Search results for: Internet
432 Bring Your Own Device Security Model in a Financial Institution of South Africa
Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren
Abstract:
This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis
Procedia PDF Downloads 31431 A Review on Cloud Computing and Internet of Things
Authors: Sahar S. Tabrizi, Dogan Ibrahim
Abstract:
Cloud Computing is a convenient model for on-demand networks that uses shared pools of virtual configurable computing resources, such as servers, networks, storage devices, applications, etc. The cloud serves as an environment for companies and organizations to use infrastructure resources without making any purchases and they can access such resources wherever and whenever they need. Cloud computing is useful to overcome a number of problems in various Information Technology (IT) domains such as Geographical Information Systems (GIS), Scientific Research, e-Governance Systems, Decision Support Systems, ERP, Web Application Development, Mobile Technology, etc. Companies can use Cloud Computing services to store large amounts of data that can be accessed from anywhere on Earth and also at any time. Such services are rented by the client companies where the actual rent depends upon the amount of data stored on the cloud and also the amount of processing power used in a given time period. The resources offered by the cloud service companies are flexible in the sense that the user companies can increase or decrease their storage requirements or the processing power requirements at any time, thus minimizing the overall rental cost of the service they receive. In addition, the Cloud Computing service providers offer fast processors and applications software that can be shared by their clients. This is especially important for small companies with limited budgets which cannot afford to purchase their own expensive hardware and software. This paper is an overview of the Cloud Computing, giving its types, principles, advantages, and disadvantages. In addition, the paper gives some example engineering applications of Cloud Computing and makes suggestions for possible future applications in the field of engineering.Keywords: cloud computing, cloud systems, cloud services, IaaS, PaaS, SaaS
Procedia PDF Downloads 233430 Cybersecurity Challenges in Africa
Authors: Chimmoe Fomo Michelle Larissa
Abstract:
The challenges of cybersecurity in Africa are increasingly significant as the continent undergoes rapid digital transformation. With the rise of internet connectivity, mobile phone usage, and digital financial services, Africa faces unique cybersecurity threats. The significance of this study lies in understanding these threats and the multifaceted challenges that hinder effective cybersecurity measures across the continent. The methodologies employed in this study include a comprehensive analysis of existing cybersecurity frameworks in various African countries, surveys of key stakeholders in the digital ecosystem, and case studies of cybersecurity incidents. These methodologies aim to provide a detailed understanding of the current cybersecurity landscape, identify gaps in existing policies, and evaluate the effectiveness of implemented security measures. Major findings of the study indicate that Africa faces numerous cybersecurity challenges, including inadequate regulatory frameworks, insufficient cybersecurity awareness, and a shortage of skilled professionals. Additionally, the prevalence of cybercrime, such as financial fraud, data breaches, and ransomware attacks, exacerbates the situation. The study also highlights the role of international cooperation and regional collaboration in addressing these challenges and improving overall cybersecurity resilience. In conclusion, addressing cybersecurity challenges in Africa requires a multifaceted approach that involves strengthening regulatory frameworks, enhancing public awareness, and investing in cybersecurity education and training. The study underscores the importance of regional and international collaboration in building a robust cybersecurity infrastructure capable of mitigating the risks associated with the continent's digital growth.Keywords: Africa, cybersecurity, challenges, digital infrastructure, cybercrime
Procedia PDF Downloads 41429 The Influence of Environmental Factors on Honey Bee Activities: A Quantitative Analysis
Authors: Hung-Jen Lin, Chien-Hao Wang, Chien-Peng Huang, Yu-Sheng Tseng, En-Cheng Yang, Joe-Air Jiang
Abstract:
Bees’ incoming and outgoing behavior is a decisive index which can indicate the health condition of a colony. Traditional methods for monitoring the behavior of honey bees (Apis mellifera) take too much time and are highly labor-intensive, and the lack of automation and synchronization disables researchers and beekeepers from obtaining real-time information of beehives. To solve these problems, this study proposes to use an Internet of Things (IoT)-based system for counting honey bees’ incoming and outgoing activities using an infrared interruption technique, while environmental factors are recorded simultaneously. The accuracy of the established system is verified by comparing the counting results with the outcomes of manual counting. Moreover, this highly -accurate device is appropriate for providing quantitative information regarding honey bees’ incoming and outgoing behavior. Different statistical analysis methods, including one-way ANOVA and two-way ANOVA, are used to investigate the influence of environmental factors, such as temperature, humidity, illumination and ambient pressure, on bees’ incoming and outgoing behavior. With the real-time data, a standard model is established using the outcomes from analyzing the relationship between environmental factors and bees’ incoming and outgoing behavior. In the future, smart control systems, such as a temperature control system, can also be combined with the proposed system to create an appropriate colony environment. It is expected that the proposed system will make a considerable contribution to the apiculture and researchers.Keywords: ANOVA, environmental factors, honey bee, incoming and outgoing behavior
Procedia PDF Downloads 368428 Adding a Few Language-Level Constructs to Improve OOP Verifiability of Semantic Correctness
Authors: Lian Yang
Abstract:
Object-oriented programming (OOP) is the dominant programming paradigm in today’s software industry and it has literally enabled average software developers to develop millions of commercial strength software applications in the era of INTERNET revolution over the past three decades. On the other hand, the lack of strict mathematical model and domain constraint features at the language level has long perplexed the computer science academia and OOP engineering community. This situation resulted in inconsistent system qualities and hard-to-understand designs in some OOP projects. The difficulties with regards to fix the current situation are also well known. Although the power of OOP lies in its unbridled flexibility and enormously rich data modeling capability, we argue that the ambiguity and the implicit facade surrounding the conceptual model of a class and an object should be eliminated as much as possible. We listed the five major usage of class and propose to separate them by proposing new language constructs. By using well-established theories of set and FSM, we propose to apply certain simple, generic, and yet effective constraints at OOP language level in an attempt to find a possible solution to the above-mentioned issues regarding OOP. The goal is to make OOP more theoretically sound as well as to aid programmers uncover warning signs of irregularities and domain-specific issues in applications early on the development stage and catch semantic mistakes at runtime, improving correctness verifiability of software programs. On the other hand, the aim of this paper is more practical than theoretical.Keywords: new language constructs, set theory, FSM theory, user defined value type, function groups, membership qualification attribute (MQA), check-constraint (CC)
