Search results for: effective communication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12826

Search results for: effective communication

12046 Parents’ Experiences in Using Mobile Tablets with Their Child with Autism to Encourage the Development of Social Communication Skills: The Development of a Parents’ Guide

Authors: Chrysoula Mangafa

Abstract:

Autism is a lifelong condition that affects how individuals interact with others and make sense of the world around them. The two core difficulties associated with autism are difficulties in social communication and interaction, and the manifestation of restricted, repetitive patterns of behaviour. However, children with autism may also have many talents and special interests among which is their affinity with digital technologies. Despite the increasing use of mobile tablets in schools and homes and the children’s motivation in using them, there is limited guidance on how to use the tablets to teach children with autism-specific skills. This study aims to fill this gap in knowledge by providing guidelines about the ways in which iPads and other tablets can be used by parents/carers and their child at home to support the development of social communication skills. Semi-structured interviews with 10 parents of primary school aged children with autism were conducted with the aim to explore their experiences in using mobile devices, such as iPads and Android tablets, and social activities with their children to create opportunities for social communication development. The interview involved questions about the parents’ knowledge and experience in autism, their understanding of social communication skills, the use of technology at home, and their links with the child’s school. Qualitative analysis of the interviews showed that parents used a variety of strategies to boost their child’s social communication skills. Among these strategies were a) the use of communication symbols, b) the use of the child’s special interest as motivator to gain their attention, and c) allowing time to their child to respond. It was also found that parents engaged their child in joint activities such as cooking, role play and creating social stories together on the device. Seven out of ten parents mentioned that the tablet is a motivating tool that can be used to teach social communication skills, nonetheless all parents raised concerns over screen time and their child’s sharing difficulties. The need for training and advice as well as building stronger links with their child’s school was highlighted. In particular, it was mentioned that recommendations would be welcomed about how parents can address their child’s difficulties in initiating or sustaining a conversation, taking turns and sharing, understanding other people’s feelings and facial expressions, and showing interest to other people. The findings of this study resulted in the development of a parents’ guide based on evidence-based practice and the participants’ experiences and concerns. The proposed guidelines aim to urge parents to feel more confident in using the tablet with their child in more collaborative ways. In particular, the guide offers recommendations about how to develop verbal and non-verbal communication, gives examples of tablet-based activities to interact and create things together, as well as it offers suggestions on how to provide a worry-free tablet experience and how to connect with the school.

Keywords: families, perception and cognition in early development, school-age intervention, social development

Procedia PDF Downloads 158
12045 A Survey of Online User Perspectives and Age Profile in an Undergraduate Fundamental Business Technology Course

Authors: Danielle Morin, Jennifer D. E. Thomas, Raafat G. Saade, Daniela Petrachi

Abstract:

Over the past few decades, more and more students choose to enroll in online classes instead of attending in-class lectures. While past studies consider students’ attitudes towards online education and how their grades differed from in-class lectures, the profile of the online student remains a blur. To shed light on this, an online survey was administered to about 1,500 students enrolled in an undergraduate Fundamental Business Technology course at a Canadian University. The survey was comprised of questions on students’ demographics, their reasons for choosing online courses, their expectations towards the course, the communication channels they use for the course with fellow students and with the instructor. This paper focused on the research question: Do the perspectives of online students concerning the online experience, in general, and in the course in particular, differ according to age profile? After several statistical analyses, it was found that age does have an impact on the reasons why students select online classes instead of in-class. For example, it was found that the perception that an online course might be easier than in-class delivery was a more important reason for younger students than for older ones. Similarly, the influence of friends is much more important for younger students, than for older students. Similar results were found when analyzing students’ expectation about the online course and their use of communication tools. Overall, the age profile of online users had an impact on reasons, expectations and means of communication in an undergraduate Fundamental Business Technology course. It is left to be seen if this holds true across other courses, graduate and undergraduate.

