Search results for: Internet of Things (IOT)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2089

Search results for: Internet of Things (IOT)

679 Children Protection in the Digital Space

Authors: Beverly Komen

Abstract:

Online crimes have been on the rise in the recent days, especially with the hit of the covid-19 pandemic. The coronavirus pandemic has led to an unprecedented rise in screen time, this means more families are relying on technology and digital solutions to keep children learning, spending more time on the virtual platforms can leave children vulnerable to online abuse and exploitation. With ease access of affordable phones, internet, and increased online activities, all children are at risk of being abused online hence making the digital space unsafe for children. With these increased use of technology and its accessibility, children are at risk of facing challenges such as access to inappropriate content, online grooming, identity theft, cyber bullying, among other risks. The big question is; as we enjoy the benefits brought in by technology, how do we ensure that our children are save in this digital space? With the analysis of the current trends, there is a gap in knowledge on people’s understanding on child online protection and safety measures when using the digital space. A survey conducted among 50 parents in Nairobi in Kenya indicated that there is a gap in knowledge on online protection of children and over 50 % of the participants shared that for sure they have no idea on how to protect children online. This paper seeks to address the concept of child protection in the digital space and come up with viable solutions in protecting children from online vices.

Keywords: child protection, digital space, online risks, online grooming, cyber bulying, online child sexual exploitation, and abuse

Procedia PDF Downloads 164
678 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 243
677 The Effects of “Never Pressure Injury” on the Incidence of Pressure Injuries in Critically Ill Patients

Authors: Nuchjaree Kidjawan, Orapan Thosingha, Pawinee Vaipatama, Prakrankiat Youngkong, Sirinapha Malangputhong, Kitti Thamrongaphichartkul, Phatcharaporn Phetcharat

Abstract:

NPI uses technology sensorization of things and processed by AI system. The main features are an individual interface pressure sensor system in contact with the mattress and a position management system where the sensor detects the determined pressure with automatic pressure reduction and distribution. The role of NPI is to monitor, identify the risk and manage the interface pressure automatically when the determined pressure is detected. This study aims to evaluate the effects of “Never Pressure Injury (NPI),” an innovative mattress, on the incidence of pressure injuries in critically ill patients. An observational case-control study was employed to compare the incidence of pressure injury between the case and the control group. The control group comprised 80 critically ill patients admitted to a critical care unit of Phyathai3 Hospital, receiving standard care with the use of memory foam according to intensive care unit guidelines. The case group comprised 80 critically ill patients receiving standard care and with the use of the Never Pressure Injury (NPI) innovation mattress. The patients who were over 20 years old and showed scores of less than 18 on the Risk Assessment Pressure Ulcer Scale – ICU and stayed in ICU for more than 24 hours were selected for the study. The patients’ skin was assessed for the occurrence of pressure injury once a day for five consecutive days or until the patients were discharged from ICU. The sample comprised 160 patients with ages ranging from 30-102 (mean = 70.1 years), and the Body Mass Index ranged from 13.69- 49.01 (mean = 24.63). The case and the control group were not different in their sex, age, Body Mass Index, Pressure Ulcer Risk Scores, and length of ICU stay. Twenty-two patients (27.5%) in the control group had pressure injuries, while no pressure injury was found in the case group.

Keywords: pressure injury, never pressure injury, innovation mattress, critically ill patients, prevent pressure injury

Procedia PDF Downloads 95
676 Online Graduate Students’ Perspective on Engagement in Active Learning in the United States

Authors: Ehi E. Aimiuwu

Abstract:

As of 2017, many researchers in educational journals are still wondering if students are effectively and efficiently engaged in active learning in the online learning environment. The goal of this qualitative single case study and narrative research is to explore if students are actively engaged in their online learning. Seven online students in the United States from LinkedIn and residencies were interviewed for this study. Eleven online learning techniques from research were used as a framework.  Data collection tools were used for the study that included a digital audiotape, observation sheet, interview protocol, transcription, and NVivo 12 Plus qualitative software.  Data analysis process, member checking, and key themes were used to reach saturation. About 85.7% of students preferred individual grading. About 71.4% of students valued professor’s interacting 2-3 times weekly, participating through posts and responses, having good internet access, and using email.  Also, about 57.1% said students log in 2-3 times weekly to daily, professor’s social presence helps, regular punctuality in work submission, and prefer assessments style of research, essay, and case study.  About 42.9% appreciated syllabus usefulness and professor’s expertise.

