Search results for: marketing communication tools internet
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9568

Search results for: marketing communication tools internet

8488 Two-Level Graph Causality to Detect and Predict Random Cyber-Attacks

Authors: Van Trieu, Shouhuai Xu, Yusheng Feng

Abstract:

Tracking attack trajectories can be difficult, with limited information about the nature of the attack. Even more difficult as attack information is collected by Intrusion Detection Systems (IDSs) due to the current IDSs having some limitations in identifying malicious and anomalous traffic. Moreover, IDSs only point out the suspicious events but do not show how the events relate to each other or which event possibly cause the other event to happen. Because of this, it is important to investigate new methods capable of performing the tracking of attack trajectories task quickly with less attack information and dependency on IDSs, in order to prioritize actions during incident responses. This paper proposes a two-level graph causality framework for tracking attack trajectories in internet networks by leveraging observable malicious behaviors to detect what is the most probable attack events that can cause another event to occur in the system. Technically, given the time series of malicious events, the framework extracts events with useful features, such as attack time and port number, to apply to the conditional independent tests to detect the relationship between attack events. Using the academic datasets collected by IDSs, experimental results show that the framework can quickly detect the causal pairs that offer meaningful insights into the nature of the internet network, given only reasonable restrictions on network size and structure. Without the framework’s guidance, these insights would not be able to discover by the existing tools, such as IDSs. It would cost expert human analysts a significant time if possible. The computational results from the proposed two-level graph network model reveal the obvious pattern and trends. In fact, more than 85% of causal pairs have the average time difference between the causal and effect events in both computed and observed data within 5 minutes. This result can be used as a preventive measure against future attacks. Although the forecast may be short, from 0.24 seconds to 5 minutes, it is long enough to be used to design a prevention protocol to block those attacks.

Keywords: causality, multilevel graph, cyber-attacks, prediction

Procedia PDF Downloads 156
8487 Intercultural Communication in the Teaching of English as a Foreign Language in Malawi

Authors: Peter Mayeso Jiyajiya

Abstract:

This paper discusses how the teaching of English as a foreign language in Malawi can enhance intercultural communication competence in a multicultural society. It argues that incorporation of intercultural communication in the teaching of English as a foreign language would improve cultural awareness in communication in the multicultural Malawi. The teaching of English in Malawi is geared towards producing students who would communicate in the global world. This entails the use of proper pedagogical approaches and instructional materials that prepare the students toward intercultural awareness. In view of this, the language teachers were interviewed in order to determine their instructional approaches to intercultural communication. Instructional materials were further evaluated to assess how interculturality is incorporated. The study found out that teachers face perceptual and technical challenges that hinder them from exercising creativity to incorporate interculturality in their lessons. This is also compounded by lack of clear direction in the teaching materials on cultural elements. The paper, therefore, suggests a holistic approach to the teaching of English language in Malawian school in which the diversity of culture in classrooms must be considered an opportunity for addressing students’ cultural needs that may be lacking in the instructional materials.

Keywords: cultural awareness, grammar, foreign language, intercultural communication, language teaching

Procedia PDF Downloads 343
8486 Accessible Sustainability Assessment Tools and Approach of the University level Academic Programs

Authors: S. K. Ashiquer Rahman

Abstract:

The innovative knowledge threshold significantly shifted education from traditional to an online version which was an emergent state of arts for academic programs of any higher education institutions; the substantive situation thus raises the importance of deliberative integration of education, Knowledge, technology and sustainability as well as knowledge platforms, e.g., ePLANETe. In fact, the concept of 'ePLANETe' an innovative knowledge platform and its functionalities as an experimental digitized platform for contributing sustainable assessment of academic programs of higher education institution(HEI). Besides, this paper assessed and define the common sustainable development challenges of higher education(HE) and identified effective approach and tools of 'ePLANETe’ that is enable to practices sustainability assessment of academic programs through the deliberation methodologies. To investigate the effectiveness of knowledge tools and approach of 'ePLANETe’, I have studied sustainable challenges digitized pedagogical content as well as evaluation of academic programs of two public universities in France through the 'ePLANETe’ evaluation space. The investigation indicated that the effectiveness of 'ePLANETe’s tools and approach perfectly fit for the quality assessment of academic programs, implementation of sustainable challenges, and dynamic balance of ecosystem within the university communities and academic programs through 'ePLANETe’ evaluation process and space. The study suggests to the relevant higher educational institution’s authorities and policymakers could use this approach and tools for assessing sustainability and enhancing the sustainability competencies of academic programs for quality education

