Search results for: Online communication
4833 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality
Authors: Georgi Bebrov, Rozalina Dimova
Abstract:
In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality
Procedia PDF Downloads 1844832 Discourse Analysis: Where Cognition Meets Communication
Authors: Iryna Biskub
Abstract:
The interdisciplinary approach to modern linguistic studies is exemplified by the merge of various research methods, which sometimes causes complications related to the verification of the research results. This methodological confusion can be resolved by means of creating new techniques of linguistic analysis combining several scientific paradigms. Modern linguistics has developed really productive and efficient methods for the investigation of cognitive and communicative phenomena of which language is the central issue. In the field of discourse studies, one of the best examples of research methods is the method of Critical Discourse Analysis (CDA). CDA can be viewed both as a method of investigation, as well as a critical multidisciplinary perspective. In CDA the position of the scholar is crucial from the point of view exemplifying his or her social and political convictions. The generally accepted approach to obtaining scientifically reliable results is to use a special well-defined scientific method for researching special types of language phenomena: cognitive methods applied to the exploration of cognitive aspects of language, whereas communicative methods are thought to be relevant only for the investigation of communicative nature of language. In the recent decades discourse as a sociocultural phenomenon has been the focus of careful linguistic research. The very concept of discourse represents an integral unity of cognitive and communicative aspects of human verbal activity. Since a human being is never able to discriminate between cognitive and communicative planes of discourse communication, it doesn’t make much sense to apply cognitive and communicative methods of research taken in isolation. It is possible to modify the classical CDA procedure by means of mapping human cognitive procedures onto the strategic communicative planning of discourse communication. The analysis of the electronic petition 'Block Donald J Trump from UK entry. The signatories believe Donald J Trump should be banned from UK entry' (584, 459 signatures) and the parliamentary debates on it has demonstrated the ability to map cognitive and communicative levels in the following way: the strategy of discourse modeling (communicative level) overlaps with the extraction of semantic macrostructures (cognitive level); the strategy of discourse management overlaps with the analysis of local meanings in discourse communication; the strategy of cognitive monitoring of the discourse overlaps with the formation of attitudes and ideologies at the cognitive level. Thus, the experimental data have shown that it is possible to develop a new complex methodology of discourse analysis, where cognition would meet communication, both metaphorically and literally. The same approach may appear to be productive for the creation of computational models of human-computer interaction, where the automatic generation of a particular type of a discourse could be based on the rules of strategic planning involving cognitive models of CDA.Keywords: cognition, communication, discourse, strategy
Procedia PDF Downloads 2544831 Tobacco Harm Reduction: How to Build Awareness of Smokers? A Case Study in Indonesia
Authors: Kholil, Ario Bimo, Hifni Alifahmi, Soecahyadi, Husen Money
Abstract:
The number of smokers in Indonesia currently reached 66 million (25.09%) of the total number of smokers reaching 264 million. The government (central and local governments) have issued various rules to reduce the number of smokers, but the results are still not effective; in fact, the number of smokers continues to increase every year. This study aims to determine the influence of demographics, economy, health, and the role of government on the awareness of smokers in reducing the dangers of cigarettes. Data collection was carried out through a questionnaire distributed to 255 randomly selected respondents and data analysis using SEM (Structural Equation Model). The results of the analysis show that economic and socio-cultural factors do not directly affect the awareness of reducing the dangers of cigarettes. But indirectly, its influence becomes significant through intervening variables of communication strategies. Meanwhile, health factors and the government's role have a very significant influence both directly and indirectly on reducing the dangers of cigarettes. Thus, the main strategy to build awareness of smokers in reducing the dangers of smoking is building an effective communication strategy through three main factors: (1) health, (2) government regulations and (3) the economy.Keywords: harm reduction, awareness, communication strategy, SEM
Procedia PDF Downloads 644830 Science Explorer Modules as a Communication Approach to Encourage High School Students to Pursue Science Careers
Authors: Mark Ivan Roblas
Abstract:
The Science Explorer is a mobile learning science facility in the Philippines. It is a bus that travels to different provinces in the country bringing interactive science modules facilitated by scientists from the industry and academe. The project aims to entice students to get into careers in science through interactive science modules and interaction with real-life scientists. This article looks into the effectiveness of its modules as a communication source and message to encourage high school students to get into careers in the future. The study revealed that as the Science Explorer modules are able to retain students to stay in science careers of their choice and even convert some to choose from non-science to a science degree, it still lacks in penetrating the belief system of the students and influencing them to take a scientific career path.Keywords: informal science, mobile science, science careers, science education
Procedia PDF Downloads 2224829 Bahrain Experience in Supporting Small and Medium Enterprises by the Utilization of E-Government
Authors: Najla Alhkalaf
Abstract:
The focus of this study is answering the following question: How do e-government services in Bahrain support the productivity of SMEs? This study examines the current E-government function in enhancing SME productivity in Bahrain through analysing the efficiency of e- government by viewing its facilitators and barriers from the perspective of different stakeholders. The study aims to identify and develop best practice guidelines with the end-goal of creating a standardised channel of communication between e-government and SMEs that fulfil the requirement of SME owners, and thus achieve the prime objective of e-government. E-government services for SMEs have been offered in Bahrain since 2005. However, the current services lack the required mechanism for SMEs to fully take advantage of these services because of lagging communication between service provider and end-user. E-government employees believe that a lack of awareness and trust are the main stumbling block, whereas the SME owners believe that there is a lack of sufficiency in the content and efficiency provided through e- services. A questionnaire has been created based on a pilot study that highlighted the main