Search results for: broadcast messaging
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 164

Search results for: broadcast messaging

74 The Effectiveness of Anti-Smoking Campaign towards Young Adults (A Case Study in Bandar Sunway Institution)

Authors: Intan Abida Abu Bakar

Abstract:

This paper investigates the effectiveness of anti-smoking campaign towards youth in Bandar Sunway institution. Based from the Ministry of Health, Malaysia and the national newspapers in the country reveal that the campaigns were not effective enough to curb smoking in Malaysia. In the past, from the year 2004 to 2014, the Malaysian Health Ministry were determined to curb the smoking issue that were arising in the country especially among the youths. “Tak Nak” smoking campaign was launched and broadcast on all forms of media in Malaysia. The campaigns are to educate and create an awareness to encourage people to quit smoking besides discourage non-smokers from starting to smoke. The main objective of this research is to investigate and study the concept, storyline and appeal of ‘Tak Nak Merokok’ advertisement campaigns from 2004 to 2014. Data from questionnaires and focus group discussions indicate that the advertisement contained fear and emotional appeal with good concept and storyline are more appealing and effective compared to the humour and informational rational appeal. This research could be a guideline for advertisers who want to come up with creative anti-smoking campaigns in Malaysia. In the future, the focus group can be expanded and more feedbacks and reviews could contribute to marketers and advertisers to determine the most suitable advertisements to tackle this smoking issue.

Keywords: effectiveness, anti-smoking campaign, young adults, smoking

Procedia PDF Downloads 228
73 A Proposal for a Secure and Interoperable Data Framework for Energy Digitalization

Authors: Hebberly Ahatlan

Abstract:

The process of digitizing energy systems involves transforming traditional energy infrastructure into interconnected, data-driven systems that enhance efficiency, sustainability, and responsiveness. As smart grids become increasingly integral to the efficient distribution and management of electricity from both fossil and renewable energy sources, the energy industry faces strategic challenges associated with digitalization and interoperability — particularly in the context of modern energy business models, such as virtual power plants (VPPs). The critical challenge in modern smart grids is to seamlessly integrate diverse technologies and systems, including virtualization, grid computing and service-oriented architecture (SOA), across the entire energy ecosystem. Achieving this requires addressing issues like semantic interoperability, IT/OT convergence, and digital asset scalability, all while ensuring security and risk management. This paper proposes a four-layer digitalization framework to tackle these challenges, encompassing persistent data protection, trusted key management, secure messaging, and authentication of IoT resources. Data assets generated through this framework enable AI systems to derive insights for improving smart grid operations, security, and revenue generation. Furthermore, this paper also proposes a Trusted Energy Interoperability Alliance as a universal guiding standard in the development of this digitalization framework to support more dynamic and interoperable energy markets.

Keywords: digitalization, IT/OT convergence, semantic interoperability, VPP, energy blockchain

Procedia PDF Downloads 144
72 Charting Sentiments with Naive Bayes and Logistic Regression

Authors: Jummalla Aashrith, N. L. Shiva Sai, K. Bhavya Sri

Abstract:

The swift progress of web technology has not only amassed a vast reservoir of internet data but also triggered a substantial surge in data generation. The internet has metamorphosed into one of the dynamic hubs for online education, idea dissemination, as well as opinion-sharing. Notably, the widely utilized social networking platform Twitter is experiencing considerable expansion, providing users with the ability to share viewpoints, participate in discussions spanning diverse communities, and broadcast messages on a global scale. The upswing in online engagement has sparked a significant curiosity in subjective analysis, particularly when it comes to Twitter data. This research is committed to delving into sentiment analysis, focusing specifically on the realm of Twitter. It aims to offer valuable insights into deciphering information within tweets, where opinions manifest in a highly unstructured and diverse manner, spanning a spectrum from positivity to negativity, occasionally punctuated by neutrality expressions. Within this document, we offer a comprehensive exploration and comparative assessment of modern approaches to opinion mining. Employing a range of machine learning algorithms such as Naive Bayes and Logistic Regression, our investigation plunges into the domain of Twitter data streams. We delve into overarching challenges and applications inherent in the realm of subjectivity analysis over Twitter.

Keywords: machine learning, sentiment analysis, visualisation, python

Procedia PDF Downloads 28
71 Improving Topic Quality of Scripts by Using Scene Similarity Based Word Co-Occurrence

Authors: Yunseok Noh, Chang-Uk Kwak, Sun-Joong Kim, Seong-Bae Park

Abstract:

Scripts are one of the basic text resources to understand broadcasting contents. Since broadcast media wields lots of influence over the public, tools for understanding broadcasting contents are more required. Topic modeling is the method to get the summary of the broadcasting contents from its scripts. Generally, scripts represent contents descriptively with directions and speeches. Scripts also provide scene segments that can be seen as semantic units. Therefore, a script can be topic modeled by treating a scene segment as a document. Because scripts consist of speeches mainly, however, relatively small co-occurrences among words in the scene segments are observed. This causes inevitably the bad quality of topics based on statistical learning method. To tackle this problem, we propose a method of learning with additional word co-occurrence information obtained using scene similarities. The main idea of improving topic quality is that the information that two or more texts are topically related can be useful to learn high quality of topics. In addition, by using high quality of topics, we can get information more accurate whether two texts are related or not. In this paper, we regard two scene segments are related if their topical similarity is high enough. We also consider that words are co-occurred if they are in topically related scene segments together. In the experiments, we showed the proposed method generates a higher quality of topics from Korean drama scripts than the baselines.

