Search results for: English communication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5785

Search results for: English communication

1555 Health Satisfaction and Family Impact of Parents of Children with Cancer

Authors: Ekhlas Al Gamal, Tony Long

Abstract:

The impact on the parents of caring for a child with cancer was intense and wide-ranging. A high level of distress and low level or resilience remains during treatment. Even completion of treatment can be a time of increased anxiety and stress for parents particularly with worries about recurrence or relapse. The purpose of this study to examine the associations between parental satisfactions with healthcare provided for their child and the impact of being a caregiver for a child with cancer. Methodology: A descriptive, correlational and cross-sectional design was employed using data from Arabic versions of self-report questionnaires which were administered to 113 parents with children with cancer in Jordan during 2015. Findings: the result indicated that Family relationship functioning was ranked as the highest (better functioning) domain while daily activities were ranked as the lowest (poorer functioning) domain. Parents were generally satisfied with the health care provided, but their emotional needs were not met adequately. Parents with better social functioning were more satisfied in all areas of healthcare satisfaction other than emotional needs and communication. Parents who had a child with more emotional and behavioural problems were more likely to experience a negative impact on the family and a poor level of family functioning. Conclusion and Significance: Nurses and other health care providers should emphasis on family centred approach rather than child centred approach.

Keywords: parents, children, cancer, Jordan

Procedia PDF Downloads 340
1554 A Holographic Infotainment System for Connected and Driverless Cars: An Exploratory Study of Gesture Based Interaction

Authors: Nicholas Lambert, Seungyeon Ryu, Mehmet Mulla, Albert Kim

Abstract:

In this paper, an interactive in-car interface called HoloDash is presented. It is intended to provide information and infotainment in both autonomous vehicles and ‘connected cars’, vehicles equipped with Internet access via cellular services. The research focuses on the development of interactive avatars for this system and its gesture-based control system. This is a case study for the development of a possible human-centred means of presenting a connected or autonomous vehicle’s On-Board Diagnostics through a projected ‘holographic’ infotainment system. This system is termed a Holographic Human Vehicle Interface (HHIV), as it utilises a dashboard projection unit and gesture detection. The research also examines the suitability for gestures in an automotive environment, given that it might be used in both driver-controlled and driverless vehicles. Using Human Centred Design methods, questions were posed to test subjects and preferences discovered in terms of the gesture interface and the user experience for passengers within the vehicle. These affirm the benefits of this mode of visual communication for both connected and driverless cars.

Keywords: gesture, holographic interface, human-computer interaction, user-centered design

Procedia PDF Downloads 313
1553 Performance Analysis in 5th Generation Massive Multiple-Input-Multiple-Output Systems

Authors: Jihad S. Daba, Jean-Pierre Dubois, Georges El Soury

Abstract:

Fifth generation wireless networks guarantee significant capacity enhancement to suit more clients and services at higher information rates with better reliability while consuming less power. The deployment of massive multiple-input-multiple-output technology guarantees broadband wireless networks with the use of base station antenna arrays to serve a large number of users on the same frequency and time-slot channels. In this work, we evaluate the performance of massive multiple-input-multiple-output systems (MIMO) systems in 5th generation cellular networks in terms of capacity and bit error rate. Several cases were considered and analyzed to compare the performance of massive MIMO systems while varying the number of antennas at both transmitting and receiving ends. We found that, unlike classical MIMO systems, reducing the number of transmit antennas while increasing the number of antennas at the receiver end provides a better solution to performance enhancement. In addition, enhanced orthogonal frequency division multiplexing and beam division multiple access schemes further improve the performance of massive MIMO systems and make them more reliable.

Keywords: beam division multiple access, D2D communication, enhanced OFDM, fifth generation broadband, massive MIMO

Procedia PDF Downloads 258
1552 The Relationship between Public Relations and Media Relations: The Case of Hotel Enterprises

Authors: Burcu Oksuz, Volkan Altıintas, Zulfiye Acar Senturk

Abstract:

Though in the academic literature, it is emphasized that Public Relations (PR) should not be seen only as media relations, in practise, the media relations has a very dominant position at the communication studies carried out by many companies. There are many PR practitioners who have journalism background. However the number of the practitioners who have started to work in the sector after having PR education at the universities has been highly increasing. Therefore, it can be said that previous journalist dominance has diminished at the public relations sector in Turkey. However, by virtue of the fact that some companies and practitioners consider the media coverage the first priority of PR, this much is certain that the dominant position of media relations is ongoing. On the other hand, still many companies measure the success of their PR by how much place their companies have taken. This situation creates major pressure on the PR practitioners to have close relations with the media members and to make them write articles about their companies. Thereupon, PR practitioners have to take the time for the media relations and the media relations comes into prominence more than the other PR functions. The aim of this study is to reveal the PR functions at the companies and to evaluate the position of the media relations in the PR studies. Therefore, it is aimed to find out at what extend the discourse of “Public relations is not media relations” is accepted in practice and actualised. Accordingly, a research about 15 hotel enterprises which are located in the city of İzmir will be carried out. İzmir as one of the most important tourism destinations has many hotels. The PR/corporate communications managers will be interviewed profoundly within the scope of this study and PR functions performed by hotels will be discussed in details in consideration of the datum obtained.

