Search results for: internet of things (IOT)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2096

Search results for: internet of things (IOT)

1196 Identifying Effective Strategies to Promote Vietnamese Fashion Brands in an Internationally Dominated Market

Authors: Lam Hong Lan, Gabor Sarlos

Abstract:

It is hard to search for best practices in promotion for local fashion brands in Vietnam as the industry is still very young. Local fashion start-ups have grown quickly in the last five years, thanks in part to the internet and social media. However, local designer/owners can face a huge challenge when competing with international brands in the Vietnamese market – and few local case studies are available for guidance. In response, this paper studied how local small- to medium-sized enterprises (SMEs) promote to their target customers in order to compete with international brands. Knowledge of both successful and unsuccessful approaches generated by this study is intended to both contribute to the academic literature on local fashion in Vietnam as well as to help local designers to learn from and improve their brand-building strategy. The primary study featured qualitative data collection via semi-structured depth interviews. Transcription and data analysis were conducted manually in order to identify success factors that local brands should consider as part of their promotion strategy. Purposive sampling of SMEs identified five designers in Ho Chi Minh City (the biggest city in Vietnam) and three designers in Hanoi (the second biggest) as interviewees. Participant attributes included: born in the 1980s or 1990s; familiar with internet and social media; designer/owner of a successful local fashion brand in the key middle market and/or mass market segments (which are crucial to the growth of local brands). A secondary study was conducted using social listening software to gather further qualitative data on what were considered to be successful or unsuccessful approaches to local fashion brand promotion on social media. Both the primary and secondary studies indicated that local designers had maximized their promotion budget by using owned media and earned media instead of paid media. Findings from the qualitative interviews indicate that internet and social media have been used as effective promotion platforms by local fashion start-ups. Facebook and Instagram were the most popular social networks used by the SMEs interviewed, and these social platforms were believed to offer a more affordable promotional strategy than traditional media such as TV and/or print advertising. Online stores were considered an important factor in helping the SMEs to reach customers beyond the physical store. Furthermore, a successful online store allowed some SMEs to reduce their business rental costs by maintaining their physical store in a cheaper, less central city area as opposed to a more traditional city center store location. In addition, the small comparative size of the SMEs allowed them to be more attentive to their customers, leading to higher customer satisfaction and rate of return. In conclusion, this study found that these kinds of cost savings helped the SMEs interviewed to focus their scarce resources on producing unique, high-quality collections in order to differentiate themselves from international brands. Facebook and Instagram were the main platforms used for promotion and brand-building. The main challenge to this promotion strategy identified by the SMEs interviewed was to continue to find innovative ways to maximize the impact of a limited marketing budget.

Keywords: Vietnam, SMEs, fashion brands, promotion, marketing, social listening

Procedia PDF Downloads 111
1195 On the Study of All Waterloo Automaton Semilattices

Authors: Mikhail Abramyan, Boris Melnikov

Abstract:

The aim is to study the set of subsets of grids of the Waterloo automaton and the set of covering automata defined by the grid subsets. The study was carried out using the library for working with nondeterministic finite automata NFALib implemented by one of the authors (M. Abramyan) in C#. The results are regularities obtained when considering semilattices of covering automata for the Waterloo automaton. A complete description of the obtained semilattices from the point of view of equivalence of the covering automata to the original Waterloo automaton is given, the criterion of equivalence of the covering automaton to the Waterloo automaton in terms of properties of the subset of grids defining the covering automaton is formulated. The relevance of the subject area under consideration is due to the need to research a set of regular languages and, in particular, a description of their various subclasses. Also relevant are the problems that may arise in some subclasses. This will give, among other things, the possibility of describing new algorithms for the equivalent transformation of nondeterministic finite automata.

