Search results for: internet of things (IOT)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2137

Search results for: internet of things (IOT)

1057 Change Detection of Vegetative Areas Using Land Use Land Cover Derived from NDVI of Desert Encroached Areas

Authors: T. Garba, T. O. Quddus, Y. Y. Babanyara, M. A. Modibbo

Abstract:

Desertification is define as the changing of productive land into a desert as the result of ruination of land by man-induced soil erosion, which forces famers in the affected areas to move migrate or encourage into reserved areas in search of a fertile land for their farming activities. This study therefore used remote sensing imageries to determine the level of changes in the vegetative areas. To achieve that Normalized Difference of the Vegetative Index (NDVI), classified imageries and image slicing derived from landsat TM 1986, land sat ETM 1999 and Nigeria sat 1 2007 were used to determine changes in vegetations. From the Classified imageries it was discovered that there a more natural vegetation in classified images of 1986 than that of 1999 and 2007. This finding is also future in the three NDVI imageries, it was discovered that there is increased in high positive pixel value from 0.04 in 1986 to 0.22 in 1999 and to 0.32 in 2007. The figures in the three histogram also indicted that there is increased in vegetative areas from 29.15 Km2 in 1986, to 60.58 Km2 in 1999 and then to 109 Km2 in 2007. The study recommends among other things that there is need to restore natural vegetation through discouraging of farming activities in and around the natural vegetation in the study area.

Keywords: vegetative index, classified imageries, change detection, landsat, vegetation

Procedia PDF Downloads 360
1056 Benefits of Construction Management Implications and Processes by Projects Managers on Project Completion

Authors: Mamoon Mousa Atout

Abstract:

Projects managers in construction industry usually face a difficult organizational environment especially if the project is unique. The organization lacks the processes to practice construction management correctly, and the executive’s technical managers who have lack of experience in playing their role and responsibilities correctly. Project managers need to adopt best practices that allow them to do things effectively to make sure that the project can be delivered without any delay even though the executive’s technical managers should follow a certain process to avoid any factor might cause any delay during the project life cycle. The purpose of the paper is to examine the awareness level of projects managers about construction management processes, tools, techniques and implications to complete projects on time. The outcome and the results of the study are prepared based on the designed questionnaires and interviews conducted with many project managers. The method used in this paper is a quantitative study. A survey with a sample of 100 respondents was prepared and distributed in a construction company in Dubai, which includes nine questions to examine the level of their awareness. This research will also identify the necessary benefits of processes of construction management that has to be adopted by projects managers to mitigate the maximum potential problems which might cause any delay to the project life cycle.

Keywords: construction management, project objectives, resource planing and scheduling, project completion

Procedia PDF Downloads 402
1055 Features for Measuring Credibility on Facebook Information

Authors: Kanda Runapongsa Saikaew, Chaluemwut Noyunsan

Abstract:

Nowadays social media information, such as news, links, images, or VDOs, is shared extensively. However, the effectiveness of disseminating information through social media lacks in quality: less fact checking, more biases, and several rumors. Many researchers have investigated about credibility on Twitter, but there is no the research report about credibility information on Facebook. This paper proposes features for measuring credibility on Facebook information. We developed the system for credibility on Facebook. First, we have developed FB credibility evaluator for measuring credibility of each post by manual human’s labelling. We then collected the training data for creating a model using Support Vector Machine (SVM). Secondly, we developed a chrome extension of FB credibility for Facebook users to evaluate the credibility of each post. Based on the usage analysis of our FB credibility chrome extension, about 81% of users’ responses agree with suggested credibility automatically computed by the proposed system.

Keywords: facebook, social media, credibility measurement, internet

Procedia PDF Downloads 356
1054 Twitter's Impact on Print Media with Respect to Real World Events

Authors: Basit Shahzad, Abdullatif M. Abdullatif

Abstract:

Recent advancements in Information and Communication Technologies (ICT) and easy access to Internet have made social media the first choice for information sharing related to any important events or news. On Twitter, trend is a common feature that quantifies the level of popularity of a certain news or event. In this work, we examine the impact of Twitter trends on real world events by hypothesizing that Twitter trends have an influence on print media in Pakistan. For this, Twitter is used as a platform and Twitter trends as a base line. We first collect data from two sources (Twitter trends and print media) in the period May to August 2016. Obtained data from two sources is analyzed and it is observed that social media is significantly influencing the print media and majority of the news printed in newspaper are posted on Twitter earlier.

