Search results for: internet culture
3992 Hydrogel Based on Cellulose Acetate Used as Scaffold for Cell Growth
Authors: A. Maria G. Melero, A. M. Senna, J. A. Domingues, M. A. Hausen, E. Aparecida R. Duek, V. R. Botaro
Abstract:
A hydrogel from cellulose acetate cross linked with ethylenediaminetetraacetic dianhydride (HAC-EDTA) was synthesized by our research group, and submitted to characterization and biological tests. Cytocompatibility analysis was performed by confocal microscopy using human adipocyte derived stem cells (ASCs). The FTIR analysis showed characteristic bands of cellulose acetate and hydroxyl groups and the tensile tests evidence that HAC-EDTA present a Young’s modulus of 643.7 MPa. The confocal analysis revealed that there was cell growth at the surface of HAC-EDTA. After one day of culture the cells presented spherical morphology, which may be caused by stress of the sequestration of Ca2+ and Mg2+ ions at the cell medium by HAC-EDTA, as demonstrated by ICP-MS. However, after seven days and 14 days of culture, the cells present fibroblastoid morphology, phenotype expected by this cellular type. The results give efforts to indicate this new material as a potential biomaterial for tissue engineering, in the future in vivo approach.Keywords: cellulose acetate, hydrogel, biomaterial, cellular growth
Procedia PDF Downloads 1953991 Adaptation of Research Methodology in a Culture: A Reflection from Bangladesh
Authors: Umme Habiba Jasmine, Mzikazi Nduna
Abstract:
Due to the dearth of exploratory research in Bangladesh on parenting practices and transmission thereof, there is a lack of information on culture-sensitive methodology in studying this topic. This paper aims to share some methodological reflections from the research field, which will address this knowledge gap. Eleven dyads of biological mothers and maternal grandmothers of school-going children constituted the sample, and a female fieldworker conducted one-to-one, semi-structured, in-depth interviews with them. The participants were recruited through purposive sampling through a representative of a cooperative society in Mirpur area in Bangladesh. Four dyads of the sample outside that eleven dyads were discarded because of the unavailability of the other participant of the dyads or unsuitability for an in-depth interview. The sample recruitment strategy of approaching mothers without their known reference body had to be discarded because of existing social insecurity in Dhaka city. To meet the cultural demand of the research field the researcher had to change in the research plan and comply with the cultural tradition of mutual entertainment with food while conducting interviews which helped in engaging in positive interaction. Also, the researcher had to compromise the strict confidentiality to a collectivistic sense of confidentiality of the in-depth interview sessions. This study suggests future researchers to investigate Bangladeshi traditional practices and accommodate the applicable ones in their research plan for qualitative studies, especially the Bengali tradition of hospitality and shared confidentiality for building rapport and for proper access to the targeted information and research participants. Sample recruitment should always accompany a well-accepted reference person in the targeted research field.Keywords: confidentiality, culture-sensitive, ethics, parenting practices, sampling
Procedia PDF Downloads 1093990 Understanding Chromosome Movement in Starfish Oocytes
Authors: Bryony Davies
Abstract:
Many cell and tissue culture practices ignore the effects of gravity on cell biology, and little is known about how cell components may move in response to gravitational forces. Starfish oocytes provide an excellent model for interrogating the movement of cell components due to their unusually large size, ease of handling, and high transparency. Chromosomes from starfish oocytes can be visualised by microinjection of the histone-H2B-mCherry plasmid into the oocytes. The movement of the chromosomes can then be tracked by live-cell fluorescence microscopy. The results from experiments using these methods suggest that there is a replicable downward movement of centrally located chromosomes at a median velocity of 0.39 μm/min. Chromosomes nearer the nuclear boundary showed more restricted movement. Chromosome density and shape could also be altered by microinjection of restriction enzymes, primarily Alu1, before imaging. This was found to alter the speed of chromosome movement, with chromosomes from Alu1-injected nuclei showing a median downward velocity of 0.60 μm/min. Overall, these results suggest that there is a non-negligible movement of chromosomes in response to gravitational forces and that this movement can be altered by enzyme activity. Future directions based on these results could interrogate if this observed downward movement extends to other cell components and to other cell types. Additionally, it may be important to understand whether gravitational orientation and vertical positioning of cell components alter cell behaviour. The findings here may have implications for current cell culture practices, which do not replicate cell orientations or external forces experienced in vivo. It is possible that a failure to account for gravitational forces in 2D cell culture alters experimental results and the accuracy of conclusions drawn from them. Understanding possible behavioural changes in cells due to the effects of gravity would therefore be beneficial.Keywords: starfish, oocytes, live-cell imaging, microinjection, chromosome dynamics
Procedia PDF Downloads 1043989 Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-To-Peer Network
Authors: Muntadher Sallal, Gareth Owenson, Mo Adda, Safa Shubbar
Abstract:
Bitcoin is a digital currency based on a peer-to-peer network to propagate and verify transactions. Bitcoin is gaining wider adoption than any previous crypto-currency. However, the mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical topology can cause a delay overhead in information propagation, which makes the system vulnerable to double-spend attacks. Aiming at alleviating the propagation delay problem, this paper introduces proximity-aware extensions to the current Bitcoin protocol, named Master Node Based Clustering (MNBC). The ultimate purpose of the proposed protocol, that are based on how clusters are formulated and how nodes can define their membership, is to improve the information propagation delay in the Bitcoin network. In MNBC protocol, physical internet connectivity increases, as well as the number of hops between nodes, decreases through assigning nodes to be responsible for maintaining clusters based on physical internet proximity. We show, through simulations, that the proposed protocol defines better clustering structures that optimize the performance of the transaction propagation over the Bitcoin protocol. The evaluation of partition attacks in the MNBC protocol, as well as the Bitcoin network, was done in this paper. Evaluation results prove that even though the Bitcoin network is more resistant against the partitioning attack than the MNBC protocol, more resources are needed to be spent to split the network in the MNBC protocol, especially with a higher number of nodes.Keywords: Bitcoin network, propagation delay, clustering, scalability
Procedia PDF Downloads 1153988 Another Beautiful Sounds: Building the Memory of Sound of Peddling in Beijing with Digital Technology
Authors: Dan Wang, Qing Ma, Xiaodan Wang, Tianjiao Qi
Abstract:
The sound of peddling in Beijing, also called “yo-heave-ho” or “cry of one's ware”, is a unique folk culture and usually found in Beijing hutong. For the civilians in Beijing, sound of peddling is part of their childhood. And for those who love the traditional culture of Beijing, it is an old song singing the local conditions and customs of the ancient city. For example, because of his great appreciation, the British poet Osbert Stewart once put sound of peddling which he had heard in Beijing as a street orchestra performance in the article named "Beijing's sound and color".This research aims to collect and integrate the voice/photo resources and historical materials of sound concerning peddling in Beijing by digital technology in order to protect the intangible cultural heritage and pass on the city memory. With the goal in mind, the next stage is to collect and record all the materials and resources based on the historical documents study and interviews with civilians or performers. Then set up a metadata scheme (which refers to the domestic and international standards such as "Audio Data Processing Standards in the National Library", DC, VRA, and CDWA, etc.) to describe, process and organize the sound of peddling into a database. In order to fully show the traditional culture of sound of peddling in Beijing, web design and GIS technology are utilized to establish a website and plan holding offline exhibitions and events for people to simulate and learn the sound of peddling by using VR/AR technology. All resources are opened to the public and civilians can share the digital memory through not only the offline experiential activities, but also the online interaction. With all the attempts, a multi-media narrative platform has been established to multi-dimensionally record the sound of peddling in old Beijing with text, images, audio, video and so on.Keywords: sound of peddling, GIS, metadata scheme, VR/AR technology
Procedia PDF Downloads 3043987 Circulating Public Perception on Agroforestry: Discourse Networks Analysis Using Social Media and Online News Media in Four Countries of the Sahel Region
Authors: Luisa Müting, Wisnu Harto Adiwijoyo
Abstract:
Agroforestry systems transform the agricultural landscapes in the Sahel region of Africa, providing food and farming products consumed for subsistence or sold for income. In the incrementally dry climate of the Sahel region, the spreading of agroforestry practices is integral for policymaker efforts to counteract land degradation and provide soil restoration in the region. Several measures on agroforestry practices have been implemented in the region by governmental and non-governmental institutions in recent years. However, despite the efforts, past research shows that awareness of how policies and interventions are being consumed and perceived by the public remains low. Therefore, interpreting public policy dilemmas by analyzing the public perception regarding agroforestry concepts and practices is necessary. Public perceptions and discourses can be an essential driver or constraint for the adoption of agroforestry practices in the region. Thus, understanding the public discourse behavior of crucial stakeholders could assist policymakers in developing inclusive and contextual policies that are relevant to the context of agroforestry adoption in Sahel region. To answer how information about agroforestry spreads and is perceived by the public. As internet usage increased drastically over the past decade, reaching a share of 33 percent of the population being connected to the internet, this research is based on online conversation data. Social media data from Facebook are gathered daily between April 2021 and April 2022 in Djibouti, Senegal, Mali, and Nigeria based on their share of active internet users compared to other countries in the Sahel region. A systematic methodology was applied to the extracted social media using discourse network analysis (DNA). This study then clustered the data by the types of agroforestry practices, sentiments, and country. Additionally, this research extracted the text data from online news media during the same period to pinpoint events related to the topic of agroforestry. The preliminary result indicates that tree management, crops, and livestock integration, diversifying species and genetic resources, and focusing on interactions and productivity across the agricultural system; are the most notable keywords in agroforestry-related conversations within the four countries in the Sahel region. Additionally, approximately 84 percent of the discussions were still dominated by big actors, such as NGO or government actors. Furthermore, as a subject of communication within agroforestry discourse, the Great Green Wall initiative generates almost 60 percent positive sentiment within the captured social media data, effectively having a more significant outreach than general agroforestry topics. This study provides an understanding for scholars and policymakers with a springboard for further research or policy design on agroforestry in the four countries of the Sahel region with systematically uncaptured novel data from the internet.Keywords: sahel, djibouti, senegal, mali, nigeria, social networks analysis, public discourse analysis, sentiment analysis, content analysis, social media, online news, agroforestry, land restoration
Procedia PDF Downloads 1013986 Innovation of a New Plant Tissue Culture Medium for Large Scale Plantlet Production in Potato (Solanum tuberosum L.)
