Search results for: secure communication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4702

Search results for: secure communication

3172 Consortium Blockchain-based Model for Data Management Applications in the Healthcare Sector

Authors: Teo Hao Jing, Shane Ho Ken Wae, Lee Jin Yu, Burra Venkata Durga Kumar

Abstract:

Current distributed healthcare systems face the challenge of interoperability of health data. Storing electronic health records (EHR) in local databases causes them to be fragmented. This problem is aggravated as patients visit multiple healthcare providers in their lifetime. Existing solutions are unable to solve this issue and have caused burdens to healthcare specialists and patients alike. Blockchain technology was found to be able to increase the interoperability of health data by implementing digital access rules, enabling uniformed patient identity, and providing data aggregation. Consortium blockchain was found to have high read throughputs, is more trustworthy, more secure against external disruptions and accommodates transactions without fees. Therefore, this paper proposes a blockchain-based model for data management applications. In this model, a consortium blockchain is implemented by using a delegated proof of stake (DPoS) as its consensus mechanism. This blockchain allows collaboration between users from different organizations such as hospitals and medical bureaus. Patients serve as the owner of their information, where users from other parties require authorization from the patient to view their information. Hospitals upload the hash value of patients’ generated data to the blockchain, whereas the encrypted information is stored in a distributed cloud storage.

Keywords: blockchain technology, data management applications, healthcare, interoperability, delegated proof of stake

Procedia PDF Downloads 138
3171 Arbitration in Foreign Investment: The Need for Equitable Treatment between the Investor and the Host State

Authors: Maria João Mimoso, Bárbara Magalhães Bravo

Abstract:

This study aims to analyse the phenomenon of arbitration as a paradigm in solving emerging controversies of foreign investment. We will present their benefits and demonstrate their contribution to greater legal certainty in economic relations. This article explores the legal relevant concepts under a strictly conceptual methodology, preparing future research to be developed under more developed comparative law methodologies. The review of national and international literature and jurisprudence will reveal the importance of arbitration in the field of international economic relations, presenting it as an alternative dispute resolution. Globalization imposes new forms of investment protection and appeals to other forms of dispute settlement, primarily to prevent, among other problems, the possible bias of the recipient country's investment tribunals. Characterization of foreign investment, its regulatory sources, their characteristics and the need for intervention of an entity capable of resolving disputes between the parties involved: State investor reception; Investor (of a nationality other than the latter); State of the investor's nationality, and sometimes a ‘subsidiary’ local foreign investor. The ICSID (International Settlement of Investment Disputes) arbitration as a means of resolving investment litigations covered by bilateral treaties (BIT) and investment contracts calls for a delimitation of these two figures in order to clarify the scope of the arbitration under the aegis of the World Bank and to make it more secure in the view of the sovereign power of the States.

Keywords: arbitration, contract, foreign, investment, disputes

Procedia PDF Downloads 268
3170 Program Level Learning Outcomes in Music and Technology: Toward Improved Assessment and Better Communication

Authors: Susan Lewis

Abstract:

The assessment of learning outcomes at the program level has attracted much international interest from the perspectives of quality assurance and ongoing curricular redesign and renewal. This paper examines program-level learning outcomes in the field of music and technology, an area of study that has seen an explosion in program development over the past fifteen years. The Audio Engineering Society (AES) maintains an online directory of educational institutions worldwide, yielding the most comprehensive inventory of programs and courses in music and technology. The inventory includes courses, programs, and degrees in music and technology, music and computer science, music production, and the music industry. This paper focuses on published student learning outcomes for undergraduate degrees in music and technology and analyses commonalities at institutions in North America, the United Kingdom, and Europe. The results of a survey of student learning outcomes at twenty institutions indicates a focus on three distinct student learning outcomes: (1) cross-disciplinary knowledge in the fields of music and technology; (2) the practical application of training through the professional industry; and (3) the acquisition of skills in communication and collaboration. The paper then analyses assessment mechanisms for tracking student learning and achievement of learning outcomes at these institutions. The results indicate highly variable assessment practices. Conclusions offer recommendations for enhancing assessment techniques and better communicating learning outcomes to students.

Keywords: quality assurance, student learning; learning outcomes, music and technology

Procedia PDF Downloads 185
3169 Conversational Assistive Technology of Visually Impaired Person for Social Interaction

Authors: Komal Ghafoor, Tauqir Ahmad, Murtaza Hanif, Hira Zaheer

Abstract:

Assistive technology has been developed to support visually impaired people in their social interactions. Conversation assistive technology is designed to enhance communication skills, facilitate social interaction, and improve the quality of life of visually impaired individuals. This technology includes speech recognition, text-to-speech features, and other communication devices that enable users to communicate with others in real time. The technology uses natural language processing and machine learning algorithms to analyze spoken language and provide appropriate responses. It also includes features such as voice commands and audio feedback to provide users with a more immersive experience. These technologies have been shown to increase the confidence and independence of visually impaired individuals in social situations and have the potential to improve their social skills and relationships with others. Overall, conversation-assistive technology is a promising tool for empowering visually impaired people and improving their social interactions. One of the key benefits of conversation-assistive technology is that it allows visually impaired individuals to overcome communication barriers that they may face in social situations. It can help them to communicate more effectively with friends, family, and colleagues, as well as strangers in public spaces. By providing a more seamless and natural way to communicate, this technology can help to reduce feelings of isolation and improve overall quality of life. The main objective of this research is to give blind users the capability to move around in unfamiliar environments through a user-friendly device by face, object, and activity recognition system. This model evaluates the accuracy of activity recognition. This device captures the front view of the blind, detects the objects, recognizes the activities, and answers the blind query. It is implemented using the front view of the camera. The local dataset is collected that includes different 1st-person human activities. The results obtained are the identification of the activities that the VGG-16 model was trained on, where Hugging, Shaking Hands, Talking, Walking, Waving video, etc.

