Search results for: shared use
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 971

Search results for: shared use

611 Teaching Attentive Literature Reading in Higher Education French as a Foreign Language: A Pilot Study of a Flipped Classroom Teaching Model

Authors: Malin Isaksson

Abstract:

Teaching French as a foreign language usually implies teaching French literature, especially in higher education. Training university students in literary reading in a foreign language requires addressing several aspects at the same time: the (foreign) language, the poetic language, the aesthetic aspects of the studied works, and various interpretations of them. A pilot study sought to test a teaching model that would support students in learning to perform competent readings and short analyses of French literary works, in a rather independent manner. This shared practice paper describes the use of a flipped classroom method in two French literature courses, a campus course and an online course, and suggests that the teaching model may provide efficient tools for teaching literary reading and analysis in a foreign language. The teaching model builds on a high level of student activity and focuses on attentive reading, meta-perspectives such as theoretical concepts, individual analyses by students where said concepts are applied, and group discussions of the studied texts and of possible interpretations.

Keywords: attentive reading, flipped classroom, literature in foreign language studies, teaching literature analysis

Procedia PDF Downloads 100
610 Supervisor Controller-Based Colored Petri Nets for Deadlock Control and Machine Failures in Automated Manufacturing Systems

Authors: Husam Kaid, Abdulrahman Al-Ahmari, Zhiwu Li

Abstract:

This paper develops a robust deadlock control technique for shared and unreliable resources in automated manufacturing systems (AMSs) based on structural analysis and colored Petri nets, which consists of three steps. The first step involves using strict minimal siphon control to create a live (deadlock-free) system that does not consider resource failure. The second step uses an approach based on colored Petri net, in which all monitors designed in the first step are merged into a single monitor. The third step addresses the deadlock control problems caused by resource failures. For all resource failures in the Petri net model a common recovery subnet based on colored petri net is proposed. The common recovery subnet is added to the obtained system at the second step to make the system reliable. The proposed approach is evaluated using an AMS from the literature. The results show that the proposed approach can be applied to an unreliable complex Petri net model, has a simpler structure and less computational complexity, and can obtain one common recovery subnet to model all resource failures.

Keywords: automated manufacturing system, colored Petri net, deadlocks, siphon

Procedia PDF Downloads 110
609 Developing a Web-Based Workflow Management System in Cloud Computing Platforms

Authors: Wang Shuen-Tai, Lin Yu-Ching, Chang Hsi-Ya

Abstract:

Cloud computing is the innovative and leading information technology model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. In this paper, we aim at the development of workflow management system for cloud computing platforms based on our previous research on the dynamic allocation of the cloud computing resources and its workflow process. We took advantage of the HTML 5 technology and developed web-based workflow interface. In order to enable the combination of many tasks running on the cloud platform in sequence, we designed a mechanism and developed an execution engine for workflow management on clouds. We also established a prediction model which was integrated with job queuing system to estimate the waiting time and cost of the individual tasks on different computing nodes, therefore helping users achieve maximum performance at lowest payment. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for cloud computing platform. This development also helps boost user productivity by promoting a flexible workflow interface that lets users design and control their tasks' flow from anywhere.

Keywords: web-based, workflow, HTML5, Cloud Computing, Queuing System

Procedia PDF Downloads 289
608 A Study to Examine the Use of Traditional Agricultural Practices to Fight the Effects of Climate Change

Authors: Rushva Parihar, Anushka Barua

Abstract:

The negative repercussions of a warming planet are already visible, with biodiversity loss, water scarcity, and extreme weather events becoming ever so frequent. The agriculture sector is perhaps the most impacted, and modern agriculture has failed to defend farmers from the effects of climate change. This, coupled with the added pressure of higher demands for food production caused due to population growth, has only compounded the impact. Traditional agricultural practices that are routed in indigenous knowledge have long safeguarded the delicate balance of the ecosystem through sustainable production techniques. This paper uses secondary data to explore these traditional processes (like Beejamrita, Jeevamrita, sheep penning, earthen bunding, and others) from around the world that have been developed over centuries and focuses on how they can be used to tackle contemporary issues arising from climate change (such as nutrient and water loss, soil degradation, increased incidences of pests). Finally, the resulting framework has been applied to the context of Indian agriculture as a means to combat climate change and improve food security, all while encouraging documentation and transfer of local knowledge as a shared resource among farmers.