Keywords: communication channels, fundamentals of business technology, online classes, pedagogy, user age profile, user perspectives

Procedia PDF Downloads 244
12044 Modelling the Spread of HIV/AIDS Epidemic with Condom Campaign and Treatment

Authors: Marsudi, Noor Hidayat, Ratno Bagus Edy Wibowo

Abstract:

This paper considers a deterministic model for the transmission dynamics of HIV/AIDS in which condom campaign and treatment are both important for the disease management. In modelling of the spread of AIDS, the population is divided into six subpopulations, namely susceptible population, susceptible population who change their behavior due to education condom campaign, infected population, pre-AIDS population, treated population and full-blown AIDS population. We calculate the effective reproduction number using the next generation matrix method and investigate the existence and stability of the equilibrium points. A sensitivity analysis discovers parameters that have a high impact on effective reproduction number and should be targeted by intervention strategies. Numerical simulations are given to illustrate and verify our analytic results.

Keywords: HIV/AIDS, condom campaign, antiretroviral treatment, effective reproduction number, stability and sensitivity analysis

Procedia PDF Downloads 263
12043 Review of Malaria Diagnosis Techniques

Authors: Lubabatu Sada Sodangu

Abstract:

Malaria is a major cause of death in tropical and subtropical nations. Malaria cases are continually rising as a result of a number of factors, despite the fact that the condition is now treatable using effective methods. In this situation, quick and effective diagnostic methods are essential for the management and control of malaria. Malaria diagnosis using conventional methods is still troublesome, hence new technologies have been created and implemented to get around the drawbacks. The review describes the currently known malaria diagnostic techniques, their strengths and shortcomings.

Keywords: malaria, technique, diagnosis, Africa

Procedia PDF Downloads 52
12042 Review of Malaria Diagnosis Techniques

Authors: Lubabatu Sada Sodangi

Abstract:

Malaria is a major cause of death in tropical and subtropical nations. Malaria cases are continually rising as a result of a number of factors, despite the fact that the condition is now treatable using effective methods. In this situation, quick and effective diagnostic methods are essential for the management and control of malaria. Malaria diagnosis using conventional methods is still troublesome; hence, new technologies have been created and implemented to get around the drawbacks. The review describes the currently known malaria diagnostic techniques, their strengths, and shortcomings.

Keywords: malaria, technique, diagnosis, Africa

Procedia PDF Downloads 57
12041 Capacity Estimation of Hybrid Automated Repeat Request Protocol for Low Earth Orbit Mega-Constellations

Authors: Arif Armagan Gozutok, Alper Kule, Burak Tos, Selman Demirel

Abstract:

Wireless communication chain requires effective ways to keep throughput efficiency high while it suffers location-dependent, time-varying burst errors. Several techniques are developed in order to assure that the receiver recovers the transmitted information without errors. The most fundamental approaches are error checking and correction besides re-transmission of the non-acknowledged packets. In this paper, stop & wait (SAW) and chase combined (CC) hybrid automated repeat request (HARQ) protocols are compared and analyzed in terms of throughput and average delay for the usage of low earth orbit (LEO) mega-constellations case. Several assumptions and technological implementations are considered as well as usage of low-density parity check (LDPC) codes together with several constellation orbit configurations.

Keywords: HARQ, LEO, satellite constellation, throughput

Procedia PDF Downloads 142
12040 Rethinking the Air Quality Health Index: Harmonizing Health Protection and Climate Mitigation

Authors: Kimberly Tasha Jiayi Tang, Changqing Lin, Zhe Wang, Tze-Wai Wong, Md. Shakhaoat Hossain, Jian Yu, Alexis Lau

Abstract:

Hong Kong has practiced a risk-based Air Quality Health Index (AQHI) system that sums hospitalization risks associated with short-term exposure to air pollu-tants. As an air pollution risk communication tool, it informs the public about the current air quality, anchoring around the World Health Organization's (WHO) 2005 Air Quality Guidelines (AQGs). Given the WHO's recent update in 2021, assessing how Hong Kong’s air quality risk communication can be en-hanced using these updated guidelines is essential. Hong Kong’s AQHI is lim-ited by solely focusing on short-term health risks, which could lead the public to underestimate cumulative health impacts. Therefore, we propose the intro-duction of a composite AQHI that reports both long-term and short-term health risks. Additionally, the WHO interim targets will be considered as anchor points for various health risk categories. Furthermore, with the increasing ozone levels in Hong Kong and Southern China due to improved NOx mitigation measures, it has been a challenging task in balancing health protection against climate mitigation. However, our findings present a promising outlook. Despite the rise in ozone levels, the combined health risks in Hong Kong and Guang-dong have seen a decline, largely due to reductions in NO2 and PM concentra-tions, both having significant health implications. By shifting from a concentra-tion-based approach to a health risk-based system like the AQHI, our study highlights the prospective of harmonizing health protection and climate mitiga-tion goals. This health-focused framework suggests that rigorous NOx controls can effective-ly serve both objectives in parallel.