Authors: Ekramul Hoque, Zinat Ara Eakut Zarin, Ershad Ali
Abstract:
The growth and development of explants is governed by the effect of nutrient medium. Ammonium nitrate (NH4NO3) as a major salt of stock solution-1 for the preparation of tissue culture medium. But, it has several demerits on human civilization. It is use for the preparation of bomb and other destructive activities. Hence, it is totally ban in our country. A new chemical was identified as a substitute of ammonium nitrate. The concentrations of the other ingredients of major and minor salt were modified from the MS medium. The formulation of new medium is totally different from the MS nutrient composition. The most widely use MS medium composition was used as first check treatment and MS powder (Duchefa Biocheme, The Netherland) was used as second check treatment. The experiments were carried out at the Department of Biotechnology, Sher-e-Bangla Agricultural University, Dhaka, Bangladesh. Two potato varieties viz. Diamant and Asterix were used as experimental materials. The regeneration potentiality of potato onto new medium was best as compare with the two check treatments. The traits -node number, leaf number, shoot length, root lengths were highest in new medium. The plantlets were healthy, robust and strong as compare to plantlets regenerated from check treatments. Three subsequent sub-cultures were made in the new medium to observe the growth pattern of plantlet. It was also showed the best performance in all the parameter under studied. The regenerated plantlet produced good quality minituber under field condition. Hence, it is concluded that, a new plant tissue culture medium as discovered from the Department of Biotechnology, Sher-e-Bangla Agricultural University, Dhaka, Bangladesh under the leadership of Professor Dr. Md. Ekramul Hoque.Keywords: new medium, potato, regeneration, ammonium nitrate
Procedia PDF Downloads 953985 A Study on How to Develop the Usage Metering Functions of BIM (Building Information Modeling) Software under Cloud Computing Environment
Authors: Kim Byung-Kon, Kim Young-Jin
Abstract:
As project opportunities for the Architecture, Engineering and Construction (AEC) industry have grown more complex and larger, the utilization of BIM (Building Information Modeling) technologies for 3D design and simulation practices has been increasing significantly; the typical applications of the BIM technologies include clash detection and design alternative based on 3D planning, which have been expanded over to the technology of construction management in the AEC industry for virtual design and construction. As for now, commercial BIM software has been operated under a single-user environment, which is why initial costs for its introduction are very high. Cloud computing, one of the most promising next-generation Internet technologies, enables simple Internet devices to use services and resources provided with BIM software. Recently in Korea, studies to link between BIM and cloud computing technologies have been directed toward saving costs to build BIM-related infrastructure, and providing various BIM services for small- and medium-sized enterprises (SMEs). This study addressed how to develop the usage metering functions of BIM software under cloud computing architecture in order to archive and use BIM data and create an optimal revenue structure so that the BIM services may grow spontaneously, considering a demand for cloud resources. To this end, the author surveyed relevant cases, and then analyzed needs and requirements from AEC industry. Based on the results & findings of the foregoing survey & analysis, the author proposed herein how to optimally develop the usage metering functions of cloud BIM software.Keywords: construction IT, BIM (Building Information Modeling), cloud computing, BIM-based cloud computing, 3D design, cloud BIM
Procedia PDF Downloads 5063984 The Misuse of Social Media in Order to Exploit "Generation Y"; The Tactics of IS
Authors: Ali Riza Perçin, Eser Bingül
Abstract:
Internet technologies have created opportunities with which people share their ideologies, thoughts and products. This virtual world, named social media has given the chance of gathering individual users and people from the world's remote locations and establishing an interaction between them. However, to an increasingly higher degree terrorist organizations today use the internet and most notably social-network media to create the effects they desire through a series of on-line activities. These activities, designed to support their activities, include information collection (intelligence), target selection, propaganda, fundraising and recruitment to name a few. Meanwhile, these have been used as the most important tool for recruitment especially from the different region of the world, especially disenfranchised youth, in the West in order to mobilize support and recruit “foreign fighters.” The recruits have obtained the statue, which is not accessible in their society and have preferred the style of life that is offered by the terrorist organizations instead of their current life. Like other terrorist groups, for a while now the terrorist organization Islamic State (IS) in Iraq and Syria has employed a social-media strategy in order to advance their strategic objectives. At the moment, however, IS seems to be more successful in their on-line activities than other similar organizations. IS uses social media strategically as part of its armed activities and for the sustainability of their military presence in Syria and Iraq. In this context, “Generation Y”, which could exist at the critical position and undertake active role, has been examined. Additionally, the explained characteristics of “Generation Y” have been put forward and the duties of families and society have been stated as well.Keywords: social media, "generation Y", terrorist organization, islamic state IS
Procedia PDF Downloads 4263983 The Science of Successful Intimate Relationship in China: A Discourse Analytic Examination of Sex and Relationships Advice in Ayawawa’s Book
Authors: Hanlei Yang
Abstract:
As a kind of popular culture in modern China, advice book on intimate relationship is turning into an important and controversial site with conflicts among neoliberalism, authoritative socialism, market-oriented principles, the science of successful sex and relationship, cosmopolitan notions of nuclear families, and the revitalization of Confucian conservatism and patriarchy. Accelerated modernization and marketization has contributed to great changes in China’s culture and social relations, which accordingly reconceptualizes and reconstructs family structures and moral ethics, particularly urban middle-class nuclear families. To comprehend the meaning of advice book fad in moral and social order, this research proposes to (i) understand the implication of Ayawawa through discourse analysis and how she mobilizes rhetorical devices and cultural resources to present a persuasive and scientific method of managing intimate relationship, (ii) examine the critical role of neoliberalism, post-feminism, and Confucian patriarchy assumed by Ayawawa in her books, (iii) explore how Ayawawa and her fans engage in establishing a model of intimate relationship and sexual subjectivity ordered by neoliberalism, class identity and authoritative socialism. Finally, this research argues that such new fad of a cultural phenomenon is gradually completed in the process of cooperation and negotiation of the state, commercial institutions, and intellectual elite agents. It helps to further learn about (i) the routine life under the influence of neoliberalism and modern hegemony, (ii) the perplexing relationship between China's indigenous cultural forms, global socio-economic and cultural influences in the late modern era.Keywords: cultural study, intimate relationship, culture sociology, gender study
