Search results for: Internet of Things (IOT)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2089

Search results for: Internet of Things (IOT)

589 E-Payments, COVID-19 Restrictions, and Currency in Circulation: Thailand and Turkey

Authors: Zeliha Sayar

Abstract:

Central banks all over the world appear to be focusing first and foremost on retail central bank digital currency CBDC), i.e., digital cash/money. This approach is predicated on the belief that the use of cash has decreased, owing primarily to technological advancements and pandemic restrictions, and that a suitable foundation for the transition to a cashless society has been revealed. This study aims to contribute to the debate over whether digital money/CBDC can be a substitute or supplement to physical cash by examining the potential effects on cash demand. For this reason, this paper compares two emerging countries, Turkey, and Thailand, to demystify the impact of e-payment and COVID-19 restrictions on cash demand by employing fully modified ordinary least squares (FMOLS), dynamic ordinary least squares (DOLS), and the canonical cointegrating regression (CCR). The currency in circulation in two emerging countries, Turkey and Thailand, was examined in order to estimate the elasticity of different types of retail payments. The results demonstrate that real internet and mobile, cart, contactless payment, and e-money are long-term determinants of real cash demand in these two developing countries. Furthermore, with the exception of contactless payments in Turkey, there is a positive relationship between the currency in circulation and the various types of retail payments. According to findings, COVID-19 restrictions encourage the demand for cash, resulting in cash hoarding.

Keywords: CCR, DOLS, e-money, FMOLS, real cash

Procedia PDF Downloads 91
588 Women with Invisible Wounds: A Qualitative Exploration of Emotional Abuse

Authors: Mehar Pruthi, Manjula V.

Abstract:

For the longest time, Indian households have been hosts to a variety of domestic evils such as intimate partner violence, physical abuse, sexual assaults, and more commonly gender-based violence. The prevalence of such heinous acts against women is often swept under the carpet of patriarchy and leaves women scarred. Many times, these wounds are caused by more insidious and subtle acts of violence. For this study, the choice of term for these acts is Emotional Abuse. The ill effects of emotional abuse on the victim’s sense of self and psychological health have been widely established. The current study takes a qualitative approach to explore women’s experiences at the brunt of emotional abuse. To this end, six participants (N=6) were identified using purposive and snowball sampling which was followed by a pre-screening form to assess for the presence of emotional abuse. A semi-structured interview guide was employed to investigate the victim’s perception of emotional abuse, the manifestation of emotional abuse in a patriarchal society, and the reasons women remain in abusive relationships. Each interview lasted about 50-60 mins and was accompanied by extensive note-making. A preliminary analysis of the interviews was done using the Interpretative Phenomenological Approach. Initial findings reveal the emergence of themes such as feelings of loneliness, intergenerational transmission of violence, denial, justifying the partner’s behavior, staying because of children, hoping things would change, and faith in God. The study is instrumental in conceptualizing the patterns of emotional abuse keeping in mind the patriarchal context of the Indian society. It has implications for professionals in the mental health field who work with this population so they can better understand their plight. Future research could focus on rebuilding relationships for those partners who decide to sustain such relationships and focus on various coping mechanisms with special emphasis on religious beliefs.

Keywords: emotional abuse, gender-based violence, intimate partner violence, marriage, patriarchy

Procedia PDF Downloads 73
587 Podcasting: A Tool for an Enhanced Learning Experience of Introductory Courses to Science and Engineering Students

Authors: Yaser E. Greish, Emad F. Hindawy, Maryam S. Al Nehayan

Abstract:

Introductory courses such as General Chemistry I, General Physics I and General Biology need special attention as students taking these courses are usually at their first year of the university. In addition to the language barrier for most of them, they also face other difficulties if these elementary courses are taught in the traditional way. Changing the routine method of teaching of these courses is therefore mandated. In this regard, podcasting of chemistry lectures was used as an add-on to the traditional and non-traditional methods of teaching chemistry to science and non-science students. Podcasts refer to video files that are distributed in a digital format through the Internet using personal computers or mobile devices. Pedagogical strategy is another way of identifying podcasts. Three distinct teaching approaches are evident in the current literature and include receptive viewing, problem-solving, and created video podcasts. The digital format and dispensing of video podcasts have stabilized over the past eight years, the type of podcasts vary considerably according to their purpose, degree of segmentation, pedagogical strategy, and academic focus. In this regard, the whole syllabus of 'General Chemistry I' course was developed as podcasts and were delivered to students throughout the semester. Students used the podcasted files extensively during their studies, especially as part of their preparations for exams. Feedback of students strongly supported the idea of using podcasting as it reflected its effect on the overall understanding of the subject, and a consequent improvement of their grades.

Keywords: podcasting, introductory course, interactivity, flipped classroom

Procedia PDF Downloads 249
586 A Clustering Algorithm for Massive Texts

Authors: Ming Liu, Chong Wu, Bingquan Liu, Lei Chen

Abstract:

Internet users have to face the massive amount of textual data every day. Organizing texts into categories can help users dig the useful information from large-scale text collection. Clustering, in fact, is one of the most promising tools for categorizing texts due to its unsupervised characteristic. Unfortunately, most of traditional clustering algorithms lose their high qualities on large-scale text collection. This situation mainly attributes to the high- dimensional vectors generated from texts. To effectively and efficiently cluster large-scale text collection, this paper proposes a vector reconstruction based clustering algorithm. Only the features that can represent the cluster are preserved in cluster’s representative vector. This algorithm alternately repeats two sub-processes until it converges. One process is partial tuning sub-process, where feature’s weight is fine-tuned by iterative process. To accelerate clustering velocity, an intersection based similarity measurement and its corresponding neuron adjustment function are proposed and implemented in this sub-process. The other process is overall tuning sub-process, where the features are reallocated among different clusters. In this sub-process, the features useless to represent the cluster are removed from cluster’s representative vector. Experimental results on the three text collections (including two small-scale and one large-scale text collections) demonstrate that our algorithm obtains high quality on both small-scale and large-scale text collections.