Keywords: air quality management, air quality health index, health risk management, air pollution

Procedia PDF Downloads 70
12039 A Novel Image Steganography Scheme Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

Growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC) and Image Fidelity (IF) over the previous techniques.

Keywords: fractal image, information hiding, Mandelbrot et fractal, steganography

Procedia PDF Downloads 536
12038 Transportation Language Register as One of Language Community

Authors: Diyah Atiek Mustikawati

Abstract:

Language register refers to a variety of a language used for particular purpose or in a particular social setting. Language register also means as a concept of adapting one’s use of language to conform to standards or tradition in a given professional or social situation. This descriptive study tends to discuss about the form of language register in transportation aspect, factors, also the function of use it. Mostly, language register in transportation aspect uses short sentences in form of informal register. The factor caused language register used are speaker, word choice, background of language. The functions of language register in transportations aspect are to make communication between crew easily, also to keep safety when they were in bad condition. Transportation language register developed naturally as one of variety of language used.

Keywords: language register, language variety, communication, transportation

Procedia PDF Downloads 479
12037 Health Information Seeking Estonians Aged ≥ 50 Years during the COVID-19 Pandemic

Authors: Marianne Paimre

Abstract:

The COVID-19 crisis has prompted older people to adopt new technologies to facilitate their daily life. This study explored the relationships between socioeconomic indicators, technology acceptance, online health information seeking (OHIS), and health behavior (HB), including readiness for COVID-19 vaccination among Estonian older adults. A cross-sectional survey was conducted among 501 people aged ≥ 50 in 2020. Its findings indicate that the more recurrent the need for health information was (rho = .11, p<.05), and the more regularly one searched for it (rho = .14, p<.01), the more willing a person was to get vaccinated. Also, interest in digital applications corresponded to vaccination readiness (rho = .25, p<.001). However, this relationship did not emerge in the case of other health behaviors such as healthy diet and exercise. Differences in health information behavior (HIB) should be considered when developing effective means of health communication designed especially for crisis situations.

Keywords: older adults, technology acceptance, health information behavior, health behavior, COVID-19 pandemic

Procedia PDF Downloads 91
12036 Maintaining User-Level Security in Short Message Service

Authors: T. Arudchelvam, W. W. E. N. Fernando

Abstract:

Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.

Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication

Procedia PDF Downloads 393
12035 Calculation of Effective Masses and Curie Temperature of (Ga, Mn) as Diluted Magnetic Semiconductor from the Eight-band k.p Model

Authors: Khawlh A. Alzubaidi, Khadijah B. Alziyadi, Amor M. Alsayari

Abstract:

The discovery of a dilute magnetic semiconductor (DMS) in which ferromagnetism is carrier-mediated and persists above room temperature is a major step toward the implementation of spintronic devices for processing, transferring, and storing of information. Among the many types of DMS materials which have been investigated, Mn-doped GaAs has become one of the best candidates for technological application. However, despite major developments over the last few decades, the maximum Curie temperature (~200 K) remains well below room temperature. In this work, we have studied the effect of Mn content and strain on the GaMnAs effective masses of electron, heavy and light holes calculated in the different crystallographic direction. Also, the Curie temperature in the DMS GaMnAs alloy is determined. Compilation of GaMnAs band parameters have been carried out using the 8-band k.p model based on Lowdin perturbation theory where spin orbit, sp-d exchange interaction, and biaxial strain are taken into account. Our results show that effective masses, calculated along the different crystallographic directions, have a strong dependence on strain, ranging from -2% (tensile strain) to 2% (compressive strain), and Mn content increased from 1 to 5%. The Curie temperature is determined within the mean-field approach based on the Zener model.

