Search results for: mobile standards
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3580

Search results for: mobile standards

3130 Financial Instruments Disclosure: A Review of the Literature

Authors: Y. Tahat, T. Dunne, S. Fifield, D. Power

Abstract:

Information about a firm’s usage of Financial Instruments (FIs) plays a very important role in determining its financial position and performance. Yet accounting standard-setters have encountered problems when deciding on the FI-related disclosures which firms must make. The primary objective of this paper is to review the extant literature on FI disclosure. This objective is achieved by surveying the literature on: the corporate usage of FIs; the different accounting standards adopted concerning FIs; and empirical studies on FI disclosure. This review concludes that the current research on FI disclosure has generated a number of useful insights. In particular, the paper reports that: FIs are a very important risk management mechanism in ensuring that companies have the cash available to make value-enhancing investments, however, without a clear set of risk management objectives, using such instruments can be dangerous; accounting standards concerning FIs have resulted in enhanced transparency about the usage of these instruments; and FI-related information is a key input into investors’ decision-making processes. Finally, the paper provides a number of suggestions for future research in the area.

Keywords: financial instruments, financial reporting, accounting standards, value relevance, corporate disclosure

Procedia PDF Downloads 412
3129 An Improved Dynamic Window Approach with Environment Awareness for Local Obstacle Avoidance of Mobile Robots

Authors: Baoshan Wei, Shuai Han, Xing Zhang

Abstract:

Local obstacle avoidance is critical for mobile robot navigation. It is a challenging task to ensure path optimality and safety in cluttered environments. We proposed an Environment Aware Dynamic Window Approach in this paper to cope with the issue. The method integrates environment characterization into Dynamic Window Approach (DWA). Two strategies are proposed in order to achieve the integration. The local goal strategy guides the robot to move through openings before approaching the final goal, which solves the local minima problem in DWA. The adaptive control strategy endows the robot to adjust its state according to the environment, which addresses path safety compared with DWA. Besides, the evaluation shows that the path generated from the proposed algorithm is safer and smoother compared with state-of-the-art algorithms.

Keywords: adaptive control, dynamic window approach, environment aware, local obstacle avoidance, mobile robots

Procedia PDF Downloads 159
3128 Communication through Technology: SMS Taking Most of the Time Impacting the Standard English

Authors: Nazia Sulemna, Sadia Gul

Abstract:

With the invade of mobile phones text messaging has become a popular medium of communication. Its users are multiplying with every passing day. Its use is not only limites to informal but to formal communication as well. Students are the advent users of mobile phones and of SMS as well. The present study manifests the fact that students are practicing SMS for a number of reasons and a good amount of time is spent upon it which is resulting in typographical features, graphones and rebus writing. Data was collected through questionnaires and came to the conclusion that its effect is obvious in the L2 users and in exam as well.

Keywords: text messaging, technology, exams, formal writing

Procedia PDF Downloads 743
3127 Comparison of Radiated Emissions in Offshore and Onshore Wind Turbine Towers

Authors: Sajeesh Sulaiman, Gomathisankar A., Aravind Devaraj, Aswin R., Vijay Kumar G., Rachana Raj

Abstract:

Wind turbines are the next big answer to the emerging and ever-growing demand for electricity, and this need is increasing day by day. These high mast structures, whether on land or on the sea, has also become one of the big sources of electromagnetic interferences (EMI) in the not so distant past. With the emergence of the AC-AC converter and drawing of large power cables through the wind turbine towers has made this clean and efficient source of renewable energy to become one of the culprits in creating electromagnetic interference. This paper will present the sources of such EMIs, a comparison of radiated emissions (both electric and magnetic field) patterns in wind turbine towers for both onshore and offshore wind turbines and close look into the IEC 61400-40 (new standard for EMC design on wind turbine). At present, offshore wind turbines are tested in onshore facilities. This paper will present the anomaly in results for offshore wind turbines when tested in onshore, which the existing standards and the upcoming standards have failed to address.

Keywords: emissions, electric field, magnetic field, wind turbine, tower, standards and regulations

Procedia PDF Downloads 248
3126 Mobile Application Set to Empower SME Farmers in Peri-Urban Sydney Region

Authors: A. Hol

Abstract:

Even in the well developed countries like Australia, Small to Medium Farmers do not often have the power over the market prices as they are more often than not set by the farming agents. This in turn creates problems as farmers only get to know for how much their produce has been sold for by the agents three to four weeks after the sale has taken the place. To see and identify if and how peri-urban Sydney farmers could be assisted, carefully selected group of peri-urban Sydney farmers of the stone fruit has been interviewed. Following the case based interviews collected data was analyzed in detail using the Scenario Based Transformation principles. Analyzed data was then used to create a most common transformation case. The case identified that a mobile web based system could be develop so that framers can monitor agent earnings and in turn gain more power over the markets. It is expected that after the system has been in action for six months to a year, farmers will become empowered and they will gain means to monitor the market and negotiate agent prices.