Procedia PDF Downloads 239427 Film Censorship and Female Chastity: Exploring State's Discourses and Patriarchal Values in Reconstructing Chinese Film Stardom of Tang Wei
Authors: Xinchen Zhu
Abstract:
The rapid fame of the renowned female film star Tang Wei has made her a typical subject (or object) entangled with sensitive issues involving the official ideology, sexuality, and patriarchal values of contemporary China. In 2008, Tang Wei’s official ban has triggered the wave of debates concerning state power and censorship, actor’s rights, sexual ethics, and feminism in the public sphere. Her ban implies that Chinese film censorship acts as a key factor in reconstructing Chinese film stardom. Following the ban, as sensational media texts are re-interpreting the official discourses, the texts also functioned as a crucial vehicle in reconstructing Tang's female image. Therefore, the case study of Tang's film stardom allows us to further explore how female stardom has been entangled with the issues involving official ideology, female sexual ethics, and patriarchal values in contemporary China. This paper argues that Chinese female film stars shoulder the responsibility of film acting which would conform to the official male-dominated values. However, with the development of the Internet, the state no longer remains an absolute control over the new venues. The netizens’ discussion about her ban reshaped Tang’s image as a victim and scapegoat under the unfair oppression of the official authority. Additionally, this paper argues that similar to State’s discourse, netizens’ discourse did not reject patriarchal values, and in turn emphasized Tang Wei’s female chastity.Keywords: film censorship, Chinese female film stardom, party-state’s power, national discourses, Tang Wei
Procedia PDF Downloads 170426 Smart Campus Digital Twin: Basic Framework - Current State, Trends and Challenges
Authors: Enido Fabiano de Ramos, Ieda Kanashiro Makiya, Francisco I. Giocondo Cesar
Abstract:
This study presents an analysis of the Digital Twin concept applied to the academic environment, focusing on the development of a Digital Twin Smart Campus Framework. Using bibliometric analysis methodologies and literature review, the research investigates the evolution and applications of the Digital Twin in educational contexts, comparing these findings with the advances of Industry 4.0. It was identified gaps in the existing literature and highlighted the need to adapt Digital Twin principles to meet the specific demands of a smart campus. By integrating Industry 4.0 concepts such as automation, Internet of Things, and real-time data analytics, we propose an innovative framework for the successful implementation of the Digital Twin in academic settings. The results of this study provide valuable insights for university campus managers, allowing for a better understanding of the potential applications of the Digital Twin for operations, security, and user experience optimization. In addition, our framework offers practical guidance for transitioning from a digital campus to a digital twin smart campus, promoting innovation and efficiency in the educational environment. This work contributes to the growing literature on Digital Twins and Industry 4.0, while offering a specific and tailored approach to transforming university campuses into smart and connected spaces, high demanded by Society 5.0 trends. It is hoped that this framework will serve as a basis for future research and practical implementations in the field of higher education and educational technology.Keywords: smart campus, digital twin, industry 4.0, education trends, society 5.0
Procedia PDF Downloads 59425 Toxic Ingredients Contained in Our Cosmetics
Authors: El Alia Boularas, H. Bekkar, H. Larachi, H. Rezk-kallah
Abstract:
Introduction: Notwithstanding cosmetics are used in life every day, these products are not all innocuous and harmless, as they may contain ingredients responsible for allergic reactions and, possibly, for other health problems. Additionally, environmental pollution should be taken into account. Thus, it is time to investigate what is ‘hidden behind beauty’. Aims: 1.To investigate prevalence of 13 chemical ingredients in cosmetics being object of concern, which the Algerians use regularly. 2.To know the profile of questioned consumers and describe their opinion on cosmetics. Methods: The survey was carried out in year 2013 over a period of 3 months, among Algerian Internet users having an e-mail address or a Facebook account.The study investigated 13 chemical agents showing health and environmental problems, selected after analysis of the recent studies published on the subject, the lists of national and international regulatory references on chemical hazards, and querying the database Skin Deep presented by the Environmental Working Group. Results: 300 people distributed all over the Algerian territory participated in the survey, providing information about 731 cosmetics; 86% aged from 20 to 39 years, with a sex ratio=0,27. A percentage of 43% of the analyzed cosmetics contained at least one of the 13 toxic ingredients. The targeted ingredient that has been most frequently reported was ‘perfume’ followed by parabens and PEG.85% of the participants declared that cosmetics ‘can contain toxic substances’, 27% asserted that they verify regularly the list of ingredients when they buy cosmetics, 61% said that they try to avoid the toxic ingredients, among whom 24 % were more vigilant on the presence of parabens, 95% were in favour of the strengthening of the Algerian laws on cosmetics. Conclusion: The results of the survey provide the indication of a widespread presence of toxic chemical ingredients in personal care products that Algerians use daily.Keywords: Algerians consumers, cosmetics, survey, toxic ingredients
Procedia PDF Downloads 277424 Application of Medical Information System for Image-Based Second Opinion Consultations–Georgian Experience
Authors: Kldiashvili Ekaterina, Burduli Archil, Ghortlishvili Gocha
Abstract:
Introduction – Medical information system (MIS) is at the heart of information technology (IT) implementation policies in healthcare systems around the world. Different architecture and application models of MIS are developed. Despite of obvious advantages and benefits, application of MIS in everyday practice is slow. Objective - On the background of analysis of the existing models of MIS in Georgia has been created a multi-user web-based approach. This presentation will present the architecture of the system and its application for image based second opinion consultations. Methods – The MIS has been created with .Net technology and SQL database architecture. It realizes local (intranet) and remote (internet) access to the system and management of databases. The MIS is fully operational approach, which is successfully used for medical data registration and management as well as for creation, editing and maintenance of the electronic medical records (EMR). Five hundred Georgian language electronic medical records from the cervical screening activity illustrated by images were selected for second opinion consultations. Results – The primary goal of the MIS is patient management. However, the system can be successfully applied for image based second opinion consultations. Discussion – The ideal of healthcare in the information age must be to create a situation where healthcare professionals spend more time creating knowledge from medical information and less time managing medical information. The application of easily available and adaptable technology and improvement of the infrastructure conditions is the basis for eHealth applications. Conclusion - The MIS is perspective and actual technology solution. It can be successfully and effectively used for image based second opinion consultations.Keywords: digital images, medical information system, second opinion consultations, electronic medical record
Procedia PDF Downloads 450423 Herapeutic Modalities for Anorexia Nervosa in Adolescents: A Narrative Review
Authors: Adam Al-Harbi, Chanel Powell, Katelyn Ward
Abstract:
In the age of social media and online body forums, the perception of body image among teenagers is constantly evolving. Growing up in an era of instant comparison facilitated by the internet, adolescents often struggle with self-identity, comparing their lives and bodies to countless others online. This environment has made it easier for them to access information on restrictive diets and fasting, contributing to the unfortunate glamorization of eating disorders. Although beauty standards have existed for centuries, social media amplifies these pressures. Platforms such as Instagram and TikTok have created spaces where teens are constantly exposed to idealized body types and beauty standards. This exposure often leads to harmful comparisons, fostering feelings of inadequacy and negative self-worth. Research indicates that adolescents, especially young girls, are at heightened risk for developing eating disorders like anorexia nervosa as they internalize these unrealistic standards. Anorexia nervosa, which has the highest mortality rate of any psychiatric disorder, is particularly alarming, with one in five anorexia deaths resulting from suicide. Young individuals with anorexia are twelve times more likely to die than their peers without the disorder. This paper aims to summarize the current state of literature comparing cognitive-behavioral therapy (CBT) and family-based therapy (FBT) in reducing morbidity, and mortality, and preventing symptom recurrence among adolescents with anorexia. CBT is a widely used treatment for eating disorders, particularly anorexia nervosa, while FBT is notable for its involvement of family members, which is crucial for developing teens and adolescents.Keywords: psychology, CBT, FBT, eating disorders, anorexia, therapeutic modalities
Procedia PDF Downloads 19422 Digital Employment of Disabled People: Empirical Study from Shanghai
Abstract:
Across the globe, ICTs are influencing employment both as an industry that creates jobs and as a tool that empowers disabled people to access new forms of work, in innovative and more flexible ways. The advancements in ICT and the number of apps and solutions that support persons with physical, cognitive and intellectual disabilities challenge traditional biased notions and offer a pathway out of traditional sheltered workshops. As the global leader in digital technology innovation, China is arguably a leader in the use of digital technology as a 'lever' in ending the economic and social marginalization of the disabled. This study investigates factors that influence adoption and use of employment-oriented ICT applications among disabled people in China and seeks to integrate three theoretical approaches: the technology acceptance model (TAM), the uses and gratifications (U&G) approach, and the social model of disability. To that end, the study used data from self-reported survey of 214 disabled adults who have been involved in two top-down 'Internet + employment' programs promoted by local disabled persons’ federation in Shanghai. A structural equation model employed in the study demonstrates that the use of employment-oriented ICT applications is affected by demographic factors of gender, categories of disability, education and marital status. The organizational support of local social organizations demonstrates significate effects on the motivations of disabled people. Results from the focus group interviews particularly suggested that to maximize the positive impact of ICTs on employment, there is significant need to build stakeholder capacity on how ICTs could benefits persons with disabilities.Keywords: disabled people, ICTs, technology acceptance model, uses and gratifications, the social model of disability
Procedia PDF Downloads 108421 The application of Gel Dosimeters and Comparison with other Dosimeters in Radiotherapy: A Literature Review
Authors: Sujan Mahamud
Abstract:
Purpose: A major challenge in radiotherapy treatment is to deliver precise dose of radiation to the tumor with minimum dose to the healthy normal tissues. Recently, gel dosimetry has emerged as a powerful tool to measure three-dimensional (3D) dose distribution for complex delivery verification and quality assurance. These dosimeters act both as a phantom and detector, thus confirming the versatility of dosimetry technique. The aim of the study is to know the application of Gel Dosimeters in Radiotherapy and find out the comparison with 1D and 2D dimensional dosimeters. Methods and Materials: The study is carried out from Gel Dosimeter literatures. Secondary data and images have been collected from different sources such as different guidelines, books, and internet, etc. Result: Analyzing, verifying, and comparing data from treatment planning system (TPS) is determined that gel dosimeter is a very excellent powerful tool to measure three-dimensional (3D) dose distribution. The TPS calculated data were in very good agreement with the dose distribution measured by the ferrous gel. The overall uncertainty in the ferrous-gel dose determination was considerably reduced using an optimized MRI acquisition protocol and a new MRI scanner. The method developed for comparing measuring gel data with calculated treatment plans, the gel dosimetry method, was proven to be a useful for radiation treatment planning verification. In 1D and 2D Film, the depth dose and lateral for RMSD are 1.8% and 2%, and max (Di-Dj) are 2.5% and 8%. Other side 2D+ ( 3D) Film Gel and Plan Gel for RMSDstruct and RMSDstoch are 2.3% & 3.6% and 1% & 1% and system deviation are -0.6% and 2.5%. The study is investigated that the result fined 2D+ (3D) Film Dosimeter is better than the 1D and 2D Dosimeter. Discussion: Gel Dosimeters is quality control and quality assurance tool which will used the future clinical application.Keywords: gel dosimeters, phantom, rmsd, QC, detector