Procedia PDF Downloads 1393982 Deployment of Beyond 4G Wireless Communication Networks with Carrier Aggregation
Authors: Bahram Khan, Anderson Rocha Ramos, Rui R. Paulo, Fernando J. Velez
Abstract:
With the growing demand for a new blend of applications, the users dependency on the internet is increasing day by day. Mobile internet users are giving more attention to their own experiences, especially in terms of communication reliability, high data rates and service stability on move. This increase in the demand is causing saturation of existing radio frequency bands. To address these challenges, researchers are investigating the best approaches, Carrier Aggregation (CA) is one of the newest innovations, which seems to fulfill the demands of the future spectrum, also CA is one the most important feature for Long Term Evolution - Advanced (LTE-Advanced). For this purpose to get the upcoming International Mobile Telecommunication Advanced (IMT-Advanced) mobile requirements (1 Gb/s peak data rate), the CA scheme is presented by 3GPP, which would sustain a high data rate using widespread frequency bandwidth up to 100 MHz. Technical issues such as aggregation structure, its implementations, deployment scenarios, control signal techniques, and challenges for CA technique in LTE-Advanced, with consideration of backward compatibility, are highlighted in this paper. Also, performance evaluation in macro-cellular scenarios through a simulation approach is presented, which shows the benefits of applying CA, low-complexity multi-band schedulers in service quality, system capacity enhancement and concluded that enhanced multi-band scheduler is less complex than the general multi-band scheduler, which performs better for a cell radius longer than 1800 m (and a PLR threshold of 2%).Keywords: component carrier, carrier aggregation, LTE-advanced, scheduling
Procedia PDF Downloads 1993981 Garden Culture in Islamic Civilization: A Glance at the Birth, Development and Current Situation
Authors: Parisa Göker
Abstract:
With the birth of Islam, the definitions of paradise in Quran have spread across three continents since 7th century, showing itself in the palace gardens as a reflection of Islamic Culture. The design characteristics of Islamic gardens come forth with the influence of religious beliefs, as well as taking its form as per the cultural, climatic and soil characteristics of its geography, and showing its difference. It is possible to see these differences from the garden examples that survived to present time from the civilizations in the lands of Islamic proliferation. The main material of this research is the Islamic gardens in Iran and Spain. Field study was carried out in Alhambra Palace in Spain, Granada and Shah Goli garden in Iran, Tabriz. In this study, the birth of Islamic gardens, spatial perception of paradise, design principles, spatial structure, along with the structural/plantation materials used are examined. Also the characteristics and differentiation of the gardens examined in different cultures and geographies have been revealed. In the conclusion section, Iran and Spain Islamic garden samples were evaluated and their properties were determined.Keywords: Islamic civilization, Islamic architecture, cultural landscape, Islamic garden
Procedia PDF Downloads 1303980 Constructing the Cult of the Self: On White, Working-Class Males and the Neoliberalisation of Identities: An Autoethnographic Study
Authors: Dane B. Norris
Abstract:
This paper offers a reflective and reflexive examination of the lived reality of a group of young white, working-class males engaging in secondary education in England at a time when this population is widely recognised as the lowest attaining ethnic group within British schools. The focus of the paper is an exploration of the development of identities and aspirations alongside contemporary demographic shifts in the British population within the intersection of neoliberal education policies and the emerging ideological conflict between identity conservatism and liberalism. The construction and performance of intersecting social-class, gender, ethnic and national identities are considered, as well as the process through which socially constructed narratives inform identities and aspirations. Evocative autoethnography is then employed to offer reflections on working-class habitus and, in particular, classed and gendered codes that underpin expectations of manhood in post-industrial culture within an education system which seemingly requires the abandonment of aspects of a working-class background, affiliation, and identity. Findings from the study identify the emergence of a culture of hyper-individualisation amongst white, working-class males in schools and a belief in the meritocratic ideologies of the New Right. In particular, the breakdown of the social contract, including notions of political and civic responsibility, coupled with the symbolic violence perpetrated against working-class culture and solidarity in British schools, have all informed the construction of working-class masculinity which values the individual entrepreneur over the collective and depoliticizes students to an extent where a focus on the spectacle and performance of success has replaced individual and collective investment in community.Keywords: education, identity, masculinity, neoliberalism, working-class
Procedia PDF Downloads 1013979 The Production of B-Group Vitamin by Lactic Acid Bacteria and Its Importance in Food Industry
Authors: Goksen Arik, Mihriban Korukluoglu
Abstract:
Lactic acid bacteria (LAB) has been used commonly in the food industry. They can be used as natural preservatives because acidifying carried out in the medium can protect the last product against microbial spoilage. Besides, other metabolites produced by LAB during fermentation period have also an antimicrobial effect on pathogen and spoilage microorganisms in the food industry. LAB are responsible for the desirable and distinctive aroma and flavour which are observed in fermented food products such as pickle, kefir, yogurt, and cheese. Various LAB strains are able to produce B-group vitamins such as folate (B11), riboflavin (B2) and cobalamin (B12). Especially wild-type strains of LAB can produce B-group vitamins in high concentrations. These cultures may be used in food industry as a starter culture and also the microbial strains can be used in encapsulation technology for new and functional food product development. This review is based on the current applications of B-group vitamin producing LAB. Furthermore, the new technologies and innovative researches about B vitamin production in LAB have been demonstrated and discussed for determining their usage availability in various area in the food industry.Keywords: B vitamin, food industry, lactic acid bacteria, starter culture, technology
Procedia PDF Downloads 3903978 The Issue of Online Fake News and Disinformation: Criminal and Criminological Aspects of Prevention