Keywords: nondeterministic finite automata, universal automaton, grid, covering automaton, equivalent transformation algorithms, the Waterloo automaton

Procedia PDF Downloads 64
1194 The Knowledge-Behavior Gap in the Online Information Seeking Process

Authors: Yen-Mei Lee

Abstract:

The concept of a knowledge-behavior gap has been discussed for several years. It is addressed that an individual’s knowledge does not sufficiently transfer to his or her actual actions. This concept is mostly focused on fields related to medicine or applied to health care issues to explain how people or patients connect their personal knowledge to actual health care behaviors. To our knowledge, seldomly has this research been applied to discuss people’s online information seeking behavior. In the current study, the main purpose is to investigate the relationship between web users’ personal values and their actual performances when seeking information on the Internet. The total number of twenty-eight participants, divided into one experienced group (n=14) and one novice group (n=14), were recruited and asked to complete a self-report questionnaire of fifty items related to information seeking actions and behaviors. During the execution, participants needed to rate the importance level (how important each item is) and the performance level (how often they actually do each item) from 1 to 10 points on each item. In this paper, the mean scores of the importance and the performance level are analyzed and discussed. The results show that there is a gap between web user’s knowledge and their actual online seeking behaviors. Both experienced group and novice group have higher average scores of the importance level (experienced group = 7.57, novice group = 6.01) than the actual performance level (experienced group = 6.89, novice group = 5.00) in terms of the fifty online information seeking actions. On the other hand, the experienced group perceives more importance of the fifty online seeking actions and performs actual behaviors better than the novice group. Moreover, experienced participants express a consistent result between their concept knowledge and actual behaviors. For instance, they feel extending a seeking strategy is important and frequently perform this action when seeking online. However, novice participants do not have a consistency between their knowledge and behaviors. For example, though they perceive browsing and judging information are less important than they get lost in the online information seeking process. However, in the actual behavior rating, the scores show that novices do browsing and judge information more often than they get lost when seeking information online. These results, therefore, help scholars and educators have a better understanding of the difference between experienced and novice web users regarding their concept knowledge and actual behaviors. In future study, figuring out how to narrow down the knowledge-behavior gap and create practical guidance for novice users to increase their online seeking efficiency is crucial. Not only could it help experienced users be aware of their actual information seeking behaviors, but also help the novice become mastery to concisely obtain information on the Internet.

Keywords: experienced web user, information seeking behavior, knowledge-behavior gap, novice, online seeking efficiency

Procedia PDF Downloads 108
1193 Gender Policy in Nigeria: Implications for Sustainable Development in the Fourth Republic

Authors: Adadu Yahaya, Abdullahi Erunke Canice

Abstract:

The study sets out to examine the interface that tends to exist in the relationship between gender policy and Nigeria’s socio-economic development. Despite Nigeria’s ratification of virtually all international instruments on the protection and promotion of gender rights and equality, it appears that the practice is honored in the breach than in observance; hence, these policies have not been adequately domesticated and implemented. The implication of this is that the women folks have generally been isolated from mainstream politics and their political rights and privileges truncated in the scheme of things. The paper observes that gender inequality and marginalization in Nigeria has practically occasioned the unwholesome subjugation of Nigerian women to the background, hence poses more critical questions and challenges to the national question. The consequence of this, to this paper, is that Nigeria’s development process will be adversely affected if this trend is not checked. The paper sums up with appropriate policy options which are believed to have the potentials of giving women the right pride of place in the socio-economic and political dynamics in the 21st century Nigeria and beyond.

Keywords: development, equality, gender, policy

Procedia PDF Downloads 475
1192 Move Analysis of Death Row Statements: An Explanatory Study Applied to Death Row Statements in Texas Department of Criminal Justice Website

Authors: Giya Erina

Abstract:

Linguists have analyzed the rhetorical structure of various forensic genres, but only a few have investigated the complete structure of death row statements. Unlike other forensic text types, such as suicide or ransom notes, the focus of death row statement analysis is not the authenticity or falsity of the text, but its intended meaning and its communicative purpose. As it constitutes their last statement before their execution, there are probably many things that inmates would like to express. This study mainly examines the rhetorical moves of 200 death row statements from the Texas Department of Criminal Justice website using rhetorical move analysis. The rhetorical moves identified in the statements will be classified based on their communicative purpose, and they will be grouped into moves and steps. A move structure will finally be suggested from the most common or characteristic moves and steps, as well as some sub-moves. However, because of some statements’ atypicality, some moves may appear in different parts of the texts or not at all.

