Search results for: LoRa communication protocol
3755 Polish Adversarial Trial: Analysing the Fairness of New Model of Appeal Proceedings in the Context of Delivered Research
Authors: Cezary Kulesza, Katarzyna Lapinska
Abstract:
Regarding the nature of the notion of fair trial, one must see the source of the fair trial principle in the following acts of international law: art. 6 of the ECHR of 1950 and art.14 the International Covenant on Civil and Political Rights of 1966, as well as in art. 45 of the Polish Constitution. However, the problem is that the above-mentioned acts essentially apply the principle of a fair trial to the main hearing and not to appeal proceedings. Therefore, the main thesis of the work is to answer the question whether the Polish model of appeal proceedings is fair. The paper presents the problem of fair appeal proceedings in Poland in comparative perspective. Thus, the authors discuss the basic features of English, German and Russian appeal systems. The matter is also analysed in the context of the last reforms of Polish criminal procedure, because since 2013 Polish parliament has significantly changed criminal procedure almost three times: by the Act of 27th September, 2013, the Act of 20th February, 2015 which came into effect on 1st July, 2015 and the Act of 11th March, 2016. The most astonishing is that these three amendments have been varying from each other – changing Polish criminal procedure to more adversarial one and then rejecting all measures just involved in previous acts. Additional intent of the Polish legislator was amending the forms of plea bargaining: conviction of the defendant without trial or voluntary submission to a penalty, which were supposed to become tools allowing accelerating the criminal process and, at the same time, implementing the principle of speedy procedure. The next part of the paper will discuss the matter, how the changes of plea bargaining and the main trial influenced the appellate procedure in Poland. The authors deal with the right to appeal against judgments issued in negotiated case-ending settlements in the light of Art. 2 of Protocol No. 7 to the ECHR and the Polish Constitution. The last part of the presentation will focus on the basic changes in the appeals against judgments issued after the main trial. This part of the paper also presents the results of examination of court files held in the Polish Appeal Courts in Białystok, Łódź and Warsaw. From these considerations it is concluded that the Polish CCP of 1997 in ordinary proceedings basically meets both standards: the standard adopted in Protocol No. 7 of the Convention and the Polish constitutional standard. But the examination of case files shows in particular the following phenomena: low effectiveness of appeals and growing stability of the challenged judgments of district courts, extensive duration of appeal proceedings and narrow scope of evidence proceedings before the appellate courts. On the other hand, limitations of the right to appeal against the judgments issued in consensual modes of criminal proceedings justify the fear that such final judgments may violate the principle of criminal accurate response or the principle of material truth.Keywords: adversarial trial, appeal, ECHR, England, evidence, fair trial, Germany, Polish criminal procedure, reform, Russia
Procedia PDF Downloads 1473754 Lecturers Attitudes towards the Use of Information and Communication Technology
Authors: Sujata Gupta Kedar, Fasiha Fayaz
Abstract:
This paper presents various studies being carried out by various researchers globally on the attitude of lecturers towards the advent of information technology and e-learning. An effort has been made in this paper to study the various trends being presented by researchers and draw some general conclusions. These show the effect of the lecturer’s gender, age and educational background on their attitude towards the e-learning. Also the favorable attitude of teachers' towards using new technology in teaching will certainly make teachers use them in appropriate situations in teaching and thus measuring of teachers attitude towards using new technology in teaching is very much needed. The sample of 50 males and 50 females were studied from different colleges of Bangalore “Attitudes towards using new technology scale” by Dr. Rajasekar was used. It was seen that male and female had no significant difference in hardware and software use, whereas both had favorable attitude. And there was a significant difference at 1% level among female lecturers belonging to arts faculty. There is no significant difference between the gender and age, because higher the age lower the score is. Irrespective of teaching experience males had no significant difference, whereas females are significant at 1% level, which says that higher the teaching experience of lecturers less knowledge they have towards the use of ICT, as the younger generation is more expose to technology.Keywords: e-learning, ICT, attitudes, lecturers, communication technology
Procedia PDF Downloads 4643753 Intensive Intercultural English Language Pedagogy among Parents from Culturally and Linguistically Diverse Backgrounds (CALD)
Authors: Ann Dashwood
Abstract:
Using Standard Australian English with confidence is a cultural expectation of parents of primary school aged children who want to engage effectively with their children’s teachers and school administration. That confidence in support of their children’s learning at school is seldom experienced by parents whose first language is not English. Sharing language with competence in an intercultural environment is the common denominator for meaningful communication and engagement to occur in a school community. Experience in relevant, interactive sessions is known to enhance engagement and participation. The purpose of this paper is to identify a pedagogy for parents otherwise isolated from daily use of functional Australian cultural language learned to engage effectively in their children’s learning at school. The outcomes measure parents’ intercultural engagement with classroom teachers and attention to the school’s administrative procedures using quantitative and qualitative methods. A principled communicative task-based language learning approach, combined with intercultural communication strategies provide the theoretical base for intensive English inquiry-based learning and engagement. The quantitative analysis examines data samples collected by classroom teachers and administrators and parents’ writing samples. Interviews and observations qualitatively inform the study. Currently, significant numbers of projects are active in community centers and schools to enhance English language knowledge of parents from Language Backgrounds Other Than English (LBOTE). The study is significant to explore the effects of an intensive English pedagogy with parents of varied English language backgrounds, by targeting inquiry-based language use for social interactions in the school and wider community, specific engagement and cultural interaction with teachers and school activities and procedures.Keywords: engagement, intercultural communication, language teaching pedagogy, LBOTE, school community
