Search results for: mmWave communication system
19789 The Role of Information and Communication Technology in Early Childhood Education as Perceived by Early Childhood Teachers
Authors: Rabia Khalil
Abstract:
The aim of the study is to find out the perception of early childhood education teacher‘s about the role and implementation of information communication technology in early childhood education. The main purpose of the study is to investigate the role of information and communication technology in early childhood education as perceived by early childhood education teachers. The objectives of the study were to identify the roles of ICT in today’s early years and the impacts of Information communication technology in early childhood education. This study is to find out the role of ICT at ECE level & how it will be useful for teachers to implement this technique for the development of student skills. This is a quantitative research in which a survey study was conducted. The Population of the study was the primary teachers of the public and private primary schools of Lahore. By using random sampling technique the sample consists of 300 teachers but only 260 respond from 52 primary schools of Lahore. In this research, questionnaire was developed for primary school teachers. The questionnaires were based on liker type scale which comprises of section of strongly agree to strongly disagree. Data were analyzed by using descriptive analysis. The data was arranged and then entered in computer, having the software package for social sciences (SPSS) version 15. The importance of this study is to find out the role of ICT at ECE level & how it will be useful for teachers to implement this technique for the development of student skills. Procedia PDF Downloads 34419788 Energy Management System and Interactive Functions of Smart Plug for Smart Home
Authors: Win Thandar Soe, Innocent Mpawenimana, Mathieu Di Fazio, Cécile Belleudy, Aung Ze Ya
Abstract:
Intelligent electronic equipment and automation network is the brain of high-tech energy management systems in critical role of smart homes dominance. Smart home is a technology integration for greater comfort, autonomy, reduced cost, and energy saving as well. These services can be provided to home owners for managing their home appliances locally or remotely and consequently allow them to automate intelligently and responsibly their consumption by individual or collective control systems. In this study, three smart plugs are described and one of them tested on typical household appliances. This article proposes to collect the data from the wireless technology and to extract some smart data for energy management system. This smart data is to quantify for three kinds of load: intermittent load, phantom load and continuous load. Phantom load is a waste power that is one of unnoticed power of each appliance while connected or disconnected to the main. Intermittent load and continuous load take in to consideration the power and using time of home appliances. By analysing the classification of loads, this smart data will be provided to reduce the communication of wireless sensor network for energy management system.Keywords: energy management, load profile, smart plug, wireless sensor network
Procedia PDF Downloads 27319787 From Avatars to Humans: A Hybrid World Theory and Human Computer Interaction Experimentations with Virtual Reality Technologies
Authors: Juan Pablo Bertuzzi, Mauro Chiarella
Abstract:
Employing a communication studies perspective and a socio-technological approach, this paper introduces a theoretical framework for understanding the concept of hybrid world; the avatarization phenomena; and the communicational archetype of co-hybridization. This analysis intends to make a contribution to future design of virtual reality experimental applications. Ultimately, this paper presents an ongoing research project that proposes the study of human-avatar interactions in digital educational environments, as well as an innovative reflection on inner digital communication. The aforementioned project presents the analysis of human-avatar interactions, through the development of an interactive experience in virtual reality. The goal is to generate an innovative communicational dimension that could reinforce the hypotheses presented throughout this paper. Being thought for its initial application in educational environments, the analysis and results of this research are dependent and have been prepared in regard of a meticulous planning of: the conception of a 3D digital platform; the interactive game objects; the AI or computer avatars; the human representation as hybrid avatars; and lastly, the potential of immersion, ergonomics and control diversity that can provide the virtual reality system and the game engine that were chosen. The project is divided in two main axes: The first part is the structural one, as it is mandatory for the construction of an original prototype. The 3D model is inspired by the physical space that belongs to an academic institution. The incorporation of smart objects, avatars, game mechanics, game objects, and a dialogue system will be part of the prototype. These elements have all the objective of gamifying the educational environment. To generate a continuous participation and a large amount of interactions, the digital world will be navigable both, in a conventional device and in a virtual reality system. This decision is made, practically, to facilitate the communication between students and teachers; and strategically, because it will help to a faster population of the digital environment. The second part is concentrated to content production and further data analysis. The challenge is to offer a scenario’s diversity that compels users to interact and to question their digital embodiment. The multipath narrative content that is being applied is focused on the subjects covered in this paper. Furthermore, the experience with virtual reality devices proposes users to experiment in a mixture of a seemingly infinite digital world and a small physical area of movement. This combination will lead the narrative content and it will be crucial in order to restrict user’s interactions. The main point is to stimulate and to grow in the user the need of his hybrid avatar’s help. By building an inner communication between user’s physicality and user’s digital extension, the interactions will serve as a self-guide through the gameworld. This is the first attempt to make explicit the avatarization phenomena and to further analyze the communicational archetype of co-hybridization. The challenge of the upcoming years will be to take advantage from these forms of generalized avatarization, in order to create awareness and establish innovative forms of hybridization.Keywords: avatar, hybrid worlds, socio-technology, virtual reality
