Search results for: communication systems
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12597

Search results for: communication systems

11277 ICT in Education – A Quest for Quality Learning in the 21st Century

Authors: Adam Johnbull

Abstract:

The paper discusses ICT in Education as a quest for quality learning in the 21st century. Education is the key that unlock the door to development, without adequate education of the citizenry, the development of a nation becomes a sham. Information Communication Technologies (ICTs) has revolutionized the way people work today and are now transforming education systems. As a result, if schools train children in yesterday’s skills and technologies they may not be effective and fit in tomorrow’s world. This is a sufficient reason for ICT’s to win global recognition and attention and thus ensure desire quality in our school system. Thus, the purpose of the paper is to discuss amongst others, what is ICT. The roles of ICT’s in education, limitation and key challenges of integrating ICT to education in the enhancement of student learning and experiences in other to encourage policy makers, school administrators and teachers pay the required attention to integrate this technology in the education system. The paper concludes that regardless of all the limitation characterizing it. ICT benefit education system to provide quality education in the 21st century.

Keywords: ICTs, quest, information, global, sham, century

Procedia PDF Downloads 424
11276 Interethnic Communication in Multicultural Areas: A Case Study of Intercultural Sensitivity Between Baloch and Persians in Iran

Authors: Mehraveh Taghizadeh

Abstract:

Iran is home to a diverse range of ethnic groups such as Baloch, Kurds, Persians, Lors, Arabs, and Turks. The Persian ethnicity is the largest group, while Baloch people are considered a minority residing on the southeastern border of the country with different language and religion. As a consequence, Political discussions have often prioritized national identity and national security over Baloch ethnic identity. However, to improve intercultural understanding and reduce cultural schemas, it's crucial to decrease ethnocentrism and increase intercultural communication. In the meantime, Kerman, a multicultural province that borders Sistan and Baluchistan, has become a destination for Baloch immigrants. By recognizing the current status of intercultural competence, we can develop effective policies for expanding intercultural communication and creating a more inclusive and peaceful society. As a result, this research aims to study the domain of intercultural sensitivity between Persians and Baloch in Kerman. Therefore, the question is how do Persians and Baloch ethnicities perceive each other? This study represents the first exploration of communication dynamics between Persians and Baloch individuals. Utilizing a qualitative approach, this study employs thematic analysis in conjunction with Bennett's intercultural sensitivities model. The model comprises two components: ethnocentrism, which spans from denial and defense to minimization, and ethno-relativism, which ranges from acceptance and adaptation to integration. To attain this objective, 30 individuals from Persian and Baloch ethnicities were interviewed using a semi-structured format. it analysis suggests that the Baluch and Persians exhibit a range of intercultural sensitivities characterized by defensive and minimizing attitudes in the ethnocentrism domain, and accepting attitudes in the ethno-relativism domain. The concept of minimization involves recognizing the shared humanity and positive schemas of both groups. Furthermore, in the adaptation domain, Persians' efforts to assimilate into Baloch culture at an acceptance level are primarily focused on the civilizational dimension, including using traditional Balochi clothing designs on their clothes. The Persians hold intercultural schemas about the Baloch people, including notions of religious fanaticism, tribalism, poverty, smuggling, and a nomadic way of life. Conversely, the Baloch people have intercultural schemas about Persians including religious fanaticism, disdain towards the Baloch, and ethnocentrism. Both groups tend to tie ethnicity to religion and judge each other accordingly. Also, the origin of these schemas is in the representation of the media and the encounter without interaction between the two ethnic groups. These findings indicate that they have not received adaptation and integration levels in ethno-relativism. Furthermore, the results indicate that developing personal communication in multicultural environments reduces intercultural sensitivity, and increases positive interactions and civilizational dialogues. People can understand each other better and perform better in their daily lives.

Keywords: intercultural communication, intercultural sensitivity, interethnic communication, Iran, Baloch, Persians

Procedia PDF Downloads 44
11275 Made-in-Japan English and the Negative Impact on English Language Learning

Authors: Anne Crescini

Abstract:

The number of loanwords borrowed into the Japanese language is increasing rapidly in recent years, and many linguists argue that loanwords make up more than 10% of the Japanese lexicon. While these loanwords come from various Western languages, 80%-90% are borrowed from English. Also, there is a separate group of words and phrases categorized as ‘Japanese English’. These made-in-Japan linguistic creations may look and sound like English, but in fact are not used by native speakers and are often incomprehensible to them. Linguistically, the important thing to remember is that these terms are not English ones, but in fact, 100% Japanese words. A problem arises in language teaching, however, when Japanese English learners are unable to distinguish authentic loans from Japanese English terms. This confusion could greatly impede language acquisition and communication. The goal of this paper is to determine to what degree this potential misunderstanding may interfere with communication. Native English speakers living in the United States were interviewed and shown a list of romanized Japanese English terms, which are both commonly used and often mistaken for authentic loans. Then, the words were put into the context of a sentence in order to ascertain if context in any way aided comprehension. The results showed that while some terms are understood on their own, and others are understood better in context, a large number of the terms are entirely incomprehensible to native English speakers. If that is the case, and a Japanese learner mistakes a Japanese English term for an authentic loan, a communication breakdown may occur during interaction in English. With the ever-increasing presence of both groups of terms in the Japanese language, it is more important than ever that teaching professionals address this topic in the language classroom.