Procedia PDF Downloads 152420 IoT and Deep Learning approach for Growth Stage Segregation and Harvest Time Prediction of Aquaponic and Vermiponic Swiss Chards
Authors: Praveen Chandramenon, Andrew Gascoyne, Fideline Tchuenbou-Magaia
Abstract:
Aquaponics offers a simple conclusive solution to the food and environmental crisis of the world. This approach combines the idea of Aquaculture (growing fish) to Hydroponics (growing vegetables and plants in a soilless method). Smart Aquaponics explores the use of smart technology including artificial intelligence and IoT, to assist farmers with better decision making and online monitoring and control of the system. Identification of different growth stages of Swiss Chard plants and predicting its harvest time is found to be important in Aquaponic yield management. This paper brings out the comparative analysis of a standard Aquaponics with a Vermiponics (Aquaponics with worms), which was grown in the controlled environment, by implementing IoT and deep learning-based growth stage segregation and harvest time prediction of Swiss Chards before and after applying an optimal freshwater replenishment. Data collection, Growth stage classification and Harvest Time prediction has been performed with and without water replenishment. The paper discusses the experimental design, IoT and sensor communication with architecture, data collection process, image segmentation, various regression and classification models and error estimation used in the project. The paper concludes with the results comparison, including best models that performs growth stage segregation and harvest time prediction of the Aquaponic and Vermiponic testbed with and without freshwater replenishment.Keywords: aquaponics, deep learning, internet of things, vermiponics
Procedia PDF Downloads 72419 A Study of Adult Lifelong Learning Consulting and Service System in Taiwan
Authors: Wan Jen Chang
Abstract:
Back ground: Taiwan's current adult lifelong learning services have expanded from vocational training to universal lifelong learning. However, both the professional knowledge training of learning guidance and consulting services and the provision of adult online learning consulting service systems still need to be established. Purpose: The purposes of this study are as follows: 1. Analyze the professional training mechanism for cultivating adult lifelong learning consultation and coaching; 2. Explore the feasibility of constructing a system that uses network technology to provide adult learning consultation services. Research design: This study conducts a literature analysis of counseling and coaching policy reports on lifelong learning in European countries and the United States. There are two focus discussions were conducted with 15 lifelong learning scholars, experts and practitioners as research subjects. The following two topics were discussed and suggested: 1. The current situation, needs and professional ability training mechanism of "Adult Lifelong Learning Consulting and Services"; 2. Strategies for establishing an "Adult Lifelong Learning Consulting and Service internet System". Conclusion: 1.Based on adult lifelong learning consulting and service needs, plan a professional knowledge training and certification system.2.Adult lifelong learning consulting and service professional knowledge and skills training should include the use of network technology to provide consulting service skills.3.To establish an adult lifelong learning consultation and service system, the Ministry of Education should promulgate policies and measures at the central level and entrust local governments or private organizations to implement them.4.The adult lifelong learning consulting and service system can combine the national qualifications framework, private sector and NPO to expand learning consulting service partners.Keywords: adult lifelong learning, profesional knowledge, consulting and service, network system
Procedia PDF Downloads 67418 Correlative Look at Relationship between Emotional Intelligence and Effective Crisis Management in Context of Covid-19 in France and Canada
Authors: Brittany Duboz-Quinville
Abstract:
Emotional Intelligence (EI) is a growing field, and many studies are examining how it pertains to the workplace. In the context of crisis management several studies have postulated that EI could play a role in individuals’ ability to execute crisis plans. However, research evaluating the EI of leaders who have actually managed a crisis is still lacking. The COVID-19 pandemic forced many businesses into a crisis situation beginning in March and April of 2020. This study sought to measure both EI and effective crisis management (CM) during the COVID-19 pandemic to determine if they were positively correlated. A quantitative survey was distributed via the internet that comprised of 15 EI statements, and 15 CM statements with Likert scale responses, and 6 demographic questions with discrete responses. The hypothesis of the study was: it is believed that EI correlates positively with effective crisis management. The results of the study did not support the studies hypothesis as the correlation between EI and CM was not statistically significant. An additional correlation was tested, comparing employees’ perception of their superiors’ EI (Perception) to employees’ opinion of how their superiors managed the crisis (Opinion). This Opinion and Perception correlation was statistically significant. Furthermore, by examining this correlation through demographic divisions there are additional significant results, notably that French speaking employees have a stronger Opinion/Perception correlation than English speaking employees. Implications for cultural differences in EI and CM are discussed as well as possible differences across job sectors. Finally, it is hoped that this study will serve to convince more companies, particularly in France, to embrace EI training for staff and especially managers.Keywords: crisis management, emotional intelligence, empathy, management training
Procedia PDF Downloads 166417 Improving Fault Tolerance and Load Balancing in Heterogeneous Grid Computing Using Fractal Transform
Authors: Saad M. Darwish, Adel A. El-Zoghabi, Moustafa F. Ashry
Abstract:
The popularity of the Internet and the availability of powerful computers and high-speed networks as low-cost commodity components are changing the way we use computers today. These technical opportunities have led to the possibility of using geographically distributed and multi-owner resources to solve large-scale problems in science, engineering, and commerce. Recent research on these topics has led to the emergence of a new paradigm known as Grid computing. To achieve the promising potentials of tremendous distributed resources, effective and efficient load balancing algorithms are fundamentally important. Unfortunately, load balancing algorithms in traditional parallel and distributed systems, which usually run on homogeneous and dedicated resources, cannot work well in the new circumstances. In this paper, the concept of a fast fractal transform in heterogeneous grid computing based on R-tree and the domain-range entropy is proposed to improve fault tolerance and load balancing algorithm by improve connectivity, communication delay, network bandwidth, resource availability, and resource unpredictability. A novel two-dimension figure of merit is suggested to describe the network effects on load balance and fault tolerance estimation. Fault tolerance is enhanced by adaptively decrease replication time and message cost while load balance is enhanced by adaptively decrease mean job response time. Experimental results show that the proposed method yields superior performance over other methods.Keywords: Grid computing, load balancing, fault tolerance, R-tree, heterogeneous systems
Procedia PDF Downloads 491416 Associations between Parental Marital Quality and Sexual Behaviors among 50,000 Chinese University Students
Authors: Jiashu Shen
Abstract:
With the increase in the prevalence of divorce, the impact of divorce on children’s sexual and reproductive health has received wide attention, while few studies have investigated parent marital relationship. This study aims to study the relation of both parent divorce and perceived parental marital relationship with children’s sexual behaviors among Chinese university or vocational college students. The study used data from “National College Student Survey on Sexual and Reproductive Health 2019”, an internet-based survey conducted from November 2019 to February 2020, in 241 universities or vocational colleges in China. Statistical analyses were conducted to assess the relationship of perceived parental marital relationship and parents’ divorce of distinct occurrence time with sexual intercourse, risky sexual behaviors, unintended health outcomes and sexual abuse. Among 51,124 university or vocational college students, those whose parents had divorced accounted for 10.72%. Better perceived parental relationship was associated with a lower likelihood to have sexual intercourse (male: OR: 0.83, 95%CI: 0.80-0.86; female: OR: 0.73, 95%CI: 0.70-0.75), sexual abuse, risky sexual behaviors and unintended health outcomes. Divorce was also found to be associated with higher risk of sexual abuse, risky sexual behaviors and unintended health outcomes. The findings highlight the importance of parental marital relationship and divorce in risky sexual behavior among young adults. The findings may provide implications on intervention programs targeting at children with divorced parents from an early stage.Keywords: college students, divorce, family relationship, sexual behavior
Procedia PDF Downloads 132415 Language Effects on the Prestige and Product Image of Advertised Smartphone in Consumer Purchases in Indonesia
Authors: Vidyarini Dwita, Rebecca Fanany
Abstract:
This study will discuss the growth of the market for smartphone technology in Indonesia. This country, with the world’s fourth largest population, has a reputation as the social media capital of the world, and this reputation is largely justified. The penetration of social media is high in Indonesia which has one of the largest global markets. Most Indonesian users of Facebook, Twitter and other social media platforms access the sites from their mobile phones. Indonesia is expected to continue to be a major market for digital mobile devices, such as smartphone and tablets that can access the internet. The aim of this study to describe the way responses of Indonesian consumers to smartphone advertising using English and Indonesian will impact on their perceptions of the prestige and product image of the advertised items and thus influence consumer intention to purchase the item. Advertising for smartphones and similar products is intense and dynamic and often draws on the social attitudes of Indonesians with respect to linguistic and cultural content and especially appeals to their desire to be part of global mainstream culture. The study uses a qualitative method based on in-depth interviews with 30 participants. Content analysis is employed to analyse the responses of Indonesian consumers to smartphone advertising that uses English and Indonesian text. Its findings indicate that consumers’ impressions of English and Indonesian slogans influence their attitudes toward smartphones, suggesting that linguistic context plays a role in influencing consumer purchases.Keywords: consumer purchases, marketing communication, product image, smartphone advertising, sociolinguistic
Procedia PDF Downloads 224414 Investigation of Overarching Effects of Artificial Intelligence Implementation into Education Through Research Synthesis
Authors: Justin Bin
Abstract:
Artificial intelligence (AI) has been rapidly rising in usage recently, already active in the daily lives of millions, from distinguished AIs like the popular ChatGPT or Siri to more obscure, inconspicuous AIs like those used in social media or internet search engines. As upcoming generations grow immersed in emerging technology, AI will play a vital role in their development. Namely, the education sector, an influential portion of a person’s early life as a student, faces a vast ocean of possibilities concerning the implementation of AI. The main purpose of this study is to analyze the effect that AI will have on the future of the educational field. More particularly, this study delves deeper into the following three categories: school admissions, the productivity of students, and ethical concerns (role of human teachers, purpose of schooling itself, and significance of diplomas). This study synthesizes research and data on the current effects of AI on education from various published literature sources and journals, as well as estimates on further AI potential, in order to determine the main, overarching effects it will have on the future of education. For this study, a systematic organization of data in terms of type (quantitative vs. qualitative), the magnitude of effect implicated, and other similar factors were implemented within each area of significance. The results of the study suggest that AI stands to change all the beforementioned subgroups. However, its specific effects vary in magnitude and favorability (beneficial or harmful) and will be further discussed. The results discussed will reveal to those affiliated with the education field, such as teachers, counselors, or even parents of students, valuable information on not just the projected possibilities of AI in education but the effects of those changes moving forward.Keywords: artificial intelligence, education, schools, teachers
Procedia PDF Downloads 522413 Fashion and Soft War: Analysis of Iran's Regulatory Measures for Fashion Industry
Authors: Leili Nekounazar
Abstract:
Since 2009, when the Green movement, Iran’s most significant political uprising in post-Islamic revolution materialized, the term 'soft war' has become an integral part of the Iranian regime’s lexicon when addressing the media propaganda waged by the west and the regime’s so-called 'enemies'. Iran’s authorities describe soft war as a western campaign aiming at undermining the revolutionary values by covert activities, deploying cultural tools and purposeful dissemination of information. With this respect, Internet and in particular, the social media networks, and oppositional radio-television broadcasts have been considered as the west’s soft war conduits. With the rising of the underground fashion industry in the past couple of years that does not conform to the compulsory dress codes prescribed by the state, the Islamic regime expands the soft war narrative to include any undesired fashion-related activities and frames the rising fashion industry as a cultural war intoxicating the Iranian-Islamic identity. Accordingly, fashion products created by the Iranian fashion intermediators have been attributed to the westerners and outsiders and are regarded as the matter of national security. This study examines the reactive and proactive measures deployed by the Iranian regime to control the rise of fashion industry. It further puts under the scrutiny how the state as a part of its proactive measure shapes the narrative of 'soft war' in relation to fashion in Iran and explores how the notion of soft war has been articulated in relation to the modeling and fashion in the state’s political rhetoric. Through conducting a content analysis of the authorities’ statements, it describes how the narrative of soft war assists the state policing the fashion industry.Keywords: censorship, fashion, Iran, soft war
Procedia PDF Downloads 344412 Analysis of Spatiotemporal Efficiency and Fairness of Railway Passenger Transport Network Based on Space Syntax: Taking Yangtze River Delta as an Example
Abstract:
Based on the railway network and the principles of space syntax, the study attempts to reconstruct the spatial relationship of the passenger network connections from space and time perspective. According to the travel time data of main stations in the Yangtze River Delta urban agglomeration obtained by the Internet, the topological drawing of railway network under different time sections is constructed. With the comprehensive index composed of connection and integration, the accessibility and network operation efficiency of the railway network in different time periods is calculated, while the fairness of the network is analyzed by the fairness indicators constructed with the integration and location entropy from the perspective of horizontal and vertical fairness respectively. From the analysis of the efficiency and fairness of the railway passenger transport network, the study finds: (1) There is a strong regularity in regional system accessibility change; (2) The problems of efficiency and fairness are different in different time periods; (3) The improvement of efficiency will lead to the decline of horizontal fairness to a certain extent, while from the perspective of vertical fairness, the supply-demand situation has changed smoothly with time; (4) The network connection efficiency of Shanghai, Jiangsu and Zhejiang regions is higher than that of the western regions such as Anqing and Chizhou; (5) The marginalization of Nantong, Yancheng, Yangzhou, Taizhou is obvious. The study explores the application of spatial syntactic theory in regional traffic analysis, in order to provide a reference for the development of urban agglomeration transportation network.Keywords: spatial syntax, the Yangtze River Delta, railway passenger time, efficiency and fairness
Procedia PDF Downloads 136411 A Fact-Finding Analysis on the Expulsions Made under Title 42 in Us
Authors: Avi Shrivastava
Abstract:
Title 42, an emergency health decree, has forced the federal authorities to turn away asylum seekers and all other border crossers since last year. When Title 42 was first deployed in immigration detention centers, where many migrants are held when they arrive at the U.S.-Mexico border, the Trump administration embraced it as a strategy. Expulsions Policy and New Border Challenges will be examined in regard to Title 42 concerns. Humanitarian measures for refugees arriving at the US-Mexico border are the focus of this article. To a large extent, this article addresses the implications of the United States' use of Title 42 in expelling refugees and the possible ramifications of doing away with it. A secondary data collecting strategy was used to gather the information for this study, allowing researchers to examine a large number of previously collected data sets. Information about Title 42 may be found in a variety of places, such as scholarly publications, newspapers, books, and the internet. The inquiry employed qualitative and explanatory research approaches. The claim that 1.7 million individuals were forced to leave the country as a result of it was withdrawn. Since CBP and ICE were limited in their ability to process deportees, it employed a very random patchwork technique in selecting the expelled individuals. As a consequence, repeat offenders, particularly those who were single, got a reduced punishment. The government will be compelled to focus on long-overdue but vital border enhancements if expulsions are halted. Title 42 provisions may help expedite the processing of asylum and other types of humanitarian relief. The government is prepared for an increase in arrivals, but ending the program would lead to a return to arrival levels seen during the Title 42 period.Keywords: migrants, refugees, title 42, medical, trump administration
Procedia PDF Downloads 87410 Frenotomy for Tongue Tie: The Unlikely Benefit of Massage
Authors: Kailas Bhandarkar, Talib Dar, Laura Karia, Manasvi Upadhyaya
Abstract:
Introduction: Frenotomy for tongue tie is commonly performed in breastfed infants who experience difficulty in latching after failed conservative management for tongue tie. However, there is no consensus for the routine use of massage following frenotomy. Our aim was to assess the efficacy of massage in preventing recurrence following frenotomy. Methods: The tongue tie service in our tertiary referral hospital consists of 5 consultants and a breastfeeding (BF) midwife. 3 consultants routinely advice massage post procedure. Babies are assessed by the midwife after the procedure and a follow-up consultation after a week. After due ethical approval, data were collected by two staff members who were independent of TT service on a standardized questionnaire to avoid bias. Fischer exact test was employed (p < 0.05 considered significant). Results: Six hundred and thirty-two babies attended the clinic from January 2018 to December 2018. Thirty-three of these were excluded as the procedure was not needed. Parents were contacted at a median of six months post-procedure (range 2-10 months). 282/599 were advised massage. 92/282 could be contacted. 40/ 92 adhered to massage regimen. None of these had a recurrence. 52/92 (54%), although advised, did not perform massage. Reasons cited for lack of adherence to massage included difficulty in performing massaging and conflicting advice given by other health care professionals involved in patient care like paediatricians and group practice and lack of information on the internet). Overall, 4/599 (0.66%) had recurrences, and this difference was not statistically significant. Conclusion: In our experience, the rate of recurrence after frenotomy is low enough for us to conclude that there is no significant benefit of massage after frenotomy for tongue tie. We could also conclude that among parents who were advised massage more than half failed to adhere to the advice.Keywords: tongue tie, frenotomy, massage, recurrence