Keywords: twitter trends, text mining, effectiveness of trends, print media

Procedia PDF Downloads 259
1053 The Old Traditional Structures in Iran: A Suitable Model for Today's Greenhouse

Authors: Behbood Maashkar

Abstract:

One of the principles for societies’ development is the requirement to consider past experiences. Man should always take advantage of the predecessor’s experiences and analyze their works and methods. The predecessors have had a more friendly relationship with nature and their lives less damaged the nature, and it is one of the elements of green building. One of the things the ancients have observed in regard to green building in their houses, stores, sacred places, etc. was using wind-catchers as an air conditioning and cooling system which can be considered as the first foundations of green building. In designing houses Iranian architects have paid a great attention to the factor of making use of more shaded area in hot season and insulation of wall and ceiling against influence of hot weather and also air circulation inside the building. In order to circulate the air inside closed spaces and decrease the temperature, they have considered different winds which blow in Iran and its effective power, and in order to make use of it they invented wind catcher. Direction of wind blow and its height from the earth as well as the time and duration of wind blow and other factors have been effective in making different types of wind catchers. Using wind catchers has been and is prevalent mainly in central and south regions of Iran, coastal areas of Persian Gulf, and Khorasan, especially in cities like Yazd, Kashan, Bam, Abarghoo, Jahrom, and Tabas.

Keywords: environment pollution, green building, Iran, wind catchers

Procedia PDF Downloads 249
1052 A Novel Image Steganography Scheme Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

Growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC) and Image Fidelity (IF) over the previous techniques.

Keywords: fractal image, information hiding, Mandelbrot et fractal, steganography

Procedia PDF Downloads 541
1051 Lessons Learnt from Tutors’ Perspectives on Online Tutorial’s Policies in Open and Distance Education Institution

Authors: Durri Andriani, Irsan Tahar, Lilian Sarah Hiariey

Abstract:

Every institution has to develop, implement, and control its policies to ensure the effectiveness of the institution. In doing so, all related stakeholders have to be involved to maximize the benefit of the policies and minimize the potential constraints and resistances. Open and distance education (ODE) institution is no different. As an education institution, ODE institution has to focus their attention to fulfilling academic needs of their students through open and distance measures. One of them is quality learning support system. Significant stakeholders in learning support system are tutors since they are the ones who directly communicate with students. Tutors are commonly seen as objects whose main responsibility is limited to implementing policies decided by management in ODE institutions. Nonetheless, tutors’ perceptions of tutorials are believed to influence tutors’ performances in facilitating learning support. It is therefore important to analyze tutors’ perception on various aspects of learning support. This paper presents analysis of tutors’ perceptions on policies of tutoriala in ODE institution using Policy Analysis Framework (PAF) modified by King, Nugent, Russell, and Lacy. Focus of this paper is on on-line tutors, those who provide tutorials via Internet. On-line tutors were chosen to stress the increasingly important used of Internet in ODE system. The research was conducted in Universitas Terbuka (UT), Indonesia. UT is purposely selected because of its large number (1,234) of courses offered and large area coverage (6000 inhabited islands). These posed UT in a unique position where learning support system has, to some extent, to be standardized while at the same time it has to be able to cater the needs of different courses in different places for students with different backgrounds. All 598 listed on-line tutors were sent the research questionnaires. Around 20% of the email addresses could not be reached. Tutors were asked to fill out open-ended questionnaires on their perceptions on definition of on-line tutorial, roles of tutors and students in on-line tutorials, requirement for on-line tutors, learning materials, and student evaluation in on-line tutorial. Data analyzed was gathered from 40 on-line tutors who sent back filled-out questionnaires. Data were analyzed qualitatively using content analysis from all 40 tutors. The results showed that using PAF as entry point in choosing learning support services as area of policy with delivery learning materials as the issue at UT has been able to provide new insights of aspects need to be consider in formulating policies in online tutorial and in learning support services. Involving tutors as source of information could be proven to be productive. In general, tutors had clear understanding about definition of online tutorial, roles of tutors and roles of students, and requirement of tutor. Tutors just need to be more involved in the policy formulation since they could provide data on students and problem faced in online tutorial. However, tutors need an adjustment in student evaluation which according tutors too focus on administrative aspects and subjective.

Keywords: distance education, on-line tutorial, tutorial policy, tutors’ perspectives

Procedia PDF Downloads 253
1050 Analysis and Forecasting of Bitcoin Price Using Exogenous Data

Authors: J-C. Leneveu, A. Chereau, L. Mansart, T. Mesbah, M. Wyka

Abstract:

Extracting and interpreting information from Big Data represent a stake for years to come in several sectors such as finance. Currently, numerous methods are used (such as Technical Analysis) to try to understand and to anticipate market behavior, with mixed results because it still seems impossible to exactly predict a financial trend. The increase of available data on Internet and their diversity represent a great opportunity for the financial world. Indeed, it is possible, along with these standard financial data, to focus on exogenous data to take into account more macroeconomic factors. Coupling the interpretation of these data with standard methods could allow obtaining more precise trend predictions. In this paper, in order to observe the influence of exogenous data price independent of other usual effects occurring in classical markets, behaviors of Bitcoin users are introduced in a model reconstituting Bitcoin value, which is elaborated and tested for prediction purposes.