Keywords: media relations, public relations, public relations practitioners, Turkey

Procedia PDF Downloads 384
1551 Energy Detection Based Sensing and Primary User Traffic Classification for Cognitive Radio

Authors: Urvee B. Trivedi, U. D. Dalal

Abstract:

As wireless communication services grow quickly; the seriousness of spectrum utilization has been on the rise gradually. An emerging technology, cognitive radio has come out to solve today’s spectrum scarcity problem. To support the spectrum reuse functionality, secondary users are required to sense the radio frequency environment, and once the primary users are found to be active, the secondary users are required to vacate the channel within a certain amount of time. Therefore, spectrum sensing is of significant importance. Once sensing is done, different prediction rules apply to classify the traffic pattern of primary user. Primary user follows two types of traffic patterns: periodic and stochastic ON-OFF patterns. A cognitive radio can learn the patterns in different channels over time. Two types of classification methods are discussed in this paper, by considering edge detection and by using autocorrelation function. Edge detection method has a high accuracy but it cannot tolerate sensing errors. Autocorrelation-based classification is applicable in the real environment as it can tolerate some amount of sensing errors.

Keywords: cognitive radio (CR), probability of detection (PD), probability of false alarm (PF), primary user (PU), secondary user (SU), fast Fourier transform (FFT), signal to noise ratio (SNR)

Procedia PDF Downloads 345
1550 Quality Standards for Emergency Response: A Methodological Framework

Authors: Jennifer E. Lynette

Abstract:

This study describes the development process of a methodological framework for quality standards used to measure the efficiency and quality of response efforts of trained personnel at emergency events. This paper describes the techniques used to develop the initial framework and its potential application to professions under the broader field of emergency management. The example described in detail in this paper applies the framework specifically to fire response activities by firefighters. Within the quality standards framework, the fire response process is chronologically mapped. Individual variables within the sequence of events are identified. Through in-person data collection, questionnaires, interviews, and the expansion of the incident reporting system, this study identifies and categorizes previously unrecorded variables involved in the response phase of a fire. Following a data analysis of each variable using a quantitative or qualitative assessment, the variables are ranked pertaining to the magnitude of their impact to the event outcome. Among others, key indicators of quality performance in the analysis involve decision communication, resource utilization, response techniques, and response time. Through the application of this framework and subsequent utilization of quality standards indicators, there is potential to increase efficiency in the response phase of an emergency event; thereby saving additional lives, property, and resources.

Keywords: emergency management, fire, quality standards, response

Procedia PDF Downloads 318
1549 Deep Learning to Improve the 5G NR Uplink Control Channel

Authors: Ahmed Krobba, Meriem Touzene, Mohamed Debeyche

Abstract:

The wireless communications system (5G) will provide more diverse applications and higher quality services for users compared to the long-term evolution 4G (LTE). 5G uses a higher carrier frequency, which suffers from information loss in 5G coverage. Most 5G users often cannot obtain high-quality communications due to transmission channel noise and channel complexity. Physical Uplink Control Channel (PUCCH-NR: Physical Uplink Control Channel New Radio) plays a crucial role in 5G NR telecommunication technology, which is mainly used to transmit link control information uplink (UCI: Uplink Control Information. This study based of evaluating the performance of channel physical uplink control PUCCH-NR under low Signal-to-Noise Ratios with various antenna numbers reception. We propose the artificial intelligence approach based on deep neural networks (Deep Learning) to estimate the PUCCH-NR channel in comparison with this approach with different conventional methods such as least-square (LS) and minimum-mean-square-error (MMSE). To evaluate the channel performance we use the block error rate (BLER) as an evaluation criterion of the communication system. The results show that the deep neural networks method gives best performance compared with MMSE and LS

Keywords: 5G network, uplink (Uplink), PUCCH channel, NR-PUCCH channel, deep learning

Procedia PDF Downloads 83
1548 Jordanian Men’s and Women’s Attitudes toward Intimate Partner Violence and Its Correlates with Family Functioning and Demographics

Authors: Fatmeh Alzoubi, Reem Ali

Abstract:

Jordan is a developing country in the Middle East and, much like other countries in the world, has high rates of intimate partner violence (IPV). Little information is available on Jordanian men’s and women’s attitudes toward IPV. The purpose of this study is to examine men’s and women’s attitudes toward IPV in Jordan and its relationship with some demographics and family functioning. A descriptive cross-sectional correlational design with a sample of 401 men and women was used. Descriptive statistics (M, SD), Pearson r, t test, and ANOVA were used. The results indicated that Jordanian men and women have a lower score of IPVAS, 40.06 (SD = 8.20), indicating lower acceptance of IPV compared with the literature. Family functioning was 3.12 (SD = 0.46), indicating more healthy families. Family functioning was negatively correlated with IPVAS scores (r = –.22, p = .00). All demographic variables showed small to moderate correlations with IPVAS. Education for both study participants and their spouses had a negative correlation with IPVAS (r = –.27, p = .00) and (r = –.20, p = .00), respectively. Male participants, individuals who were living with extended family, and those living in rural areas had significantly high IPVAS scores, indicating more accepting attitudes toward IPV. Practitioners should provide families with education on the methods of conflict resolution, effective communication within the family, problem-solving approaches, equal role distribution, and appropriate styles of establishing a family.

