Search results for: casual-leisure information behaviors
10872 Application Potential of Selected Tools in Context of Critical Infrastructure Protection and Risk Analysis
Authors: Hromada Martin
Abstract:
Risk analysis is considered as a fundamental aspect relevant for ensuring the level of critical infrastructure protection, where the critical infrastructure is seen as system, asset or its part which is important for maintaining the vital societal functions. Article actually discusses and analyzes the potential application of selected tools of information support for the implementation and within the framework of risk analysis and critical infrastructure protection. Use of the information in relation to their risk analysis can be viewed as a form of simplifying the analytical process. It is clear that these instruments (information support) for these purposes are countless, so they were selected representatives who have already been applied in the selected area of critical infrastructure, or they can be used. All presented fact were the basis for critical infrastructure resilience evaluation methodology development.Keywords: critical infrastructure, protection, resilience, risk analysis
Procedia PDF Downloads 63810871 Information Technology and Professional Behavior: An Empirical Examination of Auditing and Accounting Tasks
Authors: Michael C. Nwaohia
Abstract:
Whereas anecdotal evidence supports the notion that increase in information technology (IT) know-how may enhance output of professionals in the accounting sector, this has not been systematically explored in the Nigerian context. Against this background, this paper examines the correlation between knowledgeability of IT and level of performance at everyday auditing and accounting tasks. It utilizes primary and secondary data from selected business organizations in Lagos, Nigeria. Accounting staff were administered structured questionnaires which, amongst other things, sought to examine knowledge and exposure to information technology prior to joining the firms and current level of performance based on self-reporting and supervisor comments. In addition, exposure to on-the-job IT training and current level of performance was examined. The statistical analysis of the data was done using the SPSS package. The results strongly suggest that prior exposure to IT skills enabled accounting professionals to better flexibly fit into the dynamic environment in which contemporary business takes place. Ultimately, the paper attempts to explicate some of the implications of these findings for individuals and business firms.Keywords: accounting, firms, information technology, professional behavior
Procedia PDF Downloads 23510870 A Guidance to Enhance the Risk Culture among the Organizations
Authors: Najeebah Almahmeed
Abstract:
Risk Management is an evolving subject among organizations that include corporations, governments, non-governmental organizations, and not-for-profit corporations. In order to enhance awareness around the importance of Risk Management and make sure everyone is using it in their day-to-day job, the Risk Culture topic has emerged and gained importance not only in the Finance Sector but also in the National Oil Companies in Kuwait. Risk Culture can be defined as the shared beliefs, attitudes, and behaviors within a company that guide its approach to managing risks. It acts as a connecting force that links policies, procedures, and individuals, influencing how risks are understood and tackled through activities. In this research, benefits of Risk Culture are shared, guidelines are presented to promote a risk aware culture, and fully embed and enforce Risk-based processes and procedures. Moreover, this research demonstrates methodologies of measuring the Risk Culture using specific dimensions and clusters.Keywords: clusters, dimensions, national oil companies, risk culture, risk management
Procedia PDF Downloads 7910869 Information Needs of Cassava Processors on Small-Scale Cassava Processing in Oyo State, Nigeria
Authors: Rafiat Bolanle Fasasi-Hammed
Abstract:
Cassava is an important food crop in rural households of Nigeria. It has a high potential for product diversification, because it can be processed into various products forms for human consumption and can be made into chips for farm animals, and also starch and starch derivatives. However, cassava roots are highly perishable and contain potentially toxic cyanogenic glycosides which necessitate its processing. Therefore, this study was carried out to assess information needs of cassava processors on food safety practices in Oyo State, Nigeria. Simple random sampling technique was used in the selection of 110 respondents for this study. Descriptive statistics and chi-square were used to analyze the data collected. Results of this study showed that the mean age of the respondents was 39.4 years, majority (78.7%) of the respondents was married, 51.9% had secondary education; 45.8% of the respondents have spent more than 12 years in cassava processing. The mean income realized was ₦26,347.50/month from cassava processing. Information on cassava processing got to the respondents through friends, family and relations (73.6%) and fellow cassava processors (58.6%). Serious constraints identified were ineffective extension agents (93.9%), food safety regulatory agencies (88.1%) and inadequate processing and storage facilities (67.8%). Chi-square results showed that significant relationship existed between socio-economic characteristics of the respondents (χ2 = 29.80, df = 2,), knowledge level (χ2 = 9.26, df = 4), constraints (χ2 = 13.11, df = 2) and information needs at p < 0.05 level of significance. The study recommends that there should be regular training on improved cassava processing methods for the cassava processors in the study area.Keywords: information, needs, cassava, Oyo State, processing
Procedia PDF Downloads 30210868 Development of People's Participation in Environmental Development in Pathumthani Province
Authors: Sakapas Saengchai
Abstract:
Study on the development of people's participation in environmental development was a qualitative research method. Data were collected by participant observation, in-depth interview and discussion group in Pathumthani province. The study indicated that 1) People should be aware of environmental information from government agencies. 2) People in the community should be able to brainstorm information, exchange information about community environment development. 3) People should have a role with community leaders. 4) People in the community should have a role to play in the implementation of projects and activities in the development of the environment and 5) citizens, community leaders, village committee have directed the development of the area. Maintaining a community environment with a shared decision. By emphasizing the process of participation, self-reliance, mutual help, and responsibility for one's own community. Community empowerment strengthens the sustainable spatial development of the environment.Keywords: people, participation, community, environment