Keywords: mobile applications, farming, scenario-based analysis, scenario-based transformation, user empowerment

Procedia PDF Downloads 382
3125 SAP: A Smart Amusement Park System for Tourist Services

Authors: Pei-Chun Lee, Sheng-Shih Wang, Pei-Hsuan Ku

Abstract:

Many existing amusement parks have been operated with assistance of a variety of information and communications technologies to design friendly and efficient service systems for tourists. However, these systems leave various levels of decisions to tourists to make by themselves. This incurs pressure on tourists and thereby bringing negative experience in their tour. This paper proposes a smart amusement park system to offer each tourist the GPS-based customized plan without tourists making decisions by themselves. The proposed system consists of the mobile app subsystem, the central subsystem, and the detecting/counting subsystem. The mobile app subsystem interacts with the central subsystem. The central subsystem performs the necessary computing and database management of the proposed system. The detecting/counting subsystem aims to detect and compute the number of visitors to an attraction. Experimental results show that the proposed system can not only work well, but also provide an innovative business operating model for owners of amusement parks.

Keywords: amusement park, location-based service, LBS, mobile app, tourist service

Procedia PDF Downloads 513
3124 Intrusion Detection Techniques in Mobile Adhoc Networks: A Review

Authors: Rashid Mahmood, Muhammad Junaid Sarwar

Abstract:

Mobile ad hoc networks (MANETs) use has been well-known from the last few years in the many applications, like mission critical applications. In the (MANETS) prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in (MANETs). The authentication and encryption is considered the first solution of the MANETs problem where as now these are not sufficient as MANET use is increasing. In this paper we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in MANET and aim to comparing in some important fields.

Keywords: MANET, IDS, intrusions, signature, detection, prevention

Procedia PDF Downloads 379
3123 Research and Application of Consultative Committee for Space Data Systems Wireless Communications Standards for Spacecraft

Authors: Cuitao Zhang, Xiongwen He

Abstract:

According to the new requirements of the future spacecraft, such as networking, modularization and non-cable, this paper studies the CCSDS wireless communications standards, and focuses on the low data-rate wireless communications for spacecraft monitoring and control. The application fields and advantages of wireless communications are analyzed. Wireless communications technology has significant advantages in reducing the weight of the spacecraft, saving time in spacecraft integration, etc. Based on this technology, a scheme for spacecraft data system is put forward. The corresponding block diagram and key wireless interface design of the spacecraft data system are given. The design proposal of the wireless node and information flow of the spacecraft are also analyzed. The results show that the wireless communications scheme is reasonable and feasible. The wireless communications technology can meet the future spacecraft demands in networking, modularization and non-cable.

Keywords: Consultative Committee for Space Data Systems (CCSDS) standards, information flow, non-cable, spacecraft, wireless communications

Procedia PDF Downloads 329
3122 Securing Mobile Ad-Hoc Network Utilizing OPNET Simulator

Authors: Tariq A. El Shheibia, Halima Mohamed Belhamad

Abstract:

This paper is considered securing data based on multi-path protocol (SDMP) in mobile ad hoc network utilizing OPNET simulator modular 14.5, including the AODV routing protocol at the network as based multi-path algorithm for message security in MANETs. The main idea of this work is to present a way that is able to detect the attacker inside the MANETs. The detection for this attacker will be performed by adding some effective parameters to the network.

Keywords: MANET, AODV, malicious node, OPNET

Procedia PDF Downloads 295
3121 Exploring the Potential of Mobile Learning in Distance Higher Education: A Case Study of the University of Jammu, Jammu, and Kashmir

Authors: Darshana Sharma

Abstract:

Distance Education has emerged as a viable alternative to serve the higher educational needs of the socially and economically disadvantaged people of the remote, rural areas of Jammu region. The University of Jammu is a National Accreditation, and Assessment Council accredited, A+ university and has been accorded graded autonomy by the University Grants Commission. It is a dual mode university offering academic programmes through the regular departments and through the Directorate of Distance Education. The Directorate of Distance Education, University of Jammu still uses printed study material as a mode of instructional delivery. The development of technologies has assured increased interaction and communication for distance learners throughout the distance open learning institutions. Though it is tempting and convenient to adopt technology already being used by others, it may not prove effective for the simple reason that two institutions may be unlike in some respect. The use of technology must be conceived in view of the needs of the learners; geographical socio-economic-cultural and technological contexts and financial, administrative and academic resources of the institution. Mobile learning (m-learning) is a novel approach to knowledge acquisition and dissemination and is gaining global attention. It has evolved as one of the useful channels of distance learning promoting interaction between learners and teachers. It is felt that the Directorate of Distance Education, University of Jammu also needs to adopt new technologies to provide more effective academic and information support to distance learners in order to keep them motivated and also to develop self-learning skills. The chief objective of the research on which this paper is based was to measure the opinion of the distance learners of the DDE, the University of Jammu about the merits of mobile learning. It also explores their preferences for implementing mobile learning. The survey research design of descriptive research has been used. The data was collected from 400 distance learners enrolled with undergraduate and post-graduate programmes using self-constructed questionnaire containing five-point Likert scale items arranging from strongly agree, agree, indifferent, disagree and strongly disagree. Percentages were used to analyze the data. The findings lead to conclude that mobile learning has a great potential for the DDE for reaching out to the rural, remotely located distance learners of the Jammu region and also to improve the teaching-learning environment. The paper also finds out the challenges in the implementation of mobile learning in the region and further makes suggestions for effective implementation of mobile learning in DDE, University of Jammu.

