Search results for: communication system security
20794 Clinical Empathy: The Opportunity to Offer Optimal Treatment to People with Serious Illness
Authors: Leonore Robieux, Franck Zenasni, Marc Pocard, Clarisse Eveno
Abstract:
Empirical data in health psychology studies show the necessity to consider the doctor-patient communication and its positive impact on outcomes such as patients’ satisfaction, treatment adherence, physical and psychological wellbeing. In this line, the present research aims to define the role and determinants of an effective doctor–patient communication during the treatment of patients with serious illness (peritoneal carcinomatosis). We carried out a prospective longitudinal study including patients treated for peritoneal carcinomatosis of various origins. From November 2016, to date, data were collected using validated questionnaires at two times of evaluation: one month before the surgery (T0) and one month after (T1). Thus, patients reported their (a) anxiety and depression levels, (b) standardized and individualized quality of life and (c) how they perceived communication, attitude and empathy of the surgeon. 105 volunteer patients (Mean age = 58.18 years, SD = 10.24, 62.2% female) participated to the study. PC arose from rare diseases (14%), colorectal (38%), eso-gastric (24%) and ovarian (8%) cancer. Three groups are defined according to the severity of their pathology and the treatment offered to them: (1) important surgical treatment with the goal of healing (53%), (2) repeated palliative surgical treatment (17%), and (3) the patients recused for surgical treatment, only palliative approach (30%). Results are presented according to Baron and Kenny recommendations. The regressions analyses show that only depression and anxiety are sensitive to the communication and empathy of surgeon. The main results show that a good communication and high level of empathy at T0 and T1 limit depression and anxiety of the patients in T1. Results also indicate that the severity of the disease modulates this positive impact of communication: better is the communication the less are the level of depression and anxiety of the patients. This effect is higher for patients treated for the more severe disease. These results confirm that, even in the case severe disease a good communication between patient and physician remains a significant factor in promoting the well-being of patients. More specific training need to be developed to promote empathic care.Keywords: clinical empathy, determinants, healthcare, psychological wellbeing
Procedia PDF Downloads 12220793 Quantum Entanglement and Thermalization in Superconducting Two-Qubit Systems
Authors: E. Karami, M. Bohloul, P. Najmadi
Abstract:
The superconducting system is a suitable system for quantum computers. Quantum entanglement is a fundamental phenomenon that is key to the power of quantum computers. Quantum entanglement has been studied in different superconducting systems. In this paper, we are investigating a superconducting two-qubit system as a macroscopic system. These systems include two coupled Quantronium circuits. We calculate quantum entanglement and thermalization for system evolution and compare them. We observe, thermalization and entanglement have different behavior, and equilibrium thermal state has maximum entanglement.Keywords: macroscopic system, quantum entanglement, thermalization, superconducting system
Procedia PDF Downloads 15620792 Negative Sequence-Based Protection Techniques for Microgrid Connected Power Systems
Authors: Isabelle Snyder, Travis Smith
Abstract:
Microgrid protection presents challenges to conventional protection techniques due to the low-induced fault current. Protection relays present in microgrid applications require a combination of settings groups to adjust based on the architecture of the microgrid in islanded and grid-connected modes. In a radial system where the microgrid is at the other end of the feeder, directional elements can be used to identify the direction of the fault current and switch settings groups accordingly (grid-connected or microgrid-connected). However, with multiple microgrid connections, this concept becomes more challenging, and the direction of the current alone is not sufficient to identify the source of the fault current contribution. ORNL has previously developed adaptive relaying schemes through other DOE-funded research projects that will be evaluated and used as a baseline for this research. The four protection techniques in this study are labeled as follows: (1) Adaptive Current only Protection System (ACPS), Intentional (2) Unbalanced Control for Protection Control (IUCPC), (3) Adaptive Protection System with Communication Controller (APSCC) (4) Adaptive Model-Driven Protective Relay (AMDPR).Keywords: adaptive relaying, microgrid protection, sequence components, islanding detection