Procedia PDF Downloads 28010867 Gender Differences in the Impact and Subjective Interpretation of Childhood Sexual Abuse Survivors
Authors: T. Borja-Alvarez, V. Jiménez-Borja, M. Jiménez Borja, C. J. Jiménez-Mosquera
Abstract:
Research on child sexual abuse has predominantly focused on female survivors. This has resulted in less research looking at the particular context in which this abuse takes place for boys and the impact this abuse may have on male survivors. The aim of this study is to examine the sex and age of the perpetrators of child sexual abuse and explore gender differences in the impact along with the subjective interpretation that survivors attribute to these experiences. The data for this study was obtained from Ecuadorian university students (M = 230, F = 293) who reported sexual abuse using the ISPCAN Child Abuse Screening Tool Retrospective version (ICAST-R). Participants completed Horowitz's Impact of Event Scale (IES) and were also requested to choose among neutral, positive, and negative adjectives to describe these experiences. The results indicate that in the case of males, perpetrators were both males (adults =27%, peers =20%, relatives =10.3%, cousins =7.4%) and young females (girlfriends or ex-girlfriends =25.6%, neighborhood =20.7%, school =16.7%, cousins =15.3%, strangers =12.8%). In contrast, almost all females reported that adult males were the perpetrators (relatives =29.6%, neighborhood =11.9%, strangers =19.9%, family friends =9.7%). Regarding the impact of these events, significant gender differences emerged. More females (50%) than males (20%) presented symptoms of post-traumatic stress disorder (PTSD). Gender differences also surfaced in the way survivors interpret their experiences. Almost half of the male participants selected the word “consensual” followed by the words “normal”, “helped me to mature”, “shameful”, “confusing”, and “traumatic”. In contrast, almost all females chose the word “non-consensual” followed by the words “shameful”, “traumatic”, “scary”, and “confusing”. In conclusion, the findings of this study suggest that young females and adult males were the most common perpetrators of sexually abused boys whereas adult males were the most common perpetrators of sexually abused girls. The impact and the subjective interpretation of these experiences were more negative for girls than for boys. The factors that account for the gender differences in the impact and the interpretation of these experiences need further exploration. It is likely that the cultural expectations of sexual behaviors for boys and girls in Latin American societies may partially explain the differential impact in the way these childhood sexual abuse experiences are interpreted in adulthood. In Ecuador, as is the case in other Latin American countries, the machismo culture not only accepts but encourages early sexual behaviors in boys and negatively judges premature sexual behavior in females. The result of these different sexual expectations may be that sexually abused boys may re-define these experiences as “consensual” and “normal” in adulthood, even though these were not consensual at the time of occurrence. Future studies are needed to more deeply understand the different contexts of sexual abuse for boys and girls in order to analyze the long-term impact of these experiences.Keywords: abuse, child, gender differences, sexual
Procedia PDF Downloads 10410866 Adopted Method of Information System Strategy for Knowledge Management System: A Literature Review
Authors: Elin Cahyaningsih, Dana Indra Sensuse, Wahyu Catur Wibowo, Sofiyanti Indriasari
Abstract:
Bureaucracy reform program drives Indonesian government to change their management and supporting unit in order to enhance their organization performance. Information technology as one of supporting unit became one of strategic plan that organization tried to improve, because IT can automate and speed up process, reduce business process life cycle become more effective and efficient. Knowledge management system is a technology application for supporting knowledge management implementation in government which is requirement based on problem and potential functionality of each knowledge management process. Define knowledge management that suitable for each organization it is difficult, that why we should make the knowledge management system strategy as an alignment of knowledge management process in the organization. Knowledge management system is one of information system development in people perspective, because this system has high dependency in human interaction and participation. Strategic plan for developing knowledge management system can be determine using some of information system strategic methods. This research conducted to define type of strategic method of information system, stage of activity each method, the strategic method strength and weakness. The author use literature review methods for identify and classify strategic methods of information system for differentiate method type, categorize common activities, strength and weakness. Result of this research are determine and compare six strategic information system methods, there are Balanced Scorecard, Five Force Porter, SWOT analysis, Value Chain Analysis, Risk Analysis and Gap Analysis. Balanced Scorecard and Risk Analysis believe as common strategic method that usually used and have the highest excellence strength.Keywords: knowledge management system, balanced scorecard, five force, risk analysis, gap analysis, value chain analysis, SWOT analysis
Procedia PDF Downloads 47810865 Digital Literacy Transformation and Implications in Institutions of Higher Learning in Kenya
Authors: Emily Cherono Sawe, Elisha Ondieki Makori
Abstract:
Knowledge and digital economies have brought challenges and potential opportunities for universities to innovate and improve the quality of learning. Disruption technologies and information dynamics continue to transform and change the landscape in teaching, scholarship, and research activities across universities. Digital literacy is a fundamental and imperative element in higher education and training, as witnessed during the new norm. COVID-19 caused unprecedented disruption in universities, where teaching and learning depended on digital innovations and applications. Academic services and activities were provided online, including library information services. Information professionals were forced to adopt various digital platforms in order to provide information services to patrons. University libraries’ roles in fulfilling educational responsibilities continue to evolve in response to changes in pedagogy, technology, economy, society, policies, and strategies of parent institutions. Libraries are currently undergoing considerable transformational change as a result of the inclusion of a digital environment. Academic libraries have been at the forefront of providing online learning resources and online information services, as well as supporting students and staff to develop digital literacy skills via online courses, tutorials, and workshops. Digital literacy transformation and information staff are crucial elements reminiscent of the prioritization of skills and knowledge for lifelong learning. The purpose of this baseline research is to assess the implications of digital literacy transformation in institutions of higher learning in Kenya and share appropriate strategies to leverage and sustain teaching and research. Objectives include examining the leverage and preparedness of the digital literacy environment in streamlining learning in the universities, exploring and benchmarking imperative digital competence for information professionals, establishing the perception of information professionals towards digital literacy skills, and determining lessons, best practices, and strategies to accelerate digital literacy transformation for effective research and learning in the universities. The study will adopt a descriptive research design using questionnaires and document analysis as the instruments for data collection. The targeted population is librarians and information professionals, as well as academics in public and private universities teaching information literacy programmes. Data and information are to be collected through an online structured questionnaire and digital face-to-face interviews. Findings and results will provide promising lessons together with best practices and strategies to transform and change digital literacies in university libraries in Kenya.Keywords: digital literacy, digital innovations, information professionals, librarians, higher education, university libraries, digital information literacy
Procedia PDF Downloads 9610864 A Schema of Building an Efficient Quality Gate throughout the Software Development with Tools
Authors: Le Chen
Abstract:
This paper presents an efficient tool platform scheme to ensure quality protection throughout the software development process. The main principle is to manage the information of requirements, design, development, testing, operation and maintenance process with proper tools, and to set up the quality standards of each process. Through the tools’ display and summary of quality standards, the quality standards can be visualizad and ready for policy decision, which is called Quality Gate in this paper. In addition, the tools are also integrated to achieve the exchange and relation of information which highly improving operational efficiency. In this paper, the feasibility of the scheme is verified by practical application of development projects, and the overall information display and data mining are proposed to be further improved.Keywords: efficiency, quality gate, software process, tools
Procedia PDF Downloads 35910863 INCIPIT-CRIS: A Research Information System Combining Linked Data Ontologies and Persistent Identifiers
Authors: David Nogueiras Blanco, Amir Alwash, Arnaud Gaudinat, René Schneider
Abstract:
At a time when the access to and the sharing of information are crucial in the world of research, the use of technologies such as persistent identifiers (PIDs), Current Research Information Systems (CRIS), and ontologies may create platforms for information sharing if they respond to the need of disambiguation of their data by assuring interoperability inside and between other systems. INCIPIT-CRIS is a continuation of the former INCIPIT project, whose goal was to set up an infrastructure for a low-cost attribution of PIDs with high granularity based on Archival Resource Keys (ARKs). INCIPIT-CRIS can be interpreted as a logical consequence and propose a research information management system developed from scratch. The system has been created on and around the Schema.org ontology with a further articulation of the use of ARKs. It is thus built upon the infrastructure previously implemented (i.e., INCIPIT) in order to enhance the persistence of URIs. As a consequence, INCIPIT-CRIS aims to be the hinge between previously separated aspects such as CRIS, ontologies and PIDs in order to produce a powerful system allowing the resolution of disambiguation problems using a combination of an ontology such as Schema.org and unique persistent identifiers such as ARK, allowing the sharing of information through a dedicated platform, but also the interoperability of the system by representing the entirety of the data as RDF triplets. This paper aims to present the implemented solution as well as its simulation in real life. We will describe the underlying ideas and inspirations while going through the logic and the different functionalities implemented and their links with ARKs and Schema.org. Finally, we will discuss the tests performed with our project partner, the Swiss Institute of Bioinformatics (SIB), by the use of large and real-world data sets.Keywords: current research information systems, linked data, ontologies, persistent identifier, schema.org, semantic web
Procedia PDF Downloads 13510862 The Mechanical Properties of a Small-Size Seismic Isolation Rubber Bearing for Bridges
Authors: Yi F. Wu, Ai Q. Li, Hao Wang
Abstract:
Taking a novel type of bridge bearings with the diameter being 100mm as an example, the theoretical analysis, the experimental research as well as the numerical simulation of the bearing were conducted. Since the normal compression-shear machines cannot be applied to the small-size bearing, an improved device to test the properties of the bearing was proposed and fabricated. Besides, the simulation of the bearing was conducted on the basis of the explicit finite element software ANSYS/LS-DYNA, and some parameters of the bearing are modified in the finite element model to effectively reduce the computation cost. Results show that all the research methods are capable of revealing the fundamental properties of the small-size bearings, and a combined use of these methods can better catch both the integral properties and the inner detailed mechanical behaviors of the bearing.Keywords: ANSYS/LS-DYNA, compression shear, contact analysis, explicit algorithm, small-size
Procedia PDF Downloads 18010861 Building Information Modeling-Based Information Exchange to Support Facilities Management Systems