indicators of e-government efficiency and SMEs productivity as well as previous studies conducted on this subject. This allowed for quantitative data to be extracted. Also interviews were conducted with SME owners and government employees from both case studies, which formed the qualitative data for this study. The findings portray that both the service provider and service receiver largely agree on the existence of most of the technical and administrative barriers. However, the data reflects a level of dissatisfaction from the SME side, which contradicts with the perceived level of satisfaction from the government employees. Therefore, the data supports the argument that assures the existence of a communication gap between stakeholders. To this effect, this research would help build channels of communication between stakeholders, and then induces a plan unlocking the potential of e-government application. The conclusions of this study will help devise an optimised E-government strategy for Bahrain.Keywords: e-government, SME, e-services, G2B, government employees' perspective, entrepreneurs' perspective, enterprise
Procedia PDF Downloads 2344828 Munting Kamay, Munting Gawa: Children's Development Training, a UCU Experience
Authors: Elizabeth A. Montero
Abstract:
The project contemplated in this study particularly aimed at enabling public school children of ages ten to twelve who belong to low and middle income families. The pupils were provided training on communication, work, computer and social skills. In this study, the researcher hypothesized that children given the opportunity to develop a skill through guidance and proper supervision will significantly learn, improve and develop a skill. Since children’s minds are highly absorbent like a sponge absorbing anything within its capacity to take, it is ideal and necessary that education should provide an environment that is rich offering an array of meaningful experiences. The context of this study is well balanced since it catered to the children’s communication, work, computer and social skills.Keywords: Munting Kamay, Munting Gawa, children’s development training, UCU experience
Procedia PDF Downloads 4374827 Age and Gender Differences in the Language Deficits of Individuals with Asperger Syndrome (AS) and High Functioning Autism (HFA): Systematic Literature Review (SLR) and Meta-Analysis (MA)
Authors: Sadeq Al Yaari, Muhammad Alkhunayn, Montaha Al Yaari, Ayman Al Yaari, Aayah Al Yaari, Adham Al Yaari, Sajedah Al Yaari, Fatehi Eissa
Abstract:
Background: In spite of the fact that several language deficits, both internalizing and externalizing, have been documented in comorbidity with Asperger Syndrome (AS) and High Functioning Autism (HFA), there is a paucity of the continuity of these deficits in these individuals’ life span. Furthermore, findings regarding differences in the occurrence of these language deficits both in HFA and AS males and females are mixed. Aims: Systematic Literature Review and meta-analysis (SLR & Meta-analysis) provides a more valid indicator; that is why it has been used here to distinguish HFA and AS individuals in terms of (a) When does language deficits prevails in these individuals’ life and (b) in which gender the prevalence of these language deficits is seen more. Materials and Method: In this SLR & Meta-analysis, PubMed, ScienceDirect, SpringerLink, SAGE journals online, WILEY online library, Google Scholar, CINAHL, EMBASE, Scopus, and ERIC databases in addition to unpublished literature were systematically searched between 1st of January 1980 and 30th of May 2022. Interpretations: Although overall sample sizes were small, the combined results do permit the tentative conclusion that prevalence of language deficits both in AS and HFA children and adults with more prevalence of phonological deficit in HFA male children and pragmatic deficits in AS male children. Further research should be separately undertaken in each linguistic branch to verify the occlusions of this study.Keywords: high-functioning autism, Asperger syndrome, systematic literature review, meta-analysis
Procedia PDF Downloads 504826 A Critical Discourse Analysis of ‘Youth Radicalisation’: A Case of the Daily Nation Kenya Online Newspaper
Authors: Miraji H. Mohamed
Abstract:
The purpose of this study is to critique ‘radicalisation’ and more particularly ‘youth radicalisation’ by exploring its usage in online newspapers. ‘Radicalisation’ and ‘extremism’ have become the most common terms in terrorism studies since the 9/11 attacks. Regardless of the geographic location, when the word terrorism is used the terms ‘radicalisation’ and ‘extremism’ always follow to attempt to explore the journey of the perpetrators towards violence. These terms have come to represent a discourse of dominantly pejorative traits often used to describe spaces, groups, and processes identified as problematic. Even though ambiguously defined they feature widely in government documents, political statements, news articles, academic research, social media platforms, religious gatherings, and public discussions. Notably, ‘radicalisation’ and ‘extremism’ have been closely conflated with the term youth to form ‘youth radicalisation’ to refer to a discourse of ‘youth at risk’. The three terms largely continue to be used unquestioningly and interchangeably hence the reason why they are placed in single quotation marks to deliberately question their conventional usage. Albeit this comes timely in the Kenyan context where there has been a proliferation of academic and expert research on ‘youth radicalisation’ (used as a neutral label) without considering the political, cultural and socio-historical contexts that inform this label. This study seeks to draw these nuances by employing a genealogical approach that historicises and deconstructs ‘youth radicalisation’; and by applying a Discourse-Historical Approach (DHA) of Critical Discourse Analysis to analyse Kenyan online newspaper - The Daily Nation between 2015 and 2018. By applying the concept of representation to analyse written texts, the study reveals that the use of ‘youth radicalisation’ as a discursive strategy disproportionately affects young people especially those from cultural/ethnic/religious minority groups. Also, the ambiguous use of ‘radicalisation’ and ‘youth radicalisation’ by the media reinforces the discourse of ‘youth at risk’ which has become the major framework underpinning Countering Violent Extremism (CVE) interventions. Similarly, the findings indicate that the uncritical use of ‘youth radicalisation’ has been used to serve political interests; and has become an instrument of policing young people, thus contributing to their cultural shaping. From this, it is evident that the media could thwart rather than assist CVE efforts. By exposing the political nature of the three terms through evidence-based research, this study offers recommendations on how critical reflective reporting by the media could help to make CVE more nuanced.Keywords: discourse, extremism, radicalisation, terrorism, youth
Procedia PDF Downloads 1294825 Wireless Optic Last Mile Multi-Gbit/s Communication System
Authors: Manea Viorel, Puscoci Sorin, Stoichescu Dan Alexandru
Abstract:
