Search results for: internet behaviour
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3502

Search results for: internet behaviour

2032 Cognitive Behaviour Hypnotherapy as an Effective Intervention for Nonsuicidal Self Injury Disorder

Authors: Halima Sadia Qureshi, Urooj Sadiq, Noshi Eram Zaman

Abstract:

The goal of this study was to see how cognitive behavior hypnotherapy affected nonsuicidal self-injury. DSM 5 invites the researchers to explore the newly added condition under the chapter of conditions under further study named Nonsuicidal self-injury disorder. To date, no empirical sound intervention has been proven effective for NSSI as given in DSM 5. Nonsuicidal self-injury is defined by DSM 5 as harming one's self physically, without suicidal intention. Around 7.6% of teenagers are expected to fulfill the NSSI disorder criteria. 3 Adolescents, particularly university students, account for around 87 percent of self-harm studies. Furthermore, one of the risks associated with NSSI is an increased chance of suicide attempts, and in most cases, the cycle repeats again. 6 The emotional and psychological components of the illness might lead to suicide, either intentionally or unintentionally. 7 According to a research done at a Pakistani military hospital, over 80% of participants had no intention of committing suicide. Furthermore, it has been determined that improvements in NSSI prevention and intervention are necessary as a stand-alone strategy. The quasi-experimental study took place in Islamabad and Rawalpindi, Pakistan, from May 2019 to April 2020 and included students aged 18 to 25 years old from several institutions and colleges in the twin cities. According to the Diagnostic and Statistical Manual of Mental Disorders 5th edition, the individuals were assessed for >2 episodes without suicidal intent using the intentional self-harm questionnaire. The Clinician Administered Nonsuicidal Self-Injury Disorder Index (CANDI) was used to assess the individual for NSSI condition. Symptom checklist-90 (SCL-90) was used to screen the participants for differential diagnosis. Mclean Screening Instrument for Borderline Personality Disorder (MSI-BPD) was used to rule out the BPD cases. The selected participants, n=106 from the screening sample of 600, were selected. They were further screened to meet the inclusion and exclusion criteria, and the total of n=71 were split into two groups: intervention and control. The intervention group received cognitive behavior hypnotherapy for the next three months, whereas the control group received no treatment. After the period of three months, both the groups went through the post assessment, and after the three months’ period, follow-up assessment was conducted. The groups were evaluated, and SPSS 25 was used to analyse the data. The results showed that each of the two groups had 30 (50 percent) of the 60 participants. There were 41 males (68 percent) and 19 girls (32 percent) in all. The bulk of the participants were between the ages of 21 and 23. (48 percent). Self-harm events were reported by 48 (80 percent) of the pupils, and suicide ideation was found in 6 (ten percent). In terms of pre- and post-intervention values (d=4.90), post-intervention and follow-up assessment values (d=0.32), and pre-intervention and follow-up values (d=5.42), the study's effect size was good. The comparison of treatment and no-treatment groups revealed that treatment was more successful than no-treatment, F (1, 58) = 53.16, p.001. The results reveal that the treatment manual of CBH is effective for Nonsuicidal self-injury disorder.

Keywords: NSSI, nonsuicidal self injury disorder, self-harm, self-injury, Cognitive behaviour hypnotherapy, CBH

Procedia PDF Downloads 182
2031 Reducing the Computational Cost of a Two-way Coupling CFD-FEA Model via a Multi-scale Approach for Fire Determination

Authors: Daniel Martin Fellows, Sean P. Walton, Jennifer Thompson, Oubay Hassan, Kevin Tinkham, Ella Quigley

Abstract:

