Search results for: experienced web user
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3696

Search results for: experienced web user

2586 From Victim to Ethical Agent: Oscar Wilde's The Ballad of Reading Gaol as Post-Traumatic Writing

Authors: Mona Salah El-Din Hassanein

Abstract:

Faced with a sudden, unexpected, and overwhelming event, the individual's normal cognitive processing may cease to function, trapping the psyche in "speechless terror", while images, feelings and sensations are experienced with emotional intensity. Unable to master such situation, the individual becomes a trauma victim who will be susceptible to traumatic recollections like intrusive thoughts, flashbacks, and repetitive re-living of the primal event in a way that blurs the distinction between past and present, and forecloses the future. Trauma is timeless, repetitious, and contagious; a trauma observer could fall prey to "secondary victimhood". Central to the process of healing the psychic wounds in the aftermath of trauma is verbalizing the traumatic experience (i.e., putting it into words) – an act which provides a chance for assimilation, testimony, and reevaluation. In light of this paradigm, this paper proposes a reading of Oscar Wilde's The Ballad of Reading Gaol, written shortly after his release from prison, as a post-traumatic text which traces the disruptive effects of the traumatic experience of Wilde's imprisonment for homosexual offences and the ensuing reversal of fortune he endured. Post-traumatic writing demonstrates the process of "working through" a trauma which may lead to the possibility of ethical agency in the form of a "survivor mission". This paper draws on fundamental concepts and key insights in literary trauma theory which is characterized by interdisciplinarity, combining the perspectives of different fields like critical theory, psychology, psychiatry, psychoanalysis, history, and social studies. Of particular relevance to this paper are the concepts of "vicarious traumatization" and "survivor mission", as The Ballad of Reading Gaol was written in response to Wilde's own prison trauma and the indirect traumatization he experienced as a result of witnessing the execution of a fellow prisoner whose story forms the narrative base of the poem. The Ballad displays Wilde's sense of mission which leads him to recognize the social as well as ethical implications of personal tragedy. Through a close textual analysis of The Ballad of Reading Gaol within the framework of literary trauma theory, the paper aims to: (a) demonstrate how the poem's thematic concerns, structure and rhetorical figures reflect the structure of trauma; (b) highlight Wilde's attempts to come to terms with the effects of the cataclysmic experience which transformed him into a social outcast; and (c) show how Wilde manages to transcend the victim status and assumes the role of ethical agent to voice a critique of the Victorian penal system and the standards of morality underlying the cruelties practiced against wrong doers and to solicit social action.

Keywords: ballad of reading of reading, post-traumatic writing, trauma theory, Wilde

Procedia PDF Downloads 169
2585 Development of a Vegetation Searching System

Authors: Rattanathip Rattanachai, Kunyanuth Kularbphettong

Abstract:

This paper describes the development of a Vegetation Searching System based on Web Application in case of Suan Sunandha Rajabhat University. The model was developed by PHP, JavaScript, and MySQL database system and it was designed to support searching endemic and rare species of tree on web site. We describe the design methods and functional components of this prototype. To evaluate the system performance, questionnaires for system usability and Black Box Testing were used to measure expert and user satisfaction. The results were satisfactory as followed: Means for experts and users were 4.3 and 4.5, and standard deviation for experts and users were 0.61 and 0.73 respectively. Further analysis showed that the quality of plant searching web site was also at a good level as well.

Keywords: endemic species, vegetation, web-based system, black box testing, Thailand

Procedia PDF Downloads 295
2584 A Study on Bicycle Riding Behavior on Bike-Only Road

Authors: Hyeon Jong Yoo, Jae Hwan Yang, Dong Kyu Kim

Abstract:

Recently, riding a bicycle is recommended as an eco-friendly means of transportation. In Seoul, the mayor has secured budget for extending bicycle infrastructure. As bicycle rental centers are adopted in places, more citizens are using bike rental service on bike-only roads for leisure. However, most of the citizens are not experienced in riding bicycles. They usually do not wear helmets, keep the balance of bicycle riding, and pay attention to nearby occasions. Therefore, in this study, bicycles on Han-river bike-only road were tracked, and their behaviors were analyzed in order to show how dangerously beginner riders are riding. The number of conflicts is calculated to evaluate riding safety on the most crowded bike-only road. As a result, conflicts between beginner riders and fast-driving skilled drivers are frequently observed especially at night, and on weekends. In conclusion, it is suggested that the government should acknowledge citizens the fact that bikes are vehicles and adopt a test for bike driving.