Procedia PDF Downloads 14219786 A Novel Approach of Secret Communication Using Douglas-Peucker Algorithm
Authors: R. Kiruthika, A. Kannan
Abstract:
Steganography is the problem of hiding secret messages in 'innocent – looking' public communication so that the presence of the secret message cannot be detected. This paper introduces a steganographic security in terms of computational in-distinguishability from a channel of probability distributions on cover messages. This method first splits the cover image into two separate blocks using Douglas – Peucker algorithm. The text message and the image will be hided in the Least Significant Bit (LSB) of the cover image.Keywords: steganography, lsb, embedding, Douglas-Peucker algorithm
Procedia PDF Downloads 36319785 A Prototype of an Information and Communication Technology Based Intervention Tool for Children with Dyslexia
Authors: Rajlakshmi Guha, Sajjad Ansari, Shazia Nasreen, Hirak Banerjee, Jiaul Paik
Abstract:
Dyslexia is a neurocognitive disorder, affecting around fifteen percent of the Indian population. The symptoms include difficulty in reading alphabet, words, and sentences. This can be difficult at the phonemic or recognition level and may further affect lexical structures. Therapeutic intervention of dyslexic children post assessment is generally done by special educators and psychologists through one on one interaction. Considering the large number of children affected and the scarcity of experts, access to care is limited in India. Moreover, unavailability of resources and timely communication with caregivers add on to the problem of proper intervention. With the development of Educational Technology and its use in India, access to information and care has been improved in such a large and diverse country. In this context, this paper proposes an ICT enabled home-based intervention program for dyslexic children which would support the child, and provide an interactive interface between expert, parents, and students. The paper discusses the details of the database design and system layout of the program. Along with, it also highlights the development of different technical aids required to build out personalized android applications for the Indian dyslexic population. These technical aids include speech database creation for children, automatic speech recognition system, serious game development, and color coded fonts. The paper also emphasizes the games developed to assist the dyslexic child on cognitive training primarily for attention, working memory, and spatial reasoning. In addition, it talks about the specific elements of the interactive intervention tool that makes it effective for home based intervention of dyslexia.Keywords: Android applications, cognitive training, dyslexia, intervention
Procedia PDF Downloads 29119784 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing
Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali
Abstract:
Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish
Procedia PDF Downloads 35919783 Multi-Impairment Compensation Based Deep Neural Networks for 16-QAM Coherent Optical Orthogonal Frequency Division Multiplexing System
Authors: Ying Han, Yuanxiang Chen, Yongtao Huang, Jia Fu, Kaile Li, Shangjing Lin, Jianguo Yu
Abstract:
In long-haul and high-speed optical transmission system, the orthogonal frequency division multiplexing (OFDM) signal suffers various linear and non-linear impairments. In recent years, researchers have proposed compensation schemes for specific impairment, and the effects are remarkable. However, different impairment compensation algorithms have caused an increase in transmission delay. With the widespread application of deep neural networks (DNN) in communication, multi-impairment compensation based on DNN will be a promising scheme. In this paper, we propose and apply DNN to compensate multi-impairment of 16-QAM coherent optical OFDM signal, thereby improving the performance of the transmission system. The trained DNN models are applied in the offline digital signal processing (DSP) module of the transmission system. The models can optimize the constellation mapping signals at the transmitter and compensate multi-impairment of the OFDM decoded signal at the receiver. Furthermore, the models reduce the peak to average power ratio (PAPR) of the transmitted OFDM signal and the bit error rate (BER) of the received signal. We verify the effectiveness of the proposed scheme for 16-QAM Coherent Optical OFDM signal and demonstrate and analyze transmission performance in different transmission scenarios. The experimental results show that the PAPR and BER of the transmission system are significantly reduced after using the trained DNN. It shows that the DNN with specific loss function and network structure can optimize the transmitted signal and learn the channel feature and compensate for multi-impairment in fiber transmission effectively.Keywords: coherent optical OFDM, deep neural network, multi-impairment compensation, optical transmission