Keywords: intimate partner violence, Jordanian men and women’s health, attitudes, family functioning

Procedia PDF Downloads 121
1547 Case Scenario Simulation concerning Eventual Ship Sourced Oil Spill, Expansion and Response Process in Istanbul Strait

Authors: Cihat Aşan

Abstract:

Istanbul Strait is a crucial and narrow waterway, not only having a role in linking two continents but also has a crossover mission for the petroleum, which is the biggest energy resource, between its supply and demand sources. Besides its substantial features, sensitivities like around 18 million populations in surroundings, military facilities, ports, oil lay down areas etc. also brings the high risk to use of Istanbul Strait. Based on the statistics of Turkish Ministry of Transportation, Maritime and Communication, although the number of vessel passage in Istanbul Strait is declining, tonnage of hazardous and flammable cargo like oil and chemical transportation is increasing and subsequently the risk of oil pollution, loss of life and property is also rising. Based on the mentioned above; it is crucial to be prepared for the initial and subsequent response to eventual ship sourced oil spill which may cause to block the Strait for an unbearable duration. In this study; preconditioned Istanbul Strait sensitive areas studies has been taken into account and possible oil spill scenario is loaded to PISCES 2 (Potential Incident Simulation Control and Evaluation System) decision support system for the determined specific sea area. Consequences of the simulation like oil expanding process, required number and types of assets to response, had in hand and evaluated.

Keywords: Istanbul strait, oil spill, PISCES simulator, initial response

Procedia PDF Downloads 343
1546 A Method of Representing Knowledge of Toolkits in a Pervasive Toolroom Maintenance System

Authors: A. Mohamed Mydeen, Pallapa Venkataram

Abstract:

The learning process needs to be so pervasive to impart the quality in acquiring the knowledge about a subject by making use of the advancement in the field of information and communication systems. However, pervasive learning paradigms designed so far are system automation types and they lack in factual pervasive realm. Providing factual pervasive realm requires subtle ways of teaching and learning with system intelligence. Augmentation of intelligence with pervasive learning necessitates the most efficient way of representing knowledge for the system in order to give the right learning material to the learner. This paper presents a method of representing knowledge for Pervasive Toolroom Maintenance System (PTMS) in which a learner acquires sublime knowledge about the various kinds of tools kept in the toolroom and also helps for effective maintenance of the toolroom. First, we explicate the generic model of knowledge representation for PTMS. Second, we expound the knowledge representation for specific cases of toolkits in PTMS. We have also presented the conceptual view of knowledge representation using ontology for both generic and specific cases. Third, we have devised the relations for pervasive knowledge in PTMS. Finally, events are identified in PTMS which are then linked with pervasive data of toolkits based on relation formulated. The experimental environment and case studies show the accuracy and efficient knowledge representation of toolkits in PTMS.

Keywords: knowledge representation, pervasive computing, agent technology, ECA rules

Procedia PDF Downloads 338
1545 Reversing Community Relationship From the I-It to I-Thou as a Tool for Conflict Resolution and Peace Building in Ethiopia

Authors: Sisaye Tamrat Ayalew

Abstract:

The study focuses on the nature of community relationships in Ethiopia, specifically the I-Thou and I-It relationships, and how they contribute to conflict resolution and peacebuilding. It highlights the importance of genuine dialogue and mutual understanding in creating a unified and peaceful society. It analyzes the nature of community relationships in Ethiopia and evaluate how these relationships either contribute to conflict resolution or exacerbate conflicts. It aims to understand the role of genuine dialogue (I-Thou relationship) versus monologue (I-It relationship) in building lasting peace in the country. The study adopts a qualitative approach, specifically hermeneutics, to explore and understand the nature of community relationships in Ethiopia. It involves analyzing the characteristics of both I-Thou and I-It relationships and examining how the political elites shape these relationships within the community. The findings of the study indicate that the predominant type of relationship in Ethiopian society is the I-It relationship, referred to as "com-animation". This relationship is characterized by mutual mistrust, prejudice, hostility, and misunderstanding. As a result, conflicts, mass killings, displacement, and human rights violations have occurred. The study emphasizes the importance of shifting from com-animation to communication (I-Thou relationship) in order to address conflicts and establish lasting peace.

Keywords: dialogue, I-thou relationship, peace building, I-It relationship

Procedia PDF Downloads 89
1544 Students’ Level of Knowledge Construction and Pattern of Social Interaction in an Online Forum

Authors: K. Durairaj, I. N. Umar

Abstract:

The asynchronous discussion forum is one of the most widely used activities in learning management system environment. Online forum allows participants to interact, construct knowledge, and can be used to complement face to face sessions in blended learning courses. However, to what extent do the students perceive the benefits or advantages of forum remain to be seen. Through content and social network analyses, instructors will be able to gauge the students’ engagement and knowledge construction level. Thus, this study aims to analyze the students’ level of knowledge construction and their participation level that occur through online discussion. It also attempts to investigate the relationship between the level of knowledge construction and their social interaction patterns. The sample involves 23 students undertaking a master course in one public university in Malaysia. The asynchronous discussion forum was conducted for three weeks as part of the course requirement. The finding indicates that the level of knowledge construction is quite low. Also, the density value of 0.11 indicating that the overall communication among the participants in the forum is low. This study reveals that strong and significant correlations between SNA measures (in-degree centrality, out-degree centrality) and level of knowledge construction. Thus, allocating these active students in a different groups aids the interactive discussion takes place. Finally, based upon the findings, some recommendations to increase students’ level of knowledge construction and also for further research are proposed.