Keywords: Death row statements, forensic linguistics, genre analysis, move analysis

Procedia PDF Downloads 284
1191 Problems Arising in Visual Perception

Authors: K. A. Tharanga, K. H. H. Damayanthi

Abstract:

Perception is an epistemological concept discussed in Philosophy. Perception, in other word, vision, is one of the ways that human beings get empirical knowledge after five senses. However, we face innumerable problems when achieving knowledge from perception, and therefore the knowledge gained through perception is uncertain. what we see in the external world is not real. These are the major issues that we face when receiving knowledge through perception. Sometimes there is no physical existence of what we really see. In such cases, the perception is relative. The following frames will be taken into consideration when perception is analyzed illusions and delusions, the figure of a physical object, appearance and the reality of a physical object, time factor, and colour of a physical object.seeing and knowing become vary according to the above conceptual frames. We cannot come to a proper conclusion of what we see in the empirical world. Because the things that we see are not really there. Hence the scientific knowledge which is gained from observation is doubtful. All the factors discussed in science remain in the physical world. There is a leap from ones existence to the existence of a world outside his/her mind. Indeed, one can suppose that what he/she takes to be real is just anmassive deception. However, depending on the above facts, if someone begins to doubt about the whole world, it is unavoidable to become his/her view a scepticism or nihilism. This is a certain reality.

Keywords: empirical, perception, sceptisism, nihilism

Procedia PDF Downloads 75
1190 The Optical OFDM Equalization Based on the Fractional Fourier Transform

Authors: A. Cherifi, B. S. Bouazza, A. O. Dahman, B. Yagoubi

Abstract:

Transmission over Optical channels will introduce inter-symbol interference (ISI) as well as inter-channel (or inter-carrier) interference (ICI). To decrease the effects of ICI, this paper proposes equalizer for the Optical OFDM system based on the fractional Fourier transform (FrFFT). In this FrFT-OFDM system, traditional Fourier transform is replaced by fractional Fourier transform to modulate and demodulate the data symbols. The equalizer proposed consists of sampling the received signal in the different time per time symbol. Theoretical analysis and numerical simulation are discussed.

Keywords: OFDM, fractional fourier transform, internet and information technology

Procedia PDF Downloads 386
1189 Police and Community Crime Prevention in Sweden

Authors: Peter Lindstrom, Caroline Gyberg, Scott Goodwin

Abstract:

The Swedish police organisation was fundamentally reorganized in 2015 when 21 regional police forces were combined into one national police authority divided in 7 larger police regions, 35 police areas, and some 100 local police districts. A central theme for the reform was that local crime prevention policing should be more unified in the country. In this paper, we review crime prevention strategies in Sweden from a criminological and policing perspective focusing, among other things, on differences between urban and rural areas. In the crime prevention field, words such as 'knowledge- and evidence-based', 'collaboration', and 'strategies' are common. Our objective is to investigate the relationship between theoretical and practical knowledge in local crime prevention work. Our research indicate that an elaborated and strategic connection between theoretical and practical perspectives is important for successful local crime prevention work. Universities may provide a platform such knowledge exchange.

Keywords: crime prevention, police reform, urban and rural areas, criminological and policing perspectives

Procedia PDF Downloads 163
1188 Science Subjects Studied and Relation to Income after University Graduation: An Empirical Analysis in Japan

Authors: Kazuo Nishimura, Junichi Hirata, Tadashi Yagi, Junko Urasaka

Abstract:

This paper is an investigation of the effect of science education during the high school education how science graduates of universities are appreciated in the labor market in Japan. We conducted a survey utilizing the internet and analyzed the subjects they were good at and their annual income. The results confirm that among science graduates, workers adept at physics tend to have higher incomes compared to workers good at other subjects. Generational analysis based on the curriculum guideline amendments reveals that the generational difference is small among science majors who are good at physics.