Procedia PDF Downloads 9720791 Technical and Economic Environment in the Polish Power System as the Basis for Distributed Generation and Renewable Energy Sources Development
Authors: Pawel Sowa, Joachim Bargiel, Bogdan Mol, Katarzyna Luszcz
Abstract:
The article raises the issue of the development of local renewable energy sources and the production of distributed energy in context of improving the reliability of the Polish Power System and the beneficial impact on local and national energy security. The paper refers to the current problems of local governments in the process of investment in the area of distributed energy projects, and discusses the issues of the future role and cooperation within the local power plants and distributed energy. Attention is paid to the local communities the chance to raise their own resources and management of energy fuels (biomass, wind, gas mining) and improving the local energy balance. The material presented takes the issue of the development of the energy potential of municipalities and future cooperation with professional energy. As an example, practical solutions used in one of the communes in Silesia.Keywords: distributed generation, mini centers energy, renewable energy sources, reliability of supply of rural commune
Procedia PDF Downloads 60020790 People Living with HIV/AIDS: In the Face of Social Stigma and the Role of Therapeutic Communication
Authors: Semiu Bello
Abstract:
Since the discovery of HIV/AIDS in 1981, it has been a major global challenge and its ravaging consequences have had negative imprints on both the affected and infected people. The challenge of HIV/AIDS does not only affect the developing countries of the world, the developed nations have had their share of the experiences. The disease has, therefore, attracted the attentions of national governments and international donor agencies with huge financial investments toward the eradication of the virus and its global menace. Socially, however, people living with HIV/AIDS have had to battle with an array of social challenges in regards to the infection; the social stigmas, which seem to be more prevalent in underdeveloped and developing societies. The social stigmas with which people living with HIV/AIDS have suffered from include, but not limited, to social isolation, group avoidance, loss of jobs, public ridicule and non-appointment to official and government positions. Given this background, this study examines the roles of therapeutic communication otherwise called patient-provider communication within a clinical environment, focusing on Olabisi Onabanjo University Teaching Hospital (OOUTH) Sagamu, Nigeria as a case study. In other words, this study will investigate the level of interpersonal communication, interactions, and relationships that often take place between people living with HIV/AIDS and health care providers including doctors, nurses and social workers. This study will methodologically adopt the in-depth interview to interview six members of people living with HIV/AIDS at OOUTH. The dimensions of the data will determine the policy prescriptions of this study, which as envisage, may contribute to the improved use of therapeutic communication by health care providers and may thereof improve the psychology of people living with HIV/AIDS in the face of any social stigma.Keywords: health care providers, people living with HIV/AIDS, social stigma, therapeutic communication
Procedia PDF Downloads 23420789 The Complaint Speech Act Set Produced by Arab Students in the UAE
Authors: Tanju Deveci
Abstract:
It appears that the speech act of complaint has not received as much attention as other speech acts. However, the face-threatening nature of this speech act requires a special attention in multicultural contexts in particular. The teaching context in the UAE universities, where a big majority of teaching staff comes from other cultures, requires investigations into this speech act in order to improve communication between students and faculty. This session will outline the results of a study conducted with this purpose. The realization of complaints by Freshman English students in Communication courses at Petroleum Institute was investigated to identify communication patterns that seem to cause a strain. Data were collected using a role-play between a teacher and students, and a judgment scale completed by two of the instructors in the Communications Department. The initial findings reveal that the students had difficulty putting their case, produced the speech act of criticism along with a complaint and that they produced both requests and demands as candidate solutions. The judgement scales revealed that the students’ attitude was not appropriate most of the time and that the judges would behave differently from students. It is concluded that speech acts, in general, and complaint, in particular, need to be taught to learners explicitly to improve interpersonal communication in multicultural societies. Some teaching ideas are provided to help increase foreign language learners’ sociolinguistic competence.Keywords: speech act, complaint, pragmatics, sociolinguistics, language teaching
