Search results for: online path planning
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6944

Search results for: online path planning

3224 Pupils´ Questions at School Attendance Beginning and Teachers´ Teaching Strategy

Authors: Marie Pavelková, Hana Lukášová

Abstract:

Pupils´ inquisitiveness at the beginning of their school attendance is reflected by characteristics of the questions they ask. Clearly most of the classroom communication sequences are initiated by the teacher. But the teaching process also includes questions initiated by pupils in the need to satisfy their need for knowledge. The purpose of our research is to present the results of our pre-research strategy of occurrence of pupil-initiated questions in math lessons at the lower elementary school level, and to reveal the extent to which they are influenced by the teacher´s teaching strategy. We used the research methods of direct and indirect observations of fifth year classes in primary school. We focused on questions asked by the pupils in their math lessons. Our research sample for the pre-research observation method was a collection of video recordings available online. We used them for analysing the nature of pupils´ questions identified there. On the basis of the analysis, we hereby present the results concerning the nature of pupils´ questions asked in math lessons on the lower elementary school level. The interpretation of the collected results will be the starting point for the selection of research strategies in the next research stages concerning pupils’ questions in the future.

Keywords: beginning of schooling, pre-research, questions of pupils, teaching strategy

Procedia PDF Downloads 367
3223 Optimizing Usability Testing with Collaborative Method in an E-Commerce Ecosystem

Authors: Markandeya Kunchi

Abstract:

Usability testing (UT) is one of the vital steps in the User-centred design (UCD) process when designing a product. In an e-commerce ecosystem, UT becomes primary as new products, features, and services are launched very frequently. And, there are losses attached to the company if an unusable and inefficient product is put out to market and is rejected by customers. This paper tries to answer why UT is important in the product life-cycle of an E-commerce ecosystem. Secondary user research was conducted to find out work patterns, development methods, type of stakeholders, and technology constraints, etc. of a typical E-commerce company. Qualitative user interviews were conducted with product managers and designers to find out the structure, project planning, product management method and role of the design team in a mid-level company. The paper tries to address the usual apprehensions of the company to inculcate UT within the team. As well, it stresses upon factors like monetary resources, lack of usability expert, narrow timelines, and lack of understanding of higher management as some primary reasons. Outsourcing UT to vendors is also very prevalent with mid-level e-commerce companies, but it has its own severe repercussions like very little team involvement, huge cost, misinterpretation of the findings, elongated timelines, and lack of empathy towards the customer, etc. The shortfalls of the unavailability of a UT process in place within the team and conducting UT through vendors are bad user experiences for customers while interacting with the product, badly designed products which are neither useful and nor utilitarian. As a result, companies see dipping conversions rates in apps and websites, huge bounce rates and increased uninstall rates. Thus, there was a need for a more lean UT system in place which could solve all these issues for the company. This paper highlights on optimizing the UT process with a collaborative method. The degree of optimization and structure of collaborative method is the highlight of this paper. Collaborative method of UT is one in which the centralised design team of the company takes for conducting and analysing the UT. The UT is usually a formative kind where designers take findings into account and uses in the ideation process. The success of collaborative method of UT is due to its ability to sync with the product management method employed by the company or team. The collaborative methods focus on engaging various teams (design, marketing, product, administration, IT, etc.) each with its own defined roles and responsibility in conducting a smooth UT with users In-house. The paper finally highlights the positive results of collaborative UT method after conducting more than 100 In-lab interviews with users across the different lines of businesses. Some of which are the improvement of interaction between stakeholders and the design team, empathy towards users, improved design iteration, better sanity check of design solutions, optimization of time and money, effective and efficient design solution. The future scope of collaborative UT is to make this method leaner, by reducing the number of days to complete the entire project starting from planning between teams to publishing the UT report.

Keywords: collaborative method, e-commerce, product management method, usability testing

Procedia PDF Downloads 115
3222 Infrastructure Project Management and Implementation: A Case Study Of the Mokolo-Crocodile Water Augmentation Project in South Africa

Authors: Elkington Sibusiso Mnguni

Abstract:

The Mokolo-Crocodile Water Augmentation Project (MCWAP) is located in the Limpopo Province in the northern-western part of South Africa. Its purpose is to increase water supply by 30 million cubic meters per year to meet current and future demand for users, including power stations, mining houses, and the local municipality in the Lephalale area. This paper documents the planning and implementation aspects of the MCWAP infrastructure project. The study will add to the body of knowledge with respect to bulk water infrastructure development in water-scarce regions. The method used to gather and collate relevant data and information was the desktop study. The key finding was that the project was successfully completed in 2015 using conventional project management and construction methods. The project is currently being operated and maintained by the National Department of Water and Sanitation.

Keywords: construction, contract management, infrastructure project, project management

Procedia PDF Downloads 294
3221 Forthcoming Big Data on Smart Buildings and Cities: An Experimental Study on Correlations among Urban Data

Authors: Yu-Mi Song, Sung-Ah Kim, Dongyoun Shin

Abstract:

Cities are complex systems of diverse and inter-tangled activities. These activities and their complex interrelationships create diverse urban phenomena. And such urban phenomena have considerable influences on the lives of citizens. This research aimed to develop a method to reveal the causes and effects among diverse urban elements in order to enable better understanding of urban activities and, therefrom, to make better urban planning strategies. Specifically, this study was conducted to solve a data-recommendation problem found on a Korean public data homepage. First, a correlation analysis was conducted to find the correlations among random urban data. Then, based on the results of that correlation analysis, the weighted data network of each urban data was provided to people. It is expected that the weights of urban data thereby obtained will provide us with insights into cities and show us how diverse urban activities influence each other and induce feedback.