Keywords: directorate of distance education, mobile learning, national accreditation and assessment council, university of Jammu

Procedia PDF Downloads 123
3120 The Role and Significance of Mobile Gerdarmarie Battalions in the Canakkale Battles

Authors: Muzaffer Topgül, Ersi̇n Yilmaz

Abstract:

One of the unknown aspects of Çanakkale Battles is that the importance and contributions of Mobile Gendarmarie Battalion have not been fully understood. It was because the battles of the troops which were deployed more in interior parts of Gallipoli Peninsula, and the contributions of battle on level tactical troops were not considered as much as the studies on strategical or operative level troops. When the operation field and battle plans are examined, instead of deploying along the coast to put the forces with a power at zero level landing on the coast out of action, the main battle components are seen to have deployed as strong reserves in the more inner areas. The negative effect of the field on the great trop operation reveals the need for time in order to use the intervention forces. ‘Time’ emerged as the main factor in victory as a result of giving intervention opportunity to the troops. While ordering his soldiers in Conkbayırı to die rather than fight, Liutenant Colonel Mustafa Kemal, the Commander of the 19th division, also emphasized the significance of time. In this respect, the contribution of Mobile Gendarmarie Battalion which saved time for the troops to intervene can be clearly seen. During the study, the memoirs and the works written by military institutions based on the record sources under the light of the notes taken during the trips to the region were used. By preventing the enemies from capturing the area, Mobile Gendarmerie Battalions had an important role in Battles of Kerevizdere, Kireçtepe and Alçıtepe which were of great importance among the battles. The success of these battalions was expressed with compliment by both Turkish and foreign commanders that participated in the war. During the battles the losses of armed forces commissioned to keep the security and order brought about the formation of the regions deficient in state authority.

Keywords: Canakkale battles, mustafa kemal, mobile gerdarmarie, Ottoman empire, time

Procedia PDF Downloads 446
3119 Heavy Metals in Selected Infant Milk Formula

Authors: Suad M. Abuzariba, M. Gazette

Abstract:

To test for the presence of toxic heavy metals, specifically Arsenic, Lead, and Mercury in formula milk available in Misrata city north of Libya for infants aged 6-12 months through Atomic Absorption Spectrophotometer,30 samples of imported milk formula in Libyan markets subjected to test to accurate their pollution with heavy metals, We get concentration of Hg, Ar, Pb in milk formula samples was between 0.002-1.37, 1.62-0.04–2.16, 0.15–0.65 respectively, when compared the results with Libyan &WHO standards ,they were within standards of toxic heavy metals. The presence or absence of toxic heavy metals (Lead, Arsenic, and Mercury) in selected infant formula milk and their levels within or beyond standards set by the WHO. The three infant formulas tested, all were negative for Arsenic and Lead, while two out of the three infant formulas tested positive for Mercury with levels of 0.6333ppm and 0.8333ppm. The levels of Mercury obtained, expressed in parts per million (ppm), from the two infant formulas tested were above the Provisional Tolerable Weekly Intake of total Mercury, which is 0.005ppm, as set by the FAO, WHO, and JECFA.

Keywords: heavy metals, milk formula, Libya, toxic

Procedia PDF Downloads 510
3118 Financial Technology: The Key to Achieving Financial Inclusion in Developing Countries Post COVID-19 from an East African Perspective

Authors: Yosia Mulumba, Klaus Schmidt

Abstract:

Financial Inclusion is considered a key pillar for development in most countries around the world. Access to affordable financial services in a country’s economy can be a driver to overcome poverty and reduce income inequalities, and thus increase economic growth. Nevertheless, the number of financially excluded populations in developing countries continues to be very high. This paper explores the role of Financial Technology (Fintech) as a key driver for achieving financial inclusion in developing countries post the COVID-19 pandemic with an emphasis on four East African countries: Kenya, Tanzania, Uganda, and Rwanda. The research paper is inspired by the positive disruption caused by the pandemic, which has compelled societies in East Africa to adapt and embrace the use of financial technology innovations, specifically Mobile Money Services (MMS), to access financial services. MMS has been further migrated and integrated with other financial technology innovations such as Mobile Banking, Micro Savings, and Loans, and Insurance, to mention but a few. These innovations have been adopted across key sectors such as commerce, health care, or agriculture. The research paper will highlight the Mobile Network Operators (MNOs) that are behind MMS, along with numerous innovative products and services being offered to the customers. It will also highlight the regulatory framework under which these innovations are being governed to ensure the safety of the customers' funds.

