Search results for: Internet celebrity
531 A Palmprint Identification System Based Multi-Layer Perceptron
Authors: David P. Tantua, Abdulkader Helwan
Abstract:
Biometrics has been recently used for the human identification systems using the biological traits such as the fingerprints and iris scanning. Identification systems based biometrics show great efficiency and accuracy in such human identification applications. However, these types of systems are so far based on some image processing techniques only, which may decrease the efficiency of such applications. Thus, this paper aims to develop a human palmprint identification system using multi-layer perceptron neural network which has the capability to learn using a backpropagation learning algorithms. The developed system uses images obtained from a public database available on the internet (CASIA). The processing system is as follows: image filtering using median filter, image adjustment, image skeletonizing, edge detection using canny operator to extract features, clear unwanted components of the image. The second phase is to feed those processed images into a neural network classifier which will adaptively learn and create a class for each different image. 100 different images are used for training the system. Since this is an identification system, it should be tested with the same images. Therefore, the same 100 images are used for testing it, and any image out of the training set should be unrecognized. The experimental results shows that this developed system has a great accuracy 100% and it can be implemented in real life applications.Keywords: biometrics, biological traits, multi-layer perceptron neural network, image skeletonizing, edge detection using canny operator
Procedia PDF Downloads 373530 A Cross-Cultural Investigation of Self-Compassion in Adolescents Across Gender
Authors: H. N. Cheung
Abstract:
Self-compassion encourages one to accept oneself, reduce self-criticism and self-judgment, and see one’s shortcomings and setbacks in a balanced view. Adolescent self-compassion is a crucial protective factor against mental illness. It is, however, affected by gender. Given the scarcity of self-compassion scales for adolescents, the current study evaluates the Self-Compassion Scale for Youth (SCS-Y) in a large cross-cultural sample and investigates how the subscales of SCS-Y relate to the dimensions of depressive symptoms across gender. Through the internet-based Qualtrics, a total of 2881 teenagers aged 12 to 18 years were recruited from Hong Kong (HK), China, and the United Kingdom. A Multiple Indicator Multiple Cause (MIMIC) model was used to evaluate measurement invariance of the SCS-Y, and differential item functioning (DIF) was checked across gender. Upon the establishment of the best model, a multigroup structural equation model (SEM) was built between factors of SCS-Y and Multidimensional depression assessment scale (MDAS) which assesses four dimensions of depressive symptoms (emotional, cognitive, somatic and interpersonal). The SCS-Y was shown to have good reliability and validity. The MIMIC model produced a good model fit for a hypothetical six-factor model (CFI = 0.980; TLI = 0.974; RMSEA = 0.038) and no item was flagged for DIF across gender. A gender difference was observed between SCS-Y factors and depression dimensions. Conclusions: The SCS-Y exhibits good psychometric characteristics, including measurement invariance across gender. The study also highlights the gender difference between self-compassion factors and depression dimensions.Keywords: self compassion, gender, depression, structural equation modelling, MIMIC model
Procedia PDF Downloads 72529 Factors Influencing Accidental Cyberbullying on Social Media: Healthcare Industry Perspective
Authors: Iram Malik, Mahrukh Shaukat, Abeer Malik, Hafiz Mushtaq Ahmad
Abstract:
There has been a lot of research on cyberbullying but there is limited research on the topic of accidental cyberbullying on social media with a special focus on healthcare industry. This study emphasizes to uncover the factors that contribute to accidental cyberbullying on social media and how it affects individuals, professionals’ and organizations in health care sector. Nowadays social media is becoming a necessary part of our daily life; there is a need to look into how it is shaping our social life and behaviors displayed online. Instances of cyber bullying can have long-term repercussions due to over-sharing of information. The study used simple random sampling and the instrument of data collection was survey. A sample size of 250 healthcare professionals was chosen from the twin cities of Rawalpindi and Islamabad, Pakistan to examine the relationship between their attitude towards internet use, psychological distress, verbal aggression, envy, frustration, self-compassion, personality traits and accidental cyberbullying on social media. The results of the study have been encouraging. The findings show that psychological distress, aggression, envy, frustration and personality traits had direct effect on accidental cyberbullying whereas compassion, altruism lessened the effect of accidental cyberbullying behavior. It is our intent that the findings of this study could help raise awareness regarding fair use of social media, help policy makers in developing appropriate policies for avoiding cyberbullying in future.Keywords: accidental cyberbullying, aggression, cyberbullying, frustration, social media
Procedia PDF Downloads 290528 IOT Based Process Model for Heart Monitoring Process
Authors: Dalyah Y. Al-Jamal, Maryam H. Eshtaiwi, Liyakathunisa Syed
Abstract:
Connecting health services with technology has a huge demand as people health situations are becoming worse day by day. In fact, engaging new technologies such as Internet of Things (IOT) into the medical services can enhance the patient care services. Specifically, patients suffering from chronic diseases such as cardiac patients need a special care and monitoring. In reality, some efforts were previously taken to automate and improve the patient monitoring systems. However, the previous efforts have some limitations and lack the real-time feature needed for chronic kind of diseases. In this paper, an improved process model for patient monitoring system specialized for cardiac patients is presented. A survey was distributed and interviews were conducted to gather the needed requirements to improve the cardiac patient monitoring system. Business Process Model and Notation (BPMN) language was used to model the proposed process. In fact, the proposed system uses the IOT Technology to assist doctors to remotely monitor and follow-up with their heart patients in real-time. In order to validate the effectiveness of the proposed solution, simulation analysis was performed using Bizagi Modeler tool. Analysis results show performance improvements in the heart monitoring process. For the future, authors suggest enhancing the proposed system to cover all the chronic diseases.Keywords: IoT, process model, remote patient monitoring system, smart watch