Authors: Fotios Spyropoulos, Evangelia Androulaki, Vasileios Karagiannopoulos, Aristotelis Kompothrekas, Nikolaos Karagiannis
Abstract:
The problem of 'fake news' and 'hoaxes' has dominated in recent years the field of news, politics, economy, safety, and security as dissemination of false information can intensively affect and mislead public discourse and public opinion. The widespread use of internet and social media platforms can substantially intensify these effects, which often include public fear and insecurity. Misinformation, malinformation, and disinformation have also been blamed for affecting election results in multiple countries, and since then, there have been efforts to tackle the phenomenon both on national and international level. The presentation will focus on methods of prevention of disseminating false information on social media and on the internet and will discuss relevant criminological views. The challenges that have arisen for criminal law will be covered, taking into account the potential need for a multi-national approach required in order to mitigate the extent and negative impact of the fake news phenomenon. Finally, the analysis will include a discussion on the potential usefulness of non-legal modalities of regulation and crime prevention, especially situational and social measures of prevention and the possibility of combining an array of methods to achieve better results on national and international level. This project has received funding from the Hellenic Foundation for Research and Innovation (HFRI) and the General Secretariat for Research and Technology (GSRT), under grant agreement No 80529.Keywords: cybercrime, disinformation, fake news, prevention
Procedia PDF Downloads 1423977 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis
Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim
Abstract:
As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.Keywords: private information, value, users, perceived risk, online information privacy, attributes
Procedia PDF Downloads 2393976 Factors Affecting Human Resource Managers Information Behavior
Authors: Sevim Oztimurlenk
Abstract:
This is an exploratory study on the information behavior of human resource managers. This study is conducted by using a questionnaire survey and an interview. The data is gathered from 140 HR managers who are members of the People Management Association of Turkey (PERYÖN), and the 15 interviewees were chosen among those 140 survey participants randomly. The goal of this exploratory study is to investigate the impact of some factors (i.e., gender, age, work experience, number of employee reporting, company size, industry type) on HR managers’ information behavior. More specifically, it examines if there is a relationship between those factors and HR managers’ information behavior in terms of what kind of information sources they consult and reviews and whom they prefer to communicate with for information sharing. It also aims to find out additional factors influencing the information behavior of HR managers. The results of the study show that age and industry type are the two factors affecting the information behavior of HR managers, among other factors investigated in terms of information source, use and share. Moreover, personality, technology, education, organizational culture, and culture are the top five factors among the 24 additional factors suggested by HR managers who participated in this study.Keywords: information behavior, information use, information source, information share, human resource managers
Procedia PDF Downloads 1443975 Effects of the Supplementary for Understanding and Preventing Plagiarism on EFL Students’ Writing
Authors: Surichai Butcha, Dararat Khampusaen
Abstract:
As the Internet is recognized as a high potential and powerful educational tool to access sources of knowledge, plagiarism is an increasing unethical issue found in students’ writing. This paper is deriving from the 1st phase of an on-going study investigating the effects of the supplementary on citing sources on undergraduate students’ writing. The 40 participants were divided into 1 experimental group and 1 control group. Both groups were administered with a questionnaire on knowledge and an interview on attitude related to using sources in writing. Only the experimental group undertook the 4 lessons focusing on using outside sources and citing the original work (quoting, synthesizing, summarizing and paraphrasing) were delivered to them via e-learning tools throughout a semester. Participants were required to produce 4 writing tasks after each lesson. The results were concerned with types and factors on using outside sources in writing of Thai undergraduate EFL students from the survey. The interview results supported and clarified the survey result. In addition, the writing rubrics confirmed the types of plagiarism frequently occurred in students’ writing. The results revealed the types and factors on plagiarism including their perceptions on using the outside sources in their writing from the interview. The discussion shed the lights on cultural dimensions of plagiarism in student writing, roles of teachers, library, and university policy on the rate of plagiarism. Also, the findings promoted the awareness on ethics in writing and prevented the rate of potential unintentional plagiarism. Additionally, the results of this phase of study could lead to the appropriate contents to be considered for inclusion in the supplementary on using sources for writing for future research.Keywords: citing source, EFL writing, e-learning, Internet, plagiarism
Procedia PDF Downloads 1493974 Integrated Free Space Optical Communication and Optical Sensor Network System with Artificial Intelligence Techniques
Authors: Yibeltal Chanie Manie, Zebider Asire Munyelet
Abstract:
5G and 6G technology offers enhanced quality of service with high data transmission rates, which necessitates the implementation of the Internet of Things (IoT) in 5G/6G architecture. In this paper, we proposed the integration of free space optical communication (FSO) with fiber sensor networks for IoT applications. Recently, free-space optical communications (FSO) are gaining popularity as an effective alternative technology to the limited availability of radio frequency (RF) spectrum. FSO is gaining popularity due to flexibility, high achievable optical bandwidth, and low power consumption in several applications of communications, such as disaster recovery, last-mile connectivity, drones, surveillance, backhaul, and satellite communications. Hence, high-speed FSO is an optimal choice for wireless networks to satisfy the full potential of 5G/6G technology, offering 100 Gbit/s or more speed in IoT applications. Moreover, machine learning must be integrated into the design, planning, and optimization of future optical wireless communication networks in order to actualize this vision of intelligent processing and operation. In addition, fiber sensors are important to achieve real-time, accurate, and smart monitoring in IoT applications. Moreover, we proposed deep learning techniques to estimate the strain changes and peak wavelength of multiple Fiber Bragg grating (FBG) sensors using only the spectrum of FBGs obtained from the real experiment.Keywords: optical sensor, artificial Intelligence, Internet of Things, free-space optics
Procedia PDF Downloads 633973 Homosexuality and Culture: A Case Study Depicting the Struggles of a Married Lady
Authors: Athulya Jayakumar, M. Manjula