Keywords: curriculum, income, physics, science

Procedia PDF Downloads 272
1187 The Impact of Different Social Networks on the Development of Digital Entrepreneurship

Authors: Mohammad Mehdizadeh, Sara Miri

Abstract:

In today's world, competition is one of the essential components of different markets. Therefore, in addition to economic factors, social factors can also affect the development and prosperity of businesses. In this regard, social networks are of particular importance and play a critical role in the flourishing and development of Internet businesses. The purpose of this article is to investigate the effect of different social networks in promoting digital entrepreneurship. The research method is the descriptive survey. The results show that social networks have a positive and significant impact on digital entrepreneurship development. Among the social networks studied, Instagram and Facebook have the most positive effect on digital entrepreneurship.

Keywords: entrepreneurship, Facebook, Instagram, social media

Procedia PDF Downloads 329
1186 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data

Authors: Alicja Starczewska, Aleksander Nawrat, Krzysztof Daniec, Jarosław Homa, Kacper Hołda

Abstract:

Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.

Keywords: BGP, BGP hijacking, cybersecurity, detection

Procedia PDF Downloads 60
1185 Evaluation Synthesis of Private Sector Engagement in International Development

Authors: Valerie Habbel, Magdalena Orth, Johanna Richter, Steffen Schimko

Abstract:

Cooperation between development actors and the private sector is becoming increasingly important, as it is expected to mobilize additional resources to achieve the Sustainable Development Goals (SDGs), among other things. However, whether the goals of cooperation are achieved has so far only been explored in evaluations and studies of individual projects and instruments. The evaluation synthesis attempts to close this gap by systematically analyzing existing evidence (evaluations and academic studies) from national and international development cooperation on private sector engagement. Overall, the evaluations and studies considered report mainly positive effects on investors and donors, intermediaries, partner countries, and target groups. However, various analyses, including on the quality of the evaluations, point to a positive bias in the results. The evaluation synthesis makes recommendations on the definition of indicators, the measurement and evaluation of impacts and additionality, knowledge management, and the consideration of transaction costs in cooperation with private actors.

Keywords: evaluation synthesis, private sector engagement, international development, sustainable development

Procedia PDF Downloads 187
1184 A Case Study of Meaningful Learning in Play for Young Children

Authors: Baoliang Xu

Abstract:

The future of education should focus on creating meaningful learning for learners. Play is a basic form and an important means of carrying out kindergarten educational activities, which promotes the creation and development of meaningful learning and is of great importance in the harmonious physical and mental development of young children. Through literature research and case studies, this paper finds that: meaningful learning has the characteristics of contextuality, interaction and constructiveness; teachers should pay great attention to the guidance of children's games, fully respect children's autonomy and create a prepared game environment; children's meaningful learning exists in games and hidden in things that interest them, and "the generation of questions The "generation of questions" fuels the depth of children's meaningful learning, and teachers' professional support helps children's meaningful learning to develop continuously. In short, teachers' guidance of young children's play should be emphasized to effectively provide scaffolding instruction to promote meaningful learning in a holistic manner.

Keywords: meaningful learning, young childhood, game, case study

Procedia PDF Downloads 52
1183 Happiness of Undergraduate Nursing Students, College of Nursing, Ratchaburi, Thailand

Authors: Paveenapat Nithitantiwat, Kwanjai Pataipakaipet

Abstract:

The purpose of this research was to study the happiness level of nursing students, Boromarajonani College of nursing, Ratchaburi, Thailand. A purposive sampling of 652 first to four-year nursing students was used. This research is descriptive research. The instruments were questionnaires that developed by the researcher. It included the demographic data and nursing student’s perception about healthcare, safety, life security, family, proud of oneself, education and activities, dormitories and environment in college, and how to improve their happiness. Frequencies, percentage, mean, and T-test is used to analysis the data. The results of the research have shown that family and moral value was an important thing in nursing student’s life. In addition, the mean of the happiness level was a high level. The first year nursing students had the higher mean score of the happiness level than the fourth year, second year, and the third year, respectively. Therefore, nursing students would realize that the important things in their life are family and Buddhism’s teaching. In addition, dharma is guideline how to be both academic achievements and successful in life.

