Search results for: online communication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6225

Search results for: online communication

1725 Definite Article Errors and Effect of L1 Transfer

Authors: Bimrisha Mali

Abstract:

The present study investigates the type of errors English as a second language (ESL) learners produce using the definite article ‘the’. The participants were provided a questionnaire on the learner's ability test. The questionnaire consists of three cloze tests and two free composition tests. Each participant's response was received in the form of written data. A total of 78 participants from three government schools participated in the study. The participants are high-school students from Rural Assam. Assam is a north-eastern state of India. Their age ranged between 14-15. The medium of instruction and the communication among the students take place in the local language, i.e., Assamese. Pit Corder’s steps for conducting error analysis have been followed for the analysis procedure. Four types of errors were found (1) deletion of the definite article, (2) use of the definite article as modifiers as adjectives, (3) incorrect use of the definite article with singular proper nouns, (4) substitution of the definite article by the indefinite article ‘a’. Classifiers in Assamese that express definiteness is used with nouns, adjectives, and numerals. It is found that native language (L1) transfer plays a pivotal role in the learners’ errors. The analysis reveals the learners' inability to acquire the semantic connotation of definiteness in English due to native language (L1) interference.

Keywords: definite article error, l1 transfer, error analysis, ESL

Procedia PDF Downloads 114
1724 Migration, Violent Extremism and Gang Violence in Trinidad and Tobago

Authors: Raghunath Mahabir

Abstract:

This paper provides an analysis of the existing evidence on the relationships between the migration of Venezuelans into Trinidad and Tobago, violent extremism and gang violence. Arguing that there is a dearth of reliable data on the subject matter, the paper fills the gap by providing relevant definitions of terms used, discusses the sources of data and identifies the causes for this migration and the subsequent ramifications for Trinidad and Tobago and for the migrants themselves. A simple but clear classification pointing to the nexus between migration gang violence and violent extremism is developed, following the logic of migration of criminals(gang members), the need to link with local gangs and the view that certain elements within the TnT society has become radicalized to the point where violent extremism is being displayed in different ways. The paper highlights implications for further policy debate:the imperatives for more effective communication between government officials responsible for migration and those personnel who are tasked with countering violent extremism and gang violence: promoting and executing better integration and social inclusion policies which are necessary to minimize social exclusion, and the threat of violent extremist agendas emanating from both Venezuelans and Trinidadians and generally to establish strong analytical framework grounded in stronger definitions, more reliable data and other evidence which can guide further research and analysis and contribute to policy formation.

Keywords: migration, violent extremism, gangs, Venezuela

Procedia PDF Downloads 36
1723 Minimum Vertices Dominating Set Algorithm for Secret Sharing Scheme

Authors: N. M. G. Al-Saidi, K. A. Kadhim, N. A. Rajab

Abstract:

Over the past decades, computer networks and data communication system has been developing fast, so, the necessity to protect a transmitted data is a challenging issue, and data security becomes a serious problem nowadays. A secret sharing scheme is a method which allows a master key to be distributed among a finite set of participants, in such a way that only certain authorized subsets of participants to reconstruct the original master key. To create a secret sharing scheme, many mathematical structures have been used; the most widely used structure is the one that is based on graph theory (graph access structure). Subsequently, many researchers tried to find efficient schemes based on graph access structures. In this paper, we propose a novel efficient construction of a perfect secret sharing scheme for uniform access structure. The dominating set of vertices in a regular graph is used for this construction in the following way; each vertex represents a participant and each minimum independent dominating subset represents a minimal qualified subset. Some relations between dominating set, graph order and regularity are achieved, and can be used to demonstrate the possibility of using dominating set to construct a secret sharing scheme. The information rate that is used as a measure for the efficiency of such systems is calculated to show that the proposed method has some improved values.

Keywords: secret sharing scheme, dominating set, information rate, access structure, rank

Procedia PDF Downloads 380
1722 NFTs, between Opportunities and Absence of Legislation: A Study on the Effect of the Rulings of the OpenSea Case

Authors: Andrea Ando

Abstract:

The development of the blockchain has been a major innovation in the technology field. It opened the door to the creation of novel cyberassets and currencies. In more recent times, the non-fungible tokens have started to be at the centre of media attention. Their popularity has been increasing since 2021, and they represent the latest in the world of distributed ledger technologies and cryptocurrencies. It seems more and more likely that NFTs will play a more important role in our online interactions. They are indeed increasingly taking part in the arts and technology sectors. Their impact on society and the market is still very difficult to define, but it is very likely that there will be a turning point in the world of digital assets. There are some examples of their peculiar behaviour and effect in our contemporary tech-market: the former CEO of the famous social media site Twitter sold an NFT of his first tweet for around £2,1 million ($2,5 million), or the National Basketball Association has created a platform to sale unique moment and memorabilia from the history of basketball through the non-fungible token technology. Their growth, as imaginable, paved the way for civil disputes, mostly regarding their position under the current intellectual property law in each jurisdiction. In April 2022, the High Court of England and Wales ruled in the OpenSea case that non-fungible tokens can be considered properties. The judge, indeed, concluded that the cryptoasset had all the indicia of property under common law (National Provincial Bank v. Ainsworth). The research has demonstrated that the ruling of the High Court is not providing enough answers to the dilemma of whether minting an NFT is a violation or not of intellectual property and/or property rights. Indeed, if, on the one hand, the technology follows the framework set by the case law (e.g., the 4 criteria of Ainsworth), on the other hand, the question that arises is what is effectively protected and owned by both the creator and the purchaser. Then the question that arises is whether a person has ownership of the cryptographed code, that it is indeed definable, identifiable, intangible, distinct, and has a degree of permanence, or what is attached to this block-chain, hence even a physical object or piece of art. Indeed, a simple code would not have any financial importance if it were not attached to something that is widely recognised as valuable. This was demonstrated first through the analysis of the expectations of intellectual property law. Then, after having laid the foundation, the paper examined the OpenSea case, and finally, it analysed whether the expectations were met or not.