Free Space Optics (FSO) is an optical telecommunication system that uses laser beam to transmit data at high bit rates via terrestrial atmosphere. This article describes a method to obtain higher bit rates, under unfavorable weather conditions using multiple optical beams, which carry information with low optical power. Optical link quality assessment is given by the attenuation on different weather conditions. The goal of this paper is to compare two transmission techniques: mono and multi beam, both affected by atmospheric attenuation, using OOK and L-PPM modulation. Link availability is evaluated using eye-diagram that provides information about the overall bit error rate of the system.Keywords: free space optics, wireless optic, laser communication, spatial diversity
Procedia PDF Downloads 5054824 Performance Analysis of IDMA Scheme Using Quasi-Cyclic Low Density Parity Check Codes
Authors: Anurag Saxena, Alkesh Agrawal, Dinesh Kumar
Abstract:
The next generation mobile communication systems i.e. fourth generation (4G) was developed to accommodate the quality of service and required data rate. This project focuses on multiple access technique proposed in 4G communication systems. It is attempted to demonstrate the IDMA (Interleave Division Multiple Access) technology. The basic principle of IDMA is that interleaver is different for each user whereas CDMA employs different signatures. IDMA inherits many advantages of CDMA such as robust against fading, easy cell planning; dynamic channel sharing and IDMA increase the spectral efficiency and reduce the receiver complexity. In this, performance of IDMA is analyzed using QC-LDPC coding scheme further it is compared with LDPC coding and at last BER is calculated and plotted in MATLAB.Keywords: 4G, QC-LDPC, CDMA, IDMA
Procedia PDF Downloads 3234823 The Impact of Bitcoin and Cryptocurrency on the Development of Community
Authors: Felib Ayman Shawky Salem
Abstract:
Nowadays crypto currency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The crypto currency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin crypto currency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage.Keywords: cryptocurrency, bitcoin, payment methods, blockchain, appropriation, online retailers, TOE framework, disappropriation, non-appropriationBitCoin, financial protection, crypto currency, money laundering cryptocurrency, digital wallet, digital forensics
Procedia PDF Downloads 424822 Testifying in Court as a Victim of Crime for Persons with Little or No Functional Speech: Vocabulary Implications
Authors: Robyn White, Juan Bornman, Ensa Johnson
Abstract:
People with disabilities are at a high risk of becoming victims of crime. Individuals with little or no functional speech (LNFS) face an even higher risk. One way of reducing the risk of remaining a victim of crime is to face the alleged perpetrator in court as a witness – therefore it is important for a person with LNFS who has been a victim of crime to have the required vocabulary to testify in court. The aim of this study was to identify and describe the core and fringe legal vocabulary required by illiterate victims of crime, who have little or no functional speech, to testify in court as witnesses. A mixed-method, the exploratory sequential design consisting of two distinct phases was used to address the aim of the research. The first phase was of a qualitative nature and included two different data sources, namely in-depth semi-structured interviews and focus group discussions. The overall aim of this phase was to identify and describe core and fringe legal vocabulary and to develop a measurement instrument based on these results. Results from Phase 1 were used in Phase 2, the quantitative phase, during which the measurement instrument (a custom-designed questionnaire) was socially validated. The results produced six distinct vocabulary categories that represent the legal core vocabulary and 99 words that represent the legal fringe vocabulary. The findings suggested that communication boards should be individualised to the individual and the specific crime. It is believed that the vocabulary lists developed in this study act as a valid and reliable springboard from which communication boards can be developed. Recommendations were therefore made to develop an Alternative and Augmentative Communication Resource Tool Kit to assist the legal justice system.Keywords: augmentative and alternative communication, person with little or no functional speech, sexual crimes, testifying in court, victim of crime, witness competency
Procedia PDF Downloads 4804821 Assessment Methodology of E-government Projects for the Regions of Georgia
Authors: Tina Melkoshvili
Abstract:
Drastic development of information and communication technologies in Georgia has led to the necessity of launching conceptually new, effective, flexible, transparent and society oriented form of government that is e-government. Through applying information technologies, the electronic system enables to raise the efficacy of state governance and increase citizens’ participation in the process. Focusing on the topic of e-government allows us to analyze success stories, attributed benefits and, at the same time, observes challenges hampering the government development process. There are number of methodologies elaborated to study the conditions in the field of electronic governance. They enable us to find out if the government is ready to apply broad opportunities of information and communication technologies and if the government is apt to improve the accessibility and quality of delivering mainly social services. This article seeks to provide comparative analysis of widely spread methodologies used for Electronic government projects’ assessment. It has been concluded that applying current methods of assessment in Georgia is related to difficulties due to inaccessible data and the necessity of involving number of experts. The article presents new indicators for e-government development assessment that reflect efficacy of e-government conception realization in the regions of Georgia and enables to provide quantitative evaluation of regional e-government projects including all significant aspects of development.Keywords: development methodology, e-government in Georgia, information and communication technologies, regional government
Procedia PDF Downloads 2754820 From the Sharing Economy to Social Manufacturing: Analyzing Collaborative Service Networks in the Manufacturing Domain
Authors: Babak Mohajeri
Abstract:
In recent years, the conventional business model of ownership has been changed towards accessibility in a variety of markets. Two trends can be observed in the evolution of this rental-like business model. Firstly, the technological development that enables the emergence of new business models. These new business models increasingly become agile and flexible. For example Spotify, an online music stream company provides consumers access to over millions of music tracks, conveniently through the smartphone, tablet or computer. Similarly, Car2Go, the car sharing company accesses its members with flexible and nearby sharing cars. The second trend is the increasing communication and connections via social networks. This trend enables a shift to peer-to-peer accessibility based business models. Conventionally, companies provide access for their customers to own companies products or services. In peer-to-peer model, nonetheless, companies facilitate access and connection across their customers to use other customers owned property or skills, competencies or services .The is so-called the sharing economy business model. The aim of this study is to investigate into a new and emerging type of the sharing economy model in which role of customers and service providers may dramatically change. This new model is called Collaborative Service Networks. We propose a mechanism for Collaborative Service Networks business model. Uber and Airbnb, two successful growing companies, have been selected for our case studies and their business models are analyzed. Finally, we study the emergence of the collaborative service networks in the manufacturing domain. Our finding results to a new manufacturing paradigm called social manufacturing.Keywords: sharing economy, collaborative service networks, social manufacturing, manufacturing development