Keywords: asynchronous discussion forums, content analysis, knowledge construction, social network analysis

Procedia PDF Downloads 373
1543 IN-SEAN: The Pace of Economic Cooperation between India and ASEAN

Authors: Eumsin Payan

Abstract:

The article desires the Association of Southeast Asian Nations (ASEAN) to take interest in the policies and give importance to India over other powerful countries in the World, including powerful countries in Asia, comprising of: People’s Republic of China (PRC), Russia, and India countries with the ability to drive the Asian continent, specifically, the ASEAN Economic Community (AEC). (Japan was incapable of stepping up to become the leader of ASEAN due to the fact that Japan has created “wounds” from military history with too many countries in Asia, including wounds from the Greater East Asia War, combining with economic problems Japan is currently facing and also several natural disasters, therefore Japan is not considered a good option of our era.) China appears to be an option that stands out, which could be seen through countless published articles in the general public. However, this article desires to propose India as an option to develop and drive the relationship between ASEAN countries in the future development of Computer Science Technology and allow India to be the leader in driving the Asian Economy in place of China and the United States. As for Russia, its location is distant and apart from South East Asia. Moreover, Russia does not give as much importance to ASEAN. In this light, the author perceives that India already has the “Look East” policy. Therefore, it would be simple for ASEAN to look back at India by simply starting cooperation through policies related to collaboration in the areas of computer science. In effect, this will continuously adjust and improve the relationship towards cooperation in the areas of economics, society, and culture. Referring to the above, the author suggests a word that could be used to call the relationship between India and ASEAN, INSEAN or IN-SEAN. Hereinafter, the author hopes that Thailand, in the position of one in the five founders of ASEAN, could become the leader or be the entity that pushes forward the ASEAN policies that will increase the importance of looking towards India. India is an emerging giant that has the ability to step up in Asia. With the proficient use of English, India is able to pass on the knowledge and drive the ASEAN’s Economic relationship better than China or Russia, as faced with higher language barriers. Moreover, India has cultivated democratic civilization from the colonization of the British Empire, similar to other nations of Southeast Asia, which are familiar with various heritage cultures that the British has brought them. The most important aspect in the author’s perspective is the fact that India is not aggressive and that they have courtesy. Through developing policies of the East through the “Look East” policy, it enabled India to establish a more smooth relationship with Asian countries comparing to China. China has imposed harsh policies towards democracy to the land above the South China Sea, which directly affect the ASEAN countries. From the above reasons, India, therefore, is an appropriate option in the establishment of a closer relationship with ASEAN, as the author has proposed relationship as INSEAN or IN-SEAN.

Keywords: IN-SEAN, INSEAN, look west policy, look east policy, ASEAN, India

Procedia PDF Downloads 647
1542 Development and Management of Integrated Mineral Resource Policy for Environmental Sustainability: The Mindanao Experience, the Philippines

Authors: Davidson E. Egirani, Nanfe R. Poyi, Napoleon Wessey

Abstract:

This paper would report the environmental challenges faced by stakeholders in the development and management of mineral resources in Mindanao mining region of the Philippines. The paper would proffer solutions via the development and management of integrated mineral resource framework. This is by interfacing the views of government, operating mining companies and the mining host communities. The project methods involved the desktop review of existing local, regional, national environmental and mining legislation. This was followed up with visits to mining sites and discussions were held with stakeholders in the mineral sector. The findings from a 2-year investigation would reveal lack of information, education, and communication campaign by stakeholders on environmental, health, political, and social issues in the mining industry. Small-scale miners lack the professional muscles for a balance shift of emphasis to sustainable and responsible mining to avoid environmental degradation and human health effect. Therefore, there is a need to balance ecological requirements, sustainability of the environment and development of mineral resources. This paper would provide an environmentally friendly mineral resource development framework.

Keywords: ecological requirements, environmental degradation, human health, mining legislation, responsible mining

Procedia PDF Downloads 131
1541 Horizontal-Vertical and Enhanced-Unicast Interconnect Testing Techniques for Network-on-Chip

Authors: Mahdiar Hosseinghadiry, Razali Ismail, F. Fotovati

Abstract:

One of the most important and challenging tasks in testing network-on-chip based system-on-chips (NoC based SoCs) is to verify the communication entity. It is important because of its usage for transferring both data packets and test patterns for intellectual properties (IPs) during normal and test mode. Hence, ensuring of NoC reliability is required for reliable IPs functionality and testing. On the other hand, it is challenging due to the required time to test it and the way of transferring test patterns from the tester to the NoC components. In this paper, two testing techniques for mesh-based NoC interconnections are proposed. The first one is based on one-by-one testing and the second one divides NoC interconnects into three parts, horizontal links of switches in even columns, horizontal links of switches in odd columns and all vertical. A design for testability (DFT) architecture is represented to send test patterns directly to each switch under test and also support the proposed testing techniques by providing a loopback path in each switch. The simulation results shows the second proposed testing mechanism outperforms in terms of test time because this method test all the interconnects in only three phases, independent to the number of existed interconnects in the network, while test time of other methods are highly dependent to the number of switches and interconnects in the NoC.