Procedia PDF Downloads 14319782 Characteristic Study on Conventional and Soliton Based Transmission System
Authors: Bhupeshwaran Mani, S. Radha, A. Jawahar, A. Sivasubramanian
Abstract:
Here, we study the characteristic feature of conventional (ON-OFF keying) and soliton based transmission system. We consider 20 Gbps transmission system implemented with Conventional Single Mode Fiber (C-SMF) to examine the role of Gaussian pulse which is the characteristic of conventional propagation and hyperbolic-secant pulse which is the characteristic of soliton propagation in it. We note the influence of these pulses with respect to different dispersion lengths and soliton period in conventional and soliton system, respectively, and evaluate the system performance in terms of quality factor. From the analysis, we could prove that the soliton pulse has more consistent performance even for long distance without dispersion compensation than the conventional system as it is robust to dispersion. For the length of transmission of 200 Km, soliton system yielded Q of 33.958 while the conventional system totally exhausted with Q=0.Keywords: dispersion length, retrun-to-zero (rz), soliton, soliton period, q-factor
Procedia PDF Downloads 34519781 De-Learning Language at Preschool: A Case of Nepal
Authors: Meenakshi Dahal
Abstract:
Generally, children start verbal communication by the age of eighteen months. Though they have difficulties in constructing complete sentences, they try to make their thought s understandable to the audience. By the age of 36 months, when they enroll in preschool, their Language and communication skills are enhanced. Children need plenty of classroom experiences that will help them to develop their oral language skills. Oral language is the primary means through which each individual child is enabled to structure, evaluate, describe and to express his/her experiences. In the context of multi lingual and multi-cultural country like Nepal, the languages used in preschool and the communities vary. In such a case, the language of instruction in the preschool is different from the language used by the children to communicate at home. Using qualitative research method the socio-cultural aspect of the language learning has been analyzed. This has been done by analyzing and exploring preschool activities as well as the language of instruction and communication in the preschools in rural Nepal. It is found that the language of instruction is different from the language of communications primarily used by the children. Teachers seldom use local language resulting in difficulties for the children to understand. Instead of recognizing their linguistic, social and cultural capitals teachers conform to using the Nepali language which the children are not familiar with. Children have to adapt to new language structures and patterns of usage resulting them to be slow in oral language and communication in the preschool. The paper concludes that teachers have to recognize the linguistic capitals of the children and schools need to be responsible to facilitate this process for all children, whatever their language background.Keywords: children, language, preschool, socio-culture
Procedia PDF Downloads 39219780 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 22719779 A Systems Approach to Modelling Emergent Behaviour in Maritime Control Systems Using the Composition, Environment, Structure, and Mechanisms Metamodel
Authors: Odd Ivar Haugen
Abstract:
Society increasingly relies on complex systems whose behaviour is determined, not by the properties of each part, but by the interaction between them. The behaviour of such systems is emergent. Modelling emergent system behaviour requires a systems approach that incorporates the necessary concepts that are capable of determining such behaviour. The CESM metamodel is a model of system models. A set of system models needs to address the elements of CESM at different levels of abstraction to be able to model the behaviour of a complex system. Modern ships contain numerous sophisticated equipment, often accompanied by a local safety system to protect its integrity. These control systems are then connected into a larger integrated system in order to achieve the ship’s objective or mission. The integrated system becomes what is commonly known as a system of systems, which can be termed a complex system. Examples of such complex systems are the dynamic positioning system and the power management system. Three ship accidents are provided as examples of how system complexity may contribute to accidents. Then, the three accidents are discussed in terms of how the Multi-Level/Multi-Model Safety Analysis might catch scenarios such as those leading to the accidents described.Keywords: emergent properties, CESM metamodel, multi-level/multi-model safety analysis, safety, system complexity, system models, systems thinking
Procedia PDF Downloads 619778 Developing a Recommendation Library System based on Android Application
Authors: Kunyanuth Kularbphettong, Kunnika Tenprakhon, Pattarapan Roonrakwit
Abstract:
In this paper, we present a recommendation library application on Android system. The objective of this system is to support and advice user to use library resources based on mobile application. We describe the design approaches and functional components of this system. The system was developed based on under association rules, Apriori algorithm. In this project, it was divided the result by the research purposes into 2 parts: developing the Mobile application for online library service and testing and evaluating the system. Questionnaires were used to measure user satisfaction with system usability by specialists and users. The results were satisfactory both specialists and users.Keywords: online library, Apriori algorithm, Android application, black box
Procedia PDF Downloads 48719777 Control Configuration System as a Key Element in Distributed Control System
Authors: Goodarz Sabetian, Sajjad Moshfe
Abstract:
Control system for hi-tech industries could be realized generally and deeply by a special document. Vast heavy industries such as power plants with a large number of I/O signals are controlled by a distributed control system (DCS). This system comprises of so many parts from field level to high control level, and junior instrument engineers may be confused by this enormous information. The key document which can solve this problem is “control configuration system diagram” for each type of DCS. This is a road map that covers all of activities respect to control system in each industrial plant and inevitable to be studied by whom corresponded. It plays an important role from designing control system start point until the end; deliver the system to operate. This should be inserted in bid documents, contracts, purchasing specification and used in different periods of project EPC (engineering, procurement, and construction). Separate parts of DCS are categorized here in order of importance and a brief description and some practical plan is offered. This article could be useful for all instrument and control engineers who worked is EPC projects.Keywords: control, configuration, DCS, power plant, bus
Procedia PDF Downloads 49119776 Discourse Analysis and Semiotic Researches: Using Michael Halliday's Sociosemiotic Theory
Authors: Deyu Yuan
Abstract:
Discourse analysis as an interdisciplinary approach has more than 60-years-history since it was first named by Zellig Harris in 'Discourse Analysis' on Language in 1952. Ferdinand de Saussure differentiated the 'parole' from the 'langue' that established the principle of focusing on language but not speech. So the rising of discourse analysis can be seen as a discursive turn for the entire language research that closely related to the theory of Speech act. Critical discourse analysis becomes the mainstream of contemporary language research through drawing upon M. A. K. Halliday's socio-semiotic theory and Foucault, Barthes, Bourdieu's views on the sign, discourse, and ideology. So in contrast to general semiotics, social semiotics mainly focuses on parole and the application of semiotic theories to some applicable fields. The article attempts to discuss this applicable sociosemiotics and show the features of it that differ from the Saussurian and Peircian semiotics in four aspects: 1) the sign system is about meaning-generation resource in the social context; 2) the sign system conforms to social and cultural changes with the form of metaphor and connotation; 3) sociosemiotics concerns about five applicable principles including the personal authority principle, non-personal authority principle, consistency principle, model demonstration principle, the expertise principle to deepen specific communication; 4) the study of symbolic functions is targeted to the characteristics of ideational, interpersonal and interactional function in social communication process. Then the paper describes six features which characterize this sociosemiotics as applicable semiotics: social, systematic, usable interdisciplinary, dynamic, and multi-modal characteristics. Thirdly, the paper explores the multi-modal choices of sociosemiotics in the respects of genre, discourse, and style. Finally, the paper discusses the relationship between theory and practice in social semiotics and proposes a relatively comprehensive theoretical framework for social semiotics as applicable semiotics.Keywords: discourse analysis, sociosemiotics, pragmatics, ideology
Procedia PDF Downloads 35119775 The Design and Construction of the PV-Wind Autonomous System for Greenhouse Plantations in Central Thailand
Authors: Napat Watjanatepin, Wikorn Wong-Satiean
Abstract:
The objective of this research is to design and construct the PV-Wind hybrid autonomous system for the greenhouse plantation, and analyze the technical performance of the PV-Wind energy system. This design depends on the water consumption in the greenhouse by using 24 of the fogging mist each with the capability of 24 liter/min. The operating time is 4 times per day, each round for 15 min. The fogging system is being driven by water pump with AC motor rating 0.5 hp. The load energy consumed is around 1.125 kWh/d. The designing results of the PV-Wind hybrid energy system is that sufficient energy could be generated by this system. The results of this study can be applied as a technical data reference for other areas in the central part of Thailand.Keywords: PV-Wind hybrid autonomous system, greenhouse plantation, fogging system, central part of Thailand
Procedia PDF Downloads 31419774 A Mixed Method Systematic Review of the Experience of Communication in the Care of Children with Palliative Care Needs
Authors: Maha Atout, Pippa Hemingway, Jane Seymour
Abstract:
Background: A mixed method systematic review was undertaken in order to explore issues related to the experiences of health care providers and parents in the care of children with palliative care needs. The aims of this systematic review were to identify existing evidence about the experiences of communication in the care of children with palliative care needs, to appraise the research conducted in this area and to identify gaps in the literature in order to recommend for future related studies. Method: A mixed method systematic review of research on the experience of communication in the care of children with palliative care needs, conducted with parents and health professionals was undertaken. The electronic databases of CINAHL, Cochrane, PubMed, OVID, Social Care Online, Web of Science, Scopus, and ProQuest were searched for the period of 2000-2016. Inclusion was limited to studies of communication experience in the care of children with palliative care needs. Result: Thirty-eight studies were found. The studies were conducted in a variety of countries: Uganda, Jordan, USA, UK, Taiwan, Turkey, Ireland, Poland, Brazil, Australia, Switzerland, Sweden, Netherland, Lebanon, Spain, Greece, and China. The