Structural integrity for cladding products is a key performance parameter, especially concerning fire performance. Cladding products such as PIR-based sandwich panels are tested rigorously, in line with industrial standards. Physical fire tests are necessary to ensure the customer's safety but can give little information about critical behaviours that can help develop new materials. Numerical modelling is a tool that can help investigate a fire's behaviour further by replicating the fire test. However, fire is an interdisciplinary problem as it is a chemical reaction that behaves fluidly and impacts structural integrity. An analysis using Computational Fluid Dynamics (CFD) and Finite Element Analysis (FEA) is needed to capture all aspects of a fire performance test. One method is a two-way coupling analysis that imports the updated changes in thermal data, due to the fire's behaviour, to the FEA solver in a series of iterations. In light of our recent work with Tata Steel U.K using a two-way coupling methodology to determine the fire performance, it has been shown that a program called FDS-2-Abaqus can make predictions of a BS 476 -22 furnace test with a degree of accuracy. The test demonstrated the fire performance of Tata Steel U.K Trisomet product, a Polyisocyanurate (PIR) based sandwich panel used for cladding. Previous works demonstrated the limitations of the current version of the program, the main limitation being the computational cost of modelling three Trisomet panels, totalling an area of 9 . The computational cost increases substantially, with the intention to scale up to an LPS 1181-1 test, which includes a total panel surface area of 200 .The FDS-2-Abaqus program is developed further within this paper to overcome this obstacle and better accommodate Tata Steel U.K PIR sandwich panels. The new developments aim to reduce the computational cost and error margin compared to experimental data. One avenue explored is a multi-scale approach in the form of Reduced Order Modeling (ROM). The approach allows the user to include refined details of the sandwich panels, such as the overlapping joints, without a computationally costly mesh size.Comparative studies will be made between the new implementations and the previous study completed using the original FDS-2-ABAQUS program. Validation of the study will come from physical experiments in line with governing body standards such as BS 476 -22 and LPS 1181-1. The physical experimental data includes the panels' gas and surface temperatures and mechanical deformation. Conclusions are drawn, noting the new implementations' impact factors and discussing the reasonability for scaling up further to a whole warehouse.

Keywords: fire testing, numerical coupling, sandwich panels, thermo fluids

Procedia PDF Downloads 79
2030 The Challenges of Irrigated Tomato Production in Kano State, Nigeria

Authors: I. K. Adamu, J. O. Adefila

Abstract:

The paper examines the challenges of irrigated tomato growers in Kano State. Materials used for the study are sourced from newspapers, books, internet and field surveys. Questionnaires were also used to sample the opinion of the tomato farmers in the state. The purposive and snow ball sampling techniques were used to select knowledgeable individual farmers in the study areas. The sample size was based on a five percent (0.05) of the identified members of tomato farmers. Data analysis was achieved using cross-tabulation, percentage, and SWOT analysis. The study reveals that irrigated tomato farmers in Kano State faces a lot of challenges. The study offers some recommendations such as establishment of storage facilities on ground, establishment of processing industries in the state, and introduction of high yield varieties of tomato seeds instead of the outdated UC82B.

Keywords: SWOT, irrigated tomato production, tomato farmers, Nigeria

Procedia PDF Downloads 397
2029 Cost-Effective Hybrid Cloud Framework for HEI’s

Authors: Shah Muhammad Butt, Ahmed Masaud Ansari

Abstract:

Present Financial crisis in Higher Educational Institutes (HEIs) facing lots of problems considerable budget cuts, make difficult to meet the ever growing IT-based research and learning needs, institutions are rapidly planning and promoting cloud-based approaches for their academic and research needs. A cost effective Hybrid Cloud framework for HEI’s will provide educational services for campus or intercampus communication. Hybrid Cloud Framework comprises Private and Public Cloud approaches. This paper will propose the framework based on the Open Source Cloud (OpenNebula for Virtualization, Eucalyptus for Infrastructure, and Aneka for programming development environment) combined with CSP’s services which are delivered to the end-user via the Internet from public clouds.