Keywords: vector reconstruction, large-scale text clustering, partial tuning sub-process, overall tuning sub-process

Procedia PDF Downloads 411
585 Pre-Operative Tool for Facial-Post-Surgical Estimation and Detection

Authors: Ayat E. Ali, Christeen R. Aziz, Merna A. Helmy, Mohammed M. Malek, Sherif H. El-Gohary

Abstract:

Goal: Purpose of the project was to make a plastic surgery prediction by using pre-operative images for the plastic surgeries’ patients and to show this prediction on a screen to compare between the current case and the appearance after the surgery. Methods: To this aim, we implemented a software which used data from the internet for facial skin diseases, skin burns, pre-and post-images for plastic surgeries then the post- surgical prediction is done by using K-nearest neighbor (KNN). So we designed and fabricated a smart mirror divided into two parts a screen and a reflective mirror so patient's pre- and post-appearance will be showed at the same time. Results: We worked on some skin diseases like vitiligo, skin burns and wrinkles. We classified the three degrees of burns using KNN classifier with accuracy 60%. We also succeeded in segmenting the area of vitiligo. Our future work will include working on more skin diseases, classify them and give a prediction for the look after the surgery. Also we will go deeper into facial deformities and plastic surgeries like nose reshaping and face slim down. Conclusion: Our project will give a prediction relates strongly to the real look after surgery and decrease different diagnoses among doctors. Significance: The mirror may have broad societal appeal as it will make the distance between patient's satisfaction and the medical standards smaller.

Keywords: k-nearest neighbor (knn), face detection, vitiligo, bone deformity

Procedia PDF Downloads 141
584 Towards Innovation Performance among University Staff

Authors: Cheng Sim Quah, Sandra Phek Lin Sim

Abstract:

This study examined how individuals in their respective teams contributed to innovation performance besides defining the term of innovation in their own respective views. This study also identified factors that motivated University staff to contribute to the innovation products. In addition, it examined whether there is a significant relationship between professional training level and the length of service among university staff towards innovation and to what extent do the two variables contributed towards innovative products. The significance of this study is that it revealed the strengths and weaknesses of the university staff when contributing to innovation performance. Stratified-random sampling was employed to determine the samples representing the population of lecturers in the study, involving 123 lecturers in one of the local universities in Malaysia. The method employed to analyze the data is through categorizing into themes for the open-ended questions besides using descriptive and inferential statistics for the quantitative data. This study revealed that two types of definition for the term “innovation” exist among the university staff, namely, creation of new product or new approach to do things as well as value-added creative way to upgrade or improve existing process and service to be more efficient. This study found that the most prominent factor that propel them towards innovation is to improve the product in order to benefit users, followed by self-satisfaction and recognition. This implies that the staff in the organization viewed the creation of innovative products as a process of growth to fulfill the needs of others and also to realize their personal potential. This study also found that there was only a significant relationship between the professional training level and the length of service of 4-6 years among the university staff. The rest of the groups based on the length of service showed that there was no significant relationship with the professional training level towards innovation. Moreover, results of the study on directional measures depicted that the relationship for the length of service of 4 - 6 years with professional training level among the university staff is quite weak. This implies that good organization management lies on the shoulders of the key leaders who enlighten the path to be followed by the staff.

Keywords: innovation, length of service, performance, professional training level, motivation

Procedia PDF Downloads 299
583 Measuring Service Recovery Quality of Electronic Shopping Customers: A Study of Select Cities in India

Authors: Ramanjaneyulu Mogili, G.V.R.K. Acharyulu

Abstract:

Indian organized retail sector is growing at a faster pace and gaining popularity. Indian Brand Equity Foundation (IBEF) reveals that the current market size of Indian retail industry is about US$ 520 billion with for growth rate 14 to 15 percent annually by 2018 the Indian retail sector is likely to grow at a CAGR of 13% to reach a size of US$ 950 billion. Developments in Information Technology have enabled online Retail sector that empowers customers to order products, conduct transactions without the need to interact physically with the retailers. In recent years, the online shopping industry has gained popularity to the point where certain categories of customers would consider buying electronic products online rather than visiting the stores. Conventionally the physical location of a store is seen as a source of competitive advantage. Online Retailing service sites provide virtual shopping space to the customers. Online Retail services are gaining momentum in India, with internet penetration improving in the country and smartphones becoming affordable along with changing lifestyles and preferences of customers. Although online shoppers prefer the convenience and choice available in online shopping, certain issues raised due to the occurrence of service failure. The proposed study attempts to measure the service recovery and failure process of electronic goods in Indian retail channels.

