Search results for: online threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3328

Search results for: online threats

1888 Application of Optical Method Based on Laser Devise as Non-Destructive Testing for Calculus of Mechanical Deformation

Authors: R. Daïra, V. Chalvidan

Abstract:

We present the speckle interferometry method to determine the deformation of a piece. This method of holographic imaging using a CCD camera for simultaneous digital recording of two states object and reference. The reconstruction is obtained numerically. This latest method has the advantage of being simpler than the methods currently available, and it does not suffer the holographic configuration faults online. Furthermore, it is entirely digital and avoids heavy analysis after recording the hologram. This work was carried out in the laboratory HOLO 3 (optical metrology laboratory in Saint Louis, France) and it consists in controlling qualitatively and quantitatively the deformation of object by using a camera CCD connected to a computer equipped with software of Fringe Analysis.

Keywords: speckle, nondestructive testing, interferometry, image processing

Procedia PDF Downloads 494
1887 A Multi-Science Study of Modern Synergetic War and Its Information Security Component

Authors: Alexander G. Yushchenko

Abstract:

From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.

Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism

Procedia PDF Downloads 134
1886 The Cracks Propagation Monitoring of a Cantilever Beam Using Modal Analysis

Authors: Morteza Raki, Abolghasem Zabihollah, Omid Askari

Abstract:

Cantilever beam is a simplified sample of a lot of mechanical components used in a wide range of applications, including many industries such as gas turbine blade. Due to the nature of the operating conditions, beams are subject to variety of damages especially crack propagates. Crack propagation may lead to catastrophic failure during operation. Therefore, online detection of crack presence and its propagation is very important and may reduce possible significant cost of the whole system failure. This paper aims to investigate the effect of cracks presence and crack propagation on one end fixed beam`s vibration. A finite element model will be developed for the blade in which the modal response of the structure with and without crack will be studied. 

Keywords: blade, crack propagation, health monitoring, modal analysis

Procedia PDF Downloads 342
1885 Assessing the Feasibility of Incorporating Green Infrastructure into Colonial-Era Buildings in the Caribbean

Authors: Luz-Marina Roberts, Ancil Kirk, Aisha Donaldson, Anya Seepaul, Jade Lakhan, Shianna Tikasingh

Abstract:

Climate change has produced a crisis that particularly threatens small island states in the Caribbean. Developers and climate enthusiasts alike are now forced to find new and sustainable ways of building. Focus on existing buildings is particularly needed in Trinidad and Tobago, like other islands, especially as these countries are vulnerable to climate threats and geographic locations with close proximity to a hurricane. Additionally, since many colonial-era style buildings still exist, the idea that they are energy inefficient is at the forefront of the work of policy-makers. The question that remains is can these buildings be retrofitted to reflect the modern era while considering climate resilience. This paper aims to investigate the energy efficiency of colonial-era buildings in Port of Spain and whether these buildings in Trinidad and Tobago, if found to be energy inefficient, can be more energy efficient and sustainable. This involves collecting surveys from building management in colonial-era buildings and researching literature on colonial architecture in the Caribbean and modern innovations in green building designs. Additionally, the data and experiences from the Town and Country Planning Division in the Ministry of Planning and Development of Trinidad and Tobago will inform the paper. This research will aid in re-envisioning how green infrastructure can be applied to urban environments with older buildings and help inform planning policy as it relates to sustainability and energy efficiency.

Keywords: spatial planning, climate resilience, energy efficiency, sustainable development

Procedia PDF Downloads 67
1884 Microbial Contaminants in Drinking Water Collected from Different Regions of Kuwait

Authors: Abu Salim Mustafa

Abstract:

Water plays a major role in maintaining life on earth, but it can also serve as a matrix for pathogenic organisms, posing substantial health threats to humans. Although, outbreaks of diseases attributable to drinking water may not be common in industrialized countries, they still occur and can lead to serious acute, chronic, or sometimes fatal health consequences. The analysis of drinking water samples from different regions of Kuwait was performed in this study for bacterial and viral contaminations. Drinking tap water samples were collected from 15 different locations of the six Kuwait governorates. All samples were analyzed by confocal microscopy for the presence of bacteria. The samples were cultured in vitro to detect cultivable organisms. DNA was isolated from the cultured organisms and the identity of the bacteria was determined by sequencing the bacterial 16S rRNA genes, followed by BLAST analysis in the database of NCBI, USA. RNA was extracted from water samples and analyzed by real-time PCR for the detection of viruses with potential health risks, i.e. Astrovirus, Enterovirus, Norovirus, Rotavirus, and Hepatitis A. Confocal microscopy showed the presence of bacteria in some water samples. The 16S rRNA gene sequencing of culture grown organisms, followed by BLAST analysis, identified the presence of several non-pathogenic bacterial species. However, one sample had Acinetobacter baumannii, which often causes opportunistic infections in immunocompromised people, but none of the studied viruses could be detected in the drinking water samples analyzed. The results indicate that drinking water samples analyzed from various locations in Kuwait are relatively safe for drinking and do not contain many harmful pathogens.