Keywords: educational services, hybrid campus cloud, open source, electrical and systems sciences

Procedia PDF Downloads 458
2028 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: cloud computing, intrusion detection system, privacy, trust

Procedia PDF Downloads 323
2027 Smart Unmanned Parking System Based on Radio Frequency Identification Technology

Authors: Yu Qin

Abstract:

In order to tackle the ever-growing problem of the lack of parking space, this paper presents the design and implementation of a smart unmanned parking system that is based on RFID (radio frequency identification) technology and Wireless communication technology. This system uses RFID technology to achieve the identification function (transmitted by 2.4 G wireless module) and is equipped with an STM32L053 micro controller as the main control chip of the smart vehicle. This chip can accomplish automatic parking (in/out), charging and other functions. On this basis, it can also help users easily query the information that is stored in the database through the Internet. Experimental tests have shown that the system has the features of low power consumption and stable operation, among others. It can effectively improve the level of automation control of the parking lot management system and has enormous application prospects.

Keywords: RFID, embedded system, unmanned, parking management

Procedia PDF Downloads 333
2026 Teachers’ Awareness of the Significance of Lifelong Learning: A Case Study of Secondary School Teachers of Batna - Algeria

Authors: Bahloul Amel

Abstract:

This study is an attempt to raise the awareness of the stakeholders and the authorities on the sensitivity of Algerian secondary school teachers of English as a Foreign Language about the students’ loss of English language skills learned during formal schooling with effort and at expense and the supposed measures to arrest that loss. Data was collected from secondary school teachers of EFL and analyzed quantitatively using a questionnaire containing open-ended and close-ended questions. The results advocate a consensus about the need for actions to be adopted to make assessment techniques outcome-oriented. Most of the participants were in favor of including curricular activities involving contextualized learning, problem-solving learning critical self-awareness, self and peer-assisted learning, use of computers and internet so as to make learners autonomous.

Keywords: lifelong learning, EFL, contextualized learning, Algeria

Procedia PDF Downloads 348
2025 Visitor Discourses of European Holocaust Heritage: A Netnography

Authors: Craig Wight

Abstract:

This presentation will identify the key findings from a recent netnographic discourse analysis of social media content generated in response to visits to three iconic European Holocaust Heritage sites: Ann Frank’s House in Amsterdam, the Netherlands, the Auschwutz-Birkenau Memorial Museum and Memorial in Poland, and the Jewish Museum in Berlin, Germany. Four major discourses are identified under the headings of Holocaust heritage as social memory, reactions to Holocaust heritage, obligation and ritual, and transgressive visitor behaviour. Together, these discourses frame the values, existential anxieties, emotions, priorities, and expectations of visitors. The findings will interest those involved in the planning and management of Holocaust heritage for tourism purposes since they provide unique access to an archive of unmediated visitor feedback on European Holocaust heritage experiences.

Keywords: foucault, european holocaust heritage, discourse analysis, netnography, social media, dark tourism

Procedia PDF Downloads 143
2024 Focusing on the Utilization of Information and Communication Technology for Improving Childrens’ Potentials in Science: Challenges for Sustainable Development in Nigeria

Authors: Osagiede Mercy Afe

Abstract:

After the internet explosion in the 90’s, Technology was immediately integrated into the school system. Technology which symbolizes advancement in human knowledge was seen as a setback by many educators many efforts have been made to help stem this erroneous believes and help educators realize the benefits of technology and ways of implementing it in the classrooms especially in the sciences. This advancement created a constantly expanding gap between the pupil’s perception on the use of technology within the learning atmosphere and the teacher’s perception and limitations hence the focus of this paper is on the need to refocus on the potentials of Science and Technology in enhancing children learning at school especially in science for sustainable development in Nigeria. The paper recommended measures for facilitating the sustenance of science and technology in Nigerian schools so as to enhance the potentials of our children in Science and Technology for a better tomorrow.

Keywords: children, information communication technology (ICT), potentials, sustainable development, science education

Procedia PDF Downloads 488
2023 Big Data: Appearance and Disappearance

Authors: James Moir

Abstract:

The mainstay of Big Data is prediction in that it allows practitioners, researchers, and policy analysts to predict trends based upon the analysis of large and varied sources of data. These can range from changing social and political opinions, patterns in crimes, and consumer behaviour. Big Data has therefore shifted the criterion of success in science from causal explanations to predictive modelling and simulation. The 19th-century science sought to capture phenomena and seek to show the appearance of it through causal mechanisms while 20th-century science attempted to save the appearance and relinquish causal explanations. Now 21st-century science in the form of Big Data is concerned with the prediction of appearances and nothing more. However, this pulls social science back in the direction of a more rule- or law-governed reality model of science and away from a consideration of the internal nature of rules in relation to various practices. In effect Big Data offers us no more than a world of surface appearance and in doing so it makes disappear any context-specific conceptual sensitivity.