Procedia PDF Downloads 1203752 Information Communication Technology in Early Childhood Education: An Assessment of the Quality of ICT in the New Mega Primary Schools in Ondo State, Southwestern Nigeria
Authors: Oluyemi Christianah Ojo
Abstract:
This study seeks to investigate the quality of ICT provided in the new Caring Heart schools in Ondo State, Nigeria. The population for the study was all caring Heart Mega Schools in Ondo State, Nigeria. Research questions were generated; two instruments CCCMS and TQCUC were used to elicit information from the schools and the teachers. The study adopts descriptive survey approach. The studies revealed and concluded that ICT components were available and adequate in these schools, Charts showing ICT components and other forms of computer devices used as instructional materials were available but were not adequate; teachers teaching computer studies are competent in the delivery of instructions and in handling computer gadgets in the laboratory. The study recommended the provision of steady electricity, uninterrupted internet facilities and provision of adequate ICT components and charts for effective teaching delivery and learning.Keywords: facilities, information communication technology, mega primary school, primary education
Procedia PDF Downloads 2953751 Love and Loss: The Emergence of Shame in Romantic Information Communication Technology
Authors: C. Caudwell, R. Syed, C. Lacey
Abstract:
While the development and advancement of information communication technologies (ICTs) offers powerful opportunities for meaningful connections and relationships, shame is a significant barrier to social and cultural acceptance. In particular, artificial intelligence and socially oriented robots are increasingly becoming partners in romantic relationships with people, offering bonding, support, comfort, growth, and reciprocity. However, these relationships suffer hierarchical, anthropocentric shame that is a significant barrier to their success and longevity. This paper will present case studies of human and artificially intelligent agent relationships, in the context of internal and external shame, as cultivated, propagated, and communicated through ICT. Using an interdisciplinary methodology we aim to present a framework for technological shame, building on the experimental and emergent psychoanalytical theories of emotions. Our study finds principally that socialization is a powerful factor in the vectors of shame as experienced by humans. On a wider scale, we contribute understanding of social emotion and the phenomenon of shame proliferated through ICTs, which is at present under-explored, but vital, as society and culture is increasingly mediated through this medium.Keywords: shame, artificial intelligence, romance, society
Procedia PDF Downloads 1343750 Ultra-Wideband Antennas for Ultra-Wideband Communication and Sensing Systems
Authors: Meng Miao, Jeongwoo Han, Cam Nguyen
Abstract:
Ultra-wideband (UWB) time-domain impulse communication and radar systems use ultra-short duration pulses in the sub-nanosecond regime, instead of continuous sinusoidal waves, to transmit information. The pulse directly generates a very wide-band instantaneous signal with various duty cycles depending on specific usages. In UWB systems, the total transmitted power is spread over an extremely wide range of frequencies; the power spectral density is extremely low. This effectively results in extremely small interference to other radio signals while maintains excellent immunity to interference from these signals. UWB devices can therefore work within frequencies already allocated for other radio services, thus helping to maximize this dwindling resource. Therefore, impulse UWB technique is attractive for realizing high-data-rate, short-range communications, ground penetrating radar (GPR), and military radar with relatively low emission power levels. UWB antennas are the key element dictating the transmitted and received pulse shape and amplitude in both time and frequency domain. They should have good impulse response with minimal distortion. To facilitate integration with transmitters and receivers employing microwave integrated circuits, UWB antennas enabling direct integration are preferred. We present the development of two UWB antennas operating from 3.1 to 10.6 GHz and 0.3-6 GHz for UWB systems that provide direct integration with microwave integrated circuits. The operation of these antennas is based on the principle of wave propagation on a non-uniform transmission line. Time-domain EM simulation is conducted to optimize the antenna structures to minimize reflections occurring at the open-end transition. Calculated and measured results of these UWB antennas are presented in both frequency and time domains. The antennas have good time-domain responses. They can transmit and receive pulses effectively with minimum distortion, little ringing, and small reflection, clearly demonstrating the signal fidelity of the antennas in reproducing the waveform of UWB signals which is critical for UWB sensors and communication systems. Good performance together with seamless microwave integrated-circuit integration makes these antennas good candidates not only for UWB applications but also for integration with printed-circuit UWB transmitters and receivers.Keywords: antennas, ultra-wideband, UWB, UWB communication systems, UWB radar systems
Procedia PDF Downloads 2383749 Shared Vision System Support for Maintenance Tasks of Wind Turbines
Authors: Buket Celik Ünal, Onur Ünal
Abstract:
Communication is the most challenging part of maintenance operations. Communication between expert and fieldworker is crucial for effective maintenance and this also affects the safety of the fieldworkers. To support a machine user in a remote collaborative physical task, both, a mobile and a stationary device are needed. Such a system is called a shared vision system and the system supports two people to solve a problem from different places. This system reduces the errors and provides a reliable support for qualified and less qualified users. Through this research, it was aimed to validate the effectiveness of using a shared vision system to facilitate communication between on-site workers and those issuing instructions regarding maintenance or inspection works over long distances. The system is designed with head-worn display which is called a shared vision system. As a part of this study, a substitute system is used and implemented by using a shared vision system for maintenance operation. The benefits of the use of a shared vision system are analyzed and results are adapted to the wind turbines to improve the occupational safety and health for maintenance technicians. The motivation for the research effort in this study can be summarized in the following research questions: -How can expert support technician over long distances during maintenance operation? -What are the advantages of using a shared vision system? Experience from the experiment shows that using a shared vision system is an advantage for both electrical and mechanical system failures. Results support that the shared vision system can be used for wind turbine maintenance and repair tasks. Because wind turbine generator/gearbox and the substitute system have similar failures. Electrical failures, such as voltage irregularities, wiring failures and mechanical failures, such as alignment, vibration, over-speed conditions are the common and similar failures for both. Furthermore, it was analyzed the effectiveness of the shared vision system by using a smart glasses in connection with the maintenance task performed by a substitute system under four different circumstances, namely by using a shared vision system, an audio communication, a smartphone and by yourself condition. A suitable method for determining dependencies between factors measured in Chi Square Test, and Chi Square Test for Independence measured for determining a relationship between two qualitative variables and finally Mann Whitney U Test is used to compare any two data sets. While based on this experiment, no relation was found between the results and the gender. Participants` responses confirmed that the shared vision system is efficient and helpful for maintenance operations. From the results of the research, there was a statistically significant difference in the average time taken by subjects on works using a shared vision system under the other conditions. Additionally, this study confirmed that a shared vision system provides reduction in time to diagnose and resolve maintenance issues, reduction in diagnosis errors, reduced travel costs for experts, and increased reliability in service.Keywords: communication support, maintenance and inspection tasks, occupational health and safety, shared vision system
Procedia PDF Downloads 2603748 Analyzing the Plausible Alternatives in Contracting the Societal Fissure Caused by Digital Divide in Sri Lanka
Authors: Manuela Nayantara Jeyaraj
Abstract:
'Digital Divide' is a concept that has existed in this paradigm ever since the discovery of the first-generation technologies. Before the turn of the century, it was basically used to describe the gap between those with telephone communication access and those without it. At present, it is plainly descriptive in itself to illustrate the cavity among those with Internet access and those without. Though the concept of digital divide has been merely lying in sight for as long as time itself, the friction it caused has not yet been fully realized to solve major crisis situations. Unlike well-developed countries, Sri Lanka is still in the verge of moving farther away from a developing country in the race towards reaching a developed state. Access to technological resources varies from region to region, even within the island itself, with one region having a considerable percentage of its community exposed to the Internet and its related technologies, and the other unaware of such. Thus, this paper intends to analyze the roots for the still-extant gap instigated based on the concept of ‘Digital Divide’ and explores the plausible potentials that could be brought about by narrowing this prevailing percentage among the population, specifically entrenching the advantages reaped towards an economic augmentation and culture or lifestyle revolution on the path towards development.Keywords: communication, digital divide, society, Sri Lanka
Procedia PDF Downloads 2323747 Markov Characteristics of the Power Line Communication Channels in China
Authors: Ming-Yue Zhai
Abstract:
Due to the multipath and pulse noise nature, power line communications(PLC) channel can be modelled as a memory one with the finite states Markov model(FSMC). As the most important parameter modelling a Markov channel,the memory order in an FSMC is not solved in PLC systems yet. In the paper, the mutual information is used as a measure of the dependence between the different symbols, treated as the received SNA or amplitude of the current channel symbol or that of previous symbols. The joint distribution probabilities of the envelopes in PLC systems are computed based on the multi-path channel model, which is commonly used in PLC. we confirm that given the information of the symbol immediately preceding the current one, any other previous symbol is independent of the current one in PLC systems, which means the PLC channels is a Markov chain with the first-order. The field test is also performed to model the received OFDM signals with the help of AR model. The results show that the first-order AR model is enough to model the fading channel in PLC systems, which means the amount of uncertainty remaining in the current symbol should be negligible, given the information corresponding to the immediately preceding one.Keywords: power line communication, channel model, markovian, information theory, first-order
Procedia PDF Downloads 4123746 Comparative Analysis of Universal Filtered Multi Carrier and Filtered Orthogonal Frequency Division Multiplexing Systems for Wireless Communications
Authors: Raja Rajeswari K
Abstract:
Orthogonal Frequency Division Multiplexing (OFDM), a multi Carrier transmission technique that has been used in implementing the majority of wireless applications like Wireless Network Protocol Standards (like IEEE 802.11a, IEEE 802.11n), in telecommunications (like LTE, LTE-Advanced) and also in Digital Audio & Video Broadcast standards. The latest research and development in the area of orthogonal frequency division multiplexing, Universal Filtered Multi Carrier (UFMC) & Filtered OFDM (F-OFDM) has attracted lots of attention for wideband wireless communications. In this paper UFMC & F-OFDM system are implemented and comparative analysis are carried out in terms of M-ary QAM modulation scheme over Dolph-chebyshev filter & rectangular window filter and to estimate Bit Error Rate (BER) over Rayleigh fading channel.Keywords: UFMC, F-OFDM, BER, M-ary QAM