Keywords: bicycles, safety, bike-only road, policy proposal

Procedia PDF Downloads 341
2583 Social Factors That Contribute to Promoting and Supporting Resilience in Children and Youth following Environmental Disasters: A Mixed Methods Approach

Authors: Caroline McDonald-Harker, Julie Drolet

Abstract:

Abstract— In the last six years Canada In the last six years Canada has experienced two major and catastrophic environmental disasters– the 2013 Southern Alberta flood and the 2016 Fort McMurray, Alberta wildfire. These two disasters resulted in damages exceeding 12 billion dollars, the costliest disasters in Canadian history. In the aftermath of these disasters, many families faced the loss of homes, places of employment, schools, recreational facilities, and also experienced social, emotional, and psychological difficulties. Children and youth are among the most vulnerable to the devastating effects of disasters due to the physical, cognitive, and social factors related to their developmental life stage. Yet children and youth also have the capacity to be resilient and act as powerful catalyst for change in their own lives and wider communities following disaster. Little is known, particularly from a sociological perspective, about the specific factors that contribute to resilience in children and youth, and effective ways to support their overall health and well-being. This paper focuses on the voices and experiences of children and youth residing in these two disaster-affected communities in Alberta, Canada and specifically examines: 1) How children and youth’s lives are impacted by the tragedy, devastation, and upheaval of disaster; 2) Ways that children and youth demonstrate resilience when directly faced with the adversarial circumstances of disaster; and 3) The cumulative internal and external factors that contribute to bolstering and supporting resilience among children and youth post-disaster. This paper discusses the characteristics associated with high levels of resilience in 183 children and youth ages 5 to 17 based on quantitative and qualitative data obtained through a mix methods approach. Child and youth participants were administered the Children and Youth Resilience Measure (CYRM-28) in order to examine factors that influence resilience processes including: individual, caregiver, and context factors. The CYRM-28 was then supplemented with qualitative interviews with children and youth to contextualize the CYRM-28 resiliency factors and provide further insight into their overall disaster experience. Findings reveal that high levels of resilience among child and youth participants is associated with both individual factors and caregiver factors, specifically positive outlook, effective communication, peer support, and physical and psychological caregiving. Individual and caregiver factors helped mitigate the negative effects of disaster, thus bolstering resilience in children and youth. This paper discusses the implications that these findings have for understanding the specific mechanisms that support the resiliency processes and overall recovery of children and youth following disaster; the importance of bridging the gap between children and youth’s needs and the services and supports provided to them post-disaster; and the need to develop resiliency processes and practices that empower children and youth as active agents of change in their own lives following disaster. These findings contribute to furthering knowledge about pragmatic and representative changes to resources, programs, and policies surrounding disaster response, recovery, and mitigation.

Keywords: children and youth, disaster, environment, resilience

Procedia PDF Downloads 109
2582 Analysis of Users’ Behavior on Book Loan Log Based on Association Rule Mining

Authors: Kanyarat Bussaban, Kunyanuth Kularbphettong

Abstract:

This research aims to create a model for analysis of student behavior using Library resources based on data mining technique in case of Suan Sunandha Rajabhat University. The model was created under association rules, apriori algorithm. The results were found 14 rules and the rules were tested with testing data set and it showed that the ability of classify data was 79.24 percent and the MSE was 22.91. The results showed that the user’s behavior model by using association rule technique can use to manage the library resources.

Keywords: behavior, data mining technique, a priori algorithm, knowledge discovery

Procedia PDF Downloads 391
2581 Parallel 2-Opt Local Search on GPU

Authors: Wen-Bao Qiao, Jean-Charles Créput

Abstract:

To accelerate the solution for large scale traveling salesman problems (TSP), a parallel 2-opt local search algorithm with simple implementation based on Graphics Processing Unit (GPU) is presented and tested in this paper. The parallel scheme is based on technique of data decomposition by dynamically assigning multiple K processors on the integral tour to treat K edges’ 2-opt local optimization simultaneously on independent sub-tours, where K can be user-defined or have a function relationship with input size N. We implement this algorithm with doubly linked list on GPU. The implementation only requires O(N) memory. We compare this parallel 2-opt local optimization against sequential exhaustive 2-opt search along integral tour on TSP instances from TSPLIB with more than 10000 cities.

Keywords: parallel 2-opt, double links, large scale TSP, GPU

Procedia PDF Downloads 605
2580 Vibration Propagation in Body-in-White Structures Through Structural Intensity Analysis

Authors: Jamal Takhchi

Abstract:

The understanding of vibration propagation in complex structures such as automotive body in white remains a challenging issue in car design regarding NVH performances. The current analysis is limited to the low frequency range where modal concepts are dominant. Higher frequencies, between 200 and 1000 Hz, will become critical With the rise of electrification. EVs annoying sounds are mostly whines created by either Gears or e-motors between 300 Hz and 2 kHz. Structural intensity analysis was Experienced a few years ago on finite element models. The application was promising but limited by the fact that the propagating 3D intensity vector field is masked by a rotational Intensity field. This rotational field should be filtered using a differential operator. The expression of this operator in the framework of finite element modeling is not yet known. The aim of the proposed work is to implement this operator in the current dynamic solver (NASTRAN) of Stellantis and develop the Expected methodology for the mid-frequency structural analysis of electrified vehicles.