Keywords: big data, appearance, disappearance, surface, epistemology

Procedia PDF Downloads 421
2022 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 349
2021 Factors Affecting U-Computing Use

Authors: Shui Lien Chen, Chen-Yin Kuo

Abstract:

U-computing use has brings many new services of commerce, which could provide a new experience for customer. Location Based Services (LBS) is one of U-computing service. With increase of the smartphone and mobile internet users, there are many small and medium-sized enterprises (SMEs) take LBS in marketing strategy in Taiwan. For example, they would provide Facebook check-in to get a benefit (e.g. discount, free dessert and coupon) to attract customers purchasing. Therefore, this study is to understand which factors would affect SMEs adoption of u-computing and the performances after adopt U-computing. This study collected 187 useful data that were analyzed by SmartPLS 2.0 software. The results of this study are as follows. First, entrepreneurial orientation and market orientation positively affects innovation. Second, business resources and innovation positively affect u-computing use. Finally, U-computing positively affects both business value and customer value.

Keywords: entrepreneurial orientation, market orientation, innovation, business resources, u-computing use, LBS

Procedia PDF Downloads 592
2020 FPGA Implementation of Adaptive Clock Recovery for TDMoIP Systems

Authors: Semih Demir, Anil Celebi

Abstract:

Circuit switched networks widely used until the end of the 20th century have been transformed into packages switched networks. Time Division Multiplexing over Internet Protocol (TDMoIP) is a system that enables Time Division Multiplexing (TDM) traffic to be carried over packet switched networks (PSN). In TDMoIP systems, devices that send TDM data to the PSN and receive it from the network must operate with the same clock frequency. In this study, it was aimed to implement clock synchronization process in Field Programmable Gate Array (FPGA) chips using time information attached to the packages received from PSN. The designed hardware is verified using the datasets obtained for the different carrier types and comparing the results with the software model. Field tests are also performed by using the real time TDMoIP system.

Keywords: clock recovery on TDMoIP, FPGA, MATLAB reference model, clock synchronization

Procedia PDF Downloads 278
2019 The Iraqi Fibre-to-the-Home Networks, Problems, Challenges, and Solutions along with Less Expense

Authors: Hasanein Hasan, Mohammed Al-Taie, Basil Shanshool, Khalaf Abd-Ali

Abstract:

This approach aims to deal with establishing and operating Iraqi Fibre-To-The-Home (FTTH) projects. The problems they suffer from are organized sabotage, vandalism, accidental damage and poor planning. It provides practical solutions that deal with the aforementioned problems. These solutions consist of both technical and financial clarifications that ensure the achievement of the FTTH network’s stability for the purpose of equipping citizens, private sector companies, and governmental institutions with services, data transmission, the Internet, and other services. They aim to solve problems and obstacles accompanying the operation and maintenance of FTTH projects implemented by the Informatics and Telecommunications Public Company (ITPC)/ Iraqi Ministry of Communications (MoC). This approach takes the FTTH network of AlMaalif-AlMuaslat districts/ Baghdad-Iraq as a case study.

Keywords: CCTV, FTTH, ITPC, MoC, NVR, PTZ

Procedia PDF Downloads 82
2018 Mechanical Properties of Self-Compacting Concrete with Three-Dimensional Steel Fibres

Authors: Jeffri Ramli, Brabha Nagaratnam, Keerthan Poologanathan, Wai Ming Cheung, Thadshajini Suntharalingham

Abstract:

Fiber-reinforced self-compacting concrete (FRSCC) combines the benefits of SCC of high flowability and randomly dispersed short fibres together in one single concrete. Fibres prevent brittle behaviour and improve several mechanical properties of SCC. In this paper, an experimental investigation of the effect of three-dimensional (3D) fibres on the mechanical properties of SCC has been conducted. Seven SCC mixtures, namely SCC with no fibres as a reference mix, and six 3D steel fibre reinforced SCC mixes were prepared. Two different sizes of 3D steel fibres with perimeters of 115 mm and 220 mm at different fibre contents of 1%, 2%, and 3% (by cement weight) were considered. The mechanical characteristics were obtained through compressive, splitting tensile, and flexural strength tests. The test results revealed that the addition of 3D fibres improves the mechanical properties of SCC.