Keywords: ePLANETe, deliberation, evaluation, competencies

Procedia PDF Downloads 113
8485 A User Study on the Adoption of Context-Aware Destination Mobile Applications

Authors: Shu-Lu Hsu, Fang-Yi Chu

Abstract:

With the advances in information and communications technology, mobile context-aware applications have become powerful marketing tools. In Apple online store, there are numerous mobile applications (APPs) developed for destination tour. This study investigated the determinants of adoption of context-aware APPs for destination tour services. A model is proposed based on Technology Acceptance Model and privacy concern theory. The model was empirically tested based on a sample of 259 users of a tourism APP published by Kaohsiung Tourism Bureau, Taiwan. The results showed that the fitness of the model is well and, among all the factors, the perceived usefulness and perceived ease of use have the most significant influences on the intention to adopt context-aware destination APPs. Finally, contrary to the findings of previous literature, the effect of privacy concern on the adoption intention of context-aware APP is insignificant.

Keywords: mobile application, context-aware, privacy concern, TAM

Procedia PDF Downloads 258
8484 Challenges and Opportunities for M-Government Implementation in Saudi Arabia

Authors: A. Alssbaiheen, S. Love

Abstract:

Mobile government (m-government) is one of the promising technologies for developing the governance of developing countries. While developing countries often have less advanced internet infrastructure compared to the developed world, mobile phone penetration is very high in the Gulf Cooperation Council (GCC) countries and mobile internet use offers a means to transcend traditional logistical barriers to accessing government services. The study explores the challenges and opportunities of the mobile government in Saudi Arabia. Semi-structured interviews were conducted with a diverse cohort of Saudi mobile users. A total of 77 semi-structured interviews were collected and subsequently analysed using open, axial, and selective coding. The participants’ responses revealed that many opportunities exist for the development of m-government in Saudi Arabia, including high popular awareness of government initiatives in e-government, and willingness to use such services, largely due to the time-saving and convenience aspects it offers compared with traditional bureaucratic services. However, numerous barriers were identified, including the low quality and speed of the internet, service customization, and concerns about privacy data security. It was also felt that in addition to infrastructure challenges, the traditional bureaucratic attitude of government department would itself hinder the effective deployment and utilization of m-government services.

Keywords: awareness, barriers, challenges, government services, mobile government, m-government, opportunities

Procedia PDF Downloads 463
8483 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 98
8482 A Generic Middleware to Instantly Sync Intensive Writes of Heterogeneous Massive Data via Internet

Authors: Haitao Yang, Zhenjiang Ruan, Fei Xu, Lanting Xia

Abstract:

Industry data centers often need to sync data changes reliably and instantly from a large-scale of heterogeneous autonomous relational databases accessed via the not-so-reliable Internet, for which a practical universal sync middle of low maintenance and operation costs is most wanted, but developing such a product and adapting it for various scenarios are a very sophisticated and continuous practice. The authors have been devising, applying, and optimizing a generic sync middleware system, named GSMS since 2006, holding the principles or advantages that the middleware must be SyncML-compliant and transparent to data application layer logic, need not refer to implementation details of databases synced, does not rely on host computer operating systems deployed, and its construction is light weighted and hence, of low cost. A series of ultimate experiments with GSMS sync performance were conducted for a persuasive example of a source relational database that underwent a broad range of write loads, say, from one thousand to one million intensive writes within a few minutes. The tests proved that GSMS has achieved an instant sync level of well below a fraction of millisecond per record sync, and GSMS’ smooth performances under ultimate write loads also showed it is feasible and competent.

Keywords: heterogeneous massive data, instantly sync intensive writes, Internet generic middleware design, optimization

Procedia PDF Downloads 120
8481 Biosignal Measurement System Based on Ultra-Wide Band Human Body Communication

Authors: Jonghoon Kim, Gilwon Yoon

Abstract:

A wrist-band type biosignal measurement system and its data transfer through human body communication (HBC) were investigated. An HBC method based on pulses of ultra-wide band instead of using frequency or amplitude modulations was studied and implemented since the system became very compact and it was more suited for personal or mobile health monitoring. Our system measured photo-plethysmogram (PPG) and measured PPG signals were transmitted through a finger to a monitoring PC system. The device was compact and low-power consuming. HBC communication has very strong security measures since it does not use wireless network. Furthermore, biosignal monitoring system becomes handy because it does not need to have wire connections.