Keywords: dataset, visually impaired person, natural language process, human activity recognition

Procedia PDF Downloads 58
3168 Lockit: A Logic Locking Automation Software

Authors: Nemanja Kajtez, Yue Zhan, Basel Halak

Abstract:

The significant rise in the cost of manufacturing of nanoscale integrated circuits (IC) has led the majority of IC design companies to outsource the fabrication of their products to other companies, often located in different countries. This multinational nature of the hardware supply chain has led to a host of security threats, including IP piracy, IC overproduction, and Trojan insertion. To combat that, researchers have proposed logic locking techniques to protect the intellectual properties of the design and increase the difficulty of malicious modification of its functionality. However, the adoption of logic locking approaches is rather slow due to the lack of the integration with IC production process and the lack of efficacy of existing algorithms. This work automates the logic locking process by developing software using Python that performs the locking on a gate-level netlist and can be integrated with the existing digital synthesis tools. Analysis of the latest logic locking algorithms has demonstrated that the SFLL-HD algorithm is one of the most secure and versatile in trading-off levels of protection against different types of attacks and was thus selected for implementation. The presented tool can also be expanded to incorporate the latest locking mechanisms to keep up with the fast-paced development in this field. The paper also presents a case study to demonstrate the functionality of the tool and how it could be used to explore the design space and compare different locking solutions. The source code of this tool is available freely from (https://www.researchgate.net/publication/353195333_Source_Code_for_The_Lockit_Tool).

Keywords: design automation, hardware security, IP piracy, logic locking

Procedia PDF Downloads 183
3167 Destination Port Detection For Vessels: An Analytic Tool For Optimizing Port Authorities Resources

Authors: Lubna Eljabu, Mohammad Etemad, Stan Matwin

Abstract:

Port authorities have many challenges in congested ports to allocate their resources to provide a safe and secure loading/ unloading procedure for cargo vessels. Selecting a destination port is the decision of a vessel master based on many factors such as weather, wavelength and changes of priorities. Having access to a tool which leverages AIS messages to monitor vessel’s movements and accurately predict their next destination port promotes an effective resource allocation process for port authorities. In this research, we propose a method, namely, Reference Route of Trajectory (RRoT) to assist port authorities in predicting inflow and outflow traffic in their local environment by monitoring Automatic Identification System (AIS) messages. Our RRoT method creates a reference route based on historical AIS messages. It utilizes some of the best trajectory similarity measure to identify the destination of a vessel using their recent movement. We evaluated five different similarity measures such as Discrete Fr´echet Distance (DFD), Dynamic Time Warping (DTW), Partial Curve Mapping (PCM), Area between two curves (Area) and Curve length (CL). Our experiments show that our method identifies the destination port with an accuracy of 98.97% and an fmeasure of 99.08% using Dynamic Time Warping (DTW) similarity measure.

Keywords: spatial temporal data mining, trajectory mining, trajectory similarity, resource optimization

Procedia PDF Downloads 121
3166 Managing Change in the Academic Libraries in the Perspective of Web 2.0

Authors: Raj Kumar, Navjyoti Dhingra

Abstract:

Academic libraries are the hubs in which knowledge is a major resource and the performances of these knowledge in terms of adding and delivering value to their users depend upon their ability and effectiveness in engendering, arranging, managing, and using this knowledge. Developments in Information and Communication Technology’s (ICT), the libraries have been incorporated at the electronic edge to facilitate a rapid transfer of information on a global scale. Web2.0 refers to the development of online services that encourage collaboration, communication and information sharing. Web 2.0 reflects changes in how one can use the web rather than describing any technical or structural change. Libraries provide manifold channels of Information access to its e-users. The rapid expansion of tools, formats, services and technologies has presented many options to unfold Library Collection. Academic libraries must develop ways and means to meet their user’s expectations and remain viable. Web 2.0 tools are the first step on that journey. Web 2.0 has been widely used by the libraries to promote functional services like access to catalogue or for external activities like information or photographs of library events, enhancement of usage of library resources and bringing users closer to the library. The purpose of this paper is to provide a reconnaissance of Web 2.0 tools for enhancing library services in India. The study shows that a lot of user-friendly tools can be adopted by information professionals to effectively cater to information needs of its users. The authors have suggested a roadmap towards a revitalized future for providing various information opportunities to techno-savvy users.

Keywords: academic libraries, change management, social media, Web 2.0

Procedia PDF Downloads 210
3165 A Study on the Improvement of Mobile Device Call Buzz Noise Caused by Audio Frequency Ground Bounce

Authors: Jangje Park, So Young Kim

Abstract:

The market demand for audio quality in mobile devices continues to increase, and audible buzz noise generated in time division communication is a chronic problem that goes against the market demand. In the case of time division type communication, the RF Power Amplifier (RF PA) is driven at the audio frequency cycle, and it makes various influences on the audio signal. In this paper, we measured the ground bounce noise generated by the peak current flowing through the ground network in the RF PA with the audio frequency; it was confirmed that the noise is the cause of the audible buzz noise during a call. In addition, a grounding method of the microphone device that can improve the buzzing noise was proposed. Considering that the level of the audio signal generated by the microphone device is -38dBV based on 94dB Sound Pressure Level (SPL), even ground bounce noise of several hundred uV will fall within the range of audible noise if it is induced by the audio amplifier. Through the grounding method of the microphone device proposed in this paper, it was confirmed that the audible buzz noise power density at the RF PA driving frequency was improved by more than 5dB under the conditions of the Printed Circuit Board (PCB) used in the experiment. A fundamental improvement method was presented regarding the buzzing noise during a mobile phone call.