Keywords: big data, bitcoin, data mining, social network, financial trends, exogenous data, global economy, behavioral finance

Procedia PDF Downloads 355
1049 Some Reasons for the Pervasiveness of the Blood Feud among Albanians: An Albanian Phenomenon or Lack of Malfunction of the Judicial Structure

Authors: Arburim Iseni, Afrim Aliti, Nagri Rexhepi

Abstract:

The blood feud or blood-taking is a social obligation to commit murder in order to salvage honor questioned by an earlier murder or moral humiliation. This social obligation is still preserved as a stub among Albanians when honor is violated. By the term honor are understood many things, such as honor to the family, house, guest, property, etc. Many Albanian family members are forced to stay locked up at home because of the blood killing, whereas other families abandon their houses and migrate to other places. Nonetheless, Albanians maintain close ties with their extended families, clans, and tribes and thus chances are high that the violence can beget more violence and without reconciliation of the blood these families will always be endangered. One of the reasons for the pervasiveness of the blood feud is the poor social conditions, political imbroglio and the power vacuum which comes from the corrupted and judiciary system of the state. Contrary to this, Albanian blood feud is not a phenomenon present only to the Albanians, but it also takes place in some other cultures and nations, such as: Chechens, Montenegrins, Serbians, and lately more radical one is between Amman and Israel who are at constant feud.

Keywords: honor, blood feud, reconciliation, power vacuum, poor social conditions, political imbroglio

Procedia PDF Downloads 455
1048 Analysis of Network Performance Using Aspect of Quantum Cryptography

Authors: Nisarg A. Patel, Hiren B. Patel

Abstract:

Quantum cryptography is described as a point-to-point secure key generation technology that has emerged in recent times in providing absolute security. Researchers have started studying new innovative approaches to exploit the security of Quantum Key Distribution (QKD) for a large-scale communication system. A number of approaches and models for utilization of QKD for secure communication have been developed. The uncertainty principle in quantum mechanics created a new paradigm for QKD. One of the approaches for use of QKD involved network fashioned security. The main goal was point-to-point Quantum network that exploited QKD technology for end-to-end network security via high speed QKD. Other approaches and models equipped with QKD in network fashion are introduced in the literature as. A different approach that this paper deals with is using QKD in existing protocols, which are widely used on the Internet to enhance security with main objective of unconditional security. Our work is towards the analysis of the QKD in Mobile ad-hoc network (MANET).

Keywords: cryptography, networking, quantum, encryption and decryption

Procedia PDF Downloads 184
1047 Systemic Functional Grammar Analysis of Barack Obama's Second Term Inaugural Speech

Authors: Sadiq Aminu, Ahmed Lamido

Abstract:

This research studies Barack Obama’s second inaugural speech using Halliday’s Systemic Functional Grammar (SFG). SFG is a text grammar which describes how language is used, so that the meaning of the text can be better understood. The primary source of data in this research work is Barack Obama’s second inaugural speech which was obtained from the internet. The analysis of the speech was based on the ideational and textual metafunctions of Systemic Functional Grammar. Specifically, the researcher analyses the Process Types and Participants (ideational) and the Theme/Rheme (textual). It was found that material process (process of doing) was the most frequently used ‘Process type’ and ‘We’ which refers to the people of America was the frequently used ‘Theme’. Application of the SFG theory, therefore, gives a better meaning to Barack Obama’s speech.

Keywords: ideational, metafunction, rheme, textual, theme

Procedia PDF Downloads 159
1046 Online Community Suitable for e-Masjid ?

Authors: Norlizam Md Sukiban, Muhammad Faisal Ashaari, Hidayah bt Rahmalan

Abstract:

The role that a mosque or masjid have applied during the life of the Prophet Muhammad (S.A.W) was magnificent. Masjid managed to gather the community in lots of ways. It was the center of the first Islamic community and nation, with greatest triumphs and tragedies. It was a place to accommodate for the community center, homeless refuge, university and mosque all rolled into one. However, the role of masjid applied today was less than the time of the Prophet Muhammad (S.A.W) was alive. The advanced technology such as the internet has a major impact to the community nowadays. For example, community online has been chosen for lots of people to maintain their relationship and suggest various events among the communities members. This study is to investigate the possibility of the role of e-Masjid in adapting the concept of community online in order to remain the role played as such as role of masjid during the lifetime of the Prophet Muhammad (S.A.W). Definition and the characteristic of the online community were listed, along with the benefits of the online community. Later, discussion on the possibility of the online community to be adapted in e-Masjid.