Keywords: on chip, interconnection testing, horizontal-vertical testing, enhanced unicast

Procedia PDF Downloads 553
1540 Challenges and Opportunities for Implementing Integrated Project Delivery Method in Public Sector Construction

Authors: Ahsan Ahmed, Ming Lu, Syed Zaidi, Farhan Khan

Abstract:

The Integrated Project Delivery (IPD) method has been proposed as the solution to tackle complexity and fragmentation in the real world while addressing the construction industry’s growing needs for productivity and sustainability. Although the private sector has taken the initiative in implementing IPD and taken advantage of new technology such as building information modeling (BIM) in delivering projects, IPD remains less known and rarely used in public sector construction. The focus of this paper is set on the use of IPD in projects in public sector, which is potentially complemented by the use of analytical functionalities for workface planning and construction oriented design enabled by recent research advances in BIM. Experiences and lessons learned from implementing IPD in the private sector and in BIM-based construction automation research would play a vital role in reducing barriers and eliminating issues in connection with project delivery in the public sector. The paper elaborates issues challenges, contractual relationships and the interactions throughout the planning, design and construction phases in the context of implementing IPD on construction projects in the public sector. A slab construction case is used as a ‘sandbox’ model to elaborate (1) the ideal way of communication, integration, and collaboration among all the parties involved in project delivery in planning and (2) the execution of projects by using IDP principles and optimization, simulation analyses.

Keywords: integrated project delivery, IPD, building information modeling, BIM

Procedia PDF Downloads 202
1539 New Media and Social Media Laws and Ethics in United Arab Emirates

Authors: Ahmed Farouk Radwan, Sheren Mousa

Abstract:

There are many laws and regulations governing the use of new and social media in the United Arab Emirates. During the past few years, the importance of using these platforms in the fields of media and government communication has increased, as well as at the level of individual use. In 2016, the National Media Council Law was issued to regulate traditional and new media field, and gave the council the power to oversee and undertake the media affairs in the state. NMC is mandated to: Develop the UAE’s media policy, Draft media legislation and ensure its execution and Prohibited media content ,Co-ordinate the media policy between the emirates in line with the UAE’s domestic and foreign policy, Ensure support for the federation and project national unity. All media organizations in the UAE must comply with the regulations and rules issued by council. Social media influencers have to be licensed by NMC if they accept paid ads to be published on their accounts. The study explores other laws concerning of new media and social media regulations and ethics including Combatting Cybercrimes law, Combating Discrimination and Hatred law, The Government Guidelines for social media users in the UAE, The Guidelines for the practices of electronic participation and social networking, Copyright Law, and Child Rights Law. The study clarifies the legal articles, items and standards in all these laws which related with the new media and social platforms and also determines the prohibited digital practices and the cultural norms governing it.

Keywords: media laws, media ethics, new media , UAE

Procedia PDF Downloads 168
1538 Teacher’s Role in the Process of Identity Construction in Language Learners

Authors: Gaston Bacquet

Abstract:

The purpose of this research is to explore how language and culture shape a learner’s identity as they immerse themselves in the world of second language learning and how teachers can assist in the process of identity construction within a classroom setting. The study will be conducted as an in-classroom ethnography, using a qualitative methods approach and analyzing students’ experiences as language learners, their degree of investment, inclusion/exclusion, and attitudes, both towards themselves and their social context; the research question the study will attempt to answer is: What kind of pedagogical interventions are needed to help language learners in the process of identity construction so they can offset unequal conditions of power and gain further social inclusion? The following methods will be used for data collection: i) Questionnaires to investigate learners’ attitudes and feelings in different areas divided into four strands: themselves, their classroom, learning English and their social context. ii) Participant observations, conducted in a naturalistic manner. iii) Journals, which will be used in two different ways: on the one hand, learners will keep semi-structured, solicited diaries to record specific events as requested by the researcher (event-contingent). On the other, the researcher will keep his journal to maintain a record of events and situations as they happen to reduce the risk of inaccuracies. iv) Person-centered interviews, which will be conducted at the end of the study to unearth data that might have been occluded or be unclear from the methods above. The interviews will aim at gaining further data on experiences, behaviors, values, opinions, feelings, knowledge and sensory, background and demographic information. This research seeks to understand issues of socio-cultural identities and thus make a significant contribution to knowledge in this area by investigating the type of pedagogical interventions needed to assist language learners in the process of identity construction to achieve further social inclusion. It will also have applied relevance for those working with diverse student groups, especially taking our present social context into consideration: we live in a highly mobile world, with migrants relocating to wealthier, more developed countries that pose their own particular set of challenges for these communities. This point is relevant because an individual’s insight and understanding of their own identity shape their relationship with the world and their ability to continue constructing this relationship. At the same time, because a relationship is influenced by power, the goal of this study is to help learners feel and become more empowered by increasing their linguistic capital, which we hope might result in a greater ability to integrate themselves socially. Exactly how this help will be provided will vary as data is unearthed through questionnaires, focus groups and the actual participant observations being carried out.

Keywords: identity construction, second-language learning, investment, second-language culture, social inclusion

Procedia PDF Downloads 103
1537 Quantum Cryptography: Classical Cryptography Algorithms’ Vulnerability State as Quantum Computing Advances

Authors: Tydra Preyear, Victor Clincy

Abstract:

Quantum computing presents many computational advantages over classical computing methods due to the utilization of quantum mechanics. The capability of this computing infrastructure poses threats to standard cryptographic systems such as RSA and AES, which are designed for classical computing environments. This paper discusses the impact that quantum computing has on cryptography, while focusing on the evolution from classical cryptographic concepts to quantum and post-quantum cryptographic concepts. Standard Cryptography is essential for securing data by utilizing encryption and decryption methods, and these methods face vulnerability problems due to the advancement of quantum computing. In order to counter these vulnerabilities, the methods that are proposed are quantum cryptography and post-quantum cryptography. Quantum cryptography uses principles such as the uncertainty principle and photon polarization in order to provide secure data transmission. In addition, the concept of Quantum key distribution is introduced to ensure more secure communication channels by distributing cryptographic keys. There is the emergence of post-quantum cryptography which is used for improving cryptographic algorithms in order to be more secure from attacks by classical and quantum computers. Throughout this exploration, the paper mentions the critical role of the advancement of cryptographic methods to keep data integrity and privacy safe from quantum computing concepts. Future research directions that would be discussed would be more effective cryptographic methods through the advancement of technology.