Keywords: biosignal, human body communication, mobile health, PPG, ultrawide band

Procedia PDF Downloads 476
8480 Market Chain Analysis of Onion: The Case of Northern Ethiopia

Authors: Belayneh Yohannes

Abstract:

In Ethiopia, onion production is increasing from time to time mainly due to its high profitability per unit area. Onion has a significant contribution to generating cash income for farmers in the Raya Azebo district. Therefore, enhancing onion producers’ access to the market and improving market linkage is an essential issue. Hence, this study aimed to analyze structure-conduct-performance of onion market and identifying factors affecting the market supply of onion producers. Data were collected from both primary and secondary sources. Primary data were collected from 150 farm households and 20 traders. Four onion marketing channels were identified in the study area. The highest total gross margin is 27.6 in channel IV. The highest gross marketing margin of producers of the onion market is 88% in channel II. The result from the analysis of market concentration indicated that the onion market is characterized by a strong oligopolistic market structure, with the buyers’ concentration ratio of 88.7 in Maichew town and 82.7 in Mekelle town. Lack of capital, licensing problems, and seasonal supply was identified as the major entry barrier to onion marketing. Market conduct shows that the price of onion is set by traders while producers are price takers. Multiple linear regression model results indicated that family size in adult equivalent, irrigated land size, access to information, frequency of extension contact, and ownership of transport significantly determined the quantity of onion supplied to the market. It is recommended that strengthening and diversifying extension services in information, marketing, post-harvest handling, irrigation application, and water harvest technology is highly important.

Keywords: oligopoly, onion, market chain, multiple linear regression

Procedia PDF Downloads 145
8479 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 451
8478 An Approach to Autonomous Drones Using Deep Reinforcement Learning and Object Detection

Authors: K. R. Roopesh Bharatwaj, Avinash Maharana, Favour Tobi Aborisade, Roger Young

Abstract:

Presently, there are few cases of complete automation of drones and its allied intelligence capabilities. In essence, the potential of the drone has not yet been fully utilized. This paper presents feasible methods to build an intelligent drone with smart capabilities such as self-driving, and obstacle avoidance. It does this through advanced Reinforcement Learning Techniques and performs object detection using latest advanced algorithms, which are capable of processing light weight models with fast training in real time instances. For the scope of this paper, after researching on the various algorithms and comparing them, we finally implemented the Deep-Q-Networks (DQN) algorithm in the AirSim Simulator. In future works, we plan to implement further advanced self-driving and object detection algorithms, we also plan to implement voice-based speech recognition for the entire drone operation which would provide an option of speech communication between users (People) and the drone in the time of unavoidable circumstances. Thus, making drones an interactive intelligent Robotic Voice Enabled Service Assistant. This proposed drone has a wide scope of usability and is applicable in scenarios such as Disaster management, Air Transport of essentials, Agriculture, Manufacturing, Monitoring people movements in public area, and Defense. Also discussed, is the entire drone communication based on the satellite broadband Internet technology for faster computation and seamless communication service for uninterrupted network during disasters and remote location operations. This paper will explain the feasible algorithms required to go about achieving this goal and is more of a reference paper for future researchers going down this path.

Keywords: convolution neural network, natural language processing, obstacle avoidance, satellite broadband technology, self-driving

Procedia PDF Downloads 251
8477 Remote Learning During Pandemic: Malaysian Classroom

Authors: Hema Vanita Kesevan

Abstract:

The global spread of Covid-19 virus in early 2020 has led to major changes in many walks of life, including the education system. Traditional face to face lessons that were carried out for years has been replaced by online learning. Although online learning has been used before the pandemic, it has not been the only source of teaching and learning. This drastic change has brought significant impact to the process of teaching and learning in many classrooms around the world. Likewise, in country like Malaysia that that has been promoting online learning but has not utilize it fully due to many restrictions in terms of technology, accessibility, and online literacy, the sudden change to full online platform learning in all educational sector has definitely caused Issues in terms of its adaptation and usage. Although many studies have been conducted to explore the efficiency and impact of online learning during the pandemic, studies focusing on the same are limited in Malaysian classroom context, especially in English language classrooms. Thus, this study seeks to explore on the efficacy and effectiveness of online learning tools in ESL classroom contexts during the pandemic. The aim of this study is to understand the educator's and student's perceptions on the implementation of online learning tools in the teaching and learning process and the types of online learning tools that were used to assist the teaching and learning process during the pandemic. Particularly, this study focused to explore the types of online learning tools used in Malaysian schools and university during the online teaching and learning process and further explores how the various types of tools used impacted the students' participation in the lessons conducted. The participants of this study are secondary school students, teachers, and university students. Data will be collected in terms of survey questionnaire and interviews. The survey data intends to obtain information on the types of online learning used in ESL teaching and learning practices during the pandemic, how the various types of online tools influence students' participation during lessons. The interview data from the teachers serves to provide information about the selection of online learning tools, challenges of using it to conduct online lessons, and other arising issues. A mixed method design will be used to analysed the data obtained. The questionnaire will be analysed quantitatively using descriptive analysis meanwhile, the interview data will be analysed qualitatively.

Keywords: Covid 19, online learning tools, ESL classroom, effectiveness, efficacy

Procedia PDF Downloads 236
8476 An Empirical Analysis of the Determinants for Adopting Vocera Wireless Communication Systems

Authors: Patrick David Chirilele

Abstract:

There are growing interests in improving service delivery in the healthcare sector through the adoption of emerging digital technologies, including the Vocera B3000n communication system badge. As a result, understanding the factors that impact the adoption of such digital technologies is becoming important. This study investigates the determinants of task-technology fit through the adoption of Vocera B3000n communication system badge in healthcare sector in South Africa. Statistical analyses are performed on the data collected from 143 healthcare workers including registered nurses and personal care workers at three hospitals in South Africa through survey to test the relationship between task characteristics, technology characteristics and user characteristics for better understanding the task-technology fit and the adoption of Vocera communication systems in South African hospitals. The result reveals that all three factors have a significant impact on task-technology fit through the adoption of Vocera B3000n communication system badge. Such findings are useful for healthcare sector in their adoption of digital technologies for improving service delivery through effective communication in their workplace.

Keywords: adoption, communication systems, task-technology fit, user characteristics, Vocera

Procedia PDF Downloads 141
8475 An Internet of Things Based Home Automation Based on Raspberry Pi and Node JS Server

Authors: Ahmed Khattab, Bassem Shetta

Abstract:

Today, there are many branches of technology, one of them is the internet of things. In this paper, it's focused specifically on automating all the home appliances through E-mail using Node JS server, the server side stores, and processes this data. The server side contains user interface and notification system functionalities which is operated by Raspberry Pi. It will present the security requirements for the smart home. In this application, the privilege of home control including special persons to use it, using the hardware appliances through mobiles and tablets is achieved. The proposed application delivers high quality of service, long lifetime, low maintenance, fast deployment, and low power requirements with low cost needed for development.

Keywords: Raspberry Pi, E-mail, home automation, temperature sensor, PIR sensor, actuators, relay

Procedia PDF Downloads 262
8474 An Exploratory Study of the Effects of Head Movement on Engagement within a Telepresence Environment

Authors: B. S. Bamoallem, A. J. Wodehouse, G. M. Mair

Abstract:

Communication takes place not only through speech, but also by means of gestures such as facial expressions, gaze, head movements, hand movements and body posture, and though there has been rapid development, communication platforms still lack this type of behavior. We believe communication platforms need to fully achieve this verbal and non-verbal behavior in order to make interactions more engaging and more efficient. In this study we decided to focus our research on the head rather than any other body part as it is a rich source of information for speech-related movement Thus we aim to investigate the value of incorporating head movements into the use of telepresence robots as communication platforms; this will be done by investigating a system that reproduces head movement manually as closely as possible.