Procedia PDF Downloads 333527 Of an 80 Gbps Passive Optical Network Using Time and Wavelength Division Multiplexing
Authors: Malik Muhammad Arslan, Muneeb Ullah, Dai Shihan, Faizan Khan, Xiaodong Yang
Abstract:
Internet Service Providers are driving endless demands for higher bandwidth and data throughput as new services and applications require higher bandwidth. Users want immediate and accurate data delivery. This article focuses on converting old conventional networks into passive optical networks based on time division and wavelength division multiplexing. The main focus of this research is to use a hybrid of time-division multiplexing and wavelength-division multiplexing to improve network efficiency and performance. In this paper, we design an 80 Gbps Passive Optical Network (PON), which meets the need of the Next Generation PON Stage 2 (NGPON2) proposed in this paper. The hybrid of the Time and Wavelength division multiplexing (TWDM) is said to be the best solution for the implementation of NGPON2, according to Full-Service Access Network (FSAN). To co-exist with or replace the current PON technologies, many wavelengths of the TWDM can be implemented simultaneously. By utilizing 8 pairs of wavelengths that are multiplexed and then transmitted over optical fiber for 40 Kms and on the receiving side, they are distributed among 256 users, which shows that the solution is reliable for implementation with an acceptable data rate. From the results, it can be concluded that the overall performance, Quality Factor, and bandwidth of the network are increased, and the Bit Error rate is minimized by the integration of this approach.Keywords: bit error rate, fiber to the home, passive optical network, time and wavelength division multiplexing
Procedia PDF Downloads 71526 A Bi-Objective Model to Optimize the Total Time and Idle Probability for Facility Location Problem Behaving as M/M/1/K Queues
Authors: Amirhossein Chambari
Abstract:
This article proposes a bi-objective model for the facility location problem subject to congestion (overcrowding). Motivated by implementations to locate servers in internet mirror sites, communication networks, one-server-systems, so on. This model consider for situations in which immobile (or fixed) service facilities are congested (or queued) by stochastic demand to behave as M/M/1/K queues. We consider for this problem two simultaneous perspectives; (1) Customers (desire to limit times of accessing and waiting for service) and (2) Service provider (desire to limit average facility idle-time). A bi-objective model is setup for facility location problem with two objective functions; (1) Minimizing sum of expected total traveling and waiting time (customers) and (2) Minimizing the average facility idle-time percentage (service provider). The proposed model belongs to the class of mixed-integer nonlinear programming models and the class of NP-hard problems. In addition, to solve the model, controlled elitist non-dominated sorting genetic algorithms (Controlled NSGA-II) and controlled elitist non-dominated ranking genetic algorithms (NRGA-I) are proposed. Furthermore, the two proposed metaheuristics algorithms are evaluated by establishing standard multiobjective metrics. Finally, the results are analyzed and some conclusions are given.Keywords: bi-objective, facility location, queueing, controlled NSGA-II, NRGA-I
Procedia PDF Downloads 584525 The Impact of Artificial Intelligence on Torism Ouputs
Authors: Nancy Ayman Kamal Mohamed Mehrz
Abstract:
As the economies of other countries in the Mediterranean Basin, the tourism sector in our country has a high denominator in economics. Tourism businesses, which are building blocks of tourism, sector faces with a variety of problems during their activities. These problems faced make business efficiency and competition conditions of the businesses difficult. Most of the problems faced by the tourism businesses and the information of consumers about consumers’ rights were used in this study, which is conducted to determine the problems of tourism businesses in the Central Anatolia Region. It is aimed to contribute the awareness of staff and executives working at tourism sector and to attract attention of businesses active concurrently with tourism sector and legislators. E-tourism is among the issues that have recently been entered into the field of tourism. In order to achieve this type of tourism, Information and Communications Technology (or ICT) infrastructures as well as Co-governmental organizations and tourism resources are important. In this study, the opinions of managers and tourism officials about the e-tourism in Leman city were measured; it also surveyed the impact of level of digital literacy of managers and tourism officials on attracting tourists. This study was conducted. One of the environs of the Esfahan province. This study is a documentary – survey and the sources include library resources and also questionnaires. The results obtained indicate that if managers use ICT, it may help e-tourism to be developed in the region, and increasing managers’ beliefs on e-tourism and upgrading their level of digital literacy may affect e-tourism development.Keywords: financial problems, the problems of tourism businesses, tourism businesses, internet, marketing, tourism, tourism management economic competitiveness, enhancing competitiveness
Procedia PDF Downloads 74524 Legal Feminism, Modernity and Their Impact on Some African Countries
Authors: Umulisa Linda, Andy Cons Matata
Abstract:
