one exists. It is acknowledged at SMG that there are challenges with keeping up with an ever-changing digital landscape. Subsequently, this entails the rapid upskilling of staff and developing an infrastructure that supports just-in-time technological knowledge acquisition and reporting technology-related issues. This problem was addressed by analyzing ServiceNow ICT incident reports and reports from knowledge articles from a six-month period from February to July. This study found a statistically significant relationship between gender and reporting an ICT incident. There is also a significant relationship between gender and the priority level of ICT incidents. Interestingly, there is no statistically significant relationship between gender and reading knowledge articles. Additionally, there is no statistically significant relationship between gender and reporting an ICT incident related to the knowledge article that was read by staff. The knowledge acquired from this study is useful to service desk management practice as it will help to inform the creation of future knowledge articles and ICT incident reporting processes.Keywords: digital divide, ICT service desk practice, knowledge management systems, workplace learning
Procedia PDF Downloads 1271038 Challenges and Pedagogical Strategies in Teaching Chemical Bonding: Perspectives from Moroccan Educators
Authors: Sara Atibi, Azzeddine Atibi, Salim Ahmed, Khadija El Kababi
Abstract:
The concept of chemical bonding is fundamental in chemistry education, ubiquitous in school curricula, and essential to numerous topics in the field. Mastery of this concept enables students to predict and explain the physical and chemical properties of substances. However, chemical bonding is often regarded as one of the most complex concepts for secondary and higher education students to comprehend, due to the underlying complex theory and the use of abstract models. Teachers also encounter significant challenges in conveying this concept effectively. This study aims to identify the difficulties and alternative conceptions faced by Moroccan secondary school students in learning about chemical bonding, as well as the pedagogical strategies employed by teachers to overcome these obstacles. A survey was conducted involving 150 Moroccan secondary school physical science teachers, using a structured questionnaire comprising closed, open-ended, and multiple-choice questions. The results reveal frequent student misconceptions, such as the octet rule, molecular geometry, and molecular polarity. Contributing factors to these misconceptions include the abstract nature of the concepts, the use of models, and teachers' difficulties in explaining certain aspects of chemical bonding. The study proposes improvements for teaching chemical bonding, such as integrating information and communication technologies (ICT), diversifying pedagogical tools, and considering students' pre-existing conceptions. These recommendations aim to assist teachers, curriculum developers, and textbook authors in making chemistry more accessible and in addressing students' misconceptions.Keywords: chemical bonding, alternative conceptions, chemistry education, pedagogical strategies
Procedia PDF Downloads 261037 Deep Reinforcement Learning-Based Computation Offloading for 5G Vehicle-Aware Multi-Access Edge Computing Network
Authors: Ziying Wu, Danfeng Yan
Abstract:
Multi-Access Edge Computing (MEC) is one of the key technologies of the future 5G network. By deploying edge computing centers at the edge of wireless access network, the computation tasks can be offloaded to edge servers rather than the remote cloud server to meet the requirements of 5G low-latency and high-reliability application scenarios. Meanwhile, with the development of IOV (Internet of Vehicles) technology, various delay-sensitive and compute-intensive in-vehicle applications continue to appear. Compared with traditional internet business, these computation tasks have higher processing priority and lower delay requirements. In this paper, we design a 5G-based Vehicle-Aware Multi-Access Edge Computing Network (VAMECN) and propose a joint optimization problem of minimizing total system cost. In view of the problem, a deep reinforcement learning-based joint computation offloading and task migration optimization (JCOTM) algorithm is proposed, considering the influences of multiple factors such as concurrent multiple computation tasks, system computing resources distribution, and network communication bandwidth. And, the mixed integer nonlinear programming problem is described as a Markov Decision Process. Experiments show that our proposed algorithm can effectively reduce task processing delay and equipment energy consumption, optimize computing offloading and resource allocation schemes, and improve system resource utilization, compared with other computing offloading policies.Keywords: multi-access edge computing, computation offloading, 5th generation, vehicle-aware, deep reinforcement learning, deep q-network
Procedia PDF Downloads 1201036 Gender and Geographical Disparity in Editorial Boards of Lithuanian Scientific Journals: An Overview of Different Science Disciplines
Authors: Andrius Suminas
Abstract:
Editors-in-chief and members of editorial boards of scientific journals play an extremely important role in the development of science and assure research integrity, as scientific publications are the major results of research. While gender parity in tenure-track hiring decisions and promotion rates has improved, female academics remain underrepresented in senior career phases, including editors-in-chief and members of editorial boards positions of scientific journals. Journal editors and members of editorial boards exert considerable power over what is published and in certain cases the direction of an academic discipline and the career advancement of authors. For this reason it is important to minimize biases extrinsic to the merit of the work impacting publication decisions. One way to achieve this is to ensure a diverse pool of editors and members of editorial boards, ensuring the widest possible coverage of different competencies. This is in line with a diversity model of editorial appointment where editorial boards are structured to dismantle wider conditions of inequality. Another possible option, a distributive model would seek an editorial board reflective of existing proportions in the field at large. Paper presents comprehensive results of Lithuanian scientific journals study. During the research process were reviewed publicly available information from all scientific journals published in Lithuania to infer the proportions of members of editorial boards by gender and country of affiliation. The results of the study revealed differences the proportions of male and female members of editorial boards in different disciplines of science, as well as clear geographical disparity in Lithianian scientific journals editorial boards.Keywords: scientific journals, editorial boards of scientific journals, gender disparity, geographical disparity, scientific communication
Procedia PDF Downloads 961035 Research on the Aesthetic Characteristics of Calligraphy Art Under The Cross-Cultural Background Based on Eye Tracking
Authors: Liu Yang
Abstract:
Calligraphy has a unique aesthetic value in Chinese traditional culture. Calligraphy reflects the physical beauty and the dynamic beauty of things through the structure of writing and the order of strokes to standardize the style of writing. In recent years, Chinese researchers have carried out research on the appreciation of calligraphy works from the perspective of psychology, such as how Chinese people appreciate the beauty of stippled lines, the beauty of virtual and real, and the beauty of the composition. However, there is currently no domestic research on how foreigners appreciate Chinese calligraphy. People's appreciation of calligraphy is mainly in the form of visual perception, and psychologists have been working on the use of eye trackers to record eye tracking data to explore the relationship between eye tracking and psychological activities. The purpose of this experimental study is to use eye tracking recorders to analyze the eye gaze trajectories of college students with different cultural backgrounds when they appreciate the same calligraphy work to reveal the differences in cognitive processing with different cultural backgrounds. It was found that Chinese students perceived calligraphy as words when viewing calligraphy works, so they first noticed fonts with easily recognizable glyphs, and the overall viewed time was short. Foreign students perceived calligraphy works as graphics, and they first noticed novel and abstract fonts, and the overall viewing time is longer. The understanding of calligraphy content has a certain influence on the appreciation of calligraphy works by foreign students. It is shown that when foreign students who understand the content of calligraphy works. The eye tracking path is more consistent with the calligraphy writing path, and it helps to develop associations with calligraphy works to better understand the connotation of calligraphy works. This result helps us understand the impact of cultural background differences on calligraphy appreciation and helps us to take more effective strategies to help foreign audiences understand Chinese calligraphy art.Keywords: Chinese calligraphy, eye-tracking, cross-cultural, cultural communication
Procedia PDF Downloads 1071034 A QoS Aware Cluster Based Routing Algorithm for Wireless Mesh Network Using LZW Lossless Compression
Authors: J. S. Saini, P. P. K. Sandhu
Abstract:
The multi-hop nature of Wireless Mesh Networks and the hasty progression of throughput demands results in multi- channels and multi-radios structures in mesh networks, but the main problem of co-channels interference reduces the total throughput, specifically in multi-hop networks. Quality of Service mentions a vast collection of networking technologies and techniques that guarantee the ability of a network to make available desired services with predictable results. Quality of Service (QoS) can be directed at a network interface, towards a specific server or router's performance, or in specific applications. Due to interference among various transmissions, the QoS routing in multi-hop wireless networks is formidable task. In case of multi-channel wireless network, since two transmissions using the same channel may interfere with each other. This paper has considered the Destination