Procedia PDF Downloads 50720788 TNF-Kinoid® in Autoimmune Diseases
Authors: Yahia Massinissa, Melakhessou Med Akram, Mezahdia Mehdi, Marref Salah Eddine
Abstract:
Cytokines are natural proteins which act as true intercellular communication signals in immune and inflammatory responses. Reverse signaling pathways that activate cytokines help to regulate different functions at the target cell, causing its activation, its proliferation, the differentiation, its survival or death. It was shown that malfunctioning of the cytokine regulation, particularly over-expression, contributes to the onset and development of certain serious diseases such as chronic rheumatoid arthritis, Crohn's disease, psoriasis, lupus. The action mode of Kinoid® technology is based on the principle vaccine: The patient's immune system is activated so that it neutralizes itself and the factor responsible for the disease. When applied specifically to autoimmune diseases, therapeutic vaccination allows the body to neutralize cytokines (proteins) overproduced through a highly targeted stimulation of the immune system.Keywords: cytokines, Kinoid tech, auto-immune diseases, vaccination
Procedia PDF Downloads 33720787 Impacts of Applying Automated Vehicle Location Systems to Public Bus Transport Management
Authors: Vani Chintapally
Abstract:
The expansion of modest and minimized Global Positioning System (GPS) beneficiaries has prompted most Automatic Vehicle Location (AVL) frameworks today depending solely on satellite-based finding frameworks, as GPS is the most stable usage of these. This paper shows the attributes of a proposed framework for following and dissecting open transport in a run of the mill medium-sized city and complexities the qualities of such a framework to those of broadly useful AVL frameworks. Particular properties of the courses broke down by the AVL framework utilized for the examination of open transport in our study incorporate cyclic vehicle courses, the requirement for particular execution reports, and so forth. This paper particularly manages vehicle movement forecasts and the estimation of station landing time, combined with consequently produced reports on timetable conformance and other execution measures. Another side of the watched issue is proficient exchange of information from the vehicles to the control focus. The pervasiveness of GSM bundle information exchange advancements combined with decreased information exchange expenses have brought on today's AVL frameworks to depend predominantly on parcel information exchange administrations from portable administrators as the correspondences channel in the middle of vehicles and the control focus. This methodology brings numerous security issues up in this conceivably touchy application field.Keywords: automatic vehicle location (AVL), expectation of landing times, AVL security, data administrations, wise transport frameworks (ITS), guide coordinating
Procedia PDF Downloads 38320786 Biodiversity and Biotechnology: Some Considerations about the International Regulation of Agriculture and the International Legal System on Access to Genetic Resources
Authors: Leandro Moura da Silva
Abstract:
The international community has strived to create legal mechanisms to protect their biodiversity, but this can represent, sometimes, particularly in the case of regulatory regime on access to genetic resources, an excessive nationalism which transforms itself into a significant obstacle to scientific progress causing damages to the country and to local farmers. Although it has been poorly publicized in the media, the international legal system was marked, in 2014, by the entry into force of the Nagoya Protocol, which regulates the access and benefit sharing of genetic resources of the States Party to that legal instrument. However, it’s not reasonable to think of regulating access to genetic resources without reflecting on the links of this important subject with other related issues, such as family farming and agribusiness, food safety, food security, intellectual property rights (on seeds, genetic material, new plant varieties, etc.), environmental sustainability, biodiversity, and biosafety.Keywords: international law, regulation on agriculture, agronomy techniques, sustainability, genetic resources and new crop varieties, CBD, Nagoya Protocol, ITPGRFA
Procedia PDF Downloads 50220785 Smart Lean Manufacturing in the Context of Industry 4.0: A Case Study
Authors: M. Ramadan, B. Salah
Abstract:
This paper introduces a framework to digitalize lean manufacturing tools to enhance smart lean-based manufacturing environments or Lean 4.0 manufacturing systems. The paper discusses the integration between lean tools and the powerful features of recent real-time data capturing systems with the help of Information and Communication Technologies (ICT) to develop an intelligent real-time monitoring and controlling system of production operations concerning lean targets. This integration is represented in the Lean 4.0 system called Dynamic Value Stream Mapping (DVSM). Moreover, the paper introduces the practice of Radio Frequency Identification (RFID) and ICT to smartly support lean tools and practices during daily production runs to keep the lean system alive and effective. This work introduces a practical description of how the lean method tools 5S, standardized work, and poka-yoke can be digitalized and smartly monitored and controlled through DVSM. A framework of the three tools has been discussed and put into practice in a German switchgear manufacturer.Keywords: lean manufacturing, Industry 4.0, radio frequency identification, value stream mapping
Procedia PDF Downloads 22920784 Energy Trading for Cooperative Microgrids with Renewable Energy Resources
Authors: Ziaullah, Shah Wahab Ali
Abstract:
Micro-grid equipped with heterogeneous energy resources present the idea of small scale distributed energy management (DEM). DEM helps in minimizing the transmission and operation costs, power management and peak load demands. Micro-grids are collections of small, independent controllable power-generating units and renewable energy resources. Micro-grids also motivate to enable active customer participation by giving accessibility of real-time information and control to the customer. The capability of fast restoration against faulty situation, integration of renewable energy resources and Information and Communication Technologies (ICT) make micro-grid as an ideal system for distributed power systems. Micro-grids can have a bank of energy storage devices. The energy management system of micro-grid can perform real-time energy forecasting of renewable resources, energy storage elements and controllable loads in making proper short-term scheduling to minimize total operating costs. We present a review of existing micro-grids optimization objectives/goals, constraints, solution approaches and tools used in micro-grids for energy management. Cost-benefit analysis of micro-grid reveals that cooperation among different micro-grids can play a vital role in the reduction of import energy cost and system stability. Cooperative micro-grids energy trading is an approach to electrical distribution energy resources that allows local energy demands more control over the optimization of power resources and uses. Cooperation among different micro-grids brings the interconnectivity and power trading issues. According to the literature, it shows that open area of research is available for cooperative micro-grids energy trading. In this paper, we proposed and formulated the efficient energy management/trading module for interconnected micro-grids. It is believed that this research will open new directions in future for energy trading in cooperative micro-grids/interconnected micro-grids.Keywords: distributed energy management, information and communication technologies, microgrid, energy management
Procedia PDF Downloads 37520783 Evaluating Electronic Service Quality in Banking Iran
Authors: Vahid Bairami Rad
Abstract:
With the rapid growth of the Internet and the globalization of the market, most enterprises are trying to attract and win customers in the highly competitive electronic market. Better e-service quality will enhance the relationship with customers and their satisfaction. So the measurement of eservice quality is very important but it is a complex process due to the complex nature of services. Literature predicts that there is a lack of universal definition of e-service quality. The e-service quality measures in banking have great importance in achieving high customer base. This paper proposes a conceptual model for measuring e-service quality in Iranian Banking Iran. Nine dimensions reliability, ease of use, personalization, security and trust, website aesthetic, responsiveness, contact and speed of delivery had been identified. The results of this paper may help to develop a proper scale to measure the e-service quality in Iranian Banking Industry, which may assist to maintain and improve the performance and effectiveness of e-service quality to retain customers.Keywords: electronic banking, Dimensions, customer service quality, electronic, communication
Procedia PDF Downloads 50020782 ZigBee Wireless Sensor Nodes with Hybrid Energy Storage System Based on Li-Ion Battery and Solar Energy Supply
Authors: Chia-Chi Chang, Chuan-Bi Lin, Chia-Min Chan
Abstract:
Most ZigBee sensor networks to date make use of nodes with limited processing, communication, and energy capabilities. Energy consumption is of great importance in wireless sensor applications as their nodes are commonly battery-driven. Once ZigBee nodes are deployed outdoors, limited power may make a sensor network useless before its purpose is complete. At present, there are two strategies for long node and network lifetime. The first strategy is saving energy as much as possible. The energy consumption will be minimized through switching the node from active mode to sleep mode and routing protocol with ultra-low energy consumption. The second strategy is to evaluate the energy consumption of sensor applications as accurately as possible. Erroneous energy model may render a ZigBee sensor network useless before changing batteries. In this paper, we present a ZigBee wireless sensor node with four key modules: a processing and radio unit, an energy harvesting unit, an energy storage unit, and a sensor unit. The processing unit uses CC2530 for controlling the sensor, carrying out routing protocol, and performing wireless communication with other nodes. The harvesting unit uses a 2W solar panel to provide lasting energy for the node. The storage unit consists of a rechargeable 1200 mAh Li-ion battery and a battery charger using a constant-current/constant-voltage algorithm. Our solution to extend node lifetime is implemented. Finally, a long-term sensor network test is used to exhibit the functionality of the solar powered system.Keywords: ZigBee, Li-ion battery, solar panel, CC2530
Procedia PDF Downloads 37420781 Intrusion Detection in Computer Networks Using a Hybrid Model of Firefly and Differential Evolution Algorithms
Authors: Mohammad Besharatloo
Abstract:
Intrusion detection is an important research topic in network security because of increasing growth in the use of computer network services. Intrusion detection is done with the aim of detecting the unauthorized use or abuse in the networks and systems by the intruders. Therefore, the intrusion detection system is an efficient tool to control the user's access through some predefined regulations. Since, the data used in intrusion detection system has high dimension, a proper representation is required to show the basis structure of this data. Therefore, it is necessary to eliminate the redundant features to create the best representation subset. In the proposed method, a hybrid model of differential evolution and firefly algorithms was employed to choose the best subset of properties. In addition, decision tree and support vector machine (SVM) are adopted to determine the quality of the selected properties. In the first, the sorted population is divided into two sub-populations. These optimization algorithms were implemented on these sub-populations, respectively. Then, these sub-populations are merged to create next repetition population. The performance evaluation of the proposed method is done based on KDD Cup99. The simulation results show that the proposed method has better performance than the other methods in this context.Keywords: intrusion detection system, differential evolution, firefly algorithm, support vector machine, decision tree
Procedia PDF Downloads 9120780 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm
Authors: Sukhleen Kaur
Abstract:
In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper
Procedia PDF Downloads 41420779 Cybersecurity Challenges in the Era of Open Banking
Authors: Krish Batra
Abstract:
The advent of open banking has revolutionized the financial services industry by fostering innovation, enhancing customer experience, and promoting competition. However, this paradigm shift towards more open and interconnected banking ecosystems has introduced complex cybersecurity challenges. This research paper delves into the multifaceted cybersecurity landscape of open banking, highlighting the vulnerabilities and threats inherent in sharing financial data across a network of banks and third-party providers. Through a detailed analysis of recent data breaches, phishing attacks, and other cyber incidents, the paper assesses the current state of cybersecurity within the open banking framework. It examines the effectiveness of existing security measures, such as encryption, API security protocols, and authentication mechanisms, in protecting sensitive financial information. Furthermore, the paper explores the regulatory response to these challenges, including the implementation of standards such as PSD2 in Europe and similar initiatives globally. By identifying gaps in current cybersecurity practices, the research aims to propose a set of robust, forward-looking strategies that can enhance the security and resilience of open banking systems. This includes recommendations for banks, third-party providers, regulators, and consumers on how to mitigate risks and ensure a secure open banking environment. The ultimate goal is to provide stakeholders with a comprehensive understanding of the cybersecurity implications of open banking and to outline actionable steps for safeguarding the financial ecosystem in an increasingly interconnected world.Keywords: open banking, financial services industry, cybersecurity challenges, data breaches, phishing attacks, encryption, API security protocols, authentication mechanisms, regulatory response, PSD2, cybersecurity practices