Keywords: broadcasting contents, scripts, text similarity, topic model

Procedia PDF Downloads 293
70 Ideological Framing in Television News: The Case of “Settlement Process”

Authors: Mete Kazaz, Birol Gülnar

Abstract:

Television news has gained a new dimension in terms of ideological approaches as a result of such factors as globalization, cross monopolization, presence of international companies etc. and certain strategies have been developed at the production, presentation and distribution stages of news. In this study, television news about a process called “settlement process” was investigated. In this framework, news about the settlement process on TV channels of TRT 1, ATV, FOX TV, NTV, HABERTÜRK, TRT HABER and STV was investigated using the content analysis method in terms of the strategies the ideology construction, attitude towards the party in power, attitude towards parties in opposition and attitude towards BDP (Peace and Democracy Part) and Imrali (the island where Abdullah Ocalan, head of PKK, is kept). First, the aforementioned TV channels were selected randomly from 3 groups in order to be able to reveal the representational capacity of commercial, news and public channels. The study covers 557 news items broadcast in the main news bulletins between the dates of 15 March 2013 and 15 March 2013. While there was a positive attitude towards the government in a sizable portion of the news about the settlement process (63.6%), the attitude of 25.3% of the news was impartial towards the government and 11.3% had a negative attitude. On the other hand, there was a negative attitude towards the Opposition in a considerable portion of the news about the settlement process (56.1%). The attitude of 35.9% of the news towards the Opposition was impartial whereas 8.0% had a positive attitude. While 34.9% of the news about the settlement process used the legitimization strategy from among the ideology construction strategies, 22.8% used the unification strategy, 15.7% the reification strategy, 15.6% fractional and 11% concealment/mystification strategy.

Keywords: attitude, ideological framing, television news, social sciences

Procedia PDF Downloads 326
69 Political Behavior and Democratic Values: Framing Analysis of Political Discussion Programs in Pakistan

Authors: Umair Nadeem, Sidra Umair

Abstract:

Political behavior of voters and democratic values have been observed an emerging phenomenon in recent years in Pakistan. Privatized TV news channels are taking one sided position on the political issues, corresponding with respective political parties. Since last decade, TV News Channels have undermined this monopoly. Elections 2013 were unique in Pakistan with reference to political behavior and democratic values. Partisan narratives and counter narratives have been witnessed on different TV channels, in last few years. These mediated events seem very important to study the political behavior and democratic values as the country is approaching towards elections 2018. This endeavor is an attempt to capture the framing of the parties, issues in the partisan media culture and framing effects on political behavior of voters. Data for this research come from two data set. Content analysis of selected representative talks shows broadcast on mainstream news channels provide an assessment of the framing while quantitative survey of the discussion program’s viewers from Lahore city provide an evidence of framing effects on political behavior on voters and on democratic values. Regression results help us to argue that the highly partisan shows are strong predictors of polarized views among the audience. Study also grasp the attention of scholars towards the implications of this phenomenon.

Keywords: democratic values, partisan media, polarized views, political behavior

Procedia PDF Downloads 155
68 The Influence of Mobile Phone Addiction on Academic Performance among Teenagers in Shah Alam, Malaysia

Authors: Jamaluddin Abd Rashid, Aris Abdul Rahman

Abstract:

Mobile phones have become the most popular way to communicate with other individuals and it has created an unspoken social dependency. Making phone calls, instant messaging, playing online games and accessing the Internet are among the features added to a mobile phone, attracting teenagers to spend more hours fixated on their gadgets. As such, this study attempted to examine the frequency of time spent on mobile phones and how this influenced academic performance. A quantitative methodology was applied in this study, where face to face survey through the distribution of questionnaires was facilitated onto a group of 200 secondary school students from the Shah Alam community in Selangor,Malaysia. Both genders, male and females were assessed equally to find out if there exists a correlation between genders when measuring higher or lower frequency of attachment to mobile phones. It can also be seen that 100% correspondents have a mobile phone in their possession. The adolescents uses mobile phones daily, which shows students being somewhat addicted, as they tend to feel that it is necessary to use a mobile phone. The main findings of this research found out that, students that are mobile phone addictive received a lower grade in schools. Mobile phone addiction does affect academic performance negatively. As this study discusses the modern-day phenomenon, it is hoped that the findings and discussion could add to present literary works and help future researchers understand the relationship between mobile phone addiction and academic performance.

Keywords: academic performance, mobile phone addiction, social media, student

Procedia PDF Downloads 318
67 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities

Authors: Nazli Hardy

Abstract:

Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.

Keywords: Internet of Things (IoT), authentication, protocols, survey

Procedia PDF Downloads 277
66 Perceiving Interpersonal Conflict and the Big Five Personality Traits

Authors: Emily Rivera, Toni DiDona

Abstract:

The Big Five personality traits is a hierarchical classification of personality traits that applies factor analysis to a personality survey data in order to describe human personality using five broad dimensions: Extraversion, Agreeableness, Conscientiousness, Neuroticism, and Openness (Fetvadjiev & Van de Vijer, 2015). Research shows that personality constructs underline individual differences in processing conflict and interpersonal relations. (Graziano et al., 1996). This research explores the understudied correlation between the Big Five personality traits and perceived interpersonal conflict in the workplace. It revises social psychological literature on Big Five personality traits within a social context and discusses organizational development journal articles on the perceived efficacy of conflict tactics and approach to interpersonal relationships. The study also presents research undertaken on a survey group of 867 subjects over the age of 18 that were recruited by means of convenience sampling through social media, email, and text messaging. The central finding of this study is that only two of the Big Five personality traits had a significant correlation with perceiving interpersonal conflict in the workplace. Individuals who score higher on agreeableness and neuroticism, perceive more interpersonal conflict in the workplace compared to those that score lower on each dimension. The relationship between both constructs is worthy of research due to its everyday frequency and unique individual psycho-social consequences. This multimethod research associated the Big Five personality dimensions to interpersonal conflict. Its findings that can be utilized to further understand social cognition, person perception, complex social behavior and social relationships in the work environment.