Keywords: drinking water, microbial contaminant, 16S rDNA, Kuwait

Procedia PDF Downloads 152
1883 The Impact of Usefulness and Ease of Using Mobile Learning Technology on Faculty Acceptance

Authors: Leena Ahmad Khaleel Alfarani, Maggie McPherson, Neil Morris

Abstract:

Over the last decade, m-learning has been widely accepted and utilized by many western universities. However, Saudi universities face many challenges in utilizing such technology, a central one being to encourage teachers to use such technology. Although there are several factors that affect faculty members’ participation in the adoption of m-learning, this paper focuses merely on two factors, the usefulness and ease of using m-learning. A sample of 279 faculty members in one Saudi university has responded to the online survey. The results of the study have revealed that there is a statistically significant relationship (at the 0.05 level) between both usefulness and ease of using m-learning factors and the intention of teachers to use m-learning currently and in the future.

Keywords: mobile learning, diffusion of innovation theory, technology acceptance, faculty adoption

Procedia PDF Downloads 545
1882 E-Commerce Product Return Management Effects on Consumer Experience and Satisfaction: A Fast-Fashion Perspective

Authors: Nora Alomar, Bianca Alexandra Stefa, Saleh Bazi

Abstract:

This research uncovers the determinants that drive millennial consumers to adhere to product return of fast-fashion products purchases via e-commerce and what effects it has on consumer experience and satisfaction. Online consumption has skyrocketed, with e-commerce being the only, most reliable, and safe method of shopping during and post Covid-19. It has been noted customers are demanding a wide variety of product characteristics and a generous optimal return policy. The authors have selected to examine millennial consumers as they are digital natives and have an affinity for researching, reading product reviews, and shopping online, with a great spending power due to a higher disposable income in comparison to other generations. A multi-study approach is adopted, where study one (interviews, sample of 20 respondents) investigates the factors that drive product return, and study two (PLS-SEM, sample of 250 respondents) looks into the relationships of product return management against behavioral outcomes by having the generated factors (from study one) as moderators. Five themes are generated from study one (return policies, product characteristics, delivery lead time, seasonality, product trial & overspending). The authors identify that two out of the five factors (seasonality, product trial & overspending) have not been highlighted by the literature. The paper examines 11 hypotheses, where 10 are supported. Findings highlight the quality of the product return management influences the overall millennial customer experience and satisfaction. Findings also indicate that product return management was identified to have a significant negative effect on customer experience. Additionally, seasonality has a significant but negative moderation, which means increasing seasonality decreases the relationship between product return management and customer experience and satisfaction. Results highlight that return policies have a significant negative influence on the relationship between returning a product and customer experience and satisfaction. Moreover, product characteristics are also identified to have a significant negative influence on the relationship between returning a product and customer experience and satisfaction. This study further examines the influence of the factors on direct e-commerce websites and third-party e-commerce websites. Findings showcase a strong statistical significance for the increased rate of return of fast-fashion products on third-party websites. This paper aids practitioners in taking strategic decisions related to return management, to improve the quality of logistical services and, in turn, increase profitability.