The origin of legal feminism can be attributed to an attempt to provide a safe space for women such as voting, parental, and inheritance rights, among others. It was also a rebellion against male supremacy. However, with the development of technology and especially in the era of the internet, it appears that both legal feminism and the modernism are losing their luster. While these movements had their origin either in the United States of America or western Europe, their impacts have been felt as far as Africa, Asia, and Latin America. In Africa, different countries have different levels of penetration of these movements. This study, therefore, had its focus on how legal feminism and modernism have influenced legal developments in Kenya and Rwanda. The study adopted a qualitative approach with the respondents being asked about their feelings and perceptions on how the two movements had affected legal developments in their countries. In order to gauge the opinion of different categories of people such as the youth, middle-aged and the elderly people as well as being gender-sensitive, the study adopted a purpose method of sampling. The questionnaires and the focus group discussions were employed as the main tools for data gathering. From the questionnaires, the focus group discussions, and the data analysis that followed, the study concluded that both legal feminism and modernity had penetrated the legal systems of both Kenya and Rwanda so deeply. The study further found that the proponents of the two movements were mostly urban based and educated women. The men were generally opposed to the movements.Keywords: legal development, legal feminsim, modernism, voting, parental and inheritance rights
Procedia PDF Downloads 144523 The Consequences of Regime Change in Iraq; Formation and Continuation of Geopolitical Crises
Authors: Ali Asghar Sotoudeh
Abstract:
Since the US invasion of Iraq in 2003 and the subsequent regime change, internal conflicts between political and ethnic-religious groups have become a hallmark of Iraqi political dynamism. The most important manifestations of these conflicts are the Kurdish-central government conflicts, as well as fundamentalism since 2003. As a result, it seems not only US presence in Iraq under the pretext of fighting terrorism and expanding democracy has not had a positive effect on controlling fundamentalism and political stability in Iraq, but it has paved the way for the formation and continuation of geopolitical crises in the form of disputes over territory and sources of power. In this regard, given the importance of the study, the main purpose of this study is to examine the process of the impact of US regime-change policy on the formation and continuation of geopolitical crises in Iraq. The central question of this study is, what effect has the US regime change policy had on Iraq's domestic political processes? Findings show that regime change and subsequent imposed federalism have widened the gaps in Iraq's sectarian-ethnic system. As a result, the geopolitical crisis in the context of the dispute over geographical territory and sources of power between ethnic-religious groups has become the most important political dynamic in Iraq since the occupation. The research method in this article is descriptive-analytical, and the data collection method is library and internet resources.Keywords: Iraq, united states, geopolitical crisis, ethno-religious conflict, political federalism
Procedia PDF Downloads 147522 Omani Community in Digital Age: A Study of Omani Women Using Back Channel Media to Empower Themselves for Frontline Entrepreneurship
Authors: Sangeeta Tripathi, Muna Al Shahri
Abstract:
This research article presents the changing role and status of women in Oman. Transformation of women’s status started with the regime of His Majesty Sultan Qaboos Bin Said in 1970. It is always desired by the Sultan to enable women in all the ways for the balance growth of the country. Forbidding full face veil for women in public offices is one of the best efforts for their empowerment. Women education is also increasing rapidly. They are getting friendly with new information communication technology and using different social media applications such as WhatsApp, Instagram and Facebook for interaction and economic growth. Though there are some traditional and tribal boundaries, women are infused with courage and enjoying fair treatment and equal opportunities in different career positions. The study will try to explore changing mindset of young Omani women towards these traditional tribal boundaries, cultural heritage, business and career: ‘How are young Omani women making balance between work and social prestige?’, ‘How are they preserving their cultural values, embracing new technologies and approaching social network to enhance their economic power.’ This paper will discover their hurdles while using internet for their new entrepreneur. It will also examine the prospects of online business in Oman. The mixed research methodology is applied to find out the result.Keywords: advertising, business, entrepreneurship, tribal barrier
Procedia PDF Downloads 307521 Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis
Authors: Sarthak Mishra, Astha Sinha
Abstract:
There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question.Keywords: business-business transaction (B2B), business-consumer transaction (B2C), e-commerce, online transaction, privacy and security threats
Procedia PDF Downloads 232520 Duality of Leagility and Governance: A New Normal Demand Network Management Paradigm under Pandemic
Authors: Jacky Hau
Abstract:
The prevalence of emerging technologies disrupts various industries as well as consumer behavior. Data collection has been in the fingertip and inherited through enabled Internet-of-things (IOT) devices. Big data analytics (BDA) becomes possible and allows real-time demand network management (DNM) through leagile supply chain. To enhance further on its resilience and predictability, governance is going to be examined to promote supply chain transparency and trust in an efficient manner. Leagility combines lean thinking and agile techniques in supply chain management. It aims at reducing costs and waste, as well as maintaining responsiveness to any volatile consumer demand by means of adjusting the decoupling point where the product flow changes from push to pull. Leagility would only be successful when collaborative planning, forecasting, and replenishment (CPFR) process or alike is in place throughout the supply chain business entities. Governance and procurement of the supply chain, however, is crucial and challenging for the execution of CPFR as every entity has to walk-the-talk generously for the sake of overall benefits of supply chain performance, not to mention the complexity of exercising the polices at both of within across various supply chain business entities on account of organizational behavior and mutual trust. Empirical survey results showed that the effective timespan on demand forecasting had been drastically shortening in the magnitude of months to weeks planning horizon, thus agility shall come first and preferably following by lean approach in a timely manner.Keywords: governance, leagility, procure-to-pay, source-to-contract