Keywords: financial inclusion, financial technology, regulatory framework, mobile money services

Procedia PDF Downloads 146
3117 Language on Skin Whitening Products in Pakistan Promotes Unfair Beauty Standards: A Critical Discourse Analysis

Authors: Azeem Alphonce

Abstract:

In Pakistan, there is a variety of skin tones and colors across all provinces. However, a fair complexion is one of the standards of beauty among females in Pakistan, which creates insecurities in dark-complexioned females. This research is a critical discourse analysis of the language used on beauty products for females in Pakistan. The purpose was to analyze the language used on female beauty products using Van Dijk's three-stage socio-cognitive model to understand what message is received from the few words written and repeated across the packaging of various facial products, why such language is used and what are its wider socio-cognitive effects? The criterion for the selection of beauty products was skin whitening terminologies and the language used on these products. The results showed that over 57 per cent of products utilized skin-whitening terms. The adjectives written on the package indicate that fairer skin is the ultimate beauty goal of females. The analysis explored how the language reinforces unfair beauty standards and perpetuates colorism. It was concluded that female beauty products utilize discriminatory discourse by marginalizing individuals of darker skin tones. Fairer skin is promoted, whereas darker skin is referred to as a problem, flaw or imperfection. Socially shared mental models seem to have caused beauty companies to exploit and promote perceptions of colorism in society. Therefore, such discourse should be prevented, and beauty companies should utilize their discourse to promote acceptance of various skin tones.

Keywords: language, skin whitening products, beauty standards, social mental models

Procedia PDF Downloads 71
3116 Individualized Teaching Process for Pupils with Moderate Mental Disability

Authors: VojtěCh Gybas, Libor Klubal, KateřIna KostoláNyová

Abstract:

Individualized teaching process for pupils with moderate mental disabilities with the help of using mobile touch devices may be one of the forms of teaching to achieve better development of these students during the teaching process. Didactics of information and communication technology (ICT) for special primary schools, where within the Czech Republic pupils with moderate mental retardation are educated, is not precisely and clearly defined. Still, general educational program for elementary school contains a special educational area of information and communication technology, in which the work and content area are focused on work with the classic desktop, and it is not always acceptable in the case of students with moderate mental disabilities. Individualization of their schooling requires a fully elaborate content of teaching material corresponding with intellectual abilities and individuality of each pupil. After three years of daily use of mobile touch devices iPad and participant observation of 7 pupils in a class from special elementary school, we can say that these technologies can be a very useful tool, and in many ways, they even exceed, compensate and replace freely available printed educational material that is rather outdated. By working with mobile touch technology, a pupil gains responsibility, trains his will, learns to rely on himself. The first results obtained from the case studies suggest that this form of teaching may also be beneficial for pupils with moderate mental disabilities.

Keywords: individualized teaching, mobile touch technology, iPad, moderate mental disability, special education needs

Procedia PDF Downloads 328
3115 Measurement and Analysis of Building Penetration Loss for Mobile Networks in Tripoli Area

Authors: Tammam A. Benmusa, Mohamed A. Shlibek, Rawad M. Swesi

Abstract:

The investigation of Buildings Penetration Loss (BPL) of radio signal is getting more and more important. It plays an important role in calculating the indoor coverage for wireless communication networks. In this paper, the theory behind BPL and its mechanisms have been reviewed. The operating frequency, coverage area type, climate condition, time of measurement, and other factors affecting the values of BPL have been discussed. The practical part of this work was conducting 4000 measurements of BPL in different areas in the Libyan capital, Tripoli, to get empirical model for this loss. The measurements were taken for 2 different types of wireless communication networks; mobile telephone network (for Almadar company), which operates at 900 MHz and WiMAX network (LTT company) which operates at 2500 MHz. The results for each network were summarized and presented in several graphs. The graphs are showing how the BPL affected by: time of measurement, morphology (type of area), and climatic environment.

Keywords: building penetration loss, wireless network, mobile network, link budget, indoor network performance

Procedia PDF Downloads 384
3114 Business Challenges and Opportunities of Mobile Applications for Equity Trading in India

Authors: Helee Dave

Abstract:

Globalization has helped in the growth and change of the Indian economy to a great extent. The purchasing power of Indians has increased. IT Infrastructure has considerably improved in India. There is an increase in the usage of smartphones. The smartphones facilitate all sorts of work now a day, from getting groceries to planning a tour; it is just one click away. Similar is the case with equity trading. The traders in equity market can now deal with their stocks through mobile applications eliminating the middle man. The traders do not have an option but to open a dematerialization account with the banks which are compulsory enough irrespective of their mode of transaction that is online or offline. Considering that India is a young country having more than 50% of its population below the age of 25 and 65% of its population below the age of 35; this youth is comfortable with the usage of smartphones. The banking industry is also providing a virtual platform supporting equity market industry. Yet equity trading through online applications is at an infant stage. This paper primarily attempts to understand challenges and opportunities faced by equity trading through mobile apps in India.