Keywords: service recovery, customer satisfaction, e-shopping, service failure

Procedia PDF Downloads 208
582 Improving Vietnamese High School Students’ Writing Ability Through the Use of Electronic Portfolios

Authors: Du T. Tran, Anh M. N. Nguyen

Abstract:

Writing skill is one of the productive abilities and plays a vital role in encouraging communication. Although certain hurdles limit students from enhancing their writing skills, the introduction and widespread use of internet technology impact their education significantly. In this context, the research aims to investigate the effects of electronic portfolios (e-portfolios) on English as a foreign language (EFL) high school students’ writing ability, learners’ and instructors’ attitudes towards the use of e-portfolios in writing classes at high schools in Binh Duong province. The sample includes 15 teachers and 300 twelfth graders at 03 high schools in Binh Duong province. Facebook was chosen as an e-portfolio platform where the students created and developed their personal e-portfolios. The data were collected both quantitatively and qualitatively through mixed methods using the tools of a pre-test, a post-test (for students), questionnaires (for both teachers and students), and a semi-structured interview (for teachers in charge of the course). The survey results show that e-portfolios considerably impact EFL high school students writing abilities. The research findings also reveal challenges and technological drawbacks. For the optimal use of e-portfolios in writing courses in particular and for other language courses in general, recommendations are made for school managers, instructors, and learners to optimize the effects and for further research to shed more light on the topic

Keywords: attitudes, electronic portfolios, English writing ability, Vietnamese high school students

Procedia PDF Downloads 59
581 July 15 Coup Attempt and the Use of New Communication Technologies

Authors: Yasemin Gulsen Yilmaz, Suleyman Hakan Yilmaz, Muhammet Erbay

Abstract:

The new communication technologies have gradually improved its efficiency in all fields of life and made its presence irreplaceable. These technologies which appear in every aspect of life differently showed itself during the failed coup attempt in Turkey too. The evening of July 15, 2016, have already taken its place in the Turkish political history. In the evening of July 15, Turkish nation confronted to a coup attempted by a group within the Turkish Armed Forces. That evening, the scene of the confrontation between the coup attempters and the resisting civilians were watched minute-by-minute by the people using the new communication technologies. Pro-coup soldiers and the resisting groups that came face to face in the streets of metropolitan cities, made their in-group communications by using new media tools very actively. New media turned into the most important weapon both for coup plotters and for those who resisted. In the morning of next day, whoever used these tools better had the upper hand. The civilians were successful in protecting democracy not only by resisting against tanks and bullets but also by following the internet, organising in social media, sharing information-photos on the net and telling large masses their experiences through these technologies. In this study, we focused on and analysed the use of new media both by coup soldiers and resisting civilians during the failed coup attempt in July 15. Within the scope of this study, coup attempt news that took place in printed media within one week were examined; the information about the use of new media tools during the night of failed coup were compiled; and it was determined how, to what extend and what for these tools were used and how effective they were.

Keywords: communication, July 15, new media, media

Procedia PDF Downloads 224
580 Transitioning Classroom Students to Working Learners: Lived Experiences of Senior High School Work Immersion Students

Authors: Rico Herrero

Abstract:

The study looked into the different lived experiences of senior high school to work immersion and how they were able to cope up in the transition stage from being classroom students into immersion students in work immersion site. The participants of the study were the ten senior high school students from Punta Integrated School. Using interview guide questions, the researchers motivated the participants to reveal their thoughts, feelings, and experiences in the interviews via video recording. The researchers utilized the qualitative research design, but the approach used was grounded theory. The findings revealed the participants’ lived experiences on how to cope or overcome the transition stage during the work immersion program. They unanimously responded to the interview questions. And based on the themes that emerged from the testimonies of the Senior High School students, the classroom learners benefited a lot from authentic learning opportunity of immersion program. Work immersion provides the students the opportunity to learn and develop their skills/ competencies related to the field of specialization. The hands-on training provides them simulation of work. They realized that theoretical learning in school is not enough to be equipped to work. Immersion program also provides venue for values and standard transformation. Senior High School students felt a high demand of self-confidence at the beginning of their race. Good thing, self-esteem of an individual helps bring out one’s potential at its best. Students find it challenging to get along with people in all ages. But, the endeavour absolutely helps them to grow maturely. Participants also realized that it’s not easy to deal with time pressure. Hence, the immersion program taught them to learn about time management. Part of the best training is to expose the learners to the harsh reality. Despite of the things that the school had taught them, still, students realized that they are not yet ready to deal with the demands of work. Furthermore, they also found out that they need to develop an interpersonal skill to improve their human relationships.

Keywords: grounded theory, lived experiences, senior high school, work immersion

Procedia PDF Downloads 127
579 A Palmprint Identification System Based Multi-Layer Perceptron

Authors: David P. Tantua, Abdulkader Helwan

Abstract:

Biometrics has been recently used for the human identification systems using the biological traits such as the fingerprints and iris scanning. Identification systems based biometrics show great efficiency and accuracy in such human identification applications. However, these types of systems are so far based on some image processing techniques only, which may decrease the efficiency of such applications. Thus, this paper aims to develop a human palmprint identification system using multi-layer perceptron neural network which has the capability to learn using a backpropagation learning algorithms. The developed system uses images obtained from a public database available on the internet (CASIA). The processing system is as follows: image filtering using median filter, image adjustment, image skeletonizing, edge detection using canny operator to extract features, clear unwanted components of the image. The second phase is to feed those processed images into a neural network classifier which will adaptively learn and create a class for each different image. 100 different images are used for training the system. Since this is an identification system, it should be tested with the same images. Therefore, the same 100 images are used for testing it, and any image out of the training set should be unrecognized. The experimental results shows that this developed system has a great accuracy 100% and it can be implemented in real life applications.