Keywords: sustainable food systems, traditional agricultural practices, climate smart agriculture, climate change, indigenous knowledge

Procedia PDF Downloads 103
607 Evidence of Conditional and Unconditional Cooperation in a Public Goods Game: Experimental Evidence from Mali

Authors: Maria Laura Alzua, Maria Adelaida Lopera

Abstract:

This paper measures the relative importance of conditional cooperation and unconditional cooperation in a large public goods experiment conducted in Mali. We use expectations about total public goods provision to estimate a structural choice model with heterogeneous preferences. While unconditional cooperation can be captured by common preferences shared by all participants, conditional cooperation is much more heterogeneous and depends on unobserved individual factors. This structural model, in combination with two experimental treatments, suggests that leadership and group communication incentivize public goods provision through different channels. First, We find that participation of local leaders effectively changes individual choices through unconditional cooperation. A simulation exercise predicts that even in the most pessimistic scenario in which all participants expect zero public good provision, 60% would still choose to cooperate. Second, allowing participants to communicate fosters conditional cooperation. The simulations suggest that expectations are responsible for around 24% of the observed public good provision and that group communication does not necessarily ameliorate public good provision. In fact, communication may even worsen the outcome when expectations are low.

Keywords: conditional cooperation, discrete choice model, expectations, public goods game, random coefficients model

Procedia PDF Downloads 283
606 The Effect of Nursing Teamwork Training on Nursing Teamwork Effectiveness

Authors: Manar Ahmed Elbadawy

Abstract:

Background: Empirical evidence suggested that improving nursing teamwork (NTW) may be the key to reducing medical error. The functioning nursing teams require open communication, mutual respect, and shared mental models to activate quality patient care. The complexity and the high demands for specialized nursing knowledge and skill also require nursing staff to consult with one another and work in teams regularly. The current study aimed to evaluate the effect of the nursing teamwork training program on nursing teamwork effectiveness. Design: A quasi-experimental (one group pretest-posttest) design was utilized. Three medical intensive care units at a teaching hospital affiliated to Cairo University Hospital, Egypt. Subjects: A convenient sample of 48 nursing staff worked at the selected units. The Nursing Teamwork Observational Checklist was used. Results: Total (NTW) mean scores exhibited quite elevation post-program implementation compared to preprogram and showed little decrease 3 months later ( = 2.52, SD = ± 0.27, mean % =51.98, = 2.72, SD = ± 0.20, mean %=72.45, = 2.67, SD = ± 0.11, mean %= 67.48 respectively). Conclusion: Implementation of (NTW) training program had a positive effect on increasing (NTW) effectiveness. Regular and frequent short-term teamwork training is important to be introduced as well as sustainable monitoring is required to ensure nursing attitudes, knowledge and skills’ change about teamwork effectiveness.

Keywords: effectiveness, nursing, teamwork, training

Procedia PDF Downloads 96
605 The Role of the State in Creating a Cosmopolitan Canada

Authors: Scott Staring

Abstract:

This paper critically examines the claim that Canada represents a uniquely ‘postnational’ model of political existence. Canadian political thinkers and politicians alike have played a role in casting their country as the vanguard of an order wherein national sovereignty is gradually being eclipsed, while political authority is increasingly integrated at the international level. Proponents of this view frequently cite as evidence Canada’s high number of foreign-born citizens, its official policy of multiculturalism, its ready embrace of international institutions, and its enthusiasm for international trade deals like NAFTA, CETA and the TPP. This paper builds on historical research to show that the postnationalist thesis has precedents in a Whig-inspired view of Canada that has long challenged the role of a strong central state in the country. An alternative portrait of Canada will be put forward, one that contests both the historical evidence for the Whig view as well as its theoretical presuppositions. The claim will be made that Canada’s celebrated diversity and openness is not the product of a nation-state in retreat; instead, it is largely the product of a strong and sovereign state that has intervened to create a sense of a shared concern amongst its citizens. Canada does indeed offer the world a model of cosmopolitanism, but it is a model that is rooted in the nation-state rather than its eclipse.

Keywords: Canada, cosmopolitanism, postnationalism, statism

Procedia PDF Downloads 179
604 Coordinated Renewal Planning of Civil Infrastructure Systems

Authors: Hesham Osman

Abstract:

The challenges facing aging urban infrastructure systems require a more holistic and comprehensive approach to their management. The large number of urban infrastructure renewal activities occurring in cities throughout the world leads to social, economic and environmental impacts on the communities in its vicinity. As such, a coordinated effort is required to streamline these activities. This paper presents a framework to enable temporal (time-based) coordination of water, sewer and road intervention activities. Intervention activities include routine maintenance, renewal, and replacement of physical assets. The coordination framework considers 1) Life-cycle costs, 2) Infrastructure level-of-service, and 3) Risk exposure to system operators. The model enables infrastructure asset managers to trade-off options of delaying versus bringing forward intervention activities of one system in order to be executed in conjunction with another co-located system in the right-of-way. The framework relies on a combination of meta-heuristics and goal-based optimization. In order to demonstrate the applicability of the framework, a case study for a major infrastructure corridor in Cairo, Egypt is taken as an example. Results show that the framework can be scaled-up to include other infrastructure systems located in the right-of-way like electricity, gas and telecom, provided that information can be shared among these entities.