Keywords: happiness, nursing students, nursing students’ perceptions, bachelor program

Procedia PDF Downloads 309
1182 Poultry in Motion: Text Mining Social Media Data for Avian Influenza Surveillance in the UK

Authors: Samuel Munaf, Kevin Swingler, Franz Brülisauer, Anthony O’Hare, George Gunn, Aaron Reeves

Abstract:

Background: Avian influenza, more commonly known as Bird flu, is a viral zoonotic respiratory disease stemming from various species of poultry, including pets and migratory birds. Researchers have purported that the accessibility of health information online, in addition to the low-cost data collection methods the internet provides, has revolutionized the methods in which epidemiological and disease surveillance data is utilized. This paper examines the feasibility of using internet data sources, such as Twitter and livestock forums, for the early detection of the avian flu outbreak, through the use of text mining algorithms and social network analysis. Methods: Social media mining was conducted on Twitter between the period of 01/01/2021 to 31/12/2021 via the Twitter API in Python. The results were filtered firstly by hashtags (#avianflu, #birdflu), word occurrences (avian flu, bird flu, H5N1), and then refined further by location to include only those results from within the UK. Analysis was conducted on this text in a time-series manner to determine keyword frequencies and topic modeling to uncover insights in the text prior to a confirmed outbreak. Further analysis was performed by examining clinical signs (e.g., swollen head, blue comb, dullness) within the time series prior to the confirmed avian flu outbreak by the Animal and Plant Health Agency (APHA). Results: The increased search results in Google and avian flu-related tweets showed a correlation in time with the confirmed cases. Topic modeling uncovered clusters of word occurrences relating to livestock biosecurity, disposal of dead birds, and prevention measures. Conclusions: Text mining social media data can prove to be useful in relation to analysing discussed topics for epidemiological surveillance purposes, especially given the lack of applied research in the veterinary domain. The small sample size of tweets for certain weekly time periods makes it difficult to provide statistically plausible results, in addition to a great amount of textual noise in the data.

Keywords: veterinary epidemiology, disease surveillance, infodemiology, infoveillance, avian influenza, social media

Procedia PDF Downloads 91
1181 A Survey on Various Technique of Modified TORA over MANET

Authors: Shreyansh Adesara, Sneha Pandiya

Abstract:

The mobile ad-hoc network (MANET) is an important and open area research for the examination and determination of the performance evolution. Temporary ordered routing algorithm (TORA) is adaptable and distributed MANET routing algorithm which is totally dependent on internet MANET Encapsulation protocol (IMEP) for the detection of the link and sensing of the link. If IMEP detect the wrong link failure then the network suffer from congestion and unnecessary route maintenance. Thus, the improvement in link detection method of TORA is introduced by various methods on IMEP by different perspective from different person. There are also different reactive routing protocols like AODV, TORA and DSR has been compared for the knowledge of the routing scenario for different parameter and using different model.

Keywords: IMEP, mobile ad-hoc network, protocol, TORA

Procedia PDF Downloads 431
1180 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems

Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana

Abstract:

The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.

Keywords: mitigations, risk, transport, security, vulnerabilities

Procedia PDF Downloads 145
1179 Analysis of Criteria for Determining the Location of Hilal Observation in the Tropical Regions: Study of Hilal Observation Location in Bengkulu City

Authors: Badrun Taman

Abstract:

This study aims to review the use of the Bengkulu Provincial Government Mess as the location of rukyatul hilal because its determination has not been carried out scientifically. There are three things that will be analyzed, namely geographical-astronomical conditions, the suitability of the location with ideal criteria, and the determination of the location of rukyatul hilal in accordance with regional conditions based on the results of the study. The research method used is qualitative with an astronomical geographical approach. The results showed that the factor that strengthened the disturbance from the weather aspect was the western sky horizon in the form of the Indian Ocean sea level. The potential for geographical disturbances on this horizon is high sea waves, relatively high sea breezes, and more seawater vapor due to sea surface temperatures and high air humidity. This study found new criteria for determining the location of the observation crescent. The criteria is the western horizon is not sea level (especially the Indian Ocean).