Keywords: engagement, nonverbal behaviours, head movements, face-to-face interaction, telepresence robot

Procedia PDF Downloads 455
8473 Effects of Therapeutic Horseback Riding in Speech and Communication Skills of Children with Autism

Authors: Aristi Alopoudi, Sofia Beloka, Vassiliki Pliogou

Abstract:

Autism is a complex neuro-developmental disorder with a variety of difficulties in many aspects such as social interaction, communication skills and verbal communication (speech). The aim of this study was to examine the impact of therapeutic horseback riding in improving the verbal and communication skills of children diagnosed with autism during 16 sessions. The researcher examined whether the expression of speech, the use of vocabulary, semantics, pragmatics, echolalia and communication skills were influenced by the therapeutic horseback riding when we increase the frequency of the sessions. The researcher observed two subjects of primary-school aged, in a two case observation design, with autism during 16 therapeutic horseback riding sessions (one riding session per week). Compared to baseline, at the end of the 16th therapeutic session, therapeutic horseback riding increased both verbal skills such as vocabulary, semantics, pragmatics, formation of sentences and communication skills such as eye contact, greeting, participation in dialogue and spontaneous speech. It was noticeable that echolalia remained stable. Increased frequency of therapeutic horseback riding was beneficial for significant improvement in verbal and communication skills. More specifically, from the first to the last riding session there was a great increase of vocabulary, semantics, and formation of sentences. Pragmatics reached a lower level than semantics but the same as the right usage of the first person (for example, I make a hug) and echolalia used for that. A great increase of spontaneous speech was noticed. The eye contact was presented in a lower level, and there was a slow but important raise at the greeting as well as the participation in dialogue. Last but not least; this is a first study conducted in therapeutic horseback riding studying the verbal communication and communication skills in autistic children. According to the references, therapeutic horseback riding is a therapy with a variety of benefits, thus; this research made clear that in the benefits of this therapy there should be included the improvement of verbal speech and communication.

Keywords: Autism, communication skills, speech, therapeutic horseback riding

Procedia PDF Downloads 274
8472 Improving Automotive Efficiency through Lean Management Tools: A Case Study

Authors: Raed El-Khalil, Hussein Zeaiter

Abstract:

Managing and improving efficiency in the current highly competitive global automotive industry demands that companies adopt leaner and more flexible systems. During the past 20 years the domestic automotive industry in North America has been focusing on establishing new management strategies in order to meet market demands. 98The lean management process also known as Toyota Manufacturing Process (TPS) or lean manufacturing encompasses tools and techniques that were established in order to provide the best quality product with the fastest lead time at the lowest cost. The following paper presents a study that focused on improving labor efficiency at one of the Big Three (Ford, GM, Chrysler LLC) domestic automotive facility in North America. The objective of the study was to utilize several lean management tools in order to optimize the efficiency and utilization levels at the “Pre-Marriage” chassis area in a truck manufacturing and assembly facility. Utilizing three different lean tools (i.e. Standardization of work, 7 Wastes, and 5S) this research was able to improve efficiency by 51%, utilization by 246%, and reduce operations by 14%. The return on investment calculated based on the improvements made was 284%.

Keywords: lean manufacturing, standardized work, operation efficiency, utilization

Procedia PDF Downloads 520
8471 System for Monitoring Marine Turtles Using Unstructured Supplementary Service Data

Authors: Luís Pina

Abstract:

The conservation of marine biodiversity keeps ecosystems in balance and ensures the sustainable use of resources. In this context, technological resources have been used for monitoring marine species to allow biologists to obtain data in real-time. There are different mobile applications developed for data collection for monitoring purposes, but these systems are designed to be utilized only on third-generation (3G) phones or smartphones with Internet access and in rural parts of the developing countries, Internet services and smartphones are scarce. Thus, the objective of this work is to develop a system to monitor marine turtles using Unstructured Supplementary Service Data (USSD), which users can access through basic mobile phones. The system aims to improve the data collection mechanism and enhance the effectiveness of current systems in monitoring sea turtles using any type of mobile device without Internet access. The system will be able to report information related to the biological activities of marine turtles. Also, it will be used as a platform to assist marine conservation entities to receive reports of illegal sales of sea turtles. The system can also be utilized as an educational tool for communities, providing knowledge and allowing the inclusion of communities in the process of monitoring marine turtles. Therefore, this work may contribute with information to decision-making and implementation of contingency plans for marine conservation programs.