Keywords: class facilitation, course management, online teaching, online education, student engagement

Procedia PDF Downloads 115
675 An Analysis of the Affect of Climate Change on Humanitarian Law: The Way Forward

Authors: Anjali Kanagali, Astha Sinha

Abstract:

Climate change is the greatest threat being faced by mankind in the 21st century. It no longer is merely an environmental, scientific or economic issue but is a humanitarian issue as well. Paris Agreement put great pressure on the businesses to reduce carbon emissions and mitigate the impact of climate change. However, the already increased climate variability and extreme weather are aggravating emergency humanitarian needs. According to the Intergovernmental Panel on Climate Change (IPCC), if efficient policy changes are not made in time to combat the climate change issues, the situation will deteriorate with an estimated global temperature rise of 4 degrees. The existing international network of Humanitarian system is not adequately structured to handle the projected natural disasters and climate change crisis. The 2030 Agenda which embraces the 17 Sustainable Development Goals (SGDs) discussed the relationship between the climate change and humanitarian assistance. The Humanitarian law aims to protect, amongst other things, ‘internally displaced persons’ which includes people displaced due to natural hazard related disasters engulfing the hazards of climate change. ‘Legal protection’ of displaced people to protect their rights is becoming a pressing need in such times. In this paper, attempts will be made to analyze the causes of the displacement, identify areas where the effect of the climate change is most likely to occur and to examine the character of forced displacement triggering population movement. We shall discuss the pressure on the Humanitarian system and assistance due to climate change issues and the need for vesting powers to the local communities or local government players to deal with the climate changes. We shall also discuss the possibility of setting up a new framework where non-state actors could be set up for climate change impact and its governance.

Keywords: humanitarian assistance to climate change, humanitarian crisis, internally displaced person, legal framework for climate migrants, non-state actors

Procedia PDF Downloads 299
674 Future Education: Changing Paradigms

Authors: Girish Choudhary

Abstract:

Education is in a state of flux. Not only one need to acquire skills in order to cope with a fast changing global world, an explosive growth in technology, on the other hand is providing a new wave of teaching tools - computer aided video instruction, hypermedia, multimedia, CD-ROMs, Internet connections, and collaborative software environments. The emerging technology incorporates the group qualities of interactive, classroom-based learning while providing individual students the flexibility to participate in an educational programme at their own time and place. The technology facilitating self learning also seems to provide a cost effective solution to the dilemma of delivering education to masses. Online education is a unique learning domain that provides for many to many communications as well. The computer conferencing software defines the boundaries of the virtual classroom. The changing paradigm provides access of instruction to a large proportion of society, promises a qualitative change in the quality of learning and echoes a new way of thinking in educational theory that promotes active learning and open new learning approaches. Putting it to practice is challenging and may fundamentally alter the nature of educational institutions. The subsequent part of paper addresses such questions viz. 'Do we need to radically re-engineer the curriculum and foster an alternate set of skills in students?' in the onward journey.

Keywords: on-line education, self learning, energy and power engineering, future education

Procedia PDF Downloads 312
673 The Phatic Function and the Socializing Element of Personal Blogs

Authors: Emelia Noronha, Milind Malshe

Abstract:

The phatic function of communication is a vital element of any conversation. This research paper looks into this function with respect to personal blogs maintained by Indian bloggers. This paper is a study into the phenomenon of phatic communication maintained by bloggers through their blogs. Based on a linguistic analysis of the posts of twenty eight Indian bloggers, writing in English, studied over a period of three years, the study indicates that though the blogging phenomenon is not conversational in the same manner as face-to-face communication, it does make ample provision for feedback that is conversational in nature. Ordinary day to day offline conversations use conventionalized phatic utterances; those on the social media are in a perpetual mode of innovation and experimentation in order to sustain contact with its readers. These innovative methods and means are the focus of this study. Though the personal blogger aims to chronicle his/her personal life through the blog, the socializing function is crucial to these bloggers. In comparison to the western personal blogs which focus on the presentation of the ‘bounded individual self’, we find Indian personal bloggers engage in the presentation of their ‘social selves’. These bloggers yearn to reach out to the readers on the internet and the phatic function serves to initiate, sustain and renew social ties on the blogosphere thereby consolidating the social network of readers and bloggers.

Keywords: personal blogs, phatic, social-selves, blog readers

Procedia PDF Downloads 343
672 Towards the Management of Cybersecurity Threats in Organisations

Authors: O. A. Ajigini, E. N. Mwim

Abstract:

Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.

Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information

Procedia PDF Downloads 237
671 Application of Constructivist-Based (5E’s) Instructional Approach on Pupils’ Retention: A Case Study in Primary Mathematics in Enugu State

Authors: Ezeamagu M.U, Madu B.C

Abstract:

This study was designed to investigate the efficacy of 5Es constructivist-based instructional model on students’ retention in primary Mathematics. 5Es stands for Engagement, Exploration, Explanation, Elaboration and Evaluation. The study adopted the pre test post test non-equivalent control group quasi-experimental research design. The sample size for the study was one hundred and thirty four pupils (134), seventy six male (76) and fifty eight female (58) from two primary schools in Nsukka education zone. Two intact classes in each of the sampled schools comprising all the primary four pupils were used. Each of the schools was given the opportunity of being assigned randomly to either experimental or control group. The Experimental group was taught using 5Es model while the control group was taught using the conventional method. Two research questions were formulated to guide the study and three hypotheses were tested at p ≤ 0. 05. A Fraction Achievement Test (FAT) of ten (10) questions were used to obtain data on pupils’ retention. Research questions were answered using mean and standard deviation while hypotheses were tested using analysis of covariance (ANCOVA). The result revealed that the 5Es model was more effective than the conventional method of teaching in enhancing pupils’ performance and retention in mathematics, secondly there is no significant difference in the mean retention scores of male and female students taught using 5Es instructional model. Based on the findings, it was recommended among other things, that the 5Es instructional model should be adopted in the teaching of mathematics in primary level of the educational system. Seminar, workshops and conferences should be mounted by professional bodies, federal and state ministries of education on the use of 5Es model. This will enable the mathematics educator, serving teachers, students and all to benefit from the approach.

Keywords: constructivist, education, mathematics, primary, retention

Procedia PDF Downloads 431
670 Development of Lodging Business Management Standards of Bang Khonthi Community in Samut Songkram Province

Authors: Poramet Saeng-On

Abstract:

This research aims to develop ways of lodging business management of Bang Khonthi community in Samut Songkram province that are appropriate with the cultural context of the Bang Khonthi community. Eight lodging business owners were interviewed. It was found that lodging business that are family business must be done with passion, correct understanding of self, culture, nature, Thai way of life, thorough, professional development, environmentally concerned, building partnerships with various networks both community level, and public sector and business cohorts. Public relations should be done through media both traditional and modern outlets, such as websites and social networks to provide customers convenience, security, happiness, knowledge, love and value when travel to Bang Khonthi. This will also help them achieve sustainability in business, in line with the 10 Home Stay Standard Thailand. Suggestions for operators are as follows: Operators need to improve their public relations work. They need to use technology in public relations such as the internet. Management standards must be improved. Souvenir and local products shops should be arranged in the compound. Product pricing must be set accordingly. They need to join hands to help each other. Quality of the business operation should be raised to meet the standards. Educational measures to reduce the impact caused by tourism on the community such as efforts to reduce energy consumption.

Keywords: homestay, lodging business, management, standard

Procedia PDF Downloads 425
669 Developing a Video Game (Historia’s Nightmare) and Finding Out if We Can Use It to Raise Social Awareness and Improve Learning

Authors: Hasibul Kabir, Samin Shahriar Tokey, Md. Tofazzal Hossain

Abstract:

One of the most necessary things in the present time is raising social awareness about global warming and climate change among the people. Though many types of mediums and techniques have been used to teach people about this global phenomenon, there are still more effective ways to reach people with useful information about global warming. As many traditional methods to teach people about global warming and climate change did not work well, video games were overdue. To learn how effective a video game can be in this regard, we developed a Video game, "Historia's Nightmare," that teaches people about Global warming and climate change. The game was designed to entertain people and give them an idea about the reasons and consequences of global warming and climate change while not being like traditional educational games. The game threw a mini quiz consisting of two MCQs based on the information shown in the game, where a gamer had to pass the quiz to reach the next level. We published the game on different platforms to let all types of people play and complete our experiment effectively. The game continuously communicated with our server to send data about gamers' performance. We observed the data, including the participants' performance, time spent, quiz score, and the in-game feedback on a regular basis, and finally came to a verdict. In our experiment, we have found that most participants positively accepted the game and learned something new. The participants who spent more on our game performed better in both quiz and the game. Our experiment's result demonstrates that video games can be a great way to teach people something, particularly to raise social awareness about global warming and climate change. It also demonstrates that the game can be a significant element in education and learning improvement.