Keywords: technology, technology law, digital law, cryptoassets, NFTs, NFT, property law, intellectual property law, copyright law

Procedia PDF Downloads 72
1721 PEINS: A Generic Compression Scheme Using Probabilistic Encoding and Irrational Number Storage

Authors: P. Jayashree, S. Rajkumar

Abstract:

With social networks and smart devices generating a multitude of data, effective data management is the need of the hour for networks and cloud applications. Some applications need effective storage while some other applications need effective communication over networks and data reduction comes as a handy solution to meet out both requirements. Most of the data compression techniques are based on data statistics and may result in either lossy or lossless data reductions. Though lossy reductions produce better compression ratios compared to lossless methods, many applications require data accuracy and miniature details to be preserved. A variety of data compression algorithms does exist in the literature for different forms of data like text, image, and multimedia data. In the proposed work, a generic progressive compression algorithm, based on probabilistic encoding, called PEINS is projected as an enhancement over irrational number stored coding technique to cater to storage issues of increasing data volumes as a cost effective solution, which also offers data security as a secondary outcome to some extent. The proposed work reveals cost effectiveness in terms of better compression ratio with no deterioration in compression time.

Keywords: compression ratio, generic compression, irrational number storage, probabilistic encoding

Procedia PDF Downloads 274
1720 Performance Analysis of a Combined Ordered Successive and Interference Cancellation Using Zero-Forcing Detection over Rayleigh Fading Channels in Mimo Systems

Authors: Jamal R. Elbergali

Abstract:

Multiple Input Multiple Output (MIMO) systems are wireless systems with multiple antenna elements at both ends of the link. Wireless communication systems demand high data rate and spectral efficiency with increased reliability. MIMO systems have been popular techniques to achieve these goals because increased data rate is possible through spatial multiplexing scheme and diversity. Spatial Multiplexing (SM) is used to achieve higher possible throughput than diversity. In this paper, we propose a Zero-Forcing (ZF) detection using a combination of Ordered Successive Interference Cancellation (OSIC) and Zero Forcing using Interference Cancellation (ZF-IC). The proposed method used an OSIC based on Signal to Noise Ratio (SNR) ordering to get the estimation of last symbol (x ̃_(N_T )), then the estimated last symbol is considered to be an input to the ZF-IC. We analyze the Bit Error Rate (BER) performance of the proposed MIMO system over Rayleigh Fading Channel, using Binary Phase Shift Keying (BPSK) modulation scheme. The results show better performance than the previous methods.

Keywords: SNR, BER, BPSK, MIMO, modulation, zero forcing (ZF), OSIC, ZF-IC, spatial multiplexing (SM)

Procedia PDF Downloads 414
1719 Real Time Monitoring and Control of Proton Exchange Membrane Fuel Cell in Cognitive Radio Environment

Authors: Prakash Thapa, Gye Choon Park, Sung Gi Kwon, Jin Lee

Abstract:

The generation of electric power from a proton exchange membrane (PEM) fuel cell is influenced by temperature, pressure, humidity, flow rate of reactant gaseous and partial flooding of membrane electrode assembly (MEA). Among these factors, temperature and cathode flooding are the most affecting parameters on the performance of fuel cell. This paper describes the detail design and effect of these parameters on PEM fuel cell. Performance of all parameters was monitored, analyzed and controlled by using 5KWatt PEM fuel cell. In the real-time data communication for remote monitoring and control of PEM fuel cell, a normalized least mean square algorithm in cognitive radio environment is used. By the use of this method, probability of energy signal detection will be maximum which solved the frequency shortage problem. So the monitoring system hanging out and slow speed problem will be solved. Also from the control unit, all parameters are controlled as per the system requirement. As a result, PEM fuel cell generates maximum electricity with better performance.

Keywords: proton exchange membrane (PEM) fuel cell, pressure, temperature and humidity sensor (PTH), efficiency curve, cognitive radio network (CRN)

Procedia PDF Downloads 445
1718 The Development of Competency with a Training Curriculum via Electronic Media for Condominium Managers

Authors: Chisakan Papapankiad

Abstract:

The purposes of this research were 1) to study the competency of condominium managers, 2) to create the training curriculum via electronic media for condominium managers, and 3) to evaluate the training curriculum for condominium managers. The research methods included document analysis, interview, questionnaire, and a try-out. A total of 20 experts were selected to collect data by using Delphi technique. The designed curriculum was tried out with 30 condominium managers. The important steps of conducting this research included analyzing and synthesizing, creating interview questions, conducting factor analysis and developing the training curriculum, editing by experts, and trying out with sample groups. The findings revealed that there were five core competencies: leadership, human resources management, management, communication, and self-development. The training curriculum was designed and all the learning materials were put into a CD. The evaluation of the training curriculum was performed by five experts and the training curriculum was found to be cohesive and suitable for use in the real world. Moreover, the findings also revealed three important issues: 1) the competencies of the respondents after the experiment were higher than before the experiment and this had a level of significance of 0.01, 2) the competencies remained with the respondents at least 12 weeks and this also had a level of significance of 0.01, and 3) the overall level of satisfaction from the respondents were 'the highest level'.

Keywords: competency training curriculum, condominium managers, electronic media

Procedia PDF Downloads 274
1717 Barriers Facing the Implementation of Lean Manufacturing in Libyan Manufacturing Companies

Authors: Mohamed Abduelmula, Martin Birkett, Chris Connor

Abstract:

Lean Manufacturing has developed from being a set of tools and methods to becoming a management philosophy which can be used to remove or reduce waste in manufacturing processes and so enhance the operational productivity of an enterprise. Several enterprises around the world have applied the lean manufacturing system and gained great improvements. This paper investigates the barriers and obstacles that face Libyan manufacturing companies to implement lean manufacturing. A mixed-method approach is suggested, starting with conducting a questionnaire to get quantitative data then using this to develop semi-structured interviews to collect qualitative data. The findings of the questionnaire results and how these can be used further develop the semi-structured interviews are then discussed. The survey was distributed to 65 manufacturing companies in Libya, and a response rate of 64.6% was obtained. The results showed that these are five main barriers to implementing lean in Libya, namely organizational culture, skills and expertise, and training program, financial capability, top management, and communication. These barriers were also identified from the literature as being significant obstacles to implementing Lean in other countries industries. Having an understanding of the difficulties that face the implementation of lean manufacturing systems, as a new and modern system and using this to develop a suitable framework will help to improve the manufacturing sector in Libya.