Keywords: e-masjid, online community, virtual community, e-community

Procedia PDF Downloads 495
1045 Eco-Mini Bag: Mini trash Bag for Children Environment Awareness

Authors: Asep Adianto, Rinda Ulfah L., Wellya Wichi M., Lasmaria Manik

Abstract:

Garbage is the waste result of daily human activity which is in some to countries can leads to a crucial problem. It is realized that garbage can brings to disastrous consequences for the environment and humans. Piles of garbage will cause to overflow disaster and health problems for human being. Basically, garbage can be processed into recycled products or other utilization. However, in some cases, awareness of environment cleanliness by throwing the garbage to the dustbin is still lacking, in both adults and children. Children tend to do things based on their visual observations without thinking about the impact of their actions. Associated with awareness of cleanliness, children often littering due to the reluctance on throwing garbage to the dustbin because in some place, it’s not that easy to find where the dustbin is. The obstacle should be accommodated by making some kind of compatible dustbin. In addition, the influence of the social environment and lack of education to environmental concerns makes it even worse. Therefore, we need a method to educate people, especially children, to always care about the environment and neighborhood they live in. Because of the intended target is children, the required method should be fun, easy to do, and it doesn’t contain any compulsion act. Therefore, Eco-Mini Bag is one of considerable method to educate children in society to become more aware about environment cleanliness. Eco-Mini bag is a kind of compatible dustbin and it’s going to prevent the children not to throwing garbage in reckless way. In brief, Eco-Mini bag can increase the environment awareness on children and the whole society through exciting and convenience way.

Keywords: children, eco-mini bag, environment, garbage

Procedia PDF Downloads 318
1044 Baseline Study on Human Trafficking Crimes: A Case Study of Mapping Human Trafficking Crimes in East Java Province, Indonesia

Authors: Ni Komang Desy Arya Pinatih

Abstract:

Transnational crime is a crime with 'unique' feature because the activities benefit the lack of state monitoring on the borders so dealing with it cannot be based on conventional engagement but also need joint operation with other countries. On the other hand with the flow of globalization and the growth of information technology and transportation, states become more vulnerable to transnational crime threats especially human trafficking. This paper would examine transnational crime activities, especially human trafficking in Indonesia. With the case study on the mapping of human trafficking crime in East Java province, Indonesia, this paper would try to analyze how the difference in human trafficking crime trends at the national and sub-national levels. The findings of this research were first, there is difference in human trafficking crime trends whereas at the national level the trend is rising, while at sub-national (province) level the trend is declining. Second, regarding the decline of human trafficking number, it’s interesting to see how the method to decrease human trafficking crime in East Jawa Province in order to reduce transnational crime accounts in the region. These things are hopefully becoming a model for transnational crimes engagement in other regions to reduce human trafficking numbers as much as possible.

Keywords: transnational crime, human trafficking, southeast Asia, anticipation model on transnational crimes

Procedia PDF Downloads 304
1043 Policies and Politics of Infrastructure Provisioning in Nigeria

Authors: Olufemi Adedamola Oyedele

Abstract:

Infrastructure provision in Nigeria is now at its lowest ebb in spite of its being critical to the socio-economic and political development of any nation. This is partly because the policy that will ensure its adequate provisioning is missing and partly because politics is affecting its provision. Policy is the basic principles by which a government is guided. Infrastructural development is the basis for measuring the performance of governments and it is the foundation of good governance. Demand for infrastructural development is higher and resources used in its provision are limited. Ethnic-interest agitation and lobbying for infrastructure provision are common things in multi-ethnic state like Nigeria. Most infrastructures are now decayed and need repair or replacement. Government is the system that organizes, control and sensitizes the people in a society in other for all to have an acceptable level of living. Governments have the power to put in place all measures that they deem fit will make an environment conducive for living for everybody. Infrastructure development in any environment requires needs assessment, feasibility and viability studies and carrying out physical development of the project. The challenge in Nigeria is largely carrying out development where they are not needed but where the people are loyal. There are numerous abandoned projects because they were started due to politics and not because they are feasible. Policies and politics greatly affect infrastructure provisioning in Nigeria and this is the premise of this paper.