Abstract:
Though there has been a shift in the understanding of homosexuality from being a sin, crime or pathology in the medical and legal perspectives, the acceptance of homosexuality still remains very scanty in the Indian subcontinent. The present case study is a 24-year-old female who has completed a diploma in polytechnic engineering and residing in the state of Kerala. She initially presented with her husband with complaints of lack of sexual desire and non-cooperation from the index client. After an initial few sessions, the client revealed, in an individual session, about her homosexual orientation which was unknown to her family. She has had multiple short-term relations with females and never had any heterosexual orientation/interest. During her adolescence, she was wondering if she could change herself into a male. However, currently, she accepts her gender. She never wanted a heterosexual marriage; but, had to succumb to the pressure of mother, as a result of a series of unexpected incidents at home and had to agree for the marriage, also with a hope that she may change herself into a bi-sexual. The client was able to bond with the husband emotionally but the multiple attempts at sexual intercourse, at the insistence of the husband, had always been non-pleasurable and induced a sense of disgust. Currently, for several months, there has not been any sexual activity. Also, she actively avoids any chance to have a warm communication with him so that she can avoid chances of him approaching her in a sexual manner. The case study is an attempt to highlight the culture and the struggles of a homosexual individual who comes to therapy for wanting to be a ‘normal wife’ despite having knowledge of legal rights and scenario. There is a scarcity of Indian literature that has systematically investigated issues related to homosexuality. Data on prevalence, emotional problems faced and clinical services available are sparse though it is crucial for increasing understanding of sexual behaviour, orientation and difficulties faced in India.Keywords: case study, culture, cognitive behavior therapy, female homosexuality
Procedia PDF Downloads 3453972 A Pragmatic Approach of Memes Created in Relation to the COVID-19 Pandemic
Authors: Alexandra-Monica Toma
Abstract:
Internet memes are an element of computer mediated communication and an important part of online culture that combines text and image in order to generate meaning. This term coined by Richard Dawkings refers to more than a mere way to briefly communicate ideas or emotions, thus naming a complex and an intensely perpetuated phenomenon in the virtual environment. This paper approaches memes as a cultural artefact and a virtual trope that mirrors societal concerns and issues, and analyses the pragmatics of their use. Memes have to be analysed in series, usually relating to some image macros, which is proof of the interplay between imitation and creativity in the memes’ writing process. We believe that their potential to become viral relates to three key elements: adaptation to context, reference to a successful meme series, and humour (jokes, irony, sarcasm), with various pragmatic functions. The study also uses the concept of multimodality and stresses how the memes’ text interacts with the image, discussing three types of relations: symmetry, amplification, and contradiction. Moreover, the paper proves that memes could be employed as speech acts with illocutionary force, when the interaction between text and image is enriched through the connection to a specific situation. The features mentioned above are analysed in a corpus that consists of memes related to the COVID-19 pandemic. This corpus shows them to be highly adaptable to context, which helps build the feeling of connection and belonging in an otherwise tremendously fragmented world. Some of them are created based on well-known image macros, and their humour results from an intricate dialogue between texts and contexts. Memes created in relation to the COVID-19 pandemic can be considered speech acts and are often used as such, as proven in the paper. Consequently, this paper tackles the key features of memes, makes a thorough analysis of the memes sociocultural, linguistic, and situational context, and emphasizes their intertextuality, with special accent on their illocutionary potential.Keywords: context, memes, multimodality, speech acts
Procedia PDF Downloads 2003971 Robust Batch Process Scheduling in Pharmaceutical Industries: A Case Study
Authors: Tommaso Adamo, Gianpaolo Ghiani, Antonio Domenico Grieco, Emanuela Guerriero
Abstract:
Batch production plants provide a wide range of scheduling problems. In pharmaceutical industries a batch process is usually described by a recipe, consisting of an ordering of tasks to produce the desired product. In this research work we focused on pharmaceutical production processes requiring the culture of a microorganism population (i.e. bacteria, yeasts or antibiotics). Several sources of uncertainty may influence the yield of the culture processes, including (i) low performance and quality of the cultured microorganism population or (ii) microbial contamination. For these reasons, robustness is a valuable property for the considered application context. In particular, a robust schedule will not collapse immediately when a cell of microorganisms has to be thrown away due to a microbial contamination. Indeed, a robust schedule should change locally in small proportions and the overall performance measure (i.e. makespan, lateness) should change a little if at all. In this research work we formulated a constraint programming optimization (COP) model for the robust planning of antibiotics production. We developed a discrete-time model with a multi-criteria objective, ordering the different criteria and performing a lexicographic optimization. A feasible solution of the proposed COP model is a schedule of a given set of tasks onto available resources. The schedule has to satisfy tasks precedence constraints, resource capacity constraints and time constraints. In particular time constraints model tasks duedates and resource availability time windows constraints. To improve the schedule robustness, we modeled the concept of (a, b) super-solutions, where (a, b) are input parameters of the COP model. An (a, b) super-solution is one in which if a variables (i.e. the completion times of a culture tasks) lose their values (i.e. cultures are contaminated), the solution can be repaired by assigning these variables values with a new values (i.e. the completion times of a backup culture tasks) and at most b other variables (i.e. delaying the completion of at most b other tasks). The efficiency and applicability of the proposed model is demonstrated by solving instances taken from Sanofi Aventis, a French pharmaceutical company. Computational results showed that the determined super-solutions are near-optimal.Keywords: constraint programming, super-solutions, robust scheduling, batch process, pharmaceutical industries
Procedia PDF Downloads 6183970 Internet-Delivered Cognitive Behaviour Therapy for Depression Comorbid with Diabetes: Preliminary Findings
Authors: Lisa Robins, Jill Newby, Kay Wilhelm, Therese Fletcher, Jessica Smith, Trevor Ma, Adam Finch, Lesley Campbell, Jerry Greenfield, Gavin Andrews
Abstract:
Background:Depression treatment for people living with depression comorbid with diabetes is of critical importance for improving quality of life and diabetes self-management, however depression remains under-recognised and under-treated in this population. Cost—effective and accessible forms of depression treatment that can enhance the delivery of mental health services in routine diabetes care are needed. Provision of internet-delivered Cognitive Behaviour Therapy (iCBT) provides a promising way to deliver effective depression treatment to people with diabetes. Aims:To explore the outcomes of the clinician assisted iCBT program for people with comorbid Major Depressive Disorder (MDD) and diabetes compared to those who remain under usual care. The main hypotheses are that: (1) Participants in the treatment group would show a significant improvement on disorder specific measures (Patient Health Questionnaire; PHQ-9) relative to those in the control group; (2) Participants in the treatment group will show a decrease in diabetes-related distress relative to those in the control group. This study will also examine: (1) the effect of iCBT for MDD on disability (as measured by the SF-12 and SDS), general distress (as measured by the K10), (2) the feasibility of these treatments in terms of acceptability to diabetes patients and practicality for clinicians (as measured by the Credibility/Expectancy Questionnaire; CEQ). We hypothesise that associated disability, and general distress will reduce, and that patients with comorbid MDD and diabetes will rate the program as acceptable. Method:Recruit 100 people with MDD comorbid with diabetes (either Type 1 or Type 2), and randomly allocate to: iCBT (over 10 weeks) or treatment as usual (TAU) for 10 weeks, then iCBT. Measure pre- and post-intervention MDD severity, anxiety, diabetes-related distress, distress, disability, HbA1c, lifestyle, adherence, satisfaction with clinicians input and the treatment. Results:Preliminary results comparing MDD symptom levels, anxiety, diabetes-specific distress, distress, disability, HbA1c levels, and lifestyle factors from baseline to conclusion of treatment will be presented, as well as data on adherence to the lessons, homework downloads, satisfaction with the clinician's input and satisfaction with the mode of treatment generally.Keywords: cognitive behaviour therapy, depression, diabetes, internet
Procedia PDF Downloads 4893969 Applying Concurrent Development Process for the Web Using Aspect-Oriented Approach
Authors: Hiroaki Fukuda
Abstract:
This paper shows a concurrent development process for modern web application, called Rich Internet Application (RIA), and describes its effect using a non-trivial application development. In the last years, RIAs such as Ajax and Flex have become popular based mainly on high-speed network. RIA provides sophisticated interfaces and user experiences, therefore, the development of RIA requires two kinds of engineer: a developer who implements business logic, and a designer who designs interface and experiences. Although collaborative works are becoming important for the development of RIAs, shared resources such as source code make it difficult. For example, if a design of interface is modified after developers have finished business logic implementations, they need to repeat the same implementations, and also tests to verify application’s behavior. MVC architecture and Object-oriented programming (OOP) enables to dividing an application into modules such as interfaces and logic, however, developers and/or designers have to write pieces of code (e.g., event handlers) that make these modules work as an application. On the other hand, Aspect-oriented programming (AOP) is ex- pected to solve complexity of application software development nowadays. AOP provides methods to separate crosscutting concerns that are scattered pieces of code from primary concerns. In this paper, we provide a concurrent development process for RIAs by introducing AOP concept. This process makes it possible to reduce shared resources between developers and designers, therefore they can perform their tasks concurrently. In addition, we describe experiences of development for a practical application using our proposed development process to show its availability.Keywords: aspect-oriented programming, concurrent, development process, rich internet application
Procedia PDF Downloads 3013968 Effects of Seed Culture and Attached Growth System on the Performance of Anammox Hybrid Reactor (AHR) Treating Nitrogenous Wastewater
Authors: Swati Tomar, Sunil Kumar Gupta
Abstract:
The start-up of anammox (anaerobic ammonium oxidation) process in hybrid reactor delineated four distinct phases i.e. cell lysis, lag phase, activity elevation and stationary phase. Cell lysis phase was marked by death and decay of heterotrophic denitrifiers resulting in breakdown of organic nitrogen into ammonium. Lag phase showed initiation of anammox activity with turnover of heterotrophic denitrifiers, which is evident from appearance of NO3-N in the effluent. In activity elevation phase, anammox became the dominant reaction, which can be attributed to consequent reduction of NH4-N into N2 with increased NO3-N in the effluent. Proper selection of mixed seed culture at influent NO2-/NH4+ ratio (1:1) and hydraulic retention time (HRT) of 1 day led to early startup of anammox within 70 days. Pseudo steady state removal efficiencies of NH4+ and NO2- were found as 94.3% and 96.4% respectively, at nitrogen loading rate (NLR) of 0.35 kg N/m3d at an HRT of 1 day. Analysis of the data indicated that attached growth system contributes an additional 11% increase in the ammonium removal and results in an average of 29% reduction in sludge washout rate. Mass balance study of nitrogen indicated that 74.1% of total input nitrogen is converted into N2 gas followed by 11.2% being utilized in biomass development. Scanning electron microscope (SEM) observation of the granular sludge clearly showed the presence of cocci and rod shaped microorganisms intermingled on the external surface of the granules. The average size of anammox granules (1.2-1.5 mm) with an average settling velocity of 45.6 m/h indicated a high degree of granulation resulting into formation of well compacted granules in the anammox process.Keywords: anammox, hybrid reactor, startup, granulation, nitrogen removal, mixed seed culture
Procedia PDF Downloads 1843967 Criminal Law and Internet of Things: Challenges and Threats
Authors: Celina Nowak
Abstract:
The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.Keywords: criminal law, internet of things, privacy, security threats
Procedia PDF Downloads 1623966 Enterpreneurship as a Strategic Tool for Higher Productivity in Nigerian Universities System
Authors: Yahaya Salihu Emeje, Amuchie Austine Anthony
Abstract:
The topic examined the prospects of entrepreneurship as an emerging dynamic and strategic tool in the upliftment of human and non-human resources in the Nigerian university system, with a view of showcasing the abundant positive impact, on the Nigerian University system in particular and Nigerian economy at large. It is end at bringing out the benefits of entrepreneurship in the university system which includes, namely cultivating the culture of enterprise in University system; improvement in the quality and quantity of both human and non-human resources; innovative and creative methods of production; new employment strategies in the University system; improved sources of internal generated revenue; entrepreneurship as the culture of sustainability within and outside the university system. Secondary data was used in analyzing entrepreneurship as a productivity tool in the Nigeria University system. From the findings, the university system could be enriched through innovative ideas and technical revenue and employment generation; sustainable financial and economic base; university autonomy and improved international ranking of Nigerian Universities system; therefore, recommended that entrepreneurship is necessary therapy for reviving the ailing, Nigerian universities system.Keywords: entrepreneurship, strategic, productivity, universities