Sequenced Distance Vector (DSDV) routing protocol to locate the secure and optimised path. The proposed technique also utilizes the Lempel–Ziv–Welch (LZW) based lossless data compression and intra cluster data aggregation to enhance the communication between the source and the destination. The use of clustering has the ability to aggregate the multiple packets and locates a single route using the clusters to improve the intra cluster data aggregation. The use of the LZW based lossless data compression has ability to reduce the data packet size and hence it will consume less energy, thus increasing the network QoS. The MATLAB tool has been used to evaluate the effectiveness of the projected technique. The comparative analysis has shown that the proposed technique outperforms over the existing techniques.Keywords: WMNS, QOS, flooding, collision avoidance, LZW, congestion control
Procedia PDF Downloads 3401033 The Impact of Blended Learning on Developing the students' Writing Skills and the Perception of Instructors and Students: Hawassa University in Focus
Authors: Mulu G. Gencha, Gebremedhin Simon, Menna Olango
Abstract:
This study was conducted at Hawassa University (HwU) in the Southern Nation Nationalities Peoples Regional State (SNNPRS) of Ethiopia. The prime concern of this study was to examine the writing performances of experimental and control group students, perception of experimental group students, and subject instructors. The course was blended learning (BL). Blended learning is a hybrid of classroom and on-line learning. Participants were eighty students from the School of Computer Science. Forty students attended the BL delivery involved using Face-to-Face (FTF) and campus-based online instruction. All instructors, fifty, of School of Language and Communication Studies along with 10 FGD members participated in the study. The experimental group went to the computer lab two times a week for four months, March-June, 2012, using the local area network (LAN), and software (MOODLE) writing program. On the other hand, the control group, forty students, took the FTF writing course five times a week for four months in similar academic calendar. The three instruments, the attitude questionnaire, tests and FGD were designed to identify views of students, instructors, and FGD participants on BL. At the end of the study, students’ final course scores were evaluated. Data were analyzed using independent samples t-tests. A statistically, significant difference was found between the FTF and BL (p<0.05). The analysis showed that the BL group was more successful than the conventional group. Besides, both instructors and students had positive attitude towards BL. The final section of the thesis showed the potential benefits and challenges, considering the pedagogical implications for the BL, and recommended possible avenues for further works.Keywords: blended learning, computer attitudes, computer usefulness, computer liking, computer confidence, computer phobia
Procedia PDF Downloads 4111032 Clinical Supervisors Experience of Supervising Nursing Students from a Higher Education Institution
Authors: J. Magerman, P. Martin
Abstract:
Nursing students' clinical abilities is highly dependent on the quality of the clinical experience obtained while placed in the clinical environment. The clinical environment has amongst other, key role players which include the clinical supervisor. The primary role of the clinical supervisor is to guide nursing students to become the best practice nursing professionals. However, globally literature alludes to the failure of educating institutions to deliver competent nursing professionals to meet the needs of patients and deliver quality patient care. At the participating university, this may be due to various factors such as large student numbers and social and environmental challenges experienced by clinical supervisors. The aim of this study was to explore and describe the lived experiences of clinical supervisors who supervise nursing students at a higher education institution. The study employed a qualitative research approach utilizing a descriptive phenomenological design. Purposive sampling was used to select participants, who supervised first and second year nursing studnets at the higher education institution under study. TH esample comprised of eight clinical supervisors who supervise first and secon year nursing studnets at teh institution under study. Data was collected by means of in-depht interviews. Data was analysed using Collaizzi's seven steps method of qualitative analysis. Five major themes identified , focussed on the experiences regarding time a sa constraint to job productivity, the impact of teh organisational culture on the fluidity of support, interpersonal relationships a sa dynamic communication process, impact on the self, and limited resources. Trustworthiness of the data was ensured by means of applying Guba's model of truth value, applicability, consistency and neutrality. Reflexivity was also used by the researcher to further enhance trustworthiness.Keywords: clinical supervision, clinical supervisors, nursing students, clinical placements
Procedia PDF Downloads 2301031 A Linearly Scalable Family of Swapped Networks
Authors: Richard Draper
Abstract:
A supercomputer can be constructed from identical building blocks which are small parallel processors connected by a network referred to as the local network. The routers have unused ports which are used to interconnect the building blocks. These connections are referred to as the global network. The address space has a global and a local component (g, l). The conventional way to connect the building blocks is to connect (g, l) to (g’,l). If there are K blocks, this requires K global ports in each router. If a block is of size M, the result is a machine with KM routers having diameter two. To increase the size of the machine to 2K blocks, each router connects to only half of the other blocks. The result is a larger machine but also one with greater diameter. This is a crude description of how the network of the CRAY XC® is designed. In this paper, a family of interconnection networks using routers with K global and M local ports is defined. Coordinates are (c,d, p) and the global connections are (c,d,p)↔(c’,p,d) which swaps p and d. The network is denoted D3(K,M) and is called a Swapped Dragonfly. D3(K,M) has KM2 routers and has diameter three, regardless of the size of K. To produce a network of size KM2 conventionally, diameter would be an increasing function of K. The family of Swapped Dragonflies has other desirable properties: 1) D3(K,M) scales linearly in K and quadratically in M. 2) If L < K, D3(K,M) contains many copies of D3(L,M). 3) If L < M, D3(K,M) contains many copies of D3(K,L). 4) D3(K,M) can perform an all-to-all exchange in KM2+KM time which is only slightly more than the time to do a one-to-all. This paper makes several contributions. It is the first time that a swap has been used to define a linearly scalable family of networks. Structural properties of this new family of networks are thoroughly examined. A synchronizing packet header is introduced. It specifies the path to be followed and it makes it possible to define highly parallel communication algorithm on the network. Among these is an all-to-all exchange in time KM2+KM. To demonstrate the effectiveness of the swap properties of the network of the CRAY XC® and D3(K,16) are compared.Keywords: all-to-all exchange, CRAY XC®, Dragonfly, interconnection network, packet switching, swapped network, topology
Procedia PDF Downloads 1271030 Theory of the Optimum Signal Approximation Clarifying the Importance in the Recognition of Parallel World and Application to Secure Signal Communication with Feedback
Authors: Takuro Kida, Yuichi Kida
Abstract:
In this paper, it is shown a base of the new trend of algorithm mathematically that treats a historical reason of continuous discrimination in the world as well as its solution by introducing new concepts of parallel world that includes an invisible set of errors as its companion. With respect to a matrix operator-filter bank that the matrix operator-analysis-filter bank H and the matrix operator-sampling-filter bank S are given, firstly, we introduce the detail algorithm to derive the optimum matrix operator-synthesis-filter bank Z that minimizes all the worst-case measures of the matrix operator-error-signals E(ω) = F(ω) − Y(ω) between the matrix operator-input-signals F(ω) and the matrix operator-output-signals Y(ω) of the matrix operator-filter bank at the same time. Further, feedback is introduced to the above approximation theory, and it is indicated that introducing conversations with feedback do not superior automatically to the accumulation of existing knowledge of signal prediction. Secondly, the concept of category in the field of mathematics is applied to the above optimum signal approximation and is indicated that the category-based approximation theory is applied to the set-theoretic consideration of the recognition of humans. Based on this discussion, it is shown naturally why the narrow perception that tends to create isolation shows an apparent advantage in the short term and, often, why such narrow thinking becomes intimate with discriminatory action in a human group. Throughout these considerations, it is presented that, in order to abolish easy and intimate discriminatory behavior, it is important to create a parallel world of conception where we share the set of invisible error signals, including the words and the consciousness of both worlds.Keywords: matrix filterbank, optimum signal approximation, category theory, simultaneous minimization
Procedia PDF Downloads 1451029 The Application of Participatory Social Media in Collaborative Planning: A Systematic Review
Authors: Yujie Chen , Zhen Li
Abstract:
In the context of planning transformation, how to promote public participation in the formulation and implementation of collaborative planning has been the focused issue of discussion. However, existing studies have often been case-specific or focused on a specific design field, leaving the role of participatory social media (PSM) in urban collaborative planning generally questioned. A systematic database search was conducted in December 2019. Articles and projects were eligible if they reported a quantitative empirical study applying participatory social media in the collaborative planning process (a prospective, retrospective, experimental, longitudinal research, or collective actions in planning practices). Twenty studies and seven projects were included in the review. Findings showed that social media are generally applied in public spatial behavior, transportation behavior, and community planning fields, with new technologies and new datasets. PSM has provided a new platform for participatory design, decision analysis, and collaborative negotiation most widely used in participatory design. Findings extracted several existing forms of PSM. PSM mainly act as three roles: the language of decision-making for communication, study mode for spatial evaluation, and decision agenda for interactive decision support. Three optimization content of PSM were recognized, including improving participatory scale, improvement of the grass-root organization, and promotion of politics. However, basically, participants only could provide information and comment through PSM in the future collaborative planning process, therefore the issues of low data response rate, poor spatial data quality, and participation sustainability issues worth more attention and solutions.Keywords: participatory social media, collaborative planning, planning workshop, application mode
Procedia PDF Downloads 1361028 Game-Theory-Based on Downlink Spectrum Allocation in Two-Tier Networks
Authors: Yu Zhang, Ye Tian, Fang Ye Yixuan Kang
Abstract:
The capacity of conventional cellular networks has reached its upper bound and it can be well handled by introducing femtocells with low-cost and easy-to-deploy. Spectrum interference issue becomes more critical in peace with the value-added multimedia services growing up increasingly in two-tier cellular networks. Spectrum allocation is one of effective methods in interference mitigation technology. This paper proposes a game-theory-based on OFDMA downlink spectrum allocation aiming at reducing co-channel interference in two-tier femtocell networks. The framework is formulated as a non-cooperative game, wherein the femto base stations are players and frequency channels available are strategies. The scheme takes full account of competitive behavior and fairness among stations. In addition, the utility function reflects the interference from the standpoint of channels essentially. This work focuses on co-channel interference and puts forward a negative logarithm interference function on distance weight ratio aiming at suppressing co-channel interference in the same layer network. This scenario is more suitable for actual network deployment and the system possesses high robustness. According to the proposed mechanism, interference exists only when players employ the same channel for data communication. This paper focuses on implementing spectrum allocation in a distributed fashion. Numerical results show that signal to interference and noise ratio can be obviously improved through the spectrum allocation scheme and the users quality of service in downlink can be satisfied. Besides, the average spectrum efficiency in cellular network can be significantly promoted as simulations results shown.Keywords: femtocell networks, game theory, interference mitigation, spectrum allocation
Procedia PDF Downloads 1581027 An Assessment of Inland Transport Operator's Competitiveness in Phnom Penh, Cambodia
Authors: Savin Phoeun
Abstract:
Long time civil war, economic, infrastructure, social, and political structure were destroyed and everything starts from zero. Transport and communication are the key feature of the national economic growth, especially inland transport and other mode take a complementary role which supported by government and international organization both direct and indirect to private sector and small and medium size enterprises. The objectives of this study are to study the general characteristics, capacity and competitive KPIs of Cambodian Inland Transport Operators. Questionnaire and interview were formed from capacity and competitiveness key performance indicators to take apart in survey to Inland Transport Companies in Phnom Penh capital city of Cambodia. And descriptive statistics was applied to identify the data. The result of this study divided into three distinct sectors: 1). Management ability of transport operators – capital management, financial and qualification are in similar level which can compete between local competitors (moderated level). 2). Ability in operation: customer service providing is better but seemed in high cost operation because mostly they are in family size. 3). Local Cambodian Inland Transport Service Providers are able to compete with each other because they are in similar operation level while Thai competitors mostly higher than. The suggestion and recommendation from the result that inland transport companies should access to new technology, improve strategic management, build partnership (join/corporate) to be bigger size of capital and company in order to attract truthfulness from customers and customize the services to satisfy. Inland Service Providers should change characteristic from only cost competitive to cost saving and service enhancement.Keywords: assessment, competitiveness, inland transport, operator
Procedia PDF Downloads 2631026 Electronic Commerce in Georgia: Problems and Development Perspectives
Authors: Nika GorgoShadze, Anri Shainidze, Bachuki Katamadze