Keywords: customer experience, customer satisfaction, e-commerce, fast-fashion, product returns

Procedia PDF Downloads 108
1881 Older Consumer’s Willingness to Trust Social Media Advertising: An Australian Case

Authors: Simon J. Wilde, David M. Herold, Michael J. Bryant

Abstract:

Social media networks have become the hotbed for advertising activities, due mainly to their increasing consumer/user base, and secondly, owing to the ability of marketers to accurately measure ad exposure and consumer-based insights on such networks. More than half of the world’s population (4.8 billion) now uses social media (60%), with 150 million new users having come online within the last 12 months (to June 2022). As the use of social media networks by users grows, key business strategies used for interacting with these potential customers have matured, especially social media advertising. Unlike other traditional media outlets, social media advertising is highly interactive and digital channel-specific. Social media advertisements are clearly targetable, providing marketers with an extremely powerful marketing tool. Yet despite the measurable benefits afforded to businesses engaged in social media advertising, recent controversies (such as the relationship between Facebook and Cambridge Analytica in 2018) have only heightened the role trust and privacy play within these social media networks. The purpose of this exploratory paper is to investigate the extent to which social media users trust social media advertising. Understanding this relationship will fundamentally assist marketers in better understanding social media interactions and their implications for society. Using a web-based quantitative survey instrument, survey participants were recruited via a reputable online panel survey site. Respondents to the survey represented social media users from all states and territories within Australia. Completed responses were received from a total of 258 social media users. Survey respondents represented all core age demographic groupings, including Gen Z/Millennials (18-45 years = 60.5% of respondents) and Gen X/Boomers (46-66+ years = 39.5% of respondents). An adapted ADTRUST scale, using a 20 item 7-point Likert scale, measured trust in social media advertising. The ADTRUST scale has been shown to be a valid measure of trust in advertising within traditional different media, such as broadcast media and print media, and more recently, the Internet (as a broader platform). The adapted scale was validated through exploratory factor analysis (EFA), resulting in a three-factor solution. These three factors were named reliability, usefulness and affect, and the willingness to rely on. Factor scores (weighted measures) were then calculated for these factors. Factor scores are estimates of the scores survey participants would have received on each of the factors had they been measured directly, with the following results recorded (Reliability = 4.68/7; Usefulness and Affect = 4.53/7; and Willingness to Rely On = 3.94/7). Further statistical analysis (independent samples t-test) determined the difference in factor scores between the factors when age (Gen Z/Millennials vs. Gen X/Boomers) was utilised as the independent, categorical variable. The results showed the difference in mean scores across all three factors to be statistically significant (p<0.05) for these two core age groupings: Gen Z/Millennials Reliability = 4.90/7 vs Gen X/Boomers Reliability = 4.34/7; Gen Z/Millennials Usefulness and Affect = 4.85/7 vs Gen X/Boomers Usefulness and Affect = 4.05/7; and Gen Z/Millennials Willingness to Rely On = 4.53/7 vs Gen X/Boomers Willingness to Rely On = 3.03/7. The results clearly indicate that older social media users lack trust in the quality of information conveyed in social media ads, when compared to younger, more social media-savvy consumers. This is especially evident with respect to Factor 3 (Willingness to Rely On), whose underlying variables reflect one’s behavioural intent to act based on the information conveyed in advertising. These findings can be useful to marketers, advertisers, and brand managers in that the results highlight a critical need to design ‘authentic’ advertisements on social media sites to better connect with these older users, in an attempt to foster positive behavioural responses from within this large demographic group – whose engagement with social media sites continues to increase year on year.

Keywords: social media advertising, trust, older consumers, online

Procedia PDF Downloads 81
1880 A Study on Abnormal Behavior Detection in BYOD Environment

Authors: Dongwan Kang, Joohyung Oh, Chaetae Im

Abstract:

Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment.

Keywords: BYOD, security, anomaly behavior detection, security equipment, communication technologies

Procedia PDF Downloads 324
1879 The Potential of Key Diabetes-related Social Media Influencers in Health Communication

Authors: Zhaozhang Sun

Abstract:

Health communication is essential in promoting healthy lifestyles, preventing unhealthy behaviours, managing disease conditions, and eventually reducing health disparities. Nowadays, social media provides unprecedented opportunities for enhancing health communication for both healthcare providers and people with health conditions, including self-management of chronic conditions such as diabetes. Meanwhile, a special group of active social media users have started playing a pivotal role in providing health ‘solutions’. Such individuals are often referred to as ‘influencers’ because of their ‘central’ position in the online communication system and the persuasive effect their actions and advice may have on audiences' health-related knowledge, attitudes, confidence and behaviours. Work on social media influencers (SMIs) has gained much attention in a specific research field of “influencer marketing”, which mainly focuses on emphasising the use of SMIs to promote or endorse brands’ products and services in the business. Yet to date, a lack of well-studied and empirical evidence has been conducted to guide the exploration of health-related social media influencers. The failure to investigate health-related SMIs can significantly limit the effectiveness of communicating health on social media. Therefore, this article presents a study to identify key diabetes-related SMIs in the UK and the potential implications of information provided by identified social media influencers on their audiences’ diabetes-related knowledge, attitudes and behaviours to bridge the research gap that exists in linking work on influencers in marketing to health communication. The multidisciplinary theories and methods in social media, communication, marketing and diabetes have been adopted, seeking to provide a more practical and promising approach to investigate the potential of social media influencers in health communication. Twitter was chosen as the social media platform to initially identify health influencers and the Twitter API academic was used to extract all the qualitative data. Health-related Influencer Identification Model was developed based on social network analysis, analytic hierarchy process and other screening criteria. Meanwhile, a two-section English-version online questionnaire has been developed to explore the potential implications of social media influencers’ (SMI’s) diabetes-related narratives on the health-related knowledge, attitudes and behaviours (KAB) of their audience. The paper is organised as follows: first, the theoretical and research background of health communication and social media influencers was discussed. Second, the methodology was described by illustrating the model for the identification of health-related SMIs and the development process of the SMIKAB instrument, followed by the results and discussions. The limitations and contributions of this study were highlighted in the summary.

Keywords: health communication, Interdisciplinary research, social media influencers, diabetes management

Procedia PDF Downloads 115
1878 Young People’s Participation in Decision-Making Using Information and Communication Technology

Authors: Marina Diković

Abstract:

By giving personal opinions, suggestions and criticism through e-democracy, young people can reinforce the adoption of decisions which they have an impact on. The purpose of this research was to examine the opinion of university students about the possibility of their decision-making by using information and communication technology (ICT). The questionnaire examined young people's values and behaviour associated with e-democracy and the related decision-making. Students are most active online when it comes to finding information connected with their academic responsibilities, but less frequently take part in democratic processes in society, both at the national and local level. E-democracy as a tool can be learned in programmes of Human Rights Education and Citizenship Education. 

Keywords: active citizens, e-democracy, information and communication technology (ICT), university students

Procedia PDF Downloads 225
1877 Composite Approach to Extremism and Terrorism Web Content Classification

Authors: Kolade Olawande Owoeye, George Weir

Abstract:

Terrorism and extremism activities on the internet are becoming the most significant threats to national security because of their potential dangers. In response to this challenge, law enforcement and security authorities are actively implementing comprehensive measures by countering the use of the internet for terrorism. To achieve the measures, there is need for intelligence gathering via the internet. This includes real-time monitoring of potential websites that are used for recruitment and information dissemination among other operations by extremist groups. However, with billions of active webpages, real-time monitoring of all webpages become almost impossible. To narrow down the search domain, there is a need for efficient webpage classification techniques. This research proposed a new approach tagged: SentiPosit-based method. SentiPosit-based method combines features of the Posit-based method and the Sentistrenght-based method for classification of terrorism and extremism webpages. The experiment was carried out on 7500 webpages obtained through TENE-webcrawler by International Cyber Crime Research Centre (ICCRC). The webpages were manually grouped into three classes which include the ‘pro-extremist’, ‘anti-extremist’ and ‘neutral’ with 2500 webpages in each category. A supervised learning algorithm is then applied on the classified dataset in order to build the model. Results obtained was compared with existing classification method using the prediction accuracy and runtime. It was observed that our proposed hybrid approach produced a better classification accuracy compared to existing approaches within a reasonable runtime.

Keywords: sentiposit, classification, extremism, terrorism

Procedia PDF Downloads 276
1876 A New Method Presentation for Locating Fault in Power Distribution Feeders Considering DG

Authors: Rahman Dashti, Ehsan Gord

Abstract:

In this paper, an improved impedance based fault location method is proposed. In this method, online fault locating is performed using voltage and current information at the beginning of the feeder. Determining precise fault location in a short time increases reliability and efficiency of the system. The proposed method utilizes information about main component of voltage and current at the beginning of the feeder and distributed generation unit (DGU) in order to precisely locate different faults in acceptable time. To evaluate precision and accuracy of the proposed method, a 13-node is simulated and tested using MATLAB.