Keywords: big data, machine learning, ontology model, urban data model

Procedia PDF Downloads 412
3220 Design and Implementation of Remote Application Virtualization in Cloud Environments

Authors: Shuen-Tai Wang, Ying-Chuan Chen, Hsi-Ya Chang

Abstract:

Cloud computing is a paradigm of computing that shifts the way computing has been done in the past. The users can use cloud resources such as application software or storage space from the cloud without needing to own them. This paper is focused on solutions that are anticipated to introduce IaaS idea to build cloud base services and enable the individual remote user's applications in cloud environments, which appear as if they are running on the end user's local computer. The available features of application delivery solution have been developed based on our previous research on the virtualization technology to offer applications independent of location so that the users can work online, offline, anywhere, with appropriate device and at any time. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for cloud service. Users no longer need to burden the system managers and drastically reduces the overall cost of hardware and software licenses. Moreover, this flexible remote application virtualization service represents the next significant step to the mobile workplace, and it lets users access their applications remotely through cloud services anywhere. This is also made possible by the low administrative costs as well as relatively inexpensive end-user terminals and reduced energy expenses.

Keywords: cloud computing, IaaS, virtualization, application delivery

Procedia PDF Downloads 277
3219 Scattered Places in Stories Singularity and Pattern in Geographic Information

Authors: I. Pina, M. Painho

Abstract:

Increased knowledge about the nature of place and the conditions under which space becomes place is a key factor for better urban planning and place-making. Although there is a broad consensus on the relevance of this knowledge, difficulties remain in relating the theoretical framework about place and urban management. Issues related to representation of places are among the greatest obstacles to overcome this gap. With this critical discussion, based on literature review, we intended to explore, in a common framework for geographical analysis, the potential of stories to spell out place meanings, bringing together qualitative text analysis and text mining in order to capture and represent the singularity contained in each person's life history, and the patterns of social processes that shape places. The development of this reasoning is based on the extensive geographical thought about place, and in the theoretical advances in the field of Geographic Information Science (GISc).

Keywords: discourse analysis, geographic information science place, place-making, stories

Procedia PDF Downloads 190
3218 Parental Negative Emotional States, Parenting Style and Child Emotional and Behavioural Problems: Australia-Indonesia Cross-Cultural Study

Authors: Yulina E. Riany, Divna Haslam, Matthew Sanders

Abstract:

This cross-cultural study aims to compare the level of parental depression and stress, parenting style use, and child emotional and behavioural problems between parents in Australia as an example of a Western country and parents in Indonesia as an example of Asian culture. A series of hierarchical regressions were undertaken to determine two models examining the factors that predict child problems residing in Australia (Model 1) and in Indonesia (Model 2). The online survey was completed by 179 parents in Australia and 448 parents in Indonesia. Results indicated that Australian parents reported higher levels of depression, authoritative parenting and higher levels of child misbehaviours compared to Indonesian parents. In comparison, Indonesian parents reported higher authoritarian parenting. Analyses performed to examine Model 1 and 2 revealed that parental negative emotional states and parenting style predicted child emotional and behavioural problems in both countries.

Keywords: cross-cutural study, parental stress, parenting, child misbehaviour

Procedia PDF Downloads 115
3217 A QoS Aware Cluster Based Routing Algorithm for Wireless Mesh Network Using LZW Lossless Compression

Authors: J. S. Saini, P. P. K. Sandhu

Abstract:

The multi-hop nature of Wireless Mesh Networks and the hasty progression of throughput demands results in multi- channels and multi-radios structures in mesh networks, but the main problem of co-channels interference reduces the total throughput, specifically in multi-hop networks. Quality of Service mentions a vast collection of networking technologies and techniques that guarantee the ability of a network to make available desired services with predictable results. Quality of Service (QoS) can be directed at a network interface, towards a specific server or router's performance, or in specific applications. Due to interference among various transmissions, the QoS routing in multi-hop wireless networks is formidable task. In case of multi-channel wireless network, since two transmissions using the same channel may interfere with each other. This paper has considered the Destination Sequenced Distance Vector (DSDV) routing protocol to locate the secure and optimised path. The proposed technique also utilizes the Lempel–Ziv–Welch (LZW) based lossless data compression and intra cluster data aggregation to enhance the communication between the source and the destination. The use of clustering has the ability to aggregate the multiple packets and locates a single route using the clusters to improve the intra cluster data aggregation. The use of the LZW based lossless data compression has ability to reduce the data packet size and hence it will consume less energy, thus increasing the network QoS. The MATLAB tool has been used to evaluate the effectiveness of the projected technique. The comparative analysis has shown that the proposed technique outperforms over the existing techniques.