Keywords: five-factor model, interpersonal conflict, personality, The Big Five personality traits

Procedia PDF Downloads 135
65 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 637
64 Smartphones as a Tool of Mobile Journalism in Saudi Arabia

Authors: Ahmed Deen

Abstract:

The introduction of the mobile devices which were equipped with internet access and a camera, as well as the messaging services, has become a major inspiration for the use of the mobile devices in the growth in the reporting of news. Mobile journalism (MOJO) was a creation of modern technology, especially the use of mobile technology for video journalism purposes. MOJO, thus, is the process by which information is collected and disseminated to society, through the use of mobile technology, and even the use of the tablets. This paper seeks to better understand the ethics of Saudi mobile journalists towards news coverage. Also, this study aims to explore the relationship between minimizing harms and truth-seeking efforts among Saudi mobile journalists. Three main ethics were targeted in this study, which are seek truth and report it, minimize harm, and being accountable. Diffusion of innovation theory applied to reach this study’s goals. The non- probability sampling approach, ‘Snowball Sampling’ was used to target 124 survey participants, an online survey via SurveyMonkey that was distributed through social media platforms as a web link. The code of ethics of the Society of Professional Journalists has applied as a scale in this study. This study found that the relationship between minimizing harm and truth-seeking efforts is significantly moderate among Saudi mobile journalists. Also, it is found that the level journalistic experiences and using smartphones to cover news are weakly and negatively related to the perceptions of mobile journalism among Saudi journalists, while Saudi journalists who use their smartphone to cover the news between 1-3 years, were the majority of participants (55 participants by 51.4%).

Keywords: mobile journalism, Saudi journalism, smartphone, Saudi Arabia

Procedia PDF Downloads 145
63 Student Attribute and the Effectiveness of Classroom Response System in Teaching Economics

Authors: Raymond Li

Abstract:

In this project a web-based classroom response system (CRS) was used in the teaching an intermediate level economics course. This system allows the instructor to post a question on the screen and students to answer questions using their own electronic mobile devices. The questions and the results summarizing student responses can be shown to students simultaneously and the instructor can make timely feedback to students in class. CRS gives students a chance to respond to the instructor’s question privately, encouraging students who might not typically speak up in class to express their thoughts and opinions. There is a vast literature on the advantages and challenges of using CRS. However, empirical evidence on the student attributes that increase the effectiveness of CRS in improving student learning outcomes is sparse. The purpose of this project is to (1) find out if the use of CRS is beneficial to students taking economics, and (2) discover key student attributes that will likely make CRS more effective. Students’ performance in examinations and an end-of-semester questionnaire were used to assess the effectiveness of CRS in this project. Comparing the examination scores of the CRS treatment group and control group, the treatment group performed considerably better and statistically significant differences were found basing on paired t-tests on the differences. According to the questionnaire results, around 75% of the students in the treatment group generally agreed that CRS allowed them to express their views more freely. We also observed that students who prefer to use instant messaging rather than making conversations are generally more positive towards CRS. The use of CRS also benefits the instructor – students’ rating of the instructor in the teaching evaluation was significantly higher for the CRS treatment group.

Keywords: education technology, classroom response system, student attributes, economics education

Procedia PDF Downloads 107
62 Space Time Adaptive Algorithm in Bi-Static Passive Radar Systems for Clutter Mitigation

Authors: D. Venu, N. V. Koteswara Rao

Abstract:

Space – time adaptive processing (STAP) is an effective tool for detecting a moving target in spaceborne or airborne radar systems. Since airborne passive radar systems utilize broadcast, navigation and excellent communication signals to perform various surveillance tasks and also has attracted significant interest from the distinct past, therefore the need of the hour is to have cost effective systems as compared to conventional active radar systems. Moreover, requirements of small number of secondary samples for effective clutter suppression in bi-static passive radar offer abundant illuminator resources for passive surveillance radar systems. This paper presents a framework for incorporating knowledge sources directly in the space-time beam former of airborne adaptive radars. STAP algorithm for clutter mitigation for passive bi-static radar has better quantitation of the reduction in sample size thereby amalgamating the earlier data bank with existing radar data sets. Also, we proposed a novel method to estimate the clutter matrix and perform STAP for efficient clutter suppression based on small sample size. Furthermore, the effectiveness of the proposed algorithm is verified using MATLAB simulations in order to validate STAP algorithm for passive bi-static radar. In conclusion, this study highlights the importance for various applications which augments traditional active radars using cost-effective measures.

Keywords: bistatic radar, clutter, covariance matrix passive radar, STAP

Procedia PDF Downloads 277
61 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment

Authors: Wen Shyong Hsieh, Chih Hsueh Lin

Abstract:

In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.

Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication

Procedia PDF Downloads 365
60 Communicative Values of Yoruba Traditional Music on Adulthood Socialisation between the Late 20th and Early 21st Centuries

Authors: Odukunle Adebayo Atewolara-Odule

Abstract:

Music is an electronic medium and an integral content of the broadcast media, which has communicative values even in the process of entertaining listeners. The communicative values of music could have implications on what adults learn about culture and society. This study aimed at examining the communicative values of Yoruba traditional music and adulthood socialisation by comparing the situation of the late 20th with early 21st centuries. From the population of literate adults of between the ages of 30 years and 65 years in Ijebu North Local Government area of Ogun state, a sample of 200 respondents was drawn into the study through the stratified technique. A descriptive survey was conducted on the sample with the use of a structured questionnaire as the research instrument. Findings showed a significant relationship between what adults learned about the society and its culture from this category of music (p=0.000<0.05) but there was a higher significant relationship between Yoruba traditional music and adulthood socialisation in the late 20th than in early 21st centuries. Results also showed a significant communicative influence of Yoruba traditional music of the late 20th and early 21st centuries on adulthood socialisation (p=0.000<0.05). Respondents’ demographic characteristics were observed to play significant intervening roles on the communicative influence of Yoruba traditional music on socialisation among the adults between the late 20th and early 21st centuries (p=0.000<0.05). The study recommends that stakeholders should take cognisance of the lyrical contents of Yoruba traditional music due to its implications to inculcate values into people and shape their behaviour.

Keywords: adulthood socialisation, communicative values, traditional music, Voruba

Procedia PDF Downloads 150
59 Design and Radio Frequency Characterization of Radial Reentrant Narrow Gap Cavity for the Inductive Output Tube

Authors: Meenu Kaushik, Ayon K. Bandhoyadhayay, Lalit M. Joshi

Abstract:

Inductive output tubes (IOTs) are widely used as microwave power amplifiers for broadcast and scientific applications. It is capable of amplifying radio frequency (RF) power with very good efficiency. Its compactness, reliability, high efficiency, high linearity and low operating cost make this device suitable for various applications. The device consists of an integrated structure of electron gun and RF cavity, collector and focusing structure. The working principle of IOT is a combination of triode and klystron. The cathode lies in the electron gun produces a stream of electrons. A control grid is placed in close proximity to the cathode. Basically, the input part of IOT is the integrated structure of gridded electron gun which acts as an input cavity thereby providing the interaction gap where the input RF signal is applied to make it interact with the produced electron beam for supporting the amplification phenomena. The paper presents the design, fabrication and testing of a radial re-entrant cavity for implementing in the input structure of IOT at 350 MHz operating frequency. The model’s suitability has been discussed and a generalized mathematical relation has been introduced for getting the proper transverse magnetic (TM) resonating mode in the radial narrow gap RF cavities. The structural modeling has been carried out in CST and SUPERFISH codes. The cavity is fabricated with the Aluminum material and the RF characterization is done using vector network analyzer (VNA) and the results are presented for the resonant frequency peaks obtained in VNA.

Keywords: inductive output tubes, IOT, radial cavity, coaxial cavity, particle accelerators

Procedia PDF Downloads 93
58 Query Task Modulator: A Computerized Experimentation System to Study Media-Multitasking Behavior

Authors: Premjit K. Sanjram, Gagan Jakhotiya, Apoorv Goyal, Shanu Shukla

Abstract:

In psychological research, laboratory experiments often face the trade-off issue between experimental control and mundane realism. With the advent of Immersive Virtual Environment Technology (IVET), this issue seems to be at bay. However there is a growing challenge within the IVET itself to design and develop system or software that captures the psychological phenomenon of everyday lives. One such phenomena that is of growing interest is ‘media-multitasking’ To aid laboratory researches in media-multitasking this paper introduces Query Task Modulator (QTM), a computerized experimentation system to study media-multitasking behavior in a controlled laboratory environment. The system provides a computerized platform in conducting an experiment for experimenters to study media-multitasking in which participants will be involved in a query task. The system has Instant Messaging, E-mail, and Voice Call features. The answers to queries are provided on the left hand side information panel where participants have to search for it and feed the information in the respective communication media blocks as fast as possible. On the whole the system will collect multitasking behavioral data. To analyze performance there is a separate output table that records the reaction times and responses of the participants individually. Information panel and all the media blocks will appear on a single window in order to ensure multi-modality feature in media-multitasking and equal emphasis on all the tasks (thus avoiding prioritization to a particular task). The paper discusses the development of QTM in the light of current techniques of studying media-multitasking.

Keywords: experimentation system, human performance, media-multitasking, query-task

Procedia PDF Downloads 534
57 Gender Analysis of the Influence of Sources of Information on the Adoption of Tenera Oil Palm Technology among Smallholder Farmers in Edo State, Nigeria

Authors: Cornelius Michael Ekenta

Abstract:

The research made a gender comparative analysis of the influence of sources of information on the adoption of tenera improved oil palm technology. Purposive, stratified and random sampling techniques were used to sample a total of 292 farmers (155 males and 137 females) for the study. Structured questionnaire was used to obtain primary data used for analysis. Obtained data were analyzed with descriptive statistics and Logit regressions analysis. Findings revealed that radio, extension office, television and farmers’ group were the most preferred sources of information by the farmers both male and female. Also, males perceived information from radio (92%) and farmers’ group (84%) to be available and information from Research Institutes as credible (95%). Similarly, the female perceived information from Research Institutes to be reliable (70%). The study showed that 38% of men adopted the variety, 25% of the women adopted the variety while 32% of both men and women adopted the variety in the study area. Regressions analysis indicated that radio, extension office, television, farmers’ group and research institute were significant at 0.5% of probability for men and female farmers. The study concluded that the adoption of tenera improved oil palm technology was low among male and female farmers though men adopted more than the women. It was recommended therefore that Agricultural Development Programme (ADP) in other states of the country should partner with their state radio and television stations to broadcast agricultural programmes periodically to ensure efficient dissemination of agricultural information to the farmers.