Keywords: structural intensity, NVH, body in white, irrotatational intensity

Procedia PDF Downloads 138
2579 IEEE802.15.4e Based Scheduling Mechanisms and Systems for Industrial Internet of Things

Authors: Ho-Ting Wu, Kai-Wei Ke, Bo-Yu Huang, Liang-Lin Yan, Chun-Ting Lin

Abstract:

With the advances in advanced technology, wireless sensor network (WSN) has become one of the most promising candidates to implement the wireless industrial internet of things (IIOT) architecture. However, the legacy IEEE 802.15.4 based WSN technology such as Zigbee system cannot meet the stringent QoS requirement of low powered, real-time, and highly reliable transmission imposed by the IIOT environment. Recently, the IEEE society developed IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) access mode to serve this purpose. Furthermore, the IETF 6TiSCH working group has proposed standards to integrate IEEE 802.15.4e with IPv6 protocol smoothly to form a complete protocol stack for IIOT. In this work, we develop key network technologies for IEEE 802.15.4e based wireless IIoT architecture, focusing on practical design and system implementation. We realize the OpenWSN-based wireless IIOT system. The system architecture is divided into three main parts: web server, network manager, and sensor nodes. The web server provides user interface, allowing the user to view the status of sensor nodes and instruct sensor nodes to follow commands via user-friendly browser. The network manager is responsible for the establishment, maintenance, and management of scheduling and topology information. It executes centralized scheduling algorithm, sends the scheduling table to each node, as well as manages the sensing tasks of each device. Sensor nodes complete the assigned tasks and sends the sensed data. Furthermore, to prevent scheduling error due to packet loss, a schedule inspection mechanism is implemented to verify the correctness of the schedule table. In addition, when network topology changes, the system will act to generate a new schedule table based on the changed topology for ensuring the proper operation of the system. To enhance the system performance of such system, we further propose dynamic bandwidth allocation and distributed scheduling mechanisms. The developed distributed scheduling mechanism enables each individual sensor node to build, maintain and manage the dedicated link bandwidth with its parent and children nodes based on locally observed information by exchanging the Add/Delete commands via two processes. The first process, termed as the schedule initialization process, allows each sensor node pair to identify the available idle slots to allocate the basic dedicated transmission bandwidth. The second process, termed as the schedule adjustment process, enables each sensor node pair to adjust their allocated bandwidth dynamically according to the measured traffic loading. Such technology can sufficiently satisfy the dynamic bandwidth requirement in the frequently changing environments. Last but not least, we propose a packet retransmission scheme to enhance the system performance of the centralized scheduling algorithm when the packet delivery rate (PDR) is low. We propose a multi-frame retransmission mechanism to allow every single network node to resend each packet for at least the predefined number of times. The multi frame architecture is built according to the number of layers of the network topology. Performance results via simulation reveal that such retransmission scheme is able to provide sufficient high transmission reliability while maintaining low packet transmission latency. Therefore, the QoS requirement of IIoT can be achieved.

Keywords: IEEE 802.15.4e, industrial internet of things (IIOT), scheduling mechanisms, wireless sensor networks (WSN)

Procedia PDF Downloads 143
2578 Fake news and Conspiracy Narratives in the Covid-19 Crisis: An International Comparison

Authors: Caja Thimm

Abstract:

Already well before the Corona pandemic hit the world, ‘fake news‘ were no longer regarded as harmless twists of the truth but as intentionally composed disinformation, often with the goal of manipulative populist propaganda. During the Corona crisis, particularly conspiracy narratives have become a worldwide phenomenon with dangerous consequences (anti vaccination myths). The success of these manipulated news need s to be counteracted by trustworthy news, which in Europe particularly includes public broadcasting media and their social media channels. To understand better how the main public broadcasters in Germany, the UK, and France used Instagram strategically, a comparative study was carried out. The study – comparative analysis of Instagram during the Corona Crisis In our empirical study, we compared the activities by selected formats during the Corona crisis in order to see how the public broadcasters reached their audiences and how this might, in the longer run, affect journalistic strategies on social media platforms. First analysis showed that the increase in the use of social media overall was striking. Almost one in two adult online users (48 %) obtained information about the virus in social media, and in total, 38% of the younger age group (18-24) looked for Covid19 information on Instagram, so the platform can be regarded as one of the central digital spaces for Corona related information searches. Quantitative measures showed that 47% of recent posts by the broadcasters were related to Corona, and 7% treated conspiracy myths. For the more detailed content analysis, the following categories of analysis were applied: • Digital storytelling and instastories • Textuality and semantic keys • links to information • stickers • videochat • fact checking • news ticker • service • infografics and animated tables Additionally to these basic features, we particularly looked for new formats created during the crisis. Journalistic use of social media platforms opens up immediate and creative ways of applying the media logics of the respective platforms, and particularly the BBC and ARD formats proved to be interactive, responsive, and entertaining. Among them were new formats such as a space for user questions and personal uploads, interviews, music, comedy, etc. Particularly the fact checking channel got a lot of attention, as many user questions were focused on the conspiracy theories, which dominated the public discourse during many weeks in 2020. In the presentation, we will introduce eight particular strategies that show how public broadcasting journalism can adopt digital platforms and use them creatively and, hence help to counteract against conspiracy narratives and fake news.

Keywords: fake news, social media, digital journalism, digital methods

Procedia PDF Downloads 143
2577 The New Face of TV: An Exploratory Study on the Effects of Snapchat on TV Ratings in Kuwait

Authors: Bashaiar Alsanaa

Abstract:

The advent of new forms of media has always led to a change in the way existing media deliver content. No medium has been replaced by another yet over the course of history. Whether this fact changes with the introduction of new age technology and social media remains to be seen. Snapchat may be the first application, to seriously challenge TV. It is perhaps the new face of television. The individualistic nature of Snapchat, whereby users control who, when, and in what order to watch, assesses user freedom from traditional broadcasters’ control. This study aims to fill the void in research conducted around such topic. The research explores how Snapchat maybe slowly but replacing TV. The study surveys users in Kuwait in order to present an overview of the topic. It also draws a framework through which implications and suggestions for future research may be discussed to better serve the advancement of media research.

Keywords: Kuwait, media, Snapchat, television

Procedia PDF Downloads 218
2576 Semantic Data Schema Recognition

Authors: Aïcha Ben Salem, Faouzi Boufares, Sebastiao Correia

Abstract:

The subject covered in this paper aims at assisting the user in its quality approach. The goal is to better extract, mix, interpret and reuse data. It deals with the semantic schema recognition of a data source. This enables the extraction of data semantics from all the available information, inculding the data and the metadata. Firstly, it consists of categorizing the data by assigning it to a category and possibly a sub-category, and secondly, of establishing relations between columns and possibly discovering the semantics of the manipulated data source. These links detected between columns offer a better understanding of the source and the alternatives for correcting data. This approach allows automatic detection of a large number of syntactic and semantic anomalies.

Keywords: schema recognition, semantic data profiling, meta-categorisation, semantic dependencies inter columns

Procedia PDF Downloads 404
2575 Frequency- and Content-Based Tag Cloud Font Distribution Algorithm

Authors: Ágnes Bogárdi-Mészöly, Takeshi Hashimoto, Shohei Yokoyama, Hiroshi Ishikawa

Abstract:

The spread of Web 2.0 has caused user-generated content explosion. Users can tag resources to describe and organize them. Tag clouds provide rough impression of relative importance of each tag within overall cloud in order to facilitate browsing among numerous tags and resources. The goal of our paper is to enrich visualization of tag clouds. A font distribution algorithm has been proposed to calculate a novel metric based on frequency and content, and to classify among classes from this metric based on power law distribution and percentages. The suggested algorithm has been validated and verified on the tag cloud of a real-world thesis portal.

Keywords: tag cloud, font distribution algorithm, frequency-based, content-based, power law

Procedia PDF Downloads 485
2574 Exploration of Competitive Athletes’ Superstition in Taiwan: "Miracle" and "Coincidence"

Authors: Shieh Shiow-fang

Abstract:

Superstitious thoughts or actions often occur during athletic competitions. Often "superstitious rituals" have a positive impact on the performance of competitive athletes. Athletes affirm the many psychological benefits of religious beliefs mostly in a positive way. Method: By snowball sampling, we recruited 10 experienced competitive athletes as participants. We used in-person and online one-to-one in-depth interview to collect their experiences about sport superstition. The total interview time was 795 minutes. We analyzed the raw data with the grounded theory processes suggested by Strauss and Corbin (1990). Results: The factors affecting athlete performance are ritual beliefs, taboo awareness, learning norms, and spontaneous attribution behaviors. Conclusion: We concluded that sports superstition reflects several psychological implications. The analysis results of this paper can provide another research perspective for the future study of sports superstition behavior.