Keywords: criteria, location, Rukyatul Hilal, tropics, Indian ocean

Procedia PDF Downloads 76
1178 Determinants of Youth Engagement with Health Information on Social Media Platforms in United Arab Emirates

Authors: Niyi Awofeso, Yunes Gaber, Moyosola Bamidele

Abstract:

Since most social media platforms are accessible anytime and anywhere where Internet connections and smartphones are available, the invisibility of the reader raises questions about accuracy, appropriateness and comprehensibility of social media communication. Furthermore, the identity and motives of individuals and organizations who post articles on social media sites are not always transparent. In the health sector, through socially networked platforms constitute a common source of health-related information, given their purported wealth of information. Nevertheless, fake blogs and sponsored postings for marketing 'natural cures' pervade most commonly used social media platforms, thus complicating readers’ abilities to access and understand trustworthy health-related information. This purposive sampling study of 120 participants aged 18-35 year in UAE was conducted between September and December 2017, and explored commonly used social media platforms, frequency of use of social media for accessing health related information, and approaches for assessing the trustworthiness of health information on social media platforms. Results indicate that WhatsApp (95%), Instagram (87%) and Youtube (82%) were the most commonly used social media platforms among respondents. Majority of respondents (81%) indicated that they regularly access social media to get health-associated information. More than half of respondents (55%) with non-chronic health status relied on unsolicited messages to obtain health-related information. Doctors’ health blogs (21%) and social media sites of international healthcare organizations (20%) constitute the most trusted source of health information among respondents, with UAE government health agencies’ social media accounts trusted by 15% of respondents. Cardiovascular diseases, diabetes, and hypertension were the most commonly searched topics on social media (29%), followed by nutrition (20%) and skin care (16%). Majority of respondents (41%) rely on reliability of hits on Google search engines, 22% check for health information only from 'reliable' social media sites, while 8% utilize 'logic' to ascertain reliability of health information. As social media has rapidly become an integral part of the health landscape, it is important that health care policy makers, healthcare providers and social media companies collaborate to promote the positive aspects of social media for young people, whilst mitigating the potential negatives. Utilizing popular social media platforms for posting reader-friendly health information will achieve high coverage. Improving youth digital literacy will facilitate easier access to trustworthy information on the internet.

Keywords: social media, United Arab Emirates, youth engagement, digital literacy

Procedia PDF Downloads 104
1177 A Survey of Crowdsourcing Technology

Authors: Qianjia Cheng, Hongquan Jiang

Abstract:

Crowdsourcing solves the problems that computers can't handle by integrating computers and the Internet. Its extensive knowledge sources, high efficiency and high quality, make crowdsourcing attract wide attention in industry and academia in recent years. The development of online crowdsourcing platforms such as Clickworker and Amazon Mechanical Turk(Mturk) tend to mature gradually. This paper sorts out the concept of crowdsourcing, sorts out the workflow of competitive crowdsourcing, summarizes the related technologies of crowdsourcing based on the workflow, quality control, cost control and delay control, introduces the typical crowdsourcing platform. Finally, we highlight some open problems of the current crowdsourcing and present some future research direction in this area.

Keywords: application, crowdsourcing, crowdsourcing platform, system architecture

Procedia PDF Downloads 55
1176 Knowledge Engineering Based Smart Healthcare Solution

Authors: Rhaed Khiati, Muhammad Hanif

Abstract:

In the past decade, smart healthcare systems have been on an ascendant drift, especially with the evolution of hospitals and their increasing reliance on bioinformatics and software specializing in healthcare. Doctors have become reliant on technology more than ever, something that in the past would have been looked down upon, as technology has become imperative in reducing overall costs and improving the quality of patient care. With patient-doctor interactions becoming more necessary and more complicated than ever, systems must be developed while taking into account costs, patient comfort, and patient data, among other things. In this work, we proposed a smart hospital bed, which mixes the complexity and big data usage of traditional healthcare systems with the comfort found in soft beds while taking certain concerns like data confidentiality, security, and maintaining SLA agreements, etc. into account. This research work potentially provides users, namely patients and doctors, with a seamless interaction with to their respective nurses, as well as faster access to up-to-date personal data, including prescriptions and severity of the condition in contrast to the previous research in the area where there is lack of consideration of such provisions.