Keywords: WMNS, QOS, flooding, collision avoidance, LZW, congestion control

Procedia PDF Downloads 337
3216 On Flow Consolidation Modelling in Urban Congested Areas

Authors: Serban Stere, Stefan Burciu

Abstract:

The challenging and continuously growing competition in the urban freight transport market emphasizes the need for optimal planning of transportation processes in terms of identifying the solution of consolidating traffic flows in congested urban areas. The aim of the present paper is to present the mathematical framework and propose a methodology of combining urban traffic flows between the distribution centers located at the boundary of a congested urban area. The three scenarios regarding traffic flow between consolidation centers that are taken into consideration in the paper are based on the same characteristics of traffic flows. The scenarios differ in terms of the accessibility of the four consolidation centers given by the infrastructure, the connections between them, and the possibility of consolidating traffic flows for one or multiple destinations. Also, synthetical indicators will allow us to compare the scenarios considered and chose the indicated for our distribution system.

Keywords: distribution system, single and multiple destinations, urban consolidation centers, traffic flow consolidation schemes

Procedia PDF Downloads 154
3215 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 205
3214 The Acceptance of E-Assessment Considering Security Perspective: Work in Progress

Authors: Kavitha Thamadharan, Nurazean Maarop

Abstract:

The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of e-assessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.

Keywords: secure technology acceptance, e-assessment security, e-assessment, education technology

Procedia PDF Downloads 454
3213 Application of FT-NIR Spectroscopy and Electronic Nose in On-line Monitoring of Dough Proofing

Authors: Madhuresh Dwivedi, Navneet Singh Deora, Aastha Deswal, H. N. Mishra

Abstract:

FT-NIR spectroscopy and electronic nose was used to study the kinetics of dough proofing. Spectroscopy was conducted with an optic probe in the diffuse reflectance mode. The dough leavening was carried out at different temperatures (25 and 35°C) and constant RH (80%). Spectra were collected in the range of wave numbers from 12,000 to 4,000 cm-1 directly on the samples, every 5 min during proofing, up to 2 hours. NIR spectra were corrected for scatter effect and second order derivatization was done to transform the spectra. Principal component analysis (PCA) was applied for the leavening process and process kinetics was calculated. PCA was performed on data set and loadings were calculated. For leavening, four absorption zones (8,950-8,850, 7,200-6,800, 5,250-5,150 and 4,700-4,250 cm-1) were involved in describing the process. Simultaneously electronic nose was also used for understanding the development of odour compounds during fermentation. The electronic nose was able to differential the sample on the basis of aroma generation at different time during fermentation. In order to rapidly differentiate samples based on odor, a Principal component analysis is performed and successfully demonstrated in this study. The result suggests that electronic nose and FT-NIR spectroscopy can be utilized for the online quality control of the fermentation process during leavening of bread dough.

Keywords: FT-NIR, dough, e-nose, proofing, principal component analysis

Procedia PDF Downloads 383
3212 ChaQra: A Cellular Unit of the Indian Quantum Network

Authors: Shashank Gupta, Iteash Agarwal, Vijayalaxmi Mogiligidda, Rajesh Kumar Krishnan, Sruthi Chennuri, Deepika Aggarwal, Anwesha Hoodati, Sheroy Cooper, Ranjan, Mohammad Bilal Sheik, Bhavya K. M., Manasa Hegde, M. Naveen Krishna, Amit Kumar Chauhan, Mallikarjun Korrapati, Sumit Singh, J. B. Singh, Sunil Sud, Sunil Gupta, Sidhartha Pant, Sankar, Neha Agrawal, Ashish Ranjan, Piyush Mohapatra, Roopak T., Arsh Ahmad, Nanjunda M., Dilip Singh

Abstract:

Major research interests on quantum key distribution (QKD) are primarily focussed on increasing 1. point-to-point transmission distance (1000 Km), 2. secure key rate (Mbps), 3. security of quantum layer (device-independence). It is great to push the boundaries on these fronts, but these isolated approaches are neither scalable nor cost-effective due to the requirements of specialised hardware and different infrastructure. Current and future QKD network requires addressing different sets of challenges apart from distance, key rate, and quantum security. In this regard, we present ChaQra -a sub-quantum network with core features as 1) Crypto agility (integration in the already deployed telecommunication fibres), 2) Software defined networking (SDN paradigm for routing different nodes), 3) reliability (addressing denial-of-service with hybrid quantum safe cryptography), 4) upgradability (modules upgradation based on scientific and technological advancements), 5) Beyond QKD (using QKD network for distributed computing, multi-party computation etc). Our results demonstrate a clear path to create and accelerate quantum secure Indian subcontinent under the national quantum mission.

Keywords: quantum network, quantum key distribution, quantum security, quantum information

Procedia PDF Downloads 50
3211 Sexual and Reproductive Health for Women in Africa: Adopting a Human Rights Based Approach to Overcome Cultural Barriers

Authors: Seraphina Bakta

Abstract:

In many societies in Africa, it is a taboo to speak, let alone to practice or in any way to engage in matters relating to sexual and reproductive health. For instance, girls using contraceptives may be labeled prostitutes, and married women using family planning methods may be divorced on account that they are disobedient to their husbands as they do not want to bear children. As such, sexual and reproductive health as a right is still very far from reality to many men and women. To a large extent, the objections are mainly backed up in culture, which is deeply rooted in many African traditions. While such culture have both the good and bad side, the African Charter on Human and Peoples Rights has identified the bad ones as’ harmful cultural practices. This paper argues that, while cultural norms may hinder the realization of human rights, adopting a human rights based approach to address harmful cultural practices is likely, the best approach to realizing women’s rights to sexual and reproductive health rights in Africa.