Keywords: audio frequency, buzz noise, ground bounce, microphone grounding

Procedia PDF Downloads 136
3164 Communication Skills for Physicians: Adaptation to the Third Gender and Language Cross Cultural Influences

Authors: Virginia Guillén Cañas, Miren Agurtzane Ortiz-Jauregi, Sonia Ruiz De Azua, Naiara Ozamiz

Abstract:

We want to focus on relationship of the communicational skills in several key aspects of medicine. The most relevant competencies of a health professional are an adequate communication capacity, which will influence the satisfaction of professionals and patients, therapeutic compliance, conflict prevention, clinical outcomes’ improvement and efficiency of health services. We define empathy as it as Sympathy and connection to others and capability to communicate this understanding. Some outcomes favoring empathy are female gender, younger age, and specialty choice. Third gender or third sex is a concept in which allows a person not to be categorized in a dual way but as a continuous variable, giving the choice of moving along it. This point of view recognizes three or more genders. The subject of Ethics and Clinical Communication is dedicated to sensitizing students about the importance and effectiveness of a good therapeutic relationship. We are also interested in other communicational aspects related to empathy as active listening, assertivity and basic and advanced Social Skills. Objectives: 1. To facilitate the approach of the student in the Medicine Degree to the reality of the medical profession 2. Analyze interesting outcome variables in communication 3. Interactive process to detect the areas of improvement in the learning process of the Physician throughout his professional career needs. Design: A comparative study with a cross-sectional approach was conducted in successive academic year cohorts of health professional students at a public Basque university. Four communicational aspects were evaluated through these questionnaires in Basque, Spanish and English: The active listening questionnaire, the TECA empathy questionnaire, the ACDA questionnaire and the EHS questionnaire Social Skills Scale. Types of interventions for improving skills: Interpersonal skills training intervention, Empathy intervention, Writing about experiential learning, Drama through role plays, Communicational skills training, Problem-based learning, Patient interviews ´videos, Empathy-focused training, Discussion. Results: It identified the need for a cross cultural adaptation and no gender distinction. The students enjoyed all the techniques in comparison to the usual master class. There was medium participation but these participative methodologies are not so usual in the university. According to empathy, men have a greater empathic capacity to fully understand women (p < 0.05) With regard to assertiveness there have been no differences between men and women in self-assertiveness but nevertheless women are more heteroassertive than men. Conclusions: These findings suggest that educational interventions with adequate feedback can be effective in maintaining and enhancing empathy in undergraduate medical students.

Keywords: physician's communicational skills, patient satisfaction, third gender, cross cultural adaptation

Procedia PDF Downloads 192
3163 Targeting Violent Extremist Narratives: Applying Network Targeting Techniques to the Communication Functions of Terrorist Groups

Authors: John Hardy

Abstract:

Over the last decade, the increasing utility of extremist narratives to the operational effectiveness of terrorist organizations has been evidenced by the proliferation of inspired or affiliated attacks across the world. Famous examples such as regional al-Qaeda affiliates and the self-styled “Islamic State” demonstrate the effectiveness of leveraging communication technologies to disseminate propaganda, recruit members, and orchestrate attacks. Terrorist organizations with the capacity to harness the communicative power offered by digital communication technologies and effective political narratives have held an advantage over their targets in recent years. Terrorists have leveraged the perceived legitimacy of grass-roots actors to appeal to a global audience of potential supporters and enemies alike, and have wielded a proficiency in profile-raising which remains unmatched by counter terrorism narratives around the world. In contrast, many attempts at propagating official counter-narratives have been received by target audiences as illegitimate, top-down and impersonally bureaucratic. However, the benefits provided by widespread communication and extremist narratives have come at an operational cost. Terrorist organizations now face a significant challenge in protecting their access to communications technologies and authority over the content they create and endorse. The dissemination of effective narratives has emerged as a core function of terrorist organizations with international reach via inspired or affiliated attacks. As such, it has become a critical function which can be targeted by intelligence and security forces. This study applies network targeting principles which have been used by coalition forces against a range of non-state actors in the Middle East and South Asia to the communicative function of terrorist organizations. This illustrates both a conceptual link between functional targeting and operational disruption in the abstract and a tangible impact on the operational effectiveness of terrorists by degrading communicative ability and legitimacy. Two case studies highlight the utility of applying functional targeting against terrorist organizations. The first case is the targeted killing of Anwar al-Awlaki, an al-Qaeda propagandist who crafted a permissive narrative and effective propaganda videos to attract recruits who committed inspired terrorist attacks in the US and overseas. The second is a series of operations against Islamic State propagandists in Syria, including the capture or deaths of a cadre of high profile Islamic State members, including Junaid Hussain, Abu Mohammad al-Adnani, Neil Prakash, and Rachid Kassim. The group of Islamic State propagandists were linked to a significant rise in affiliated and enabled terrorist attacks and were subsequently targeted by law enforcement and military agencies. In both cases, the disruption of communication between the terrorist organization and recruits degraded both communicative and operational functions. Effective functional targeting on member recruitment and operational tempo suggests that narratives are a critical function which can be leveraged against terrorist organizations. Further application of network targeting methods to terrorist narratives may enhance the efficacy of a range of counter terrorism techniques employed by security and intelligence agencies.