Keywords: quantum computing, quantum cryptography, cryptography, data integrity and privacy

Procedia PDF Downloads 26
1536 Underage Internal Migration from Rural to Urban Areas of Ethiopia: The Perspective of Social Marketing in Controlling Child Labor

Authors: Belaynesh Tefera, Ahmed Mohammed, Zelalem Bayisa

Abstract:

This study focuses on the issue of underage internal migration from rural to urban areas in Ethiopia, specifically in the context of child labor. It addresses the significant disparities in living standards between rural and urban areas, which motivate individuals from rural areas to migrate to urban areas in search of better economic opportunities. The study was conducted in Addis Ababa, where there is a high prevalence of underage internal migrants engaged in child labor due to extreme poverty in rural parts of the country. The aim of this study is to explore the life experiences of shoe-makers who have migrated from rural areas of Ethiopia to Addis Ababa. The focus is on understanding the factors that push these underage individuals to migrate, the challenges they face, and the implications for child labor. This study adopts a qualitative approach, using semistructured face-to-face interviews with underage migrants. A total of 27 interviews were conducted in Addis Ababa, Ethiopia, until the point of data saturation. The criteria for selecting interviewees include working as shoemakers and migrating to Addis Ababa underage, below 16 years old. The interviews were audio-taped, transcribed into Amharic, and then translated into English for analysis. The study reveals that the major push factors for underage internal migration are socioeconomic and environmental factors. Despite improvements in living standards for underage migrants and their families, there is a high prevalence of child labor and lack of access to education among them. Most interviewees migrated without the accompaniment of their family members and faced various challenges, including sleeping on the streets. This study highlights the role of social marketing in addressing the issues of underage internal migration and child labor. It suggests that social marketing can be an effective strategy to protect children from abuse, loneliness, and harassment during their migration process. The data collection involved conducting in-depth interviews with the underage migrants. The interviews were transcribed and translated for analysis. The analysis focused on identifying common themes and patterns within the interview data. The study addresses the factors contributing to underage internal migration, the challenges faced by underage migrants, the prevalence of child labor, and the potential role of social marketing in addressing these issues. The study concludes that although Ethiopia has policies against child internal migration, it is difficult to protect underage laborers who migrate from rural to urban areas due to the voluntary nature of their migration. The study suggests that social marketing can serve as a solution to protect children from abuse and other challenges faced during migration.

Keywords: underage, internal migration, social marketing, child labor, Ethiopia

Procedia PDF Downloads 79
1535 The Impact of Brand-Related User-Generated Content on Brand Positioning: A Study on Private Higher Education Institutes in Vietnam

Authors: Charitha Harshani Perera, Rajkishore Nayak, Long Thang Van Nguyen

Abstract:

With the advent of social media, Vietnam has changed the way customers perceive the information about the brand. In the context of higher education, the adoption of social media has received attention with the increasing rate of social media usage among undergraduates. Brand-related user-generated content (UGC) on social media emphasizes the social ties between users and users’ participation, which promotes the communication to build and maintain the relationship with the brands. Although brand positioning offers a significant competitive advantage, the association with brand-related user-generated content in social media with brand positioning in the context of higher education is still an under-researched area. Accordingly, using social identity theory and social exchange theory, this research aims to deepen our understanding of the influence of brand-related user-generated content on brand positioning and purchase intention. Employing a quantitative survey design,384 Vietnamese undergraduates were selected based on purposive sampling. The findings suggest that brand-related user-generated content influence brand positioning and brand choice intention. However, there is a significant mediating effect of the reliability and understandability of the content.

Keywords: brand positioning, brand-related user-generated content, emerging countries, higher education

Procedia PDF Downloads 177
1534 Designing and Implementation of MPLS Based VPN

Authors: Muhammad Kamran Asif

Abstract:

MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively.

Keywords: MPLS, VPN, NMS, ATM, asynchronous transfer mode

Procedia PDF Downloads 331
1533 The Usefulness and Future of Hearing Aids Technologies and Their Impact on Hearing

Authors: Amirreza Razzaghipour Sorkhab

Abstract:

Hearing loss is one of the greatest common chronic health situations of older people. Hearing aids are the common treatment, and they recover the quality of life in older adults. Even so, comparatively few older adults with simple, mild to moderate, adult-onset, sensorineural hearing loss use hearing aids. It shouldn’t be expected that more expensive hearing aids always produce better outcomes. Given the importance of quality pledge, approaches of quantifying hearing aid fitting achievement are needed. Studies showed an important reduction in handicap following 3 weeks of hearing aid use, signifying the feasibility of using the Hearing Hindrance Inventory for the Elderly as an outcome measure for hearing aid success after a brief interval of hearing aid use. The results showed important development of the quality of life after three months of using a hearing aid in all members and improvement of their most important problems, i.e., the communication and exchange of data. Hearing loss can impair the conversation of information and so decreases the quality of life. Hearing aids have progressivemeaningfully over the past decade, chiefly due to the growing of digital technology. The next decade should see an even greater number of innovations to hearing aid technology. Development in digital hearing aids will be driven by investigate advances in the next fields such as wireless technology, hearing science, and cognitive scienceMoreover, emerging trends such as connectivity and individuation will also drive new technology. We hope that the advancement of technology will be enough to meet the needs of people with hearing aids.