Keywords: distribution network, fault section determination, distributed generation units, distribution protection equipment

Procedia PDF Downloads 400
1875 Marketing Factors Influencing the Decision to Choose Low Cost Airlines

Authors: Noppadol Sritragool

Abstract:

The objectives of this research were to investigate the decision of passengers who choose to fry with low cost airlines and to study marketing factors which have the influence to the decision to choose each low cost airlines. This paper was a quantitative research technique. A total of 400 low cost airlines’ passengers were interviewed via English questionnaire to collect the respondents’ opinions. The findings revealed that respondents were male and female at a similar proportion. The majority had at least an undergraduate degree, have a lower management level jobs, and had income in the range of 25,000 -35,000 baht per month.. In addition, the findings also revealed that the first three marketing factors influencing the decision of the respondents to choose low-cost airlines were low price, direct flight, and online system.

Keywords: decision to choose, marketing factors, low-cost airlines

Procedia PDF Downloads 425
1874 An Efficiency Measurement of E-Government Performance for United Nation Ranking Index

Authors: Yassine Jadi, Lin Jie

Abstract:

In order to serve the society in an electronic manner, many developing countries have launched tremendous e-government projects. The strategies of development and implementation e-government system have reached different levels, and to ensure consistency of development, the governments need to evaluate e-government performance. The United nation has design e-government development ranking index (EGDI) that rely on three indexes, Online service index (OSI), Telecommunication Infrastructure index (TII), and human capital index( HCI) which are not reflecting the interaction between a government and their citizens. Based on data envelopment analyses (DEA) technique, we are using E-participating index (EPI) as an output of government effort to evaluate the performance of e-government system. Therefore, the ranking index can be achieved in efficiency manner.

Keywords: e-government, DEA, efficiency measurement, EGDI

Procedia PDF Downloads 374
1873 OSEME: A Smart Learning Environment for Music Education

Authors: Konstantinos Sofianos, Michael Stefanidakis

Abstract:

Nowadays, advances in information and communication technologies offer a range of opportunities for new approaches, methods, and tools in the field of education and training. Teacher-centered learning has changed to student-centered learning. E-learning has now matured and enables the design and construction of intelligent learning systems. A smart learning system fully adapts to a student's needs and provides them with an education based on their preferences, learning styles, and learning backgrounds. It is a wise friend and available at any time, in any place, and with any digital device. In this paper, we propose an intelligent learning system, which includes an ontology with all elements of the learning process (learning objects, learning activities) and a massive open online course (MOOC) system. This intelligent learning system can be used in music education.

Keywords: intelligent learning systems, e-learning, music education, ontology, semantic web

Procedia PDF Downloads 309
1872 Hydrogen: Contention-Aware Hybrid Memory Management for Heterogeneous CPU-GPU Architectures

Authors: Yiwei Li, Mingyu Gao

Abstract:

Integrating hybrid memories with heterogeneous processors could leverage heterogeneity in both compute and memory domains for better system efficiency. To ensure performance isolation, we introduce Hydrogen, a hardware architecture to optimize the allocation of hybrid memory resources to heterogeneous CPU-GPU systems. Hydrogen supports efficient capacity and bandwidth partitioning between CPUs and GPUs in both memory tiers. We propose decoupled memory channel mapping and token-based data migration throttling to enable flexible partitioning. We also support epoch-based online search for optimized configurations and lightweight reconfiguration with reduced data movements. Hydrogen significantly outperforms existing designs by 1.21x on average and up to 1.31x.

Keywords: hybrid memory, heterogeneous systems, dram cache, graphics processing units

Procedia PDF Downloads 92
1871 A Preliminary Development of Virtual Sight-Seeing Website for Thai Temples on Rattanakosin Island

Authors: Pijitra Jomsri

Abstract:

Currently, the sources of cultures and tourist attractions are presented in online documentary form only. In order to make them more virtual, the researcher then collected and presented them in the form of Virtual Temple. The prototype, which is a replica of the actual location, was developed to the website and allows people who are interested in Rattanakosin Island can see in form of Panorama Pan View. By this way, anyone can access the data and appreciate the beauty of Rattanakosin Island in the virtual model like the real place. The result from the experiment showed that the levels of the knowledge on Thai temples in Rattanakosin Island increased; moreover, the users were highly satisfied with the systems. It can be concluded that virtual temples can support to publicize Thai arts, cultures and travels, as well as it can be utilized effectively.