Procedia PDF Downloads 6020778 Effectiveness of Integrative Behavioral Couples Therapy on the Communication Patterns of Couples Applying for Divorce
Authors: Sakineh Abbasi Bourondaragh
Abstract:
The aim of this research is effectiveness of integrative behavioral couples therapy on the communication patterns of couples applying for divorce. We selected (N=20) reports from Tabriz Family Judicial Complex (FJC) of couples which have conflict in their marital relationships. All of reports were released during 2012. First, they were randomly divided into two experimental and control groups and all the couples were given pre-test. They participated in twelve therapy sessions. Then the experimental group was exposed to an experimental intervention, but the control group was not received experimental intervention. The subjects were treated. At the end of treatment, a post-test was performed about subjects (each of two groups).The results showed that integrative behavioral couple therapy could increase and improve communication patterns. The findings also showed that integrative behavioral couples therapy had increased mutual constructive pattern and decreased demand/withdraw pattern and mutual avoidance pattern of CPQ sub-scale. Steady change indicator showed that the difference is clinically meaningful.Keywords: integrative behavioral couple therapy, communication patterns, cognitive sciences, Family Judicial Complex
Procedia PDF Downloads 31620777 PIN-Diode Based Slotted Reconfigurable Multiband Antenna Array for Vehicular Communication
Authors: Gaurav Upadhyay, Nand Kishore, Prashant Ranjan, Shivesh Tripathi, V. S. Tripathi
Abstract:
In this paper, a patch antenna array design is proposed for vehicular communication. The antenna consists of 2-element patch array. The antenna array is operating at multiple frequency bands. The multiband operation is achieved by use of slots at proper locations at the patch. The array is made reconfigurable by use of two PIN-diodes. The antenna is simulated and measured in four states of diodes i.e. ON-ON, ON-OFF, OFF-ON, and OFF-OFF. In ON-ON state of diodes, the resonant frequencies are 4.62-4.96, 6.50-6.75, 6.90-7.01, 7.34-8.22, 8.89-9.09 GHz. In ON-OFF state of diodes, the measured resonant frequencies are 4.63-4.93, 6.50-6.70 and 7.81-7.91 GHz. In OFF-ON states of diodes the resonant frequencies are 1.24-1.46, 3.40-3.75, 5.07-5.25 and 6.90-7.20 GHz and in the OFF-OFF state of diodes 4.49-4.75 and 5.61-5.98 GHz. The maximum bandwidth of the proposed antenna is 16.29%. The peak gain of the antenna is 3.4 dB at 5.9 GHz, which makes it suitable for vehicular communication.Keywords: antenna, array, reconfigurable, vehicular
Procedia PDF Downloads 25620776 Internet of Things Based Process Model for Smart Parking System
Authors: Amjaad Alsalamah, Liyakathunsia Syed
Abstract:
Transportation is an essential need for many people to go to their work, school, and home. In particular, the main common method inside many cities is to drive the car. Driving a car can be an easy job to reach the destination and load all stuff in a reasonable time. However, deciding to find a parking lot for a car can take a long time using the traditional system that can issue a paper ticket for each customer. The old system cannot guarantee a parking lot for all customers. Also, payment methods are not always available, and many customers struggled to find their car among a numerous number of cars. As a result, this research focuses on providing an online smart parking system in order to save time and budget. This system provides a flexible management system for both parking owner and customers by receiving all request via the online system and it gets an accurate result for all available parking and its location.Keywords: smart parking system, IoT, tracking system, process model, cost, time
Procedia PDF Downloads 33620775 Development of Automated Quality Management System for the Management of Heat Networks
Authors: Nigina Toktasynova, Sholpan Sagyndykova, Zhanat Kenzhebayeva, Maksat Kalimoldayev, Mariya Ishimova, Irbulat Utepbergenov
Abstract:
Any business needs a stable operation and continuous improvement, therefore it is necessary to constantly interact with the environment, to analyze the work of the enterprise in terms of employees, executives and consumers, as well as to correct any inconsistencies of certain types of processes and their aggregate. In the case of heat supply organizations, in addition to suppliers, local legislation must be considered which often is the main regulator of pricing of services. In this case, the process approach used to build a functional organizational structure in these types of businesses in Kazakhstan is a challenge not only in the implementation, but also in ways of analyzing the employee's salary. To solve these problems, we investigated the management system of heating