Keywords: hearing loss, hearing aid, hearing aid technology, health

Procedia PDF Downloads 107
1532 Nurses’ Views on ‘Effective Nurse Leader’ Characteristics in Iraq

Authors: S. Abed, S. O’Neill

Abstract:

This research explored ward nurses’ views about the characteristics of effective nurse leaders in the context of Iraq as a developing country, where the delivery of health care continues to face disruption and change. It is well established that the provision of modern health care requires effective nurse leaders, but in countries such as Iraq the lack of effective nurse leaders is noted as a major challenge. In a descriptive quantitative study, a survey questionnaire was administered to 210 ward nurses working in two public hospitals in a major city in the north of Iraq. The participating nurses were of the opinion that the effectiveness of their nurse leaders was evident in their ability to demonstrate: good clinical knowledge, effective communication and managerial skills. They also viewed their leaders as needing to hold high-level nursing qualifications, though this was not necessarily the case in practice. Additionally, they viewed nurse leaders’ personal qualities as important, which included politeness, ethical behaviour, and trustworthiness. When considered against the issues raised in interviews with a smaller group (20) of senior nurse leaders, representative of the various occupational levels, implications identify the need for professional development that focuses on how the underpinning competencies relate to leadership and how transformational leadership is evidenced in practice.

Keywords: health care, nurse education, nursing in Iraq, nurse leadership

Procedia PDF Downloads 275
1531 The Physiological Effects of Thyriod Disorders During the Gestatory Period on Fetal Neurological Development: A Descriptive Review

Authors: Vanessa Bennemann, Gabriela Laste, Márcia Inês Goettert

Abstract:

The gestational period is a phase in which the pregnant woman undergoes constant physiological and hormonal changes, which are part of the woman’s biological cycle, the development of the fetus, childbirth, and lactation. These are factors of response to the immunological adaptation of the human reproductive process that is directly related to the pregnancy’s well-being and development. Although most pregnancies occur without complications, about 15% of pregnant women will develop potentially fatal complications, implying maternal and fetal risk. Therefore, requiring specialized care for high-risk pregnant women (HRPW) with obstetric interventions for the survival of the mother and/or fetus. Among the risk factors that characterize HRPW are the women's age, gestational diabetes mellitus (GDM), autoimmune diseases, infectious diseases such as syphilis and HIV, hypertension (SAH), preeclampsia, eclampsia, HELLP syndrome, uterine contraction abnormalities, and premature placental detachment (PPD), thyroid disorders, among others. Thus, pregnancy has an impact on the thyroid gland causing changes in the functioning of the mother's thyroid gland, altering the thyroid hormone (TH) profiles and production as pregnancy progresses. Considering, throughout the gestational period, the interpretation of the results of the tests to evaluate the thyroid functioning depends on the stage in which the pregnancy is. Thyroid disorders are directly related to adverse obstetric outcomes and in child development. Therefore, the adequate release of TH is important for a pregnancy without complications and optimal fetal growth and development. Objective: Investigate the physiological effects caused by thyroid disorders in the gestational period. Methods: A search for articles indexed in PubMed, Scielo, and MDPI databases, was performed using the term “AND”, with the descriptors: Pregnancy, Thyroid. With several combinations that included: Melatonin, Thyroidopathy, Inflammatory processes, Cytokines, Anti-inflammatory, Antioxidant, High-risk pregnancy. Subsequently, the screening was performed through the analysis of titles and/or abstracts. The criteria were: including clinical studies in general, randomized or not, in the period of 10 years prior to the research, in the English literature; excluded: experimental studies, case reports, research in the development phase. Results: In the preliminary results, a total of studies (n=183) were found, (n=57) excluded, such as studies of cancer, diabetes, obesity, and skin diseases. Conclusion: To date, it has been identified that thyroid diseases can impair the fetus’s brain development. Further research is suggested on this matter to identify new substances that may have a potential therapeutic effect to aid the gestational period with thyroid diseases.

Keywords: pregnancy, thyroid, melatonin, high-risk pregnancy

Procedia PDF Downloads 144
1530 Recognizing an Individual, Their Topic of Conversation and Cultural Background from 3D Body Movement

Authors: Gheida J. Shahrour, Martin J. Russell

Abstract:

The 3D body movement signals captured during human-human conversation include clues not only to the content of people’s communication but also to their culture and personality. This paper is concerned with automatic extraction of this information from body movement signals. For the purpose of this research, we collected a novel corpus from 27 subjects, arranged them into groups according to their culture. We arranged each group into pairs and each pair communicated with each other about different topics. A state-of-art recognition system is applied to the problems of person, culture, and topic recognition. We borrowed modeling, classification, and normalization techniques from speech recognition. We used Gaussian Mixture Modeling (GMM) as the main technique for building our three systems, obtaining 77.78%, 55.47%, and 39.06% from the person, culture, and topic recognition systems respectively. In addition, we combined the above GMM systems with Support Vector Machines (SVM) to obtain 85.42%, 62.50%, and 40.63% accuracy for person, culture, and topic recognition respectively. Although direct comparison among these three recognition systems is difficult, it seems that our person recognition system performs best for both GMM and GMM-SVM, suggesting that inter-subject differences (i.e. subject’s personality traits) are a major source of variation. When removing these traits from culture and topic recognition systems using the Nuisance Attribute Projection (NAP) and the Intersession Variability Compensation (ISVC) techniques, we obtained 73.44% and 46.09% accuracy from culture and topic recognition systems respectively.