Keywords: diluted magnetic semiconductors, k.p method, effective masses, curie temperature, strain

Procedia PDF Downloads 89
12034 Highly-Efficient Photoreaction Using Microfluidic Device

Authors: Shigenori Togashi, Yukako Asano

Abstract:

We developed an effective microfluidic device for photoreactions with low reflectance and good heat conductance. The performance of this microfluidic device was tested by carrying out a photoreactive synthesis of benzopinacol and acetone from benzophenone and 2-propanol. The yield reached 36% with an irradiation time of 469.2 s and was improved by more than 30% when compared to the values obtained by the batch method. Therefore, the microfluidic device was found to be effective for improving the yields of photoreactions.

Keywords: microfluidic device, photoreaction, black aluminum oxide, benzophenone, yield improvement

Procedia PDF Downloads 240
12033 Enhancing Emotional Regulation in Autistic Students with Intellectual Disabilities through Visual Dialogue: An Action Research Study

Authors: Tahmina Huq

Abstract:

This paper presents the findings of an action research study that aimed to investigate the efficacy of a visual dialogue strategy in assisting autistic students with intellectual disabilities in managing their immediate emotions and improving their academic achievements. The research sought to explore the effectiveness of teaching self-regulation techniques as an alternative to traditional approaches involving segregation. The study identified visual dialogue as a valuable tool for promoting self-regulation in this specific student population. Action research was chosen as the methodology due to its suitability for immediate implementation of the findings in the classroom. Autistic students with intellectual disabilities often face challenges in controlling their emotions, which can disrupt their learning and academic progress. Conventional methods of intervention, such as isolation and psychologist-assisted approaches, may result in missed classes and hindered academic development. This study introduces the utilization of visual dialogue between students and teachers as an effective self-regulation strategy, addressing the limitations of traditional approaches. Action research was employed as the methodology for this study, allowing for the direct application of the findings in the classroom. The study observed two 15-year-old autistic students with intellectual disabilities who exhibited difficulties in emotional regulation and displayed aggressive behaviors. The research question focused on the effectiveness of visual dialogue in managing the emotions of these students and its impact on their learning outcomes. Data collection methods included personal observations, log sheets, personal reflections, and visual documentation. The study revealed that the implementation of visual dialogue as a self-regulation strategy enabled the students to regulate their emotions within a short timeframe (10 to 30 minutes). Through visual dialogue, they were able to express their feelings and needs in socially appropriate ways. This finding underscores the significance of visual dialogue as a tool for promoting emotional regulation and facilitating active participation in classroom activities. As a result, the students' learning outcomes and social interactions were positively impacted. The findings of this study hold significant implications for educators working with autistic students with intellectual disabilities. The use of visual dialogue as a self-regulation strategy can enhance emotional regulation skills and improve overall academic progress. The action research approach outlined in this paper provides practical guidance for educators in effectively implementing self-regulation strategies within classroom settings. In conclusion, the study demonstrates that visual dialogue is an effective strategy for enhancing emotional regulation in autistic students with intellectual disabilities. By employing visual communication, students can successfully regulate their emotions and actively engage in classroom activities, leading to improved learning outcomes and social interactions. This paper underscores the importance of implementing self-regulation strategies in educational settings to cater to the unique needs of autistic students.

Keywords: action research, self-regulation, autism, visual communication

Procedia PDF Downloads 60
12032 Cooperative Diversity Scheme Based on MIMO-OFDM in Small Cell Network

Authors: Dong-Hyun Ha, Young-Min Ko, Chang-Bin Ha, Hyoung-Kyu Song

Abstract:

In Heterogeneous network (HetNet) can provide high quality of a service in a wireless communication system by composition of small cell networks. The composition of small cell networks improves cell coverage and capacity to the mobile users.Recently, various techniques using small cell networks have been researched in the wireless communication system. In this paper, the cooperative scheme obtaining high reliability is proposed in the small cell networks. The proposed scheme suggests a cooperative small cell system and the new signal transmission technique in the proposed system model. The new signal transmission technique applies a cyclic delay diversity (CDD) scheme based on the multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) system to obtain improved performance. The improved performance of the proposed scheme is confirmed by the simulation results.