Keywords: BPO, business process outsourcing, de-materialization account, equity, ITES, information technology enabled services

Procedia PDF Downloads 312
3113 Swift Rising Pattern of Emerging Construction Technology Trends in the Construction Management

Authors: Gayatri Mahajan

Abstract:

Modern Construction Technology (CT) includes a broad range of advanced techniques and practices that bound the recent developments in material technology, design methods, quantity surveying, facility management, services, structural analysis and design, and other management education. Adoption of recent digital transformation technology is the need of today to speed up the business and is also the basis of construction improvement. Incorporating and practicing the technologies such as cloud-based communication and collaboration solution, Mobile Apps and 5G,3D printing, BIM and Digital Twins, CAD / CAM, AR/ VR, Big Data, IoT, Wearables, Blockchain, Modular Construction, Offsite Manifesting, Prefabrication, Robotic, Drones and GPS controlled equipment expedite the progress in the Construction industry (CI). Resources used are journaled research articles, web/net surfing, books, thesis, reports/surveys, magazines, etc. The outline of the research organization for this study is framed at four distinct levels in context to conceptualization, resources, innovative and emerging trends in CI, and better methods for completion of the construction projects. The present study conducted during 2020-2022 reveals that implementing these technologies improves the level of standards, planning, security, well-being, sustainability, and economics too. Application uses, benefits, impact, advantages/disadvantages, limitations and challenges, and policies are dealt with to provide information to architects and builders for smooth completion of the project. Results explain that construction technology trends vary from 4 to 15 for CI, and eventually, it reaches 27 for Civil Engineering (CE). The perspective of the most recent innovations, trends, tools, challenges, and solutions is highly embraced in the field of construction. The incorporation of the above said technologies in the pandemic Covid -19 and post-pandemic might lead to a focus on finding out effective ways to adopt new-age technologies for CI.

Keywords: BIM, drones, GPS, mobile apps, 5G, modular construction, robotics, 3D printing

Procedia PDF Downloads 105
3112 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures

Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius

Abstract:

The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.

Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal

Procedia PDF Downloads 487
3111 Dynamic Ad-hoc Topologies for Mobile Robot Navigation Based on Non-Uniform Grid Maps

Authors: Peter Sauer, Thomas Hinze, Petra Hofstedt

Abstract:

To avoid obstacles in the surrounding environment and to navigate to a given target belong to the most important tasks for mobile robots. According to these tasks different data structures are suitable. To avoid near obstacles, occupancy grid maps are an ideal representation of the surroundings. For less fine grained tasks, such as navigating from one room to another in an apartment, pure grid maps are inappropriate. Grid maps are very detailed, calculating paths to navigate between rooms based on grid maps would take too long. Instead, graph-based data structures, so-called topologies, turn out to be a proper choice for such tasks. In this paper we present two methods to dynamically create topologies from grid maps. Both methods are based on non-uniform grid maps. The topologies are generated on-the-fly and can easily be modified to represent changes in the environment. This allows a hybrid approach to control mobile robots, where, depending on the situation and the current task, either the grid map or the generated topology may be used.

Keywords: robot navigation, occupancy grids, topological maps, dynamic map creation

Procedia PDF Downloads 563
3110 Mobile Phones, (Dis) Empowerment and Female Headed Households: Trincomalee, Sri Lanka

Authors: S. A. Abeykoon

Abstract:

This study explores the empowerment potential of the mobile phone, the widely penetrated and greatly affordable communication technology in Sri Lanka, for female heads of households in Trincomalee District, Sri Lanka-an area recovering from the effects of a 30-year civil war and the 2004 Boxing Day Tsunami. It also investigates how the use of mobile phones by these women is shaped and appropriated by the gendered power relations and inequalities in their respective communities and by their socio-economic factors and demographic characteristics. This qualitative study is based on the epistemology of constructionism; interpretivist, functionalist and critical theory approaches; and the process of action research. The data collection was conducted from September 2014 to November 2014 in two Divisional Secretaries of the Trincomalee District, Sri Lanka. A total of 30 semi-structured depth interviews and six focus groups with the female heads of households of Sinhalese, Tamil and Muslim ethnicities were conducted using purposive, representative and snowball sampling methods. The Grounded theory method was used to analyze transcribed interviews, focus group discussions and field notes that were coded and categorized in accordance with the research questions and the theoretical framework of the study. The findings of the study indicated that the mobile phone has mainly enabled the participants to balance their income earning activities and family responsibilities and has been useful in maintaining their family and social relationships, occupational duties and in making decisions. Thus, it provided them a higher level of security, safety, reassurance and self-confidence in carrying out their daily activities. They also practiced innovative strategies for the effective and efficient use of their mobile expenses. Although participants whose husbands or relatives have migrated were more tended to use smart phones, mobile literacy level of the majority of the participants was at a lower level limited to making and receiving calls and using SMS (Short Message Service) services. However, their interaction with the mobile phone was significantly shaped by the gendered power relations and their multiple identities based on their ethnicity, religion, class, education, profession and age. Almost all the participants were precautious of giving their mobile numbers to and have been harassed with ‘nuisance calls’ from men. For many, ownership and use of their mobile phone was shaped and influenced by their children and migrated husbands. Although these practices limit their use of the technology, there were many instances that they challenged these gendered harassments. While man-made and natural destructions have disempowered and victimized the women in the Sri Lankan society, they have also liberated women making them stronger and transforming their agency and traditional gender roles. Therefore, their present position in society is reflected in their mobile phone use as they assist such women to be more self-reliant and liberated, yet making them disempowered at some time.