Keywords: lean manufacturing, barriers, questionnaire, Libyan manufacturing companies

Procedia PDF Downloads 228
1716 Political Discourse and Linguistic Manipulation in Nigerian Politics

Authors: Kunle Oparinde, Ernestina Maleshoane Rapeane-Mathonsi, Gift Mheta

Abstract:

Using Critical Discourse Analysis (CDA) and Multimodal Discourse Analysis (MDA), the research seeks to deconstruct politically-motivated discourse as observed from Nigerian politics. This is intended to be achieved by analysing linguistic (mis)representation and manipulation in Nigerian political settings, drawing from instances of language use as observed from different political campaigns. Since language in itself is generally meaningless without context, it is therefore paramount to analyse the (mis)representation and manipulation in Nigerian political sceneries within their contextual basis. The study focuses on political language used by Nigerian politicians emanating from printed and social media forms such as posters, pamphlets, speeches, billboards, and internet sources purposely selected across Nigeria. The research further aims at investigating the discursive strategies used by politicians to gain more audience, and, as a result, shape opinions that result in votes. The study employs a qualitative approach. Two parties are intentionally selected because they have been essentially strong at the national level namely: All Progressive Congress (APC) and the People’s Democratic Party (PDP). The study finds out that politicians in Nigeria, as in many parts of the world, use language to manipulate the electorate. Comprehensive discussion of these instances of political manipulation remains the thrust of this paper.

Keywords: communication, discourse, manipulation, misrepresentation

Procedia PDF Downloads 227
1715 Cyber Violence Behaviors Among Social Media Users in Ghana: An Application of Self-Control Theory and Social Learning Theory

Authors: Aisha Iddrisu

Abstract:

The proliferation of cyberviolence in the wave of increased social media consumption calls for immediate attention both at the local and global levels. With over 4.70 billion social media users worldwide and 8.8 social media users in Ghana, various forms of violence have become the order of the day in most countries and communities. Cyber violence is defined as producing, retrieving, and sharing of hurtful or dangerous online content to cause emotional, psychological, or physical harm. The urgency and severity of cyber violence have led to the enactment of laws in various countries though lots still need to be done, especially in Ghana. In Ghana, studies on cyber violence have not been extensively dealt with. Existing studies concentrate only on one form or the other form of cyber violence, thus cybercrime and cyber bullying. Also, most studies in Africa have not explored cyber violence forms using empirical theories and the few that existed were qualitatively researched, whereas others examine the effect of cyber violence rather than examining why those who involve in it behave the way they behave. It is against this backdrop that this study aims to examine various cyber violence behaviour among social media users in Ghana by applying the theory of Self-control and Social control theory. This study is important for the following reasons. The outcome of this research will help at both national and international level of policymaking by adding to the knowledge of understanding cyberviolence and why people engage in various forms of cyberviolence. It will also help expose other ways by which such behaviours are enforced thereby serving as a guide in the enactment of the rightful rules and laws to curb such behaviours. It will add to literature on consequences of new media. This study seeks to confirm or reject to the following research hypotheses. H1 Social media usage has direct significant effect of cyberviolence behaviours. H2 Ineffective parental management has direct significant positive relation to Low self-control. H3 Low self-control has direct significant positive effect on cyber violence behaviours among social, H4 Differential association has significant positive effect on cyberviolence behaviour among social media users in Ghana. H5 Definitions have a significant positive effect on cyberviolence behaviour among social media users in Ghana. H6 Imitation has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H7 Differential reinforcement has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H8 Differential association has a significant positive effect on definitions. H9 Differential association has a significant positive effect on imitation. H10 Differential association has a significant positive effect on differential reinforcement. H11 Differential association has significant indirect positive effects on cyberviolence through the learning process.

Keywords: cyberviolence, social media users, self-control theory, social learning theory

Procedia PDF Downloads 61
1714 Internet of Assets: A Blockchain-Inspired Academic Program

Authors: Benjamin Arazi

Abstract:

Blockchain is the technology behind cryptocurrencies like Bitcoin. It revolutionizes the meaning of trust in the sense of offering total reliability without relying on any central entity that controls or supervises the system. The Wall Street Journal states: “Blockchain Marks the Next Step in the Internet’s Evolution”. Blockchain was listed as #1 in Linkedin – The Learning Blog “most in-demand hard skills needed in 2020”. As stated there: “Blockchain’s novel way to store, validate, authorize, and move data across the internet has evolved to securely store and send any digital asset”. GSMA, a leading Telco organization of mobile communications operators, declared that “Blockchain has the potential to be for value what the Internet has been for information”. Motivated by these seminal observations, this paper presents the foundations of a Blockchain-based “Internet of Assets” academic program that joins under one roof leading application areas that are characterized by the transfer of assets over communication lines. Two such areas, which are pillars of our economy, are Fintech – Financial Technology and mobile communications services. The next application in line is Healthcare. These challenges are met based on available extensive professional literature. Blockchain-based assets communication is based on extending the principle of Bitcoin, starting with the basic question: If digital money that travels across the universe can ‘prove its own validity’, can this principle be applied to digital content. A groundbreaking positive answer here led to the concept of “smart contract” and consequently to DLT - Distributed Ledger Technology, where the word ‘distributed’ relates to the non-existence of reliable central entities or trusted third parties. The terms Blockchain and DLT are frequently used interchangeably in various application areas. The World Bank Group compiled comprehensive reports, analyzing the contribution of DLT/Blockchain to Fintech. The European Central Bank and Bank of Japan are engaged in Project Stella, “Balancing confidentiality and auditability in a distributed ledger environment”. 130 DLT/Blockchain focused Fintech startups are now operating in Switzerland. Blockchain impact on mobile communications services is treated in detail by leading organizations. The TM Forum is a global industry association in the telecom industry, with over 850 member companies, mainly mobile operators, that generate US$2 trillion in revenue and serve five billion customers across 180 countries. From their perspective: “Blockchain is considered one of the digital economy’s most disruptive technologies”. Samples of Blockchain contributions to Fintech (taken from a World Bank document): Decentralization and disintermediation; Greater transparency and easier auditability; Automation & programmability; Immutability & verifiability; Gains in speed and efficiency; Cost reductions; Enhanced cyber security resilience. Samples of Blockchain contributions to the Telco industry. Establishing identity verification; Record of transactions for easy cost settlement; Automatic triggering of roaming contract which enables near-instantaneous charging and reduction in roaming fraud; Decentralized roaming agreements; Settling accounts per costs incurred in accordance with agreement tariffs. This clearly demonstrates an academic education structure where fundamental technologies are studied in classes together with these two application areas. Advanced courses, treating specific implementations then follow separately. All are under the roof of “Internet of Assets”.

Keywords: blockchain, education, financial technology, mobile telecommunications services

Procedia PDF Downloads 165
1713 A Digital Twin Approach to Support Real-time Situational Awareness and Intelligent Cyber-physical Control in Energy Smart Buildings

Authors: Haowen Xu, Xiaobing Liu, Jin Dong, Jianming Lian

Abstract:

Emerging smart buildings often employ cyberinfrastructure, cyber-physical systems, and Internet of Things (IoT) technologies to increase the automation and responsiveness of building operations for better energy efficiency and lower carbon emission. These operations include the control of Heating, Ventilation, and Air Conditioning (HVAC) and lighting systems, which are often considered a major source of energy consumption in both commercial and residential buildings. Developing energy-saving control models for optimizing HVAC operations usually requires the collection of high-quality instrumental data from iterations of in-situ building experiments, which can be time-consuming and labor-intensive. This abstract describes a digital twin approach to automate building energy experiments for optimizing HVAC operations through the design and development of an adaptive web-based platform. The platform is created to enable (a) automated data acquisition from a variety of IoT-connected HVAC instruments, (b) real-time situational awareness through domain-based visualizations, (c) adaption of HVAC optimization algorithms based on experimental data, (d) sharing of experimental data and model predictive controls through web services, and (e) cyber-physical control of individual instruments in the HVAC system using outputs from different optimization algorithms. Through the digital twin approach, we aim to replicate a real-world building and its HVAC systems in an online computing environment to automate the development of building-specific model predictive controls and collaborative experiments in buildings located in different climate zones in the United States. We present two case studies to demonstrate our platform’s capability for real-time situational awareness and cyber-physical control of the HVAC in the flexible research platforms within the Oak Ridge National Laboratory (ORNL) main campus. Our platform is developed using adaptive and flexible architecture design, rendering the platform generalizable and extendable to support HVAC optimization experiments in different types of buildings across the nation.

Keywords: energy-saving buildings, digital twins, HVAC, cyber-physical system, BIM

Procedia PDF Downloads 85
1712 Political Discourse Used in the TV Talk Shows of Pakistani Media

Authors: Hafiz Sajjad Hussain, Asad Razzaq

Abstract:

The study aims to explore the relationship between application of speech and discourse used by the political workers and their leaders for maintaining authoritative approach and dialog power. The representation of these relationships between ideology and language in the analysis of discourse and spoken text following Van Dijk Socio-Cognitive model. Media and political leaders are two pillars of a state and their role is so important for development and effects on the society. Media has become an industry in the recent years in the globe, and especially, the private sector developed a lot in the last decade in Pakistan. Media is the easiest way of communication with the large community in a short time and used discourse independently. The prime time of the news channels in Pakistan presents the political programs on most favorite story or incident of the day. The current program broadcasted by a private channel ARY News July 6, 2014 covered the most top story of the day. The son of Ex. CJ Arslan Iftikhar moves an application to Election Commission of Pakistan about the daughter of the most popular political leader and chairman PTI Imran Khan. This movement turns the whole scenario of the political parties and media got a hot issue form discussion. This study also shows that the ideology and meanings which are presented by the TV channels not always obvious for readers.

Keywords: electronic media, political discourse, ideology of media, power, authoritative approach

Procedia PDF Downloads 512
1711 Critical Success Factors for Sustainable Smart City Project in India

Authors: Debasis Sarkar

Abstract:

Development of a Smart City would depend upon the development of its infrastructure in a smart way. Primarily based on the ideology of the fourth industrial revolution a Smart City project should have Smart governance, smart health care, smart building, smart transportation, smart mobility, smart energy, smart technology and smart citizen. Considering the Indian scenario of current state of cities in India, it has become very essential to decide the specific parameters which would govern the development of a Smart City project. It has been observed that there are significant parameters beyond Information and Communication Technology (ICT), which govern the development of a Smart City project. This paper is an attempt to identify the Critical Success Factors (CSF) which are significantly responsible for the development of a Smart City project in Western India. Responses to questionnaire survey were analyzed on basis of Likert scale. They were further critically evaluated with help of Factor Comparison Method (FCM) and Analytical Hierarchy Process (AHP). The project authorities need to incorporate Building Information Modeling (BIM) to make the smart city project more collaborative. To make the project more sustainable, use of flyash in the concrete used, reduced usage of cement and steel, use of alternate fuels like biodiesel is recommended.