Keywords: Japanese, Japanese English, language acquisition, loanwords

Procedia PDF Downloads 218
11274 The Rail Traffic Management with Usage of C-OTDR Monitoring Systems

Authors: Andrey V. Timofeev, Dmitry V. Egorov

Abstract:

This paper presents development results of usage of C-OTDR monitoring systems for rail traffic management. The C-OTDR method is based on vibrosensitive properties of optical fibers. Analysis of Rayleigh backscattering radiation parameters changes which take place due to microscopic seismoacoustic impacts on the optical fiber allows to determine seismoacoustic emission source positions and to identify their types. This approach proved successful for rail traffic management (moving block system, weigh- in-motion system etc).

Keywords: C-OTDR systems, moving block-sections, rail traffic management, Rayleigh backscattering, weigh-in-motion

Procedia PDF Downloads 578
11273 Genetic Algorithms Based ACPS Safety

Authors: Emine Laarouchi, Daniela Cancila, Laurent Soulier, Hakima Chaouchi

Abstract:

Cyber-Physical Systems as drones proved their efficiency for supporting emergency applications. For these particular applications, travel time and autonomous navigation algorithms are of paramount importance, especially when missions are performed in urban environments with high obstacle density. In this context, however, safety properties are not properly addressed. Our ambition is to optimize the system safety level under autonomous navigation systems, by preserving performance of the CPS. At this aim, we introduce genetic algorithms in the autonomous navigation process of the drone to better infer its trajectory considering the possible obstacles. We first model the wished safety requirements through a cost function and then seek to optimize it though genetics algorithms (GA). The main advantage in the use of GA is to consider different parameters together, for example, the level of battery for navigation system selection. Our tests show that the GA introduction in the autonomous navigation systems minimize the risk of safety lossless. Finally, although our simulation has been tested for autonomous drones, our approach and results could be extended for other autonomous navigation systems such as autonomous cars, robots, etc.

Keywords: safety, unmanned aerial vehicles , CPS, ACPS, drones, path planning, genetic algorithms

Procedia PDF Downloads 178
11272 Stakeholder-Driven Development of a One Health Platform to Prevent Non-Alimentary Zoonoses

Authors: A. F. G. Van Woezik, L. M. A. Braakman-Jansen, O. A. Kulyk, J. E. W. C. Van Gemert-Pijnen

Abstract:

Background: Zoonoses pose a serious threat to public health and economies worldwide, especially as antimicrobial resistance grows and newly emerging zoonoses can cause unpredictable outbreaks. In order to prevent and control emerging and re-emerging zoonoses, collaboration between veterinary, human health and public health domains is essential. In reality however, there is a lack of cooperation between these three disciplines and uncertainties exist about their tasks and responsibilities. The objective of this ongoing research project (ZonMw funded, 2014-2018) is to develop an online education and communication One Health platform, “eZoon”, for the general public and professionals working in veterinary, human health and public health domains to support the risk communication of non-alimentary zoonoses in the Netherlands. The main focus is on education and communication in times of outbreak as well as in daily non-outbreak situations. Methods: A participatory development approach was used in which stakeholders from veterinary, human health and public health domains participated. Key stakeholders were identified using business modeling techniques previously used for the design and implementation of antibiotic stewardship interventions and consisted of a literature scan, expert recommendations, and snowball sampling. We used a stakeholder salience approach to rank stakeholders according to their power, legitimacy, and urgency. Semi-structured interviews were conducted with stakeholders (N=20) from all three disciplines to identify current problems in risk communication and stakeholder values for the One Health platform. Interviews were transcribed verbatim and coded inductively by two researchers. Results: The following key values were identified (but were not limited to): (a) need for improved awareness of veterinary and human health of each other’s fields, (b) information exchange between veterinary and human health, in particularly at a regional level; (c) legal regulations need to match with daily practice; (d) professionals and general public need to be addressed separately using tailored language and information; (e) information needs to be of value to professionals (relevant, important, accurate, and have financial or other important consequences if ignored) in order to be picked up; and (f) need for accurate information from trustworthy, centrally organised sources to inform the general public. Conclusion: By applying a participatory development approach, we gained insights from multiple perspectives into the main problems of current risk communication strategies in the Netherlands and stakeholder values. Next, we will continue the iterative development of the One Health platform by presenting key values to stakeholders for validation and ranking, which will guide further development. We will develop a communication platform with a serious game in which professionals at the regional level will be trained in shared decision making in time-critical outbreak situations, a smart Question & Answer (Q&A) system for the general public tailored towards different user profiles, and social media to inform the general public adequately during outbreaks.