Keywords: adaptive transmission, cooperative communication, diversity gain, OFDM

Procedia PDF Downloads 499
12031 Learners’ Characteristics as Correlates of Effective English Language Teaching in English as a Second Language Classroom

Authors: Jimoh Olumide Yusuf

Abstract:

Various factors have continued to bedevil the effective teaching and learning of English Language in Nigeria and prominent among these factors are learners’ characteristics. Unfortunately, these particular factors seem to have recorded paucity of research efforts by scholars and the problem of lack of proficiency in the target language continues to linger. This study therefore investigates the relationship between specific learners’ characteristics and effective teaching of English as a Second Language (ESL) in senior secondary schools in Nigeria. To this end, Self-Determination, and Integrative Motivation Theories were applied to investigate motivation, language learning, learners’ characteristics and its relationship to language proficiency. A survey of 500 students and 100 English Language teachers across 20 schools was conducted. Descriptive statistics was used to analyze the data and findings revealed that; specific learners’ characteristics such as learners’ age, learning style and motivation significantly determine the performance of students in English Language. Specifically, students with appropriate school age, visual learning style and intrinsic motivation, demonstrated English Language proficiency; as they performed better than students with extrinsic motivation, audio and kinaesthetic learning styles. Moreover, teachers related factors such as teaching experience; teaching strategies and teachers’ extrinsic motivation also emerged as essential correlates of effective language teaching. The findings conclude that learning characteristics are significant factors that should be considered by the teachers and education planners for adequate, sequential and effective implementation of the ESL curriculum in Nigeria.

Keywords: senior secondary school, English as a second language, intrinsic motivation, Kinaesthetic learning style

Procedia PDF Downloads 15
12030 The Effect of Varying Cone Beam Computed Tomography Image Resolution and Field-of-View Centralization on the Effective Radiation Dose

Authors: Fatima M. Jadu, Asmaa A. Alzahrani, Maha A. Almutairi, Salma O. Al-Amoudi, Mawya A. Khafaji

Abstract:

Introduction: Estimating the potential radiation risk for a widely used imaging technique such as cone beam CT (CBCT) is crucial. The aim of this study was to examine the effect of varying two CBCT technical factors, the voxel size (VOX) and the Field-of-View (FOV) centralization, on the radiation dose. Methodology: The head and neck slices of a RANDO® man phantom (Alderson Research Laboratories) were used with nanoDot™ OSLD dosimeters to measure the absorbed radiation dose at 25 predetermined sites. Imaging was done using the i-CAT® (Imaging Science International, Hatfield, PA, USA) CBCT unit. The VOX was changed for every three cycles of exposures from 0.2mm to 0.3mm and then 0.4mm. Then the FOV was centered on the maxilla and mandible alternatively while holding all other factors constant. Finally, the effective radiation dose was calculated for each view and voxel setting. Results: The effective radiation dose was greatest when the smallest VOX was chosen. When the FOV was centered on the maxilla, the highest radiation doses were recorded in the eyes and parotid glands. While on the mandible, the highest radiation doses were recorded in the sublingual and submandibular glands. Conclusion: Minor variations in the CBCT exposure factors significantly affect the effective radiation dose and thus the radiation risk to the patient. Therefore, extreme care must be taken when choosing these parameters especially for vulnerable patients such as children.

Keywords: CBCT, cone beam CT, effective dose, field of view, mandible, maxilla, resolution, voxel

Procedia PDF Downloads 262
12029 Autism: Impact on Cognitive, Social-Communication and Behavioural Development

Authors: Prachi Sharma, B. V. Ramkumar

Abstract:

In current days, autism is a well-known neurodevelopmental disorder that may restrict child development globally. Ignorance or delayed identification or incorrect diagnosis of autism is a major challenge in controlling such an incurable disorder. This may lead to various behavioural complications followed by mental illness in adulthood. Autism is an incurable disorder that is progressive and negatively affects our development globally. This may vary in degree in different skills. However, a deviation from the normal range creates a complex outcome in social and communication areas and restricts or deviates cognitive ability. The primary goal of the present research is to identify and understand the deviations in cognitive, social communication, and behaviour in children during their growing age, with a focus on autism. In this study, five children with mild autism were taken. All the children had achieved normal developmental milestones until the age of one year. The maximum age of observation of children’s development was four years to see the difference in their developmental rates in the areas of cognitive, social communication, and behaviour. The study is based on the parental report about their children from 1 year to 4 years. Videos and pictures of children during their development were also seen as a reference to verify information received by the parents of the children. This research is qualitative, with samples for which were selected using a purposive sampling technique. The data was collected from the OPD, NIEPID RC, NOIDA, India. The data was collected in the form of parental reports based on their observations about their kids. Videos were also seen to verify the information reported by the parents (just shown to verify the facts, not shared). In results, we observed a significant difference in the rate of development in all five children taken for this research. The children having mild autism, at present, showed variations in all three domains (cognitive, social communication, and behaviour). These variations were seen in terms of restricted development in global areas. The result revealed that typical features of ASD had created more cognitive restrictions as compared to the children having ASD features with hyperactivity. Behavioral problems were observed with different levels of severity in the children having ASD with hyperactivity, whereas children with typical ASD are found with some typical problem behaviours like head banging, body rocking, self-biting, etc., with different levels of severity. The social-communication area was observed as equally affected in all children, as no major difference was found in the information received from each parent.