Procedia PDF Downloads 1693745 Impression Evaluation by Design Change of Anthropomorphic Agent
Authors: Kazuko Sakamoto
Abstract:
Anthropomorphic agents have been successful in areas where there are many human interactions, such as education and medical care. The persuasive effect is also expected in e-shopping sites on the web. This indicates that customer service is not necessarily human but can play that role. However, the 'humanity' in anthropomorphism sometimes has a risk of working negatively. In general, as the appearance of anthropomorphic agents approaches humans, it is thought that their affinity with humans increases. However, when the degree of similarity reaches a certain level, it gives the user a weird feeling. This is the 'eerie valley' phenomenon. This is a concept used in the world of robotics, but it seems to be applicable to anthropomorphic agents such as characters. Then what kind of design can you accept as an anthropomorphic agent that gives you a feeling of friendliness or good feeling without causing discomfort or fear to people? This study focused on this point and examined what design and characteristics would be effective for marketing communication. As a result of the investigation, it was found that there is no need for gaze and blinking, the size of the eyes is normal or large, and the impression evaluation is higher when the structure is as simple as possible. Conversely, agents with high eye-gaze and white-eye ratios had low evaluations, and the negative impact on eye-gaze was particularly large.Keywords: anthropomorphicgents, design evaluation, marketing communication, customer service
Procedia PDF Downloads 1133744 Management and Agreement Protocol in Computer Security
Authors: Abdulameer K. Hussain
Abstract:
When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).Keywords: agreement parameters, key agreement, key exchange, security management
Procedia PDF Downloads 4213743 The Way We Express vs. What We Express
Authors: Brendan Mooney
Abstract:
We often do not consider the quality of the way we express ourselves as being fundamental to well-being. Society focuses predominantly on what we do, not the way we do it, to our great detriment. For example, those who have experienced domestic violence often comment that it was not what was said that hurt the most but the way it was said. In other words, the quality in the way the words were used communicated far more than the actual words themselves. This is an important area of focus for practitioners who may be inclined to emphasize who said what but not bring equal, if not more, focus to the quality of one’s expression. The aim of this study is to highlight how and why the way we express ourselves is more important than what we express, which includes words and all behaviors. Given we are a sensitive species it matters to pay attention to the communication that is not said. For example, we have the ability to recognize that a person is upset or angry by the way they walk into a room, even if they do not say anything or look at anyone. Our sensitivity allows us to detect even the slightest change in another’s emotional state, irrespective of what their exterior behaviors may be exhibiting. This study will focus on the importance of recognizing the quality in the way we express as being fundamental to wellbeing, as it allows us to easily and simply navigate life and relationships without needing to experience the usual pitfalls that otherwise prevail. This research utilizes clinical experience, client observations and client feedback, and several case studies were utilized to illustrate real-life examples of the above. This study is not so much a model of life but a way of life that confirms our deepest nature, that we are incredibly sensitive and far more so than we appreciate or utilize in everyday practical human life.Keywords: communication, integrity, quality, sensitivity, wellbeing
Procedia PDF Downloads 353742 Conflict of the Thai-Malaysian Gas Pipeline Project
Authors: Nopadol Burananuth
Abstract:
This research was aimed to investigate (1) the relationship among local social movements, non-governmental Organization activities and state measures deployment; and (2) the effects of local social movements, non-governmental Organization activities, and state measures deployment on conflict of local people towards the Thai-Malaysian gas pipeline project. These people included 1,000 residents of the four districts in Songkhla province. The methods of data analysis consist of multiple regression analysis. The results of the analysis showed that: (1) local social movements depended on information, and mass communication; deployment of state measures depended on compromise, coordination, and mass communication; and (2) the conflict of local people depended on mobilization, negotiation, and campaigning for participation of people in the project. Thus, it is recommended that to successfully implement any government policy, consideration must be paid to the conflict of local people, mobilization, negotiation, and campaigning for people’s participation in the project.Keywords: conflict, NGO activities, social movements, state measures
Procedia PDF Downloads 3223741 Heritage Making Process of Urban Movements: A Case Study on the Public Struggle for 100% Open Tempelhofer Feld
Authors: Dilsad Aladag
Abstract:
From the closure of Tempelhofer Airport and the field in 2008 till 2014, the field's opening to public use was a subject of an urban movement that comprised demonstrations, protests, squats, workshops, panels, petition campaigns, and a referendum in 2014. As a result, Tempelhofer Feld is an open urban space for the use of Berliners today and protected by 'ThF law'. This analysis questioned how these urban movements' story is narrated and interpreted by two actor groups involved: citizen initiatives and city officials. Representation and communication take a vital part in transmitting and narrating meanings in heritage discourse and practice. Therefore, this research focused on particular websites as channels of representation and communication that these stakeholder groups maintained. The narrative analysis aims to examine meanings and stories portrayed with texts and images on the stakeholder's websites. This paper shares the essential findings of research and draws new questions regarding the urban heritage as both a source and a result of conflicts and stakeholders' role as producers of narrations of urban heritage.Keywords: conflict, heritage, urban movement, representation