Abstract:
In parallel to the development of the digital economy in the world, electronic commerce is also widely developing. Internet and ICT (information and communication technology) have created new business models as well as promoted to market consolidation, sustainability of the business environment, creation of digital economy, facilitation of business and trade, business dynamism, higher competitiveness, etc. Electronic commerce involves internet technology which is sold via the internet. Nowadays electronic commerce is a field of business which is used by leading world brands very effectively. After the research of internet market in Georgia, it was found out that quality of internet is high in Tbilisi and is low in the regions. The internet market of Tbilisi can be evaluated as high-speed internet service, competitive and cost effective internet market. Development of electronic commerce in Georgia is connected with organizational and methodological as well as legal problems. First of all, a legal framework should be developed which will regulate responsibilities of organizations. The Ministry of Economy and Sustainable Development will play a crucial role in creating legal framework. Ministry of Justice will also be involved in this process as well as agency for data exchange. Measures should be taken in order to make electronic commerce in Georgia easier. Business companies may be offered some model to get low-cost and complex service. A service centre should be created which will provide all kinds of online-shopping. This will be a rather interesting innovation which will facilitate online-shopping in Georgia. Development of electronic business in Georgia requires modernized infrastructure of telecommunications (especially in the regions) as well as solution of institutional and socio-economic problems. Issues concerning internet availability and computer skills are also important.Keywords: electronic commerce, internet market, electronic business, information technology, information society, electronic systems
Procedia PDF Downloads 3841025 Novel Use of a Quality Assurance Tool for Integrating Technology to HSE
Authors: Ragi Poyyara, V. Vivek, Ashish Khaparde
Abstract:
The Product Development Process (PDP) in the technology group plays a very important role in the launch of any product. While a manufacturing process encourages the use of certain measures to reduce Health, Safety and Environmental (HSE) risks on the shop floor, the PDP concentrates on the use of Geometric Dimensioning and Tolerancing (GD&T) to develop a flawless design. Furthermore, PDP distributes and coordinates activities between different departments such as marketing, purchasing, and manufacturing. However, it is seldom realized that PDP makes a significant contribution to developing a product that reduces HSE risks by encouraging the Technology group to use effective GD&T. The GD&T is a precise communication tool that uses a set of symbols, rules, and definitions to mathematically define parts to be manufactured. It is a quality assurance method widely used in the oil and gas sector. Traditionally it is used to ensure the interchangeability of a part without affecting its form, fit, and function. Parts that do not meet these requirements are rejected during quality audits. This paper discusses how the Technology group integrates this quality assurance tool into the PDP and how the tool plays a major role in helping the HSE department in its goal towards eliminating HSE incidents. The PDP involves a thorough risk assessment and establishes a method to address those risks during the design stage. An illustration shows how GD&T helped reduce safety risks by ergonomically improving assembling operations. A brief discussion explains how tolerances provided on a part help prevent finger injury. This tool has equipped Technology to produce fixtures, which are used daily in operations as well as manufacturing. By applying GD&T to create good fits, HSE risks are mitigated for operating personnel. Both customers and service providers benefit from reduced safety risks.Keywords: HSE risks, product development process, geometric dimensioning and tolerances, mechanical engineering
Procedia PDF Downloads 2261024 A Methodology to Integrate Data in the Company Based on the Semantic Standard in the Context of Industry 4.0
Authors: Chang Qin, Daham Mustafa, Abderrahmane Khiat, Pierre Bienert, Paulo Zanini
Abstract:
Nowadays, companies are facing lots of challenges in the process of digital transformation, which can be a complex and costly undertaking. Digital transformation involves the collection and analysis of large amounts of data, which can create challenges around data management and governance. Furthermore, it is also challenged to integrate data from multiple systems and technologies. Although with these pains, companies are still pursuing digitalization because by embracing advanced technologies, companies can improve efficiency, quality, decision-making, and customer experience while also creating different business models and revenue streams. In this paper, the issue that data is stored in data silos with different schema and structures is focused. The conventional approaches to addressing this issue involve utilizing data warehousing, data