Keywords: superstition, taboo awareness, learning norms, competitive athlete

Procedia PDF Downloads 62
2573 Maintaining the Tension between the Classic Seduction Theory and the Role of Unconscious Fantasies

Authors: Galit Harel

Abstract:

This article describes the long-term psychoanalytic psychotherapy of a young woman who had experienced trauma during her childhood. The details of the trauma were unknown, as all memory of the trauma had been repressed. Past trauma is analyzable through a prism of transference, dreaming and dreams, mental states, and thinking processes that offer an opportunity to explore and analyze the influence of both reality and fantasy on the patient. The presented case describes a therapeutic process that strives to discover hidden meanings through the unconscious system and illustrates the movement from unconscious to conscious during exploration of the patient’s personal trauma in treatment. The author discusses the importance of classical and contemporary psychoanalytic models of childhood sexual trauma through the discovery of manifest and latent content, unconscious fantasies, and actual events of trauma. It is suggested that the complexity of trauma is clarified by the tension between these models and by the inclusion of aspects of both of them for a complete understanding.

Keywords: dreams, psychoanalytic psychotherapy, thinking processes, transference, trauma

Procedia PDF Downloads 67
2572 The Use of Electronic Shelf Labels in the Retail Food Sector

Authors: Brent McKenzie, Victoria Taylor

Abstract:

The use of QR (Quick Response Codes) codes for customer scanning with mobile phones is a rapidly growing trend. The QR code can provide the consumer with product information, user guides, product use, competitive pricing, etc. One sector for QR use has been in retail, through the use of Electronic Shelf Labeling (henceforth, ESL). In Europe, the use of ESL for pricing has been in practice for a number of years but continues to lag in acceptance in North America. Stated concerns include costs as a key constraint, but there is also evidence that consumer acceptance represents a limitation as well. The purpose of this study is to present the findings of a consumer based study to gage the impact on their use in the retail food sector.

Keywords: electronic price labels, consumer behaviour, grocery shopping, mixed methods research

Procedia PDF Downloads 314
2571 Modeling Methodologies for Optimization and Decision Support on Coastal Transport Information System (Co.Tr.I.S.)

Authors: Vassilios Moussas, Dimos N. Pantazis, Panagioths Stratakis

Abstract:

The aim of this paper is to present the optimization methodology developed in the frame of a Coastal Transport Information System. The system will be used for the effective design of coastal transportation lines and incorporates subsystems that implement models, tools and techniques that may support the design of improved networks. The role of the optimization and decision subsystem is to provide the user with better and optimal scenarios that will best fulfill any constrains, goals or requirements posed. The complexity of the problem and the large number of parameters and objectives involved led to the adoption of an evolutionary method (Genetic Algorithms). The problem model and the subsystem structure are presented in detail, and, its support for simulation is also discussed.

Keywords: coastal transport, modeling, optimization

Procedia PDF Downloads 478
2570 Phone Number Spoofing Attack in VoLTE

Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 505
2569 Using Neural Networks for Click Prediction of Sponsored Search

Authors: Afroze Ibrahim Baqapuri, Ilya Trofimov

Abstract:

Sponsored search is a multi-billion dollar industry and makes up a major source of revenue for search engines (SE). Click-through-rate (CTR) estimation plays a crucial role for ads selection, and greatly affects the SE revenue, advertiser traffic and user experience. We propose a novel architecture of solving CTR prediction problem by combining artificial neural networks (ANN) with decision trees. First, we compare ANN with respect to other popular machine learning models being used for this task. Then we go on to combine ANN with MatrixNet (proprietary implementation of boosted trees) and evaluate the performance of the system as a whole. The results show that our approach provides a significant improvement over existing models.

Keywords: neural networks, sponsored search, web advertisement, click prediction, click-through rate

Procedia PDF Downloads 554
2568 Experimental Evaluation of UDP in Wireless LAN

Authors: Omar Imhemed Alramli

Abstract:

As Transmission Control Protocol (TCP), User Datagram Protocol (UDP) is transfer protocol in the transportation layer in Open Systems Interconnection model (OSI model) or in TCP/IP model of networks. The UDP aspects evaluation were not recognized by using the pcattcp tool on the windows operating system platform like TCP. The study has been carried out to find a tool which supports UDP aspects evolution. After the information collection about different tools, iperf tool was chosen and implemented on Cygwin tool which is installed on both Windows XP platform and also on Windows XP on virtual box machine on one computer only. Iperf is used to make experimental evaluation of UDP and to see what will happen during the sending the packets between the Host and Guest in wired and wireless networks. Many test scenarios have been done and the major UDP aspects such as jitter, packet losses, and throughput are evaluated.