Keywords: ehealth, one health, risk communication, stakeholder, zoonosis

Procedia PDF Downloads 280
11271 A New Protocol Ensuring Users' Privacy in Pervasive Environment

Authors: Mohammed Nadir Djedid, Abdallah Chouarfia

Abstract:

Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.

Keywords: pervasive systems, identification, authentication, privacy

Procedia PDF Downloads 472
11270 Using Soft Systems Methodology in the Healthcare Industry of Mauritius

Authors: Arun Kumar, Neelesh Haulder

Abstract:

This paper identifies and resolves some key issues relating to a specific aspect within the supply chain logistics of the public health care industry in the Republic of Mauritius. The analysis and the proposed solution are performed using soft systems methodology (SSM). Through the application of this relevant systematic approach at problem solving, the aim is to obtain an in-depth analysis of the problem, incorporating every possible world view of the problem and consequently to obtain a well explored solution aimed at implementing relevant changes within the current supply chain logistics of the health care industry, with the purpose of tackling the key identified issues.

Keywords: soft systems methodology, CATWOE, healthcare, logistics

Procedia PDF Downloads 510
11269 An Analysis of Social Media Use regarding Foodways by University Students: The Case of Sakarya University

Authors: Kübra Yüzüncüyıl, Aytekin İşman, Berkay Buluş

Abstract:

In the last quarter of the 20th century, Food Studies was emerged as an interdisciplinary program. It seeks to develop a critical perspective on sociocultural meanings of food. The notion of food has been related with certain social and cultural values throughout history. In today’s society, with the rise of new media technologies, cultural structure have been digitized. Food culture in this main, is also endowed with digital codes. In particular, social media has been integrated into foodways. This study attempts to examine the gratifications that individuals obtain from social media use on foodways. In the first part of study, the relationship between food culture and digital culture is examined. Secondly, theoretical framework and research method of the study are explained. In order to achieve the particular aim of study, Uses and Gratifications Theory is adopted as conceptual framework. Conventional gratification categories are redefined in new media terms. After that, the relation between redefined categories and foodways is uncovered. Due to its peculiar context, this study follows a quantitative research method. By conducting pre-interviews and factor analysis, a peculiar survey is developed. The sample of study is chosen among 405 undergraduate communication faculty students of Sakarya University by proportionate stratification sampling method. In the analysis of the collected data, statistical methods One-Way ANOVA, Independent Samples T-test, and Tuckey Honest Significant Difference Test, Post Hoc Test are used.

Keywords: food studies, food communication, new media, communication

Procedia PDF Downloads 190
11268 Facial Behavior Modifications Following the Diffusion of the Use of Protective Masks Due to COVID-19

Authors: Andreas Aceranti, Simonetta Vernocchi, Marco Colorato, Daniel Zaccariello

Abstract:

Our study explores the usefulness of implementing facial expression recognition capabilities and using the Facial Action Coding System (FACS) in contexts where the other person is wearing a mask. In the communication process, the subjects use a plurality of distinct and autonomous reporting systems. Among them, the system of mimicking facial movements is worthy of attention. Basic emotion theorists have identified the existence of specific and universal patterns of facial expressions related to seven basic emotions -anger, disgust, contempt, fear, sadness, surprise, and happiness- that would distinguish one emotion from another. However, due to the COVID-19 pandemic, we have come up against the problem of having the lower half of the face covered and, therefore, not investigable due to the masks. Facial-emotional behavior is a good starting point for understanding: (1) the affective state (such as emotions), (2) cognitive activity (perplexity, concentration, boredom), (3) temperament and personality traits (hostility, sociability, shyness), (4) psychopathology (such as diagnostic information relevant to depression, mania, schizophrenia, and less severe disorders), (5) psychopathological processes that occur during social interactions patient and analyst. There are numerous methods to measure facial movements resulting from the action of muscles, see for example, the measurement of visible facial actions using coding systems (non-intrusive systems that require the presence of an observer who encodes and categorizes behaviors) and the measurement of electrical "discharges" of contracting muscles (facial electromyography; EMG). However, the measuring system invented by Ekman and Friesen (2002) - "Facial Action Coding System - FACS" is the most comprehensive, complete, and versatile. Our study, carried out on about 1,500 subjects over three years of work, allowed us to highlight how the movements of the hands and upper part of the face change depending on whether the subject wears a mask or not. We have been able to identify specific alterations to the subjects’ hand movement patterns and their upper face expressions while wearing masks compared to when not wearing them. We believe that finding correlations between how body language changes when our facial expressions are impaired can provide a better understanding of the link between the face and body non-verbal language.