Procedia PDF Downloads 1763740 Communicating Through Symbolisms in Anthropoligical Medicine with Reference to Traditional Performances of Wayang Kulit, Main Puteri and Kuda Kepang
Authors: M. G. Nasuruddin, S. Ishak
Abstract:
In anthropological medicine (traditional therapeutic healing) symbolic interface are used to connect with the cognitive and metacognitive mechanisms to activate conscious and unconscious response of patients or other recipients. At the same time they are used to communicate with the inhabitants of the nether world to whom are ascribed almost all cases of psychosomatic illness. The symbols, which are cultural specific, are divided into verbal and non-verbal forms of communication. The verbal forms are chanting of mantra and doa and the invocation to invoke the spirits while the non-verbal ones are the physical materials such as the offerings, props and decorative elements, music, movements, olfactory sensation and the performance space. The process of communication through these symbols is affected by the Shaman who is a link or intermediary between the healer (Shaman) and the patients and between the healer and the spirits of the nether world. The paper also examines the scientific perspective of the traditional healing through the use of these symbols. The response to these symbols as external stimuli is embedded in the genes that are linked to the hereditary factor in the person’s DNA. When the patients are tuned in to external stimuli such as music, chanting and singing (sonic orders), it can triggers a response from the brain, which may activate its inner pharmacy by releasing drugs such as dopamine and/or opiodsto ameliorate pain and counter depression, anxiety and create a feel good feeling. These symbols act like placebo, evoking the power of the mind over the body and triggering the innate self-healing energy. At the same time they could also be used as nocebo, for example black magic, which has the opposite effect of placebo. In whatever capacity they operate these symbols, which are either visual or auditory, is an integral part of anthropological medicine. For they communicate and conjure emotional responses that are conducive to healing by activating the internal brain pharmacy.Keywords: communication, healing, placebo, nacebo, symbol
Procedia PDF Downloads 4423739 Support Provided by Midwives to Women during Labour in a Public Hospital, Limpopo Province, South Africa: A Participant Observation Study
Authors: Sonto Maputle
Abstract:
Background: Support during labour increase women's chances of having positive childbirth experiences as well as childbirth outcomes. The purpose of this study was to determine the support provided by midwives to women during labour at the public hospital in Limpopo Province. The study was conducted at the Tertiary hospital in Limpopo Province. Methods: A qualitative, participant observation approach was used. Population consisted of all women that were admitted to deliver their babies and the midwives who provided midwifery care in the obstetric unit of one tertiary public hospital in Limpopo Province. Non-probability, purposive and convenience sampling were used to sample 24 women and 12 midwives. Data were collected through participant observations which included unstructured conversations with the use of observational guide, field notes of events and conversations that occurred when women interact with midwives were recorded verbatim and a Visual Analog Scale to complement the observations. Data was analysed qualitatively but were presented in the tables and bar graphs. Results: Five themes emerged as support provided by midwives during labour, namely; communication between women and midwives, informational support, emotional support activities, interpretation of the experienced labour pain and supportive care activities during labour. Conclusion: The communication was occurring when the midwife was rendering midwifery care and very limited for empowering. The information sharing focused on the assistive actions rather than on the activities that would promote mothers’ participation. The emotional support activities indicated lack of respect and disregard cultural preferences and this contributed to inability to exercise choices in decision-making. The study recommended the implementation of Batho Pele principles in order to provide woman-centred care during labour.Keywords: communication between women and midwives, labour pains, informational and emotional support, physical comforting measures
Procedia PDF Downloads 1523738 Mobile Communication Technologies, Romantic Attachment and Relationship Quality: An Exploration of Partner Attunement
Authors: Jodie Bradnam, Mark Edwards, Bruce Watt
Abstract:
Mobile technologies have emerged as tools to create and sustain social and romantic relationships. The integration of technologies in close relationships has been of particular research interest with findings supporting the positive role of mobile phones in nurturing feelings of closeness and connection. More recently, the use of text messaging to manage conflict has become a focus of research attention. Four hundred and eleven adults in committed romantic relationships completed a series of questionnaires measuring attachment orientation, relationship quality, texting frequencies, attitudes, and response expectations. Attachment orientation, relationship length, texting for connection and disconnection were significant predictors of relationship quality, specifically relationship intimacy. Text frequency varied as a function of attachment orientation, with high attachment anxiety associated with high texting frequencies and with low relationship quality. Sending text messages of love and support was related to higher intimacy and relationship satisfaction scores, while sending critical or impersonal texts was associated with significantly lower intimacy and relationship satisfaction scores. The use of texting to manage relational conflict was a stronger negative predictor of relationship satisfaction than was the use of texting to express love and affection. Consistent with research on face-to-face communication in couples, the expression of negative sentiments via text were related to lower relationship quality, and these negative sentiments had a stronger and more enduring impact on relationship quality than did the expression of positive sentiments. Attachment orientation, relationship length and relationship status emerged as variables of interest in understanding the use of mobile technologies in romantic relationships.Keywords: attachment, destructive conflict, intimacy, mobile communication, relationship quality, relationship satisfaction, texting