Keywords: video game, global warming, social awareness, climate change, education, feedback

Procedia PDF Downloads 106
668 Chat-Based Online Counseling for Enhancing Wellness of Undergraduates with Emotional Crisis Tendency

Authors: Arunya Tuicomepee

Abstract:

During the past two decades, there have been the increasing numbers of studies on online counseling, especially among adolescents who are familiar with the online world. This can be explained by the fact that via this channel enables easier access to the young, who may not be ready for face-to-face service, possibly due to uneasiness to reveal their personal problems with a stranger, the feeling that their problems are to be shamed, or the need to protect their images. Especially, the group of teenagers prone to suicide or despair, who tend to keep things to or isolate from the society to themselves, usually prefer types of services that require no face-to-face encounter and allow their anonymity, such as online services. This study aimed to examine effectiveness of chat-based online counseling for enhancing wellness of undergraduates with emotional crisis tendency. Experimental with pretest-posttest control group design was employed. Participants were 47 undergraduates (10 males and 37 females) with high emotional crisis tendency. They were randomly assigned to experimental group (24 students) and control group (23 students). Participants in the experimental group received a 60-minute, 4-sessions of individual chat-based online counseling led by counselor. Those in control group received no counseling session. Instruments were the Emotional Crisis Scale and Wellness Scales. Two-way mixed-design multivariate analysis of variance was used for data analysis. Finding revealed that the posttest scores on wellness of those in the experimental group were higher than the scores of those in the control group. The posttest scores on emotional crisis tendency of those in the experimental group were lower than the scores of those in the control group. Hence, this study suggests chat-based online counseling services can become a helping source that increasing more adolescents would recognize and turn to in the future and that will receive more attention.

Keywords: chat-based online counseling, emotional crisis, undergraduate student, wellness

Procedia PDF Downloads 218
667 A Holographic Infotainment System for Connected and Driverless Cars: An Exploratory Study of Gesture Based Interaction

Authors: Nicholas Lambert, Seungyeon Ryu, Mehmet Mulla, Albert Kim

Abstract:

In this paper, an interactive in-car interface called HoloDash is presented. It is intended to provide information and infotainment in both autonomous vehicles and ‘connected cars’, vehicles equipped with Internet access via cellular services. The research focuses on the development of interactive avatars for this system and its gesture-based control system. This is a case study for the development of a possible human-centred means of presenting a connected or autonomous vehicle’s On-Board Diagnostics through a projected ‘holographic’ infotainment system. This system is termed a Holographic Human Vehicle Interface (HHIV), as it utilises a dashboard projection unit and gesture detection. The research also examines the suitability for gestures in an automotive environment, given that it might be used in both driver-controlled and driverless vehicles. Using Human Centred Design methods, questions were posed to test subjects and preferences discovered in terms of the gesture interface and the user experience for passengers within the vehicle. These affirm the benefits of this mode of visual communication for both connected and driverless cars.

Keywords: gesture, holographic interface, human-computer interaction, user-centered design

Procedia PDF Downloads 292
666 Regional Identity Construction of Acehnese English Teachers in Professional Practice

Authors: Ugahara Bin Mahyuddin Yunus

Abstract:

In English Language Teaching, it cannot be denied that the backgrounds of English teachers do affect the way they teach English to their students, which in turn will affect their students’ English learning itself. Thus, it is very important to understand who the English teachers are so that how they teach English to their students can be understood. One of their backgrounds that is essential to be highlighted is their culture. Certainly, they wittingly or not will bring the perspectives and values of their culture into their daily teaching practices. In other words, their cultural identities do shape how they teach their students. Cultural identities themselves actually consist of some elements, one of which is regional identity. Indeed, the culture of the region in which English teachers identify with has impact on their beliefs and actions during teaching. For this reason, this study aims to understand how the regional identity of English teachers influence the way they teach English to their students. This study is a qualitative study conducted in a multilingual and multicultural setting, namely Aceh, Indonesia. Here, four Acehnese English teachers were involved as the research participants. In addition, this study adopted poststructuralist perspective to identity as the theoretical framework. Three research instruments were used in this study, namely semi-structured interviews, classroom observation, and teacher journal. The data gained from these instruments were then analyzed by using thematic analysis. Obviously, the research about the regional identity of English teachers in English Language Teaching has been studied worldwide. However, little is still known about it in Indonesian context, let alone Indonesia itself is a super diverse country with 34 regions. As a result, this study presents a good opportunity to advance the knowledge of how the regional identity construction of English teachers in this setting is. The findings of the study revealed that their regional identity construction in teaching was highly influenced by their indigenous language and religious faith. Even, how they teach English in classroom, in fact, is related to these two things. The conclusion that can be drawn from this study is for these English teachers, in fact, their regional identity itself constitutes their use of local language and religious identity, which are considered by them as their core identity.