current review shows that parents tend to protect their children when they are discussing their illnesses with them, particularly where they have a life-threatening or life-limiting condition. The approach of parents towards the discussion of sensitive issues concerning death with their children is significantly affected by the cultural background of the families. Conservative cultures encourage collusion behaviours which tend to keep children unaware of the incurable nature of the disease. The major communication challenges reported by health professionals are facing difficulties in judging how much information should be given to parents, responding to difficult questions, conflicts with families and inadequate skills to support grieving families. Conclusion: It is probably significant for the future studies to consider the change of parent-child communication experience over time in order to understand how the parents could change their interaction styles with their children according to the different stages of their children’s disease. Moreover, further studies are required to investigate the experience of communication of parents of children with non-malignant life-threatening and life-limiting illnesses.Keywords: children with life-threatening or life- limiting illnesses, end of life, experience of communication, healthcare care providers, paediatric palliative care
Procedia PDF Downloads 29719773 A Development of a Weight-Balancing Control System Based On Android Operating System
Authors: Rattanathip Rattanachai, Piyachai Petchyen, Kunyanuth Kularbphettong
Abstract:
This paper describes the development of a Weight- Balancing Control System based on the Android Operating System and it provides recommendations on ways of balancing of user’s weight based on daily metabolism process and need so that user can make informed decisions on his or her weight controls. The system also depicts more information on nutrition details. Furthermore, it was designed to suggest to users what kinds of foods they should eat and how to exercise in the right ways. We describe the design methods and functional components of this prototype. To evaluate the system performance, questionnaires for system usability and Black Box Testing were used to measure expert and user satisfaction. The results were satisfactory as followed: Means for experts and users were 3.94 and 4.07 respectively.Keywords: weight-balancing control, Android operating system, daily metabolism, black box testing
Procedia PDF Downloads 47119772 Simulation and Analysis of Different Parameters in Hydraulic Circuit Due to Leakage
Abstract:
Leakage is the main gradual failure in the fluid power system, which is usually caused by the impurity in the oil and wear of matching surfaces between parts and lead to the change of the gap value. When leakage occurs in the system, the oil will flow from the high pressure chamber into the low pressure chamber through the gap, causing the reduction of system flow as well as the loss of system pressure, resulting in the decreasing of system efficiency. In the fluid power system, internal leakage may occur in various components such as gear pump, reversing valve and hydraulic cylinder, and affect the system work performance. Therefore, component leakage in the fluid power system is selected as the study to characterize the leakage and the effect of leakage on the system. Effect of leakage on system pressure and cylinder displacement can be obtained using pressure sensors and the displacement sensor. The leakage can be varied by changing the orifice using a flow control valve. Hydraulic circuit for leakage will be developed in Matlab/Simulink environment and simulations will be done by changing different parameters.Keywords: leakage causes, effect, analysis, MATLAB simulation, hydraulic circuit
Procedia PDF Downloads 40019771 Investigation of Organisational Culture and Its Impacts on Job Satisfaction among Language Teachers at a Language School
Authors: Davut Uysal
Abstract:
Turkish higher education system has experienced some structural changes in recent decades, which resulted in the concentration on English language teaching as a foreign language at high education institutions. However, the number of studies examining the relationship between organizational culture and job satisfaction among language teachers at higher education institutions, who are the key elements of the teaching process, is very limited in the country. The main objective of this study is to find out the perceptions of English language instructors regarding organizational culture and its impact on their job satisfaction at School of Foreign Language, Anadolu University in Turkey. Questionnaire technique was used in data collection, and the collected data was analysed with the help of SPSS data analysis program. The findings of the study revealed that the respondents of the study had positive perceptions regarding current organizational culture indicating satisfaction with co-worker relations and administration, supervision support and the work itself, as well as their satisfaction with the available professional development opportunities provided by their institution. A significant relationship between overall organizational culture and job satisfaction was found in the study. This study also presents some key elements to increase the job satisfaction levels of the language teachers by managing corporate communication and to improve the organisational culture based on the findings of the study as they are two interrelated issues.Keywords: corporate communication, English teacher, organizational culture, job satisfaction
Procedia PDF Downloads 16819770 Health Literacy in Jordan: Obstacles for Doctors and Quality Patient Care
Authors: Etaf Alkhlaifat
Abstract:
This study drew conceptually on Communication Accommodation Theory to describe and analyze conversations between doctors and patients to examine the extent to which patients’ level of literacy represents one of the linguistic obstacles that may adversely influence the quality of healthcare services in Jordan. A thematic qualitative approach was employed to interpret the phenomena under study, which required direct observation and interviews with doctors (n=6) and patients (n=15) in natural Jordanian medical settings. This generated a comprehensive corpus of audio and videotaped data, which revealed that most doctors expressed dissatisfaction with patients’ ability to express themselves and comprehend them as a result of a lack of medical awareness and limited health education. The significance of this study rests on its detailed investigation of the impact of health literacy on patients’ health outcomes and while providing unique insights into how low health literacy could contribute to misunderstanding and potential ill-health.Keywords: doctor-patient communication, health literacy, medical knowledge, communication accommodation theory, qualitative research
Procedia PDF Downloads 619769 The Management Information System for Convenience Stores: Case Study in 7 Eleven Shop in Bangkok
Authors: Supattra Kanchanopast
Abstract:
The purpose of this research is to develop and design a management information system for 7 eleven shop in Bangkok. The system was designed and developed to meet users’ requirements via the internet network by use of application software such as My SQL for database management, Apache HTTP Server for Web Server and PHP Hypertext Preprocessor for an interface between web server, database and users. The system was designed into two subsystems as the main system, or system for head office, and the branch system for branch shops. These consisted of three parts which are classified by user management as shop management, inventory management and Point of Sale (POS) management. The implementation of the MIS for the mini-mart shop, can lessen the amount of paperwork and reduce repeating tasks so it may decrease the capital of the business and support an extension of branches in the future as well.Keywords: convenience store, the management information system, inventory management, 7 eleven shop
Procedia PDF Downloads 48219768 Lamb Waves Wireless Communication in Healthy Plates Using Coherent Demodulation
Authors: Rudy Bahouth, Farouk Benmeddour, Emmanuel Moulin, Jamal Assaad
Abstract:
Guided ultrasonic waves are used in Non-Destructive Testing (NDT) and Structural Health Monitoring (SHM) for inspection and damage detection. Recently, wireless data transmission using ultrasonic waves in solid metallic channels has gained popularity in some industrial applications such as nuclear, aerospace and smart vehicles. The idea is to find a good substitute for electromagnetic waves since they are highly attenuated near metallic components due to Faraday shielding. The proposed solution is to use ultrasonic guided waves such as Lamb waves as an information carrier due to their capability of propagation for long distances. In addition to this, valuable information about the health of the structure could be extracted simultaneously. In this work, the reliable frequency bandwidth for communication is extracted experimentally from dispersion curves at first. Then, an experimental platform for wireless communication using Lamb waves is described and built. After this, coherent demodulation algorithm used in telecommunications is tested for Amplitude Shift Keying, On-Off Keying and Binary Phase Shift Keying modulation techniques. Signal processing parameters such as threshold choice, number of cycles per bit and Bit Rate are optimized. Experimental results are compared based on the average Bit Error Rate. Results have shown high sensitivity to threshold selection for Amplitude Shift Keying and On-Off Keying techniques resulting a Bit Rate decrease. Binary Phase Shift Keying technique shows the highest stability and data rate between all tested modulation techniques.Keywords: lamb waves communication, wireless communication, coherent demodulation, bit error rate
Procedia PDF Downloads 26019767 Role of Water Supply in the Functioning of the MLDB Systems
Authors: Ramanpreet Kaur, Upasana Sharma
Abstract:
The purpose of this paper is to address the challenges faced by MLDB system at the piston foundry plant due to interruption in supply of water. For the MLDB system to work in Model, two sub-units must be connected to the robotic main unit. The system cannot function without robotics and water supply by the fan (WSF). Insufficient water supply is the cause of system failure. The system operates at top performance using two sub-units. If one sub-unit fails, the system capacity is reduced. Priority of repair is given to the main unit i.e. Robotic and WSF. To solve the problem, semi-Markov process and regenerative point technique are used. Relevant graphs are also included to particular case.Keywords: MLDB system, robotic, semi-Markov process, regenerative point technique
Procedia PDF Downloads 7719766 Combating the Practice of Open Defecation through Appropriate Communication Strategies in Rural India
Authors: Santiagomani Alex Parimalam
Abstract:
Lack of awareness on the consequences of open defecation and myths and misconceptions related to use of toilets have led to the continued practice of open defecation in India. Government of India initiated a multi-pronged intensive communication campaign against the practice of open defecation in the last few years. The primary vision of this communication campaign was to provide increased demand for toilets and to ensure that all have access to safe sanitation. The campaign strategy included the use of mass media, group and folk media, and interpersonal communication to expedite achieving its objectives. The campaign included the use of various media such as posters, wall writings, slides in cinema theatres, kiosks, pamphlets, newsletters, flip charts and folk media to bring behavioural changes in the communities. The author did a concurrent monitoring and process documentation of the campaigns initiated by the state of Tamilnandu, India between 2013 and 2016 commissioned by UNICEF India. The study was carried out to assess the effectiveness of the communication campaigns in combating the practice of open defecation and promote construction of toilets in the state of Tamilnadu, India. Initial findings revealed the gap in understanding the audience and the use of appropriate media. The first phase of the communication campaign by name as Chi Chi Chollapa (bringing shame concept) also revealed that use of interpersonal communication, group and community media were the most effective strategy in reaching the rural masses. The failure of various other media used especially the print media (poster, handbills, newsletter, kiosks) provides insights as to where the government needs to invest its resources in bringing health-seeking behaviour in the community. The findings shared with the government enabled to strengthen the campaign resulting in improved response. Taking cues from the study, the government understood the potency of the women, school children, youth and community leaders as the effective carriers of the message. The government narrowed down its focus and invested on the voluntary workers (village poverty reduction committee workers VPRCs) in the community. The effectiveness of interpersonal communication and peer education by the credible community worker threw light on the need for localising the content and communicator. From this study, we could derive that only community and group media are preferred by the people in the rural community. Children, youth, women, and credible local leaders are proved to be ambassadors in behaviour change communication. This study discloses the lacunae involved in the communication campaign and points out that the state should have carried out a proper communication need analysis and piloting. The study used a survey method with random sampling. The study used both quantitative and qualitative tools such as interview schedules, in-depth interviews, and focus group discussions in rural areas of Tamilnadu in phases. The findings of the study would provide directions to future campaigns to any campaign concerning health and rural development.Keywords: appropriate, communication, combating, open defecation
Procedia PDF Downloads 12619765 Automated Marker Filling System
Authors: Pinisetti Swami Sairam, Meera C. S.
Abstract:
Marker pens are widely used all over the world, mainly in educational institutions due to their neat, accurate and easily erasable nature. But refilling the ink in these pens is a tedious and time consuming job. Besides, it requires careful handling of the pens and ink bottle. A fully automated marker filling system is a solution developed to overcome this problem. The system comprises of pneumatics and electronics modules as well as PLC control. The system design is done in such a way that the empty markers are dumped in a marker container which then sent through different modules of the system in order to refill it automatically. The filled markers are then collected in a marker container. Refilling of ink takes place in different stages inside the system. An ink detecting system detects the colour of the marker which is to be filled and then refilling is done. The processes like capping and uncapping of the cap as well as screwing and unscrewing of the tip are done with the help of robotic arm and gripper. We make use of pneumatics in this system in order to get the precision while performing the capping, screwing, and refilling operations. Thus with the help of this system we can achieve cleanliness, accuracy, effective and time saving in the process of filling a marker.Keywords: automated system, market filling, information technology, control and automation
Procedia PDF Downloads 49719764 Miniature Fast Steering Mirrors for Space Optical Communication on NanoSats and CubeSats
Authors: Sylvain Chardon, Timotéo Payre, Hugo Grardel, Yann Quentel, Mathieu Thomachot, Gérald Aigouy, Frank Claeyssen
Abstract:
With the increasing digitalization of society, access to data has become vital and strategic for individuals and nations. In this context, the number of satellite constellation projects is growing drastically worldwide and is a next-generation challenge of the New Space industry. So far, existing satellite constellations have been using radio frequencies (RF) for satellite-to-ground communications, inter-satellite communications, and feeder link communication. However, RF has several limitations, such as limited bandwidth and low protection level. To address these limitations, space optical communication will be the new trend, addressing both very high-speed and secured encrypted communication. Fast Steering Mirrors (FSM) are key components used in optical communication as well as space imagery and for a large field of functions such as Point Ahead Mechanisms (PAM), Raster Scanning, Beam Steering Mirrors (BSM), Fine Pointing Mechanisms (FPM) and Line of Sight stabilization (LOS). The main challenges of space FSM development for optical communication are to propose both a technology and a supply chain relevant for high quantities New Space approach, which requires secured connectivity for high-speed internet, Earth planet observation and monitoring, and mobility applications. CTEC proposes a mini-FSM technology offering a stroke of +/-6 mrad and a resonant frequency of 1700 Hz, with a mass of 50 gr. This FSM mechanism is a good candidate for giant constellations and all applications on board NanoSats and CubeSats, featuring a very high level of miniaturization and optimized for New Space high quantities cost efficiency. The use of piezo actuators offers a high resonance frequency for optimal control, with almost zero power consumption in step and stay pointing, and with very high-reliability figures > 0,995 demonstrated over years of recurrent manufacturing for Optronics applications at CTEC.Keywords: fast steering mirror, feeder link, line of sight stabilization, optical communication, pointing ahead mechanism, raster scan