Keywords: analysis, Edo, gender, influence, information, sources, tenera

Procedia PDF Downloads 80
56 Voting Representation in Social Networks Using Rough Set Techniques

Authors: Yasser F. Hassan

Abstract:

Social networking involves use of an online platform or website that enables people to communicate, usually for a social purpose, through a variety of services, most of which are web-based and offer opportunities for people to interact over the internet, e.g. via e-mail and ‘instant messaging’, by analyzing the voting behavior and ratings of judges in a popular comments in social networks. While most of the party literature omits the electorate, this paper presents a model where elites and parties are emergent consequences of the behavior and preferences of voters. The research in artificial intelligence and psychology has provided powerful illustrations of the way in which the emergence of intelligent behavior depends on the development of representational structure. As opposed to the classical voting system (one person – one decision – one vote) a new voting system is designed where agents with opposed preferences are endowed with a given number of votes to freely distribute them among some issues. The paper uses ideas from machine learning, artificial intelligence and soft computing to provide a model of the development of voting system response in a simulated agent. The modeled development process involves (simulated) processes of evolution, learning and representation development. The main value of the model is that it provides an illustration of how simple learning processes may lead to the formation of structure. We employ agent-based computer simulation to demonstrate the formation and interaction of coalitions that arise from individual voter preferences. We are interested in coordinating the local behavior of individual agents to provide an appropriate system-level behavior.

Keywords: voting system, rough sets, multi-agent, social networks, emergence, power indices

Procedia PDF Downloads 374
55 Dynamics of Parent to Adolescent Communication on Sexual and Reproductive Health in Sub-Saharan Africa: A Focus on Barriers and Policy Implications

Authors: Douglas Nyathi, Mxolisi Sibanda, Joram Ndlovuu, Thulani Dube, Innocent T. Mahiya

Abstract:

Communication of sexual matters between the parents and adolescents has been seen as one of the strategies that could play a cardinal role in encouraging adolescents to be responsible and delay sexual debut or avoid unprotected sexual intercourse. The increasing rate of teenage pregnancies and new HIV/AIDS infections among adolescents in Sub-Saharan Africa makes the phenomenon worth analysis. The purpose of this paper is to interrogate the dynamics of parent-adolescent communication on sexual and reproductive health in Sub-Sahara. Specifically the paper focuses on barriers to communication between parents and adolescents on sexual and reproductive health and its policy implications. It emanates from the paper that communication on sexual and reproductive health at household level is triggered by death of a relative from a sexual related illness, suspicion on sexual activity, radio programmes and in some instances fliers. Literature engagement reveals that communication between parents and adolescents on sexual and reproductive health is made difficult by economic factors (poverty, lack of privacy and low self-esteem), household demographics (age, sex, class, death), socio-cultural factors (beliefs and religious values) as well as social media. We argue that there is need to use broadcast mediato come up with radio and television programmes that create family environments in which sexual and reproductive health issues are discussed. We also recommend that government departments and Non-Governmental Organisations concerned with sexuality issues need to undertake studies that can help dismantle taboos, prejudices and stereotypes that impede sexual and reproductive health communication between parents and adolescents.

Keywords: parent, adolecsent, communication, sexual and reproductive health

Procedia PDF Downloads 433
54 Comprehensive Evaluation of Oral and Maxillofacial Radiology in "COVID-19"

Authors: Sahar Heidary, Ramin Ghasemi Shayan

Abstract:

The recent coronavirus disease 2019 (COVID-19) occurrence has carried considerabletrials to the world health system, comprising the training of dental and maxillofacial radiology (DMFR). DMFR will keep avital role in healthcare throughout this disaster. Severe acute breathing disease coronavirus 2 (SARS-CoV-2), the virus producing the current coronavirus disease 2019 (COVID-19) pandemic, is not only extremely contagious but can make solemn consequences in susceptible persons comprising dental patients and dental health care personnel (DHCPs). Reactions to COVID-19 have been available by the Cores for Infection Switch and Inhibition and the American Dental Association, but a more detailed answer is necessary for the harmless preparation of oral and maxillofacial radiology. Our goal is to evaluation the existing information just how the illness threatens patients and DHCPs and how to define which patients are possible to be SARS-CoV-2 infected; study how the usage of private shielding utensils and contamination control measures based on recent top observes, and knowledge can decrease the danger of virus spread in radiologic trials; and scrutinize how intraoral radiography, with its actually superior danger of scattering the infection, might be changed by extraoralradiographic methods for definite diagnostic jobs. In the pandemic, teleradiology has been extensively recycled for diagnostic determinations of COVID-19 patients, for discussions with radiologists in crisis cases, or managing of distance among radiology clinics. Dentists can have the digital radiographic images of their emergency patients through online service area also by electronic message or messaging applications to view in their smart phones, laptops, or other electronic devices.