Keywords: infrastructure challenges, infrastructure development, policy making, politics, project finance

Procedia PDF Downloads 279
1042 A Novel Image Steganography Method Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

The growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC), and Image Fidelity (IF) over the pervious techniques.

Keywords: fractal image, information hiding, Mandelbrot set fractal, steganography

Procedia PDF Downloads 618
1041 Patterns of Positive Feedback Formation in the System of Online Action

Authors: D. Gvozdikov

Abstract:

The purpose of this study is an attempt to describe an online action as a system that combines disjointed events and behavioral chains into a whole. The research focuses on patterns of naturally-formed chains of actions united by an orientation towards the online environment. A key characteristic of the system of online action is that it acts as an attractor for separate actions and chains of behavioral repertoire accumulating time and efforts made by users. The article demonstrates how the chains of online-offline actions are combined into a single pattern due to a simple identifiable mechanism, a positive feedback system. Using methods of digital ethnography and analyzing the content of the Instagram application and media blogs, the research reveals how through the positive feedback mechanism the entire system of online action acquires stability and can expand involving new spheres of human activity.

Keywords: digital anthropology, internet studies, systems theory, social media

Procedia PDF Downloads 133
1040 Gamma-Hydroxybutyrate (GHB): A Review for the Prehospital Clinician

Authors: Theo Welch

Abstract:

Background: Gamma-hydroxybutyrate (GHB) is a depressant of the central nervous system with euphoric effects. It is being increasingly used recreationally in the United Kingdom (UK) despite associated morbidity and mortality. Due to the lack of evidence, healthcare professionals remain unsure as to the optimum management of GHB acute toxicity. Methods: A literature review was undertaken of its pharmacology and the emergency management of its acute toxicity.Findings: GHB is inexpensive and readily available over the Internet. Treatment of GHB acute toxicity is supportive. Clinicians should pay particular attention to the airway as emesis is common. Intubation is required in a minority of cases. Polydrug use is common and worsens prognosis. Conclusion: An inexpensive and readily available drug, GHB acute toxicity can be difficult to identify and treat. GHB acute toxicity is generally treated conservatively. Further research is needed to ascertain the indications, benefits, and risks of intubating patients with GHB acute toxicity. instructions give you guidelines for preparing papers for the conference.

Keywords: GHB, gamma-hydroxybutyrate, prehospital, emergency, toxicity, management

Procedia PDF Downloads 201
1039 The Relation between Body Mass Index and Menstrual Cycle Disorders in Medical Students of University Pelita Harapan, Indonesia

Authors: Gabriella Tjondro, Julita Dortua Laurentina Nainggolan

Abstract:

Introduction: There are several things affecting menstrual cycle, namely, nutritional status, diet, financial status of one’s household and exercises. The most commonly used parameter to calculate the fat in a human body is body mass index. Therefore, it is necessary to do research to prevent complications caused by menstrual disorder in the future. Design Study: This research is an observational analytical study with the cross-sectional-case control approach. Participants (n = 124; median age = 19.5 years ± SD 3.5) were classified into 2 groups: normal, NM (n = 62; BMI = 18-23 kg/m2) and obese, OB (n = 62; BMI = > 25 kg/m2). BMI was calculated from the equation; BMI = weight, kg/height, m2. Results: There were 79.10% from obese group who experienced menstrual cycle disorders (n=53, 79.10%; p value 0.00; OR 5.25) and 20.90% from normal BMI group with menstrual cycle disorders. There were several factors in this research that also influence the menstrual cycle disorders such as stress (44.78%; p value 0.00; OR 1.85), sleep disorders (25.37%; p value 0.00; OR 1.01), physical activities (25.37%; p value 0.00; OR 1.24) and diet (10.45%; p value 0.00; OR 1.07). Conclusion: There is a significant relation between body mass index (obese) and menstrual cycle disorders. However, BMI is not the only factor that affects the menstrual cycle disorders. There are several factors that also can affect menstrual cycle disorders, in this study we use stress, sleep disorders, physical activities and diet, in which none of them are dominant.