Keywords: analytical hierarchical process, building information modeling, critical success factors, factor comparison method

Procedia PDF Downloads 237
1710 Implementing Community Policing in Nigeria: Problems and Prospects

Authors: Mohammed Jamilu Haruna, Kawu Adamu Sule

Abstract:

This paper examines the evolution of modern policing in Nigeria to the present day, with a focus on the newly introduced community policing, which seeks to cement the operational vacuum created by the repressive and oppressive approach of the Nigeria Police Force (NPF), which renders the police incapable of addressing the twin problems of crime and disorder. Thus, the primary purpose for the implementation of community policing was to use it as a mechanism for building the lost trust between the police and the public, perhaps due to the long history of antagonistic and repressive relationships between them. If properly implemented, community policing has the prospect of empowering Nigerian citizens with the skills to protect themselves against invaders of their private security so that crimes can be prevented before anyone is victimized. Other prospects include, but are not limited to, (i) a favorable public view of the police, (ii) building of mutual trust, (iii) increased information flow through effective communication between the police and the public, and above all, (iv) increased police accountability. Unfortunately, problems such as aged suspicious and distrustful relationships, inadequate funding, poor training of officers, poor monitoring and evaluation of the community policing project, lack of public awareness of the benefits of the program, and sabotage by some of the personnel of the police who benefits from the status quo, were some of the reasons that troubled the implementation of community policing.

Keywords: community, policing, problems, prospects, problem solving

Procedia PDF Downloads 53
1709 Real Time Traffic Performance Study over MPLS VPNs with DiffServ

Authors: Naveed Ghani

Abstract:

With the arrival of higher speed communication links and mature application running over the internet, the requirement for reliable, efficient and robust network designs rising day by day. Multi-Protocol Label Switching technology (MPLS) Virtual Private Networks (VPNs) have committed to provide optimal network services. They are gaining popularity in industry day by day. Enterprise customers are moving to service providers that offer MPLS VPNs. The main reason for this shifting is the capability of MPLS VPN to provide built in security features and any-to-any connectivity. MPLS VPNs improved the network performance due to fast label switching as compare to traditional IP Forwarding but traffic classification and policing was still required on per hop basis to enhance the performance of real time traffic which is delay sensitive (particularly voice and video). QoS (Quality of service) is the most important factor to prioritize enterprise networks’ real time traffic such as voice and video. This thesis is focused on the study of QoS parameters (e.g. delay, jitter and MOS (Mean Opinion Score)) for the real time traffic over MPLS VPNs. DiffServ (Differentiated Services) QoS model will be used over MPLS VPN network to get end-to-end service quality.

Keywords: network, MPLS, VPN, DiffServ, MPLS VPN, DiffServ QoS, QoS Model, GNS2

Procedia PDF Downloads 412
1708 Walking the Talk? Thinking and Acting – Teachers' and Practitioners' Perceptions about Physical Activity, Health and Well-Being, Do They 'Walk the Talk' ?

Authors: Kristy Howells, Catherine Meehan

Abstract:

This position paper presents current research findings into the proposed gap between teachers’ and practitioners’ thinking and acting about physical activity health and well-being in childhood. Within the new Primary curriculum, there is a focus on sustained physical activity within a Physical Education and healthy lifestyles in Personal, Health, Social and Emotional lessons, but there is no curriculum guidance about what sustained physical activity is and how it is defined. The current health guidance on birth to five suggests that children should not be inactive for long periods and specify light and energetic activities, however there is the a suggested period of time per day for young children to achieve, but the guidance does not specify how this should be measured. The challenge therefore for teachers and practitioners is their own confidence and understanding of what “good / moderate intensity” physical activity and healthy living looks like for children and the children understanding what they are doing. There is limited research about children from birth to eight years and also the perceptions and attitudes of those who work with this age group of children, however it was found that children at times can identify different levels of activity and it has been found that children can identify healthy foods and good choices for healthy living at a basic level. Authors have also explored teachers’ beliefs about teaching and learning and found that teachers could act in accordance to their beliefs about their subject area only when their subject knowledge, understanding and confidence of that area is high. It has been proposed that confidence and competence of practitioners and teachers to integrate ‘well-being’ within the learning settings has been reported as being low. This may be due to them not having high subject knowledge. It has been suggested that children’s life chances are improved by focusing on well-being in their earliest years. This includes working with parents and families, and being aware of the environmental contexts that may impact on children’s wellbeing. The key is for practitioners and teachers to know how to implement these ideas effectively as these key workers have a profound effect on young children as role models and due to the time of waking hours spent with them. The position paper is part of a longitudinal study at Canterbury Christ Church University and currently we will share the research findings from the initial questionnaire (online, postal, and in person) that explored and evaluated the knowledge, competence and confidence levels of practitioners and teachers as to the structure and planning of sustained physical activity and healthy lifestyles and how this progresses with the children’s age.

Keywords: health, perceptions, physical activity, well-being

Procedia PDF Downloads 385
1707 Relation between Sensory Processing Patterns and Working Memory in Autistic Children

Authors: Abbas Nesayan

Abstract:

Background: In recent years, autism has been under consideration in public and research area. Autistic children have dysfunction in communication, socialization, repetitive and stereotyped behaviors. In addition, they clinically suffer from difficulty in attention, challenge with familiar behaviors and sensory processing problems. Several variables are linked to sensory processing problems in autism, one of these variables is working memory. Working memory is part of the executive function which provides the necessary ability to completing multiple stages tasks. Method: This study has categorized in correlational research methods. After determining of entry criteria, according to purposive sampling method, 50 children were selected. Dunn’s sensory profile school companion was used for assessment of sensory processing patterns; behavioral rating inventory of executive functions was used (BRIEF) for assessment of working memory. Pearson correlation coefficient and linear regression were used for data analyzing. Results: The results showed the significant relationship between sensory processing patterns (low registration, sensory seeking, sensory sensitivity and sensory avoiding) with working memory in autistic children. Conclusion: According to the findings, there is the significant relationship between the patterns of sensory processing and working memory. So, in order to improve the working memory could be used some interventions based on the sensory processing.