Procedia PDF Downloads 3174819 The Role of Metaphor in Communication
Authors: Fleura Shkëmbi, Valbona Treska
Abstract:
In elementary school, we discover that a metaphor is a decorative linguistic device just for poets. But now that we know, it's also a crucial tactic that individuals employ to understand the universe, from fundamental ideas like time and causation to the most pressing societal challenges today. Metaphor is the use of language to refer to something other than what it was originally intended for or what it "literally" means in order to suggest a similarity or establish a connection between the two. People do not identify metaphors as relevant in their decisions, according to a study on metaphor and its effect on decision-making; instead, they refer to more "substantive" (typically numerical) facts as the basis for their problem-solving decision. Every day, metaphors saturate our lives via language, cognition, and action. They argue that our conceptions shape our views and interactions with others and that concepts define our reality. Metaphor is thus a highly helpful tool for both describing our experiences to others and forming notions for ourselves. In therapeutic contexts, their shared goal appears to be twofold. The cognitivist approach to metaphor regards it as one of the fundamental foundations of human communication. The benefits and disadvantages of utilizing the metaphor differ depending on the target domain that the metaphor portrays. The challenge of creating messages and surroundings that affect customers' notions of abstract ideas in a variety of industries, including health, hospitality, romance, and money, has been studied for decades in marketing and consumer psychology. The aim of this study is to examine, through a systematic literature review, the role of the metaphor in communication and in advertising. This study offers a selected analysis of this literature, concentrating on research on customer attitudes and product appraisal. The analysis of the data identifies potential research questions. With theoretical and applied implications for marketing, design, and persuasion, this study sheds light on how, when, and for whom metaphoric communications are powerful.Keywords: metaphor, communication, advertising, cognition, action
Procedia PDF Downloads 994818 The Effect of Artificial Intelligence on Mobile Phones and Communication Systems
Authors: Ibram Khalafalla Roshdy Shokry
Abstract:
This paper gives service feel multiple get entry to (CSMA) verbal exchange model based totally totally on SoC format method. Such model can be used to guide the modelling of the complex c084d04ddacadd4b971ae3d98fecfb2a communique systems, consequently use of such communication version is an crucial method in the creation of excessive general overall performance conversation. SystemC has been selected as it gives a homogeneous format drift for complicated designs (i.e. SoC and IP based format). We use a swarm device to validate CSMA designed version and to expose how advantages of incorporating communication early within the layout process. The wireless conversation created via the modeling of CSMA protocol that may be used to attain conversation among all of the retailers and to coordinate get proper of entry to to the shared medium (channel).The device of automobiles with wi-fiwireless communique abilities is expected to be the important thing to the evolution to next era intelligent transportation systems (ITS). The IEEE network has been continuously operating at the development of an wireless vehicular communication protocol for the enhancement of wi-fi get admission to in Vehicular surroundings (WAVE). Vehicular verbal exchange systems, known as V2X, help car to car (V2V) and automobile to infrastructure (V2I) communications. The wi-ficiencywireless of such communication systems relies upon on several elements, amongst which the encircling surroundings and mobility are prominent. as a result, this observe makes a speciality of the evaluation of the actual performance of vehicular verbal exchange with unique cognizance on the effects of the actual surroundings and mobility on V2X verbal exchange. It begins by wi-fi the actual most range that such conversation can guide and then evaluates V2I and V2V performances. The Arada LocoMate OBU transmission device changed into used to check and evaluate the effect of the transmission range in V2X verbal exchange. The evaluation of V2I and V2V communique takes the real effects of low and excessive mobility on transmission under consideration.Multiagent systems have received sizeable attention in numerous wi-fields, which include robotics, independent automobiles, and allotted computing, where a couple of retailers cooperate and speak to reap complicated duties. wi-figreen communication among retailers is a critical thing of these systems, because it directly influences their usual performance and scalability. This scholarly work gives an exploration of essential communication factors and conducts a comparative assessment of diverse protocols utilized in multiagent systems. The emphasis lies in scrutinizing the strengths, weaknesses, and applicability of those protocols across diverse situations. The studies additionally sheds light on rising tendencies within verbal exchange protocols for multiagent systems, together with the incorporation of device mastering strategies and the adoption of blockchain-based totally solutions to make sure comfy communique. those developments offer valuable insights into the evolving landscape of multiagent structures and their verbal exchange protocols.Keywords: communication, multi-agent systems, protocols, consensussystemC, modelling, simulation, CSMA
Procedia PDF Downloads 254817 Exploring the Travel Preferences of Generation Z: A Look into the Next Generation of Tourists
Authors: M. Panidou, F. Kilipiris, E. Christou, K. Alexandris
Abstract:
This study focuses on Generation Z, the next generation of tourists born between 1996 and 2012. Given their significant population size, Generation Z is expected to have a substantial impact on the travel and tourism sector. Therefore, understanding their travel preferences is crucial for businesses in the hospitality and tourism industry. By examining their travel preferences, this research aims to identify the unique characteristics and motivations of this generation when it comes to travel. This study used a quantitative method, and primary data was collected through a survey (online questionnaire), while secondary data was gathered from academic literature, industry reports, and online sources to provide a comprehensive analysis of the topic. The sample of the study was 100 Greek individuals aged between 18-26 years old. The data was analyzed with the support of SPSS software. The findings of the research indicated that technology, sustainability, and budget-friendly options are essential components for attracting and retaining Generation Z tourists. These preferences highlight the importance of incorporating innovative technologies, promoting sustainable practices, and offering affordable travel options to effectively engage this market niche. This research contributes to the field of hospitality and tourism businesses by providing valuable insights into the travel preferences of Generation Z. By understanding their distinct features and preferences; businesses can tailor their strategies and marketing efforts to effectively engage and retain this market segment. Considering the limitations of the sample size, future studies could aim for a larger and more diverse sample to enhance the generalizability of the findings.Keywords: gen Z, technology, travel preferences, sustainability
Procedia PDF Downloads 864816 A Case Report on Cognitive-Communication Intervention in Traumatic Brain Injury
Authors: Nikitha Francis, Anjana Hoode, Vinitha George, Jayashree S. Bhat
Abstract:
The interaction between cognition and language, referred as cognitive-communication, is very intricate, involving several mental processes such as perception, memory, attention, lexical retrieval, decision making, motor planning, self-monitoring and knowledge. Cognitive-communication disorders are difficulties in communicative competencies that result from underlying cognitive impairments of attention, memory, organization, information processing, problem solving, and executive functions. Traumatic brain injury (TBI) is an acquired, non - progressive condition, resulting in distinct deficits of cognitive communication abilities such as naming, word-finding, self-monitoring, auditory recognition, attention, perception and memory. Cognitive-communication intervention in TBI is individualized, in order to enhance the person’s ability to process and interpret information for better functioning in their family and community life. The present case report illustrates the cognitive-communicative behaviors and the intervention outcomes of an adult with TBI, who was brought to the Department of Audiology and Speech Language Pathology, with cognitive and communicative disturbances, consequent to road traffic accident. On a detailed assessment, she showed naming deficits along with perseverations and had severe difficulty in recalling the details of the accident, her house address, places she had visited earlier, names of people known to her, as well as the activities she did each day, leading to severe breakdowns in her communicative abilities. She had difficulty in initiating, maintaining and following a conversation. She also lacked orientation to time and place. On administration of the Manipal Manual of Cognitive Linguistic Abilities (MMCLA), she exhibited poor performance on tasks related to visual and auditory perception, short term memory, working memory and executive functions. She attended 20 sessions of cognitive-communication intervention which followed a domain-general, adaptive training paradigm, with tasks relevant to everyday cognitive-communication skills. Compensatory strategies such as maintaining a dairy with reminders of her daily routine, names of people, date, time and place was also recommended. MMCLA was re-administered and her performance in the tasks showed significant improvements. Occurrence of perseverations and word retrieval difficulties reduced. She developed interests to initiate her day-to-day activities at home independently, as well as involve herself in conversations with her family members. Though she lacked awareness about her deficits, she actively involved herself in all the therapy activities. Rehabilitation of moderate to severe head injury patients can be done effectively through a holistic cognitive retraining with a focus on different cognitive-linguistic domains. Selection of goals and activities should have relevance to the functional needs of each individual with TBI, as highlighted in the present case report.Keywords: cognitive-communication, executive functions, memory, traumatic brain injury
Procedia PDF Downloads 3474815 Women's Liberation: A Study of the Movement in Saudi Arabia
Authors: Rachel Hasan
Abstract:
Kingdom of Saudi Arabia has witnessed various significant social and political developments in 2018. Crown Prince of Kingdom of Saudi Arabia, Muhammad bin Salman, also serving as Deputy Prime Minister of Saudi Arabia, has made several social, cultural, and political changes in the country under his grand National Transformation Program. Program provides a vision of more economically viable, culturally liberal, and politically pleasant Saudi Arabia. One of the most significant and ground breaking changes that has been made under this program is awarding women the long awaited rights. Legislative changes are made to allow woman to drive. Seemingly basic on surface but driving rights to women represent much deeper meaning to the culture of Saudi Arabia and to the world outside. Ever since this right is awarded to the women, world media is interpreting this change in various colors. This paper aims to investigate the portrayal of gender rights in various online media publications and websites. The methodology applied has been quantitative content analysis method to analyze the various aspects of media's coverage of various social and cultural changes with reference to women's rights. For the purpose of research, convenience sampling was done for eight international online articles from media websites. The articles discussed the lifting of ban for females on driving cars in Saudi Arabia as well as gender development for these women. These articles were analyzed for media frames, and various categories of analysis were developed, which highlighted the stance that was observed. Certain terms were conceptualized and operationalized and were also explained for better understanding of the context.Keywords: gender rights, media coverage, political change, women's liberation
Procedia PDF Downloads 1094814 The Impact of Information and Communication Technology on Learning Quality and Conceptual Change in Moroccan High School Students
Authors: Azzeddine Atibi, Khadija El Kababi, Salim Ahmed, Mohamed Radid
Abstract:
Teaching and learning occupy a significant position globally, as the sustainable development of all sectors is intrinsically linked to the improvement of the educational system. The COVID-19 pandemic demonstrated that the integration of Information and Communication Technology (ICT) in the learning process is not optional but essential, and that proficiency in computer tools is an asset that will enhance pedagogy and ensure the continuity of learning under any circumstances. The objective of our study is to evaluate the impact of introducing computer tools on the quality of learning and the realization of conceptual change in learners. To this end, a learning situation was meticulously prepared, targeting first-year baccalaureate students in experimental sciences at a public high school, "Khadija Oum Almouminin," focusing on the chapter on glycemia regulation in the Moroccan Life and Earth Sciences (LES) curriculum. The learning situation was implemented with a pilot group that utilized computer tools and a control group that studied the same chapter without using ICT. The analysis and comparison of the results allowed us to verify the research question posed and to propose perspectives to ensure conceptual change in learners.Keywords: information and communication technology, conceptual change, continuity of learning, life and earth sciences, glycemia regulation