Keywords: menstrual disorders, menstrual cycle, obesity, body mass index, stress, sleep disorders, physical activities, diet

Procedia PDF Downloads 148
1038 Virtual Learning during the Period of COVID-19 Pandemic at a Saudi University

Authors: Ahmed Mohammed Omer Alghamdi

Abstract:

Since the COVID-19 pandemic started, a rapid, unexpected transition from face-to-face to virtual classroom (VC) teaching has involved several challenges and obstacles. However, there are also opportunities and thoughts that need to be examined and discussed. In addition, the entire world is witnessing that the teaching system and, more particularly, higher education institutes have been interrupted. To maintain the learning and teaching practices as usual, countries were forced to transition from traditional to virtual classes using various technology-based devices. In this regard, the Kingdom of Saudi Arabia (KSA) is no exception. Focusing on how the current situation has forced many higher education institutes to change to virtual classes may possibly provide a clear insight into adopted practices and implications. The main purpose of this study, therefore, was to investigate how both Saudi English as a foreign language (EFL) teachers and students perceived the implementation of virtual classes as a key factor for useful language teaching and learning process during the COVID-19 pandemic period at a Saudi university. The impetus for the research was, therefore, the need to find ways of identifying the deficiencies in this application and to suggest possible solutions that might rectify those deficiencies. This study seeks to answer the following overarching research question: “How do Saudi EFL instructors and students perceive the use of virtual classes during the COVID-19 pandemic period in their language teaching and learning context?” The following sub-questions are also used to guide the design of the study to answer the main research question: (1) To what extent are virtual classes important intra-pandemic from Saudi EFL instructors’ and students’ perspectives? (2) How effective are virtual classes for fostering English language students’ achievement? (3) What are the challenges and obstacles that instructors and students may face during the implementation of virtual teaching? A mixed method approach was employed in this study; the questionnaire data collection represented the quantitative method approach for this study, whereas the transcripts of recorded interviews represented the qualitative method approach. The participants included EFL teachers (N = 4) and male and female EFL students (N = 36). Based on the findings of this study, various aspects from teachers' and students’ perspectives were examined to determine the use of the virtual classroom applications in terms of fulfilling the students’ English language learning needs. The major findings of the study revealed that the virtual classroom applications during the current pandemic situation encountered three major challenges, among which the existence of the following essential aspects, namely lack of technology and an internet connection, having a large number of students in a virtual classroom and lack of students’ and teachers’ interactions during the virtual classroom applications. Finally, the findings indicated that although Saudi EFL students and teachers view the virtual classrooms in a positive light during the pandemic period, they reported that for long and post-pandemic period, they preferred the traditional face-to-face teaching procedure.

Keywords: virtual classes, English as a foreign language, COVID-19, Internet, pandemic

Procedia PDF Downloads 86
1037 Parameter Estimation for Contact Tracing in Graph-Based Models

Authors: Augustine Okolie, Johannes Müller, Mirjam Kretzchmar

Abstract:

We adopt a maximum-likelihood framework to estimate parameters of a stochastic susceptible-infected-recovered (SIR) model with contact tracing on a rooted random tree. Given the number of detectees per index case, our estimator allows to determine the degree distribution of the random tree as well as the tracing probability. Since we do not discover all infectees via contact tracing, this estimation is non-trivial. To keep things simple and stable, we develop an approximation suited for realistic situations (contract tracing probability small, or the probability for the detection of index cases small). In this approximation, the only epidemiological parameter entering the estimator is the basic reproduction number R0. The estimator is tested in a simulation study and applied to covid-19 contact tracing data from India. The simulation study underlines the efficiency of the method. For the empirical covid-19 data, we are able to compare different degree distributions and perform a sensitivity analysis. We find that particularly a power-law and a negative binomial degree distribution meet the data well and that the tracing probability is rather large. The sensitivity analysis shows no strong dependency on the reproduction number.

Keywords: stochastic SIR model on graph, contact tracing, branching process, parameter inference

Procedia PDF Downloads 78
1036 The Impact of Online Games, Massively Multiplayer Online Game towards Undergraduate Students in Malaysia

Authors: Rubijesmin Abdul Latif, Norshakirah Abdul Aziz, Mohd Taufik Abdul Jalil

Abstract:

This paper focuses on the impact of online games among Malaysian undergraduate students. The purpose of this study is to investigate whether online games (especially MMOGs) impacted students positively or vice versa; focusing on three elements (time management, social life, and emotion). A total of 83 respondents comprised from 14 Malaysia universities, randomly selected undergraduate students who play MMOGs (casual and hardcore gamers i.e. addiction to MMOGs) were involved in this study. The results showed that MMOGs have only negative impact on students capabilities in time management, meanwhile as for the elements social life and emotion, MMOGs do not affect them negatively.