Procedia PDF Downloads 3853737 E-Learning Approach for Improving Classroom Teaching to Enhance Students' Learning in Secondary Schools in Nigeria
Authors: Chika Ethel Esege
Abstract:
Electronic learning is learning facilitated by technology which has basically altered approaches globally, including the field of education. This trend is compelling educators to focus on approaches that improve classroom practices in order to enhance students’ learning and participation in a global digital society. However, e-learning is not fully utilized across subject disciplines particularly in the field of humanities, in the context of Nigerian secondary education. This study focused on the use of e-learning to enhance the development of digital skills, particularly, collaboration and communication in secondary school students in Nigeria. The study adopted an ‘action research’ involving 210 students and 7 teachers, who utilised the e-learning platform designed by the researcher for the survey. Mixed methods- qualitative and quantitative- were used for data collection including questionnaire, observation, interview, and analysis of statutory documents. The data were presented using frequency counts for questionnaire responses and figures of screenshots for learning tasks. The VOD Burner software was also used to analyse interviews and video recordings. The study showed that the students acquired collaboration and communication skills through e-learning intervention lesson, and demonstrated satisfaction with this approach. However, the study further revealed that the traditional teaching approach could not provide digital education or develop the digital skills of the students. Based on these findings, recommendations were made that the Nigerian Government should incorporate digital content across subject disciplines into secondary school education curricular and provide adequate infrastructure in order to enable educators to adopt relevant approaches necessary for the enhancement of students’ learning especially in a technologically evolving and advancing world.Keywords: developing collaboration and communication skills, electronic learning, improving classroom teaching, secondary schools in Nigeria
Procedia PDF Downloads 1343736 A Framework of Virtualized Software Controller for Smart Manufacturing
Authors: Pin Xiu Chen, Shang Liang Chen
Abstract:
A virtualized software controller is developed in this research to replace traditional hardware control units. This virtualized software controller transfers motion interpolation calculations from the motion control units of end devices to edge computing platforms, thereby reducing the end devices' computational load and hardware requirements and making maintenance and updates easier. The study also applies the concept of microservices, dividing the control system into several small functional modules and then deploy into a cloud data server. This reduces the interdependency among modules and enhances the overall system's flexibility and scalability. Finally, with containerization technology, the system can be deployed and started in a matter of seconds, which is more efficient than traditional virtual machine deployment methods. Furthermore, this virtualized software controller communicates with end control devices via wireless networks, making the placement of production equipment or the redesign of processes more flexible and no longer limited by physical wiring. To handle the large data flow and maintain low-latency transmission, this study integrates 5G technology, fully utilizing its high speed, wide bandwidth, and low latency features to achieve rapid and stable remote machine control. An experimental setup is designed to verify the feasibility and test the performance of this framework. This study designs a smart manufacturing site with a 5G communication architecture, serving as a field for experimental data collection and performance testing. The smart manufacturing site includes one robotic arm, three Computer Numerical Control machine tools, several Input/Output ports, and an edge computing architecture. All machinery information is uploaded to edge computing servers and cloud servers via 5G communication and the Internet of Things framework. After analysis and computation, this information is converted into motion control commands, which are transmitted back to the relevant machinery for motion control through 5G communication. The communication time intervals at each stage are calculated using the C++ chrono library to measure the time difference for each command transmission. The relevant test results will be organized and displayed in the full-text.Keywords: 5G, MEC, microservices, virtualized software controller, smart manufacturing
Procedia PDF Downloads 823735 Efficient and Timely Mutual Authentication Scheme for RFID Systems
Authors: Hesham A. El Zouka, Mustafa M. Hosni ka
Abstract:
The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature
Procedia PDF Downloads 2693734 A Method for Compression of Short Unicode Strings
Authors: Masoud Abedi, Abbas Malekpour, Peter Luksch, Mohammad Reza Mojtabaei
Abstract:
The use of short texts in communication has been greatly increasing in recent years. Applying different languages in short texts has led to compulsory use of Unicode strings. These strings need twice the space of common strings, hence, applying algorithms of compression for the purpose of accelerating transmission and reducing cost is worthwhile. Nevertheless, other compression methods like gzip, bzip2 or PAQ due to high overhead data size are not appropriate. The Huffman algorithm is one of the rare algorithms effective in reducing the size of short Unicode strings. In this paper, an algorithm is proposed for compression of very short Unicode strings. At first, every new character to be sent to a destination is inserted in the proposed mapping table. At the beginning, every character is new. In case the character is repeated for the same destination, it is not considered as a new character. Next, the new characters together with the mapping value of repeated characters are arranged through a specific technique and specially formatted to be transmitted. The results obtained from an assessment made on a set of short Persian and Arabic strings indicate that this proposed algorithm outperforms the Huffman algorithm in size reduction.Keywords: Algorithms, Data Compression, Decoding, Encoding, Huffman Codes, Text Communication
Procedia PDF Downloads 3483733 Leveraging Reasoning through Discourse: A Case Study in Secondary Mathematics Classrooms