Keywords: infrastructure, rehabilitation, construction, optimization

Procedia PDF Downloads 274
603 An Overview of the Current Status of Lake Jipe and Its Biodiversity Dilemma

Authors: Mercy Chepkirui, Paul Orina, Robin Abell, Leonard Akwany, Tonny Orina, Mercy Matuma, Rasowo Joseph

Abstract:

Lake jipe, a shared water resource between Kenya and Tanzania located at the East African Coast, is under multiple pressures. The lake has receded from 30Km2 to 27.32Km2 due to prolonged dry spells and intensified water abstraction for irrigation and re-route to Mungu ya Nyumba Dam in Tanzania. Agricultural activities have significantly (90%) contributed to the lake levels decline and further affected the lakes’ aquatic biodiversity. Among the most affected are the commercially important endemic fish species of the lake, of which Oreochromis jipe has experienced the greatest decline. Overfishing, use of illegal unreported and unregulated fishing gears, intensified fishing along protected fish breeding areas as well as poor management and uncoordinated conservation efforts have significantly contributed to the decline of fish catches from 348 kg of O. jipe in 2016 to 90 kg daily catches in 2022. Therefore, the lake is on the verge of extinction if no action is taken. This calls for awareness of the significance of the L. Jipe ecosystems and its immediate and long-term benefits. Further, there is a need to revive alternative economic activities, including aquaculture and sustainable agriculture, to offer alternative livelihood to local communities.

Keywords: biodiversity, ecosystem, conservation, fisheries

Procedia PDF Downloads 133
602 Children Protection in the Digital Space

Authors: Beverly Komen

Abstract:

Online crimes have been on the rise in the recent days, especially with the hit of the covid-19 pandemic. The coronavirus pandemic has led to an unprecedented rise in screen time, this means more families are relying on technology and digital solutions to keep children learning, spending more time on the virtual platforms can leave children vulnerable to online abuse and exploitation. With ease access of affordable phones, internet, and increased online activities, all children are at risk of being abused online hence making the digital space unsafe for children. With these increased use of technology and its accessibility, children are at risk of facing challenges such as access to inappropriate content, online grooming, identity theft, cyber bullying, among other risks. The big question is; as we enjoy the benefits brought in by technology, how do we ensure that our children are save in this digital space? With the analysis of the current trends, there is a gap in knowledge on people’s understanding on child online protection and safety measures when using the digital space. A survey conducted among 50 parents in Nairobi in Kenya indicated that there is a gap in knowledge on online protection of children and over 50 % of the participants shared that for sure they have no idea on how to protect children online. This paper seeks to address the concept of child protection in the digital space and come up with viable solutions in protecting children from online vices.

Keywords: child protection, digital space, online risks, online grooming, cyber bulying, online child sexual exploitation, and abuse

Procedia PDF Downloads 162
601 Predicting the Diagnosis of Alzheimer’s Disease: Development and Validation of Machine Learning Models

Authors: Jay L. Fu

Abstract:

Patients with Alzheimer's disease progressively lose their memory and thinking skills and, eventually, the ability to carry out simple daily tasks. The disease is irreversible, but early detection and treatment can slow down the disease progression. In this research, publicly available MRI data and demographic data from 373 MRI imaging sessions were utilized to build models to predict dementia. Various machine learning models, including logistic regression, k-nearest neighbor, support vector machine, random forest, and neural network, were developed. Data were divided into training and testing sets, where training sets were used to build the predictive model, and testing sets were used to assess the accuracy of prediction. Key risk factors were identified, and various models were compared to come forward with the best prediction model. Among these models, the random forest model appeared to be the best model with an accuracy of 90.34%. MMSE, nWBV, and gender were the three most important contributing factors to the detection of Alzheimer’s. Among all the models used, the percent in which at least 4 of the 5 models shared the same diagnosis for a testing input was 90.42%. These machine learning models allow early detection of Alzheimer’s with good accuracy, which ultimately leads to early treatment of these patients.