Authors: Sandra T. Matarneh, Mark Danso-Amoako, Salam Al-Bizri, Mark Gaterell
Abstract:
Today’s facilities are ever more sophisticated and the need for available and reliable information for operation and maintenance activities is vital. The key challenge for facilities managers is to have real-time accurate and complete information to perform their day-to-day activities and to provide their senior management with accurate information for decision-making process. Currently, there are various technology platforms, data repositories, or database systems such as Computer-Aided Facility Management (CAFM) that are used for these purposes in different facilities. In most current practices, the data is extracted from paper construction documents and is re-entered manually in one of these computerized information systems. Construction Operations Building information exchange (COBie), is a non-proprietary data format that contains the asset non-geometric data which was captured and collected during the design and construction phases for owners and facility managers use. Recently software vendors developed add-in applications to generate COBie spreadsheet automatically. However, most of these add-in applications are capable of generating a limited amount of COBie data, in which considerable time is still required to enter the remaining data manually to complete the COBie spreadsheet. Some of the data which cannot be generated by these COBie add-ins is essential for facilities manager’s day-to-day activities such as job sheet which includes preventive maintenance schedules. To facilitate a seamless data transfer between BIM models and facilities management systems, we developed a framework that enables automated data generation using the data extracted directly from BIM models to external web database, and then enabling different stakeholders to access to the external web database to enter the required asset data directly to generate a rich COBie spreadsheet that contains most of the required asset data for efficient facilities management operations. The proposed framework is a part of ongoing research and will be demonstrated and validated on a typical university building. Moreover, the proposed framework supplements the existing body of knowledge in facilities management domain by providing a novel framework that facilitates seamless data transfer between BIM models and facilities management systems.Keywords: building information modeling, BIM, facilities management systems, interoperability, information management
Procedia PDF Downloads 11510860 Designing Mobile Application to Motivate Young People to Visit Cultural Heritage Sites
Authors: Yuko Hiramatsu, Fumihiro Sato, Atsushi Ito, Hiroyuki Hatano, Mie Sato, Yu Watanabe, Akira Sasaki
Abstract:
This paper presents a mobile phone application developed for sightseeing in Nikko, one of the cultural world heritages in Japan, using the BLE (Bluetooth Low Energy) beacon. Based on our pre-research, we decided to design our application for young people who walk around the area actively, but know little about the tradition and culture of Nikko. One solution is to construct many information boards to explain; however, it is difficult to construct new guide plates in cultural world heritage sites. The smartphone is a good solution to send such information to such visitors. This application was designed using a combination of the smartphone and beacons, set in the area, so that when a tourist passes near a beacon, the application displays information about the area including a map, historical or cultural information about the temples and shrines, and local shops nearby as well as a bus timetable. It is useful for foreigners, too. In addition, we developed quizzes relating to the culture and tradition of Nikko to provide information based on the Zeigarnik effect, a psychological effect. According to the results of our trials, tourists positively evaluated the basic information and young people who used the quiz function were able to learn the historical and cultural points. This application helped young visitors at Nikko to understand the cultural elements of the site. In addition, this application has a function to send notifications. This function is designed to provide information about the local community such as shops, local transportation companies and information office. The application hopes to also encourage people living in the area, and such cooperation from the local people will make this application vivid and inspire young visitors to feel that the cultural heritage site is still alive today. This is a gateway for young people to learn about a traditional place and understand the gravity of preserving such areas.Keywords: BLE beacon, smartphone application, Zeigarnik effect, world heritage site, school trip
Procedia PDF Downloads 32410859 Markov Characteristics of the Power Line Communication Channels in China
Authors: Ming-Yue Zhai
Abstract:
Due to the multipath and pulse noise nature, power line communications(PLC) channel can be modelled as a memory one with the finite states Markov model(FSMC). As the most important parameter modelling a Markov channel,the memory order in an FSMC is not solved in PLC systems yet. In the paper, the mutual information is used as a measure of the dependence between the different symbols, treated as the received SNA or amplitude of the current channel symbol or that of previous symbols. The joint distribution probabilities of the envelopes in PLC systems are computed based on the multi-path channel model, which is commonly used in PLC. we confirm that given the information of the symbol immediately preceding the current one, any other previous symbol is independent of the current one in PLC systems, which means the PLC channels is a Markov chain with the first-order. The field test is also performed to model the received OFDM signals with the help of AR model. The results show that the first-order AR model is enough to model the fading channel in PLC systems, which means the amount of uncertainty remaining in the current symbol should be negligible, given the information corresponding to the immediately preceding one.Keywords: power line communication, channel model, markovian, information theory, first-order
Procedia PDF Downloads 41210858 The Nursing Profession in Algeria between Humane Treatment and Work Environment Problems - A Field Study
Authors: Bacha Zakaria
Abstract:
This study aimed to investigate the reality of humane treatment and work environment problems for nurses in public hospitals and their repercussions on the patients arriving there. In this curve, our field study was based on a sample of nurses in Algiers hospitals estimated at 100 nurses. The questionnaire prepared by the two researchers was applied face to face with the nurses, and after obtaining and analyzing the data, we concluded the most important results: The presence of many problems in the work environment, such as work pressures, lack of appreciation, verbal and physical violence, risk of infection, poor salary and incentives, working during fatigue, administrative problems etc. And accordingly, The embodiment of humane dealing with patients requires providing a humane work environment for nurses and dealing with them humanely so that they embody positive behaviors while dealing with patients.Keywords: nursing, future, family-focused care, health equity
Procedia PDF Downloads 9210857 Energy-Efficient Contact Selection Method for CARD in Wireless Ad-Hoc Networks
Authors: Mehdi Assefi, Keihan Hataminezhad
Abstract:
One of the efficient architectures for exploring the resources in wireless ad-hoc networks is contact-based architecture. In this architecture, each node assigns a unique zone for itself and each node keeps all information from inside the zone, as well as some from outside the zone, which is called contact. Reducing the overlap between different zones of a node and its contacts increases its performance, therefore Edge Method (EM) is designed for this purpose. Contacts selected by EM do not have any overlap with their sources, but for choosing the contact a vast amount of information must be transmitted. In this article, we will offer a new protocol for contact selection, which is called PEM. The objective would be reducing the volume of transmitted information, using Non-Uniform Dissemination Probabilistic Protocols. Consumed energy for contact selection is a function of the size of transmitted information between nodes. Therefore, by reducing the content of contact selection message using the PEM will decrease the consumed energy. For evaluation of the PEM we applied the simulation method. Results indicated that PEM consumes less energy compared to EM, and by increasing the number of nodes (level of nodes), performance of PEM will improve in comparison with EM.Keywords: wireless ad-hoc networks, contact selection, method for CARD, energy-efficient
Procedia PDF Downloads 29010856 An Augmented-Reality Interactive Card Game for Teaching Elementary School Students
Authors: YuLung Wu, YuTien Wu, ShuMey Yu
Abstract:
Game-based learning can enhance the learning motivation of students and provide a means for them to learn through playing games. This study used augmented reality technology to develop an interactive card game as a game-based teaching aid for delivering elementary school science course content with the aim of enhancing student learning processes and outcomes. Through playing the proposed card game, students can familiarize themselves with appearance, features, and foraging behaviors of insects. The system records the actions of students, enabling teachers to determine their students’ learning progress. In this study, 37 students participated in an assessment experiment and provided feedback through questionnaires. Their responses indicated that they were significantly more motivated to learn after playing the game, and their feedback was mostly positive.Keywords: game-based learning, learning motivation, teaching aid, augmented reality
Procedia PDF Downloads 37510855 Utilizing Radio as a Resource Alternative for Disseminating Information to University Students in Ibadan, Nigeria: A Study of Lead City FM and Diamond FM Radio Stations
Authors: Olufemi Sunday Onabajo
Abstract:
Radio according to communication scholars is a veritable instrument of mass education. However, its full potentials in boosting higher education have not been realized because of the commercial nature of radio stations in Nigeria. The licensing of campus radio for disseminating information on university curricular is aimed at reinforcing information shared during face to face teaching. This study anchored on Agenda Setting and Technology determinism theories seeks to find out the extent to which university students in Lead City University and University of Ibadan, Nigeria have keyed-in to the philosophy of their campus radio – Lead City FM and Diamond FM in making information dissemination in their domiciled universities less cumbersome. The study employs both qualitative and quantitative methods though the use of depth interview for ten (10) academic staff and five (5) radio personnel of both radio stations; and a questionnaire addressed to 200 students of both institutions using the systematic random sampling technique. The data collected was analyzed using simple percentage and chi-square one tail test, and it was discovered that students of both universities and their radio personnel are yet to realize the potentials of campus radio as a resource alternative to effective learning, and recommends the coming together of all stakeholders to articulate the way forward.Keywords: disseminating information, effective learning, resource alternative, utilizing radio
Procedia PDF Downloads 29810854 Computer Aided Assembly Attributes Retrieval Methods for Automated Assembly Sequence Generation
Authors: M. V. A. Raju Bahubalendruni, Bibhuti Bhusan Biswal, B. B. V. L. Deepak
Abstract:
Achieving an appropriate assembly sequence needs deep verification for its physical feasibility. For this purpose, industrial engineers use several assembly predicates; namely, liaison, geometric feasibility, stability and mechanical feasibility. However, testing an assembly sequence for these predicates requires huge assembly information. Extracting such assembly information from an assembled product is a time consuming and highly skillful task with complex reasoning methods. In this paper, computer aided methods are proposed to extract all the necessary assembly information from computer aided design (CAD) environment in order to perform the assembly sequence planning efficiently. These methods use preliminary capabilities of three-dimensional solid modelling and assembly modelling methods used in CAD software considering equilibrium laws of physical bodies.Keywords: assembly automation, assembly attributes, assembly, CAD
Procedia PDF Downloads 30510853 Violence of Tyrant Children to Their Parents: An Interdisciplinary Approach
Authors: Marta Maria Aguilar Carceles, Ginesa Torrente Hernandez
Abstract:
The goal of the current study is focused on giving an interdisciplinary comprehension of an increased phenomenon in recent years: violence against parents. Violence can take different forms depending on the context and the vulnerability of the victims, but in this kind of situations, the relationship between parents and young people can become abusive and uncontrollable. Taking a sample from the Spanish Criminal Courts, this study explores those psychological and sociological factors that can contribute to the appearance and continuity of this kind of behaviors in minors. It is considered factors like the type of offence, presence or absence of psychopathology in the subjects, family aspects, or sociodemographic factors, getting a criminal profile of the minor and evaluating which measures are more efficient or adequate in each particular case. Finally, it will be discussed on how getting effective interventions and restorative responses to address teen violence against their parents within the Spanish Legal System.Keywords: criminality, legal system, parents, tyrant sons, violence
Procedia PDF Downloads 14610852 Fatigue Behavior of Dissimilar Welded Monel400 and SS316 by Frictions Stir Welding
Authors: Aboozar Aghaei
Abstract:
In the present work, the dissimilar Monel400 and SS316 were joined by friction stir welding (FSW). The applied rotating speed was 400 rpm, whereas the traverse speed varied between 50 and 150 mm/min. At a constant rotating speed, the sound welds were obtained at the welding speeds of 50 and 100 mm/min. However, a groove-like defect was formed when the welding speed exceeded 100 mm/min. The mechanical properties of the joints were evaluated using tensile and fatigue tests. The fatigue strength of dissimilar FSWed specimens was higher than that of both Monel400 and SS316. To study the failure behavior of FSWed specimens, the fracture surfaces were analyzed using a scanning electron microscope (SEM). The failure analysis indicates that different mechanisms may contribute to the fracture of welds. This was attributed to the dissimilar characteristics of dissimilar materials exhibiting different failure behaviors.Keywords: frictions stir welding (FSW), stainless steel, mechanical properties, Monel400
Procedia PDF Downloads 8310851 Tourism in the Information Age
Authors: Suleyman Karacor
Abstract:
The main purpose of this study is to investigate tourism marketing in the information age because of the importance and sensitivity. In the twenty-first century as a result of today's the increasing competition and product diversification in the tourism sector, tourism businesses must take into account exogenous variables such as new technological developments, commercial experience and consumer demand. In the information age, tourist product consumers tend to reserve their leisure time and expenditure on more active opportunities for different experiences instead of living the same experience again. Increasing the number of agents in the tourism sector, travel opportunities offering different experiences and more intensive use of modern technology helps to present diversification of leisure activities for tourists. From the perspective of tourists, travel costs are still important for buying the touristic products but maintaining a high level of tourist satisfaction is also of increasing importance. Tourists tend to prefer activities that add value. A real tourist product must be able to create value and new priorities for tourists. Therefore this study aims to review recent significant developments in international tourism marketing research and practices. To this end, this study reviews tourism marketing-focused articles.Keywords: information age, tourism marketing, tourism marketing mix, management
Procedia PDF Downloads 42610850 Comparison of Flow and Mixing Characteristics between Non-Oscillating and Transversely Oscillating Jet
Authors: Dinku Seyoum Zeleke, Rong Fung Huang, Ching Min Hsu
Abstract:
Comparison of flow and mixing characteristics between non-oscillating jet and transversely oscillating jet was investigated experimentally. Flow evolution process was detected by using high-speed digital camera, and jet spread width was calculated using binary edge detection techniques by using the long-exposure images. The velocity characteristics of transversely oscillating jet induced by a V-shaped fluidic oscillator were measured using single component hot-wire anemometer. The jet spread width of non-oscillating jet was much smaller than the jet exit gap because of behaving natural jet behaviors. However, the transversely oscillating jet has a larger jet spread width, which was associated with the excitation of the flow by self-induced oscillation. As a result, the flow mixing characteristics desperately improved both near-field and far-field. Therefore, this transversely oscillating jet has a better turbulence intensity, entrainment, and spreading width so that it augments flow-mixing characteristics desperately.Keywords: flow mixing, transversely oscillating, spreading width, velocity characteristics
Procedia PDF Downloads 24810849 Nanotechnology in Conservation of Artworks: TiO2-Based Nanocoatings for the Protection and Preservation of Stone Monuments
Authors: Sayed M. Ahmed, Sawsan S. Darwish, Nagib A. Elmarzugi, Mohammad A. Al-Dosari, Mahmoud A. Adam, Nadia A. Al-Mouallimi
Abstract:
The preservation of cultural heritage is a worldwide problem. Stone monuments represent an important part of this heritage, but due to their prevalently outdoor location, they are generally subject to a complex series of weathering and decay processes, in addition to physical and chemical factors, also biological agents usually play an important role in deterioration phenomena. The aim of this paper is to experimentally verify applicability and feasibility of titanium dioxide (TiO2) nanoparticles for the preservation of historical (architectural, monumental, archaeological) stone surfaces which enables to reduce the deterioration behaviors mentioned above. TiO2 nanoparticles dispersed in an aqueous colloidal suspension were applied directly on travertine (Marble and limestone often used in historical and monumental buildings) by spray-coating in order to obtain a nanometric film on stone samples. SEM, coupled with EDX microanalysis. (SEM-EDX), in order to obtain information oncoating homogeneity, surface morphology before and after aging and penetration depth of the TiO2 within the samples. Activity of the coated surface was evaluated with UV accelerated aging test. Capillary water absorption, thermal aging and colorimetric measurements have been performed on on coated and uncoated samples to evaluate their properties and estimate change of appearance with colour variation. Results show Tio2 nanoparticles good candidate for coating applications on calcareous stone, good water-repellence was observed on the samples after treatment; analyses were carried out on both untreated and freshly treated samples as well as after artificial aging. Colour change showed negligible variations on the coated or uncoated stone as well as after aging. Results showed that treated stone surfaces seem to be not affected after 1000 hours of exposure to UV radiation, no alteration of the original features.Keywords: architectural and archaeological heritage, calcareous stone, photocatalysis TiO2, self-cleaning, thermal aging