Procedia PDF Downloads 384813 Linguistic Misinterpretation and the Dialogue of Civilizations
Authors: Oleg Redkin, Olga Bernikova
Abstract:
Globalization and migrations have made cross-cultural contacts more frequent and intensive. Sometimes, these contacts may lead to misunderstanding between partners of communication and misinterpretations of the verbal messages that some researchers tend to consider as the 'clash of civilizations'. In most cases, reasons for that may be found in cultural and linguistic differences and hence misinterpretations of intentions and behavior. The current research examines factors of verbal and non-verbal communication that should be taken into consideration in verbal and non-verbal contacts. Language is one of the most important manifestations of the cultural code, and it is often considered as one of the special features of a civilization. The Arabic language, in particular, is commonly associated with Islam and the language and the Arab-Muslim civilization. It is one of the most important markers of self-identification for more than 200 million of native speakers. Arabic is the language of the Quran and hence the symbol of religious affiliation for more than one billion Muslims around the globe. Adequate interpretation of Arabic texts requires profound knowledge of its grammar, semantics of its vocabulary. Communicating sides who belong to different cultural groups are guided by different models of behavior and hierarchy of values, besides that the vocabulary each of them uses in the dialogue may convey different semantic realities and vary in connotations. In this context direct, literal translation in most cases cannot adequately convey the original meaning of the original message. Besides that peculiarities and diversities of the extralinguistic information, such as the body language, communicative etiquette, cultural background and religious affiliations may make the dialogue even more difficult. It is very likely that the so called 'clash of civilizations' in most cases is due to misinterpretation of counterpart's means of discourse such as language, cultural codes, and models of behavior rather than lies in basic contradictions between partners of communication. In the process of communication, one has to rely on universal values rather than focus on cultural or religious peculiarities, to take into account current linguistic and extralinguistic context.Keywords: Arabic, civilization, discourse, language, linguistic
Procedia PDF Downloads 2214812 Managing HR Knowledge in a Large Privately Owned Enterprise: An Empirical Case Analysis
Authors: Cindy Wang-Cowham, Judy Ningyu Tang
Abstract:
The paper contributes towards the development of scarce literature on HR knowledge management. Drawing literature from knowledge management, the authors define the meaning of HR knowledge and propose that there are social mechanisms in organizations that facilitate the management and sharing of HR knowledge. Instead of investigating the subject in large multinational corporations, the present paper examines it in a large Chinese privately owned enterprise, which has an international standing. The main finding of the case analysis is that communication and feedback plays a pivotal role when managing HR knowledge. Social mechanisms can stimulate the communication and feedback between employees, thus facilitate knowledge exchange.Keywords: HR knowledge, knowledge management, large privately owned enterprises, China
Procedia PDF Downloads 5304811 Notched Bands in Ultra-Wideband UWB Filter Design for Advanced Wireless Applications
Authors: Abdul Basit, Amil Daraz, Guoqiang Zhang
Abstract:
With the increasing demand for wireless communication systems for unlicensed indoor applications, the FCC, in February 2002, allocated unlicensed bands ranging from 3.1 GHZ to 10.6 GHz with fractional bandwidth of about 109 %, because it plays a key role in the radiofrequency (RF) front ends devices and has been widely applied in many other microwave circuits. Targeting the proposed band defined by the FCC for the UWB system, this article presents a UWB bandpass filter with three stop bands for the mitigation of wireless bands that may interfere with the UWB range. For this purpose, two resonators are utilized for the implementation of triple-notched bands. The C-shaped resonator is used for the first notch band creation at 3.4 GHz to suppress the WiMAX signal, while the H-shaped resonator is employed in the initial UWB design to introduce the dual notched characteristic at 4.5 GHz and 8.1 GHz to reject the WLAN and Satellite Communication signals. The overall circuit area covered by the proposed design is 30.6 mm × 20 mm, or in terms of guided wavelength at the first stopband, its size is 0.06 λg × 0.02 λg. The presented structure shows a good return loss under -10 dB over most of the passband and greater than -15 dB for the notched frequency bands. Finally, the filter is simulated and analyzed in HFSS 15.0. All the bands for the rejection of wireless signals are independently controlled, which makes this work superior to the rest of the UWB filters presented in the literature.Keywords: a bandpass filter (BPF), ultra-wideband (UWB), wireless communication, C-shaped resonator, triple notch
Procedia PDF Downloads 804810 The Relationship Between Cyberbullying Victimization, Parent and Peer Attachment and Unconditional Self-Acceptance
Authors: Florina Magdalena Anichitoae, Anca Dobrean, Ionut Stelian Florean
Abstract:
Due to the fact that cyberbullying victimization is an increasing problem nowadays, affecting more and more children and adolescents around the world, we wanted to take a step forward analyzing this phenomenon. So, we took a look at some variables which haven't been studied together before, trying to develop another way to view cyberbullying victimization. We wanted to test the effects of the mother, father, and peer attachment on adolescent involvement in cyberbullying as victims through unconditional self acceptance. Furthermore, we analyzed each subscale of the IPPA-R, the instrument we have used for parents and peer attachment measurement, in regards to cyberbullying victimization through unconditional self acceptance. We have also analyzed if gender and age could be taken into consideration as moderators in this model. The analysis has been performed on 653 adolescents aged 11-17 years old from Romania. We used structural equation modeling, working in R program. For the fidelity analysis of the IPPA-R subscales, USAQ, and Cyberbullying Test, we have calculated the internal consistency index, which varies between .68-.91. We have created 2 models: the first model including peer alienation, peer trust, peer communication, self acceptance and cyberbullying victimization, having CFI=0.97, RMSEA=0.02, 90%CI [0.02, 0.03] and SRMR=0.07, and the second model including parental alienation, parental trust, parental communication, self acceptance and cyberbullying victimization and had CFI=0.97, RMSEA=0.02, 90%CI [0.02, 0.03] and SRMR=0.07. Our results were interesting: on one hand, cyberbullying victimization is predicted by peer alienation and peer communication through unconditional self acceptance. Peer trust directly, significantly, and negatively predicted the implication in cyberbullying. In this regard, considering gender and age as moderators, we found that the relationship between unconditional self acceptance and cyberbullying victimization is stronger in girls, but age does not moderate the relationship between unconditional self acceptance and cyberbullying victimization. On the other hand, regarding the degree of cyberbullying victimization as being predicted through unconditional self acceptance by parental alienation, parental communication, and parental trust, this hypothesis was not supported. Still, we could identify a direct path to positively predict victimization through parental alienation and negatively through parental trust. There are also some limitations to this study, which we've discussed in the end.Keywords: adolescent, attachment, cyberbullying victimization, parents, peers, unconditional self-acceptance