Keywords: Alzheimer's disease, clinical diagnosis, magnetic resonance imaging, machine learning prediction

Procedia PDF Downloads 121
600 Emotions in Health Tweets: Analysis of American Government Official Accounts

Authors: García López

Abstract:

The Government Departments of Health have the task of informing and educating citizens about public health issues. For this, they use channels like Twitter, key in the search for health information and the propagation of content. The tweets, important in the virality of the content, may contain emotions that influence the contagion and exchange of knowledge. The goal of this study is to perform an analysis of the emotional projection of health information shared on Twitter by official American accounts: the disease control account CDCgov, National Institutes of Health, NIH, the government agency HHSGov, and the professional organization PublicHealth. For this, we used Tone Analyzer, an International Business Machines Corporation (IBM) tool specialized in emotion detection in text, corresponding to the categorical model of emotion representation. For 15 days, all tweets from these accounts were analyzed with the emotional analysis tool in text. The results showed that their tweets contain an important emotional load, a determining factor in the success of their communications. This exposes that official accounts also use subjective language and contain emotions. The predominance of emotion joy over sadness and the strong presence of emotions in their tweets stimulate the virality of content, a key in the work of informing that government health departments have.

Keywords: emotions in tweets, emotion detection in the text, health information on Twitter, American health official accounts, emotions on Twitter, emotions and content

Procedia PDF Downloads 114
599 Studying the Load Sharing and Failure Mechanism of Hybrid Composite Joints Using Experiment and Finite Element Modeling

Authors: Seyyed Mohammad Hasheminia, Heoung Jae Chun, Jong Chan Park, Hong Suk Chang

Abstract:

Composite joints have been getting attention recently due to their high specific mechanical strength to weight ratio that is crucial for structures such as aircrafts and automobiles. In this study on hybrid joints, quasi-static experiments and finite element analysis were performed to investigate the failure mechanism of hybrid composite joint with respect to the joint properties such as the adhesive material, clamping force, and joint geometry. The outcomes demonstrated that the stiffness of the adhesive is the most imperative design parameter. In this investigation, two adhesives with various stiffness values were utilized. Regarding the joints utilizing the adhesive with the lower stiffness modulus, it was observed that the load was exchanged promptly through the adhesive since it was shared more proficiently between the bolt and adhesive. This phenomenon permitted the hybrid joints with low-modulus adhesive to support more prominent loads before failure when contrasted with the joints that utilize the stiffer adhesive. In the next step, the stress share between the bond and bolt as a function of various design parameters was studied using a finite element model in which it was understood that the geometrical parameters such as joint overlap and width have a significant influence on the load sharing between the bolt and the adhesive.

Keywords: composite joints, composite materials, hybrid joints, single-lap joint

Procedia PDF Downloads 381
598 User-Driven Product Line Engineering for Assembling Large Families of Software

Authors: Zhaopeng Xuan, Yuan Bian, C. Cailleaux, Jing Qin, S. Traore

Abstract:

Traditional software engineering allows engineers to propose to their clients multiple specialized software distributions assembled from a shared set of software assets. The management of these assets however requires a trade-off between client satisfaction and software engineering process. Clients have more and more difficult to find a distribution or components based on their needs from all of distributed repositories. This paper proposes a software engineering for a user-driven software product line in which engineers define a feature model but users drive the actual software distribution on demand. This approach makes the user become final actor as a release manager in software engineering process, increasing user product satisfaction and simplifying user operations to find required components. In addition, it provides a way for engineers to manage and assembly large software families. As a proof of concept, a user-driven software product line is implemented for eclipse, an integrated development environment. An eclipse feature model is defined, which is exposed to users on a cloud-based built platform from which clients can download individualized Eclipse distributions.

Keywords: software product line, model-driven development, reverse engineering and refactoring, agile method

Procedia PDF Downloads 411
597 Blockchain for Transport: Performance Simulations of Blockchain Network for Emission Monitoring Scenario

Authors: Dermot O'Brien, Vasileios Christaras, Georgios Fontaras, Igor Nai Fovino, Ioannis Kounelis

Abstract:

With the rise of the Internet of Things (IoT), 5G, and blockchain (BC) technologies, vehicles are becoming ever increasingly connected and are already transmitting substantial amounts of data to the original equipment manufacturers (OEMs) servers. This data could be used to help detect mileage fraud and enable more accurate vehicle emissions monitoring. This would not only help regulators but could enable applications such as permitting efficient drivers to pay less tax, geofencing for air quality improvement, as well as pollution tolling and trading platforms for transport-related businesses and EU citizens. Other applications could include traffic management and shared mobility systems. BC enables the transmission of data with additional security and removes single points of failure while maintaining data provenance, identity ownership, and the possibility to retain varying levels of privacy depending on the requirements of the applied use case. This research performs simulations of vehicles interacting with European member state authorities and European Commission BC nodes that are running hyperleger fabric and explores whether the technology is currently feasible for transport applications such as the emission monitoring use-case.