Keywords: English language teaching, English teachers, identity construction, regional identity

Procedia PDF Downloads 229
665 Detecting and Thwarting Interest Flooding Attack in Information Centric Network

Authors: Vimala Rani P, Narasimha Malikarjunan, Mercy Shalinie S

Abstract:

Data Networking was brought forth as an instantiation of information-centric networking. The attackers can send a colossal number of spoofs to take hold of the Pending Interest Table (PIT) named an Interest Flooding attack (IFA) since the in- interests are recorded in the PITs of the intermediate routers until they receive corresponding Data Packets are go beyond the time limit. These attacks can be detrimental to network performance. PIT expiration rate or the Interest satisfaction rate, which cannot differentiate the IFA from attacks, is the criterion Traditional IFA detection techniques are concerned with. Threshold values can casually affect Threshold-based traditional methods. This article proposes an accurate IFA detection mechanism based on a Multiple Feature-based Extreme Learning Machine (MF-ELM). Accuracy of the attack detection can be increased by presenting the entropy of Internet names, Interest satisfaction rate and PIT usage as features extracted in the MF-ELM classifier. Furthermore, we deploy a queue-based hostile Interest prefix mitigation mechanism. The inference of this real-time test bed is that the mechanism can help the network to resist IFA with higher accuracy and efficiency.

Keywords: information-centric network, pending interest table, interest flooding attack, MF-ELM classifier, queue-based mitigation strategy

Procedia PDF Downloads 190
664 Transit-Oriented Development as a Tool for Building Social Capital

Authors: Suneet Jagdev

Abstract:

Rapid urbanization has resulted in informal settlements on the periphery of nearly all big cities in the developing world due to lack of affordable housing options in the city. Residents of these communities have to travel long distances to get to work or search for jobs in these cities, and women, children and elderly people are excluded from urban opportunities. Affordable and safe public transport facilities can help them expand their possibilities. The aim of this research is to identify social capital as another important element of livable cities that can be protected and nurtured through transit-oriented development, as a tool to provide real resources that can help these transit-oriented communities become self-sustainable. Social capital has been referred to the collective value of all social networks and the inclinations that arise from these networks to do things for each other. It is one of the key component responsible to build and maintain democracy. Public spaces, pedestrian amenities and social equity are the other essential part of Transit Oriented Development models that will be analyzed in this research. The data has been collected through the analysis of several case studies, the urban design strategies implemented and their impact on the perception and on the community´s experience, and, finally, how these focused on the social capital. Case studies have been evaluated on several metrics, namely ecological, financial, energy consumption, etc. A questionnaire and other tools were designed to collect data to analyze the research objective and reflect the dimension of social capital. The results of the questionnaire indicated that almost all the participants have a positive attitude towards this dimensions of building a social capital with the aid of transit-oriented development. Statistical data of the identified key motivators against against demographic characteristics have been generated based on the case studies used for the paper. The findings suggested that there is a direct relation between urbanization, transit-oriented developments, and social capital.

Keywords: better opportunities, low-income settlements, social capital, social inclusion, transit oriented development

Procedia PDF Downloads 315
663 An Experiential Learning of Ontology-Based Multi-document Summarization by Removal Summarization Techniques

Authors: Pranjali Avinash Yadav-Deshmukh

Abstract:

Remarkable development of the Internet along with the new technological innovation, such as high-speed systems and affordable large storage space have led to a tremendous increase in the amount and accessibility to digital records. For any person, studying of all these data is tremendously time intensive, so there is a great need to access effective multi-document summarization (MDS) systems, which can successfully reduce details found in several records into a short, understandable summary or conclusion. For semantic representation of textual details in ontology area, as a theoretical design, our system provides a significant structure. The stability of using the ontology in fixing multi-document summarization problems in the sector of catastrophe control is finding its recommended design. Saliency ranking is usually allocated to each phrase and phrases are rated according to the ranking, then the top rated phrases are chosen as the conclusion. With regards to the conclusion quality, wide tests on a selection of media announcements are appropriate for “Jammu Kashmir Overflow in 2014” records. Ontology centered multi-document summarization methods using “NLP centered extraction” outshine other baselines. Our participation in recommended component is to implement the details removal methods (NLP) to enhance the results.