Keywords: autism/ASD, behaviour, cognitive skill, hyperactivity, social-communication skill

Procedia PDF Downloads 31
12028 Repository Blockchain for Collaborative Blockchain Ecosystem

Authors: Razwan Ahmed Tanvir, Greg Speegle

Abstract:

Collaborative blockchain ecosystems allow diverse groups to cooperate on tasks while providing properties such as decentralization and transaction security. We provide a model that uses a repository blockchain to manage hard forks within a collaborative system such that a single process (assuming that it has knowledge of the requirements of each fork) can access all of the blocks within the system. The repository blockchain replaces the need for Inter Blockchain Communication (IBC) within the ecosystem by navigating the networks. The resulting construction resembles a tree instead of a chain. A proof-of-concept implementation performs a depth-first search on the new structure.

Keywords: hard fork, shared governance, Inter Blockchain Communication, blockchain ecosystem, regular research paper

Procedia PDF Downloads 0
12027 A Goal-Driven Crime Scripting Framework

Authors: Hashem Dehghanniri

Abstract:

Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.

Keywords: attack modelling, crime commission process, crime script, situational crime prevention

Procedia PDF Downloads 124
12026 A Comparative Study about the Use of SMS in Formal Writing of the Students in Universities

Authors: Sajjad Hussain

Abstract:

Technology has revolutionized the way of communication around the globe. Its use and users are multiplying with every passing minute. The current study reveals the effect of SMS on the formal writing of the students. Students are the regular users of this service and have become addict to short language. This short language is understandable to a particular community and not to the whole as it does not adhere to the Standard English writing practices. Data has been collected from quiz, assignments text and through questionaries’ which supports this postulate that students are frequently practicing it in their formal writing. Certain corrosive measures needs to be taken to address the issue. Second language learners have been found it practicing to greater extent.

Keywords: information technology, SMS, messaging, communication, social media, internet, language

Procedia PDF Downloads 531
12025 Assessment the Quality of Telecommunication Services by Fuzzy Inferences System

Authors: Oktay Nusratov, Ramin Rzaev, Aydin Goyushov

Abstract:

Fuzzy inference method based approach to the forming of modular intellectual system of assessment the quality of communication services is proposed. Developed under this approach the basic fuzzy estimation model takes into account the recommendations of the International Telecommunication Union in respect of the operation of packet switching networks based on IP-protocol. To implement the main features and functions of the fuzzy control system of quality telecommunication services it is used multilayer feedforward neural network.

Keywords: quality of communication, IP-telephony, fuzzy set, fuzzy implication, neural network

Procedia PDF Downloads 466
12024 A Novel Image Steganography Method Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

The growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC), and Image Fidelity (IF) over the pervious techniques.

Keywords: fractal image, information hiding, Mandelbrot set fractal, steganography

Procedia PDF Downloads 614
12023 Women’s Language and Gender Positioning in the Discourse of Indonesian Instagram Videos

Authors: Haira Rizka, Imas Istiani

Abstract:

The way women and men use language is an interesting topic to discuss. Nowadays, Instagram shows many videos which illustrate the difference of women’s and men’s language. Furthermore, the videos show how different genders behave in daily communication. This research aims to (1) investigate conversational characteristics of women represented in Indonesian Instagram videos, and (2) investigate how different genders behave in daily communication. To analyze the two research problems, this research employs Tannen’s theory of language and gender (1996). This is a descriptive qualitative research which describes phenomena of language and gender shown in Indonesian Instagram videos. The data were collected through observation. The collected data were then analyzed by employing ethnography and textual analysis. The research results show that in Indonesian Instagram videos, women dominate the conversation than men. Women’s are portrayed as a figure who are talkative, never wrong, and sensitive. Women’s dominating men proves that women always want to be understood, produce more words than men, and are more creative in producing verbal communication. Meanwhile, men are portrayed as calm, gentle, and patient creature who listen to women’s talk. Furthermore, men are portrayed to prefer being silent for avoiding conflict.