Keywords: radiology, dental, oral, COVID-19, infection

Procedia PDF Downloads 152
53 Mobi Navi Tour for Rescue Operations

Authors: V. R. Sadasivam, M. Vipin, P. Vineeth, M. Sajith, G. Sathiskumar, R. Manikandan, N. Vijayarangan

Abstract:

Global positioning system technology is what leads to such things as navigation systems, GPS tracking devices, GPS surveying and GPS mapping. All that GPS does is provide a set of coordinates which represent the location of GPS units with respect to its latitude, longitude and elevation on planet Earth. It also provides time, which is accurate. The tracking devices themselves come in different flavors. They will contain a GPS receiver, and GPS software, along with some way of transmitting the resulting coordinates. GPS in mobile tend to use radio waves to transmit their location to another GPS device. The purpose of this prototype “Mobi Navi Tour for Rescue Operation” timely communication, and lightning fast decision-making with a group of people located in different places with a common goal. Timely communication and tracking the people are a critical issue in many situations, environments. Expedited can find missing person by sending the location and other related information to them through mobile. Information must be drawn from the caller and entered into the system by the administrator or a group leader and transferred to the group leader. This system will locate the closest available person, a group of people working in an organization/company or vehicle to determine availability and their position to track them. Misinformation cannot lead to the wrong decision in the rapidly paced environment in a normal and an abnormal situation. In “Mobi Navi Tour for Rescue Operation” we use Google Cloud Messaging for android (GCM) which is a service that helps developers send data from servers to their android applications on android devices. The service provides a simple, lightweight mechanism that servers can use to tell mobile applications to contact the server directly, to fetch updated application or user data.

Keywords: android, gps, tour, communication, service

Procedia PDF Downloads 377
52 Citizen Journalist: A Case Study of Audience Participation in Mainstream TV News Production in India

Authors: Sindhu Manjesh

Abstract:

This paper examines citizen journalism in India, specifically the inclusion of user-generated content (UGC) by mainstream media, by focusing on the case study of the Citizen Journalist show on CNN-News 18, a national television news broadcaster. It studies the processes of production involved in Citizen Journalist to find out how professional journalists and citizens interact to put together the show in order to help readers understand the relationship between journalists and the public in the evolving media landscape of India, the world’s largest democracy, and a leader in the Global South. Using an in-depth case study approach involving newsroom ethnography, interviews, and an examination of Citizen Journalist content, it studies the implications of audience participation for traditional journalistic routines and values – specifically gatekeeping and objectivity. Citizen Journalist began to much fanfare and promise about including neglected citizen views and voices. Based on evidence gathered, this study, however, argues that claims made by CNN-News18 about democratizing news production through Citizen Journalist were overstated. It made some effort to do this and broadcast a lot of important stories. But overall, in terms of bringing in citizen voices, it did not live up to its initial promise because the show was anchored in traditional journalistic norms and roles and the channel’s economic imperatives. Professional journalists were ironically the producers of 'citizen journalism' in this case. Mainstream media’s authority in defining journalistic work –who says what, where, when, why, and how– remains predominant in India. This has implications for democratic participation in India. The example of Citizen Journalist –the model it followed, its partial success, and many limitations– could well presage outcomes for other news outlets, in India and beyond, which copy its template.

Keywords: citizen journalism, digital journalism, participatory journalism, public sphere

Procedia PDF Downloads 95
51 Mobile Communication Technologies, Romantic Attachment and Relationship Quality: An Exploration of Partner Attunement

Authors: Jodie Bradnam, Mark Edwards, Bruce Watt

Abstract:

Mobile technologies have emerged as tools to create and sustain social and romantic relationships. The integration of technologies in close relationships has been of particular research interest with findings supporting the positive role of mobile phones in nurturing feelings of closeness and connection. More recently, the use of text messaging to manage conflict has become a focus of research attention. Four hundred and eleven adults in committed romantic relationships completed a series of questionnaires measuring attachment orientation, relationship quality, texting frequencies, attitudes, and response expectations. Attachment orientation, relationship length, texting for connection and disconnection were significant predictors of relationship quality, specifically relationship intimacy. Text frequency varied as a function of attachment orientation, with high attachment anxiety associated with high texting frequencies and with low relationship quality. Sending text messages of love and support was related to higher intimacy and relationship satisfaction scores, while sending critical or impersonal texts was associated with significantly lower intimacy and relationship satisfaction scores. The use of texting to manage relational conflict was a stronger negative predictor of relationship satisfaction than was the use of texting to express love and affection. Consistent with research on face-to-face communication in couples, the expression of negative sentiments via text were related to lower relationship quality, and these negative sentiments had a stronger and more enduring impact on relationship quality than did the expression of positive sentiments. Attachment orientation, relationship length and relationship status emerged as variables of interest in understanding the use of mobile technologies in romantic relationships.