Keywords: TCP, UDP, IPERF, wireless LAN

Procedia PDF Downloads 332
2567 Cricket Injury Surveillence by Mobile Application Technology on Smartphones

Authors: Najeebullah Soomro, Habib Noorbhai, Mariam Soomro, Ross Sanders

Abstract:

The demands on cricketers are increasing with more matches being played in a shorter period of time with a greater intensity. A ten year report on injury incidence for Australian elite cricketers between the 2000- 2011 seasons revealed an injury incidence rate of 17.4%.1. In the 2009–10 season, 24 % of Australian fast bowlers missed matches through injury. 1 Injury rates are even higher in junior cricketers with an injury incidence of 25% or 2.9 injuries per 100 player hours reported. 2 Traditionally, injury surveillance has relied on the use of paper based forms or complex computer software. 3,4 This makes injury reporting laborious for the staff involved. The purpose of this presentation is to describe a smartphone based mobile application as a means of improving injury surveillance in cricket. Methods: The researchers developed CricPredict mobile App for the Android platforms, the world’s most widely used smartphone platform. It uses Qt SDK (Software Development Kit) as IDE (Integrated Development Environment). C++ was used as the programming language with the Qt framework, which provides us with cross-platform abilities that will allow this app to be ported to other operating systems (iOS, Mac, Windows) in the future. The wireframes (graphic user interface) were developed using Justinmind Prototyper Pro Edition Version (Ver. 6.1.0). CricPredict enables recording of injury and training status conveniently and immediately. When an injury is reported automated follow-up questions include site of injury, nature of injury, mechanism of injury, initial treatment, referral and action taken after injury. Direct communication with the player then enables assessment of severity and diagnosis. CricPredict also allows the coach to maintain and track each player’s attendance at matches and training session. Workload data can also be recorded by either the player or coach by recording the number of balls bowled or played in a day. This is helpful in formulating injury rates and time lost due to injuries. All the data are stored at a secured password protected data server. Outcomes and Significance: Use of CricPredit offers a simple, user friendly tool for the coaching or medical staff associated with teams to predict, record and report injuries. This system will assist teams to capture injury data with ease thus allowing better understanding of injuries associated with cricket and potentially optimize the performance of such cricketers.

Keywords: injury, cricket, surveillance, smartphones, mobile

Procedia PDF Downloads 448
2566 Elements of Usability and Sociability in Activity Management System for e-Masjid

Authors: Hidayah bt Rahmalan, Marhazli Kipli, Muhammad Suffian Sikandar Ghani, Maisarah Abu, Muhammad Faisal Ashaari, Norlizam Md Sukiban

Abstract:

This study presents an example of activity management system for e-Masjid implementing elements of usability and sociability. It is expected to resolve the shortcomings of the most e-Masjid that provide lot of activities to their community. However, the data on handling a lot of activities or events in which involve a lot of people will be difficult to manipulate. Thus, this paper presents the usability and sociability element on an activity management system that not only eases the job for the user but being practical for future when the community join any events. For the time being, this activity management system was only applied for Sayyidina Abu Bakar Mosque in Utem, Malacca.

Keywords: e-masjid, usability, sociability, activity management system

Procedia PDF Downloads 347
2565 The Application of Hellomac Rockfall Alert System in Rockfall Barriers: An Explainer

Authors: Kinjal Parmar, Matteo Lelli

Abstract:

The usage of IoT technology as a rockfall alert system is relatively new. This paper explains the potential of such an alert system called HelloMac from Maccaferri which provides transportation infrastructure asset owners the way to effectively utilize their resources in the detection of boulder impacts on rockfall barriers. This would ensure a faster assessment of the impacted barrier and subsequently facilitates the implementation of remedial works in an effective and timely manner. In addition, the HelloMac can also be integrated with another warning system to alert vehicle users of the unseen dangers ahead. HelloMac is developed to work also in remote areas, where cell coverage is not available. User gets notified when a rockfall even occurs via mobile app, SMS and email. Using such alarming systems effectively, we can reduce the risk of rockfall hazard.

Keywords: rockfall, barrier, HelloMac, rockfall alert system

Procedia PDF Downloads 35
2564 Computer Simulation Studies of Aircraft Wing Architectures on Vibration Responses

Authors: Shengyong Zhang, Mike Mikulich

Abstract:

Vibration is a crucial limiting consideration in the analysis and design of airplane wing structures to avoid disastrous failures due to the propagation of existing cracks in the material. In this paper, we build CAD models of aircraft wings to capture the design intent with configurations. Subsequent FEA vibration analysis is performed to study the natural vibration properties and impulsive responses of the resulting user-defined wing models. This study reveals the variations of the wing’s vibration characteristics with respect to changes in its structural configurations. Integrating CAD modelling and FEA vibration analysis enables designers to improve wing architectures for implementing design requirements in the preliminary design stage.