Keywords: facial action coding system, COVID-19, masks, facial analysis

Procedia PDF Downloads 69
11267 Design and Implementation of Embedded FM Transmission Control SW for Low Power Battery System

Authors: Young-Su Ryu, Kyung-Won Park, Jae-Hoon Song, Ki-Won Kwon

Abstract:

In this paper, an embedded frequency modulation (FM) transmission control software (SW) for a low power battery system is designed and implemented. The simultaneous translation systems for various languages are needed as so many international conferences and festivals are held in world wide. Especially in portable transmitting and receiving systems, the ability of long operation life is used for a measure of value. This paper proposes an embedded FM transmission control SW for low power battery system and shows the results of the SW implemented on a portable FM transmission system.

Keywords: FM transmission, simultaneous translation system, portable transmitting and receiving systems, low power embedded control SW

Procedia PDF Downloads 437
11266 Internal Node Stabilization for Voltage Sense Amplifiers in Multi-Channel Systems

Authors: Sanghoon Park, Ki-Jin Kim, Kwang-Ho Ahn

Abstract:

This paper discusses the undesirable charge transfer by the parasitic capacitances of the input transistors in a voltage sense amplifier. Due to its intrinsic rail-to-rail voltage transition, the input sides are inevitably disturbed. It can possible disturb the stabilities of the reference voltage levels. Moreover, it becomes serious in multi-channel systems by altering them for other channels, and so degrades the linearity of the systems. In order to alleviate the internal node voltage transition, the internal node stabilization technique is proposed by utilizing an additional biasing circuit. It achieves 47% and 43% improvements for node stabilization and input referred disturbance, respectively.

Keywords: voltage sense amplifier, voltage transition, node stabilization, biasing circuits

Procedia PDF Downloads 477
11265 Representation of the Iranian Community in the Videos of the Instagram Page of the World Health Organization Representative in Iran

Authors: Naeemeh Silvari

Abstract:

The phenomenon of the spread and epidemic of the corona virus caused many aspects of the social life of the people of the world to face various challenges. In this regard, and in order to improve the living conditions of the people, the World Health Organization has tried to publish the necessary instructions for its contacts in the world in the form of its media capacities. Considering the importance of cultural differences in the discussion of health communication and the distinct needs of people in different societies, some production contents were produced and published exclusively. This research has studied six videos published on the official page of the World Health Organization in Iran as a case study. The published content has the least semantic affinity with Iranian culture, and it has been tried to show a uniform image of the Middle East with the predominance of the image of the culture of the developing Arab countries.

Keywords: corona, representation, semiotics, instagram, health communication

Procedia PDF Downloads 88
11264 Secure E-Voting Using Blockchain Technology

Authors: Barkha Ramteke, Sonali Ridhorkar

Abstract:

An election is an important event in all countries. Traditional voting has several drawbacks, including the expense of time and effort required for tallying and counting results, the cost of papers, arrangements, and everything else required to complete a voting process. Many countries are now considering online e-voting systems, but the traditional e-voting systems suffer a lack of trust. It is not known if a vote is counted correctly, tampered or not. A lack of transparency means that the voter has no assurance that his or her vote will be counted as they voted in elections. Electronic voting systems are increasingly using blockchain technology as an underlying storage mechanism to make the voting process more transparent and assure data immutability as blockchain technology grows in popularity. The transparent feature, on the other hand, may reveal critical information about applicants because all system users have the same entitlement to their data. Furthermore, because of blockchain's pseudo-anonymity, voters' privacy will be revealed, and third parties involved in the voting process, such as registration institutions, will be able to tamper with data. To overcome these difficulties, we apply Ethereum smart contracts into blockchain-based voting systems.

Keywords: blockchain, AMV chain, electronic voting, decentralized

Procedia PDF Downloads 131
11263 IACOP - Route Optimization in Wireless Networks Using Improved Ant Colony Optimization Protocol

Authors: S. Vasundra, D. Venkatesh

Abstract:

Wireless networks have gone through an extraordinary growth in the past few years, and will keep on playing a crucial role in future data communication. The present wireless networks aim to make communication possible anywhere and anytime. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Since an ad hoc network may consist of a large number of mobile hosts, this imposes a significant challenge on the design of an effective and efficient routing protocol that can work well in an environment with frequent topological changes. This paper proposes improved ant colony optimization (IACO) technique. It also maintains load balancing in wireless networks. The simulation results show that the proposed IACO performs better than existing routing techniques.