Keywords: biometrics, biological traits, multi-layer perceptron neural network, image skeletonizing, edge detection using canny operator

Procedia PDF Downloads 353
578 A Cross-Cultural Investigation of Self-Compassion in Adolescents Across Gender

Authors: H. N. Cheung

Abstract:

Self-compassion encourages one to accept oneself, reduce self-criticism and self-judgment, and see one’s shortcomings and setbacks in a balanced view. Adolescent self-compassion is a crucial protective factor against mental illness. It is, however, affected by gender. Given the scarcity of self-compassion scales for adolescents, the current study evaluates the Self-Compassion Scale for Youth (SCS-Y) in a large cross-cultural sample and investigates how the subscales of SCS-Y relate to the dimensions of depressive symptoms across gender. Through the internet-based Qualtrics, a total of 2881 teenagers aged 12 to 18 years were recruited from Hong Kong (HK), China, and the United Kingdom. A Multiple Indicator Multiple Cause (MIMIC) model was used to evaluate measurement invariance of the SCS-Y, and differential item functioning (DIF) was checked across gender. Upon the establishment of the best model, a multigroup structural equation model (SEM) was built between factors of SCS-Y and Multidimensional depression assessment scale (MDAS) which assesses four dimensions of depressive symptoms (emotional, cognitive, somatic and interpersonal). The SCS-Y was shown to have good reliability and validity. The MIMIC model produced a good model fit for a hypothetical six-factor model (CFI = 0.980; TLI = 0.974; RMSEA = 0.038) and no item was flagged for DIF across gender. A gender difference was observed between SCS-Y factors and depression dimensions. Conclusions: The SCS-Y exhibits good psychometric characteristics, including measurement invariance across gender. The study also highlights the gender difference between self-compassion factors and depression dimensions.

Keywords: self compassion, gender, depression, structural equation modelling, MIMIC model

Procedia PDF Downloads 60
577 Factors Influencing Accidental Cyberbullying on Social Media: Healthcare Industry Perspective

Authors: Iram Malik, Mahrukh Shaukat, Abeer Malik, Hafiz Mushtaq Ahmad

Abstract:

There has been a lot of research on cyberbullying but there is limited research on the topic of accidental cyberbullying on social media with a special focus on healthcare industry. This study emphasizes to uncover the factors that contribute to accidental cyberbullying on social media and how it affects individuals, professionals’ and organizations in health care sector. Nowadays social media is becoming a necessary part of our daily life; there is a need to look into how it is shaping our social life and behaviors displayed online. Instances of cyber bullying can have long-term repercussions due to over-sharing of information. The study used simple random sampling and the instrument of data collection was survey. A sample size of 250 healthcare professionals was chosen from the twin cities of Rawalpindi and Islamabad, Pakistan to examine the relationship between their attitude towards internet use, psychological distress, verbal aggression, envy, frustration, self-compassion, personality traits and accidental cyberbullying on social media. The results of the study have been encouraging. The findings show that psychological distress, aggression, envy, frustration and personality traits had direct effect on accidental cyberbullying whereas compassion, altruism lessened the effect of accidental cyberbullying behavior. It is our intent that the findings of this study could help raise awareness regarding fair use of social media, help policy makers in developing appropriate policies for avoiding cyberbullying in future.

Keywords: accidental cyberbullying, aggression, cyberbullying, frustration, social media

Procedia PDF Downloads 266
576 Of an 80 Gbps Passive Optical Network Using Time and Wavelength Division Multiplexing

Authors: Malik Muhammad Arslan, Muneeb Ullah, Dai Shihan, Faizan Khan, Xiaodong Yang

Abstract:

Internet Service Providers are driving endless demands for higher bandwidth and data throughput as new services and applications require higher bandwidth. Users want immediate and accurate data delivery. This article focuses on converting old conventional networks into passive optical networks based on time division and wavelength division multiplexing. The main focus of this research is to use a hybrid of time-division multiplexing and wavelength-division multiplexing to improve network efficiency and performance. In this paper, we design an 80 Gbps Passive Optical Network (PON), which meets the need of the Next Generation PON Stage 2 (NGPON2) proposed in this paper. The hybrid of the Time and Wavelength division multiplexing (TWDM) is said to be the best solution for the implementation of NGPON2, according to Full-Service Access Network (FSAN). To co-exist with or replace the current PON technologies, many wavelengths of the TWDM can be implemented simultaneously. By utilizing 8 pairs of wavelengths that are multiplexed and then transmitted over optical fiber for 40 Kms and on the receiving side, they are distributed among 256 users, which shows that the solution is reliable for implementation with an acceptable data rate. From the results, it can be concluded that the overall performance, Quality Factor, and bandwidth of the network are increased, and the Bit Error rate is minimized by the integration of this approach.

Keywords: bit error rate, fiber to the home, passive optical network, time and wavelength division multiplexing

Procedia PDF Downloads 51
575 A Bi-Objective Model to Optimize the Total Time and Idle Probability for Facility Location Problem Behaving as M/M/1/K Queues

Authors: Amirhossein Chambari

Abstract:

This article proposes a bi-objective model for the facility location problem subject to congestion (overcrowding). Motivated by implementations to locate servers in internet mirror sites, communication networks, one-server-systems, so on. This model consider for situations in which immobile (or fixed) service facilities are congested (or queued) by stochastic demand to behave as M/M/1/K queues. We consider for this problem two simultaneous perspectives; (1) Customers (desire to limit times of accessing and waiting for service) and (2) Service provider (desire to limit average facility idle-time). A bi-objective model is setup for facility location problem with two objective functions; (1) Minimizing sum of expected total traveling and waiting time (customers) and (2) Minimizing the average facility idle-time percentage (service provider). The proposed model belongs to the class of mixed-integer nonlinear programming models and the class of NP-hard problems. In addition, to solve the model, controlled elitist non-dominated sorting genetic algorithms (Controlled NSGA-II) and controlled elitist non-dominated ranking genetic algorithms (NRGA-I) are proposed. Furthermore, the two proposed metaheuristics algorithms are evaluated by establishing standard multiobjective metrics. Finally, the results are analyzed and some conclusions are given.