Keywords: internet game addiction, online games, MMOGs, impact, undergraduate students

Procedia PDF Downloads 583
1035 Radical Web Text Classification Using a Composite-Based Approach

Authors: Kolade Olawande Owoeye, George R. S. Weir

Abstract:

The widespread of terrorism and extremism activities on the internet has become a major threat to the government and national securities due to their potential dangers which have necessitated the need for intelligence gathering via web and real-time monitoring of potential websites for extremist activities. However, the manual classification for such contents is practically difficult or time-consuming. In response to this challenge, an automated classification system called composite technique was developed. This is a computational framework that explores the combination of both semantics and syntactic features of textual contents of a web. We implemented the framework on a set of extremist webpages dataset that has been subjected to the manual classification process. Therein, we developed a classification model on the data using J48 decision algorithm, this is to generate a measure of how well each page can be classified into their appropriate classes. The classification result obtained from our method when compared with other states of arts, indicated a 96% success rate in classifying overall webpages when matched against the manual classification.

Keywords: extremist, web pages, classification, semantics, posit

Procedia PDF Downloads 145
1034 Parental Monitoring of Learners’ Cell Phone Use in the Eastern Cape, South Africa

Authors: Melikhaya Skhephe, Robert Mawuli Kwasi Boadzo, Zanoxolo Berington Gobingca

Abstract:

This research study sought to examine parental monitoring of learners’ cell phone use in the Eastern Cape, South Africa. To this end, the researchers employed a quantitative approach. Data were obtained through questionnaires, with a sample of 15 parents having been purposively selected. The findings revealed that parents are unaware that they have to monitor the learner’s cell phone. Another finding was that parents in the 21-century did not support the use of mobile phones in education. The researchers recommend that parent’s discussion forums be created to educate parents on how a cell phone can be used in education. Cellphone companies need to be encouraged to educate parents on how they monitor cell phones used by learners. Another recommendation was that network providers need to restrict access to searching on the internet according to age.

Keywords: parental monitoring, app blocking services, learner’s cell phone use, cell phone

Procedia PDF Downloads 160
1033 Justyna Skrzyńska, Zdzisław Kobos, Zbigniew Wochyński

Authors: Vahid Bairami Rad

Abstract:

Due to the tremendous progress in computer technology in the last decades, the capabilities of computers increased enormously and working with a computer became a normal activity for nearly everybody. With all the possibilities a computer can offer, humans and their interaction with computers are now a limiting factor. This gave rise to a lot of research in the field of HCI (human computer interaction) aiming to make interaction easier, more intuitive, and more efficient. To research eye gaze based interfaces it is necessary to understand both sides of the interaction–the human eye and the eye tracker. The first section gives an overview on the anatomy of the eye. The second section accuracy and calibration issue. The subsequent section presents data from a user study where eye movements have been recorded while watching a video and while surfing the Internet. Statistics on the eye movement during these tasks for several individuals provide typical values and ranges for fixation times and saccade lengths and are the foundation for discussions in later chapters. The data also reveal typical limitations of eye trackers.

Keywords: human computer interaction, gaze tracking, calibration, eye movement

Procedia PDF Downloads 537
1032 Electronic Government Services Adoption from Multi-Nationalities Perspectives

Authors: Isaac Kofi Mensah, Jianing Mi, Cheng Feng

Abstract:

Electronic government is the application of Information and Communication Technologies (ICTs) by the government to improve public service delivery to citizens and businesses. The purpose of this study is to investigate factors influencing the adoption and use of e-government services from different nationalities perspectives. The Technology Acceptance Model (TAM) will be used as the theoretical framework for the study. A questionnaire would be developed and administered to 500 potential respondents who are students from different nationalities in China. Predictors such as perceived usefulness, perceived ease of use, computer self-efficacy, trust in both the internet and government, social influence and perceived service quality would be examined with regard to their impact on the intention to use e-government services. This research is currently at the design and implementation stage. The completion of this study will provide useful insights into understanding factors impacting the decision to use e-government services from a cross and multi nationalities perspectives.

Keywords: different nationalities, e-government, e-government services, technology acceptance model (TAM)

Procedia PDF Downloads 429
1031 Corporate Governance and Business Ethical Values in Organisation: AStudyof Unilag Holdings

Authors: Aribisala Oluwadamilare Olufolarin

Abstract:

The objective of this research was to examine how corporate governance and ethical business values impact both the performance of the organization and its employees, as it is essential for any organization to uphold good ethics and corporate governance. The study was conducted at Unilag Holdings Limited (UniHOLDs) to demonstrate that organizations may experience losses if they do not have proper corporate governance and business ethical values in place. The employees' perception of corporate governance and ethics is crucial for the organization. The research indicated a connection between corporate governance and business ethics values, and therefore, correlation analysis was utilized, making it statistically reliable. The results of the test show a strong positive correlation (r=.812, N=94, P<.01) between corporate governance and business ethical values. A questionnaire was distributed to employees at Unilag Holdings Limited (UniHOLDs), with 94 out of 130 completed and returned. The findings indicate that ethical values contribute to employee productivity, and productive employees have a beneficial impact on the organization's performance. Additionally, the study revealed that employees tend to adhere to rules regardless of their ethical nature. To address this, the organization should ensure that top-level managers do not assign unethical tasks to their subordinates. The study recommends that the organization should consistently practice corporate governance and business ethics. The company needs to make sure that its stakeholders continue to support its way of doing things.