Procedia PDF Downloads 2044809 Incorporating Morality Standards in eLearning Process at INU
Authors: Khader Musbah Titi
Abstract:
In this era, traditional education systems do not meet the new challenges created by emerging technologies. On the other hand, eLearning offers all the necessary tools to meet these challenges. Using the Internet has brought numerous benefits to most educational institutions; it has also stretched traditional problems of plagiarism, cheating, stealing, vandalism, and spying into the cyberspace. This research discusses these issues in an eLearning environment. It attempts to provide suggestions and possible solutions to some of these issues. The main aim of this research is to conduct a survey at Irbid National University (INU), one of the oldest and biggest universities in Jordan, to study information related to moral and ethical issues in e-learning environment that affect the construction of the students’ characters in the future. The study will focus on student’s behavior and actions through the Internet using Learning Management System (LMS). Another aim of this research is to analyze the opinions of the instructors and last year students at INU about ethical behavior and interaction through LMS. The results show that educational institutes that use LMS should focus on student character development along with field knowledge. According to disadvantages, the results of the study showed that most of students behave unethically in their online activities (cheating, plagiarism, copy/paste etc.) while studying online courses through LMS. The result showed that instructors play a major role in the character development of students. The result also showed that academic institute must have variant mechanisms and strict policy in LMS to control unethical actions of students.Keywords: LMS, cyber ethics, e-learning, IT ethics, students’ behaviors
Procedia PDF Downloads 2424808 Information and Communication Technology (ICT) and Yoruba Language Teaching
Authors: Ayoola Idowu Olasebikan
Abstract:
The global community has become increasingly dependent on various kinds of technologies out of which Information and Communication Technologies (ICTs) appear to be the most prominent. ICTs have become multipurpose tools which have had a revolutionary impact on how we see the world and how we live in it. Yoruba is the most widely spoken African language outside Africa but it remains one of the badly spoken language in the world as a result of its outdated teaching method in the African schools which prevented its standard version from being spoken and written. This paper conducts a critical review of the traditional methods of teaching Yoruba language. It then examines the possibility of leveraging on ICTs for improved methods of teaching Yoruba language to achieve global standard and spread. It identified key ICT platforms that can be deployed for the teaching of Yoruba language and the constraints facing each of them. The paper concludes that Information and Communication Technologies appear to provide veritable opportunity for paradigm shift in the methods of teaching Yoruba Language. It also opines that Yoruba language has the potential to transform economic fortune of Africa for sustainable development provided its teaching is taken beyond the brick and mortar classroom to the virtual classroom/global information super highway called internet or any other ICTs medium. It recommends that students and teachers of Yoruba language should be encouraged to acquire basic skills in computer and internet technology in order to enhance their ability to develop and retrieve electronic Yoruba language teaching materials.Keywords: Africa, ICT, teaching method, Yoruba language
Procedia PDF Downloads 3614807 Streaming Communication Component for Multi-Robots
Authors: George Oliveira, Luana D. Fronza, Luiza Medeiros, Patricia D. M. Plentz
Abstract:
The research presented in this article is part of a wide project that proposes a scheduling system for multi-robots in intelligent warehouses employing multi-robot path-planning (MPP) and multi-robot task allocation (MRTA) to reconcile multiple restrictions (task delivery time, task priorities, charging capacity, and robots battery capacity). We present the software component capable of interconnecting an open streaming processing architecture and robot operating system (ROS), ensuring communication and message exchange between robots and the environment in which they are inserted. Simulation results show the good performance of our proposed technique for connecting ROS and streaming platforms.Keywords: complex distributed systems, mobile robots, smart warehouses, streaming platforms
Procedia PDF Downloads 1944806 A Dynamic Curriculum as a Platform for Continuous Competence Development
Authors: Niina Jallinoja, Anu Moisio
Abstract:
Focus on adult learning is vital to overcome economic challenges as well as to respond to the demand for new competencies and sustained productivity in the digitalized world economy. Employees of all ages must be able to carry on continuous professional development to remain competitive in the labor market. According to EU policies, countries should offer more flexible opportunities for adult learners who study online and in so-called ‘second chance’ qualification programmes. Traditionally, adult education in Finland has comprised of not only liberal adult education but also the government funding to study for Bachelor, Master's, and Ph.D. degrees in Finnish Universities and Universities of Applied Sciences (UAS). From the beginning of 2021, public funding is allocated not only to degrees but also to courses to achieve new competencies for adult learners in Finland. Consequently, there will be degree students (often younger of age) and adult learners studying in the same evening, online and blended courses. The question is thus: How are combined studies meeting the different needs of degree students and adult learners? Haaga-Helia University of Applied Sciences (UAS), located in the metropolitan area of Finland, is taking up the challenge of continuous learning for adult learners. Haaga-Helia has been reforming the bachelor level education and respective shorter courses from 2019 in the biggest project in its history. By the end of 2023, Haaga-Helia will have a flexible, modular