Keywords: future transportation systems, technological innovations, policy approaches for transportation future, economic and regulatory trends, blockchain

Procedia PDF Downloads 148
596 Online Teaching and Learning Processes: Declarative and Procedural Knowledge

Authors: Eulalia Torras, Andreu Bellot

Abstract:

To know whether students’ achievements are the result of online interaction and not just a consequence of individual differences themselves, it seems essential to link the teaching presence and social presence to the types of knowledge built. The research aim is to analyze the social presence in relation to two types of knowledge, declarative and procedural. Qualitative methodology has been used. The analysis of the contents was based on an observation protocol that included community of enquiry indicators and procedural and declarative knowledge indicators. The research has been conducted in three phases that focused on an observational protocol and indicators, results and conclusions. Results show that the teaching-learning processes have been characterized by the patterns of presence and types of knowledge. Results also show the importance of social presence support provided by the teacher and the students, not only in regard to the nature of the instructional support but also concerning how it is presented to the student and the importance that is attributed to it in the teaching-learning process, that is, what it is that assistance is offered on. In this study, we find that the presence based on procedural guidelines and declarative reflection, the management of shared meaning on the basis of the skills and the evidence of these skills entail patterns of learning. Nevertheless, the importance that the teacher attributes to each support aspect has a bearing on the extent to which the students reflect more on the given task.

Keywords: education, online, teaching and learning processes, knowledge

Procedia PDF Downloads 195
595 Second Order Journalism: A Study of Selected Niche Authorities on Facebook and Twitter

Authors: Yvonne Dedzo

Abstract:

Social media has become a powerful tool in bridging the distance between individuals regardless of their location. It has become a convenient platform for public discussion and, consequently, generated the phenomenon of citizen journalists who have become both proactive and reactive participants in the dissemination of news, information and other epochal and historical events. This phenomenon has fueled the growth of niche authorities who deliver exceptional democratically consequential information online. This study, therefore, investigates how some selected niche authorities maintain their status on social media. Using the selective processes theory, the study further interrogates the information shared by niche authorities and further analyses the extent to which a public interest-altruistic motive or personal interest-self-serving motive drives their agenda of new sharing and usage. Through cyber-ethnography and, qualitative content analysis and semi-structured interviews, data was gathered and analysed from the posts of two purposely selected niche authorities on Facebook and Twitter. The findings indicate that niche authorities maintain their status by being consistent, prompt, informative, resourceful and interactive in their postings on the social media platform. The study also discovered that even though niche authorities are motivated by both public interest-altruism and interest-self-serving, the latter had a higher of motivation than the former.

Keywords: social medida, citizen journalist, niche authorities, selective processes theory

Procedia PDF Downloads 41
594 Hybrid Bee Ant Colony Algorithm for Effective Load Balancing and Job Scheduling in Cloud Computing

Authors: Thomas Yeboah

Abstract:

Cloud Computing is newly paradigm in computing that promises a delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). As Cloud Computing is a newly style of computing on the internet. It has many merits along with some crucial issues that need to be resolved in order to improve reliability of cloud environment. These issues are related with the load balancing, fault tolerance and different security issues in cloud environment.In this paper the main concern is to develop an effective load balancing algorithm that gives satisfactory performance to both, cloud users and providers. This proposed algorithm (hybrid Bee Ant Colony algorithm) is a combination of two dynamic algorithms: Ant Colony Optimization and Bees Life algorithm. Ant Colony algorithm is used in this hybrid Bee Ant Colony algorithm to solve load balancing issues whiles the Bees Life algorithm is used for optimization of job scheduling in cloud environment. The results of the proposed algorithm shows that the hybrid Bee Ant Colony algorithm outperforms the performances of both Ant Colony algorithm and Bees Life algorithm when evaluated the proposed algorithm performances in terms of Waiting time and Response time on a simulator called CloudSim.

Keywords: ant colony optimization algorithm, bees life algorithm, scheduling algorithm, performance, cloud computing, load balancing

Procedia PDF Downloads 601
593 Investigating Nurses’ Burnout Experiences on TikTok

Authors: Claire Song

Abstract:

Background: TikTok is an emerging social media platform creating an outlet for nurses to express and communicate their nursing experiences and stress related to nursing. Purpose: This study investigates the lived experiences of nursing burnout shared on TikTok. Method: The cross-sectional content analysis examines the video content, format, type, and quantitative indicators, including the number of likes and comments. Results: A total of 35 videos and 18616 comments were examined, published between November 2020 and May 2023. Combined, these 35 videos received 24859 comments and 1159669 of likes. Most of the videos included nurses, and 12 included nurses in professional attire. Three videos included interviewers in the video, but the rest of the videos were self-recorded. Four themes of nurses’ burnout experiences were identified: 1) high-intensity work environment, 2) negative internal perception, 3) culture of nursing work, and 4) poor teamwork experience. Conclusion: This study explored the description of nurses’ burnout experiences via a creative platform. Social media, such as TikTok, is a valuable outlet for healthcare providers to express and share their experiences. Future research might consider using the social media platform to explore coping strategies and resilience in nurses who experienced burnout.