Keywords: business ethics, business ethical values, corporate governance, organization

Procedia PDF Downloads 12
1030 The Role of Sport-Centered Social Capitals on Student's Tendency in Sports Activities

Authors: Esmaeil Zabihi, Seyed Hossein Alavi

Abstract:

The purpose of this study is the review and prioritizes of sport-centered social capital on Islamic Azad university of Garmsar student’s tendency in sports activities, especially public sports based on Bourdieu viewpoint. 365 students at of 6254 students (3140 male and 3114 female) of Islamic Azad university of Garmsar branch were selected randomly, Morgan also used. 272 person answer questionnaire (with the help of specific questionnaires moeinaldini, 1391) it has 30 questions. Researchers have confirmed the validity of this questionnaire justifiability. Reliability was achieved through Cronbach's alpha 84%. The analysis of data done by, SPSS software and independent t-tests, friedman, u Mann Whitney, Kruskal Wallis test. friedman test showed below things : environmental dimension (MR=4.71) social and economic factors (MR=3.57) and family (MR=3.47). These factors have significant role on sports activities of students (P≤1.0). Also, comparison of these dimensions showed that the men believe to university (t-4.30) in increasing students participation. These results show that environment like (such as) governmental organization, going to the stadium and life environment is the most important factor which can effect on sport and body activities of the students.

Keywords: cultural capital, social capital, Bourdieu viewpoint, sport for all

Procedia PDF Downloads 460
1029 Optimization of Lubricant Distribution with Alternative Coordinates and Number of Warehouses Considering Truck Capacity and Time Windows

Authors: Taufik Rizkiandi, Teuku Yuri M. Zagloel, Andri Dwi Setiawan

Abstract:

Distribution and growth in the transportation and warehousing business sector decreased by 15,04%. There was a decrease in Gross Domestic Product (GDP) contribution level from rank 7 of 4,41% in 2019 to 3,81% in rank 8 in 2020. A decline in the transportation and warehousing business sector contributes to GDP, resulting in oil and gas companies implementing an efficient supply chain strategy to ensure the availability of goods, especially lubricants. Fluctuating demand for lubricants and warehouse service time limits are essential things that are taken into account in determining an efficient route. Add depots points as a solution so that demand for lubricants is fulfilled (not stock out). However, adding a depot will increase operating costs and storage costs. Therefore, it is necessary to optimize the addition of depots using the Capacitated Vehicle Routing Problem with Time Windows (CVRPTW). This research case study was conducted at an oil and gas company that produces lubricants from 2019 to 2021. The study results obtained the optimal route and the addition of a depot with a minimum additional cost. The total cost remains efficient with the addition of a depot when compared to one depot from Jakarta.

Keywords: CVRPTW, optimal route, depot, tabu search algorithm

Procedia PDF Downloads 136
1028 Corporate Governance and Business Ethical Values in Organisation: A Study of Unilag Holdings

Authors: Aribisala Oluwadamilare Olufolarin

Abstract:

The objective of this research was to examine how corporate governance and ethical business values impact both the performance of the organization and its employees, as it is essential for any organization to uphold good ethics and corporate governance. The study was conducted at Unilag Holdings Limited (UniHOLDs) to demonstrate that organizations may experience losses if they do not have proper corporate governance and business ethical values in place. The employees' perception of corporate governance and ethics is crucial for the organization. The research indicated a connection between corporate governance and business ethics values, and therefore, correlation analysis was utilized, making it statistically reliable. The results of the test show a strong positive correlation (r=.812, N=94, P<.01) between corporate governance and business ethical values. A questionnaire was distributed to employees at Unilag Holdings Limited (UniHOLDs), with 94 out of 130 completed and returned. The findings indicate that ethical values contribute to employee productivity, and productive employees have a beneficial impact on the organization's performance. Additionally, the study revealed that employees tend to adhere to rules regardless of their ethical nature. To address this, the organization should ensure that top-level managers do not assign unethical tasks to their subordinates. The study recommends that the organization should consistently practice corporate governance and business ethics. The company needs to make sure that its stakeholders continue to support its way of doing things.

Keywords: business ethics, business ethical values, corporate governance and organization, corporate governance

Procedia PDF Downloads 13