Procedia PDF Downloads 135409 Customised Wellness Solutions Using Health Technological Platforms: An Exploratory Research Protocol
Authors: Elaine Wong Yee-Sing, Liaw Wee Tong
Abstract:
Rapid transformations in demographic and socioeconomic shifts are leading to a growing global demand for health and beauty products and services that demands holistic concepts of well-being. In addition, technological breakthroughs such as internet of things make it convenient and offer innovative solutions for well-being and engage consumers to track their own health conditions and fitness goals. This 'new health economy' encompasses three key concepts: well-being, well-conditioned and well-shaped; which are shaped by wellness segments and goals that influence purchasing decisions of consumers. The research protocol aims to examine the feasibility, challenges, and capabilities in provision for each customer with an ecosystem, or platform, that organizes data and insights to create an individual health and fitness, nutrition, and beauty profile. Convenience sampling of 100 consumers residing in private housing within five major districts in Singapore will be selected to participate in the study. Statistical Package for Social Science 25 will be used to conduct descriptive statistics for quantitative data while qualitative data results using focus interviews, will be translated and transcribed to identify improvements in provision of these services. Rising income in emerging global markets is fuelling the demand for these general wellbeing products and services. Combined with technological advances, it is imperative to understand how these highly personalized services with integrated technology can be designed better to support consumer preferences; provide greater flexibility and high-quality service, and generate better health awareness among consumers.Keywords: beauty, consumers, health, technology, wellness
Procedia PDF Downloads 129408 An IoT-Enabled Crop Recommendation System Utilizing Message Queuing Telemetry Transport (MQTT) for Efficient Data Transmission to AI/ML Models
Authors: Prashansa Singh, Rohit Bajaj, Manjot Kaur
Abstract:
In the modern agricultural landscape, precision farming has emerged as a pivotal strategy for enhancing crop yield and optimizing resource utilization. This paper introduces an innovative Crop Recommendation System (CRS) that leverages the Internet of Things (IoT) technology and the Message Queuing Telemetry Transport (MQTT) protocol to collect critical environmental and soil data via sensors deployed across agricultural fields. The system is designed to address the challenges of real-time data acquisition, efficient data transmission, and dynamic crop recommendation through the application of advanced Artificial Intelligence (AI) and Machine Learning (ML) models. The CRS architecture encompasses a network of sensors that continuously monitor environmental parameters such as temperature, humidity, soil moisture, and nutrient levels. This sensor data is then transmitted to a central MQTT server, ensuring reliable and low-latency communication even in bandwidth-constrained scenarios typical of rural agricultural settings. Upon reaching the server, the data is processed and analyzed by AI/ML models trained to correlate specific environmental conditions with optimal crop choices and cultivation practices. These models consider historical crop performance data, current agricultural research, and real-time field conditions to generate tailored crop recommendations. This implementation gets 99% accuracy.Keywords: Iot, MQTT protocol, machine learning, sensor, publish, subscriber, agriculture, humidity
Procedia PDF Downloads 69407 Cultural Works Interacting with the Generational Aesthetic Gap between Gen X and Gen Z in China: A Qualitative Study
Authors: Qianyu Zhang
Abstract:
The spread of digital technology in China has worsened the generation gap and intergenerational competition for cultural and aesthetic discourse. Meanwhile, the increased accessibility of cultural works has encouraged the sharing and inheritance of collective cultural memories between generations. However, not each cultural work can engage positively with efforts to bridge intergenerational aesthetic differences. This study argues that in contemporary China, where new media and the Internet are widely available, featured cultural works have more potential to help enhance the cultural aesthetic consensus among different generations, thus becoming an effective countermeasure to narrow the intergenerational aesthetic rift and cultural discontinuity. Specifically, the generational aesthetic gap is expected to be bridged or improved through the shared appreciation or consumption of cultural works that meet certain conditions by several generations. In-depth interviews of Gen X and Gen Z (N=15, respectively) in China uncovered their preferences and commonalities for cultural works and shared experiences in appreciating them. Results demonstrate that both generations’ shared appreciation of cultural work is a necessary but insufficient condition for its effective response to the generational aesthetic gap. Coding analysis rendered six dimensions that cultural works with the potential to bridge the intergenerational aesthetic divide should satisfy simultaneously: genre, theme, content, elements, quality, and accessibility. Cultural works that engage multiple senses/ compound realistic, domestic and contemporary cultural memories/ contain the narrative of family life and nationalism/ include more elements familiar to the previous generation/ are superb-produced and unaffected/ are more accessible better promote intergenerational aesthetic exchange and value recognition. Moreover, compared to the dilemma of the previous generation facing the aesthetic gap, the later generation plays a crucial role in bridging the generational aesthetic divide.Keywords: cultural works, generation gap, generation X, generation Z, cultural memory
Procedia PDF Downloads 153406 Impact of Adolescent Smoking on the Behaviour, Academic and Health Aspects in Qatar
Authors: Abdelsalam Gomaa, Mahjabeen Ramzan, Tooba Ali Akbar, Huma Nadeem
Abstract:
The use of tobacco and the health risks linked to it are well known in this day and age due to the presence of easily available information through the internet. The media is a powerful platform that is used by many anti-smoking awareness campaigns to reach their target audience; yet, it has been found that adolescents are taking up smoking every passing day. Half of this smoking population of youngsters resides in Asia alone, which includes Qatar, the focus country of this study. As smoking happens to be one of the largest avoidable causes of serious diseases like cancers and heart problems, children are taking up smoking at an alarming rate everywhere including Qatar. Importance of the health of the citizens of Qatar is one of the pillars of the Qatar vision 2030, which is to ensure a healthy population, both physically and mentally. Since the youth makes up a significant percentage of the population and in order to achieve the health objectives of the Qatar vision 2030, it is essential to ensure the health and well-being of this part of the population of the country as they are the future of Qatar. Children, especially boys who tend to be more aggressive by nature, are highly likely to develop behavioral and health issues due to smoking at an early age. Research conducted around the world has also emphasized on this association between the smokers developing a bad behaviour as well as poor social communication skills. However, due to lack of research into this association, very little is known about the extent to which smoking impacts the children’s academics, health and behaviour. Moreover, a study of this nature has not yet been conducted in Qatar previously as most of the studies focus on adult smokers and ways to minimize the number of smoking habits in universities and workplaces. This study solely focuses on identifying a relationship between smoking and its impacts on the adolescents by conducting a research on different schools across Qatar.Keywords: adolescents, modelling techniques, Qatar, smoking
Procedia PDF Downloads 246405 Cybersecurity Assessment of Decentralized Autonomous Organizations in Smart Cities
Authors: Claire Biasco, Thaier Hayajneh
Abstract:
A smart city is the integration of digital technologies in urban environments to enhance the quality of life. Smart cities capture real-time information from devices, sensors, and network data to analyze and improve city functions such as traffic analysis, public safety, and environmental impacts. Current smart cities face controversy due to their reliance on real-time data tracking and surveillance. Internet of Things (IoT) devices and blockchain technology are converging to reshape smart city infrastructure away from its centralized model. Connecting IoT data to blockchain applications would create a peer-to-peer, decentralized model. Furthermore, blockchain technology powers the ability for IoT device data to shift from the ownership and control of centralized entities to individuals or communities with Decentralized Autonomous Organizations (DAOs). In the context of smart cities, DAOs can govern cyber-physical systems to have a greater influence over how urban services are being provided. This paper will explore how the core components of a smart city now apply to DAOs. We will also analyze different definitions of DAOs to determine their most important aspects in relation to smart cities. Both categorizations will provide a solid foundation to conduct a cybersecurity assessment of DAOs in smart cities. It will identify the benefits and risks of adopting DAOs as they currently operate. The paper will then provide several mitigation methods to combat cybersecurity risks of DAO integrations. Finally, we will give several insights into what challenges will be faced by DAO and blockchain spaces in the coming years before achieving a higher level of maturity.Keywords: blockchain, IoT, smart city, DAO
Procedia PDF Downloads 121404 A Methodology for the Identification of Technological Gaps and the Measurement of the Level of Technological Acceptance in the Rural Sector in Colombia
Authors: Anyi Katherine Garzon Robles, Luis Carlos Gomez Florez
Abstract:
Since the advent of the Internet, the use of Information Technologies (IT) has increased exponentially. The field of informatics and telecommunications has put on the table countless possibilities for the development of different socio-economic activities, promoting a change of social paradigm and the emergence of the so-called information and knowledge society. For more than a decade, the Colombian government has been working on the incorporation of IT into the public sector through an e-government strategy. However, to date, many technological gaps has not yet been identified in the country to our knowledge, especially in rural areas and far from large cities, where factors such as low investment and the expansion of the armed conflict have led to economic and technological stagnation. This paper presents the research results obtained from the execution of a research project, which was approach from a qualitative approach and a methodological design of a participatory action research type. This design consists of nine fundamental stages divided into four work cycles. For which different strategies for data collection and analysis were established. From which, a methodology was obtained for the identification of technological gaps and the measurement of the level of technological acceptance in the rural sector, based on the TAM (Technology Acceptance Model) model, as a previous activity to the development of IT solutions framed in the e-government strategy in Colombia. The result of this research work represents a contribution from academia for the improvement of the country's technological development and a guide for the proper planning of IT solutions aimed at promoting a close relationship between government and citizens.Keywords: E-government, knowledge society, level of technological acceptance, technological gaps, technology acceptance model
Procedia PDF Downloads 237403 Feasibility Study of MongoDB and Radio Frequency Identification Technology in Asset Tracking System
Authors: Mohd Noah A. Rahman, Afzaal H. Seyal, Sharul T. Tajuddin, Hartiny Md Azmi
Abstract:
Taking into consideration the real time situation specifically the higher academic institutions, small, medium to large companies, public to private sectors and the remaining sectors, do experience the inventory or asset shrinkages due to theft, loss or even inventory tracking errors. This happening is due to a zero or poor security systems and measures being taken and implemented in their organizations. Henceforth, implementing the Radio Frequency Identification (RFID) technology into any manual or existing web-based system or web application can simply deter and will eventually solve certain major issues to serve better data retrieval and data access. Having said, this manual or existing system can be enhanced into a mobile-based system or application. In addition to that, the availability of internet connections can aid better services of the system. Such involvement of various technologies resulting various privileges to individuals or organizations in terms of accessibility, availability, mobility, efficiency, effectiveness, real-time information and also security. This paper will look deeper into the integration of mobile devices with RFID technologies with the purpose of asset tracking and control. Next, it is to be followed by the development and utilization of MongoDB as the main database to store data and its association with RFID technology. Finally, the development of a web based system which can be viewed in a mobile based formation with the aid of Hypertext Preprocessor (PHP), MongoDB, Hyper-Text Markup Language 5 (HTML5), Android, JavaScript and AJAX programming language.Keywords: RFID, asset tracking system, MongoDB, NoSQL
Procedia PDF Downloads 306