Keywords: rights, culture, health, women

Procedia PDF Downloads 122
3210 A Linearly Scalable Family of Swapped Networks

Authors: Richard Draper

Abstract:

A supercomputer can be constructed from identical building blocks which are small parallel processors connected by a network referred to as the local network. The routers have unused ports which are used to interconnect the building blocks. These connections are referred to as the global network. The address space has a global and a local component (g, l). The conventional way to connect the building blocks is to connect (g, l) to (g’,l). If there are K blocks, this requires K global ports in each router. If a block is of size M, the result is a machine with KM routers having diameter two. To increase the size of the machine to 2K blocks, each router connects to only half of the other blocks. The result is a larger machine but also one with greater diameter. This is a crude description of how the network of the CRAY XC® is designed. In this paper, a family of interconnection networks using routers with K global and M local ports is defined. Coordinates are (c,d, p) and the global connections are (c,d,p)↔(c’,p,d) which swaps p and d. The network is denoted D3(K,M) and is called a Swapped Dragonfly. D3(K,M) has KM2 routers and has diameter three, regardless of the size of K. To produce a network of size KM2 conventionally, diameter would be an increasing function of K. The family of Swapped Dragonflies has other desirable properties: 1) D3(K,M) scales linearly in K and quadratically in M. 2) If L < K, D3(K,M) contains many copies of D3(L,M). 3) If L < M, D3(K,M) contains many copies of D3(K,L). 4) D3(K,M) can perform an all-to-all exchange in KM2+KM time which is only slightly more than the time to do a one-to-all. This paper makes several contributions. It is the first time that a swap has been used to define a linearly scalable family of networks. Structural properties of this new family of networks are thoroughly examined. A synchronizing packet header is introduced. It specifies the path to be followed and it makes it possible to define highly parallel communication algorithm on the network. Among these is an all-to-all exchange in time KM2+KM. To demonstrate the effectiveness of the swap properties of the network of the CRAY XC® and D3(K,16) are compared.

Keywords: all-to-all exchange, CRAY XC®, Dragonfly, interconnection network, packet switching, swapped network, topology

Procedia PDF Downloads 117
3209 Signs and Symbols of a Modern Sufi Ceremony in Istanbul

Authors: Antonio De Lisa

Abstract:

The aim of this contribution is to describe a Sufi ceremony personally observed and recorded in Istanbul. It is part of research on the semiotics of religion that has been going on for some time. Over the centuries, Sufism has produced remarkable literature, elaborated mainly in the context of Arabic literature and Persian literature, but has also found expression in many other languages (Turkish, Indian, Malayo-Indonesian, etc.). Among the genres cultivated are: devotional books (prayers, meditation, spiritual exercises, etc.); the hagiographic texts, containing the biographies and sentences of the best-known Sufis; the texts that illustrate the abodes or stations of the spiritual path; finally, the theoretical treatises on various topics, often of an apologetic nature. Another typical expression of Sufism is in the literature in verse, which includes first-rate poets of both Arabic (Ibn al-Farid, Ibn 'Arabi) and Persian (Farid al-Din al-Attar, Rumi, Hafez, Gohar Shahi) expression. To observe an authentic Sufi ceremony, we contacted the Silivrikapı Mevlana Cultural Center in Istanbul. The ceremony we will talk about is a characteristic of the brotherhood called Mevleviyye (Mawlawiyya), so called from Mawlānā ('our lord', in Turkish: Mevlānā) Jalāl al-Dīn Muḥammad Rūmī (13th century) better known as the brotherhood of the Whirling Dervishes, founded in Konya. The characteristic of the order is to pray about one's love for Allah with music and dance in a ritual that has the name of Semà. The dance is a swirling movement in a group, representing a mystical journey of the spiritual ascent of man through the mind and love for the 'perfect'. Turning towards the truth, the follower of the group ascends towards love, passing beyond the World and Nothingness. After asceticism, he returns to the common world to communicate his own experience.

Keywords: semiotics of religion, sufi, rumi, islamic philosophy

Procedia PDF Downloads 87
3208 Numerical Modeling of Waves and Currents by Using a Hydro-Sedimentary Model

Authors: Mustapha Kamel Mihoubi, Hocine Dahmani

Abstract:

Over recent years much progress has been achieved in the fields of numerical modeling shoreline processes: waves, currents, waves and current. However, there are still some problems in the existing models to link the on the first, the hydrodynamics of waves and currents and secondly, the sediment transport processes and due to the variability in time, space and interaction and the simultaneous action of wave-current near the shore. This paper is the establishment of a numerical modeling to forecast the sediment transport from development scenarios of harbor structure. It is established on the basis of a numerical simulation of a water-sediment model via a 2D model using a set of codes calculation MIKE 21-DHI software. This is to examine the effect of the sediment transport drivers following the dominant incident wave in the direction to pass input harbor work under different variants planning studies to find the technical and economic limitations to the sediment transport and protection of the harbor structure optimum solution.