Keywords: virtual sight-seeing, Rattanakosin Island, Thai temples, virtual temple

Procedia PDF Downloads 337
1870 Pharmacy-Station Mobile Application

Authors: Taissir Fekih Romdhane

Abstract:

This paper proposes a mobile web application named Pharmacy-Station that sells medicines and permits user to search for medications based on their symptoms, making it is easy to locate a specific drug online without the need to visit a pharmacy where it may be out of stock. This application is developed using the jQuery Mobile framework, which uses many web technologies and languages such as HTML5, PHP, JavaScript and CSS3. To test the proposed application, we used data from popular pharmacies in Saudi Arabia that included important information such as location, contact, and medicines in stock, etc. This document describes the different steps followed to create the Pharmacy-Station application along with screenshots. Finally, based on the results, the paper concludes with recommendations and further works planned to improve the Pharmacy-Station mobile application.

Keywords: pharmacy, mobile application, jquery mobile framework, search, medicine

Procedia PDF Downloads 157
1869 Semantic Analysis of the Change in Awareness of Korean College Admission Policy

Authors: Sujin Hwang, Hyerang Park, Hyunchul Kim

Abstract:

The purpose of this study is to find the effectiveness of the admission simplification policy. The number of online news articles about ‘high school record’ was collected and semantically analyzed to identify and analyze the social awareness during 2014 to 2015. The main results of the study are as follows: First, there was a difference in expectations that the burden of the examinees would decrease as announced by KCUE. Thus, there was still a strain on the university entrance exam after the enforcement of the policy. Second, private tutoring is expanding in different forms, rather than reducing the policy. It is different from the prediction that examinees can prepare for university admissions without the private tutoring. Thus, the college admission rules currently enforced needs to be improved. The reasonable college admission system changes are discussed.

Keywords: education policy, private tutoring, shadow education, education admission policy

Procedia PDF Downloads 225
1868 Photovoice-Through Photographs to Feelings: Investigation of Experience Reporting in a Randomized Controlled Study

Authors: Selina Studer, Maria Kleinstäuber, Cornelia Weise

Abstract:

Background: Finding words to report what you have been through may be challenging, especially when dealing with stressful or highly emotional experiences. Photovoice (PV) represents a possible way of facilitating experience reporting. In this approach, people take photos about a particular topic (in our study: worries about the future) and talk about the topic based on the photos. So far, the benefits of Photovoice have been quantitatively insufficiently tested. There is a lack of randomized controlled trials investigating PV in comparison to other methods. This study aimed to fill this research gap. Methods: 65 participants took part in the study and were randomly assigned to the PV group, the writing group (WG), or the control group (CG). The PV group received the task to take photos of worries regarding the future for one week and send max. 5 of them to the interviewer before the interview. The WG had to write down the worries about the future and send max. 5 of them to the interviewer before the interview. The control group did not receive a specific assignment. The semi-structured interview consisted of six open-ended questions and was applied to all future worries. The questions included the content of the future worries, the meaning, and how the worry expressed itself emotionally and physically. The interview was recorded and later transcribed. After the interview, online questionnaires were filled out. They covered a range of variables such as access to emotional content, ability to describe feelings, the extent of self-disclosure, and relationship quality. Results: Contrary to our hypotheses, one-way ANOVA revealed no differences between the three conditions concerning all variables (access to emotional content, ability to describe feelings, the extent of self-disclosure, and so on), all p's > 0.14, BF₀₁ = 1.78-7.66. In a subsequent step, the words in the transcribed interviews were analyzed. The LIWC program counted how many emotional words occurred in the text and assigned them to predefined categories. Planned contrasts revealed that the PV reported more negative emotional words compared to the two groups t(62) = 2.62, p = .011, and also compared to the WG only, t(62) = 2.36, p = .022, BF₀₁ = 0.62. Conclusions and implications: The applied self-report instruments did not reveal any differences between the groups. However, the PV group used more negative emotional words than the other two groups. The discrepancy between self-report and observation variables regarding emotionality is noticeable. It is suggested that the highly educated and above-average female sample may not have needed PV to access emotional content. It is possible that the approach would yield clearer results in a clinical sample. This and other approaches are currently being investigated in a follow-up study.