Keywords: attachment, destructive conflict, intimacy, mobile communication, relationship quality, relationship satisfaction, texting

Procedia PDF Downloads 357
50 Motivation in Online Instruction

Authors: David Whitehouse

Abstract:

Some of the strengths of online teaching include flexibility, creativity, and comprehensiveness. A challenge can be motivation. How can an instructor repeating the same lessons over and over, day in and day out, year after year, maintain motivation? Enthusiasm? Does motivating the student and creating enthusiasm in class build the same things inside the instructor? The answers lie in the adoption of what I label EUQ—The Empathy and Understanding Quotient. In the online environment, students who are adults have many demands on their time: civilian careers, families (spouse, children, older parents), and sometimes even military service. Empathetic responses on the part of the instructor will lead to open and honest communication on the part of the student, which will lead to understanding on the part of the instructor and a rise in motivation in both parties. Understanding the demands can inform an instructor’s relationship with the student throughout the temporal parameters of classwork. In practicing EUQ, instructors can build motivation in their students and find internal motivation in an enhanced classroom dynamic. The presentation will look at what motivates a student to accomplish more than the minimum required and how that can lead to excellent results for an instructor’s own motivation. Through direct experience of having students give high marks on post-class surveys and via direct messaging, the presentation will focus on how applying EUQ in granting extra time, searching for intent while grading, communicating with students via Quick Notes, responses in Forums, comments in Assignments, and comments in grading areas - - - how applying these things infuses enthusiasm and energy in the instructor which drive creativity in teaching. Three primary ways of communicating with students will be given as examples. The positive response and negative response each for a Forum, an Assignment, and a Message will be explored. If there is time, participants will be invited to craft their own EUQ responses in a role playing exercise involving two common classroom scenarios—late work and plagiarism.

Keywords: education, instruction, motivation, online, teaching

Procedia PDF Downloads 151
49 Use of Smartphones in 6th and 7th Grade (Elementary Schools) in Istria: Pilot Study

Authors: Maja Ruzic-Baf, Vedrana Keteles, Andrea Debeljuh

Abstract:

Younger and younger children are now using a smartphone, a device which has become ‘a must have’ and the life of children would be almost ‘unthinkable’ without one. Devices are becoming lighter and lighter but offering an array of options and applications as well as the unavoidable access to the Internet, without which it would be almost unusable. Numerous features such as taking of photographs, listening to music, information search on the Internet, access to social networks, usage of some of the chatting and messaging services, are only some of the numerous features offered by ‘smart’ devices. They have replaced the alarm clock, home phone, camera, tablet and other devices. Their use and possession have become a part of the everyday image of young people. Apart from the positive aspects, the use of smartphones has also some downsides. For instance, free time was usually spent in nature, playing, doing sports or other activities enabling children an adequate psychophysiological growth and development. The greater usage of smartphones during classes to check statuses on social networks, message your friends, play online games, are just some of the possible negative aspects of their application. Considering that the age of the population using smartphones is decreasing and that smartphones are no longer ‘foreign’ to children of pre-school age (smartphones are used at home or in coffee shops or shopping centers while waiting for their parents, playing video games often inappropriate to their age), particular attention must be paid to a very sensitive group, the teenagers who almost never separate from their ‘pets’. This paper is divided into two sections, theoretical and empirical ones. The theoretical section gives an overview of the pros and cons of the usage of smartphones, while the empirical section presents the results of a research conducted in three elementary schools regarding the usage of smartphones and, specifically, their usage during classes, during breaks and to search information on the Internet, check status updates and 'likes’ on the Facebook social network.

Keywords: education, smartphone, social networks, teenagers

Procedia PDF Downloads 432
48 A Folk’s Theory of the MomConnect (mHealth) Initiative in South Africa

Authors: Eveline Muika Kabongo, Peter Delobelle, Ferdinand Mukumbang, Edward Nicol

Abstract:

Introduction: Studies have been conducted to establish the effect of the MomConnect program in South Africa, but these studies did not focus on the stakeholders' and implementers' perspectives and the underlying program theory of the MomConnect initiative program. We strived to obtain stakeholders’ perspectives and assumptions on the MomConnect program and develop an initial program theory (IPT) of how the MomConnect initiative was expected to work. Methods: A realist-informed explanatory design used. The interviewer was performed with 10 key informants selected purposively among MomConnect key informants at the a national level of NDoH South Africa. The interview was done via zoom and lasted for 30 to 60 minutes. Introduction and abduction inferencing approaches were applied. The deductive and inductive approaches were performed during the analysis. ICAMO hereustic framework was used to analysed the data in order to get key informants expectations on how the MomConnect will work or not. Results: We developed three folk’s theories illustrating how the key informants’ expected the MomConnect to work. These theories showed that the MomConnect intended to provide users with health information and education that will empower and motivate them with knowledge which will allow the improvement of health services delivery among HCPs and improvement of the uptake of MCH services among pregnant women and mothers and decrease the rate of maternal and child mortality in the country. The lack of an updated mechanism to link women to the outcome was an issue. Another problem enlightened was the introduction of the WhatsApp program instead of SMS messaging, which was free of charge to women. Conclusion: The Folk’s theory developed from this study provided an insight into how the MomConnect was expected to work and what did not work. The folk’s theory will be merged with information from candidate theories on synthesis review and document review to develop our initial program theory of the MomConnect initiative.