Keywords: sensory processing patterns, working memory, autism, autistic children

Procedia PDF Downloads 204
1706 Life Satisfaction of Non-Luxembourgish and Native Luxembourgish Postgraduate Students

Authors: Chrysoula Karathanasi, Senad Karavdic, Angela Odero, Michèle Baumann

Abstract:

It is not only the economic determinants that impact on life conditions, but maintaining a good level of life satisfaction (LS) may also be an important challenge currently. In Luxembourg, university students receive financial aid from the government. They are then registered at the Centre for Documentation and Information on Higher Education (CEDIES). Luxembourg is built on migration with almost half its population consisting of foreigners. It is upon this basis that our research aims to analyze the associations with mental health factors (health satisfaction, psychological quality of life, worry), perceived financial situation, career attitudes (adaptability, optimism, knowledge, planning) and LS, for non-Luxembourgish and native postgraduate students. Between 2012 and 2013, postgraduates registered at CEDIES were contacted by post and asked to participate in an online survey with either the option of English or French. The study population comprised of 644 respondents. Our statistical analysis excluded: those born abroad who had Luxembourgish citizenship, or those born in Luxembourg who did not have citizenship. Two groups were formed one consisting 147 non-Luxembourgish and the other 284 natives. A single item measured LS (1=not at all satisfied to 10=very satisfied). Bivariate tests, correlations and multiple linear regression models were used in which only significant relationships (p<0.05) were integrated. Among the two groups no differences were found between LS indicators (7.8/10 non-Luxembourgish; 8.0/10 natives) as both were higher than the European indicator of 7.2/10 (for 25-34 years). In the case of non-Luxembourgish students, they were older than natives (29.3 years vs. 26.3 years) perceived their financial situation as more difficult, and a higher percentage of their parents had an education level higher than a Bachelor's degree (father 59.2% vs 44.6% for natives; mother 51.4% vs 33.7% for natives). In addition, the father’s education was related to the LS of postgraduates and the higher was the score, the greater was the contribution to LS. Whereas for native students, when their scores of health satisfaction and career optimism were higher, their LS’ score was higher. For both groups their LS was linked to mental health-related factors, perception of their financial situation, career optimism, adaptability and planning. The higher the psychological quality of life score was, the greater the LS of postgraduates’ was. Good health and positive attitudes related to the job market enhanced their LS indicator.

Keywords: career attributes, father's education level, life satisfaction, mental health

Procedia PDF Downloads 357
1705 Bidirectional Long Short-Term Memory-Based Signal Detection for Orthogonal Frequency Division Multiplexing With All Index Modulation

Authors: Mahmut Yildirim

Abstract:

This paper proposed the bidirectional long short-term memory (Bi-LSTM) network-aided deep learning (DL)-based signal detection for Orthogonal frequency division multiplexing with all index modulation (OFDM-AIM), namely Bi-DeepAIM. OFDM-AIM is developed to increase the spectral efficiency of OFDM with index modulation (OFDM-IM), a promising multi-carrier technique for communication systems beyond 5G. In this paper, due to its strong classification ability, Bi-LSTM is considered an alternative to the maximum likelihood (ML) algorithm, which is used for signal detection in the classical OFDM-AIM scheme. The performance of the Bi-DeepAIM is compared with LSTM network-aided DL-based OFDM-AIM (DeepAIM) and classic OFDM-AIM that uses (ML)-based signal detection via BER performance and computational time criteria. Simulation results show that Bi-DeepAIM obtains better bit error rate (BER) performance than DeepAIM and lower computation time in signal detection than ML-AIM.

Keywords: bidirectional long short-term memory, deep learning, maximum likelihood, OFDM with all index modulation, signal detection

Procedia PDF Downloads 46
1704 Novel Marketing Strategy To Increase Sales Revenue For SMEs Through Social Media

Authors: Kruti Dave

Abstract:

Social media marketing is an essential component of 21st-century business. Social media platforms enable small and medium-sized businesses to enhance brand recognition, generate leads and sales. However, the research on social media marketing is still fragmented and focuses on specific topics, such as effective communication techniques. Since the various ways in which social media impacts individuals and companies alike, the authors of this article focus on the origin, impacts, and current state of Social Media, emphasizing their significance as customer empowerment agents. It illustrates their potential and current responsibilities as part of the corporate business strategy and also suggests several methods to engage them as marketing tools. The focus of social media marketing ranges from defenders to explorers, the culture of Social media marketing encompasses the poles of conservatism and modernity, social media marketing frameworks lie between hierarchies and networks, and its management goes from autocracy to anarchy. This research proposes an integrative framework for small and medium-sized businesses through social media, and the influence of the same will be measured. This strategy will help industry experts to understand this new era. We propose an axiom: Social Media is always a function of marketing as a revenue generator.

Keywords: social media, marketing strategy, media marketing, brand awareness, customer engagement, revenue generator, brand recognition

Procedia PDF Downloads 172
1703 On Driving Forces of Cultural Globalization and its Retroaction: Under the Guidance of Skopos Theory

Authors: Zhai Yujia

Abstract:

None of the scholars and researchers has ever stepped into this field, though there are quite a few papers worked on various topics relevant to cultural and economic globalization separately. Economic globalization is earlier than cultural globalization. Since the invention of currency, people have had the sense of making money for the purpose of living, supporting their families, or other personal reasons. Their strong desire for earning a living is one of the incentives to propel the trade, tourism and other related economic activities that provide the service within the homeland at first and expand into the whole world later, as the global markets grow and mature. The need for operation impels international communication or interaction. To achieve this, it is vital to realize or recognize other cultures to some degree, concluding language, customs, social etiquette and history of different nations. All this drives the cultural globalization process. In contrast, it is clear that the development of cultural globalization does accelerate the process of economic globalization in return. Under the guidance of Skopos theory (first proposed by Hans Vermeer, and its core principle is that the translation process is determined by the purpose), this paper aims to demonstrate that cultural globalization is not a process in isolation by analyzing its driving forces and retroaction thoroughly with an approach of overview. It intertwines with economic globalization. The two push each other to proper gradually during their development, serving as the indispensable parts of the globalization process.