Keywords: photovoice, controlled randomized study, online intervention, emotional awareness, self-disclosure, data triangulation, interviews

Procedia PDF Downloads 70
1867 Households’ Willingness to Pay for Watershed Management Practices in Lake Hawassa Watershed, Southern Ethiopia

Authors: Mulugeta Fola, Mengistu Ketema, Kumilachew Alamerie

Abstract:

Watershed provides vast economic benefits within and beyond the management area of interest. But most watersheds in Ethiopia are increasingly facing the threats of degradation due to both natural and man-made causes. To reverse these problems, communities’ participation in sustainable management programs is among the necessary measures. Hence, this study assessed the households’ willingness to pay for watershed management practices through a contingent valuation study approach. Double bounded dichotomous choice with open-ended follow-up format was used to elicit the households’ willingness to pay. Based on data collected from 275 randomly selected households, descriptive statistics results indicated that most households (79.64%) were willing to pay for watershed management practices. A bivariate Probit model was employed to identify determinants of households’ willingness to pay and estimate mean willingness to pay. Its result shows that age, gender, income, livestock size, perception of watershed degradation, social position, and offered bids were important variables affecting willingness to pay for watershed management practices. The study also revealed that the mean willingness to pay for watershed management practices was calculated to be 58.41 Birr and 47.27 Birr per year from the double bounded and open-ended format, respectively. The study revealed that the aggregate welfare gains from watershed management practices were calculated to be 931581.09 Birr and 753909.23 Birr per year from double bounded dichotomous choice and open-ended format, respectively. Therefore, the policymakers should make households to pay for the services of watershed management practices in the study area.

Keywords: bivariate probit model, contingent valuation, watershed management practices, willingness to pay

Procedia PDF Downloads 222
1866 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 212
1865 Online Measurement of Fuel Stack Elongation

Authors: Sung Ho Ahn, Jintae Hong, Chang Young Joung, Tae Ho Yang, Sung Ho Heo, Seo Yun Jang

Abstract:

The performances of nuclear fuels and materials are qualified at an irradiation system in research reactors operating under the commercial nuclear power plant conditions. Fuel centerline temperature, coolant temperature, neutron flux, deformations of fuel stack and swelling are important parameters needed to analyze the nuclear fuel performances. The dimensional stability of nuclear fuels is a key parameter measuring the fuel densification and swelling. In this study, the fuel stack elongation is measured using a LVDT. A mockup LVDT instrumented fuel rod is developed. The performances of mockup LVDT instrumented fuel rod is evaluated by experiments.

Keywords: axial deformation, elongation measurement, in-pile instrumentation, LVDT

Procedia PDF Downloads 533
1864 Gradient-Based Reliability Optimization of Integrated Energy Systems Under Extreme Weather Conditions: A Case Study in Ningbo, China

Authors: Da LI, Peng Xu

Abstract:

Recent extreme weather events, such as the 2021 European floods and North American heatwaves, have exposed the vulnerability of energy systems to both extreme demand scenarios and potential physical damage. Current integrated energy system designs often overlook performance under these challenging conditions. This research, focusing on a regional integrated energy system in Ningbo, China, proposes a distinct design method to optimize system reliability during extreme events. A multi-scenario model was developed, encompassing various extreme load conditions and potential system damages caused by severe weather. Based on this model, a comprehensive reliability improvement scheme was designed, incorporating a gradient approach to address different levels of disaster severity through the integration of advanced technologies like distributed energy storage. The scheme's effectiveness was validated through Monte Carlo simulations. Results demonstrate significant enhancements in energy supply reliability and peak load reduction capability under extreme scenarios. The findings provide several insights for improving energy system adaptability in the face of climate-induced challenges, offering valuable references for building reliable energy infrastructure capable of withstanding both extreme demands and physical threats across a spectrum of disaster intensities.

Keywords: extreme weather events, integrated energy systems, reliability improvement, climate change adaptation

Procedia PDF Downloads 22
1863 Teaching and Learning Physics via GPS and WikiS

Authors: Hashini E. Mohottala

Abstract:

We report the combine use of Wikispaces (WikiS) and Group Problem Solving (GPS) sessions conducted in the introductory level physics classes. As a part of this new teaching tool, some essay type problems were posted on the WikiS in weekly basis and students were encouraged to participate in problem solving without providing numerical final answers but the steps. Wikispace is used as a platform for students to meet online and create discussions. Each week students were further evaluated on problem solving skills opening up more opportunity for peer interaction through GPS. Each group was given a different problem to solve and the answers were graded. Students developed a set of skills in decision-making, problem solving, communication, negotiation, critical and independent thinking and teamwork through the combination of WikiS and GPS.