Keywords: countering violent extremism, counter terrorism, intelligence, terrorism, violent extremism

Procedia PDF Downloads 291
3162 Pragmatic Development of Chinese Sentence Final Particles via Computer-Mediated Communication

Authors: Qiong Li

Abstract:

This study investigated in which condition computer-mediated communication (CMC) could promote pragmatic development. The focal feature included four Chinese sentence final particles (SFPs), a, ya, ba, and ne. They occur frequently in Chinese, and function as mitigators to soften the tone of speech. However, L2 acquisition of SFPs is difficult, suggesting the necessity of additional exposure to or explicit instruction on Chinese SFPs. This study follows this line and aims to explore two research questions: (1) Is CMC combined with data-driven instruction more effective than CMC alone in promoting L2 Chinese learners’ SFP use? (2) How does L2 Chinese learners’ SFP use change over time, as compared to the production of native Chinese speakers? The study involved 19 intermediate-level learners of Chinese enrolled at a private American university. They were randomly assigned to two groups: (1) the control group (N = 10), which was exposed to SFPs through CMC alone, (2) the treatment group (N = 9), which was exposed to SFPs via CMC and data-driven instruction. Learners interacted with native speakers on given topics through text-based CMC over Skype. Both groups went through six 30-minute CMC sessions on a weekly basis, with a one-week interval after the first two CMC sessions and a two-week interval after the second two CMC sessions (nine weeks in total). The treatment group additionally received a data-driven instruction after the first two sessions. Data analysis focused on three indices: token frequency, type frequency, and acceptability of SFP use. Token frequency was operationalized as the raw occurrence of SFPs per clause. Type frequency was the range of SFPs. Acceptability was rated by two native speakers using a rating rubric. The results showed that the treatment group made noticeable progress over time on the three indices. The production of SFPs approximated the native-like level. In contrast, the control group only slightly improved on token frequency. Only certain SFPs (a and ya) reached the native-like use. Potential explanations for the group differences were discussed in two aspects: the property of Chinese SFPs and the role of CMC and data-driven instruction. Though CMC provided the learners with opportunities to notice and observe SFP use, as a feature with low saliency, SFPs were not easily noticed in input. Data-driven instruction in the treatment group directed the learners’ attention to these particles, which facilitated the development.

Keywords: computer-mediated communication, data-driven instruction, pragmatic development, second language Chinese, sentence final particles

Procedia PDF Downloads 418
3161 Wrong Site Surgery Should Not Occur In This Day And Age!

Authors: C. Kuoh, C. Lucas, T. Lopes, I. Mechie, J. Yoong, W. Yoong

Abstract:

For all surgeons, there is one preventable but still highly occurring complication – wrong site surgeries. They can have potentially catastrophic, irreversible, or even fatal consequences on patients. With the exponential development of microsurgery and the use of advanced technological tools, the consequences of operating on the wrong side, anatomical part, or even person is seen as the most visible and destructive of all surgical errors and perhaps the error that is dreaded by most clinicians as it threatens their licenses and arouses feelings of guilt. Despite the implementation of the WHO surgical safety checklist more than a decade ago, the incidence of wrong-site surgeries remains relatively high, leading to tremendous physical and psychological repercussions for the clinicians involved, as well as a financial burden for the healthcare institution. In this presentation, the authors explore various factors which can lead to wrong site surgery – a combination of environmental and human factors and evaluate their impact amongst patients, practitioners, their families, and the medical industry. Major contributing factors to these “never events” include deviations from checklists, excessive workload, and poor communication. Two real-life cases are discussed, and systems that can be implemented to prevent these errors are highlighted alongside lessons learnt from other industries. The authors suggest that reinforcing speaking-up, implementing medical professional trainings, and higher patient’s involvements can potentially improve safety in surgeries and electrosurgeries.

Keywords: wrong side surgery, never events, checklist, workload, communication

Procedia PDF Downloads 184
3160 The Perceptions of High School English Home Language Learners on Fostering 21st Century Skills Through the Use of Technology in the Classroom

Authors: Lisa Naudine Parrock, Geoffrey Lautenbach

Abstract:

The changes brought to society by the technological development in the Fourth Industrial Revolution are also reaching the sphere of education and the education system needs to respond. Students need skills such as communication, collaboration, creativity and critical thinking in order to be successful in the 21st Century, which could be developed through the meaningful use of technology. This study is theorized by the 21st Century Framework for Learning and examines the student perceptions of grade 10 and 11 English Home language learners on how the technology used in their English classroom contributes to the development of 21st Century skills. The researcher adopted a constructivist paradigm and presented findings based on a general qualitative method. The study found that students perceived the use of technology in the classroom positively contributed to their development of communication, collaboration, creativity and critical thinking. Students also perceived technology as contributing to their access to information, a positive classroom atmosphere, heightened engagement in learning and developing skills necessary for their future. In addition, this study highlighted certain pedagogical strategies and digital tools that support the development of 21st Century skills. The findings suggest that the meaningful integration of technology fosters the development of 21st Century skills in grade 10 and 11 learners.

Keywords: educational technology, 21st century skills, fourth industrial revolution, affordances of technology

Procedia PDF Downloads 134
3159 Designing the First Oil Tanker Shipyard Facility in Kuwait

Authors: Fatma Al Abdullah, Shahad Al Ameer, Ritaj Jaragh, Fatimah Khajah, Rawan Qambar, Amr Nounou

Abstract:

Kuwait currently manufactures its tankers in foreign countries. Oil tankers play a role in the supply chain of the oil industry. Therefore, with Kuwait’s sufficient financial resources, the country should secure itself strategically in order to protect its oil industry to sustain economic development. The purpose of this report is designing an oil tankers’ shipyard facility. Basing the shipyard facility in Kuwait will have great economic rewards. The shipbuilding industry directly enhances the industrial chain in terms of new job and business opportunities as well as educational fields. Heavy Engineering Industries & Shipbuilding Co. K.S.C. (HEISCO) was chosen as a host due to benefits that will result from HEISCO’s existing infrastructure and expertise to reduce cost. The Facility Design methodology chosen has been used because it covers all aspects needed for the report. The oil tanker market is witnessing a shift from crude tankers to product tankers. Therefore the Panamax tanker (product tanker) was selected to be manufactured in the facility. The different departments needed in shipyards were identified based on studying different global shipyards. Technologies needed to build ships helped in the process design. It was noticed that ships are engineer to order. The new layout development of the proposed shipyard is currently in progress. A feasibility study will be conducted to ensure the success of the facility after developing the shipyard’s layout.