integration tools, data standardization, and business intelligence tools. However, these approaches primarily focus on the grammar and structure of the data and neglect the importance of semantic modeling and semantic standardization, which are essential for achieving data interoperability. In this session, the challenge of data silos in Industry 4.0 is addressed by developing a semantic modeling approach compliant with Asset Administration Shell (AAS) models as an efficient standard for communication in Industry 4.0. The paper highlights how our approach can facilitate the data mapping process and semantic lifting according to existing industry standards such as ECLASS and other industrial dictionaries. It also incorporates the Asset Administration Shell technology to model and map the company’s data and utilize a knowledge graph for data storage and exploration.Keywords: data interoperability in industry 4.0, digital integration, industrial dictionary, semantic modeling
Procedia PDF Downloads 941023 Social and Digital Transformation of the Saudi Education System: A Cyberconflict Analysis
Authors: Mai Alshareef
Abstract:
The Saudi government considers the modernisation of the education system as a critical component of the national development plan, Saudi Vision 2030; however, this sudden reform creates tension amongst Saudis. This study examines first the reflection of the social and digital education reform on stakeholders and the general Saudi public, and second, the influence of information and communication technologies (ICTs) on the ethnoreligious conflict in Saudi Arabia. This study employs Cyberconflict theory to examine conflicts in the real world and cyberspace. The findings are based on a qualitative case study methodology that uses netnography, an analysis of 3,750 Twitter posts and semi-structural interviews with 30 individuals, including key actors in the Saudi education sector and Twitter activists during 2019\2020. The methods utilised are guided by thematic analysis to map an understanding of factors that influence societal conflicts in Saudi Arabia, which in this case include religious, national, and gender identity. Elements of Cyberconflict theory are used to better understand how conflicting groups build their identities in connection to their ethnic/religious/cultural differences and competing national identities. The findings correspond to the ethnoreligious components of the Cyberconflict theory. Twitter became a battleground for liberals, conservatives, the Saudi public and elites, and it is used in a novel way to influence public opinion and to challenge the media monopoly. Opposing groups relied heavily on a discourse of exclusion and inclusion and showed ethnic and religious affiliations, national identity, and chauvinism. The findings add to existing knowledge in the cyberconflict field of study, and they also reveal outcomes that are critical to the Saudi Arabian national context.Keywords: education, cyberconflict, Twitter, national identity
Procedia PDF Downloads 1751022 Policy and System Research for Health of Ageing Population
Authors: Sehrish Ather
Abstract:
Introduction: To improve organizational achievements through the production of new knowledge, health policy and system research is the basic requirement. An aging population is always the source of the increased burden of chronic diseases, disabilities, mental illnesses, and other co-morbidities; therefore the provision of quality health care services to every group of the population should be achieved by making strong policy and system research for the betterment of health care system. Unfortunately, the whole world is lacking policies and system research for providing health care to their elderly population. Materials and Methods: A literature review of published studies on aging diseases was done, ranging from the year 2011-2018. Geriatric, population, health policy, system, and research were the key terms used for the search. Databases searched were Google Scholar, PubMed, Science Direct, Ovid, and Research Gate. Grey literature was searched from various websites, including IHME, Library of the University of Lahore, World Health Organization (Ageing and Life Course), and Personal communication with Neuro-physicians. After careful reviewing published and un-published information, it was decided to carry on with commentary. Results and discussion: Most of the published studies have highlighted the need to advocate the funders of health policy and stakeholders of healthcare system research, and it was detected as a major issue, research on policy and healthcare system to provide health care to 'geriatric population' was found as highly neglected area. Conclusion: It is concluded that physicians are more involved with the policy and system research regarding any type of diseases, but scientists and researchers of basic and social science are less likely to be involved in methods used for health policy and system research due to lack of funding and resources. Therefore ageing diseases should be considered as a priority, and comprehensive policy and system research should be initiated for diseases of the geriatric population.Keywords: geriatric population, health care system, health policy, system research
Procedia PDF Downloads 109