Keywords: bi-objective, facility location, queueing, controlled NSGA-II, NRGA-I

Procedia PDF Downloads 559
574 The Impact of Artificial Intelligence on Torism Ouputs

Authors: Nancy Ayman Kamal Mohamed Mehrz

Abstract:

As the economies of other countries in the Mediterranean Basin, the tourism sector in our country has a high denominator in economics. Tourism businesses, which are building blocks of tourism, sector faces with a variety of problems during their activities. These problems faced make business efficiency and competition conditions of the businesses difficult. Most of the problems faced by the tourism businesses and the information of consumers about consumers’ rights were used in this study, which is conducted to determine the problems of tourism businesses in the Central Anatolia Region. It is aimed to contribute the awareness of staff and executives working at tourism sector and to attract attention of businesses active concurrently with tourism sector and legislators. E-tourism is among the issues that have recently been entered into the field of tourism. In order to achieve this type of tourism, Information and Communications Technology (or ICT) infrastructures as well as Co-governmental organizations and tourism resources are important. In this study, the opinions of managers and tourism officials about the e-tourism in Leman city were measured; it also surveyed the impact of level of digital literacy of managers and tourism officials on attracting tourists. This study was conducted. One of the environs of the Esfahan province. This study is a documentary – survey and the sources include library resources and also questionnaires. The results obtained indicate that if managers use ICT, it may help e-tourism to be developed in the region, and increasing managers’ beliefs on e-tourism and upgrading their level of digital literacy may affect e-tourism development.

Keywords: financial problems, the problems of tourism businesses, tourism businesses, internet, marketing, tourism, tourism management economic competitiveness, enhancing competitiveness

Procedia PDF Downloads 54
573 Legal Feminism, Modernity and Their Impact on Some African Countries

Authors: Umulisa Linda, Andy Cons Matata

Abstract:

The origin of legal feminism can be attributed to an attempt to provide a safe space for women such as voting, parental, and inheritance rights, among others. It was also a rebellion against male supremacy. However, with the development of technology and especially in the era of the internet, it appears that both legal feminism and the modernism are losing their luster. While these movements had their origin either in the United States of America or western Europe, their impacts have been felt as far as Africa, Asia, and Latin America. In Africa, different countries have different levels of penetration of these movements. This study, therefore, had its focus on how legal feminism and modernism have influenced legal developments in Kenya and Rwanda. The study adopted a qualitative approach with the respondents being asked about their feelings and perceptions on how the two movements had affected legal developments in their countries. In order to gauge the opinion of different categories of people such as the youth, middle-aged and the elderly people as well as being gender-sensitive, the study adopted a purpose method of sampling. The questionnaires and the focus group discussions were employed as the main tools for data gathering. From the questionnaires, the focus group discussions, and the data analysis that followed, the study concluded that both legal feminism and modernity had penetrated the legal systems of both Kenya and Rwanda so deeply. The study further found that the proponents of the two movements were mostly urban based and educated women. The men were generally opposed to the movements.

Keywords: legal development, legal feminsim, modernism, voting, parental and inheritance rights

Procedia PDF Downloads 119
572 The Consequences of Regime Change in Iraq; Formation and Continuation of Geopolitical Crises

Authors: Ali Asghar Sotoudeh

Abstract:

Since the US invasion of Iraq in 2003 and the subsequent regime change, internal conflicts between political and ethnic-religious groups have become a hallmark of Iraqi political dynamism. The most important manifestations of these conflicts are the Kurdish-central government conflicts, as well as fundamentalism since 2003. As a result, it seems not only US presence in Iraq under the pretext of fighting terrorism and expanding democracy has not had a positive effect on controlling fundamentalism and political stability in Iraq, but it has paved the way for the formation and continuation of geopolitical crises in the form of disputes over territory and sources of power. In this regard, given the importance of the study, the main purpose of this study is to examine the process of the impact of US regime-change policy on the formation and continuation of geopolitical crises in Iraq. The central question of this study is, what effect has the US regime change policy had on Iraq's domestic political processes? Findings show that regime change and subsequent imposed federalism have widened the gaps in Iraq's sectarian-ethnic system. As a result, the geopolitical crisis in the context of the dispute over geographical territory and sources of power between ethnic-religious groups has become the most important political dynamic in Iraq since the occupation. The research method in this article is descriptive-analytical, and the data collection method is library and internet resources.

Keywords: Iraq, united states, geopolitical crisis, ethno-religious conflict, political federalism

Procedia PDF Downloads 128
571 Omani Community in Digital Age: A Study of Omani Women Using Back Channel Media to Empower Themselves for Frontline Entrepreneurship

Authors: Sangeeta Tripathi, Muna Al Shahri

Abstract:

This research article presents the changing role and status of women in Oman. Transformation of women’s status started with the regime of His Majesty Sultan Qaboos Bin Said in 1970. It is always desired by the Sultan to enable women in all the ways for the balance growth of the country. Forbidding full face veil for women in public offices is one of the best efforts for their empowerment. Women education is also increasing rapidly. They are getting friendly with new information communication technology and using different social media applications such as WhatsApp, Instagram and Facebook for interaction and economic growth. Though there are some traditional and tribal boundaries, women are infused with courage and enjoying fair treatment and equal opportunities in different career positions. The study will try to explore changing mindset of young Omani women towards these traditional tribal boundaries, cultural heritage, business and career: ‘How are young Omani women making balance between work and social prestige?’, ‘How are they preserving their cultural values, embracing new technologies and approaching social network to enhance their economic power.’ This paper will discover their hurdles while using internet for their new entrepreneur. It will also examine the prospects of online business in Oman. The mixed research methodology is applied to find out the result.