Keywords: gender, Instagram videos, language variety, women's language

Procedia PDF Downloads 421
12022 Effective Design Factors for Bicycle-Friendly Streets

Authors: Zohreh Asadi-Shekari, Mehdi Moeinaddini, Muhammad Zaly Shah, Amran Hamzah

Abstract:

Bicycle level of service (BLOS) is a measure for evaluating street conditions for cyclists. Currently, various methods are proposed for BLOS. These analytical methods however have some drawbacks: they usually assume cyclists as users that can share street facilities with motorized vehicles, it is not easy to link them to design process and they are not easy to follow. In addition, they only support a narrow range of cycling facilities and may not be applicable for all situations. Along this, the current paper introduces various effective design factors for bicycle-friendly streets. This study considers cyclists as users of streets who have special needs and facilities. Therefore, the key factors that influence BLOS based on different cycling facilities that are proposed by developed guidelines and literature are identified. The combination of these factors presents a complete set of effective design factors for bicycle-friendly streets. In addition, the weight of each factor in existing BLOS models is estimated and these effective factors are ranked based on these weights. These factors and their weights can be used in further studies to propose special bicycle-friendly street design model.

Keywords: bicycle level of service, bicycle-friendly streets, cycling facilities, rating system, urban streets

Procedia PDF Downloads 486
12021 An Automatic Feature Extraction Technique for 2D Punch Shapes

Authors: Awais Ahmad Khan, Emad Abouel Nasr, H. M. A. Hussein, Abdulrahman Al-Ahmari

Abstract:

Sheet-metal parts have been widely applied in electronics, communication and mechanical industries in recent decades; but the advancement in sheet-metal part design and manufacturing is still behind in comparison with the increasing importance of sheet-metal parts in modern industry. This paper presents a methodology for automatic extraction of some common 2D internal sheet metal features. The features used in this study are taken from Unipunch ™ catalogue. The extraction process starts with the data extraction from STEP file using an object oriented approach and with the application of suitable algorithms and rules, all features contained in the catalogue are automatically extracted. Since the extracted features include geometry and engineering information, they will be effective for downstream application such as feature rebuilding and process planning.

Keywords: feature extraction, internal features, punch shapes, sheet metal

Procedia PDF Downloads 610
12020 Use of Oral Communication Strategies: A Study of Bangladeshi EFL Learners at the Graduate Level

Authors: Afroza Akhter Tina

Abstract:

This paper reports on an investigation into the use of specific types of oral communication strategies, namely ‘topic avoidance’, ‘message abandonment’, ‘code-switching’, ‘paraphrasing’, ‘restructuring’, and ‘stalling’ by Bangladeshi EFL learners at the graduate level. It chiefly considers the frequency of using these strategies as well as the students and teachers attitudes toward such uses. The participants of this study are 66 EFL students and 12 EFL teachers of Jahangirnagar University. Data was collected through questionnaire, oral interview, and classroom observation form. The findings reveal that the EFL students tried to employ all the strategies to various extents due to the language difficulties they encountered in their oral English performance. Among them, the mostly used strategy was ‘stalling’ or the use of fillers, followed by ‘code-switching’. The least used strategies were ‘topic avoidance’, ‘restructuring’, and ‘paraphrasing’. The findings indicate that the use of such strategies was related to the contexts of situation and data-elicitation tasks. It also reveals that the students were not formally trained to use the strategies though the majority of the teachers and students acknowledge them as helpful in communication. Finally the study suggests that an awareness of the nature and functions of these strategies can contribute to the overall improvement of the learners’ communicative competence in spoken English.