Keywords: self-compacting concrete, three-dimensional steel fibres, mechanical properties, compressive strength, splitting tensile strength, flexural strength

Procedia PDF Downloads 153
2017 A Review of Tribological Excellence of Bronze Alloys

Authors: Ram Dhani chauhan

Abstract:

Tribology is a term that was developed from the Greek words ‘tribos’ (rubbing) and ‘logy’ (knowledge). In other words, a study of wear, friction and lubrication of material is known as Tribology. In groundwater irrigation, the life of submersible pump components like impeller, bush and wear ring will depend upon the wear and corrosion resistance of casted material. Leaded tin bronze (LTB) is an easily castable material with good mechanical properties and tribological behaviour and is utilised in submersible pumps at large. It has been investigated that, as Sn content increases from 4-8 wt. % in LTB alloys, the hardness of the alloys increases and the wear rate decreases. Similarly, a composite of copper with 3% wt. Graphite (threshold limit of mix) has a lower COF (coefficient of friction) and the lowest wear rate. In LTB alloys, in the initial low-speed range, wear increases and in the higher range, it was found that wear rate decreases.

Keywords: coefficent of friction, coefficient of wear, tribology, leaded tin bronze

Procedia PDF Downloads 19
2016 Plane of Equal Settlement above HDD’s Borehole before Operational Condition

Authors: Shokoufeh Sadeghifard

Abstract:

This study is a review of the nature of soil arching that develops in the upper layer of soil during drilling processes before pulling product pipe inside the hole. This study is based on the results of some parametric studies which are investigating the behavior of drained sandy soil above HDD borehole using Plaxis finite element solution. The influence of drilling mud injection in these series of analyses has been ignored. However, a suitable drilling mud pressure helps to achieve stable arch when the height of soil cover over the drilling borehole is not enough. In this study, the soil response to the formation of a HDD borehole is compared to arching theory developed by Terzaghi (1943). It is found that Terzaghi’s approach is capable of describing all of the behaviour seen when a stable arch forms. According to the numerical results, a suitable safe depth of 4D, D is borehole diameter, is suggested for typical range of HDD borehole in sandy soil.

Keywords: HDD, Plaxis, finite element, arching, settlement, drilling

Procedia PDF Downloads 355
2015 Dark Heritage Tourism and Visitor Behaviour: The Case of Elmina Castle, Ghana

Authors: Girish Prayag, Wantanee Suntikul, Elizabeth Agyeiwaah

Abstract:

Current research on dark tourism largely follows residents’ perspectives with limited evaluations of tourists’ experiences. Unravelling the case of a dark heritage site in Elmina, Ghana, this paper develops a theoretical model to understand the relationships among four constructs namely, motivation, tourism impacts, place attachment, and satisfaction. Based on a sample of 414 domestic tourists, PLS-SEM confirmed several relationships and inter-relationships among the four constructs. For example, motivation had a positive relationship with perceptions of positive and negative tourism impacts suggesting that the more tourists were motivated to visit the site for cultural/learning experiences, the more positive and negative tourism impacts they perceived. Implications for dark tourism and heritage site management are offered.