Keywords: GSM, marine biology, marine turtles, unstructured supplementary service data (USSD)

Procedia PDF Downloads 206
8470 Heritage and Tourism in the Era of Big Data: Analysis of Chinese Cultural Tourism in Catalonia

Authors: Xinge Liao, Francesc Xavier Roige Ventura, Dolores Sanchez Aguilera

Abstract:

With the development of the Internet, the study of tourism behavior has rapidly expanded from the traditional physical market to the online market. Data on the Internet is characterized by dynamic changes, and new data appear all the time. In recent years the generation of a large volume of data was characterized, such as forums, blogs, and other sources, which have expanded over time and space, together they constitute large-scale Internet data, known as Big Data. This data of technological origin that derives from the use of devices and the activity of multiple users is becoming a source of great importance for the study of geography and the behavior of tourists. The study will focus on cultural heritage tourist practices in the context of Big Data. The research will focus on exploring the characteristics and behavior of Chinese tourists in relation to the cultural heritage of Catalonia. Geographical information, target image, perceptions in user-generated content will be studied through data analysis from Weibo -the largest social networks of blogs in China. Through the analysis of the behavior of heritage tourists in the Big Data environment, this study will understand the practices (activities, motivations, perceptions) of cultural tourists and then understand the needs and preferences of tourists in order to better guide the sustainable development of tourism in heritage sites.

Keywords: Barcelona, Big Data, Catalonia, cultural heritage, Chinese tourism market, tourists’ behavior

Procedia PDF Downloads 138
8469 Framework for Implementation of National Electrical Safety Grounding Standards for Communication Infrastructure

Authors: Atif Mahmood, Mohammad Inayatullah Khan Babar

Abstract:

Communication infrastructure has been installed, operated, and maintained all over the world according to defined electrical safety standards for separate or joint structures. These safety standards have been set for the safeguard of public, utility workers (employees and contractors), utility facilities, electrical communication equipment’s connected to the utility facilities and other facilities or premise adjacent to utility facilities. Different communication utilities in Pakistan use standards of different countries due to the absence of Common National Electrical Safety Standards of Pakistan. It is really important to devise a framework for implementation of a uniform standard for strict compliance. In this context, it is important to explore the compliance of safety standards for communication conductors and equipment for separate or joint structures for which NESC standards are taken as reference. Specific reference to grounding techniques including grounding AC/DC systems and its frames, leaving Fences, Messenger wires and special circuits used for the protection for lightning etc, ungrounded so recommendations are also given after in-depth analysis of current technical practices for the installation and maintenance of communication infrastructure.

Keywords: utility facilities, grounding electrodes, special circuits, grounding conductor

Procedia PDF Downloads 348
8468 Effectiveness of a Communication Training on Workplace Bullying Using Mobile Phone Application for Nurses

Authors: Jiyeon Kang, Yeon Jin Jeong, Hoon Heo

Abstract:

Purpose: Bullying in nursing workplace has been a serious problem that increases the turnover of nurses. Few studies have examined the effects of communication training on workplace bullying for nurses, and all used a single-group design and a small sample size. Thus, more rigorous research has been needed to evaluate the effects properly. This research was aimed to identify the effects of the mobile type communication training of responses on bullying behaviors among nurses. Methods: A randomized controlled trial was performed. Subjects were 62 critical care nurses working in university hospitals in Busan, South Korea. We developed a mobile phone application to train nurses to deal with bullying situation. This application includes 6 common bullying situations and appropriate empathetic communication (non-violent communication) samples in the form of webtoons. The experimental group used this application for 4 weeks, and we measured interpersonal relationship, workplace bullying, symptom experience, and intention to leave before, post, and 8 weeks after the intervention from both experimental and control groups. The effect of the intervention was analyzed using repeated measures ANOVA. Results: The mobile type communication training developed in this study was effective for decreasing nurses’ intention to leave workplace (F = 5.11, p = .027). However, it had no effect on interpersonal relationship (F = 2.54, p = .116), workplace bullying (F = 2.99, p = .089) or symptom experience (F = 2.81, p = .099). The beneficial effects on intention to leave lasted at least up to 4 weeks after the training. Conclusion: The mobile type communication training can be utilized as an effective personal coping strategy for workplace bullying among nurses. Further studies on the long-term effects of the communication training are necessary.

Keywords: bullying, communication, mobile applications, nurses, training, workplace

Procedia PDF Downloads 331
8467 The Perspectives of Adult Learners Towards Online Learning

Authors: Jacqueline Żammit

Abstract:

Online learning has become more popular as a substitute for traditional classroom instruction because of the COVID-19 epidemic. The study aimed to investigate how adult Maltese language learners evaluated the benefits and drawbacks of online instruction. 35 adult participants provided data through semi-structured interviews with open-ended questions. NVivo software was used to analyze the interview data using the thematic analysis method in order to find themes and group the data based on common responses. The advantages of online learning that the participants mentioned included accessing subject content even without live learning sessions, balancing learning with household duties, and lessening vulnerability to problems like fatigue, time-wasting traffic, school preparation, and parking space constraints. Conversely, inadequate Internet access, inadequate IT expertise, a shortage of personal computers, and domestic distractions adversely affected virtual learning. Lack of an Internet connection, IT expertise, a personal computer, or a phone with Internet access caused inequality in access to online learning sessions. Participants thought online learning was a way to resume academic activity, albeit with drawbacks. In order to address the challenges posed by online learning, several solutions are proposed in the research's conclusion.