Keywords: burnout, emotional wellbeing, nursing, social media

Procedia PDF Downloads 60
592 Interrogating Democracy and Development in Africa: A Case Study of Nigeria

Authors: Yusuf Bala

Abstract:

The last decades of the 20th Centaury witnessed renewed hope about the birth of democracy and development in Africa the interface between democracy and development in Africa has long engaged the sustained interest of scholars and researchers across Africa. The process was actively supported by all segment of society, labour students market women, rural dweller who saw in it, the prospects of reversing the trend of political despair and in disillusionment that hither to characterized political life in Africa. The political tyranny and dictatorship while having it own clientele and beneficiaries had negative and suffocating effect on the majority of the people. The democratic aspiration of the Africa people is not only confined to the Arena of political Democracy of election and granting of civil and political rights, but it involves the demand for economic empowerment better living standards of the people and adequate social welfare indeed, for the majority of the people democracy is meaningful only when it delivers socio-economic goods. However, democracy and development have generated enormous interest no conclusive evidence seems to be shared in Africa. In the course of this research emphasis shall be made on certain issues, such as issues of corruption in democracy in Africa, ethnic conflict and democracy in Africa contribution of women to democratic practice and women participation in political arena, is still very low, democratization process and industrial relation in Africa as factor that hinder the development of Democracy in Africa, a case study of Nigeria.

Keywords: democracy, development, dictatorship, conflict, ethnicity

Procedia PDF Downloads 295
591 Understanding Music through the Framework of Feminist Confessional Literary Criticism: Heightening Audience Identification and Prioritising the Female Voice

Authors: Katharine Pollock

Abstract:

Feminist scholars assert that a defining aspect of feminist confessional literature is that it expresses both an individual and communal identity, one which is predicated on the commonly-shared aspects of female experience. Reading feminist confessional literature in this way accommodates a plurality of readerly experiences and textual interpretations. It affirms the individual whilst acknowledging those experiences which bind women together, and refuses traditional objective criticism. It invites readers to see themselves reflected in the text, and encourages them to share their own stories. Similarly, music which communicates women’s personal experience, fictive or not, expresses a dual identity. There is an inherent risk of imposing a confessional reading upon a musical or literary text. Understanding music as being multivocal in the same way as confessional literature negates this patriarchal tendency, and allows listeners to engage with both the subjective and collective aspects of a text. By hearing their own stories reflected in the music, listeners engage in an ongoing dialogic process in which female stories are prioritised. This refuses patriarchal silencing and ensures a diversity of female voices. To demonstrate the veracity of these claims, literary criticism is applied to Lily Allen’s music, and memoir My Thoughts Exactly.

Keywords: confession, female, feminist, literature, music

Procedia PDF Downloads 119
590 The Effectiveness of Banks’ Web Sites: A Study of Turkish Banking Sector

Authors: Raif Parlakkaya, Huseyin Cetin, Duygu Irdiren

Abstract:

By the development of World Wide Web, the usage rate of Internet has rapidly grown globally; and provided a basis for the emergence of electronic business. As well as other sectors, the banking sector has adopted the use of internet with the developments in information and communication technologies. Due to the public disclosure and transparency principle of Corporate Governance, the importance of information disclosure of banks on their web sites has increased significantly. For the purpose of this study, a Bank Disclosure Attribute Index (BDAI) in Turkey has been constructed through classifying the information disclosure on banks’ web sites into general, financial, investors and corporate governance attributes. All 47 banks in Turkish Banking System have been evaluated according to the index with the aim of providing a comparison between banks. By Chi Square Test, Pearson Correlation, T-Test, and ANOVA statistical tools, it has been concluded that the majority of banks in Turkey have shared information on their web sites adequately with respect to their total index score. Although there is a positive correlation between various types of information on banks’ web sites, there is no uniformity among them. Also, no significant difference between various types of information disclosure and bank types has been observed. Compared with the total index score averages of the five largest banks in Turkey, there are some banks that need to improve the content of their web sites.

Keywords: internet banking, websites evaluation, customer adoption, Turkey

Procedia PDF Downloads 371
589 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology

Authors: Mark Davey

Abstract:

Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.