Procedia PDF Downloads 111519 The Effects of Scientific Studies on the Future Fashion Trends
Authors: Basak Ozkendirci
Abstract:
The discovery of chemical dyes, the development of regenerated fibers, and warp knitting technology have enormous effects on the fashion world. The trends created by the information obtained in the context of various studies today shape the fashion world. Trend analysts must follow scientific developments as well as sociological events, political developments and artwork to obtain healthy data on trends. Digital printing technologies have changed the dynamics of textile printing production and also the style of printed designs. Fashion designers already have started design 3D printed accessories and garments. The research fields like the internet of things, artificial intelligence, hologram technologies, mechatronics, energy storage systems, nanotechnology are seen as the technologies that will change the social life and economy of the future. It is clear that research carried out in these areas will affect the textiles of the future and whereat the trends of fashion. The article aims to create a future vision for trend researchers and designers by giving clues about the changes to be experienced in the fashion world. In the first part of the article, information about the scientific studies that are thought to shape the future is given, and the forecasting about how the inventions that can be obtained from these studies can be adapted at the textile are presented. In the second part of the article, examples of how the new generation of innovative textiles will affect the daily life experience of the user are given.Keywords: biotextiles, fashion trends, nanotextiles, new materials, smart textiles, techno textiles
Procedia PDF Downloads 339518 Fabrication of Textile-Based Radio Frequency Metasurfaces
Authors: Adria Kajenski, Guinevere Strack, Edward Kingsley, Shahriar Khushrushahi, Alkim Akyurtlu
Abstract:
Radio Frequency (RF) metasurfaces are arrangements of subwavelength elements interacting with electromagnetic radiation. These arrangements affect polarization state, amplitude, and phase of impinged radio waves; for example, metasurface designs are used to produce functional passband and stopband filters. Recent advances in additive manufacturing techniques have enabled the low-cost, rapid fabrication of ultra-thin metasurface elements on flexible substrates such as plastic films, paper, and textiles. Furthermore, scalable manufacturing processes promote the integration of fabric-based RF metasurfaces into the market of sensors and devices within the Internet of Things (IoT). The design and fabrication of metasurfaces on textiles require a multidisciplinary team with expertise in i) textile and materials science, ii) metasurface design and simulation, and iii) metasurface fabrication and testing. In this presentation, we will discuss RF metasurfaces on fabric with an emphasis on how the materials, including fabric and inks, along with fabrication techniques, affect the RF performance. We printed metasurfaces using a direct-write approach onto various woven and non-woven fabrics, as well as on fabrics coated with either thermoplastic or thermoset coatings. Our team also performed a range of tests on the printed structures, including different inks and their curing parameters, wash durability, abrasion resistance, and RF performance over time.Keywords: electronic textiles, metasurface, printed electronics, flexible
Procedia PDF Downloads 195517 Optimal Design of Linear Generator to Recharge the Smartphone Battery
Authors: Jin Ho Kim, Yujeong Shin, Seong-Jin Cho, Dong-Jin Kim, U-Syn Ha
Abstract:
Due to the development of the information industry and technologies, cellular phones have must not only function to communicate, but also have functions such as the Internet, e-banking, entertainment, etc. These phones are called smartphones. The performance of smartphones has improved, because of the various functions of smartphones, and the capacity of the battery has been increased gradually. Recently, linear generators have been embedded in smartphones in order to recharge the smartphone's battery. In this study, optimization is performed and an array change of permanent magnets is examined in order to increase efficiency. We propose an optimal design using design of experiments (DOE) to maximize the generated induced voltage. The thickness of the poleshoe and permanent magnet (PM), the height of the poleshoe and PM, and the thickness of the coil are determined to be design variables. We made 25 sampling points using an orthogonal array according to four design variables. We performed electromagnetic finite element analysis to predict the generated induced voltage using the commercial electromagnetic analysis software ANSYS Maxwell. Then, we made an approximate model using the Kriging algorithm, and derived optimal values of the design variables using an evolutionary algorithm. The commercial optimization software PIAnO (Process Integration, Automation, and Optimization) was used with these algorithms. The result of the optimization shows that the generated induced voltage is improved.Keywords: smartphone, linear generator, design of experiment, approximate model, optimal design
Procedia PDF Downloads 346516 A Survey of Feature-Based Steganalysis for JPEG Images
Authors: Syeda Mainaaz Unnisa, Deepa Suresh
Abstract:
Due to the increase in usage of public domain channels, such as the internet, and communication technology, there is a concern about the protection of intellectual property and security threats. This interest has led to growth in researching and implementing techniques for information hiding. Steganography is the art and science of hiding information in a private manner such that its existence cannot be recognized. Communication using steganographic techniques makes not only the secret message but also the presence of hidden communication, invisible. Steganalysis is the art of detecting the presence of this hidden communication. Parallel to steganography, steganalysis is also gaining prominence, since the detection of hidden messages can prevent catastrophic security incidents from occurring. Steganalysis can also be incredibly helpful in identifying and revealing holes with the current steganographic techniques, which makes them vulnerable to attacks. Through the formulation of new effective steganalysis methods, further research to improve the resistance of tested steganography techniques can be developed. Feature-based steganalysis method for JPEG images calculates the features of an image using the L1 norm of the difference between a stego image and the calibrated version of the image. This calibration can help retrieve some of the parameters of the cover image, revealing the variations between the cover and stego image and enabling a more accurate detection. Applying this method to various steganographic schemes, experimental results were compared and evaluated to derive conclusions and principles for more protected JPEG steganography.Keywords: cover image, feature-based steganalysis, information hiding, steganalysis, steganography