Keywords: oil tankers, shipbuilding, shipyard, facility design, Kuwait

Procedia PDF Downloads 466
3158 United Nations Sustainable Development Goals and Digital Exclusion: Reconsidering Sustainable Development and Digital Poverty in the Post-Pandemic World

Authors: Serena Clark, Katriona O'Sullivan, Kevin Marshall, Mac MacLachlan

Abstract:

This paper explores the United Nation's sustainable development goals (SDGs) alongside digital poverty and proposes that digital poverty should be a new SDG. The SDGs concentrate on 17 key areas, including economic growth, reducing inequalities, climate action, ending poverty, gender equality, and quality education. Many of the plans to fulfill these goals involve the creation and adaptation of new technologies. As we have seen with COVID-19, access to these technologies has determined communities and societies' ability to respond to these challenges in both developed and developing nations. For example, the transition to online education due to the lockdowns had a detrimental effect on children who did not have access to technology to provide continuity in their educational development. Digitalization and emerging technologies, especially information and communication technologies (ICTs), can help address each goal. Digital poverty and exclusion exacerbate the gap between rich and poor within our societies and internationally, and COVID-19 has further highlighted these issues. Closing this gap can support achieving the SDGs. If access to digital technologies measure society's response and resilience in addressing the challenges the SDGs seek to resolve, should reducing digital poverty be an SDG of its own? This paper will explore this question, arguing that digital poverty should be an independent SDG working alongside and supporting the achievement of the other 17 SDGs.

Keywords: digital poverty, digital exclusion, United Nations sustainable development goals, information and communication technologies

Procedia PDF Downloads 139
3157 Linguistic Politeness in Higher Education Teaching Chinese as an Additional Language

Authors: Leei Wong

Abstract:

Changes in globalized contexts precipitate changing perceptions concerning linguistic politeness practices. Within these changing contexts, misunderstanding or stereotypification of politeness norms may lead to negative consequences such as hostility or even communication breakdown. With China’s rising influence, the country is offering a vast potential market for global economic development and diplomatic relations and opportunities for intercultural interaction, and many outside China are subsequently learning Chinese. These trends bring both opportunities and pitfalls for intercultural communication, including within the important field of politeness awareness. One internationally recognized benchmark for the study and classification of languages – the updated 2018 CEFR (Common European Framework of Reference for Language) Companion Volume New Descriptors (CEFR/CV) – classifies politeness as a B1 (or intermediate) level descriptor on the scale of Politeness Conventions. This provides some indication of the relevance of politeness awareness within new globalized contexts for fostering better intercultural communication. This study specifically examines Bald on record politeness strategies presented in current beginner TCAL textbooks used in Australian tertiary education through content-analysis. The investigation in this study involves the purposive sampling of commercial textbooks published in America and China followed by interpretive content analysis. The philosophical position of this study is therefore located within an interpretivist ontology, with a subjectivist epistemological perspective. It sets out with the aim to illuminate the characteristics of Chinese Bald on record strategies that are deemed significant in the present-world context through Chinese textbook writers and curriculum designers. The data reveals significant findings concerning politeness strategies in beginner stage curriculum, and also opens the way for further research on politeness strategies in intermediate and advanced level textbooks for additional language learners. This study will be useful for language teachers, and language teachers-in-training, by generating awareness and providing insights and advice into the teaching and learning of Bald on record politeness strategies. Authors of textbooks may also benefit from the findings of this study, as awareness is raised of the need to include reference to understanding politeness in language, and how this might be approached.

Keywords: linguistic politeness, higher education, Chinese language, additional language

Procedia PDF Downloads 104
3156 A Study of Generation Y's Career Attitude at Workplace

Authors: Supriadi Hardianto, Aditya Daniswara

Abstract:

Today's workplace, flooded by millennial Generation or known also as Generation Y. A common problem that faced by the company towards Gen Y is a high turnover rate, attitudes problem, communication style, and different work style than the older generation. This is common in private sector. The objective of this study is to get a better understanding of the Gen Y Career Attitude at the workplace. The subject of this study is focusing on 430 respondent of Gen Y which age between 20 – 35 years old who works for a private company. The Questionnaire as primary data source captured 9 aspects of career attitude based on Career Attitudes Strategy Inventory (CASI). This Survey distributes randomly among Gen Y in the IT Industry (125 Respondent) and Manufacture Company (305 Respondent). A Random deep interview was conducted to get the better understanding of the etiology of their primary obstacles. The study showed that most of Indonesia Gen Y have a moderate score on Job satisfaction but in the other aspects, Gen Y has the lowest score on Skill Development, Career Worries, Risk-Taking Style, Dominant Style, Work Involvement, Geographical Barrier, Interpersonal Abuse, and Family Commitment. The top 5 obstacles outside that 9 aspects that faced by Gen Y are 1. Lower communication & networking support; 2. Self-confidence issues; 3. Financial Problem; 4. Emotional issues; 5. Age. We also found that parent perspective toward the way they are nurturing their child are not aligned with their child’s real life. This research fundamentally helps the organization and other Gen Y’s Stakeholders to have a better understanding of Gen Y Career Attitude at the workplace.