Keywords: communicative strategies, competency, attitude, frequency

Procedia PDF Downloads 405
12019 A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)

Authors: Hafiza Khaddija Saman, Muhammad Sufyan

Abstract:

The increase in availability and popularity of mobile wireless devices has led researchers to develop a wide variety of Mobile Ad-hoc Networking (MANET) protocols to exploit the unique communication opportunities presented by these devices. Devices are able to communicate directly using the wireless spectrum in a peer-to-peer fashion, and route messages through intermediate nodes, however, the nature of wireless shared communication and mobile devices result in many routing and security challenges which must be addressed before deploying a MANET. In this paper, we investigate the range of MANET routing protocols available and discuss the functionalities of several ranging from early protocols such as DSDV to more advanced such as MAODV, our protocol study focuses upon works by Perkins in developing and improving MANET routing. A range of literature relating to the field of MANET routing was identified and reviewed, we also reviewed literature on the topic of securing AODV based MANETs as this may be the most popular MANET protocol. The literature review identified a number of trends within research papers such as exclusive use of the random waypoint mobility model, excluding key metrics from simulation results and not comparing protocol performance against available alternatives.

Keywords: protocol, MANET, ad-Hoc, communication

Procedia PDF Downloads 256
12018 Safeguarding the Cloud: The Crucial Role of Technical Project Managers in Security Management for Cloud Environments

Authors: Samuel Owoade, Zainab Idowu, Idris Ajibade, Abel Uzoka

Abstract:

Cloud computing adoption continues to soar, with 83% of enterprise workloads estimated to be in the cloud by 2022. However, this rapid migration raises security concerns, needing strong security management solutions to safeguard sensitive data and essential applications. This paper investigates the critical role of technical project managers in orchestrating security management initiatives for cloud environments, evaluating their responsibilities, challenges, and best practices for assuring the resilience and integrity of cloud infrastructures. Drawing from a comprehensive review of industry reports and interviews with cloud security experts, this research highlights the multifaceted landscape of security management in cloud environments. Despite the rapid adoption of cloud services, only 25% of organizations have matured their cloud security practices, indicating a pressing need for effective management strategies. This paper proposes a strategy framework adapted to the demands of technical project managers, outlining the important components of effective cloud security management. Notably, 76% of firms identify misconfiguration as a major source of cloud security incidents, underlining the significance of proactive risk assessment and constant monitoring. Furthermore, the study emphasizes the importance of technical project managers in facilitating cross-functional collaboration, bridging the gap between cybersecurity professionals, cloud architects, compliance officers, and IT operations teams. With 68% of firms seeing difficulties integrating security policies into their cloud systems, effective communication and collaboration are critical to success. Case studies from industry leaders illustrate the practical use of security management projects in cloud settings. These examples demonstrate the importance of technical project managers in using their expertise to address obstacles and generate meaningful outcomes, with 92% of firms reporting improved security practices after implementing proactive security management tactics. In conclusion, this research underscores the critical role of technical project managers in safeguarding cloud environments against evolving threats. By embracing their role as guardians of the cloud realm, project managers can mitigate risks, optimize resource utilization, and uphold the trust and integrity of cloud infrastructures in an era of digital transformation.

Keywords: cloud security, security management, technical project management, cybersecurity, cloud infrastructure, risk management, compliance

Procedia PDF Downloads 49
12017 Spread Spectrum with Notch Frequency Using Pulse Coding Method for Switching Converter of Communication Equipment

Authors: Yasunori Kobori, Futoshi Fukaya, Takuya Arafune, Nobukazu Tsukiji, Nobukazu Takai, Haruo Kobayashi

Abstract:

This paper proposes an EMI spread spectrum technique to enable to set notch frequencies using pulse coding method for DC-DC switching converters of communication equipment. The notches in the spectrum of the switching pulses appear at the frequencies obtained from empirically derived equations with the proposed spread spectrum technique using the pulse coding methods, the PWM (Pulse Width Modulation) coding or the PCM (Pulse Cycle Modulation) coding. This technique would be useful for the switching converters in the communication equipment which receives standard radio waves, without being affected by noise from the switching converters. In our proposed technique, the notch frequencies in the spectrum depend on the pulse coding method. We have investigated this technique to apply to the switching converters and found that there is good relationship agreement between the notch frequencies and the empirical equations. The notch frequencies with the PWM coding is equal to the equation F=k/(WL-WS). With the PCM coding, that is equal to the equation F=k/(TL-TS).

Keywords: notch frequency, pulse coding, spread spectrum, switching converter

Procedia PDF Downloads 369