Keywords: cultural globalization, driving forces, retroaction, Skopos theory

Procedia PDF Downloads 143
1702 Traditional versus New Media: Creating Awareness on Environment Protection in Pakistan

Authors: Hafsah Javed

Abstract:

Environment protection is a major issue grabbing widespread attention of policymakers, both, locally and globally. Pakistan is among the countries most affected by global climate changes; media, besides governments, have a prime responsibility to create awareness among people about its hazards, and managing strategies. Advances in Information Communication Technologies have eased people's access to information and created an interactive space to discuss environment related issues and influence the policy decisions on the issue. This study, therefore, aims to examine, from the perspective of the audience, the contribution of Pakistani traditional and social media in creating awareness about Environment Protection and its implications. The objectives are achieved through quantitative survey method. Young university students are selected as ‘audience’ for the study. The findings show lack of awareness among people regarding environment protection. Neither traditional media outlets like radio, TV and newspapers prioritize the issue on their agenda, nor audience pull information about the issue from social media. A stark indifference and non-serious attitude is being exercised towards the issue from two quarters. People do not know much about local and international laws on environment; media are used more than a source of entertainment than awareness. The study implicates that there is an exigency to launch a nationwide awareness campaign on the issue, and for that media need to be on the driving seat.

Keywords: awareness, climate change, environment protection, new media, role of media, youngsters

Procedia PDF Downloads 129
1701 Window Seat: Examining Public Space, Politics, and Social Identity through Urban Public Transportation

Authors: Sabrina Howard

Abstract:

'Window Seat' uses public transportation as an entry point for understanding the relationship between public space, politics, and social identity construction. This project argues that by bringing people of different races, classes, and genders in 'contact' with one another, public transit operates as a site of exposure, as people consciously and unconsciously perform social identity within these spaces. These performances offer a form of freedom that we associate with being in urban spaces while simultaneously rendering certain racialized, gendered, and classed bodies vulnerable to violence. Furthermore, due to its exposing function, public transit operates as a site through which we, as urbanites and scholars, can read social injustice and reflect on the work that is necessary to become a truly democratic society. The major questions guiding this research are: How does using public transit as the entry point provide unique insights into the relationship between social identity, politics, and public space? What ideas do Americans hold about public space and how might these ideas reflect a liberal yearning for a more democratic society? To address these research questions, 'Window Seat' critically examines ethnographic data collected on public buses and trains in Los Angeles, California, and online news media. It analyzes these sources through literature in socio-cultural psychology, sociology, and political science. It investigates the 'everyday urban hero' narrative or popular news stories that feature an individual or group of people acting against discriminatory or 'Anti-American' behavior on public buses and trains. 'Window Seat' studies these narratives to assert that by circulating stories of civility in news media, United Statsians construct and maintain ideas of the 'liberal city,' which is characterized by ideals of freedom and democracy. Furthermore, for those involved, these moments create an opportunity to perform the role of the Good Samaritan, an identity that is wrapped up in liberal beliefs in diversity and inclusion. This research expands conversations in urban studies by making a case for the political significance of urban public space. It demonstrates how these sites serve as spaces through which liberal beliefs are circulated and upheld through identity performance.

Keywords: social identity, public space, public transportation, liberalism

Procedia PDF Downloads 187
1700 Characteristics Features and Action Mechanism of Some Country Made Pistols

Authors: Ajitesh Pal, Arpan Datta Roy, H. K. Pratihari

Abstract:

The different illegal firearms crudely made by skilled gunsmith from scrap materials are popularly known as country made firearms. Such firearms along with improvised ammunition are clandestinely marketed at the cheaper price without any license to the extremist group, criminal, poachers and firearm lovers. As per National Crime Records Bureau (NCRB), MHA, Govt of India about 80% firearm cases are committed by country made/improvised firearms. The ballistic division of the laboratory has examined a good number of cases. The analysis of firearm cases received for forensic examination revealed that 7.65mm calibre pistols mostly improvised firearm are commonly used in firearm related crime cases. In the present communication, physical parameters and other characteristics features of some 7.65mm calibre pistols have been discussed in detail. The detailed study on country made (CM) firearm will help to prepare a database related to type of material used, origin of the raw material and tools used for inscription. The study also includes to establish the chemistry of propellants & head stamp pattern. The database will be helpful to the firearm examiners, researchers, students pursuing study on forensic science as reference material.

Keywords: improvised pistol, stringent gun law, working mechanism, parameters, database

Procedia PDF Downloads 59
1699 Determination of Burnout Levels and Associated Factors of Teachers Working During the COVID-19 Pandemic Period

Authors: Kemal Kehan, Emine Aktas Bajalan

Abstract:

This study was carried out to determine the burnout levels and related factors of teachers working in primary schools affiliated to the Turkish Republic of Northern Cyprus (TRNC) Ministry of National Education during the COVID-19 pandemic period. The research was conducted in descriptive cross-sectional design. The population of the research consists of 1071 teachers working in 93 primary schools in 6 central districts affiliated to the TRNC Ministry of National Education in the 2021-2022 academic year. When the sample size of the study was calculated by power analysis, it was determined that 202 teachers should be reached with 95% confidence (1-α), 95% test power (1-β) and d=0.5 effect size. Within the scope of the inclusion criteria of the research, the main sample of the study consisted of 300 teachers and the baist random sampling method was used. The data were collected using the Sociodemographic Data Form consisting of 34 questions, including the sociodemographic characteristics of the teachers and the 22-item Maslach Burnout Scale (MBS). The analysis of the data was carried out using descriptive and correlational analyzes in the SPSS 22 package program. In the study, it was determined that 65% of the teachers were women, 68% were married, 84% had a bachelor's degree, 70.33% had children, and 67.67% were dependents. Regarding how teachers evaluate the COVID-19 pandemic period; 90% of them said, “I am worried about my family's health and the risk of infection”, 80% of them, “I feel that my profession does not get the value it deserves”, 75.67% of them mentioned “My hopes for the future have started to wane”, 75.33% of them say “I am worried about my own health”. It was determined that they gave the answer of, “I am worried about the issue”. It was found that the teachers' MBS total score average was 48.63±8.01, the burnout level was moderate, and the average score they got from the sub-dimensions of the scale was also moderate. It has been found that there are negative correlations between the professional satisfaction scores of the teachers during and before the COVID-19 pandemic and the scores they received from the general and sub-dimensions of MBS. It was determined that there was a statistically significant difference (p<0.05) between the scores of teachers diagnosed with COVID-19 from the scale and its sub-dimensions. As a result, it is suggested that social activities should be increased and professional development and promotion opportunities should be offered in order to ensure that teachers are satisfied with their work areas, to reduce their burnout levels or to prevent them completely.

Keywords: teachers, burnout, maslach burnout scale, pandemic, online education

Procedia PDF Downloads 53
1698 Barriers and Facilitators for Telehealth Use during Cervical Cancer Screening and Care: A Literature Review

Authors: Reuben Mugisha, Stella Bakibinga

Abstract:

The cervical cancer burden is a global threat, but more so in low income settings where more than 85% of mortality cases occur due to lack of sufficient screening programs. There is consequently a lack of early detection of cancer and precancerous cells among women. Studies show that 3% to 35% of deaths could have been avoided through early screening depending on prognosis, disease progression, environmental and lifestyle factors. In this study, a systematic literature review is undertaken to understand potential barriers and facilitators as documented in previous studies that focus on the application of telehealth in cervical cancer screening programs for early detection of cancer and precancerous cells. The study informs future studies especially those from low income settings about lessons learned from previous studies and how to be best prepared while planning to implement telehealth for cervical cancer screening. It further identifies the knowledge gaps in the research area and makes recommendations. Using a specified selection criterion, 15 different articles are analyzed based on the study’s aim, theory or conceptual framework used, method applied, study findings and conclusion. Results are then tabulated and presented thematically to better inform readers about emerging facts on barriers and facilitators to telehealth implementation as documented in the reviewed articles, and how they consequently lead to evidence informed conclusions that are relevant to telehealth implementation for cervical cancer screening. Preliminary findings of this study underscore that use of low cost mobile colposcope is an appealing option in cervical cancer screening, particularly when coupled with onsite treatment of suspicious lesions. These tools relay cervical images to the online databases for storage and retrieval, they permit integration of connected devices at the point of care to rapidly collect clinical data for further analysis of the prevalence of cervical dysplasia and cervical cancer. Results however reveal the need for population sensitization prior to use of mobile colposcopies among patients, standardization of mobile colposcopy programs across screening partners, sufficient logistics and good connectivity, experienced experts to review image cases at the point-of-care as important facilitators to the implementation of mobile colposcope as a telehealth cervical cancer screening mechanism.

Keywords: cervical cancer screening, digital technology, hand-held colposcopy, knowledge-sharing

Procedia PDF Downloads 207
1697 Modification Encryption Time and Permutation in Advanced Encryption Standard Algorithm

Authors: Dalal N. Hammod, Ekhlas K. Gbashi

Abstract:

Today, cryptography is used in many applications to achieve high security in data transmission and in real-time communications. AES has long gained global acceptance and is used for securing sensitive data in various industries but has suffered from slow processing and take a large time to transfer data. This paper suggests a method to enhance Advance Encryption Standard (AES) Algorithm based on time and permutation. The suggested method (MAES) is based on modifying the SubByte and ShiftRrows in the encryption part and modification the InvSubByte and InvShiftRows in the decryption part. After the implementation of the proposal and testing the results, the Modified AES achieved good results in accomplishing the communication with high performance criteria in terms of randomness, encryption time, storage space, and avalanche effects. The proposed method has good randomness to ciphertext because this method passed NIST statistical tests against attacks; also, (MAES) reduced the encryption time by (10 %) than the time of the original AES; therefore, the modified AES is faster than the original AES. Also, the proposed method showed good results in memory utilization where the value is (54.36) for the MAES, but the value for the original AES is (66.23). Also, the avalanche effects used for calculating diffusion property are (52.08%) for the modified AES and (51.82%) percentage for the original AES.

Keywords: modified AES, randomness test, encryption time, avalanche effects

Procedia PDF Downloads 229
1696 The Characteristics of the Graduates Based on Thailand Qualification Framework (TQF) of the Faculty of Industrial Technology, Suan Sunandha Rajabhat University

Authors: Apinya Mungaomklang, Natakamol Lookkham

Abstract:

The purpose of this research is to study the characteristics of the graduates based on Thailand Qualification Framework (TQF) of the Faculty of Industrial Technology, Suan Sunandha Rajabhat University. The population of the research was employers/entrepreneurs/supervisors of students who were doing Professional Experiences course in their respective organizations during semester 1/2012. Data were collected during the month of September 2012 from the total number of 100 people. The tool used in this research was a questionnaire developed by the research team. Data were analyzed using percentage, mean and standard deviation using a computer program. The results showed that most of the surveyed organizations were private companies. The program with most students doing Professional Experiences course was Safety Technology and Occupational Health. The nature of work that most students did was associated with the document. Employers/ entrepreneurs/employers’ opinions on the characteristics of the graduates based on TQF received high scores. Cognitive skills received the highest score, followed by interpersonal relationships and responsibilities, ethics and moral, numerical analysis skills, communication and information technology skills, and knowledge, respectively.

Keywords: graduates characteristics, Thailand Qualification Framework, employers, entrepreneurs

Procedia PDF Downloads 303