Keywords: career attitudes, CASI, Gen Y, career attitude at workplace

Procedia PDF Downloads 158
3155 Optimization of a Hand-Fan Shaped Microstrip Patch Antenna by Means of Orthogonal Design Method of Design of Experiments for L-Band and S-Band Applications

Authors: Jaswinder Kaur, Nitika, Navneet Kaur, Rajesh Khanna

Abstract:

A hand-fan shaped microstrip patch antenna (MPA) for L-band and S-band applications is designed, and its characteristics have been reconnoitered. The proposed microstrip patch antenna with double U-slot defected ground structure (DGS) is fabricated on an FR4 substrate which is a very readily available and inexpensive material. The suggested antenna is optimized using Orthogonal Design Method (ODM) of Design of Experiments (DOE) to cover the frequency range from 0.91-2.82 GHz for L-band and S-band applications. The L-band covers the frequency range of 1-2 GHz, which is allocated to telemetry, aeronautical, and military systems for passive satellite sensors, weather radars, radio astronomy, and mobile communication. The S-band covers the frequency range of 2-3 GHz, which is used by weather radars, surface ship radars and communication satellites and is also reserved for various wireless applications such as Worldwide Interoperability for Microwave Access (Wi-MAX), super high frequency radio frequency identification (SHF RFID), industrial, scientific and medical bands (ISM), Bluetooth, wireless broadband (Wi-Bro) and wireless local area network (WLAN). The proposed method of optimization is very time efficient and accurate as compared to the conventional evolutionary algorithms due to its statistical strategy. Moreover, the antenna is tested, followed by the comparison of simulated and measured results.

Keywords: design of experiments, hand fan shaped MPA, L-Band, orthogonal design method, S-Band

Procedia PDF Downloads 134
3154 Enhanced Boiling Heat Transfer Using Wettability Patterned Surfaces

Authors: Dong Il Shim, Geehong Choi, Donghwi Lee, Namkyu Lee, Hyung Hee Cho

Abstract:

Effective cooling technology is required to secure thermal stability in extreme heat generated systems such as integrated electronic devices and power generated systems. Pool boiling heat transfer is one of the powerful cooling mechanisms using phase change phenomena. Critical heat flux (CHF) and heat transfer coefficient (HTC) are main factors to evaluate the performance of boiling heat transfer. CHF is the limitation of boiling heat transfer before film boiling which occurs thermal failure. Surface wettability is an important surface characteristic of boiling heat transfer. A hydrophilic surface has higher CHF through effective working fluid supply to local hot spots. A hydrophobic surface promotes the onset of nucleate boiling (ONB) to enhance HTC. In this study, superbiphilic surfaces, which is combined with superhydrophillic and superhydrophobic, are applied on boiling experiments to maximize boiling performance. We conducted pool boiling heat transfer using DI water at a saturated temperature and recorded bubble dynamics using a high-speed camera with 2000 fps. As a result, superbiphilic patterned surfaces promote ONB and enhance both CHF and HTC. This study demonstrates the enhanced boiling performance using superbiphilic surfaces by effective nucleation and separation of liquid/vapor pathway. We expect that further enhancement of heat transfer could be achieved in future work using optimized patterned surfaces.

Keywords: boiling heat transfer, wettability, critical heat flux, heat transfer coefficient

Procedia PDF Downloads 335
3153 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection

Authors: Muhammad Ali

Abstract:

Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.

Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection

Procedia PDF Downloads 125
3152 Review on Low Actuation Voltage RF Mems Switches

Authors: Hassan Saffari, Reza Askari Moghadam

Abstract:

In modern communication systems, it is highly demanded to achieve high performance with minimal power consumption. Low actuation voltage RF MEMS (Micro-Electro-Mechanical Systems) switches represent a significant advancement in this regard. These switches, with their ability to operate at lower voltages, offer promising solutions for enhancing connectivity while minimizing energy consumption. Microelectromechanical switches are good alternatives for electronic and mechanical switches due to their low insertion loss, high isolation, and fast switching speeds. They have attracted more attention in recent years. Most of the presented RF MEMS switches use electrostatic actuators due to their low power consumption. Low actuation voltage RF MEMS switches are among the important issues that have been investigated in research articles. The actuation voltage can be reduced by different methods. One usually implemented method is low spring constant structures. However, despite their numerous benefits, challenges remain in the widespread adoption of low-actuation voltage RF MEMS switches. Issues related to reliability, durability, and manufacturing scalability need to be addressed to realize their full potential in commercial applications. While overcoming certain challenges, their exceptional performance characteristics and compatibility with miniaturized electronic systems make them a promising choice for next-generation wireless communication and RF applications. In this paper, some previous works that proposed low-voltage actuation RF MEMS switches are investigated and analyzed.

Keywords: RF MEMS switches, low actuation voltage, small spring constant structures, electrostatic actuation

Procedia PDF Downloads 47
3151 Information and Communication Technology Application in the Face of COVID-19 Pandemic in Effective Service Delivery in Schools

Authors: Odigie Veronica

Abstract:

The paper focused on the application of Information and Communication Technology (ICT) in effective service delivery in view of the ongoing COVID-19 experience. It adopted the exploratory research method with three research objectives captured. Consequently, the objectives were to ascertain the meaning of online education, understand the concept of COVID-19 and to determine the relevance of online education in effective service delivery in institutions of learning. It is evident from the findings that through ICT, online mode of learning can be adopted in schools which helps greatly in promoting continual education. Online mode of education is practiced online; it brings both the teacher and learners from different places together, without any physical boundary/contact (at least 75%); and has helped greatly in human development in countries where it has been practiced. It is also a welcome development owing to its many benefits such as exposure to digital learning, having access to works of great teachers and educationists such as Socrates, Plato, Dewey, R.S. Peters, J. J. Rosseau, Nnamdi Azikwe, Carol Gilligan, J. I. Omoregbe, Jane Roland Martin, Jean Piaget, among others; and the facilitation of uninterrupted learning for class promotion and graduation of students. Developing the learners all round is part of human development which helps in developing a nation. These and many more are some benefits online education offers which make ICT very relevant in our contemporary society