Keywords: mobile phone, gender power relations, empowerment, female heads of households

Procedia PDF Downloads 337
3109 Differences in Production of Knowledge between Internationally Mobile versus Nationally Mobile and Non-Mobile Scientists

Authors: Valeria Aman

Abstract:

The presented study examines the impact of international mobility on knowledge production among mobile scientists and within the sending and receiving research groups. Scientists are relevant to the dynamics of knowledge production because scientific knowledge is mainly characterized by embeddedness and tacitness. International mobility enables the dissemination of scientific knowledge to other places and encourages new combinations of knowledge. It can also increase the interdisciplinarity of research by forming synergetic combinations of knowledge. Particularly innovative ideas can have their roots in related research domains and are sometimes transferred only through the physical mobility of scientists. Diversity among scientists with respect to their knowledge base can act as an engine for the creation of knowledge. It is therefore relevant to study how knowledge acquired through international mobility affects the knowledge production process. In certain research domains, international mobility may be essential to contextualize knowledge and to gain access to knowledge located at distant places. The knowledge production process contingent on the type of international mobility and the epistemic culture of a research field is examined. The production of scientific knowledge is a multi-faceted process, the output of which is mainly published in scholarly journals. Therefore, the study builds upon publication and citation data covered in Elsevier’s Scopus database for the period of 1996 to 2015. To analyse these data, bibliometric and social network analysis techniques are used. A basic analysis of scientific output using publication data, citation data and data on co-authored publications is combined with a content map analysis. Abstracts of publications indicate whether a research stay abroad makes an original contribution methodologically, theoretically or empirically. Moreover, co-citations are analysed to map linkages among scientists and emerging research domains. Finally, acknowledgements are studied that can function as channels of formal and informal communication between the actors involved in the process of knowledge production. The results provide better understanding of how the international mobility of scientists contributes to the production of knowledge, by contrasting the knowledge production dynamics of internationally mobile scientists with those being nationally mobile or immobile. Findings also allow indicating whether international mobility accelerates the production of knowledge and the emergence of new research fields.

Keywords: bibliometrics, diversity, interdisciplinarity, international mobility, knowledge production

Procedia PDF Downloads 293
3108 A Learning Effects Research Applied a Mobile Guide System with Augmented Reality for Education Center

Authors: Y. L. Chang, Y. H. Huang

Abstract:

This study designed a mobile guide system that integrates the design principles of guidance and interpretation with augmented reality (AR) as an auxiliary tool for National Taiwan Science Education Center guidance and explored the learning performance of participants who were divided into two visiting groups: AR-guided mode and non-guided mode (without carrying any auxiliary devices). The study included 96 college students as participants and employed a quasi-experimental research design. This study evaluated the learning performance of education center students aided with different guided modes, including their flow experience, activity involvement, learning effects, as well as their attitude and acceptance of using the guide systems. The results showed that (a) the AR guide promoted visitors’ flow experience; (b) the AR-guidance activity involvement and flow experience having a significant positive effect; (c) most of the visitors of mobile guide system with AR elicited a positive response and acceptance attitude. These results confirm the necessity of human–computer–context interaction. Future research can continue exploring the advantages of enhanced learning effectiveness, activity involvement, and flow experience through application of the results of this study.

Keywords: augmented reality, mobile guide system, informal learning, flow experience, activity involvement

Procedia PDF Downloads 231
3107 Reactive and Concurrency-Based Image Resource Management Module for iOS Applications

Authors: Shubham V. Kamdi

Abstract:

This paper aims to serve as an introduction to image resource caching techniques for iOS mobile applications. It will explain how developers can break down multiple image-downloading tasks concurrently using state-of-the-art iOS frameworks, namely Swift Concurrency and Combine. The paper will explain how developers can leverage SwiftUI to develop reactive view components and use declarative coding patterns. Developers will learn to bypass built-in image caching systems by curating the procedure to implement a swift-based LRU cache system. The paper will provide a full architectural overview of a system, helping readers understand how mobile applications are designed professionally. It will cover technical discussion, helping readers understand the low-level details of threads and how they can switch between them, as well as the significance of the main and background threads for requesting HTTP services via mobile applications.