Keywords: dark tourism, motivation, place attachment, tourism impacts

Procedia PDF Downloads 432
2014 Load Balancing Algorithms for SIP Server Clusters in Cloud Computing

Authors: Tanmay Raj, Vedika Gupta

Abstract:

For its groundbreaking and substantial power, cloud computing is today’s most popular breakthrough. It is a sort of Internet-based computing that allows users to request and receive numerous services in a cost-effective manner. Virtualization, grid computing, and utility computing are the most widely employed emerging technologies in cloud computing, making it the most powerful. However, cloud computing still has a number of key challenges, such as security, load balancing, and non-critical failure adaption, to name a few. The massive growth of cloud computing will put an undue strain on servers. As a result, network performance will deteriorate. A good load balancing adjustment can make cloud computing more productive and in- crease client fulfillment execution. Load balancing is an important part of cloud computing because it prevents certain nodes from being overwhelmed while others are idle or have little work to perform. Response time, cost, throughput, performance, and resource usage are all parameters that may be improved using load balancing.

Keywords: cloud computing, load balancing, computing, SIP server clusters

Procedia PDF Downloads 123
2013 Students' Statistical Reasoning and Attitudes towards Statistics in Blended Learning, E-Learning and On-Campus Learning

Authors: Petros Roussos

Abstract:

The present study focused on students' statistical reasoning related to Null Hypothesis Statistical Testing and p-values. Its objective was to test the hypothesis that neither the place (classroom, at a distance, online) nor the medium that actually supports the learning (ICT, internet, books) has an effect on understanding of statistical concepts. In addition, it was expected that students' attitudes towards statistics would not predict understanding of statistical concepts. The sample consisted of 385 undergraduate and postgraduate students from six state and private universities (five in Greece and one in Cyprus). Students were administered two questionnaires: a) the Greek version of the Survey of Attitudes Toward Statistics, and b) a short instrument which measures students' understanding of statistical significance and p-values. Results suggest that attitudes towards statistics do not predict students' understanding of statistical concepts, whereas the medium did not have an effect.

Keywords: attitudes towards statistics, blended learning, e-learning, statistical reasoning

Procedia PDF Downloads 310
2012 IACOP - Route Optimization in Wireless Networks Using Improved Ant Colony Optimization Protocol

Authors: S. Vasundra, D. Venkatesh

Abstract:

Wireless networks have gone through an extraordinary growth in the past few years, and will keep on playing a crucial role in future data communication. The present wireless networks aim to make communication possible anywhere and anytime. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Since an ad hoc network may consist of a large number of mobile hosts, this imposes a significant challenge on the design of an effective and efficient routing protocol that can work well in an environment with frequent topological changes. This paper proposes improved ant colony optimization (IACO) technique. It also maintains load balancing in wireless networks. The simulation results show that the proposed IACO performs better than existing routing techniques.

Keywords: wireless networks, ant colony optimization, load balancing, architecture

Procedia PDF Downloads 421
2011 Telehealth Ecosystem: Challenge and Opportunity

Authors: Rattakorn Poonsuph

Abstract:

Technological innovation plays a crucial role in virtual healthcare services. A growing number of telehealth platforms are concentrating on using digital tools to improve the quality and availability of care. As a result, telehealth represents an opportunity to redesign the way health services are delivered. The research objective is to discover a new business model for digital health services and related industries to participate with telehealth solutions. The business opportunity is valuable for healthcare investors as a startup company to further investigations or implement the telehealth platform. The paper presents a digital healthcare business model and business opportunities to related industries. These include digital healthcare services extending from a traditional business model and use cases of business opportunities to related industries. Although there are enormous business opportunities, telehealth is still challenging due to the patient adaption and digital transformation process within a healthcare organization.

Keywords: telehealth, Internet hospital, HealthTech, InsurTech

Procedia PDF Downloads 168
2010 Challenges and Opportunities for Online Consumer Selling Process Development in Coming Years in World

Authors: Prakash Prajapati

Abstract:

E commerce is certainly one of the business alternatives that individual will have to analyze in the forthcoming years. E-commerce is said to bring about arched type conversion in the world for exchange market. Prognosis E-commerce is presenting dreadful business advancement in our country. Endorsed by ascending online user base & mobile phone presentation, Indian e-commerce has been splendid development in the last few years. Conceding India’s analytical dividend and spiraling internet admittance, the sector is contracted to scale higher heights. Although, India’s overall peddle opportunity is consequential, the sector is beset with some deliberate challenges. The current study has been proceeded to explore the present scenario, status & future advancement of e-commerce in India and review the challenges and opportunities of e-commerce in India.