Keywords: online education, COVID-19 pandemic, effective service delivery, human development

Procedia PDF Downloads 100
3150 Individualized Teaching Process for Pupils with Moderate Mental Disability

Authors: VojtěCh Gybas, Libor Klubal, KateřIna KostoláNyová

Abstract:

Individualized teaching process for pupils with moderate mental disabilities with the help of using mobile touch devices may be one of the forms of teaching to achieve better development of these students during the teaching process. Didactics of information and communication technology (ICT) for special primary schools, where within the Czech Republic pupils with moderate mental retardation are educated, is not precisely and clearly defined. Still, general educational program for elementary school contains a special educational area of information and communication technology, in which the work and content area are focused on work with the classic desktop, and it is not always acceptable in the case of students with moderate mental disabilities. Individualization of their schooling requires a fully elaborate content of teaching material corresponding with intellectual abilities and individuality of each pupil. After three years of daily use of mobile touch devices iPad and participant observation of 7 pupils in a class from special elementary school, we can say that these technologies can be a very useful tool, and in many ways, they even exceed, compensate and replace freely available printed educational material that is rather outdated. By working with mobile touch technology, a pupil gains responsibility, trains his will, learns to rely on himself. The first results obtained from the case studies suggest that this form of teaching may also be beneficial for pupils with moderate mental disabilities.

Keywords: individualized teaching, mobile touch technology, iPad, moderate mental disability, special education needs

Procedia PDF Downloads 328
3149 Cutting Propagation Studies in Pennisetum divisum and Tamarix aucheriana as Native Plant Species of Kuwait

Authors: L. Almulla

Abstract:

Native plants are better adapted to the local environment providing a more natural effect on landscape projects; their use will both conserve natural resources and produce sustainable greenery. Continuation of evaluation of additional native plants is essential to increase diversity of plant resources for greenery projects. Therefore, in this project an effort was made to study the mass multiplication of further native plants for greenery applications. Standardization of vegetative propagation methods is essential for conservation and sustainable utilization of native plants in restoration projects. Moreover, these simple propagation methods can be readily adapted by the local nursery sector in Kuwait. In the present study, various treatments were used to mass multiply selected plants using vegetative parts to secure maximum rooting and initial growth. Soft or semi-hardwood cuttings of selected native plants were collected from mother plants and subjected to different treatments. Pennisetum divisum can be vegetatively propagated by cuttings/off-shoots. However, Tamarix aucheriana showed maximum number of rooted cuttings and stronger vigor seedlings with the lowest growth hormone concentration. Standardizing the propagation techniques for the native plant species will add to the rehabilitation and landscape revegetation projects in Kuwait.

Keywords: Kuwait desert, landscape, rooting percentage, vegetative propagation

Procedia PDF Downloads 122
3148 Cosmetic Surgery on the Rise: The Impact of Remote Communication

Authors: Bruno Di Pace, Roxanne H. Padley

Abstract:

Aims: The recent increase in remote video interaction has increased the number of requests for teleconsultations with plastic surgeons in private practice (70% in the UK and 64% in the USA). This study investigated the motivations for such an increase and the underlying psychological impact on patients. Method: An anonymous web-based poll of 8 questions was designed and distributed to patients seeking cosmetic surgery through social networks in both Italy and the UK. The questions gathered responses regarding 1. Reasons for pursuing cosmetic surgery; 2. The effects of delays caused by the SARS-COV-2 pandemic; 3. The effects on mood; 4. The influence of video conferencing on body-image perception. Results: 85 respondents completed the online poll. Overall, 68% of respondents stated that seeing themselves more frequently online had influenced their decision to seek cosmetic surgery. The types of surgeries indicated were predominantly to the upper body and face (82%). Delays and access to surgeons during the pandemic were perceived as negatively impacting patients' moods (95%). Body-image perception and self-esteem were lower than in the pre-pandemic, particularly during lockdown (72%). Patients were more inclined to undergo cosmetic surgery during the pandemic, both due to the wish to improve their “lockdown face” for video conferencing (77%) and also due to the benefits of home recovery while in smart working (58%). Conclusions: Overall, findings suggest that video conferencing has led to a significant increase in requests for cosmetic surgery and the so-called “Zoom Boom” effect.

Keywords: cosmetic surgery, remote communication, telehealth, zoom boom

Procedia PDF Downloads 179
3147 Differential Effect of Technique Majors on Isokinetic Strength in Youth Judoka Athletes

Authors: Chungyu Chen, Yi-Cheng Chen, Po-Hsian Hsu, Hsin-Ying Chen, Yen-Po Hsiao

Abstract:

The purpose of this study was to assess the muscular strength performance of upper and lower extremity in isokinetic system for the youth judo players, and also to compare the strength difference between major techniques. Sixteen male and 20 female judo players (age: 16.7 ± 1.6 years old, training age: 4.5 ± 0.8 years) were served as the volunteers for this study. There were 21 players major hand techniques and 15 players major foot techniques. The Biodex S4 Pro was used to assess the strength performance of extensor and flexor of concentric action under the load condition of 30 degree/sec, 60 degree/sec, and 120 degree/sec for elbow joints and knee joints. The strength parameters were included the maximal torque, the normalized maximal torque, the average power, and the average maximal torque. A t test for independent groups was used to evaluate whether hand major and foot major differ significantly with an alpha level of .05. The result showed the maximal torque of left knee extensor in foot major players (243.5 ± 36.3 Nm) was higher significantly than hand major (210.7 ± 21.0 Nm) under the load of 30 degree/sec (p < .05). There were no differences in upper extremity strength between the hand and foot techniques major in three loads (ps < .05). It indicated that the judo player is required to develop the upper extremity strength overall to secure the execution of major techniques.