Procedia PDF Downloads 8019763 ‘Women should not wear pants’: Reflections from Kenyan English Speakers in a Strait between American and British English
Authors: Vicky Khasandi-Telewa, Sinfree Makoni
Abstract:
This paper examines the lived experiences of Kenyans caught between the two main varieties of English and the communication challenges they often face. The paper aims to provide evidence for the challenges that Kenyan speakers of English have experienced as a result of the confluence between British English (BrE) and American English (AmE). The study is explorative thus, qualitative and a descriptive research design was used. The objectives were to describe the communication challenges Kenyans encounter due to the differences in grammar, pronunciation, vocabulary, and pragmatics between AmE and BrE and, to illuminate these variations to enable the Kenyan English learner to communicate appropriately. The purposive sample consisted of sixty five subjects, all who were from a top girls national high school in Kenya, therefore, many are in high-end positions nationally and internationally and well-travelled; in fact, seven are based in the USA, two in the United Kingdom and one lives in Australia. Using interviews, they were asked about their experiences with the different varieties of English, and their responses recorded. Autoethnography, a qualitative research method that involves introspection and cultural analysis, was also used. Thematic content analysis was used to extract the themes and group them for data analysis. The theoretical framework used is World Englishes by Kachru. The results indicate that there is indeed some communication breakdown due to linguistic varieties, but the differences are largely understood by speakers of the different varieties. Attitude plays a major role in communication challenges between the different Englishes, especially among teachers. The study urges acceptance of different varieties of English so long as communication takes place. This has implications for teaching English to Kenyan and speakers of other languages to whom English is taught as a Second Language or Foreign language.Keywords: American english, british english, kenyan english, englishes, teaching of english to speakers of other languages (TeSOL)
Procedia PDF Downloads 7119762 Contribution to Energy Management in Hybrid Energy Systems Based on Agents Coordination
Authors: Djamel Saba, Fatima Zohra Laallam, Brahim Berbaoui
Abstract:
This paper presents a contribution to the design of a multi-agent for the energy management system in a hybrid energy system (SEH). The multi-agent-based energy-coordination management system (MA-ECMS) is based mainly on coordination between agents. The agents share the tasks and exchange information through communications protocols to achieve the main goal. This intelligent system can fully manage the consumption and production or simply to make proposals for action he thinks is best. The initial step is to give a presentation for the system that we want to model in order to understand all the details as much as possible. In our case, it is to implement a system for simulating a process control of energy management.Keywords: communications protocols, control process, energy management, hybrid energy system, modelization, multi-agents system, simulation
Procedia PDF Downloads 33219761 Visual Intelligence: Perception, Image and Manipulation in Visual Communication
Authors: Poojitha Vemula
Abstract:
Understanding how we use image manipulation to communicate through an audience’s perceptions and conceive visual intelligence. With the use of many software and high-end skills, designers have developed a third eye to combine two different visuals and create the desired image by using photoshop and other software skills. The purpose of visual intelligence is to convey a message to the targeted audience. For instance, the images of models are retouched on their skin to make it more convincing and draw attention from the audience. There are many ways of manipulating an image, such as double exposure, retouching photography inks or paint airbrushing and piecing photos together, or enhancing the brightness and contrast. To understand visual intelligence, a questionnaire survey as well as research was conducted on how image manipulation is used by both the audience and the designers. This depends on the message that needs to be conveyed by the brands. For instance, Fair & Lovely, a brightening cream for ladies use a lot of retouching and effects to show the dramatic change the cream takes effect on dark or dusky faces. Thus the designer’s role is to use their third eye to incorporate the message into visuals. The research and questionnaire survey concludes the perceptions and manipulations used in visual communication. However this is all to make an effortless communication between the designer and the audience by using the skills of the designer and the features provided by the software. The objective of visual intelligence is to covet the message of the brands that advertise their products or services by using visuals through softwares. Conveying a message through visual intelligence requires an audiences perceptions and understanding from the visuals created by the artists or designers. Visual intelligence determines how we use our technical skills to retouch and manipulate an image for a better understanding to convey the message to the targeted audience. This also bridges the communication between the brand and the audience.Keywords: graphic design, visual communication, convey messages, photoshop, image manipulation
Procedia PDF Downloads 21819760 VCloud: A Security Framework for VANET
Authors: Wiseborn Manfe Danquah, D. Turgay Altilar
Abstract:
Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)
Procedia PDF Downloads 354