Keywords: advertising, business, entrepreneurship, tribal barrier

Procedia PDF Downloads 284
570 Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis

Authors: Sarthak Mishra, Astha Sinha

Abstract:

There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question.

Keywords: business-business transaction (B2B), business-consumer transaction (B2C), e-commerce, online transaction, privacy and security threats

Procedia PDF Downloads 211
569 Quantifying Uncertainties in an Archetype-Based Building Stock Energy Model by Use of Individual Building Models

Authors: Morten Brøgger, Kim Wittchen

Abstract:

Focus on reducing energy consumption in existing buildings at large scale, e.g. in cities or countries, has been increasing in recent years. In order to reduce energy consumption in existing buildings, political incentive schemes are put in place and large scale investments are made by utility companies. Prioritising these investments requires a comprehensive overview of the energy consumption in the existing building stock, as well as potential energy-savings. However, a building stock comprises thousands of buildings with different characteristics making it difficult to model energy consumption accurately. Moreover, the complexity of the building stock makes it difficult to convey model results to policymakers and other stakeholders. In order to manage the complexity of the building stock, building archetypes are often employed in building stock energy models (BSEMs). Building archetypes are formed by segmenting the building stock according to specific characteristics. Segmenting the building stock according to building type and building age is common, among other things because this information is often easily available. This segmentation makes it easy to convey results to non-experts. However, using a single archetypical building to represent all buildings in a segment of the building stock is associated with loss of detail. Thermal characteristics are aggregated while other characteristics, which could affect the energy efficiency of a building, are disregarded. Thus, using a simplified representation of the building stock could come at the expense of the accuracy of the model. The present study evaluates the accuracy of a conventional archetype-based BSEM that segments the building stock according to building type- and age. The accuracy is evaluated in terms of the archetypes’ ability to accurately emulate the average energy demands of the corresponding buildings they were meant to represent. This is done for the buildings’ energy demands as a whole as well as for relevant sub-demands. Both are evaluated in relation to the type- and the age of the building. This should provide researchers, who use archetypes in BSEMs, with an indication of the expected accuracy of the conventional archetype model, as well as the accuracy lost in specific parts of the calculation, due to use of the archetype method.

Keywords: building stock energy modelling, energy-savings, archetype

Procedia PDF Downloads 135
568 Critical Analysis of the Caspian: The Role of Identity in Russia's Foreign Policy

Authors: Aidana Arynbek

Abstract:

This paper attempts to offer an alternative to the explanation of the politics of great powers in Caspian politics. Since many researchers have analysed the politics of great powers in the region with the focus on materialism, this paper attempts to bring a sociological inquiry into analysing inter-state behaviour. The constructivist concept of Alexander Wendt will be applied to analyse Russia’s relation with The United States, China and Iran; the main argument is emphasis on the power of ideational forces over material ones. Moreover, the innovative contribution of Wendt regarding the understanding of anarchy to the study of International Relations (IR) will be applied; in his words, ‘anarchy is what states make of it’. A neo-realist perspective implies that with the structure of international politics, Russia treats all great powers as rivals through engagement in power politics; however, Wendt’s approach is able to explain the reason behind the state’s behaviour towards power politics, and this is about not only international structure, but also identity. The understanding of identity answers the question of how Russia came about to follow different actions in relation to Iran and China in contrast to The United States. This paper will be divided into five chapters. The first chapter will explain the constructivism of Alexander Wendt; the second chapter will give a brief background to The Caspian Sea Region (CSR); the third chapter will explain the formation of Russia’s identity towards The United States, and this will be applied to analyse Russia’s relation to The U.S in The CSR. Similarly with China, the fourth chapter will explain Russia’s identity and its relations in The CSR, and finally, the fifth chapter will show Russia’s identity towards Iran and its relation to Iran in The CSR. It will be concluded that the analysis of the politics between great powers in seeking to access one of the richest regions, The Caspian Basin, will show that international politics is not fixed, but constructed by human action and cognition. Reality in the politics of great powers in The Caspian Sea Region is socially constructed. This paper is not interested in how things are, but how they became what they are. That is to say, how Russia’s foreign policies towards great powers became what they are.

Keywords: Alexander Wendt, Caspian sea, identity, Russia, socially constructed

Procedia PDF Downloads 279
567 Analysis of Speaking Skills in Turkish Language Acquisition as a Foreign Language

Authors: Lokman Gozcu, Sule Deniz Gozcu

Abstract:

This study aims to analyze the skills of speaking in the acquisition of Turkish as a foreign language. One of the most important things for the individual who learns a foreign language is to be successful in the oral communication (speaking) skills and to interact in an understandable way. Speech skill requires much more time and effort than other language skills. In this direction, it is necessary to make an analysis of these oral communication skills, which is important in Turkish language acquisition as a foreign language and to draw out a road map according to the result. The aim of this study is to determine the competence and attitudes of speaking competence according to the individuals who learn Turkish as a foreign language and to be considered as speaking skill elements; Grammar, emphasis, intonation, body language, speed, ranking, accuracy, fluency, pronunciation, etc. and the results and suggestions based on these determinations. A mixed method has been chosen for data collection and analysis. A Likert scale (for competence and attitude) was applied to 190 individuals who were interviewed face-to-face (for speech skills) with a semi-structured interview form about 22 participants randomly selected. In addition, the observation form related to the 22 participants interviewed were completed by the researcher during the interview, and after the completion of the collection of all the voice recordings, analyses of voice recordings with the speech skills evaluation scale was made. The results of the research revealed that the speech skills of the individuals who learned Turkish as a foreign language have various perspectives. According to the results, the most inadequate aspects of the participants' ability to speak in Turkish include vocabulary, using humorous elements while speaking Turkish, being able to include items such as idioms and proverbs while speaking Turkish, Turkish fluency respectively. In addition, the participants were found not to feel comfortable while speaking Turkish, to feel ridiculous and to be nervous while speaking in formal settings. There are conclusions and suggestions for the situations that arise after the have been analyses made.