Keywords: main thread, background thread, reactive view components, declarative coding

Procedia PDF Downloads 28
3106 Assessment of Heavy Metal Contamination in Ground Water in the Coastal Part of Cauvery Deltaic Region, South India

Authors: Gnanachandrasamy G., Zhou Y., Ramkumar T., Venkatramanan S., Wang S., Mo Liping, Jingru Zhang

Abstract:

In order to assess the heavy metal contamination totally fourty five groundwater samples were collected from the coastal part of Cauvery deltaic region, South India, during monsoon season in the year of 2017. The study area lies between longitudes 79º15’ to 79º 50’ E and latitudes 10º10’ to 11º20’ N with total area of 2,569 km². The concentration of As, Ba, Cd, Cr, Co, Cu, Ni, Pb, Se, and Zn were analyzed by Inductively Coupled Plasma Mass Spectrometry (ICP-MS). The heavy metals ranged between 0.007-117.8 µg/l for As, 8.503-1281 µg/l for Ba, 0.006-0.12 µg/l for Cd, 0.23-5.572µg/l for Cr, 0.44-17.9 µg/l for Co, 0.633-11.56 µg/l for Cu, 0.467-29.34 µg/l for Ni, 0.008-5.756 µg/l for Pb, 0.979 to 45.49 µg/l for Se, and 2.712-10480 µg/l for Zn in the groundwaters. A comparison of heavy metal concentration with WHO and BIS drinking water standards shows that Ni, Zn, As, Se, and Ba level is higher than the drinking water standards in some of the groundwater samples, and the concentrations of all the other heavy metals were lower than the drinking water standards. The present levels of heavy metal concentration in the studied area groundwaters are moderate to severe to public health and environmental concerns and need attention.

Keywords: cauvery delta, drinking water, groundwater, heavy metals

Procedia PDF Downloads 345
3105 A Fast Calculation Approach for Position Identification in a Distance Space

Authors: Dawei Cai, Yuya Tokuda

Abstract:

The market of localization based service (LBS) is expanding. The acquisition of physical location is the fundamental basis for LBS. GPS, the de facto standard for outdoor localization, does not work well in indoor environment due to the blocking of signals by walls and ceiling. To acquire high accurate localization in an indoor environment, many techniques have been developed. Triangulation approach is often used for identifying the location, but a heavy and complex computation is necessary to calculate the location of the distances between the object and several source points. This computation is also time and power consumption, and not favorable to a mobile device that needs a long action life with battery. To provide a low power consumption approach for a mobile device, this paper presents a fast calculation approach to identify the location of the object without online solving solutions to simultaneous quadratic equations. In our approach, we divide the location identification into two parts, one is offline, and other is online. In offline mode, we make a mapping process that maps the location area to distance space and find a simple formula that can be used to identify the location of the object online with very light computation. The characteristic of the approach is a good tradeoff between the accuracy and computational amount. Therefore, this approach can be used in smartphone and other mobile devices that need a long work time. To show the performance, some simulation experimental results are provided also in the paper.

Keywords: indoor localization, location based service, triangulation, fast calculation, mobile device

Procedia PDF Downloads 174
3104 Use of Social Networks and Mobile Technologies in Education

Authors: Václav Maněna, Roman Dostál, Štěpán Hubálovský

Abstract:

Social networks play an important role in the lives of children and young people. Along with the high penetration of mobile technologies such as smartphones and tablets among the younger generation, there is an increasing use of social networks already in elementary school. The paper presents the results of research, which was realized at schools in the Hradec Králové region. In this research, the authors focused on issues related to communications on social networks for children, teenagers and young people in the Czech Republic. This research was conducted at selected elementary, secondary and high schools using anonymous questionnaires. The results are evaluated and compared with the results of the research, which has been realized in 2008. The authors focused on the possibilities of using social networks in education. The paper presents the possibility of using the most popular social networks in education, with emphasis on increasing motivation for learning. The paper presents comparative analysis of social networks, with regard to the possibility of using in education as well.

Keywords: social networks, motivation, e-learning, mobile technology

Procedia PDF Downloads 313
3103 A Multi-Modal Virtual Walkthrough of the Virtual Past and Present Based on Panoramic View, Crowd Simulation and Acoustic Heritage on Mobile Platform

Authors: Lim Chen Kim, Tan Kian Lam, Chan Yi Chee

Abstract:

This research presents a multi-modal simulation in the reconstruction of the past and the construction of present in digital cultural heritage on mobile platform. In bringing the present life, the virtual environment is generated through a presented scheme for rapid and efficient construction of 360° panoramic view. Then, acoustical heritage model and crowd model are presented and improvised into the 360° panoramic view. For the reconstruction of past life, the crowd is simulated and rendered in an old trading port. However, the keystone of this research is in a virtual walkthrough that shows the virtual present life in 2D and virtual past life in 3D, both in an environment of virtual heritage sites in George Town through mobile device. Firstly, the 2D crowd is modelled and simulated using OpenGL ES 1.1 on mobile platform. The 2D crowd is used to portray the present life in 360° panoramic view of a virtual heritage environment based on the extension of Newtonian Laws. Secondly, the 2D crowd is animated and rendered into 3D with improved variety and incorporated into the virtual past life using Unity3D Game Engine. The behaviours of the 3D models are then simulated based on the enhancement of the classical model of Boid algorithm. Finally, a demonstration system is developed and integrated with the models, techniques and algorithms of this research. The virtual walkthrough is demonstrated to a group of respondents and is evaluated through the user-centred evaluation by navigating around the demonstration system. The results of the evaluation based on the questionnaires have shown that the presented virtual walkthrough has been successfully deployed through a multi-modal simulation and such a virtual walkthrough would be particularly useful in a virtual tour and virtual museum applications.

Keywords: Boid Algorithm, Crowd Simulation, Mobile Platform, Newtonian Laws, Virtual Heritage

Procedia PDF Downloads 277
3102 The Return of the Rejected Kings: A Comparative Study of Governance and Procedures of Standards Development Organizations under the Theory of Private Ordering

Authors: Olia Kanevskaia

Abstract:

Standardization has been in the limelight of numerous academic studies. Typically described as ‘any set of technical specifications that either provides or is intended to provide a common design for a product or process’, standards do not only set quality benchmarks for products and services, but also spur competition and innovation, resulting in advantages for manufacturers and consumers. Their contribution to globalization and technology advancement is especially crucial in the Information and Communication Technology (ICT) and telecommunications sector, which is also characterized by a weaker state-regulation and expert-based rule-making. Most of the standards developed in that area are interoperability standards, which allow technological devices to establish ‘invisible communications’ and to ensure their compatibility and proper functioning. This type of standard supports a large share of our daily activities, ranging from traffic coordination by traffic lights to the connection to Wi-Fi networks, transmission of data via Bluetooth or USB and building the network architecture for the Internet of Things (IoT). A large share of ICT standards is developed in the specialized voluntary platforms, commonly referred to as Standards Development Organizations (SDOs), which gather experts from various industry sectors, private enterprises, governmental agencies and academia. The institutional architecture of these bodies can vary from semi-public bodies, such as European Telecommunications Standards Institute (ETSI), to industry-driven consortia, such as the Internet Engineering Task Force (IETF). The past decades witnessed a significant shift of standard setting to those institutions: while operating independently from the states regulation, they offer a rather informal setting, which enables fast-paced standardization and places technical supremacy and flexibility of standards above other considerations. Although technical norms and specifications developed by such nongovernmental platforms are not binding, they appear to create significant regulatory impact. In the United States (US), private voluntary standards can be used by regulators to achieve their policy objectives; in the European Union (EU), compliance with harmonized standards developed by voluntary European Standards Organizations (ESOs) can grant a product a free-movement pass. Moreover, standards can de facto manage the functioning of the market when other regulative alternatives are not available. Hence, by establishing (potentially) mandatory norms, SDOs assume regulatory functions commonly exercised by States and shape their own legal order. The purpose of this paper is threefold: First, it attempts to shed some light on SDOs’ institutional architecture, focusing on private, industry-driven platforms and comparing their regulatory frameworks with those of formal organizations. Drawing upon the relevant scholarship, the paper then discusses the extent to which the formulation of technological standards within SDOs constitutes a private legal order, operating in the shadow of governmental regulation. Ultimately, this contribution seeks to advise whether a state-intervention in industry-driven standard setting is desirable, and whether the increasing regulatory importance of SDOs should be addressed in legislation on standardization.

Keywords: private order, standardization, standard-setting organizations, transnational law

Procedia PDF Downloads 163
3101 Privacy-Preserving Location Sharing System with Client/Server Architecture in Mobile Online Social Network

Authors: Xi Xiao, Chunhui Chen, Xinyu Liu, Guangwu Hu, Yong Jiang

Abstract:

Location sharing is a fundamental service in mobile Online Social Networks (mOSNs), which raises significant privacy concerns in recent years. Now, most location-based service applications adopt client/server architecture. In this paper, a location sharing system, named CSLocShare, is presented to provide flexible privacy-preserving location sharing with client/server architecture in mOSNs. CSLocShare enables location sharing between both trusted social friends and untrusted strangers without the third-party server. In CSLocShare, Location-Storing Social Network Server (LSSNS) provides location-based services but do not know the users’ real locations. The thorough analysis indicates that the users’ location privacy is protected. Meanwhile, the storage and the communication cost are saved. CSLocShare is more suitable and effective in reality.

Keywords: mobile online social networks, client/server architecture, location sharing, privacy-preserving

Procedia PDF Downloads 331