curriculum for the bachelor's degrees of hospitality management, business administration, business information technology, journalism and sports management. Building on the shared key competencies, degree students will have the possibility to build individual study paths more flexibly, thanks to the new modular structure of the curriculum. They will be able to choose courses across all degrees, and thus, build their own unique competence combinations. All modules can also be offered as separate courses or learning paths to non-degree students, both publicly funded and as commercial services for employers. Consequently, there will be shared course implementations for degree studies and adult learners with various competence requirements. The newly designed courses are piloted in parallel of the designing of the curriculum in Haaga-Helia during 2020 and 2021. Semi-structured online surveys are composed among the participants for the key competence courses. The focus of the research is to understand how students in the bachelor programme and adult learners from Open UAE perceive the learning experience in such a diverse learning group. A comparison is also executed between learning methods of in-site teaching, online implementation, blended learning and virtual self-learning courses to understand how the pedagogy is meeting the learning objectives of these two different groups. The new flexible curricula and the study modules are to be designed to fill the most important competence gaps that exist in the Finnish labor markets. The new curriculum will be dynamic and constantly evolving over time according to the future competence needs in the labor market. This type of approach requires constant dialogue between Haaga-Helia and workplaces during and after designing of the shared curriculum.Keywords: ccompetence development, continuous learning, curriculum, higher education
Procedia PDF Downloads 1274805 Cyber-Victimization among Higher Education Students as Related to Academic and Personal Factors
Authors: T. Heiman, D. Olenik-Shemesh
Abstract:
Over the past decade, with the rapid growth of electronic communication, the internet and, in particular, social networking has become an inseparable part of people's daily lives. Along with its benefits, a new type of online aggression has emerged, defined as cyber bullying, a form of interpersonal aggressive behavior that takes place through electronic means. Cyber-bullying is characterized by repetitive behavior over time of maladaptive authority and power usage using computers and cell phones via sending insulting messages and hurtful pictures. Preliminary findings suggest that the prevalence of involvement in cyber-bullying among higher education students varies between 10 and 35%. As to date, universities are facing an uphill effort in trying to restrain online misbehavior. As no studies examined the relationships between cyber-bullying involvement with personal aspects, and its impacts on academic achievement and work functioning, this present study examined the nature of cyber-bullying involvement among 1,052 undergraduate students (mean age = 27.25, S.D = 4.81; 66.2% female), coping with, as well as the effects of social support, perceived self-efficacy, well-being, and body-perception, in relation to cyber-victimization. We assume that students in higher education are a vulnerable population and at high risk of being cyber-victims. We hypothesize that social support might serve as a protective factor and will moderate the relationships between the socio-emotional variables and the occurrence of cyber- victimization. The findings of this study will present the relationships between cyber-victimization and the social-emotional aspects, which constitute risk and protective factors. After receiving approval from the Ethics Committee of the University, a Google Drive questionnaire was sent to a random sample of students, studying in the various University study centers. Students' participation was voluntary, and they completed the five questionnaires anonymously: Cyber-bullying, perceived self-efficacy, subjective well-being, social support and body perception. Results revealed that 11.6% of the students reported being cyber-victims during last year. Examining the emotional and behavioral reactions to cyber-victimization revealed that female emotional and behavioral reactions were significantly greater than the male reactions (p < .001). Moreover, females reported on a significant higher social support compared to men; male reported significantly on a lower social capability than female; and men's body perception was significantly more positive than women's scores. No gender differences were observed for subjective well-being scale. Significant positive correlations were found between cyber-victimization and fewer friends, lower grades, and work ineffectiveness (r = 0.37- .40, p < 0 .001). The results of the Hierarchical regression indicated significantly that cyber-victimization can be predicted by lower social support, lower body perception, and gender (female), that explained 5.6% of the variance (R2 = 0.056, F(5,1047) = 12.47, p < 0.001). The findings deepen our understanding of the students' involvement in cyber-bullying, and present the relationships of the social-emotional and academic aspects on cyber-victim students. In view of our findings, higher education policy could help facilitate coping with cyber-bullying incidents, and student support units could develop intervention programs aimed at reducing cyber-bullying and its impacts.Keywords: academic and personal factors, cyber-victimization, social support, higher education
Procedia PDF Downloads 2894804 Partnership in Eradicating Corruption: Case Study of Indonesia’s Corruption Eradication Commission Partnership with Dompet Dhuafa in Preventing Corruption
Authors: Asriana Issa Sofia, Retno Hendrowati, Dewi Kurniaty
Abstract:
This study aims at analyzing the role of Corruption Eradication Commission in combating corruption cases including punishing high-profile corruptors and changing the culture of corruption in Indonesia by strengthening the relations with other agencies. Corruption Eradicating Commission was created in 2002 as Indonesia’s most trusted government institution as the anti-corruption agency that will exercise investigatory and prosecutorial power independently from the executive, legislature, and judiciary. The analysis of partnership addressed the role of collaboration with other institutions including Non-Government Organization, Youth Organization, Governmental Institution and Society. The collaboration is needed due to the limitations of Corruption Eradication Commission in preventing corruption. The collaboration focuses on the intensive communication, strengthening leadership, commitment, and creating trust. The research method used the qualitative study by employing the literature study and having a semi-structured interview with the key informant in Corruption Eradication Commission and its partners. The analysis found that intensive communication, leadership, communication, and creating trust were the important pillars in assisting Corruption Eradication Commission to prevent the incoming seed of corruption. The pillars will support the Indonesian Government to deliver better services for society.Keywords: corruption, corruption eradicating commission, partnership, preventing actions
Procedia PDF Downloads 166