Keywords: disaster management, extraction technique, k-means, multi-document summarization, NLP, ontology, sentence extraction

Procedia PDF Downloads 362
662 Rational Thinking and Forgiveness in Pakistan: The Role of Democratic Values and Mass Media Attitude

Authors: Muhammad Shoaib

Abstract:

Every society has a set of beliefs, norms, values, folkways, mores and laws. All the principles, customs, traditions and procedures of societies are directly or indirectly related to the religion of the society and changed with the passage of time by the mediation of democratic values attitudes and mass media influence. The main objective of the present study is to examine the effects of rational thinking values on forgiveness attitude by the mediation of democratic values and mass media attitude among family members. As many other developing settings, Pakistani society is undergoing a rapid and multifaceted social change, in which traditional thinking coexists and often clashes with modern thinking. Rational thinking attitude has great effects on the forgiveness attitude among family members as well as all the members of Pakistani society. For the present study 520 respondents were sampled from two urban areas of Punjab province; Lahore and Faisalabad, through proportionate random sampling technique. A survey method was used as a technique of data collection and an interview schedule was administered to collect information from the respondents. The results support that the net of other factors, favorable democratic values attitudes are positively associated rational thinking attitudes. The results also provide support that all other things equal, mass media attitudes also have a significant positive effect on rational thinking attitudes. Favorable democratic values attitudes have a significant net positive effect and the effect of mass media attitudes is positive and statistically highly significant. It shows that the effects of both democratic values attitudes and mass media attitudes diminish in magnitude when the rational thinking attitudes scale is included. However, the effect of democratic values remains highly significant. In comparison, the effect of mass media attitudes is only marginally significant.

Keywords: rationality, forgiveness, democratic values, mass media, attitudes, Pakistan

Procedia PDF Downloads 354
661 The Use of Modern Technology to Enhance English Language Teaching and Learning: An Analysis

Authors: Fazilet Alachaher (Benzerdjeb)

Abstract:

From the chalkboard to the abacus and beyond, technology has always played an important role in education. Educational technology refers to any teaching tool that helps supports learning, and given the rapid advancements in Information Technology and multimedia applications, the potential to support the teaching of foreign languages in our universities is ever greater. In language teaching and learning, we have a lot of to choose from the world of technology: TV, CDs, DVDs, Computers, the Internet, Email, and Blogs. The use of modern technologies can enrich the experience of learning a foreign language because they provide features that are not present in traditional technology. They can offer a wide range of multimedia resources, opportunities for intensive one-to-one learning in language labs and resources for authentic materials, which can be motivating to both students and teachers. The advent of Information and Communication Technology (ICT) and online interaction can also open up new range of self-access and distance learning opportunities The two last decades have witnessed a revolution due to the onset of technology, and has changed the dynamics of various industries, and has also influenced the way people live and work in society. That is why using the multimedia to create a certain context to teach English has its unique advantages. This paper tries then to analyse the necessity of multimedia technology to language teaching and brings out the problems faced by using these technologies. It also aims at making English teachers aware of the strategies to use it in an effective manner.

Keywords: strategies English teaching, multimedia technology, advantages, disadvantages, English learning

Procedia PDF Downloads 440
660 Wearable Interface for Telepresence in Robotics

Authors: Uriel Martinez-Hernandez, Luke W. Boorman, Hamideh Kerdegari, Tony J. Prescott

Abstract:

In this paper, we present architecture for the study of telepresence, immersion and human-robot interaction. The architecture is built around a wearable interface, developed here, that provides the human with visual, audio and tactile feedback from a remote location. We have chosen to interface the system with the iCub humanoid robot, as it mimics many human sensory modalities, such as vision, with gaze control and tactile feedback. This allows for a straightforward integration of multiple sensory modalities, but also offers a more complete immersion experience for the human. These systems are integrated, controlled and synchronised by an architecture developed for telepresence and human-robot interaction. Our wearable interface allows human participants to observe and explore a remote location, while also being able to communicate verbally with humans located in the remote environment. Our approach has been tested from local, domestic and business venues, using wired, wireless and Internet based connections. This has involved the implementation of data compression to maintain data quality to improve the immersion experience. Initial testing has shown the wearable interface to be robust. The system will endow humans with the ability to explore and interact with other humans at remote locations using multiple sensing modalities.

Keywords: telepresence, telerobotics, human-robot interaction, virtual reality

Procedia PDF Downloads 270
659 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan

Authors: Pema Choejey, David Murray, Chun Che Fung

Abstract:

Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.

Keywords: awareness and training, cybersecurity policy, risk management, security risks

Procedia PDF Downloads 319
658 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 266
657 Designing and Implementation of MPLS Based VPN

Authors: Muhammad Kamran Asif

Abstract:

MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively.