Keywords: online selling, retail selling online, product process, business opportunity

Procedia PDF Downloads 146
2009 Random Access in IoT Using Naïve Bayes Classification

Authors: Alhusein Almahjoub, Dongyu Qiu

Abstract:

This paper deals with the random access procedure in next-generation networks and presents the solution to reduce total service time (TST) which is one of the most important performance metrics in current and future internet of things (IoT) based networks. The proposed solution focuses on the calculation of optimal transmission probability which maximizes the success probability and reduces TST. It uses the information of several idle preambles in every time slot, and based on it, it estimates the number of backlogged IoT devices using Naïve Bayes estimation which is a type of supervised learning in the machine learning domain. The estimation of backlogged devices is necessary since optimal transmission probability depends on it and the eNodeB does not have information about it. The simulations are carried out in MATLAB which verify that the proposed solution gives excellent performance.

Keywords: random access, LTE/LTE-A, 5G, machine learning, Naïve Bayes estimation

Procedia PDF Downloads 145
2008 Features for Measuring Credibility on Facebook Information

Authors: Kanda Runapongsa Saikaew, Chaluemwut Noyunsan

Abstract:

Nowadays social media information, such as news, links, images, or VDOs, is shared extensively. However, the effectiveness of disseminating information through social media lacks in quality: less fact checking, more biases, and several rumors. Many researchers have investigated about credibility on Twitter, but there is no the research report about credibility information on Facebook. This paper proposes features for measuring credibility on Facebook information. We developed the system for credibility on Facebook. First, we have developed FB credibility evaluator for measuring credibility of each post by manual human’s labelling. We then collected the training data for creating a model using Support Vector Machine (SVM). Secondly, we developed a chrome extension of FB credibility for Facebook users to evaluate the credibility of each post. Based on the usage analysis of our FB credibility chrome extension, about 81% of users’ responses agree with suggested credibility automatically computed by the proposed system.

Keywords: facebook, social media, credibility measurement, internet

Procedia PDF Downloads 356
2007 Twitter's Impact on Print Media with Respect to Real World Events

Authors: Basit Shahzad, Abdullatif M. Abdullatif

Abstract:

Recent advancements in Information and Communication Technologies (ICT) and easy access to Internet have made social media the first choice for information sharing related to any important events or news. On Twitter, trend is a common feature that quantifies the level of popularity of a certain news or event. In this work, we examine the impact of Twitter trends on real world events by hypothesizing that Twitter trends have an influence on print media in Pakistan. For this, Twitter is used as a platform and Twitter trends as a base line. We first collect data from two sources (Twitter trends and print media) in the period May to August 2016. Obtained data from two sources is analyzed and it is observed that social media is significantly influencing the print media and majority of the news printed in newspaper are posted on Twitter earlier.

Keywords: twitter trends, text mining, effectiveness of trends, print media

Procedia PDF Downloads 258
2006 Key Factors Influencing the Purchasing Decisions of Low Emission Cars: A Comparative Study between Egypt and Slovenia

Authors: O. Alaa, D. Ahmed, R. Baher, K. Matjaz

Abstract:

This paper provides a study of the factors influencing the purchasing of low emission vehicles. In order to achieve the objectives of the paper, and in the light of the pool of literature and availability of data, the authors relied on qualitative methods to offers a comparison between Egypt as a developing country and Slovenia as a developed country, through analysing a survey that involves an Egyptian sample and Slovenian samples, it also studies the effect of different push and pull methods on different buyers in order to help the governments as well as the manufacturers to understand the most significant factors that affect the purchasing behaviour of LEV in the future. The results of this paper show the important vehicle performance factors, financial considerations, and environmental considerations along with the gender and age of the consumer show that consumers are more interested in the total price of the car than in different taxes.

Keywords: low emission vehicles, purchasing behavior, developed countries, developing countries

Procedia PDF Downloads 135
2005 A Novel Image Steganography Scheme Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

Growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC) and Image Fidelity (IF) over the previous techniques.