Keywords: group problem solving (GPS), wikispace (WikiS), physics education, learning

Procedia PDF Downloads 417
1862 A Redesigned Pedagogy in Introductory Programming Reduces Failure and Withdrawal Rates by Half

Authors: Said Fares, Mary Fares

Abstract:

It is well documented that introductory computer programming courses are difficult and that failure rates are high. The aim of this project was to reduce the high failure and withdrawal rates in learning to program. This paper presents a number of changes in module organization and instructional delivery system in teaching CS1. Daily out of class help sessions and tutoring services were applied, interactive lectures and laboratories, online resources, and timely feedback were introduced. Five years of data of 563 students in 21 sections was collected and analyzed. The primary results show that the failure and withdrawal rates were cut by more than half. Student surveys indicate a positive evaluation of the modified instructional approach, overall satisfaction with the course and consequently, higher success and retention rates.

Keywords: failure rate, interactive learning, student engagement, CS1

Procedia PDF Downloads 306
1861 E-Resource Management: Digital Environment for a Library System

Authors: Vikram Munjal, Harpreet Munjal

Abstract:

A few years ago we could hardly think of Libraries' strategic plan that includes the bold and amazing prediction of a mostly digital environment for a library system. However, sheer hard work by the engineers, academicians, and librarians made it feasible. However, it requires huge expenditure and now a day‘s spending for electronic resources (e-resources) have been growing much more rapidly than have the materials budgets of which such resources are usually a part. And many libraries are spending a huge amount on e-resources. Libraries today are in the midst of a profound shift toward reliance on e-resources, and this reliance seems to have deepened in recent years as libraries have shed paper journal subscriptions to help pay for online access. This has been exercised only to cater user behavior and attitudes that seem to be changing even more quickly in this dynamic scenario.

Keywords: radio frequency identification, management, scanning, barcodes, checkout and tags

Procedia PDF Downloads 402
1860 Impact of Grade Sensitivity on Learning Motivation and Academic Performance

Authors: Salwa Aftab, Sehrish Riaz

Abstract:

The objective of this study was to check the impact of grade sensitivity on learning motivation and academic performance of students and to remove the degree of difference that exists among students regarding the cause of their learning motivation and also to gain knowledge about this matter since it has not been adequately researched. Data collection was primarily done through the academic sector of Pakistan and was depended upon the responses given by students solely. A sample size of 208 university students was selected. Both paper and online surveys were used to collect data from respondents. The results of the study revealed that grade sensitivity has a positive relationship with the learning motivation of students and their academic performance. These findings were carried out through systematic correlation and regression analysis.

Keywords: academic performance, correlation, grade sensitivity, learning motivation, regression

Procedia PDF Downloads 398
1859 Islamization of Knowledge with Special Reference to Mohd Kamal Hassan's Perspective

Authors: Abdul Latheef O. Mavukkandy

Abstract:

Islamization of knowledge (IOK) is an intellectual movement emerged in the middle of 1970s to address the threats by modern western civilizational onslaughts. This paper analyzes the discourse of Islamization of knowledge with special reference to the views of Kamal Hassan who prefers an alternative term called 'Islamicization'. First of all the theoretical and practical outlines of IOK movement were presented by Ismail Raji al-Faruqi in his book 'Islamization of Knowledge; General Principles and Work Plan' in 1982. He identified that the educational system in the Muslim world accounted for the decline of Muslim Ummah through de-Islamization and demoralization. So, the need for IOK was an academic challenge to reconstruct the Ummah. Kamal Hassan kept just different view from Ismail Raji al-Faruqi and Muhammed Naquib al-Attas that he coined the terms 'Relevantization and Contextualization'. So, he wanted the 'Islamization of Islamic Revealed Knowledge'. So, he used Islamization of Human Knowledge (IOHK) instead of IOK. As part of this movement, the IOK identified that the textbooks used in Muslim educational institutions systematically keep the students estranged from Islam and its heritage. Furthermore, the modern secular knowledge develops secular attitude devoid of Islamic moral philosophy and the sense of mission in life. Based upon the content analysis of some of the sources, this study found that Islamization of Knowledge is an important movement in Islamic world, but the IOK project is not practicable completely because of the lack of trained teachers and resources. Although, the project resulted in the foundation of some universities and publishing more works, journals and doctoral thesis on different dimensions of Islamization of Knowledge.

Keywords: Islamization, Islamicization, releventization, human knowledge

Procedia PDF Downloads 425