Procedia PDF Downloads 217515 The Implementation of Anti-Circumvention Legislations in Thai Copyright System
Authors: Chuencheewin Yimfuang
Abstract:
The WIPO copyright treaty (WCT) was established by the World Intellectual Property Organisation (WIPO). This agreement required the contracting nations to provide adequate protection to technological measures to prevent massive copyright infringement in the internet system. Thailand had to implement the anti-circumvention rules into domestic legislation to comply with this international obligation. The purpose of this paper is to critically discuss the legislative standard under the WCT. It also aims to examine the legal development of technological protection measures in Thailand and demonstrate that the scope of prohibitions under the copyright Act 2022 (NO.5) is similar to the Digital Millennium Copyright Act 1998 (DMCA) of the United States (US). It could be found that the anti-circumvention laws of Thailand prohibit the circumvention of access-control technologies, and the regulation on trafficking circumvention devices has been added to the latest version of the Thai Copyright Act. These legislative evolutions have revealed the attempt to reinforce the legal protection of technological measures and copyright holders in order to be in line with global practices. However, the amendment has problems concerning the legal definitions of effective technological measure and the prohibited act of circumvention. The vagueness might affect the scope of protection and the boundary of prohibition. With this aspect, the DMCA will be evaluated and compared to gain guidelines for interpretation and enforcement in Thailand. The lessons and experiences learned from this study might be useful to correct the flaws or at least clarify the ambiguities embodied in Thai copyright legislation.Keywords: legal development, technological protection measure, circumvention, Thailand
Procedia PDF Downloads 87514 A Documentary Review of Theoretical and Practical Elements for a Genre Analysis of Thailand Travel Listicles
Authors: Pinyada Santisarun, Yaowaret Tharawoot, Songyut Akkakoson
Abstract:
This paper reports on a literature review sub-study of a larger research project which has been designed to identify the rhetorical organization of a travel writing genre, together with the use of lexical choices, syntactical structures, and graphological features, based on a randomly-selected corpus of Thailand travel listicles. Conducted as a library-based overview, this study aims to specify theoretical and practical elements for the said larger study. The materials for the review have been retrieved from various Internet sources, covering both public search engines and library databases. Generally, the article focuses on answering questions about the ‘what’ and the ‘how’ of such background elements widely discussed in the literature as the meaning of listicles, how the travel listicles’ patterns and regularities can be categorized to form a new genre, the effect of computer-mediated communication on the travel world, the travel language, and the current situation concerning the importance of travel listicles. The theoretical and practical data derived from this study provide valuable insights into the way in which the genre analysis and lexico-syntactical examination of Thailand travel listicles in the present authors’ larger research project can be properly conducted. The data gained can be added to the expanding body of knowledge in the field of the ESP genre.Keywords: computer-mediated communication, digital writing, genre-based analysis, online travel writing, tourism language
Procedia PDF Downloads 146513 Influence of Information and Communication Technology on Dress Culture among Senior Secondary School Students in Ife East Local Government, Osun State, Nigeria
Authors: Idowu J. Diyaolu, Ebenezer O. Obayomi, Taiwo A. Bamidele
Abstract:
Information and Communication Technology (ICT) has been observed to have influence on the lifestyle of youths in general. Dressing styles, fashion consciousness and choice of role model are some of the areas of influence. The study was carried out to examine the perception and influence of ICT on the clothing culture of selected Senior Secondary School Students in Ife-East Local government area of Osun State, Nigeria. Two hundred Senior Secondary School Students from public and private schools were randomly selected. Data was collected using structured questionnaire. The result showed that 79.0% were computer literate, 64.5% have facebook account and 93.5% browse with phones. Based on their perception on the influence of ICT, 74.5% of the respondents agreed that frequent use of ICT has increased their level of fashion consciousness while 60.5% were motivated by the images and dressing pattern in magazines, on TV and the internet. Also, large proportions (60.5%) were influenced by the dressing styles of their friends on social media. Male students were significantly more engaged in ICT related activities than females (t = 1.29, P < 0.05), whereas there is no significant difference in the involvement in ICT activities between private and public school students (t = 0.325, P > 0.05). Since ICT has influence on dressing, appropriate dressing pattern should be encouraged on mass media.Keywords: dress culture, information and communication technology, fashion trend, role model
Procedia PDF Downloads 464512 User Acceptance Criteria for Digital Libraries
Authors: Yu-Ming Wang, Jia-Hong Jian
Abstract:
The Internet and digital publication technologies have brought dramatic impacts on how people collect, organize, disseminate, access, store, and use information. More and more governments, schools, and organizations spent huge funds to develop digital libraries. A digital library can be regarded as a web extension of traditional physically libraries. People can search diverse publications, find out the position of knowledge resources, and borrow or buy publications through digital libraries. People can gain knowledge and students or employees can finish their reports by using digital libraries. Since the considerable funds and energy have been invested in implementing digital libraries, it is important to understand the evaluative criteria from the users’ viewpoint in order to enhance user acceptance. This study develops a list of user acceptance criteria for digital libraries. An initial criteria list was developed based on some previously validated instruments related to digital libraries. Data were collected from user experiences of digital libraries. The exploratory factor analysis and confirmatory factor analysis were adopted to purify the criteria list. The reliabilities and validities were tested. After validating the criteria list, a user survey was conducted to collect the comparative importance of criteria. The analytic hierarchy process (AHP) method was utilized to derive the importance of each criterion. The results of this study contribute to an e understanding of the criteria and relative importance that users evaluate for digital libraries.Keywords: digital library, user acceptance, analytic hierarchy process, factor analysis
Procedia PDF Downloads 254511 The Influence of Mobile Phone Addiction on Academic Performance among Teenagers in Shah Alam, Malaysia
Authors: Jamaluddin Abd Rashid, Aris Abdul Rahman
Abstract:
Mobile phones have become the most popular way to communicate with other individuals and it has created an unspoken social dependency. Making phone calls, instant messaging, playing online games and accessing the Internet are among the features added to a mobile phone, attracting teenagers to spend more hours fixated on their gadgets. As such, this study attempted to examine the frequency of time spent on mobile phones and how this influenced academic performance. A quantitative methodology was applied in this study, where face to face survey through the distribution of questionnaires was facilitated onto a group of 200 secondary school students from the Shah Alam community in Selangor,Malaysia. Both genders, male and females were assessed equally to find out if there exists a correlation between genders when measuring higher or lower frequency of attachment to mobile phones. It can also be seen that 100% correspondents have a mobile phone in their possession. The adolescents uses mobile phones daily, which shows students being somewhat addicted, as they tend to feel that it is necessary to use a mobile phone. The main findings of this research found out that, students that are mobile phone addictive received a lower grade in schools. Mobile phone addiction does affect academic performance negatively. As this study discusses the modern-day phenomenon, it is hoped that the findings and discussion could add to present literary works and help future researchers understand the relationship between mobile phone addiction and academic performance.Keywords: academic performance, mobile phone addiction, social media, student
Procedia PDF Downloads 350510 Unattended Crowdsensing Method to Monitor the Quality Condition of Dirt Roads
Authors: Matias Micheletto, Rodrigo Santos, Sergio F. Ochoa
Abstract:
In developing countries, the most roads in rural areas are dirt road. They require frequent maintenance since are affected by erosive events, such as rain or wind, and the transit of heavy-weight trucks and machinery. Early detection of damages on the road condition is a key aspect, since it allows to reduce the main-tenance time and cost, and also the limitations for other vehicles to travel through. Most proposals that help address this problem require the explicit participation of drivers, a permanent internet connection, or important instrumentation in vehicles or roads. These constraints limit the suitability of these proposals when applied into developing regions, like in Latin America. This paper proposes an alternative method, based on unattended crowdsensing, to determine the quality of dirt roads in rural areas. This method involves the use of a mobile application that complements the road condition surveys carried out by organizations in charge of the road network maintenance, giving them early warnings about road areas that could be requiring maintenance. Drivers can also take advantage of the early warnings while they move through these roads. The method was evaluated using information from a public dataset. Although they are preliminary, the results indicate the proposal is potentially suitable to provide awareness about dirt roads condition to drivers, transportation authority and road maintenance companies.Keywords: dirt roads automatic quality assessment, collaborative system, unattended crowdsensing method, roads quality awareness provision
Procedia PDF Downloads 201509 Learning a Bayesian Network for Situation-Aware Smart Home Service: A Case Study with a Robot Vacuum Cleaner
Authors: Eu Tteum Ha, Seyoung Kim, Jeongmin Kim, Kwang Ryel Ryu
Abstract:
The smart home environment backed up by IoT (internet of things) technologies enables intelligent services based on the awareness of the situation a user is currently in. One of the convenient sensors for recognizing the situations within a home is the smart meter that can monitor the status of each electrical appliance in real time. This paper aims at learning a Bayesian network that models the causal relationship between the user situations and the status of the electrical appliances. Using such a network, we can infer the current situation based on the observed status of the appliances. However, learning the conditional probability tables (CPTs) of the network requires many training examples that cannot be obtained unless the user situations are closely monitored by any means. This paper proposes a method for learning the CPT entries of the network relying only on the user feedbacks generated occasionally. In our case study with a robot vacuum cleaner, the feedback comes in whenever the user gives an order to the robot adversely from its preprogrammed setting. Given a network with randomly initialized CPT entries, our proposed method uses this feedback information to adjust relevant CPT entries in the direction of increasing the probability of recognizing the desired situations. Simulation experiments show that our method can rapidly improve the recognition performance of the Bayesian network using a relatively small number of feedbacks.Keywords: Bayesian network, IoT, learning, situation -awareness, smart home