Keywords: learning Turkish as a foreign language, proficiency criteria, phonetic (modalities), speaking skills

Procedia PDF Downloads 225
566 Optimal Design of Linear Generator to Recharge the Smartphone Battery

Authors: Jin Ho Kim, Yujeong Shin, Seong-Jin Cho, Dong-Jin Kim, U-Syn Ha

Abstract:

Due to the development of the information industry and technologies, cellular phones have must not only function to communicate, but also have functions such as the Internet, e-banking, entertainment, etc. These phones are called smartphones. The performance of smartphones has improved, because of the various functions of smartphones, and the capacity of the battery has been increased gradually. Recently, linear generators have been embedded in smartphones in order to recharge the smartphone's battery. In this study, optimization is performed and an array change of permanent magnets is examined in order to increase efficiency. We propose an optimal design using design of experiments (DOE) to maximize the generated induced voltage. The thickness of the poleshoe and permanent magnet (PM), the height of the poleshoe and PM, and the thickness of the coil are determined to be design variables. We made 25 sampling points using an orthogonal array according to four design variables. We performed electromagnetic finite element analysis to predict the generated induced voltage using the commercial electromagnetic analysis software ANSYS Maxwell. Then, we made an approximate model using the Kriging algorithm, and derived optimal values of the design variables using an evolutionary algorithm. The commercial optimization software PIAnO (Process Integration, Automation, and Optimization) was used with these algorithms. The result of the optimization shows that the generated induced voltage is improved.

Keywords: smartphone, linear generator, design of experiment, approximate model, optimal design

Procedia PDF Downloads 330
565 A Survey of Feature-Based Steganalysis for JPEG Images

Authors: Syeda Mainaaz Unnisa, Deepa Suresh

Abstract:

Due to the increase in usage of public domain channels, such as the internet, and communication technology, there is a concern about the protection of intellectual property and security threats. This interest has led to growth in researching and implementing techniques for information hiding. Steganography is the art and science of hiding information in a private manner such that its existence cannot be recognized. Communication using steganographic techniques makes not only the secret message but also the presence of hidden communication, invisible. Steganalysis is the art of detecting the presence of this hidden communication. Parallel to steganography, steganalysis is also gaining prominence, since the detection of hidden messages can prevent catastrophic security incidents from occurring. Steganalysis can also be incredibly helpful in identifying and revealing holes with the current steganographic techniques, which makes them vulnerable to attacks. Through the formulation of new effective steganalysis methods, further research to improve the resistance of tested steganography techniques can be developed. Feature-based steganalysis method for JPEG images calculates the features of an image using the L1 norm of the difference between a stego image and the calibrated version of the image. This calibration can help retrieve some of the parameters of the cover image, revealing the variations between the cover and stego image and enabling a more accurate detection. Applying this method to various steganographic schemes, experimental results were compared and evaluated to derive conclusions and principles for more protected JPEG steganography.

Keywords: cover image, feature-based steganalysis, information hiding, steganalysis, steganography

Procedia PDF Downloads 190
564 The Implementation of Anti-Circumvention Legislations in Thai Copyright System

Authors: Chuencheewin Yimfuang

Abstract:

The WIPO copyright treaty (WCT) was established by the World Intellectual Property Organisation (WIPO). This agreement required the contracting nations to provide adequate protection to technological measures to prevent massive copyright infringement in the internet system. Thailand had to implement the anti-circumvention rules into domestic legislation to comply with this international obligation. The purpose of this paper is to critically discuss the legislative standard under the WCT. It also aims to examine the legal development of technological protection measures in Thailand and demonstrate that the scope of prohibitions under the copyright Act 2022 (NO.5) is similar to the Digital Millennium Copyright Act 1998 (DMCA) of the United States (US). It could be found that the anti-circumvention laws of Thailand prohibit the circumvention of access-control technologies, and the regulation on trafficking circumvention devices has been added to the latest version of the Thai Copyright Act. These legislative evolutions have revealed the attempt to reinforce the legal protection of technological measures and copyright holders in order to be in line with global practices. However, the amendment has problems concerning the legal definitions of effective technological measure and the prohibited act of circumvention. The vagueness might affect the scope of protection and the boundary of prohibition. With this aspect, the DMCA will be evaluated and compared to gain guidelines for interpretation and enforcement in Thailand. The lessons and experiences learned from this study might be useful to correct the flaws or at least clarify the ambiguities embodied in Thai copyright legislation.