Procedia PDF Downloads 27710848 Research on Evaluation Method of Urban Road Section Traffic Safety Status Based on Video Information
Authors: Qiang Zhang, Xiaojian Hu
Abstract:
Aiming at the problem of the existing real-time evaluation methods for traffic safety status, a video information-based urban road section traffic safety status evaluation method was established, and the rapid detection method of traffic flow parameters based on video information is analyzed. The concept of the speed dispersion of the road section that affects the traffic safety state of the urban road section is proposed, and the method of evaluating the traffic safety state of the urban road section based on the speed dispersion of the road section is established. Experiments show that the proposed method can reasonably evaluate the safety status of urban roads in real-time, and the evaluation results can provide a corresponding basis for the traffic management department to formulate an effective urban road section traffic safety improvement plan.Keywords: intelligent transportation system, road traffic safety, video information, vehicle speed dispersion
Procedia PDF Downloads 16410847 Socio-Cultural Adaptation Approach to Enhance Intercultural Collaboration and Learning
Authors: Fadoua Ouamani, Narjès Bellamine Ben Saoud, Henda Hajjami Ben Ghézala
Abstract:
In the last few years and over the last decades, there was a growing interest in the development of Computer Supported Collaborative Learning (CSCL) environments. However, the existing systems ignore the variety of learners and their socio-cultural differences, especially in the case of distant and networked learning. In fact, within such collaborative learning environments, learners from different socio-cultural backgrounds may interact together. These learners evolve within various cultures and social contexts and acquire different socio-cultural values and behaviors. Thus, they should be assisted while communicating and collaborating especially in an intercultural group. Besides, the communication and collaboration tools provided to each learner must depend on and be adapted to her/his socio-cultural profile. The main goal of this paper is to present the proposed socio-cultural adaptation approach based on and guided by ontologies to adapt CSCL environments to the socio-cultural profiles of its users (learners or others).Keywords: CSCL, socio-cultural profile, adaptation, ontology
Procedia PDF Downloads 36010846 Use of Satellite Imaging to Understand Earth’s Surface Features: A Roadmap
Authors: Sabri Serkan Gulluoglu
Abstract:
It is possible with Geographic Information Systems (GIS) that the information about all natural and artificial resources on the earth is obtained taking advantage of satellite images are obtained by remote sensing techniques. However, determination of unknown sources, mapping of the distribution and efficient evaluation of resources are defined may not be possible with the original image. For this reasons, some process steps are needed like transformation, pre-processing, image enhancement and classification to provide the most accurate assessment numerically and visually. Many studies which present the phases of obtaining and processing of the satellite images have examined in the literature study. The research showed that the determination of the process steps may be followed at this subject with the existence of a common whole may provide to progress the process rapidly for the necessary and possible studies which will be.Keywords: remote sensing, satellite imaging, gis, computer science, information
Procedia PDF Downloads 31810845 Brief Cognitive Behavior Therapy (BCBT) in a Japanese School Setting: Preliminary Outcomes on a Single Arm Study
Authors: Yuki Matsumoto, Yuma Ishimoto
Abstract:
Cognitive Behavior Therapy (CBT) with children has shown effective application to various problems such as anxiety and depression. Although there are barriers to access to mental health services including lack of professional services in communities and parental concerns about stigma, school has a significant role to address children’s health problems. Schools are regarded as a suitable arena for prevention and early intervention of mental health problems. In this line, CBT can be adaptable to school education and useful to enhance students’ social and emotional skills. However, Japanese school curriculum is rigorous so as to limit available time for implementation of CBT in schools. This paper describes Brief Cognitive Behavior Therapy (BCBT) with children in a Japanese school setting. The program has been developed in order to facilitate acceptability of CBT in schools and aimed to enhance students’ skills to manage anxiety and difficult behaviors. The present research used a single arm design in which 30 students aged 9-10 years old participated. The authors provided teachers a CBT training workshop (two hours) at two primary schools in Tokyo metropolitan area and recruited participants in the research. A homeroom teacher voluntarily delivered a 6-session BCBT program (15 minutes each) in classroom periods which is called as Kaerinokai, a meeting before leaving school. Students completed a questionnaire sheet at pre- and post-periods under the supervision of the teacher. The sheet included the Spence Child Anxiety Scale (SCAS), the Depression Self-Rating Scale for Children (DSRS), and the Strengths and Difficulties Questionnaire (SDQ). The teacher was asked for feedback after the completion. Significant positive changes were found in the total and five of six sub-scales of the SCAS and the total difficulty scale of the SDQ. However, no significant changes were seen in Physical Injury Fear sub-scale of the SCAS, in the DSRS or the Prosocial sub-scale of the SDQ. The effect sizes are mostly between small and medium. The teacher commented that the program was easy to use and found positive changes in classroom activities and personal relationships. This preliminary research showed the feasibility of the BCBT in a school setting. The results suggest that the BCBT offers effective treatment for reduction in anxiety and in difficult behaviors. There is a good prospect of the BCBT suggesting that BCBT may be easier to be delivered than CBT by Japanese teachers to promote child mental health. The study has limitations including no control group, small sample size, or a short teacher training. Future research should address these limitations.Keywords: brief cognitive behavior therapy, cognitive behavior therapy, mental health services in schools, teacher training workshop