Keywords: adult learners, online education, e-learning, challenges of online learning, benefits ofonline learning

Procedia PDF Downloads 60
8466 The Use of Software and Internet Search Engines to Develop the Encoding and Decoding Skills of a Dyslexic Learner: A Case Study

Authors: Rabih Joseph Nabhan

Abstract:

This case study explores the impact of two major computer software programs Learn to Speak English and Learn English Spelling and Pronunciation, and some Internet search engines such as Google on mending the decoding and spelling deficiency of Simon X, a dyslexic student. The improvement in decoding and spelling may result in better reading comprehension and composition writing. Some computer programs and Internet materials can help regain the missing awareness and consequently restore his self-confidence and self-esteem. In addition, this study provides a systematic plan comprising a set of activities (four computer programs and Internet materials) which address the problem from the lowest to the highest levels of phoneme and phonological awareness. Four methods of data collection (accounts, observations, published tests, and interviews) create the triangulation to validly and reliably collect data before the plan, during the plan, and after the plan. The data collected are analyzed quantitatively and qualitatively. Sometimes the analysis is either quantitative or qualitative, and some other times a combination of both. Tables and figures are utilized to provide a clear and uncomplicated illustration of some data. The improvement in the decoding, spelling, reading comprehension, and composition writing skills that occurred is proved through the use of authentic materials performed by the student under study. Such materials are a comparison between two sample passages written by the learner before and after the plan, a genuine computer chat conversation, and the scores of the academic year that followed the execution of the plan. Based on these results, the researcher recommends further studies on other Lebanese dyslexic learners using the computer to mend their language problem in order to design and make a most reliable software program that can address this disability more efficiently and successfully.

Keywords: analysis, awareness, dyslexic, software

Procedia PDF Downloads 225
8465 Implementation of a Web-Based Wireless ECG Measuring and Recording System

Authors: Onder Yakut, Serdar Solak, Emine Dogru Bolat

Abstract:

Measuring the Electrocardiogram (ECG) signal is an essential process for the diagnosis of the heart diseases. The ECG signal has the information of the degree of how much the heart performs its functions. In medical diagnosis and treatment systems, Decision Support Systems processing the ECG signal are being developed for the use of clinicians while medical examination. In this study, a modular wireless ECG (WECG) measuring and recording system using a single board computer and e-Health sensor platform is developed. In this designed modular system, after the ECG signal is taken from the body surface by the electrodes first, it is filtered and converted to digital form. Then, it is recorded to the health database using Wi-Fi communication technology. The real time access of the ECG data is provided through the internet utilizing the developed web interface.

Keywords: ECG, e-health sensor shield, Raspberry Pi, wiFi technology

Procedia PDF Downloads 401
8464 Graffiti as Intelligence: an Analysis of Encoded Messages in Gang Graffiti Renderings

Authors: Timothy Kephart

Abstract:

Many law enforcement officials believe that gangs communicate messages to both the community and to rival gangs through graffiti. Some social scientists have documented this as well, however no recent research has examined gang graffiti for its underlying meaning. Empirical research on gang graffiti and gang communication through graffiti is limited. This research can be described as an exploratory effort to better understand how, and perhaps why, gangs employ this medium for communication. Furthermore this research showcases how law enforcement agencies can utilize this hidden form of communication to better direct resources and impact gang violence.