Keywords: knee, elbow, power, judo

Procedia PDF Downloads 456
3146 The Communication Effect of the Emotional Storytelling on Non-Profit Organizations: The Moderating Effect of Social Distance

Authors: ZhangRun, Yi-Fang Chiang, Li-Shia Huang

Abstract:

The purpose of this study was to explore the impact of emotional story marketing on the fundraising effectiveness of non-profit organizations and to further clarify the communication effectiveness of emotional story types by using "social distance" which reflects individual differences, as an intervening variable in two experiments. The quasi-experimental design of the development experiment (positive warmth of the story v.s. negative sadness of the story) × social distance (near v.s. far) to clarify the effects of social distance. In this study, we designed the experimental advertising situation ourselves, and data were collected through a questionnaire survey. A total of 391 questionnaires were distributed, and data analysis and hypothesis verification were conducted through variance analysis. According to the analysis results of this study, the use of positive emotional appeals in the design of non-profit organization advertisements on issues related to the loss of children will increase the willingness of listeners to donate. For those with close social distance, there is no significant difference between the positive and "warm" emotional story ads and the negative and "sad" emotional story ads. For those with far social distance, there is a significant difference between the positive and "warm" emotional story ads and the negative and "sad" emotional story ads, with the positive and "warm" emotional appeals improving their willingness to donate. Therefore, this study suggests that NPOs should use more positive and warm emotional stories in their advertising design to enhance the fundraising effectiveness of NPO story marketing.

Keywords: story marketing, emotional appeal, social distance, willingness to donate

Procedia PDF Downloads 25
3145 Appraisal of Transaction Cost in South African Construction Projects

Authors: Kenneth O. Otasowie, Matthew Ikuabe, Clinton Aigbavboa, Ayodeji Oke

Abstract:

Construction project cost are not only made up of production costs. This cost comprises of many other elements such as the preparation of a bidding document, cost estimations, drafting contractual agreements and monitoring that contractual obligations are met. Several studies have stressed the need for transaction costs (TC) to be defined in a way that covers all phases of a project and not only the pre-contract phase. Hence, this study aims to appraise transaction cost in South African (SA) construction projects by assessing what constitutes transaction cost, influencing factors and possible optimisation measures. A survey design was adopted. A total number of eighty (80) questionnaires were administered to quantity surveyors, procurement managers and project managers in Guateng Province, SA and seventy-two (72) were returned and found suitable for analysis. Collected data was analysed using percentage, mean item score, standard deviation, one-sample t-test. The findings show that external technical interaction, uncertainty, human factors are the most significant constituents of TC in SA, while technical competency, experience in similar project type and project characteristics are the leading influencing factors. Furthermore, understanding project characteristics, clear communication and technically competent project teams are most of the significant measures for optimising TC in SA construction projects. Therefore, this study recommends that a competent project team and a clear communication are fundamental to proper management of TC in SA construction projects.

Keywords: construction projects, project cost, South Africa, transaction cost

Procedia PDF Downloads 99
3144 A Documentary Review of Theoretical and Practical Elements for a Genre Analysis of Thailand Travel Listicles

Authors: Pinyada Santisarun, Yaowaret Tharawoot, Songyut Akkakoson

Abstract:

This paper reports on a literature review sub-study of a larger research project which has been designed to identify the rhetorical organization of a travel writing genre, together with the use of lexical choices, syntactical structures, and graphological features, based on a randomly-selected corpus of Thailand travel listicles. Conducted as a library-based overview, this study aims to specify theoretical and practical elements for the said larger study. The materials for the review have been retrieved from various Internet sources, covering both public search engines and library databases. Generally, the article focuses on answering questions about the ‘what’ and the ‘how’ of such background elements widely discussed in the literature as the meaning of listicles, how the travel listicles’ patterns and regularities can be categorized to form a new genre, the effect of computer-mediated communication on the travel world, the travel language, and the current situation concerning the importance of travel listicles. The theoretical and practical data derived from this study provide valuable insights into the way in which the genre analysis and lexico-syntactical examination of Thailand travel listicles in the present authors’ larger research project can be properly conducted. The data gained can be added to the expanding body of knowledge in the field of the ESP genre.

Keywords: computer-mediated communication, digital writing, genre-based analysis, online travel writing, tourism language

Procedia PDF Downloads 145
3143 Understanding the Caliphate and Jihad to Prevent Radicalization That Lead to Terrorism: The Role of Social Community in Southeast Asia

Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana

Abstract:

In the summer of 2014, the leaders of the Islamic State of Iraq and Syria proclaimed the founding of religious-political system known as the caliphate which titled Islamic State (IS). As Caliph, Abu Bakr Baghdadi advocated Jihad from the Ummah (the Muslim community) to defend the Islamic state from unbelievers. This call for Jihad by IS had encouraged some radical organization in Southeast Asia pledge allegiance to IS and established bases for IS operation in Southeast Asia. This development had increased security concern for possible terrorism action in Southeast Asia, which currently not very active due to counterterrorism efforts from ASEAN member states and its cooperation with the world. This paper firstly tries to draw understanding from Ulema (Muslim cleric) about the conception of caliphate and Jihad based on Quran and Hadith. Secondly, this paper will elaborate counterterrorism efforts from ASEAN countries to prevent radicalization and terrorism act in addressing the call for jihad to establish IS in Southeast Asia. The third, this paper will recommend the role of the social community, especially Ulema, in Southeast Asia to prevent the misunderstanding of Jihad which usually used by terrorist to justify their action. Hopefully, this social community role will decrease the radicalization of Muslim community in Southeast Asia alongside with the counterterrorism efforts to create secure and stable ASEAN community based on shared norm and values.

Keywords: caliphate, jihad, ASEAN, counterterrorism, social community

Procedia PDF Downloads 234