Authors: Cory A. Bennett
Abstract:
Teaching and learning through the use of discourse support students’ conceptual understanding by attending to key concepts and relationships. One discourse structure used in primary classrooms is number talks wherein students mentally calculate, discuss, and reason about the appropriateness and efficiency of their strategies. In the secondary mathematics classroom, the mathematics understudy does not often lend itself to mental calculations yet learning to reason, and articulate reasoning, is central to learning mathematics. This qualitative case study discusses how one secondary school in the Middle East adapted the number talk protocol for secondary mathematics classrooms. Several challenges in implementing ‘reasoning talks’ became apparent including shifting current discourse protocols and practices to a more student-centric model, accurately recording and probing student thinking, and specifically attending to reasoning rather than computations.Keywords: discourse, reasoning, secondary mathematics, teacher development
Procedia PDF Downloads 1873732 A Valid Professional Development Framework For Supporting Science Teachers In Relation To Inquiry-Based Curriculum Units
Authors: Fru Vitalis Akuma, Jenna Koenen
Abstract:
The science education community is increasingly calling for learning experiences that mirror the work of scientists. Although inquiry-based science education is aligned with these calls, the implementation of this strategy is a complex and daunting task for many teachers. Thus, policymakers and researchers have noted the need for continued teacher Professional Development (PD) in the enactment of inquiry-based science education, coupled with effective ways of reaching the goals of teacher PD. This is a complex problem for which educational design research is suitable. The purpose at this stage of our design research is to develop a generic PD framework that is valid as the blueprint of a PD program for supporting science teachers in relation to inquiry-based curriculum units. The seven components of the framework are the goal, learning theory, strategy, phases, support, motivation, and an instructional model. Based on a systematic review of the literature on effective (science) teacher PD, coupled with developer screening, we have generated a design principle per component of the PD framework. For example, as per the associated design principle, the goal of the framework is to provide science teachers with experiences in authentic inquiry, coupled with enhancing their competencies linked to the adoption, customization and design; then the classroom implementation and the revision of inquiry-based curriculum units. The seven design principles have allowed us to synthesize the PD framework, which, coupled with the design principles, are the preliminary outcomes of the current research. We are in the process of evaluating the content and construct validity of the framework, based on nine one-on-one interviews with experts in inquiry-based classroom and teacher learning. To this end, we have developed an interview protocol with the input of eight such experts in South Africa and Germany. Using the protocol, the expert appraisal of the PD framework will involve three experts from Germany, South Africa, and Cameroon, respectively. These countries, where we originate and/or work, provide a variety of inquiry-based science education contexts, making the countries suitable in the evaluation of the generic PD framework. Based on the evaluation, we will revise the framework and its seven design principles to arrive at the final outcomes of the current research. While the final content and construct a valid version of the framework will serve as an example of the needed ways through which effective inquiry-based science teacher PD may be achieved, the final design principles will be useful to researchers when transforming the framework for use in any specific educational context. For example, in our further research, we will transform the framework to one that is practical and effective in supporting inquiry-based practical work in resource-constrained physical sciences classrooms in South Africa. Researchers in other educational contexts may similarly consider the final framework and design principles in their work. Thus, our final outcomes will inform practice and research around the support of teachers to increase the incorporation of learning experiences that mirror the work of scientists in a worldwide manner.Keywords: design principles, educational design research, evaluation, inquiry-based science education, professional development framework
Procedia PDF Downloads 1493731 A POX Controller Module to Prepare a List of Flow Header Information Extracted from SDN Traffic
Authors: Wisam H. Muragaa, Kamaruzzaman Seman, Mohd Fadzli Marhusin
Abstract:
Software Defined Networking (SDN) is a paradigm designed to facilitate the way of controlling the network dynamically and with more agility. Network traffic is a set of flows, each of which contains a set of packets. In SDN, a matching process is performed on every packet coming to the network in the SDN switch. Only the headers of the new packets will be forwarded to the SDN controller. In terminology, the flow header fields are called tuples. Basically, these tuples are 5-tuple: the source and destination IP addresses, source and destination ports, and protocol number. This flow information is used to provide an overview of the network traffic. Our module is meant to extract this 5-tuple with the packets and flows numbers and show them as a list. Therefore, this list can be used as a first step in the way of detecting the DDoS attack. Thus, this module can be considered as the beginning stage of any flow-based DDoS detection method.Keywords: matching, OpenFlow tables, POX controller, SDN, table-miss
Procedia PDF Downloads 1993730 Secure Text Steganography for Microsoft Word Document
Authors: Khan Farhan Rafat, M. Junaid Hussain
Abstract:
Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography
Procedia PDF Downloads 2413729 Doctor-Patient Interaction in an L2: Pragmatic Study of a Nigerian Experience
Authors: Ayodele James Akinola
Abstract:
This study investigated the use of English in doctor-patient interaction in a university teaching hospital from a southwestern state in Nigeria with the aim of identifying the role of communication in an L2, patterns of communication, discourse strategies, pragmatic acts, and contexts that shape the interaction. Jacob Mey’s Pragmatic Acts notion complemented with Emanuel and Emanuel’s model of doctor-patient relationship provided the theoretical standpoint. Data comprising 7 audio-recorded doctors-patient interactions were collected from a University Hospital in Oyo state, Nigeria. Interactions involving the use of English language were purposefully selected. These were supplemented with patients’ case notes and interviews conducted with doctors. Transcription was patterned alongside modified Arminen’s notations of conversation analysis. In the study, interaction in English between doctor and patients has the preponderance of direct-translation, code-mixing and switching, Nigerianism and use of cultural worldviews to express medical experience. Irrespective of these, three patterns communication, namely the paternalistic, interpretive, and deliberative were identified. These were exhibited through varying discourse strategies. The paternalistic model reflected slightly casual conversational conventions and registers. These were achieved through the pragmemic activities of situated speech acts, psychological and physical acts, via patients’ quarrel-induced acts, controlled and managed through doctors’ shared situation knowledge. All these produced empathising, pacifying, promising and instructing practs. The patients’ practs were explaining, provoking, associating and greeting in the paternalistic model. The informative model reveals the use of adjacency pairs, formal turn-taking, precise detailing, institutional talks and dialogic strategies. Through the activities of the speech, prosody and physical acts, the practs of declaring, alerting and informing were utilised by doctors, while the patients exploited adapting, requesting and selecting practs. The negotiating conversational strategy of the deliberative model featured in the speech, prosody and physical acts. In this model, practs of suggesting, teaching, persuading and convincing were utilised by the doctors. The patients deployed the practs of questioning, demanding, considering and deciding. The contextual variables revealed that other patterns (such as phatic and informative) are also used and they coalesced in the hospital within the situational and psychological contexts. However, the paternalistic model was predominantly employed by doctors with over six years in practice, while the interpretive, informative and deliberative models were found among registrar and others below six years of medical practice. Doctors’ experience, patients’ peculiarities and shared cultural knowledge influenced doctor-patient communication in the study.Keywords: pragmatics, communication pattern, doctor-patient interaction, Nigerian hospital situation
Procedia PDF Downloads 1783728 Metabolic Cost and Perceived Exertion during Progressive and Randomized Walking Protocols
Authors: Simeon E. H. Davies
Abstract:
This study investigated whether selected metabolic responses and the perception of effort varied during four different walk protocols where speed increased progressively 3, 4, 5, 6, and 7 km/hr (progressive treadmill walk (PTW); and progressive land walk (PLW); or where the participant adjusted to random changes of speed e.g. 6, 3, 7, 4, and 5 km/hr during a randomized treadmill walk (RTW); and a randomized land walk (RLW). Mean stature and mass of the seven participants was 1.75m and 70kg respectively, with a mean body fat of 15%. Metabolic measures including heart rate, relative oxygen uptake, ventilation, increased in a linear fashion up to 6 km/hr, however at 7 km/hr there was a significant increase in metabolic response notably during the PLW, and to a similar, although lesser extent in RLW, probably as a consequence of the loss of kinetic energy when turning at each cone in order to maintain the speed during each shuttle. Respiration frequency appeared to be a more sensitive indicator of physical exertion, exhibiting a rapid elevation at 5 km/hr. The perception of effort during each mode and at each speed was largely congruent during each walk protocol.Keywords: exertion, metabolic, progressive, random, walking
Procedia PDF Downloads 4623727 Sex Education: The Teacher’s Discourses About the Relation Between the Children and the Media, Concerning Sex Education and the Childhood
Authors: Katerina Samartzi
Abstract:
This study focuses on the teacher’s discourses in Greece, about the relation between the children and the media, concerning sex education and widely the childhood. The teachers’ input reflect the anxieties and the dominant discourses that exist around these issues. The study begins with the critical discussion of the available literature concerning the potential impact of media and the ‘moral panics’, their role in sex education and the children’s use of sexual material. Moreover, the study analyses the social construction of childhood and sexuality. Given the lack of explicit and official protocol for the sex education in Greece and due the fact that the young people are familiar with all the material provided by the New Media and their part as an informal education, this project aims to point out the factors that reinforce these gaps. This study focuses on the way the adults and specifically teachers contextualize the children’s relation with media, their sexuality, the sex education, the use of sexual material and the childhood.Keywords: childhood, children's sexuality, media, moral panics, pornography, sex education
Procedia PDF Downloads 1753726 Cooperative Sensing for Wireless Sensor Networks
Authors: Julien Romieux, Fabio Verdicchio
Abstract:
Wireless Sensor Networks (WSNs), which sense environmental data with battery-powered nodes, require multi-hop communication. This power-demanding task adds an extra workload that is unfairly distributed across the network. As a result, nodes run out of battery at different times: this requires an impractical individual node maintenance scheme. Therefore we investigate a new Cooperative Sensing approach that extends the WSN operational life and allows a more practical network maintenance scheme (where all nodes deplete their batteries almost at the same time). We propose a novel cooperative algorithm that derives a piecewise representation of the sensed signal while controlling approximation accuracy. Simulations show that our algorithm increases WSN operational life and spreads communication workload evenly. Results convey a counterintuitive conclusion: distributing workload fairly amongst nodes may not decrease the network power consumption and yet extend the WSN operational life. This is achieved as our cooperative approach decreases the workload of the most burdened cluster in the network.Keywords: cooperative signal processing, signal representation and approximation, power management, wireless sensor networks
Procedia PDF Downloads 390