Keywords: mHealth, MomConnect program, realist evaluation, maternal and child health, maternal and child health services, introduction, theory-driven

Procedia PDF Downloads 159
47 Use of Social Media in Political Communications: Example of Facebook

Authors: Havva Nur Tarakci, Bahar Urhan Torun

Abstract:

The transformation that is seen in every area of life by technology, especially internet technology changes the structure of political communications too. Internet, which is at the top of new communication technologies, affects political communications with its structure in a way that no traditional communication tools ever have and enables interaction and the channel between receiver and sender, and it becomes one of the most effective tools preferred among the political communication applications. This state as a result of technological convergence makes Internet an unobtainable place for political communication campaigns. Political communications, which means every kind of communication strategies that political parties called 'actors of political communications' use with the aim of messaging their opinions and party programmes to their present and potential voters who are a target group for them, is a type of communication that is frequently used also among social media tools at the present day. The electorate consisting of different structures is informed, directed, and managed by social media tools. Political parties easily reach their electorate by these tools without any limitations of both time and place and also are able to take the opinions and reactions of their electorate by the element of interaction that is a feature of social media. In this context, Facebook, which is a place that political parties use in social media at most, is a communication network including in our daily life since 2004. As it is one of the most popular social networks today, it is among the most-visited websites in the global scale. In this way, the research is based on the question, “How do the political parties use Facebook at the campaigns, which they conduct during the election periods, for informing their voters?” and it aims at clarifying the Facebook using practices of the political parties. In direction of this objective the official Facebook accounts of the four political parties (JDP–AKParti, PDP–BDP, RPP-CHP, NMP-MHP), which reach their voters by social media besides other communication tools, are treated, and a frame for the politics of Turkey is formed. The time of examination is constricted with totally two weeks, one week before the mayoral elections and one week after the mayoral elections, when it is supposed that the political parties use their Facebook accounts in full swing. As a research method, the method of content analysis is preferred, and the texts and the visual elements that are gotten are interpreted based on this analysis.

Keywords: Facebook, political communications, social media, electrorate

Procedia PDF Downloads 358
46 Analysis the Impacts of WeChat Mobile Payment in China Teens' Online Purchasing Behaviors

Authors: Lok Yi Joyce Poon

Abstract:

China's mobile payment market has boomed in the past few years. WeChat (Chinese name as Weixin) owned by Tencent is known as the fastest growing all-in-one social messaging platforms. The company has launched the WeChat Pay in 2013, in which users can link their credit card to their user account and make payments within the app’s built in digital wallet. WeChat Payment is a one-stop payment tool that can provide a seamless online experience for the shoppers to transfer money between WeChat users (peer-to-peer) and make payments online by scanning a QR code, a prominent facilitator for transactions in WeChat, to complete the payment with the app without directing the users to the external websites. The aims of this study are to examine the effectiveness of WeChat mobile payment in China as well as the impacts of the China teen’s online purchasing behavior since the establishment of WeChat Payment. The research method of this study is conducted by both online survey on Sojump, a popular online survey platform in China. A total of 120 respondents among 18 to 25 teens in China completed the survey. Data sources included participants’ response to an end-of-session questionnaire, encompassing with the types of multiple choice, open-ended questions. To have an in-depth analysis, a face-to-face interview with a Chinese teen who is a frequent user of the WeChat Pay. The main finding of the study shows that the majority of the teenagers frequently use the WeChat payment tool because of its convenience, user-friendliness and the scenarios offered within the WeChat Wallet. The respondents claimed that they will settle the bills in their daily lives via WeChat Pay. However, the respondents in the age group of 40 or above will not use the WeChat Pay due to the security concern and they do not see the app as a platform for commercial activities like online shopping. Throughout the study, it is recommended WeChat should put more efforts on the security issue and improve the payment technology by adopting the near-field communication terminals instead of requiring users to scan QR codes before they complete the transaction.

Keywords: digital wallet, mobile payment, online purchasing behavior, WeChat Pay

Procedia PDF Downloads 370
45 Integrated On-Board Diagnostic-II and Direct Controller Area Network Access for Vehicle Monitoring System

Authors: Kavian Khosravinia, Mohd Khair Hassan, Ribhan Zafira Abdul Rahman, Syed Abdul Rahman Al-Haddad

Abstract:

The CAN (controller area network) bus is introduced as a multi-master, message broadcast system. The messages sent on the CAN are used to communicate state information, referred as a signal between different ECUs, which provides data consistency in every node of the system. OBD-II Dongles that are based on request and response method is the wide-spread solution for extracting sensor data from cars among researchers. Unfortunately, most of the past researches do not consider resolution and quantity of their input data extracted through OBD-II technology. The maximum feasible scan rate is only 9 queries per second which provide 8 data points per second with using ELM327 as well-known OBD-II dongle. This study aims to develop and design a programmable, and latency-sensitive vehicle data acquisition system that improves the modularity and flexibility to extract exact, trustworthy, and fresh car sensor data with higher frequency rates. Furthermore, the researcher must break apart, thoroughly inspect, and observe the internal network of the vehicle, which may cause severe damages to the expensive ECUs of the vehicle due to intrinsic vulnerabilities of the CAN bus during initial research. Desired sensors data were collected from various vehicles utilizing Raspberry Pi3 as computing and processing unit with using OBD (request-response) and direct CAN method at the same time. Two types of data were collected for this study. The first, CAN bus frame data that illustrates data collected for each line of hex data sent from an ECU and the second type is the OBD data that represents some limited data that is requested from ECU under standard condition. The proposed system is reconfigurable, human-readable and multi-task telematics device that can be fitted into any vehicle with minimum effort and minimum time lag in the data extraction process. The standard operational procedure experimental vehicle network test bench is developed and can be used for future vehicle network testing experiment.

Keywords: CAN bus, OBD-II, vehicle data acquisition, connected cars, telemetry, Raspberry Pi3

Procedia PDF Downloads 176