Procedia PDF Downloads 33310844 Structure Domains Tuning Magnetic Anisotropy and Motivating Novel Electric Behaviors in LaCoO₃ Films
Authors: Dechao Meng, Yongqi Dong, Qiyuan Feng, Zhangzhang Cui, Xiang Hu, Haoliang Huang, Genhao Liang, Huanhua Wang, Hua Zhou, Hawoong Hong, Jinghua Guo, Qingyou Lu, Xiaofang Zhai, Yalin Lu
Abstract:
Great efforts have been taken to reveal the intrinsic origins of emerging ferromagnetism (FM) in strained LaCoO₃ (LCO) films. However, some macro magnetic performances of LCO are still not well understood and even controversial, such as magnetic anisotropy. Determining and understanding magnetic anisotropy might help to find the true causes of FM in turn. Perpendicular magnetic anisotropy (PMA) was the first time to be directly observed in high-quality LCO films with different thickness. The in-plane (IP) and out of plane (OOP) remnant magnetic moment ratio of 30 unit cell (u.c.) films is as large as 20. The easy axis lays in the OOP direction with an IP/OOP coercive field ratio of 10. What's more, the PMA could be simply tuned by changing the thickness. With the thickness increases, the IP/OOP magnetic moment ratio remarkably decrease with magnetic easy axis changing from OOP to IP. Such a huge and tunable PMA performance exhibit strong potentials in fundamental researches or applications. What causes PMA is the first concern. More OOP orbitals occupation may be one of the micro reasons of PMA. A cluster-like magnetic domain pattern was found in 30 u.c. with no obvious color contrasts, similar to that of LaAlO₃/SrTiO₃ films. And the nanosize domains could not be totally switched even at a large OOP magnetic field of 23 T. It indicates strong IP characters or none OOP magnetism of some clusters. The IP magnetic domains might influence the magnetic performance and help to form PMA. Meanwhile some possible nonmagnetic clusters might be the reason why the measured moments of LCO films are smaller than the calculated values 2 μB/Co, one of the biggest confusions in LCO films.What tunes PMA seems much more interesting. Totally different magnetic domain patterns were found in 180 u.c. films with cluster magnetic domains surrounded by < 110 > cross-hatch lines. These lines were regarded as structure domain walls (DWs) determined by 3D reciprocal space mapping (RSM). Two groups of in-plane features with fourfold symmetry were observed near the film diffraction peaks in (002) 3D-RSM. One is along < 110 > directions with a larger intensity, which is well match the lines on the surfaces. The other is much weaker and along < 100 > directions, which is from the normal lattice titling of films deposited on cubic substrates. The < 110 > domain features obtained from (103) and (113) 3D-RSMs exhibit similar evolution of the DWs percentages and magnetic behavior. Structure domains and domain walls are believed to tune PMA performances by transform more IP magnetic moments to OOP. Last but not the least, thick films with lots of structure domains exhibit different electrical transport behaviors. A metal-to-insulator transition (MIT) and an angular dependent negative magnetic resistivity were observed near 150 K, higher than FM transition temperature but similar to that of spin-orbital coupling related 1/4 order diffraction peaks.Keywords: structure domain, magnetic anisotropy, magnetic domain, domain wall, 3D-RSM, strain
Procedia PDF Downloads 15310843 The Effectiveness of Using Dramatic Conventions as the Teaching Strategy on Self-Efficacy for Children With Autism Spectrum Disorder
Authors: Tso Sheng-Yang, Wang Tien-Ni
Abstract:
Introduction and Purpose: Previous researchers have documented children with ASD (Autism Spectrum Disorders) prefer to escaping internal privates and external privates when they face tough conditions they can’t control or they don’t like.Especially, when children with ASD need to learn challenging tasks, such us Chinese language, their inappropriate behaviors will occur apparently. Recently, researchers apply positive behavior support strategies for children with ASD to enhance their self-efficacy and therefore to reduce their adverse behaviors. Thus, the purpose of this research was to design a series of lecture based on art therapy and to evaluate its effectiveness on the child’s self-efficacy. Method: This research was the single-case design study that recruited a high school boy with ASD. Whole research can be separated into three conditions. First, baseline condition, before the class started and ended, the researcher collected participant’s competencies of self-efficacy every session. In intervention condition, the research used dramatic conventions to teach the child in Chinese language twice a week.When the data was stable across three documents, the period entered to the maintenance condition. In maintenance condition, the researcher only collected the score of self-efficacynot to do other interventions five times a month to represent the effectiveness of maintenance.The time and frequency of data collection among three conditions are identical. Concerning art therapy, the common approach, e.g., music, drama, or painting is to use art medium as independent variable. Due to visual cues of art medium, the ASD can be easily to gain joint attention with teachers. Besides, the ASD have difficulties in understanding abstract objectives Thus, using the drama convention is helpful for the ASD to construct the environment and understand the context of Classical Chinese. By real operation, it can improve the ASD to understand the context and construct prior knowledge. Result: Bassd on the 10-points Likert scale and research, we product following results. (a) In baseline condition, the average score of self-efficacyis 1.12 points, rangedfrom 1 to 2 points, and the level change is 0 point. (b)In intervention condition, the average score of self-efficacy is 7.66 points rangedfrom 7 to 9 points, and the level change is 1 point. (c)In maintenance condition, the average score of self-efficacy is 6.66 points rangedfrom 6 to 7 points, and the level change is 1 point. Concerning immediacy of change, between baseline and intervention conditions, the difference is 5 points. No overlaps were found between these two conditions. Conclusion: According to the result, we find that it is effective that using dramatic conventions a s teaching strategies to teach children with ASD. The result presents the score of self-efficacyimmediately enhances when the dramatic conventions commences. Thus, we suggest the teacher can use this approach and adjust, based on the student’s trait, to teach the ASD on difficult task.Keywords: dramatic conventions, autism spectrum disorder, slef-efficacy, teaching strategy
Procedia PDF Downloads 83