Procedia PDF Downloads 3943965 The Integration of ICT in EFL Classroom and Its Impact on Teacher Development
Authors: Tayaa Karima, Bouaziz Amina
Abstract:
Today's world is knowledge-based; everything we do is somehow connected with technology which it has a remarkable influence on socio-cultural and economic developments, including educational settings. This type of technology is supported in many teaching/learning setting where the medium of instruction is through computer technology, and particularly involving digital technologies. There has been much debate over the use of computers and the internet in foreign language teaching for more than two decades. Various studies highlights that the integration of Information Communications Technology (ICT) in foreign language teaching will have positive effects on both the teachers and students to help them be aware of the modernized world and meet the current demands of the globalised world. Information and communication technology has been gradually integrated in foreign learning environment as a platform for providing learners with learning opportunities. Thus, the impact of ICT on language teaching and learning has been acknowledged globally, this is because of the fundamental role that it plays in the enhancement of teaching and learning quality, modify the pedagogical practice, and motivate learners. Due to ICT related developments, many Maghreb countries regard ICT as a tool for changes and innovations in education. Therefore, the ministry of education attempted to set up computer laboratories and provide internet connection in the schools. Investment in ICT for educational innovations and improvement purposes has been continuing the need of teacher who will employ it in the classroom as vital role of the curriculum. ICT does not have an educational value in itself, but it becomes precious when teachers use it in learning and teaching process. This paper examines the impacts of ICT on teacher development rather than on teaching quality and highlights some challenges facing using ICT in the language learning/teaching.Keywords: information communications technology (ICT), integration, foreign language teaching, teacher development, learning opportunity
Procedia PDF Downloads 3883964 Burial Findings in Prehistory Qatar: Archaeological Perspective
Authors: Sherine El-Menshawy
Abstract:
Death, funerary beliefs and customs form an essential feature of belief systems and practices in many cultures. It is evident that during the pre-historical periods, various techniques of corpses burial and funerary rituals were conducted. Occasionally, corpses were merely buried in the sand, or in a grave where the body is placed in a contracted position- with knees drawn up under the chin and hands normally lying before the face- with mounds of sand, marking the grave or the bodies were burnt. However, common practice, that was demonstrable in the archaeological record, was burial. The earliest graves were very simple consisting of a shallow circular or oval pits in the ground. The current study focuses on the material culture at Qatar during the pre-historical period, specifically their funerary architecture and burial practices. Since information about burial customs and funerary practices in Qatar prehistory is both scarce and fragmentary, the importance of such study is to answer research questions related to funerary believes and burial habits during the early stages of civilization transformations at prehistory Qatar compared with Mesopotamia, since chronologically, the earliest pottery discovered in Qatar belongs to prehistoric Ubaid culture of Mesopotamia, that was collected from the excavations. This will lead to deep understanding of life and social status in pre-historical period at Qatar. The research also explores the relationship between pre-history Qatar funerary traditions and those of neighboring cultures in the Mesopotamia and Ancient Egypt, with the aim of ascertaining the distinctive aspects of pre-history Qatar culture, the reception of classical culture and the role it played in the creation of local cultural identities in the Near East. Methodologies of this study based on published books and articles in addition to unpublished reports of the Danish excavation team that excavated in and around Doha, Qatar archaeological sites from the 50th. The study is also constructed on compared material related to burial customs found in Mesopotamia. Therefore this current research: (i) Advances knowledge of the burial customs of the ancient people who inhabited Qatar, a study which is unknown recently to scholars, the study though will apply deep understanding of the history of ancient Qatar and its culture and values with an aim to share this invaluable human heritage. (ii) The study is of special significance for the field of studies, since evidence derived from the current study has great value for the study of living conditions, social structure, religious beliefs and ritual practices. (iii) Excavations brought to light burials of different categories. The graves date to the bronze and Iron ages. Their structure varies between mounds above the ground or burials below the ground level. Evidence comes from sites such as Al-Da’asa, Ras Abruk, and Al-Khor. Painted Ubaid sherds of Mesopotamian culture have been discovered in Qatar from sites such as Al-Da’asa, Ras Abruk, and Bir Zekrit. In conclusion, there is no comprehensive study which has been done and lack of general synthesis of information about funerary practices is problematic. Therefore, the study will fill in the gaps in the area.Keywords: archaeological, burial, findings, prehistory, Qatar
Procedia PDF Downloads 1503963 The Role of Law Corruption and Culture in Investment Fund Manager Fees
Authors: Samir Assal
Abstract:
This paper considers an international sample of venture capital and private equity funds to assess the role of law, corruption and culture in setting fund manager fees in terms of their fixed management fees, carried interest performance fees, clawbacks of fees and cash versus share distributions of fees. The data highlight a role of legal conditions in shaping fees paid to fund managers. In countries with better legal conditions, fixed fees are lower, carried interest fees are higher, clawbacks are less likely, and share distributions are more likely. These findings suggest legal conditions help to align the interests of managers and shareholders. More specifically, we examine which element of legal conditions matter most, and discover that corruption levels play a pronounced role in shaping fund manager fee contracts. We also show that cultural forces such as Hofstede’s measures of power distance and uncertainty avoidance likewise play a role in influencing fees.Keywords: managerial compensation, incentive contracts, private equity, law and finance
Procedia PDF Downloads 309