Procedia PDF Downloads 524508 Privacy Protection Principles of Omnichannel Approach
Authors: Renata Mekovec, Dijana Peras, Ruben Picek
Abstract:
The advent of the Internet, mobile devices and social media is revolutionizing the experience of retail customers by linking multiple sources through various channels. Omnichannel retailing is a retailing that combines multiple channels to allow customers to seamlessly leverage all the distribution information online and offline while shopping. Therefore, today data are an asset more critical than ever for all organizations. Nonetheless, because of its heterogeneity through platforms, developers are currently facing difficulties in dealing with personal data. Considering the possibilities of omnichannel communication, this paper presents channel categorization that could enhance the customer experience of omnichannel center called hyper center. The purpose of this paper is fundamentally to describe the connection between the omnichannel hyper center and the customer, with particular attention to privacy protection. The first phase was finding the most appropriate channels of communication for hyper center. Consequently, a selection of widely used communication channels has been identified and analyzed with regard to the effect requirements for optimizing user experience. The evaluation criteria are divided into 3 groups: general, user profile and channel options. For each criterion the weight of importance for omnichannel communication was defined. The most important thing was to consider how the hyper center can make user identification while respecting the privacy protection requirements. The study carried out also shows what customer experience across digital networks would look like, based on an omnichannel approach owing to privacy protection principles.Keywords: personal data, privacy protection, omnichannel communication, retail
Procedia PDF Downloads 148507 Tussle of Intellectual Property Rights and Privacy Laws with Reference to Artificial Intelligence
Authors: Lipsa Dash, Gyanendra Sahu
Abstract:
Intelligence is the cornerstone of humans, and now they have created a counterpart of themselves artificially. Our understanding of the word intelligence is a very perspective based and mostly superior understanding of what we read, write, perceive and understand the adversities around better. A wide range of industrial sectors have also started involving the technology to perceive, reason and act. Similarly, intellectual property is the product of human intelligence and creativity. The World Intellectual Property Organisation is currently working on technology trends across the globe, and AI tops the list in the digital frontier that will have a profound impact on the world, transforming the way we live and work. Coming to Intellectual Property, patents and creations of the AI’s itself have constantly been in question. This paper explores whether AI’s can fit in the flexibilities of Trade Related Intellectual Property Studies and gaps in the existing IP laws or rthere is a need of amendment to include them in the ambit. The researcher also explores the right of AI’s who create things out of their intelligence and whether they could qualify to be legal persons making the other laws applicable on them. Differentiation between AI creations and human creations are explored in the paper, and the need of amendments to determine authorship, ownership, inventorship, protection, and identification of beneficiary for remuneration or even for determining liability. The humans and humanoids are all indulged in matters related to Privacy, and that attracts another constitutional legal issue to be addressed. The authors will be focusing on the legal conundrums of AI, transhumanism, and the Internet of things.Keywords: artificial intelligence, humanoids, healthcare, privacy, legal conundrums, transhumanism
Procedia PDF Downloads 126506 Computer Network Applications, Practical Implementations and Structural Control System Representations
Authors: El Miloudi Djelloul
Abstract:
The computer network play an important position for practical implementations of the differently system. To implement a system into network above all is needed to know all the configurations, which is responsible to be a part of the system, and to give adequate information and solution in realtime. So if want to implement this system for example in the school or relevant institutions, the first step is to analyze the types of model which is needed to be configured and another important step is to organize the works in the context of devices, as a part of the general system. Often before configuration, as important point is descriptions and documentations from all the works into the respective process, and then to organize in the aspect of problem-solving. The computer network as critic infrastructure is very specific so the paper present the effectiveness solutions in the structured aspect viewed from one side, and another side is, than the paper reflect the positive aspect in the context of modeling and block schema presentations as an better alternative to solve the specific problem because of continually distortions of the system from the line of devices, programs and signals or packed collisions, which are in movement from one computer node to another nodes.Keywords: local area networks, LANs, block schema presentations, computer network system, computer node, critical infrastructure packed collisions, structural control system representations, computer network, implementations, modeling structural representations, companies, computers, context, control systems, internet, software
Procedia PDF Downloads 366505 Flipped Classroom Instruction: Reflecting on the Experiences of Teachers and Students at Undergraduate University Level
Authors: Mubeshera Tufail
Abstract:
The purpose of the study was to explore the experiences and challenges faced by teachers and students with Flipped Classroom Instruction (FCI) for an undergraduate course at university level. The Flipped Classroom lesson plan consisted of two components: one was out-of-class component consisting of learning material for reading for students and other was within-class component involving a class quiz, class activity and the feedback/further reading task. Besides, experiences, the research study also covered the adaptations made to improve their experiences with Flipped Classroom during the study. The phenomenological research strategy was used for this research study. The data consisted of weekly reflective journals documented by class teacher and students. The reflective journals were recorded by teacher and students while working in Flipped Classroom for an undergraduate course at university level. The main challenges highlighted by teacher were related to effort and time required for planning, time management and students' guidance for shift of their role from passive to independent learner. The main challenges found in reflective journals of students were personal computers issue, electricity and internet speed issue. It is recommended to adapt to some locally useful lesson planning and classroom management techniques to enhance the effectiveness of Flipped Classroom Instruction in an undergraduate university level course.Keywords: flipped classroom instruction, undergraduate students, independent learner, technology-integrated classroom
Procedia PDF Downloads 163504 Flow: A Fourth Musical Element
Authors: James R. Wilson
Abstract:
Music is typically defined as having the attributes of melody, harmony, and rhythm. In this paper, a fourth element is proposed -"flow". "Flow" is a new dimension in music that has always been present but only recently identified and measured. The Adagio "Flow Machine" enables us to envision this component and even suggests a new approach to music theory and analysis. The Adagio was created specifically to measure the underlying “flow” in music. The Adagio is an entirely new way to experience and visualize the music, to assist in performing music (both as a conductor and/or performer), and to provide a whole new methodology for music analysis and theory. The Adagio utilizes musical “hit points”, such as a transition from one musical section to another (for example, in a musical composition utilizing the sonata form, a transition from the exposition to the development section) to help define the compositions flow rate. Once the flow rate is established, the Adagio can be used to determine if the composer/performer/conductor has correctly maintained the proper rate of flow throughout the performance. An example is provided using Mozart’s Piano Concerto Number 21. Working with the Adagio yielded an unexpected windfall; it was determined via an empirical study conducted at Nova University’s Biofeedback Lab that watching the Adagio helped volunteers participating in a controlled experiment recover from stressors significantly faster than the control group. The Adagio can be thought of as a new arrow in the Musicologist's quiver. It provides a new, unique way of viewing the psychological impact and esthetic effectiveness of music composition. Additionally, with the current worldwide access to multi-media via the internet, flow analysis can be performed and shared with others with little time and/or expense.Keywords: musicology, music analysis, music flow, music therapy
Procedia PDF Downloads 179503 When Mobile Work Creates More Discrimination
Authors: Marie-Therese Claes, Anett Hermann
Abstract:
With the advent of the web and information technology since the end of the 20ᵗʰ century, digitalization has revolutionized our everyday life, from shopping and dating to education and transportation. The world of work is one of the areas that has been highly transformed by changing the time and spatial limits of the work. The expansion of the internet, wireless, and easily portable devices such as laptop computers and mobile phones has enabled us to work almost from any place at any time. As a result, telework, which started in the 1950s and elevated in the 1970s, steeply raised to a new level in 21ˢᵗ century. Telework consists of various forms of work done from outside the traditional workplace by using information technologies. The social distancing and lockdown measures that have been taken to reduce the spread of the virus in many countries worldwide resulted in an increasing number of teleworkers and made “working from home’’ synonymous with telework. Post-COVID-19, the number of teleworkers is still higher than before the pandemic period, and the interest in expanding teleworking has been growing too. Notwithstanding the advantages ushered by telework, it also has a number of drawbacks that negatively affect organizations and employees. The intention of this piece of work is not to indicate a causational relationship between telework and discrimination. Our aim is to indicate some unintended and/or unnoticed deleterious effects of telework in reinforcing discrimination and to instigate discussion on how to mitigate the effects. To do so, this insight indicates how telework reinforces traditional gender roles and how organizational culture towards telework and its access to employees at different levels of the organizational hierarchy opens the room for discrimination.Keywords: mobile work, discrimination, gender roles, organizational culture
Procedia PDF Downloads 67502 Classification of Manufacturing Data for Efficient Processing on an Edge-Cloud Network
Authors: Onyedikachi Ulelu, Andrew P. Longstaff, Simon Fletcher, Simon Parkinson
Abstract:
The widespread interest in 'Industry 4.0' or 'digital manufacturing' has led to significant research requiring the acquisition of data from sensors, instruments, and machine signals. In-depth research then identifies methods of analysis of the massive amounts of data generated before and during manufacture to solve a particular problem. The ultimate goal is for industrial Internet of Things (IIoT) data to be processed automatically to assist with either visualisation or autonomous system decision-making. However, the collection and processing of data in an industrial environment come with a cost. Little research has been undertaken on how to specify optimally what data to capture, transmit, process, and store at various levels of an edge-cloud network. The first step in this specification is to categorise IIoT data for efficient and effective use. This paper proposes the required attributes and classification to take manufacturing digital data from various sources to determine the most suitable location for data processing on the edge-cloud network. The proposed classification framework will minimise overhead in terms of network bandwidth/cost and processing time of machine tool data via efficient decision making on which dataset should be processed at the ‘edge’ and what to send to a remote server (cloud). A fast-and-frugal heuristic method is implemented for this decision-making. The framework is tested using case studies from industrial machine tools for machine productivity and maintenance.Keywords: data classification, decision making, edge computing, industrial IoT, industry 4.0
Procedia PDF Downloads 182