Keywords: embedded systems, multiprocessor, network on chip, side channel

Procedia PDF Downloads 49
588 Interference Management in Long Term Evolution-Advanced System

Authors: Selma Sbit, Mohamed Bechir Dadi, Belgacem Chibani Rhaimi

Abstract:

Incorporating Home eNodeB (HeNB) in cellular networks, e.g. Long Term Evolution Advanced (LTE-A), is beneficial for extending coverage and enhancing capacity at low price especially within the non-line-of sight (NLOS) environments such as homes. HeNB or femtocell is a small low powered base station which provides radio coverage to the mobile users in an indoor environment. This deployment results in a heterogeneous network where the available spectrum becomes shared between two layers. Therefore, a problem of Inter Cell Interference (ICI) appears. This issue is the main challenge in LTE-A. To deal with this challenge, various techniques based on frequency, time and power control are proposed. This paper deals with the impact of carrier aggregation and higher order MIMO (Multiple Input Multiple Output) schemes on the LTE-Advanced performance. Simulation results show the advantages of these schemes on the system capacity (4.109 b/s/Hz when bandwidth B=100 MHz and when applying MIMO 8x8 for SINR=30 dB), maximum theoretical peak data rate (more than 4 Gbps for B=100 MHz and when MIMO 8x8 is used) and spectral efficiency (15 b/s/Hz and 30b/s/Hz when MIMO 4x4 and MIMO 8x8 are applying respectively for SINR=30 dB).

Keywords: capacity, carrier aggregation, LTE-Advanced, MIMO (Multiple Input Multiple Output), peak data rate, spectral efficiency

Procedia PDF Downloads 230
587 Blockchain-Based Approach on Security Enhancement of Distributed System in Healthcare Sector

Authors: Loong Qing Zhe, Foo Jing Heng

Abstract:

A variety of data files are now available on the internet due to the advancement of technology across the globe today. As more and more data are being uploaded on the internet, people are becoming more concerned that their private data, particularly medical health records, are being compromised and sold to others for money. Hence, the accessibility and confidentiality of patients' medical records have to be protected through electronic means. Blockchain technology is introduced to offer patients security against adversaries or unauthorised parties. In the blockchain network, only authorised personnel or organisations that have been validated as nodes may share information and data. For any change within the network, including adding a new block or modifying existing information about the block, a majority of two-thirds of the vote is required to confirm its legitimacy. Additionally, a consortium permission blockchain will connect all the entities within the same community. Consequently, all medical data in the network can be safely shared with all authorised entities. Also, synchronization can be performed within the cloud since the data is real-time. This paper discusses an efficient method for storing and sharing electronic health records (EHRs). It also examines the framework of roles within the blockchain and proposes a new approach to maintain EHRs with keyword indexes to search for patients' medical records while ensuring data privacy.

Keywords: healthcare sectors, distributed system, blockchain, electronic health records (EHR)

Procedia PDF Downloads 167
586 An Application Framework for Integrating Wireless Sensor and Actuator Networks for Precision Farmingas Web of Things to Cloud Interface Using PaaS

Authors: Sumaya Ismail, Aijaz Ahmad Reshi

Abstract:

The advances in sensor and embedded technologies have led to rapid developments in Wireless Sensor Networks (WSNs). Presently researchers focus on the integration of WSNs to the Internet for their pervasive availability to access these network resources as the interoperable subsystems. The recent computing technologies like cloud computing has made resource sharing as a converged infrastructure with required service interfaces for the shared resources over the Internet. This paper presents application architecture for wireless Sensor and Actuator Networks (WSANS) following web of things, which allows easy integration of each node to the Internet in order to provide them with web accessibility. The architecture enables the sensors and actuator nodes accessed and controlled using cloud interface on WWW. The application architecture was implemented using existing web and its emerging technologies. In particular, the Representational State Transfer protocol (REST) was extended for the specific requirements of the application. The Cloud computing environment has been used as a development platform for the application to assess the possibility of integrating the WSAN nodes to Cloud services. The mushroom farm environment monitoring and control using WSANs has been taken as a research use case.

Keywords: WSAN, REST, web of things, ZigBee, cloud interface, PaaS, sensor gateway

Procedia PDF Downloads 78
585 Designing a Model for Preparing Reports on the Automatic Earned Value Management Progress by the Integration of Primavera P6, SQL Database, and Power BI: A Case Study of a Six-Storey Concrete Building in Mashhad, Iran

Authors: Hamed Zolfaghari, Mojtaba Kord

Abstract:

Project planners and controllers are frequently faced with the challenge of inadequate software for the preparation of automatic project progress reports based on actual project information updates. They usually make dashboards in Microsoft Excel, which is local and not applicable online. Another shortcoming is that it is not linked to planning software such as Microsoft Project, which lacks the database required for data storage. This study aimed to propose a model for the preparation of reports on automatic online project progress based on actual project information updates by the integration of Primavera P6, SQL database, and Power BI for a construction project. The designed model could be applicable to project planners and controller agents by enabling them to prepare project reports automatically and immediately after updating the project schedule using actual information. To develop the model, the data were entered into P6, and the information was stored on the SQL database. The proposed model could prepare a wide range of reports, such as earned value management, HR reports, and financial, physical, and risk reports automatically on the Power BI application. Furthermore, the reports could be published and shared online.