Keywords: wireless networks, ant colony optimization, load balancing, architecture

Procedia PDF Downloads 414
11262 A New Smart Plug for Home Energy Management

Authors: G. E. Kiral, O. Elma, A. T. Ince, B. Vural, U. S. Selamogullari, M. Uzunoglu

Abstract:

Energy is an indispensable resource to meet the needs of people. Depending on the needs of people, the correct and efficient use of electrical energy has became important nowadays. Besides the need for the electrical energy is also increasing with the rapidly developing technology and continuously changing living standards. Due to the depletion of energy sources and increased demand for electricity, efficient energy use is an important research topic. Recently, ideas like smart cities, smart buildings and smart homes have been widely used under smart grid concept. With smart grid infrastructure, it will be possible to monitor electrical demand of a residential customer and control each electricity generation center for more efficient energy flow. The smallest component of the smart grid can be considered as smart homes. Better utilization of the electrical grid can be achieved through the communication of the smart home with both other customers in the grid and appliances in the house itself since generation can effectively be scheduled by having more precise demand data. Smart Plugs are used for the communication with the household appliances in the house. Smart Plug is an intermediate control element, which can be mounted on the existing outlet, and thus can be used to monitor the energy consumption of the plugged device and also can provide on/off control energy remotely. This study proposes a Smart Plug for energy monitoring and energy management. Proposed design is composed of five subsystems: micro controller embedded system with communication system, metering circuitry, power supply and switching circuitry. The developed smart plug offers efficient use of electrical energy.

Keywords: energy efficiency, home energy management, smart home, smart plug

Procedia PDF Downloads 721
11261 Robust H∞ State Feedback Control for Discrete Time T-S Fuzzy Systems Based on Fuzzy Lyapunov Function Approach

Authors: Walied Hanora

Abstract:

This paper presents the problem of robust state feedback H∞ for discrete time nonlinear system represented by Takagi-Sugeno fuzzy systems. Based on fuzzy lyapunov function, the condition ,which is represented in the form of Liner Matrix Inequalities (LMI), guarantees the H∞ performance of the T-S fuzzy system with uncertainties. By comparison with recent literature, this approach will be more relaxed condition. Finally, an example is given to illustrate the proposed result.

Keywords: fuzzy lyapunov function, H∞ control , linear matrix inequalities, state feedback, T-S fuzzy systems

Procedia PDF Downloads 280
11260 Parents' View of Children's Preschool Education in Slovakia

Authors: Sona Lorencova

Abstract:

The practice of kindergartens shows that the communication and cooperation of teachers and directors of kindergartens with parents, who come with different expectations and ideas about preschool education, is becoming an increasing problem, which leads to many misunderstandings in their mutual functioning. In practice, little attention is paid to communication and cooperation between kindergartens and families, whether in the professional development of educators, in professional articles and publications, or in the field of research. The approach of teachers to parents whose children attend kindergarten requires more and more skills on the part of educators, which is also related to the introduction of the institute of compulsory preschool education. Thus, the discrepancy in mutual expectations and requirements for children's preschool education on the part of the kindergarten and the family is increasing. The aim of the research was to look into the world of parents and learn about their subjective experience with preschool education of children in kindergarten. The findings could be useful in the search for appropriate strategies for mutual communication and cooperation between kindergartens and families in order to achieve more effective progress for children in education. The data were collected through the method of a constellation with figures, semi-structured interviews, and the use of a research diary. Through an interpretive phenomenological analysis, it was found that the parents' view of preschool education in kindergarten is connected to 6 basic topics - parenting with a preschooler, adaptation to kindergarten, professionalism of teachers, cooperation with kindergarten, and parents' satisfaction with preschool education. The conducted research also revealed that the determinants at the level of microsystem, mesosystem, exosystem, macrosystem, and chronosystem influenced parents' view of children's preschool education in kindergarten.

Keywords: preschool education, parents, kindergarten, interpretive phenomenological analysis, subjective experience

Procedia PDF Downloads 97
11259 Stability of Stochastic Model Predictive Control for Schrödinger Equation with Finite Approximation

Authors: Tomoaki Hashimoto

Abstract:

Recent technological advance has prompted significant interest in developing the control theory of quantum systems. Following the increasing interest in the control of quantum dynamics, this paper examines the control problem of Schrödinger equation because quantum dynamics is basically governed by Schrödinger equation. From the practical point of view, stochastic disturbances cannot be avoided in the implementation of control method for quantum systems. Thus, we consider here the robust stabilization problem of Schrödinger equation against stochastic disturbances. In this paper, we adopt model predictive control method in which control performance over a finite future is optimized with a performance index that has a moving initial and terminal time. The objective of this study is to derive the stability criterion for model predictive control of Schrödinger equation under stochastic disturbances.