Keywords: MPLS, VPN, NMS, ATM, asynchronous transfer mode

Procedia PDF Downloads 317
656 The Impact of Nonverbal Communication Between Restaurant Staff and Customers on Customer Attraction in Restaurants: A Case Study of Food Courts in Tehran City

Authors: Mahshid Asadollahi, Mohammad Akbari Asl

Abstract:

The restaurant industry is highly competitive, and restaurants are constantly looking for ways to attract new customers and retain their existing ones. Nonverbal communication is an important factor in creating a positive customer experience and can play a significant role in attracting customers to restaurants. Nonverbal communication can include body language, facial expressions, tone of voice, and physical proximity, among other things. The present study aimed to investigate the impact of nonverbal communication between restaurant employees and customers on attracting customers in food courts in Tehran. The research method was descriptive-correlational, and the statistical population of this study included all customers of food court restaurants in Tehran, which was about 30 restaurants. The research sample was selected through probability sampling, and 440 customers completed emotional response, customer satisfaction, and nonverbal communication questionnaires in person. The data obtained were analyzed using multiple regression analysis. The results showed that vocal language, employee proximity, physical appearance, and speech movements, as components of nonverbal communication of restaurant employees, had an impact on attracting customers. Additionally, positive and negative emotions of customers have a significant relationship with customer attraction in Food Court restaurants. The study shows that various nonverbal communication factors can play a significant role in attracting customers, and that positive and negative customer emotions can affect customer satisfaction. Therefore, restaurant owners and managers should pay attention to nonverbal communication and train their employees accordingly to create a positive and welcoming atmosphere for customers.

Keywords: verbal language, proximity of employees, physical appearance, speech gestures, nonverbal communication, customer emotions, customer attraction

Procedia PDF Downloads 74
655 Online Formative Assessment Challenges Experienced by Grade 10 Physical Sciences Teachers during Remote Teaching and Learning

Authors: Celeste Labuschagne, Sam Ramaila, Thasmai Dhurumraj

Abstract:

Although formative assessment is acknowledged as crucial for teachers to gauge students’ understanding of subject content, applying formative assessment in an online context is more challenging than in a traditional Physical Sciences classroom. This study examines challenges experienced by Grade 10 Physical Sciences teachers when enacting online formative assessment. The empirical investigation adopted a generic qualitative design and involved three purposively selected Grade 10 Physical Sciences teachers from three different schools and quintiles within the Tshwane North District in South Africa. Data were collected through individual and focus group interviews. Technological, pedagogical, and content knowledge (TPACK) was utilised as a theoretical framework underpinning the study. The study identified a myriad of challenges experienced by Grade 10 Physical Sciences teachers when enacting online formative assessment. These challenges include the utilisation of Annual Teaching Plans, lack of technological knowledge, and internet connectivity. The Department of Basic Education faces the key imperative to provide continuous teacher professional development and concomitant online learning materials that can facilitate meaningful enactment of online formative assessment in various educational settings.

Keywords: COVID-19, challenges, online formative assessment, physical sciences, TPACK

Procedia PDF Downloads 46
654 Black Protests in Poland: Analysis of Women's Movement in Poland, 2016-2018

Authors: Aneta Ostaszewska

Abstract:

The purpose of this research is to reflect on 'black protests' of women in Poland. 'Black protests' have been organized nationwide since October 2016 as a sign of opposition and resistance to anti-women government’s policy and its attempts to exacerbate abortion law. Women protest not only in the biggest cities (Warsaw, Cracow or Wroclaw) but in over 140 towns and villages all over Poland. The research represents qualitative methodological approach – an active research method. It has involved the observation, description, and analysis of 'black protests' carried out mainly in Warsaw (the capital of Poland). The focus has been on behavior and attitudes of protesting women: protesters’ slogans, statements, and views, the ways of dressing up, ways of participating and involvement in protests. Research also involves the analysis of social media discourse: the analysis of content published by women on social media. Black protests are an example of a grassroots social initiative of women in Poland. What unites women is opposition to government policy. The primary space of communication has become the Internet – especially social media (Facebook). A new social movement 'Dziewuchy dziewuchom' (Girls for girls) has been born as well as organization of 'Ogolnopolski Strajk Kobiet' (Nationwide women's strike) as a result of 'black protest'. These protests and marches became a way of emphasizing women’s subjectivity as well as political and civic activity.

Keywords: women, black protests, communitas, experience, Poland, abortion law

Procedia PDF Downloads 360
653 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA

Authors: Cai Qianyi

Abstract:

In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.

Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment

Procedia PDF Downloads 33
652 Timescape-Based Panoramic View for Historic Landmarks

Authors: H. Ali, A. Whitehead

Abstract:

Providing a panoramic view of famous landmarks around the world offers artistic and historic value for historians, tourists, and researchers. Exploring the history of famous landmarks by presenting a comprehensive view of a temporal panorama merged with geographical and historical information presents a unique challenge of dealing with images that span a long period, from the 1800’s up to the present. This work presents the concept of temporal panorama through a timeline display of aligned historic and modern images for many famous landmarks. Utilization of this panorama requires a collection of hundreds of thousands of landmark images from the Internet comprised of historic images and modern images of the digital age. These images have to be classified for subset selection to keep the more suitable images that chronologically document a landmark’s history. Processing of historic images captured using older analog technology under various different capturing conditions represents a big challenge when they have to be used with modern digital images. Successful processing of historic images to prepare them for next steps of temporal panorama creation represents an active contribution in cultural heritage preservation through the fulfillment of one of UNESCO goals in preservation and displaying famous worldwide landmarks.

Keywords: cultural heritage, image registration, image subset selection, registered image similarity, temporal panorama, timescapes

Procedia PDF Downloads 145
651 A Resource-Based Understanding of Health and Social Care Regulation

Authors: David P. Horton, Gary Lynch-Wood

Abstract:

Western populations are aging, prone to various lifestyle health problems, and increasing their demand for health and social care services. This demand has created enormous fiscal and regulatory challenges. In response, government institutions have deployed strategies of behavior modification to encourage people to exercise greater personal responsibility over their health and care needs (i.e., welfare responsibilisation). Policy strategies are underpinned by the assumption that people if properly supported, will make better health and lifestyle selections. Not only does this absolve governments of the responsibility for meeting all health and care needs, but it also enables government institutions to assert fiscal control over welfare spending. Looking at the regulation of health and social care in the UK, the authors identify and outline a suite of regulatory tools that are designed to extract and manage the resources of health and social care services users and to encourage them to make (‘better’) use of these resources. This is important for our understanding of how health and social care regulation is responding to ongoing social and economic challenges. It is also important because there has been a failure to systematically examine the relevance of resources for regulation, which is surprising given that resources are crucial to how and whether regulation succeeds or fails. In particular, drawing from the regulatory welfare state concept, the authors analyse the key legal and regulatory changes and mechanisms that have been introduced since the 2008 financial crisis, focusing on critical measures such as the Health and Social Care Act and regulations introduced under the National Health Service Act. The authors show how three types of user resources (i.e., tangible, labor, and data) are being used to assert fiscal control and increase welfare responsibilisation. Amongst other things, the paper concludes that service users have become more than rule followers and targets of behavioral modification; rather, they are producers of resources that regulatory systems have come to rely on.

Keywords: health care, regulation, resources, social care

Procedia PDF Downloads 73
650 Oil and Development: The Case of Kuwait

Authors: Abdulaziz Abdulrahman Albahar

Abstract:

This paper aims to answer the question of: is oil as a natural resource with all the wealth that it brings an economic burden? And how can resource curse be mitigated in such oil dependent nations? The case of Kuwait will be used as an example. The paper begins with an introduction of the resource curse and the Kuwaiti economy in general. Then there is an attempt to see that does the curse exist in the case for Kuwait. Furthermore, in the analysis section, an exploration on how the economy is dependent on oil and how oil is more of a burden if there is mismanagement is conducted. Later on, in answering on how to mitigate the problem of a resource curse, the case of Norway is explored. In concluding the paper, the results do show that oil rentals affects the Kuwaiti economy via 2 main channels, these are government spending that are mainly financed via oil rentals and exportation of oil based products. The surprising result was that government spending had a negative impact on GDP (gross domestic product) growth when oil rentals where instrumented on government expenditure, this is due to the issue of rent seeking in which government spending in Kuwait is financing things such as stimulus packages and raising the nominal wages. Yet, when comparing the magnitude of both oil exportation and government spending, the latter has a stronger effect on the GDP (gross domestic product) growth than the former. A resource curse doesn’t seem to exist in the case of Kuwait however, the characteristics of a curse do show in the form of rent seeking in the political sphere, the disruption of the traditional sectors like that of pearl trade and fishing markets. Yet, a curse doesn’t show due to the fact that the currency of the nation is very stable and hasn’t experienced any appreciation because of the fixed exchange rate system. Moreover, even if we can’t say that a curse exists, it is clear to see that the Kuwaiti economy is heading towards one. Whether or not it faces a resource curse will be based on how judicious the nation will be in exploiting their sovereign wealth fund and implementing diversification strategies to be less oil dependent like the vision “New Kuwait-2035” which has been underway since 2017.

Keywords: economic development, Kuwait, oil curse, dutch disease

Procedia PDF Downloads 59