Keywords: swell, current, radiation, stress, mesh, mike21, sediment

Procedia PDF Downloads 465
3207 Older Consumer’s Willingness to Trust Social Media Advertising: A Case of Australian Social Media Users

Authors: Simon J. Wilde, David M. Herold, Michael J. Bryant

Abstract:

Social media networks have become the hotbed for advertising activities due mainly to their increasing consumer/user base and, secondly, owing to the ability of marketers to accurately measure ad exposure and consumer-based insights on such networks. More than half of the world’s population (4.8 billion) now uses social media (60%), with 150 million new users having come online within the last 12 months (to June 2022). As the use of social media networks by users grows, key business strategies used for interacting with these potential customers have matured, especially social media advertising. Unlike other traditional media outlets, social media advertising is highly interactive and digital channel specific. Social media advertisements are clearly targetable, providing marketers with an extremely powerful marketing tool. Yet despite the measurable benefits afforded to businesses engaged in social media advertising, recent controversies (such as the relationship between Facebook and Cambridge Analytica in 2018) have only heightened the role trust and privacy play within these social media networks. Using a web-based quantitative survey instrument, survey participants were recruited via a reputable online panel survey site. Respondents to the survey represented social media users from all states and territories within Australia. Completed responses were received from a total of 258 social media users. Survey respondents represented all core age demographic groupings, including Gen Z/Millennials (18-45 years = 60.5% of respondents) and Gen X/Boomers (46-66+ years = 39.5% of respondents). An adapted ADTRUST scale, using a 20 item 7-point Likert scale, measured trust in social media advertising. The ADTRUST scale has been shown to be a valid measure of trust in advertising within traditional media, such as broadcast media and print media, and, more recently, the Internet (as a broader platform). The adapted scale was validated through exploratory factor analysis (EFA), resulting in a three-factor solution. These three factors were named reliability, usefulness and affect, and the willingness to rely on. Factor scores (weighted measures) were then calculated for these factors. Factor scores are estimates of the scores survey participants would have received on each of the factors had they been measured directly, with the following results recorded (Reliability = 4.68/7; Usefulness and Affect = 4.53/7; and Willingness to Rely On = 3.94/7). Further statistical analysis (independent samples t-test) determined the difference in factor scores between the factors when age (Gen Z/Millennials vs. Gen X/Boomers) was utilized as the independent, categorical variable. The results showed the difference in mean scores across all three factors to be statistically significant (p<0.05) for these two core age groupings: (1) Gen Z/Millennials Reliability = 4.90/7 vs. Gen X/Boomers Reliability = 4.34/7; (2) Gen Z/Millennials Usefulness and Affect = 4.85/7 vs Gen X/Boomers Usefulness and Affect = 4.05/7; and (3) Gen Z/Millennials Willingness to Rely On = 4.53/7 vs Gen X/Boomers Willingness to Rely On = 3.03/7. The results clearly indicate that older social media users lack trust in the quality of information conveyed in social media ads when compared to younger, more social media-savvy consumers. This is especially evident with respect to Factor 3 (Willingness to Rely On), whose underlying variables reflect one’s behavioral intent to act based on the information conveyed in advertising. These findings can be useful to marketers, advertisers, and brand managers in that the results highlight a critical need to design ‘authentic’ advertisements on social media sites to better connect with these older users in an attempt to foster positive behavioral responses from within this large demographic group – whose engagement with social media sites continues to increase year on year.

Keywords: social media advertising, trust, older consumers, internet studies

Procedia PDF Downloads 32
3206 The Meaning of Stillness: Based on the Errand Boy Project in Tibet during the Pandemic Quarantine in Shanghai in the Mayday Holiday

Authors: Mingyuan Duan

Abstract:

Many scholars have paid attention to the relationship between mobility and stillness, but most of them focus on stillness from the perspective of serving mobility. This study believes that more attention should be paid to the importance of stillness, and we suggest reexamining the meaning of stillness in terms of the value of stillness to people. The Errand Boy Project was launched by a social innovation enterprise called Bottle Dream during the May Day holiday in 2022. It linked volunteers from all over the world online to help people who are trapped at home due to the epidemic realize their outdoor wishes: get closer to nature and relieve their anxious mood. Taking Errand Boy in Tibet as a case study, this paper analyzes the emotional expressions and comments of people with limited mobility in the face of nature in the webcast room and explains the importance of stillness to humans from a non-human perspective. This study points out that the significance of stillness to human beings during the pandemic is composed of three aspects: the sense of solidity established by a steady mobile phone network connection, the stable possibility of wish fulfillment predicted by the periodic regularity of plant growth, and the transcendent spiritual power from the stable sacred mountain.

Keywords: stillness, non-human, pandemic, mobility

Procedia PDF Downloads 66
3205 Gawa Gawa Lang ‘Yan: A Qualitative Study of the Perception of Mental Health between Generations X and Z in Metro Manila, Philippines

Authors: Pierre Angelo Alino, Rafael Alejandro Ang, Maria Carmela Espanol, Dominic Gerard Ferreol, Jendrietch Adrian Lopez

Abstract:

This study aims to explore the differences in perception between Generation X and Generation Z towards mental health and mental health illnesses. Through this study, the researchers seek to identify and explore the differences that exist in the generational perception and determine the possible factors that influence the difference in perception. In order to achieve this, we conducted two focus group discussions (FGD), one composed of Generation X and the other composed of Generation Z. Participants for both focus group discussions were recruited through purposive sampling and online recruitment methods. In these discussions, they were asked questions relating to their personal history, experiences with mental health, and related illnesses, as well as their opinions regarding the subject matter. Afterwhich, we analyzed our data through a thematic analysis. Our study’s findings indicate notable differences in the perception of mental health as well as mental illness between the members of Generations X and Z. Additionally, factors such as culture, personal history, and intimate relationships influence the perceptions of mental health between generation groups.