Keywords: person recognition, topic recognition, culture recognition, 3D body movement signals, variability compensation

Procedia PDF Downloads 541
1529 Vietnamese Indigenous Healing’s Implication for Vietnamese Women Counseling in Korea

Authors: Youngsub Oh, Youngsoon Kim

Abstract:

As the second largest group among international marriages in Korea, Vietnamese married immigrant women have been exposed to psychological crisis like divorce and family violence. The purpose of this study is to understand how to counsel those women from the perspective of indigenous healing as their own psychological problem-solving way. To this end, this study reviewed Vietnamese cultural literatures on their mentality as well as Vietnamese medical literatures on indigenous healing. The research results are as follows: First, cultural foundations that have formed Vietnamese mentality are Confucian value system, reserved communication, and religious pluralism. These cultural backgrounds play an important role in understanding their own therapeutic tradition. Second, Vietnamese indigenous healing considers cause of mental disease as a collapse of balance between mind and body and environment. Thus, indigenous treatment deals with psychological problems through a recovery of the balance from the holistic perspective. In fact, indigenous healing has been actively practiced in everyday place as well as hospital until today. The implications of Vietnamese indigenous healing for multicultural counseling in Korea are as follows: First, Korean counselors need to interactively understand their own assumptions on indigenous healing as well as counselees’ own assumptions. Second, a variety of psychological intervention strategies can be drawn from Vietnamese indigenous healing. Third, indigenous healing needs to be integrated with modern techniques of counseling and psychotherapy, as both treatments are not mutually exclusive but complementary.

Keywords: indigenous healing, Korea, multicultural counseling, Vietnamese married immigrant women

Procedia PDF Downloads 293
1528 The Effectiveness of Banks’ Web Sites: A Study of Turkish Banking Sector

Authors: Raif Parlakkaya, Huseyin Cetin, Duygu Irdiren

Abstract:

By the development of World Wide Web, the usage rate of Internet has rapidly grown globally; and provided a basis for the emergence of electronic business. As well as other sectors, the banking sector has adopted the use of internet with the developments in information and communication technologies. Due to the public disclosure and transparency principle of Corporate Governance, the importance of information disclosure of banks on their web sites has increased significantly. For the purpose of this study, a Bank Disclosure Attribute Index (BDAI) in Turkey has been constructed through classifying the information disclosure on banks’ web sites into general, financial, investors and corporate governance attributes. All 47 banks in Turkish Banking System have been evaluated according to the index with the aim of providing a comparison between banks. By Chi Square Test, Pearson Correlation, T-Test, and ANOVA statistical tools, it has been concluded that the majority of banks in Turkey have shared information on their web sites adequately with respect to their total index score. Although there is a positive correlation between various types of information on banks’ web sites, there is no uniformity among them. Also, no significant difference between various types of information disclosure and bank types has been observed. Compared with the total index score averages of the five largest banks in Turkey, there are some banks that need to improve the content of their web sites.

Keywords: internet banking, websites evaluation, customer adoption, Turkey

Procedia PDF Downloads 398
1527 Double Layer Security Authentication Model for Automatic Dependent Surveillance-Broadcast

Authors: Buse T. Aydin, Enver Ozdemir

Abstract:

An automatic dependent surveillance-broadcast (ADS-B) system has serious security problems. In this study, a double layer authentication scheme between the aircraft and ground station, aircraft to aircraft, ground station to ATC tower is designed to prevent any unauthorized aircrafts from introducing themselves as friends. This method can be used as a solution to the problem of authentication. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or unknown according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as friend. As a result, the ADS-B messages coming from this authenticated friendly aircraft will be processed. In this method, even if the embedded key is captured by the unknown aircraft, without the information of the second layer, the unknown aircraft can easily be determined. Overall, in this work, we present a reliable system by adding physical layer in the authentication process.

Keywords: ADS-B, authentication, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 179
1526 Development of 3D Laser Scanner for Robot Navigation

Authors: Ali Emre Öztürk, Ergun Ercelebi

Abstract:

Autonomous robotic systems needs an equipment like a human eye for their movement. Robotic camera systems, distance sensors and 3D laser scanners have been used in the literature. In this study a 3D laser scanner has been produced for those autonomous robotic systems. In general 3D laser scanners are using 2 dimension laser range finders that are moving on one-axis (1D) to generate the model. In this study, the model has been obtained by a one-dimensional laser range finder that is moving in two –axis (2D) and because of this the laser scanner has been produced cheaper. Furthermore for the laser scanner a motor driver, an embedded system control board has been used and at the same time a user interface card has been used to make the communication between those cards and computer. Due to this laser scanner, the density of the objects, the distance between the objects and the necessary path ways for the robot can be calculated. The data collected by the laser scanner system is converted in to cartesian coordinates to be modeled in AutoCAD program. This study shows also the synchronization between the computer user interface, AutoCAD and the embedded systems. As a result it makes the solution cheaper for such systems. The scanning results are enough for an autonomous robot but the scan cycle time should be developed. This study makes also contribution for further studies between the hardware and software needs since it has a powerful performance and a low cost.

Keywords: 3D laser scanner, embedded system, 1D laser range finder, 3D model

Procedia PDF Downloads 275