Keywords: aircraft wing, CAD modelling, FEA, vibration analysis

Procedia PDF Downloads 143
2563 Activity Data Analysis for Status Classification Using Fitness Trackers

Authors: Rock-Hyun Choi, Won-Seok Kang, Chang-Sik Son

Abstract:

Physical activity is important for healthy living. Recently wearable devices which motivate physical activity are quickly developing, and become cheaper and more comfortable. In particular, fitness trackers provide a variety of information and need to provide well-analyzed, and user-friendly results. In this study, frequency analysis was performed to classify various data sets of Fitbit into simple activity status. The data from Fitbit cloud server consists of 263 subjects who were healthy factory and office workers in Korea from March 7th to April 30th, 2016. In the results, we found assumptions of activity state classification seem to be sufficient and reasonable.

Keywords: activity status, fitness tracker, heart rate, steps

Procedia PDF Downloads 364
2562 The Qualitative Methodology Exposure and Experiences of Journal Reviewers: A Qualitative Exploration

Authors: Salomé Elizabeth Scholtz

Abstract:

Reviewers are the gatekeepers of knowledge dissemination and promote the scientific validity of the research. However, the literature indicates that authors often receive questionable feedback on qualitative manuscripts. Thus, this qualitative descriptive study sought to explore the qualitative knowledge and experiences of reviewers of psychology journals. A purposive and snowball sample (n=27) of psychology journal reviewers completed an online questionnaire, and data were analyzed using thematic analysis. Reviewers felt their postgraduate education, reading, and the process of reviewing qualitative articles equipped them to review qualitative manuscripts. Less than half of the reviewer’s published articles were qualitative and male reviewers published more than females. Despite not expecting authors to have the same level of research skills, reviewers still experienced authors as unskilled and biased, creating difficulty in accepting and reviewing qualitative articles. The applicability of the qualitative method and recommendations in preparing qualitative manuscripts for reviewing are reported.

Keywords: journal reviewers, psychology, qualitative research, research method, research skills

Procedia PDF Downloads 69
2561 'You Block Yourself from the Emotion': A Qualitative Inquiry into Teacher's Use of Discordant Emotional Labor Strategies in Student Aggression

Authors: Michal Levy

Abstract:

Despite the emotional impact students' misbehavior and aggression has on teacher's emotional wellbeing, teachers frequently use suppressive strategies in the classroom, which maintain a discordance between felt and expressed emotions. The current study sought to gain a deeper insight into teachers' utilization of discordant emotional labor strategies (i.e., expressive suppression, surface acting and emotional dissonance) and their motives to using these strategies in student aggression. A qualitative study was conducted on 16 special education Jewish Israeli teachers. Thematic analysis of the in-depth semi-structured interviews revealed novice teachers were inclined to use expressive suppression, while experienced teachers used emotional dissonance. The teacher's motives for using discordant emotional labor strategies included both instrumental and hedonic goals. Implications for policymakers and professionals in practice are discussed to improve teachers' emotional wellbeing.

Keywords: discordant strategies, emotional labor, student aggression, teachers

Procedia PDF Downloads 224
2560 Evaluating the Impact of Early Maternal Incarceration on Male Delinquent Behavior during Emerging Adulthood through the Mediating Mechanism of Mastery

Authors: Richard Abel

Abstract:

In the United States, increased incarceration rates have caused many adolescents to feel the strain of parental absence. This absence is then manifest through adolescent feelings of parental rejection. Additionally, upon reentry maternal incarceration may be related to adolescents experienced perceived excessive disciple. It is possible parents engage in this manner of discipline attempting to prevent the child from taking the same path to incarceration as the parent. According to General Strain Theory, adolescents encountering strain are likely to experience negative emotions. The emotion that is most likely to lead to delinquency is anger through reduced inhibitions and motivation to act. Additionally, males are more likely to engage in delinquent behavior, regardless of experiencing strain. This is not the case for every male who experiences maternal incarceration, parental rejection, excessive discipline, or anger. There are protective factors that enable agency within individuals. One such protective factor is mastery, or the perception that one is in control of his or her own future. The model proposed in this research suggests maternal incarceration is associated with increased parental rejection and excessive discipline in males. Males experiencing parental rejection and excessive discipline are likely to experience increased anger, which is then associated with increases in delinquent behavior. This model explores whether agency, in the form of mastery, mediates the relationship between strains and negative emotions, or between negative emotions and delinquent behavior. The Kaplan Longitudinal and Multigenerational Study (KLAMS) dataset is uniquely situated to analyze this model providing longitudinal data collected from both parents and their offspring. Maternal incarceration is constructed using parental responses such that the mother was incarcerated after the child’s birth, and any incarceration that happened prior to birth is excluded. The remaining variables of the study are all constructed from varying waves of the adolescent survey. Parental rejection, along with control variables for age, race, parental socioeconomic status, neighborhood effects, delinquent peers, and prior delinquent behavior are all constructed using Wave I data. To increase causal inference, the negative emotion of anger and the mediating variable of mastery are measured during Wave II. Lastly, delinquent behavior is measured at Wave III. Results of the analysis show expected relationships such that adolescent males encountering maternal incarceration show increased perception of parental rejection and excessive discipline. Additionally, there is a positive relationship between parental rejection and excessive discipline at Wave I and feelings of anger at Wave II for males. For males experiencing either of these strains in Wave I, feelings of anger in Wave II are found to be associated with increased delinquent behavior in Wave III. Mastery was found to mediate the relationship between both parental rejection and excessive discipline and anger, but no such mediation occurs in the relationship between anger and delinquency, regardless of the strain being experienced. These findings suggest adolescent males who feel they are in control of their own lives are less likely to experience negative emotions produced by the occurrence of strain, thereby decreasing male engagement in delinquent behavior later in life.

Keywords: delinquency, mastery, maternal incarceration, strain

Procedia PDF Downloads 116
2559 Application of Deep Eutectic Solvent in the Extraction of Ferulic Acid from Palm Pressed Fibre

Authors: Ng Mei Han, Nu'man Abdul Hadi

Abstract:

Extraction of ferulic acid from palm pressed fiber using deep eutectic solvent (DES) of choline chloride-acetic acid (ChCl-AA) and choline chloride-citric acid (ChCl-CA) are reported. Influence of water content in DES on the extraction efficiency was investigated. ChCl-AA and ChCl-CA experienced a drop in viscosity from 9.678 to 1.429 and 22.658 ± 1.655 mm2/s, respectively as the water content in the DES increased from 0 to 50 wt% which contributed to higher extraction efficiency for the ferulic acid. Between 41,155 ± 940 mg/kg ferulic acid was obtained after 6 h reflux when ChCl-AA with 30 wt% water was used for the extraction compared to 30,940 ± 621 mg/kg when neat ChCl-AA was used. Although viscosity of the DES could be improved with the addition of water, there is a threshold where the DES could tolerate the presence of water without changing its solvent behavior. The optimum condition for extraction of ferulic acid from palm pressed fiber was heating for 6 h with DES containing 30 wt% water.

Keywords: deep eutectic solvent, extraction, ferulic acid, palm fibre

Procedia PDF Downloads 68
2558 Social Data Aggregator and Locator of Knowledge (STALK)

Authors: Rashmi Raghunandan, Sanjana Shankar, Rakshitha K. Bhat

Abstract:

Social media contributes a vast amount of data and information about individuals to the internet. This project will greatly reduce the need for unnecessary manual analysis of large and diverse social media profiles by filtering out and combining the useful information from various social media profiles, eliminating irrelevant data. It differs from the existing social media aggregators in that it does not provide a consolidated view of various profiles. Instead, it provides consolidated INFORMATION derived from the subject’s posts and other activities. It also allows analysis over multiple profiles and analytics based on several profiles. We strive to provide a query system to provide a natural language answer to questions when a user does not wish to go through the entire profile. The information provided can be filtered according to the different use cases it is used for.

Keywords: social network, analysis, Facebook, Linkedin, git, big data

Procedia PDF Downloads 424
2557 Choral Singers' Preference for Expressive Priming Techniques

Authors: Shawn Michael Condon

Abstract:

Current research on teaching expressivity mainly involves instrumentalists. This study focuses on choral singers’ preference of priming techniques based on four methods for teaching expressivity. 112 choral singers answered the survey about their preferred methods for priming expressivity (vocal modelling, using metaphor, tapping into felt emotions, and drawing on past experiences) in three conditions (active, passive, and instructor). Analysis revealed higher preference for drawing on past experience among more experienced singers. The most preferred technique in the passive and instructor roles was vocal modelling, with metaphors and tapping into felt emotions favoured in an active role. Priming techniques are often used in combination with other methods to enhance singing technique or expressivity and are dependent upon the situation, repertoire, and the preferences of the instructor and performer.

Keywords: emotion, expressivity, performance, singing, teaching

Procedia PDF Downloads 140