Keywords: big data, smart healthcare, distributed systems, bioinformatics

Procedia PDF Downloads 183
1175 Unconscious Bias in Judicial Decisions: Legal Genealogy and Disgust in Cases of Private, Adult, Consensual Sexual Acts Leading to Injury

Authors: Susanna Menis

Abstract:

‘Unconscious’ bias is widespread, affecting society on all levels of decision-making and beyond. Placed in the law context, this study will explore the direct effect of the psycho-social and cultural evolution of unconscious bias on how a judicial decision was made. The aim of this study is to contribute to socio-legal scholarship by examining the formation of unconscious bias and its influence on the creation of legal rules that judges believe reflect social solidarity and protect against violence. The study seeks to understand how concepts like criminalization and unlawfulness are constructed by the common law. The study methodology follows two theoretical approaches: historical genealogy and emotions as sociocultural phenomena. Both methods have the ‘tracing back’ of the original formation of a social way of seeing and doing things in common. The significance of this study lies in the importance of reflecting on the ways unconscious bias may be formed; placing judges’ decisions under this spotlight forces us to challenge the status quo, interrogate justice, and seek refinement of the law.

Keywords: legal geneology, emotions, disgust, criminal law

Procedia PDF Downloads 46
1174 Analysis of Operation System Reorganization for Load Balancing of Parcel Sorting

Authors: J. H. Lee

Abstract:

As the internet and smartphone use increases, the E-Commerce is constantly growing. Therefore, the parcel is increasing continuously every year. If the larger amount than the processing capacity of the current facilities is received, they do not process, and the delivery quality becomes low. In this paper, therefore, we analyze comparatively at the cost perspective between the case of building a new facility for the increasing parcel volumes and the case of reorganizing the current operating system. We propose the optimal discount policy per parcel by calculating the construction cost of new automated facility and manual facilities until the construction of the new automated facility, and discount price.

Keywords: system reorganization, load balancing, parcel sorting, discount policy

Procedia PDF Downloads 253
1173 Problems Arising in Visual Perception: A Philosophical and Epistemological Analysis

Authors: K. A.Tharanga, K. H. H. Damayanthi

Abstract:

Perception is an epistemological concept discussed in Philosophy. Perception, in other word, vision, is one of the ways that human beings get empirical knowledge after five senses. However, we face innumerable problems when achieving knowledge from perception, and therefore the knowledge gained through perception is uncertain. what we see in the external world is not real. These are the major issues that we face when receiving knowledge through perception. Sometimes there is no physical existence of what we really see. In such cases, the perception is relative. The following frames will be taken into consideration when perception is analyzed illusions and delusions, the figure of a physical object, appearance and the reality of a physical object, time factor, and colour of a physical object. seeing and knowing become vary according to the above conceptual frames. We cannot come to a proper conclusion of what we see in the empirical world. Because the things that we see are not really there. Hence the scientific knowledge which is gained from observation is doubtful. All the factors discussed in science remain in the physical world. There is a leap from ones existence to the existence of a world outside his/her mind. Indeed, one can suppose that what he/she takes to be real is just a massive deception. However, depending on the above facts, if someone begins to doubt about the whole world, it is unavoidable to become his/her view a scepticism or nihilism. This is a certain reality.

Keywords: empirical, perception, sceptisism, nihilism

Procedia PDF Downloads 121
1172 Extending the Flipped Classroom Approach: Using Technology in Module Delivery to Students of English Language and Literature at the British University in Egypt

Authors: Azza Taha Zaki

Abstract:

Technology-enhanced teaching has been in the limelight since the 90s when educators started investigating and experimenting with using computers in the classroom as a means of building 21st. century skills and motivating students. The concept of technology-enhanced strategies in education is kaleidoscopic! It has meant different things to different educators. For the purpose of this paper, however, it will be used to refer to the diverse technology-based strategies used to support and enrich the flipped learning process, in the classroom and outside. The paper will investigate how technology is put in the service of teaching and learning to improve the students’ learning experience as manifested in students’ attendance and engagement, achievement rates and finally, students’ projects at the end of the semester. The results will be supported by a student survey about relevant specific aspects of their learning experience in the modules in the study.