Keywords: generational difference, mental health, mental health illness, perception

Procedia PDF Downloads 202
3204 From Parents to Pioneers: Examining Parental Impact on Entrepreneurial Traits in Latin America

Authors: Bert Seither

Abstract:

Entrepreneurship is a critical driver of economic growth, especially in emerging regions such as Latin America. This study investigates how parental influences, particularly parental individual entrepreneurial orientation (IEO), shape the entrepreneurial traits of Latin American entrepreneurs. By examining key factors like parental IEO, work ethic, parenting style, and family support, this research assesses how much of an entrepreneur's own IEO can be attributed to parental influence. The study also explores how socio-economic status and cultural context moderate the relationship between parental traits and entrepreneurial orientation. Data will be collected from 600 Latin American entrepreneurs via an online survey. This research aims to provide a comprehensive understanding of the intergenerational transmission of entrepreneurial traits and the broader socio-cultural factors that contribute to entrepreneurial success in diverse contexts. Findings from this study will offer valuable insights for policymakers, educators, and business leaders on fostering entrepreneurship across Latin America, providing practical applications for shaping entrepreneurial behavior through family influences.

Keywords: entrepreneurial orientation, parental influence, Latin American entrepreneurs, socio-economic status, cultural context

Procedia PDF Downloads 11
3203 Guideline for Happy Living According to Sufficiency Economy Philosophy of People and Community Leaders in Urban Communities

Authors: Phusit Phukamchanoad

Abstract:

This research was to analyze personality’s activities based on sufficiency economy philosophy of people and community leaders in urban communities. The data were collected through questionnaires administered to 392 people and interviewed with community leaders. It was found that most people revealed that their lives depend on activities in accordance with the sufficiency economy philosophy in high level especially, being honest and aware on sufficiency, occupations, peacefulness in the community leaders’ side, they reported on extravagant reduction, planting home vegetable garden, having household accounting, expense planning by dividing into 3 categories; 1) saving for illness cover 2) saving for business cover, and 3) household daily expense. The samples were also adjusted their livings quite well with the rapid change of urbanization. Although those people have encountered with any hardships, their honesty in occupations and awareness on sufficiency remain to survive happily.

Keywords: sufficiency economy philosophy, individual and household activities, urban community

Procedia PDF Downloads 358
3202 Investigating the Chemical Structure of Drinking Water in Domestic Areas of Kuwait by Appling GIS Technology

Authors: H. Al-Jabli

Abstract:

The research on the presence of heavy metals and bromate in drinking water is of immense scientific significance due to the potential risks these substances pose to public health. These contaminants are subject to regulatory limits outlined by the National Primary Drinking Water Regulations. Through a comprehensive analysis involving the compilation of existing data and the collection of new data via water sampling in residential areas of Kuwait, the aim is to create detailed maps illustrating the spatial distribution of these substances. Furthermore, the investigation will utilize GRAPHER software to explore correlations among different chemical parameters. By implementing rigorous scientific methodologies, the research will provide valuable insights for the Ministry of Electricity and Water and the Ministry of Health. These insights can inform evidence-based decision-making, facilitate the implementation of corrective measures, and support strategic planning for future infrastructure activities.

Keywords: heavy metals, bromate, ozonation, GIS

Procedia PDF Downloads 72
3201 21st Century Provocation: Modern Slavery, the Implications for Individuals on the Autism Spectrum

Authors: Christina Surmei

Abstract:

Autism Spectrum Disorder (ASD) is defined as a diverse range of developmental conditions that affect an individual’s functionality. ASD is not linear, and individuals can present with deficits in social interaction, communication, and demonstrate limited, repetitive patterns of behaviour, interests, or activities. These characteristics may be observed in a variety of ways and range from mild to severe. ASD may include autism disorder, pervasive developmental disorder not otherwise specified, Asperger’s, or other related pervasive developmental disorders. Modern slavery is defined as 'situations of exploitation that a person cannot refuse or leave because of threats, violence, coercion, and abuse of power or deception'. A review of the literature investigated the prevalence of research regarding ASD and modern slavery. Two universal search engines and five online journals were used as the apparatuses of inquiry. The results revealed two editorials, one study, and one act, totaling four publications attesting to ASD and modern slavery as a joint entity. This is representative of a vast absence of research. However, as individual entities research on autism and modern slavery is in a general high occurrence. This paper has identified a significant gap in research on ASD and modern slavery, and initiates the dialogue to unpack a significant global issue in society today.