Keywords: optimal control, stochastic systems, quantum systems, stabilization

Procedia PDF Downloads 451
11258 Evaluation of Corrosion Caused by Biogenic Sulfuric Acid (BSA) on the Concrete Structures of Sewerage Systems: Chemical Tests

Authors: M. Cortés, E. Vera, O. Rojas

Abstract:

The research studies of the kinetics of the corrosion process that attacks concrete and occurs within sewerage systems agree on the amount of variables that interfere in the process. This study aims to check the impact of the pH levels of the corrosive environment and the concrete surface, the concentrations of chemical sulfuric acid, and in turn, measure the resistance of concrete to this attack under controlled laboratory conditions; it also aims to contribute to the development of further research related to the topic, in order to compare the impact of biogenic sulfuric acid and chemical sulfuric acid involvement on concrete structures, especially in scenarios such as sewerage systems.

Keywords: acid sulfuric, concrete, corrosion, biogenic

Procedia PDF Downloads 375
11257 The Use of Learning Management Systems during Emerging the Tacit Knowledge

Authors: Ercan Eker, Muhammer Karaman, Akif Aslan, Hakan Tanrikuluoglu

Abstract:

Deficiency of institutional memory and knowledge management can result in information security breaches, loss of prestige and trustworthiness and the worst the loss of know-how and institutional knowledge. Traditional learning management within organizations is generally handled by personal efforts. That kind of struggle mostly depends on personal desire, motivation and institutional belonging. Even if an organization has highly motivated employees at a certain time, the institutional knowledge and memory life cycle will generally remain limited to these employees’ spending time in this organization. Having a learning management system in an organization can sustain the institutional memory, knowledge and know-how in the organization. Learning management systems are much more needed especially in public organizations where the job rotation is frequently seen and managers are appointed periodically. However, a learning management system should not be seen as an organizations’ website. It is a more comprehensive, interactive and user-friendly knowledge management tool for organizations. In this study, the importance of using learning management systems in the process of emerging tacit knowledge is underlined.

Keywords: knowledge management, learning management systems, tacit knowledge, institutional memory

Procedia PDF Downloads 374
11256 Heightening Pre-Service Teachers’ Attitude towards Learning and Metacognitive Learning through Information and Communication Technology: Pre-Service Science Teachers’ Perspective

Authors: Abiodun Ezekiel Adesina, Ijeoma Ginikanwa Akubugwo

Abstract:

Information and Communication Technology, ICT can heighten pre-service teachers’ attitudes toward learning and metacognitive learning; however, there is a dearth of literature on the perception of the pre-service teachers on heightening their attitude toward learning and metacognitive learning. Thus, this study investigates the perception of pre-service science teachers on heightening their attitude towards learning and metacognitive learning through ICT. Two research questions and four hypotheses guided the research. A mixed methods research was adopted for the study in concurrent triangulation type of integrating qualitative and quantitative approaches to the study. The cluster random sampling technique was adopted to select 250 pre-service science teachers in Oyo township. Two self-constructed instruments: Heightening Pre-service Science Teachers’ Attitude towards Learning and Metacognitive Learning through Information and Communication Technology Scale (HPALMIS, r=.73), and an unstructured interview were used for data collection. Thematic analysis, frequency counts and percentages, t-tests, and analysis of variance were used for data analysis. The perception level of the pre-service science teachers on heightening their attitude towards learning and metacognitive learning through ICT is above average, with the majority perceiving that ICT can enhance their thinking about their learning. The perception was significant (mean=92.68, SD=10.86, df=249, t=134.91, p<.05). The perception was significantly differentiated by gender (t=2.10, df= 248, p<.05) in favour of the female pre-service teachers and based on the first time of ICTs use (F(5,244)= 9.586, p<.05). Lecturers of science and science related courses should therefore imbibe the use of ICTs in heightening pre-service teachers’ attitude towards learning and metacognitive learning. Government should organize workshops, seminars, lectures, and symposia along with professional bodies for the science education lecturers to keep abreast of the trending ICT.

Keywords: pre-service teachers’ attitude towards learning, metacognitive learning, ICT, pre-service teachers’ perspectives

Procedia PDF Downloads 90
11255 Strict Stability of Fuzzy Differential Equations by Lyapunov Functions

Authors: Mustafa Bayram Gücen, Coşkun Yakar

Abstract:

In this study, we have investigated the strict stability of fuzzy differential systems and we compare the classical notion of strict stability criteria of ordinary differential equations and the notion of strict stability of fuzzy differential systems. In addition that, we present definitions of stability and strict stability of fuzzy differential equations and also we have some theorems and comparison results. Strict Stability is a different stability definition and this stability type can give us an information about the rate of decay of the solutions. Lyapunov’s second method is a standard technique used in the study of the qualitative behavior of fuzzy differential systems along with a comparison result that allows the prediction of behavior of a fuzzy differential system when the behavior of the null solution of a fuzzy comparison system is known. This method is a usefull for investigating strict stability of fuzzy systems. First of all, we present definitions and necessary background material. Secondly, we discuss and compare the differences between the classical notion of stability and the recent notion of strict stability. And then, we have a comparison result in which the stability properties of the null solution of the comparison system imply the corresponding stability properties of the fuzzy differential system. Consequently, we give the strict stability results and a comparison theorem. We have used Lyapunov second method and we have proved a comparison result with scalar differential equations.