Keywords: primavera P6, SQL, Power BI, EVM, integration management

Procedia PDF Downloads 83
584 An Evaluation of Kahoot Application and Its Environment as a Learning Tool

Authors: Muhammad Yasir Babar, Ebrahim Panah

Abstract:

Over the past 20 years, internet has seen continual advancement and with the advent of online technology, various types of web-based games have been developed. Games are frequently being used among different age groups from baby boomers to generation Z. Games are not only used for entertainment but also utilized as a learning approach transmitting education to a level that is more interesting and effective for students. One of the popular web-based education games is Kahoot with growing popularity and usage, which is being used in different fields of studies. However, little knowledge is available on university students’ perception of Kahoot environment and application for learning subjects. Hence, the objective of the current study is to investigate students’ perceptions of Kahoot application and environment as a learning tool. The study employed a survey approach by distributing Google Forms –created questionnaire, with high level of reliability index, to 62 students (11 males and 51 females). The findings show that students have positive attitudes towards Kahoot application and its environment for learning. Regarding Kahoot application, it was indicated that activities created using Kahoot are more interesting for students, Kahoot is useful for collaborative learning, and Kahoot enhances interest in learning lesson. In terms of Kahoot environment, it was found that using this application through mobile is easy for students, its design is simple and useful, Kahoot-created activities can easily be shared, and the application can easily be used on any platform. The findings of the study have implications for instructors, policymakers and curriculum developers.

Keywords: application, environment, Kahoot, learning tool

Procedia PDF Downloads 109
583 Relationship Between Collegiality and the EQ of Leaders

Authors: Prakash Singh

Abstract:

Being a collegial leader would require such a person to promote an organizational passion that identifies and acknowledges the contribution of every employee. Collegiality is about sharing responsibilities and being accountable for one’s actions. Leaders must therefore be equipped with the knowledge, skills, abilities, beliefs, and dispositions that will allow them to succeed in their organizations. These abilities should not only dwell on cognition alone, but also, equally, on the development of their emotional intelligence (EQ). It is therefore a myth that leaders are entrusted with absolute power to manage all the resources of their organizations. Workers feel confident with leaders who are adaptable, flexible and supportive when it comes to shared decision-making and the devolution of power within the organization. Research strongly supports the notion that a leader requires a high level of EQ in addition to IQ (cognitive intelligence) to achieve the goals of the organization. On the other hand, traditional managers require cognitive abilities and technical skills to get the work done by their employees. This does not imply that management is not important in organizations. However, the approach of managers becomes highly critical when the focus is purely task orientated. Enabling or empowering employees, therefore, is an important aspect in establishing emotionally intelligent collaboration, as the willing and satisfied participation of the employees can be the result of leaders’ commitment to establishing a collegial working environment as demonstrated by their behaviours. This paper therefore analyses why it matters for ideal leaders to be imbued with the traits of EQ and collegiality.

Keywords: collegiality, emotional intelligence, empowering employees, traditional managers

Procedia PDF Downloads 329
582 Conceptual Study on 4PL and Activities in Turkey

Authors: Berna Kalkan, Kenan Aydin

Abstract:

Companies give importance customer satisfaction to compete the developing and changing market. This is possible when customer reaches the right product, right quality, place, time and cost. In this regard, the extension of logistics services has played active role on formation and development of the different logistics services concept. The concept of logistics services has played important role involved in the healing of economic indicators today. Companies can use logistics providers, thus have competitive advantage and low cost, reducing time, tobe flexibility. In recent years, Fourth Party Logistics (4PL) has emerged as a new concept that includes relationship between suppliers and firms in outsourcing. 4PL provider is an integrator that offers comprehensive supply chain solutions with the technology, resources and capabilities that it possesses. Also, 4PL has attracted as a popular research topic attention in the recent past. In this paper, logistics outsourcing and 4PL concepts are analyzed and a literature review on 4PL activities is given. Also, the previous studies in literature and the approaches that are used in previous studies in literature is presented by analysing on 4PL activities. In this context, a field study will be applied to 4PL providers and service buyer in Turkey. If necessary, results related to this study will be shared in scientific areas.

Keywords: fourth party logistics, literature review, outsourcing, supply chain management

Procedia PDF Downloads 164