Keywords: fractal image, information hiding, Mandelbrot et fractal, steganography

Procedia PDF Downloads 541
2004 A Time since of Injection Model for Hepatitis C Amongst People Who Inject Drugs

Authors: Nader Al-Rashidi, David Greenhalgh

Abstract:

Mathematical modelling techniques are now being used by health organizations worldwide to help understand the likely impact that intervention strategies treatment options and combinations of these have on the prevalence and incidence of hepatitis C virus (HCV) in the people who inject drugs (PWID) population. In this poster, we develop a deterministic, compartmental mathematical model to approximate the spread of the HCV in a PWID population that has been divided into two groups by time since onset of injection. The model assumes that after injection needles adopt the most infectious state of their previous state or that of the PWID who last injected with them. Using analytical techniques, we find that the model behaviour is determined by the basic reproductive number R₀, where R₀ = 1 is a critical threshold separating two different outcomes. The disease-free equilibrium is globally stable if R₀ ≤ 1 and unstable if R₀ > 1. Additionally, we make some simulations where have confirmed that the model tends to this endemic equilibrium value with realistic parameter values giving an HCV prevalence.

Keywords: hepatitis C, people who inject drugs, HCV, PWID

Procedia PDF Downloads 144
2003 Lessons Learnt from Tutors’ Perspectives on Online Tutorial’s Policies in Open and Distance Education Institution

Authors: Durri Andriani, Irsan Tahar, Lilian Sarah Hiariey

Abstract:

Every institution has to develop, implement, and control its policies to ensure the effectiveness of the institution. In doing so, all related stakeholders have to be involved to maximize the benefit of the policies and minimize the potential constraints and resistances. Open and distance education (ODE) institution is no different. As an education institution, ODE institution has to focus their attention to fulfilling academic needs of their students through open and distance measures. One of them is quality learning support system. Significant stakeholders in learning support system are tutors since they are the ones who directly communicate with students. Tutors are commonly seen as objects whose main responsibility is limited to implementing policies decided by management in ODE institutions. Nonetheless, tutors’ perceptions of tutorials are believed to influence tutors’ performances in facilitating learning support. It is therefore important to analyze tutors’ perception on various aspects of learning support. This paper presents analysis of tutors’ perceptions on policies of tutoriala in ODE institution using Policy Analysis Framework (PAF) modified by King, Nugent, Russell, and Lacy. Focus of this paper is on on-line tutors, those who provide tutorials via Internet. On-line tutors were chosen to stress the increasingly important used of Internet in ODE system. The research was conducted in Universitas Terbuka (UT), Indonesia. UT is purposely selected because of its large number (1,234) of courses offered and large area coverage (6000 inhabited islands). These posed UT in a unique position where learning support system has, to some extent, to be standardized while at the same time it has to be able to cater the needs of different courses in different places for students with different backgrounds. All 598 listed on-line tutors were sent the research questionnaires. Around 20% of the email addresses could not be reached. Tutors were asked to fill out open-ended questionnaires on their perceptions on definition of on-line tutorial, roles of tutors and students in on-line tutorials, requirement for on-line tutors, learning materials, and student evaluation in on-line tutorial. Data analyzed was gathered from 40 on-line tutors who sent back filled-out questionnaires. Data were analyzed qualitatively using content analysis from all 40 tutors. The results showed that using PAF as entry point in choosing learning support services as area of policy with delivery learning materials as the issue at UT has been able to provide new insights of aspects need to be consider in formulating policies in online tutorial and in learning support services. Involving tutors as source of information could be proven to be productive. In general, tutors had clear understanding about definition of online tutorial, roles of tutors and roles of students, and requirement of tutor. Tutors just need to be more involved in the policy formulation since they could provide data on students and problem faced in online tutorial. However, tutors need an adjustment in student evaluation which according tutors too focus on administrative aspects and subjective.

Keywords: distance education, on-line tutorial, tutorial policy, tutors’ perspectives

Procedia PDF Downloads 253