Keywords: fuzzy systems, fuzzy differential equations, fuzzy stability, strict stability

Procedia PDF Downloads 244
11254 Pro-BluCRM: A Proactive Customer Relationship Management System Using Bluetooth

Authors: Mohammad Alawairdhi

Abstract:

Customer Relationship Management (CRM) started gaining attention as late as the 1990s, and since then efforts are ongoing to define the domain’s precise specifications. There is yet no single agreed upon definition. However, a predominant majority perceives CRM as a mechanism for enhancing interaction with customers, thereby strengthening the relationship between a business and its clients. From the perspective of Information Technology (IT) companies, CRM systems can be viewed as facilitating software products or services to automate the marketing, selling and servicing functions of an organization. In this paper, we have proposed a Bluetooth enabled CRM system for small- and medium-scale organizations. In the proposed system, Bluetooth technology works as an automatic identification token in addition to its common use as a communication channel. The system comprises a server side accompanied by a user-interface support for both client and server sides. The system has been tested in two environments and users have expressed ease of use, convenience and understandability as major advantages of the proposed solution.

Keywords: customer relationship management, CRM, bluetooth, automatic identification token

Procedia PDF Downloads 338
11253 Special Properties of the Zeros of the Analytic Representations of Finite Quantum Systems

Authors: Muna Tabuni

Abstract:

The paper contains an investigation on the special properties of the zeros of the analytic representations of finite quantum systems. These zeros and their paths completely define the finite quantum system. The present paper studies the construction of the analytic representation from its zeros. The analytic functions of finite quantum systems are introduced. The zeros of the analytic theta functions and their paths have been studied. The analytic function f(z) have exactly d zeros. The analytic function has been constructed from its zeros.

Keywords: construction, analytic, representation, zeros

Procedia PDF Downloads 204
11252 Telling the Truth to Patients Before Hip Fracture Surgery

Authors: Rawan Masarwa, Merav Ben Natan, Yaron Berkovich

Abstract:

Background: Hip fracture repair surgery carries a certain mortality risk, yet evidence suggests that orthopedic surgeons often refrain from discussing this issue with patients prior to surgery. Aim: This study aims to examine whether orthopedic surgeons address the issue of one-year post-surgery mortality before hip fracture repair surgery and to explore the factors influencing this decision. Method: The study uses a cross-sectional design, administering validated digital questionnaires to 150 orthopedic surgeons. Results: A minority of orthopedic surgeons reported consistently informing patients about the risk of mortality in the year following hip fracture surgery. The primary reasons for not discussing this risk were a desire to avoid frightening patients, time constraints, and concerns about undermining patient hope. Surgeons reported a medium-high level of perceived self-efficacy, with higher self-efficacy linked to a reduced likelihood of discussing one-year mortality risk. In contrast, older age and holding a specialist status in orthopedic surgery were associated with a higher likelihood of discussing this risk with patients. Conclusions: The findings suggest a need for interventions to address communication barriers and ensure consistent provision of essential information to patients undergoing hip fracture surgery. Additionally, they emphasize the importance of considering individual factors such as self-efficacy, age, and expertise in developing strategies to enhance patient-provider communication in orthopedic care settings.

Keywords: orthopedic surgeons, hip fracture surgery, mortality risk communication, patient information

Procedia PDF Downloads 18
11251 Analyzing the Place of Technology in Communication: Case Study of Kenya during COVID-19

Authors: Josephine K. Mule, Levi Obonyo

Abstract:

Technology has changed human life over time. The COVID-19 pandemic has altered the work set-up, the school system, the shopping experience, church attendance, and even the way athletes train in Kenya. Although the use of technology to communicate and maintain interactions has been on the rise in the last 30 years, the uptake during the COVID-19 pandemic has been unprecedented. Traditionally, ‘paid’ work has been considered to take place outside the “home house” but COVID-19 has resulted in what is now being referred to as “the world’s largest work-from-home experiment” with up to 43 percent of employees working at least some of the time remotely. This study was conducted on 90 respondents from across remote work set-ups, school systems, merchants and customers of online shopping, church leaders and congregants and athletes, and their coaches. Data were collected by questionnaires and interviews that were conducted online. The data is based on the first three months since the first case of coronavirus was reported in Kenya. This study found that the use of technology is in the center of working remotely with work interactions being propelled on various online platforms including, Zoom, Microsoft Teams, and Google Meet, among others. The school system has also integrated the use of technology, including students defending their thesis/dissertations online and university graduations being conducted virtually. Kenya is known for its long-distance runners, due to the directives to reduce interactions; coaches have taken to providing their athletes with guidance on training on social media using applications such as WhatsApp. More local stores are now offering the shopping online option to their customers. Churches have also felt the brunt of the situation, especially because of the restrictions on crowds resulting in online services becoming more popular in 2020 than ever before. Artists, innovatively have started online musical concerts. The findings indicate that one of the outcomes in the Kenyan society that is evident as a result of the COVID-19 period is a population that is using technology more to communicate and get work done. Vices that have thrived in this season where the use of technology has increased, include the spreading of rumors on social media and cyberbullying. The place of technology seems to have been cemented by demand during this period.

Keywords: communication, coronavirus, COVID-19, Kenya, technology

Procedia PDF Downloads 134
11250 Challenges in Anti-Counterfeiting of Cyber-Physical Systems

Authors: Daniel Kliewe, Arno Kühn, Roman Dumitrescu, Jürgen Gausemeier

Abstract:

This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in the paper.

Keywords: anti-counterfeiting, cyber physical systems, intellectual property (IP), knowledge management, system protection

Procedia PDF Downloads 492
11249 A User Interface for Easiest Way Image Encryption with Chaos

Authors: D. López-Mancilla, J. M. Roblero-Villa

Abstract:

Since 1990, the research on chaotic dynamics has received considerable attention, particularly in light of potential applications of this phenomenon in secure communications. Data encryption using chaotic systems was reported in the 90's as a new approach for signal encoding that differs from the conventional methods that use numerical algorithms as the encryption key. The algorithms for image encryption have received a lot of attention because of the need to find security on image transmission in real time over the internet and wireless networks. Known algorithms for image encryption, like the standard of data encryption (DES), have the drawback of low level of efficiency when the image is large. The encrypting based on chaos proposes a new and efficient way to get a fast and highly secure image encryption. In this work, a user interface for image encryption and a novel and easiest way to encrypt images using chaos are presented. The main idea is to reshape any image into a n-dimensional vector and combine it with vector extracted from a chaotic system, in such a way that the vector image can be hidden within the chaotic vector. Once this is done, an array is formed with the original dimensions of the image and turns again. An analysis of the security of encryption from the images using statistical analysis is made and is used a stage of optimization for image encryption security and, at the same time, the image can be accurately recovered. The user interface uses the algorithms designed for the encryption of images, allowing you to read an image from the hard drive or another external device. The user interface, encrypt the image allowing three modes of encryption. These modes are given by three different chaotic systems that the user can choose. Once encrypted image, is possible to observe the safety analysis and save it on the hard disk. The main results of this study show that this simple method of encryption, using the optimization stage, allows an encryption security, competitive with complicated encryption methods used in other works. In addition, the user interface allows encrypting image with chaos, and to submit it through any public communication channel, including internet.

Keywords: image encryption, chaos, secure communications, user interface

Procedia PDF Downloads 481
11248 Northern Ghana’s Sustainable Food Systems: Evaluating the Impact of International Development

Authors: Maxwell Ladogo Abilla

Abstract:

As evidence from the 2007–2008 and 2010 global food and financial crises revealed that food systems were under stress, the idea of sustainable food systems rose to prominence in the discussion of food security. The idea suggests moving away from a conception of food security that emphasizes production in favor of one that is more socially and environmentally conscious and interested in tackling a wide range of issues that have rendered the food system dysfunctional. This study evaluates the efforts made by international development organizations to increase food security in the area, taking into account the persistence of poverty and food insecurity in northern Ghana, utilizing the idea of sustainable food systems as the evaluation criterion. The study used triangulation to address the research questions by combining qualitative interview data with documentary analysis. To better comprehend the concept of sustainability, a variety of discourses and concepts are used, which results in the development of eight doable objectives for attaining sustainable food systems. The study finds that the food system in northern Ghana is unsustainable because of three kinds of barriers, with the practical objectives of developing sustainable food systems serving as the assessment criteria (natural, cultural and economic, and institutional). According to an evaluation of the World Food Programme's development support in northern Ghana, regional challenges to attaining sustainable food systems continue to be unaddressed by global development initiatives. Due to institutional constraints, WFP's interventions fell short of their promise. By demonstrating the need for development partners to enhance institutional efficiency and coordination, enable marginalized communities to access their rights, and prioritize agricultural irrigation in the area, the study makes a contribution to development policy and practice in northern Ghana.

Keywords: sustainable, food security, development, institutional

Procedia PDF Downloads 83