Keywords: legal development, technological protection measure, circumvention, Thailand

Procedia PDF Downloads 69
563 A Documentary Review of Theoretical and Practical Elements for a Genre Analysis of Thailand Travel Listicles

Authors: Pinyada Santisarun, Yaowaret Tharawoot, Songyut Akkakoson

Abstract:

This paper reports on a literature review sub-study of a larger research project which has been designed to identify the rhetorical organization of a travel writing genre, together with the use of lexical choices, syntactical structures, and graphological features, based on a randomly-selected corpus of Thailand travel listicles. Conducted as a library-based overview, this study aims to specify theoretical and practical elements for the said larger study. The materials for the review have been retrieved from various Internet sources, covering both public search engines and library databases. Generally, the article focuses on answering questions about the ‘what’ and the ‘how’ of such background elements widely discussed in the literature as the meaning of listicles, how the travel listicles’ patterns and regularities can be categorized to form a new genre, the effect of computer-mediated communication on the travel world, the travel language, and the current situation concerning the importance of travel listicles. The theoretical and practical data derived from this study provide valuable insights into the way in which the genre analysis and lexico-syntactical examination of Thailand travel listicles in the present authors’ larger research project can be properly conducted. The data gained can be added to the expanding body of knowledge in the field of the ESP genre.

Keywords: computer-mediated communication, digital writing, genre-based analysis, online travel writing, tourism language

Procedia PDF Downloads 123
562 Measuring Fundamental Growth Needs in a Youth Boatbuilding Context

Authors: Shane Theunissen, Rob Grandy

Abstract:

Historically and we would fairly conventionally within our formal schooling systems, we have convergent testing where all the students are expected to converge on the same answer, and that answer has been determined by an external authority that is reproducing knowledge of the hegemon. Many youths may not embody the cultural capital that's rewarded in formal schooling contexts as they aren't able to converge on the required answer that's being determined by the classroom teacher or the administrators. In this paper, we explore divergent processes that promote creative problem-solving. We embody this divergent process in our measurement of fundamental growth needs. To this end, we utilize the Mosaic Approach as a method for implementing the Outcomes That Matter framework. Outcomes That Matter is the name of the measurement tool built around the Circle of Courage framework, which is a way of identifying fundamental growth needs for young people. The Circle of Courage was developed by Martin-Broken-Leg and colleagues as a way to connect indigenous child-rearing philosophies with contemporary resilience and positive psychology research. The Outcomes that Matter framework puts forward four categories of growth needs for young people. These are: Belonging, which on a macro scale is acceptance into the greater community of practice, Mastery which includes a constellation of concepts including confidence, motivation, self-actualization, and self-determination, Independence refers to a sense of personal power into autonomy within a context where creativity and problem solving, and a personal voice can begin to emerge, and finally Generosity which includes interpersonal things like conflict resolution and teamwork. Outcomes of Matter puts these four domains into a measurement tool that facilitates collaborative assessment between the youth, teachers, and recreation therapists that allows for youth-led narratives pertaining to their fundamental growth outcomes. This application of the Outcomes That Matter framework is unique as it may be the first application of this framework in an educational boatbuilding context.

Keywords: collaboration, empowerment, outcomes that matter, mosaic approach, boat building

Procedia PDF Downloads 83
561 Influence of Information and Communication Technology on Dress Culture among Senior Secondary School Students in Ife East Local Government, Osun State, Nigeria

Authors: Idowu J. Diyaolu, Ebenezer O. Obayomi, Taiwo A. Bamidele

Abstract:

Information and Communication Technology (ICT) has been observed to have influence on the lifestyle of youths in general. Dressing styles, fashion consciousness and choice of role model are some of the areas of influence. The study was carried out to examine the perception and influence of ICT on the clothing culture of selected Senior Secondary School Students in Ife-East Local government area of Osun State, Nigeria. Two hundred Senior Secondary School Students from public and private schools were randomly selected. Data was collected using structured questionnaire. The result showed that 79.0% were computer literate, 64.5% have facebook account and 93.5% browse with phones. Based on their perception on the influence of ICT, 74.5% of the respondents agreed that frequent use of ICT has increased their level of fashion consciousness while 60.5% were motivated by the images and dressing pattern in magazines, on TV and the internet. Also, large proportions (60.5%) were influenced by the dressing styles of their friends on social media. Male students were significantly more engaged in ICT related activities than females (t = 1.29, P < 0.05), whereas there is no significant difference in the involvement in ICT activities between private and public school students (t = 0.325, P > 0.05). Since ICT has influence on dressing, appropriate dressing pattern should be encouraged on mass media.

Keywords: dress culture, information and communication technology, fashion trend, role model

Procedia PDF Downloads 439
560 User Acceptance Criteria for Digital Libraries

Authors: Yu-Ming Wang, Jia-Hong Jian

Abstract:

The Internet and digital publication technologies have brought dramatic impacts on how people collect, organize, disseminate, access, store, and use information. More and more governments, schools, and organizations spent huge funds to develop digital libraries. A digital library can be regarded as a web extension of traditional physically libraries. People can search diverse publications, find out the position of knowledge resources, and borrow or buy publications through digital libraries. People can gain knowledge and students or employees can finish their reports by using digital libraries. Since the considerable funds and energy have been invested in implementing digital libraries, it is important to understand the evaluative criteria from the users’ viewpoint in order to enhance user acceptance. This study develops a list of user acceptance criteria for digital libraries. An initial criteria list was developed based on some previously validated instruments related to digital libraries. Data were collected from user experiences of digital libraries. The exploratory factor analysis and confirmatory factor analysis were adopted to purify the criteria list. The reliabilities and validities were tested. After validating the criteria list, a user survey was conducted to collect the comparative importance of criteria. The analytic hierarchy process (AHP) method was utilized to derive the importance of each criterion. The results of this study contribute to an e understanding of the criteria and relative importance that users evaluate for digital libraries.

Keywords: digital library, user acceptance, analytic hierarchy process, factor analysis

Procedia PDF Downloads 233