Keywords: attendance, British University, Egypt, flipped, student achievement, student-centred, student engagement, students’ projects

Procedia PDF Downloads 104
1171 Trend Detection Using Community Rank and Hawkes Process

Authors: Shashank Bhatnagar, W. Wilfred Godfrey

Abstract:

We develop in this paper, an approach to find the trendy topic, which not only considers the user-topic interaction but also considers the community, in which user belongs. This method modifies the previous approach of user-topic interaction to user-community-topic interaction with better speed-up in the range of [1.1-3]. We assume that trend detection in a social network is dependent on two things. The one is, broadcast of messages in social network governed by self-exciting point process, namely called Hawkes process and the second is, Community Rank. The influencer node links to others in the community and decides the community rank based on its PageRank and the number of users links to that community. The community rank decides the influence of one community over the other. Hence, the Hawkes process with the kernel of user-community-topic decides the trendy topic disseminated into the social network.

Keywords: community detection, community rank, Hawkes process, influencer node, pagerank, trend detection

Procedia PDF Downloads 363
1170 Remote Wireless Communications Lab in Real Time

Authors: El Miloudi Djelloul

Abstract:

Technology nowadays enables the remote access to laboratory equipment and instruments via Internet. This is especially useful in engineering education, where students can conduct laboratory experiment remotely. Such remote laboratory access can enable student to use expensive laboratory equipment, which is not usually available to students. In this paper, we present a method of creating a Web-based Remote Laboratory Experimentation in the master degree course “Wireless Communications Systems” which is part of “ICS (Information and Communication Systems)” and “Investment Management in Telecommunications” curriculums. This is done within the RIPLECS Project and the NI2011 FF005 Research Project “Implementation of Project-Based Learning in an Interdisciplinary Master Program”.

Keywords: remote access, remote laboratory, wireless telecommunications, external antenna-switching controller board (EASCB)

Procedia PDF Downloads 497
1169 A Survey of Crowdsourcing Technology and Application

Authors: Qianjia Cheng, Hongquan Jiang

Abstract:

Crowdsourcing solves the problems that computers can't handle by integrating computers and the Internet. Its extensive knowledge sources, high efficiency, and high quality have made crowdsourcing attract wide attention in industry and academia in recent years. The development of online crowdsourcing platforms such as Clickworker, Amazon Mechanical Turk(Mturk) tends to mature gradually. This paper sorts out the concept of crowdsourcing, sorts out the workflow of competitive crowdsourcing, summarizes the related technologies of crowdsourcing based on workflow, quality control, cost control, and delay control, and introduces the typical crowdsourcing platform. Finally, we highlight some open problems of the current crowdsourcing and present some future research directions in this area.

Keywords: application, crowdsourcing, crowdsourcing platform, system architecture

Procedia PDF Downloads 70
1168 The Egyptian eGovernment Journey

Authors: Ali Abdelsattar Elshabrawy

Abstract:

The Egyptian government is struggling to build it's eGovernment project. They succeeded to build the Egyptian digital portal, which contain links for number of services provided by different ministries. For achieving such success, their are requirements necessary to build such a project such as: internet dissemination, IT literacy, Strategy, disqualification of paper based services. This paper is going to clarify the main obstacles to the Egyptian eGovernment project from both the supply and demand sides. Also will clarify the most critical requirements in this phase of the project lifecycle. This paper should be in great value for the project team and also for many other developing countries that share the same obstacles.

Keywords: the egyptian egovernment project lifecycle, supply side barriers, demand side barriers, egovernment project requirements

Procedia PDF Downloads 137
1167 Ensuring Cyber Security Using Kippo Honeypots

Authors: S. Vivekananda Pandian

Abstract:

A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.

Keywords: attackers, security, Kippo Honeypots, virtual machine

Procedia PDF Downloads 409