Keywords: autism spectrum, education, modern slavery, support

Procedia PDF Downloads 165
3200 A Conceptual Framework for the Adoption of Information and Communication Technology for Anti-Corruption in the DR Congo

Authors: Itulelo Matiyabu Imaja, Patrick Ndayizigamiye, Manoj Maharaj

Abstract:

There are many catalysts of corruption. These include amongst others, lack of effective control measures to deter or detect corrupt behaviour. Literature suggests that ICT could assist in curbing corruption through the implementation of automated systems, citizens engagement through e-government and online media to name a few. In the Democratic Republic of Congo, lack of transparency and accountability in public funds collection and allocation contribute to corruption in funds mismanagement. Using the accountability theory and available literature, this paper analyses how Democratic Republic of Congo (DRC) institutions could be strengthened through ICT in order to deter instances of corruption. Findings reveal that DRC lacks reliable control, monitoring and evaluation mechanisms that could identify potentially corrupt behavior. In addition, citizens and civil society organizations who are meant to hold the institutions accountable are not given secure platform to express their views and potentially flag any corrupt behavior. Hence, the paper presents a preliminary conceptual framework that depicts how ICT could be used to strengthen current institutions to potentially deter corrupt behavior in public funds management in Congo.

Keywords: corruption, ICT adoption, transparency, DR Congo

Procedia PDF Downloads 181
3199 Transpersonal Model of an Individual's Creative Experiencef

Authors: Anatoliy Kharkhurin

Abstract:

Modifications that the prefix ‘trans-‘ refers to start within a person. This presentation focuses on the transpersonal that goes beyond the individual (trans-personal) to encompass wider aspects of humanities, specifically peak experience as a culminating stage of the creative act. It proposes a model according to which the peak experience results from a harmonious vibration of four spheres, which transcend an individual’s capacities and bring one to a qualitatively different level of experience. Each sphere represents an aspect of creative activity: superconscious, intellectual, emotive and active. Each sphere corresponds to one of four creative functions: authenticity, novelty, aesthetics, and utility, respectively. The creative act starts in the superconscious sphere: the supreme pleasure of Creation is reflected in creative pleasure, which is realized in creative will. These three instances serve as a source of force axes, which penetrate other spheres, and in place of infiltration establish restrictive, expansive, and integrative principles, respectively; the latter balances the other two and ensures a harmonious vibration within a sphere. This Hegelian-like triad is realized within each sphere in the form of creative capacities. The intellectual sphere nurtures capacities to invent and to elaborate, which are integrated by capacity to conceptualize. The emotive sphere nurtures satiation and restrictive capacities integrated by capacity to balance. The active sphere nurtures goal orientation and stabilization capacities integrated by capacity for self-expression. All four spheres vibrate within each other – the superconscious sphere being in the core of the structure followed by intellectual, emotive, and active spheres, respectively – thereby reflecting the path of creative production. If the spheres vibrate in-phase, their amplitudes amplify the creative energy; if in antiphase – the amplitudes reduce the creative energy. Thus, creative act is perceived as continuum with perfectly harmonious vibration within and between the spheres on one side and perfectly disharmonious vibration on the other.

Keywords: creativity, model, transpersonal, peak experience

Procedia PDF Downloads 348
3198 Firm-Created Social Media Communication and Consumer Brand Perceptions

Authors: Rabail Khalid

Abstract:

Social media has changed the business communication strategies in the corporate world. Firms are using social media to reach their maximum stakeholders in minimum time at different social media forums. The current study examines the role of firm-created social media communication on consumer brand perceptions and their loyalty to brand. An online survey is conducted through social media forums including Facebook and Twitter to collect data regarding social media communication of a well-reputed clothing company’s brand in Pakistan. A link is sent to 900 customers of that company. Out of 900 questionnaires, 534 were received. So, the response rate is 59.33%. During data screening and entry, 13 questionnaires are rejected due to incomplete answer. Therefore, 521 questionnaires are completed in all respect and seem to be helpful for the study. So, the positive response rate is 57.89%. The empirical results report positive and significant influence of company-generated social media communication on brand trust, brand equity, and brand loyalty. The findings of this study provide important information to the marketing professionals and brand managers to understand consumer behavior through social media communication.

Keywords: firm-created social media communication, brand trust, brand equity, consumer behavior, brand loyalty

Procedia PDF Downloads 383
3197 A Report on the Elearning Programme of the Irish College of General Practitioners Which Can Address Continuing Education Needs of Primary Care Physicians

Authors: Nicholas P. Fenlon, Aisling Lavelle, David Mclean, Margaret O'riordan

Abstract:

Background: The case for continuing professional development has been well made, and was formalized in Ireland in recent years through the enactment of the Medical Practitioner’s Act, which requires registered medical practitioners to complete a minimum of 50 hours CPD each year. The ICGP, who have been providing CPD opportunities to its members for many years, have responded to this need by developing a series of evidence-based, high-quality, multimedia modules across a range of clinical and non-clinical areas. (More traditional education opportunities are still being provided by the college also). Overview of Programme: The first module was released in September 2011, since when the eLearning program has grown steadily, and there are currently almost 20 modules available, with a further 5 in production. Each module contains three to six 10-minute video lessons, which use a combination of graphics, images, text, voice-over and clinical clips. These are supported by supplementary videos of expert pieces-to-camera, Q&As with content experts, clinical scenarios, external links and relevant documentation and other resources. Successful completion of MCQs will result in a Certificate of Completion, which can be printed or stored in Professional Competence portfolio. The Medical Practitioner’s Act requires doctors to gather CPD credits across 8 domains of practice, and various eLearning modules have been developed to address each. For instance, modules with a strong clinical content would include Management of Hypertension, Management of COPD, and Management of Asthma. Other modules focus on health promotion such as Promoting Smoking Cessation, Promoting Physical Activity, and Addressing Childhood Obesity. Modules where communication skills are keys include modules on Suicide Prevention and Management of Depression. Other modules, currently in development include non-clinical topics around risk management, including Confidentiality, Consent etc. Each module is developed by a core group, which includes where possible, a GP with a special interest in the area, and a content expert(s). The college works closely with a medical education consultant and a production company in developing and producing the modules. Modules can be accessed (with password) through the ICGP website and are available free to all ICGP members. Summary of Evaluation: There are over 1700 registered users to date (over 55% of College membership). The program was evaluated using an online survey in 2013 (N = 144/950 – 12%) and results were very positive overall but provided material for the further improvement of the program also. Future Plans: While knowledge can be imparted well through eLearning, skills and attitudes are more difficult to influence through an online environment. The college is now developing a series of linked workshops, which will lead to ICGP Professional Competence Awards. The first pilot workshop is scheduled for February 2015 and is Cardiology-themed. Participants will be required to complete the following 4 modules in advance of attending – Management of Hypertension, Management of Heart Failure, Promoting Smoking Cessation, and Promoting Physical Activity. The workshop will be case-based and interactive, addressing ECG Interpretation in General Practice. Conclusions: The ICGP have responded to members needs for high-quality evidence-based education delivered in a way that suits GPs.

Keywords: CPD opportunities, evidence-based, high quality, multimedia modules across a range of clinical and non-clinical areas, medical practitioner’s act

Procedia PDF Downloads 597
3196 Using Bidirectional Encoder Representations from Transformers to Extract Topic-Independent Sentiment Features for Social Media Bot Detection

Authors: Maryam Heidari, James H. Jones Jr.

Abstract:

Millions of online posts about different topics and products are shared on popular social media platforms. One use of this content is to provide crowd-sourced information about a specific topic, event or product. However, this use raises an important question: what percentage of information available through these services is trustworthy? In particular, might some of this information be generated by a machine, i.e., a bot, instead of a human? Bots can be, and often are, purposely designed to generate enough volume to skew an apparent trend or position on a topic, yet the consumer of such content cannot easily distinguish a bot post from a human post. In this paper, we introduce a model for social media bot detection which uses Bidirectional Encoder Representations from Transformers (Google Bert) for sentiment classification of tweets to identify topic-independent features. Our use of a Natural Language Processing approach to derive topic-independent features for our new bot detection model distinguishes this work from previous bot detection models. We achieve 94\% accuracy classifying the contents of data as generated by a bot or a human, where the most accurate prior work achieved accuracy of 92\%.

Keywords: bot detection, natural language processing, neural network, social media

Procedia PDF Downloads 111
3195 Reliability and Availability Analysis of Satellite Data Reception System using Reliability Modeling

Authors: Ch. Sridevi, S. P. Shailender Kumar, B. Gurudayal, A. Chalapathi Rao, K. Koteswara Rao, P. Srinivasulu

Abstract:

System reliability and system availability evaluation plays a crucial role in ensuring the seamless operation of complex satellite data reception system with consistent performance for longer periods. This paper presents a novel approach for the same using a case study on one of the antenna systems at satellite data reception ground station in India. The methodology involves analyzing system's components, their failure rates, system's architecture, generation of logical reliability block diagram model and estimating the reliability of the system using the component level mean time between failures considering exponential distribution to derive a baseline estimate of the system's reliability. The model is then validated with collected system level field failure data from the operational satellite data reception systems that includes failure occurred, failure time, criticality of the failure and repair times by using statistical techniques like median rank, regression and Weibull analysis to extract meaningful insights regarding failure patterns and practical reliability of the system and to assess the accuracy of the developed reliability model. The study mainly focused on identification of critical units within the system, which are prone to failures and have a significant impact on overall performance and brought out a reliability model of the identified critical unit. This model takes into account the interdependencies among system components and their impact on overall system reliability and provides valuable insights into the performance of the system to understand the Improvement or degradation of the system over a period of time and will be the vital input to arrive at the optimized design for future development. It also provides a plug and play framework to understand the effect on performance of the system in case of any up gradations or new designs of the unit. It helps in effective planning and formulating contingency plans to address potential system failures, ensuring the continuity of operations. Furthermore, to instill confidence in system users, the duration for which the system can operate continuously with the desired level of 3 sigma reliability was estimated that turned out to be a vital input to maintenance plan. System availability and station availability was also assessed by considering scenarios of clash and non-clash to determine the overall system performance and potential bottlenecks. Overall, this paper establishes a comprehensive methodology for reliability and availability analysis of complex satellite data reception systems. The results derived from this approach facilitate effective planning contingency measures, and provide users with confidence in system performance and enables decision-makers to make informed choices about system maintenance, upgrades and replacements. It also aids in identifying critical units and assessing system availability in various scenarios and helps in minimizing downtime and optimizing resource allocation.

Keywords: exponential distribution, reliability modeling, reliability block diagram, satellite data reception system, system availability, weibull analysis

Procedia PDF Downloads 82