Keywords: gangs, graffiti, juvenile justice, policing

Procedia PDF Downloads 439
8463 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 446
8462 Identifying and Evaluating the Effectiveness of Communication Channels between Employees and Management Based on the EFQM Excellence Model

Authors: Mehrdad Hosseinishakib, Mozhgan Chakani, Gholamreza Babaei

Abstract:

This study aims to investigate the relationship between the bilateral communication channels, communication technologies with effective communications and communication technologies, employee participation in motivated decision-making of employees using the EFQM excellence model in Education Organization of Area 4 in Karaj. This research is an applied research in terms of the purpose and is a descriptive survey research in terms of nature and method and assesses the current situation using field studies. The statistical population consists of all employees and managers of Education Organization of Area 4 in Karaj including 5442 persons and random sampling was used and sample size is 359 using Cochran formula. Measurement tool is a researcher-made questionnaire with 20 questions including two categories of expertise and general questions. The first category includes general questions about respondents' personal characteristics such as gender and level of education, work experience and courses of study. The second category includes expertise questions of the questionnaire that have been designed to test research hypotheses that its reliability was approved by Cronbach's alpha coefficient 0.916 and its validity was approved according to the vies of teachers and some senior managers of Education Organization of Area 4 in Karaj. The results of the analysis of the findings show that there is a significant relationship between mutual communication channels, communication technologies with effective communication between employees and management. There is also a significant relationship between communication technologies and employee motivation and employee participation in their motivated decision-making in Education Organization of Area 4 in Karaj.

Keywords: communication channels, effective communication, EFQM model, ANOVA

Procedia PDF Downloads 243
8461 The Environmental Impact of Wireless Technologies in Nigeria: An Overview of the IoT and 5G Network

Authors: Powei Happiness Kerry

Abstract:

Introducing wireless technologies in Nigeria have improved the quality of lives of Nigerians, however, not everyone sees it in that light. The paper on the environmental impact of wireless technologies in Nigeria summarizes the scholarly views on the impact of wireless technologies on the environment, beaming its searchlight on 5G and internet of things in Nigeria while also exploring the theory of the Technology Acceptance Model (TAM). The study used a qualitative research method to gather important data from relevant sources and contextually draws inference from the derived data. The study concludes that the Federal Government of Nigeria, before agreeing to any latest development in the world of wireless technologies, should weigh the implications and deliberate extensively with all stalk holders putting into consideration the confirmation it will receive from the National Assembly.  

Keywords: Internet of Things, radiofrequency, electromagnetic radiation, information and communications technology, ICT, 5G

Procedia PDF Downloads 134
8460 The Role of Branding for Success in the Georgian Tea Market

Authors: Maia Seturi, Tamari Todua

Abstract:

Economic growth is seen as the increase in the production capacity of a country. It enables a country to produce more and more material wealth and social benefits. Today, the success of any product on the market is closely related to the issue of branding. The brand is a source of information for a user/consumer, which helps to simplify the choice of goods and reduce consumer risk. The paper studies the role of branding in order to promote Georgian tea brands. The main focus of the research is directed to consumer attitudes regarding Georgian tea brands. The methodology of the paper is based on marketing research. The findings study revealed that the majority of consumers prefer foreign tea brands. The final part of the article presents the main recommendations.

Keywords: marketing research, customer behavior, brand, successful brand

Procedia PDF Downloads 136
8459 Information Technology Approaches to Literature Text Analysis

Authors: Ayse Tarhan, Mustafa Ilkan, Mohammad Karimzadeh

Abstract:

Science was considered as part of philosophy in ancient Greece. By the nineteenth century, it was understood that philosophy was very inclusive and that social and human sciences such as literature, history, and psychology should be separated and perceived as an autonomous branch of science. The computer was also first seen as a tool of mathematical science. Over time, computer science has grown by encompassing every area in which technology exists, and its growth compelled the division of computer science into different disciplines, just as philosophy had been divided into different branches of science. Now there is almost no branch of science in which computers are not used. One of the newer autonomous disciplines of computer science is digital humanities, and one of the areas of digital humanities is literature. The material of literature is words, and thanks to the software tools created using computer programming languages, data that a literature researcher would need months to complete, can be achieved quickly and objectively. In this article, three different tools that literary researchers can use in their work will be introduced. These studies were created with the computer programming languages Python and R and brought to the world of literature. The purpose of introducing the aforementioned studies is to set an example for the development of special tools or programs on Ottoman language and literature in the future and to support such initiatives. The first example to be introduced is the Stylometry tool developed with the R language. The other is The Metrical Tool, which is used to measure data in poems and was developed with Python. The latest literature analysis tool in this article is Voyant Tools, which is a multifunctional and easy-to-use tool.

Keywords: DH, literature, information technologies, stylometry, the metrical tool, voyant tools

Procedia PDF Downloads 151