enterprise, including strategic planning based on the balanced scorecard (BSC), quality management in accordance with the standards of the Quality Management System (QMS) ISO 9001 and analysis of the system based on expert judgment using fuzzy inference. To carry out our work we used the theory of fuzzy sets, the QMS in accordance with ISO 9001, BSC according to the method of Kaplan and Norton, method of construction of business processes according to the notation IDEF0, theory of modeling using Matlab software simulation tools and graphical programming LabVIEW. The results of the work are as follows: We determined possibilities of improving the management of heat-supply plant-based on QMS; after the justification and adaptation of software tool it has been used to automate a series of functions for the management and reduction of resources and for the maintenance of the system up to date; an application for the analysis of the QMS based on fuzzy inference has been created with novel organization of communication software with the application enabling the analysis of relevant data of enterprise management system.Keywords: balanced scorecard, heat supply, quality management system, the theory of fuzzy sets
Procedia PDF Downloads 36720774 Security in Resource Constraints: Network Energy Efficient Encryption
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC
Procedia PDF Downloads 14520773 Detecting Heartbeat Architectural Tactic in Source Code Using Program Analysis
Authors: Ananta Kumar Das, Sujit Kumar Chakrabarti
Abstract:
Architectural tactics such as heartbeat, ping-echo, encapsulate, encrypt data are techniques that are used to achieve quality attributes of a system. Detecting architectural tactics has several benefits: it can aid system comprehension (e.g., legacy systems) and in the estimation of quality attributes such as safety, security, maintainability, etc. Architectural tactics are typically spread over the source code and are implicit. For large codebases, manual detection is often not feasible. Therefore, there is a need for automated methods of detection of architectural tactics. This paper presents a formalization of the heartbeat architectural tactic and a program analytic approach to detect this tactic in source code. The experiment of the proposed method is done on a set of Java applications. The outcome of the experiment strongly suggests that the method compares well with a manual approach in terms of its sensitivity and specificity, and far supersedes a manual exercise in terms of its scalability.Keywords: software architecture, architectural tactics, detecting architectural tactics, program analysis, AST, alias analysis
Procedia PDF Downloads 16020772 Impact of Belongingness, Relational Communication, Religiosity and Screen Time of College Student Levels of Anxiety
Authors: Cherri Kelly Seese, Renee Bourdeaux, Sarah Drivdahl
Abstract:
Emergent adults in the United States are currently experiencing high levels of anxiety. It is imperative to uncover insulating factors which mitigate the impact of anxiety. This study aims to explore how constructs such as belongingness, relational communication, screen time and religiosity impact anxiety levels of emerging adults. Approximately 250 college students from a small, private university on the West Coast were given an online assessment that included: the General Belongingness Scale, Relational Communication Scale, Duke University Religion Index (DUREL), a survey of screen time, and the Beck Anxiety Inventory. A MANOVA statistical test was conducted by assessing the effects of multiple dependent variables (scores on GBS, RCS, self-reported screen time and DUREL) on the four different levels of anxiety as measured on the BAI (minimal = 1, mild =2, moderate = 3, or severe = 4). Results indicated a significant relationship between one’s sense of belonging and one’s reported level of anxiety. These findings have implications for systems, like universities, churches, and corporations that want to improve young adults’ level of anxiety.Keywords: anxiety, belongingness, relational communication, religiosity, screen time
Procedia PDF Downloads 17420771 Cognition in Context: Investigating the Impact of Persuasive Outcomes across Face-to-Face, Social Media and Virtual Reality Environments
Authors: Claire Tranter, Coral Dando
Abstract:
Gathering information from others is a fundamental goal for those concerned with investigating crime, and protecting national and international security. Persuading an individual to move from an opposing to converging viewpoint, and an understanding on the cognitive style behind this change can serve to increase understanding of traditional face-to-face interactions, as well as synthetic environments (SEs) often used for communication across varying geographical locations. SEs are growing in usage, and with this increase comes an increase in crime being undertaken online. Communication technologies can allow people to mask their real identities, supporting anonymous communication which can raise significant challenges for investigators when monitoring and managing these conversations inside SEs. To date, the psychological literature concerning how to maximise information-gain in SEs for real-world interviewing purposes is sparse, and as such this aspect of social cognition is not well understood. Here, we introduce an overview of a novel programme of PhD research which seeks to enhance understanding of cross-cultural and cross-gender communication in SEs for maximising information gain. Utilising a dyadic jury paradigm, participants interacted with a confederate who attempted to persuade them to the opposing verdict across three distinct environments: face-to-face, instant messaging, and a novel virtual reality environment utilising avatars. Participants discussed a criminal scenario, acting as a two-person (male; female) jury. Persuasion was manipulated by the confederate claiming an opposing viewpoint (guilty v. not guilty) to the naïve participants from the outset. Pre and post discussion data, and observational digital recordings (voice and video) of participant’ discussion performance was collected. Information regarding cognitive style was also collected to ascertain participants need for cognitive closure and biases towards jumping to conclusions. Findings revealed that individuals communicating via an avatar in a virtual reality environment reacted in a similar way, and thus equally persuasive, when compared to individuals communicating face-to-face. Anonymous instant messaging however created a resistance to persuasion in participants, with males showing a significant decline in persuasive outcomes compared to face to face. The findings reveal new insights particularly regarding the interplay of persuasion on gender and modality, with anonymous instant messaging enhancing resistance to persuasion attempts. This study illuminates how varying SE can support new theoretical and applied understandings of how judgments are formed and modified in response to advocacy.Keywords: applied cognition, persuasion, social media, virtual reality
Procedia PDF Downloads 14420770 On the Resilience of Operational Technology Devices in Penetration Tests
Authors: Marko Schuba, Florian Kessels, Niklas Reitz
Abstract:
Operational technology (OT) controls physical processes in critical infrastructures and economically important industries. With the convergence of OT with classical information technology (IT), rising cybercrime worldwide and the increasingly difficult geopolitical situation, the risks of OT infrastructures being attacked are growing. Classical penetration testing, in which testers take on the role of an attacker, has so far found little acceptance in the OT sector - the risk that a penetration test could do more harm than good seems too great. This paper examines the resilience of various OT systems using typical penetration test tools. It is shown that such a test certainly involves risks, but is also feasible in OT if a cautious approach is taken. Therefore, OT penetration testing should be considered as a tool to improve the cyber security of critical infrastructures.Keywords: penetration testing, OT, ICS, OT security
Procedia PDF Downloads 1820769 Enhancing Emotional Intelligence through Non-Verbal Communication Training in Higher Education Exchange Programs: A Longitudinal Study
Authors: Maciej Buczowski
Abstract:
This study investigates the impact of non-verbal communication training on enhancing the emotional intelligence (EI) of participants in higher education exchange programs. Recognizing the vital role EI plays in academic and professional success, particularly in multicultural environments, this research aims to explore the interplay between non-verbal cues and EI. Utilizing a longitudinal mixed-methods approach, the study will assess EI development over time among international students and faculty members. Participants will undergo a comprehensive non-verbal communication training program, covering modules on recognizing and interpreting emotional expressions, understanding cultural variations, and using non-verbal cues to manage interpersonal dynamics. EI levels will be measured using established instruments such as the Mayer-Salovey-Caruso Emotional Intelligence Test (MSCEIT) and the Emotional Quotient Inventory (EQ-i), supplemented by qualitative data from interviews and focus groups. A control group will be included to validate the intervention's effectiveness. Data collection at multiple time points (pre-training, mid-training, post-training, and follow-up) will enable tracking of EI changes. The study hypothesizes significant improvements in participants' EI, particularly in emotional awareness, empathy, and relationship management, leading to better academic performance and increased satisfaction with the exchange experience. This research aims to provide insights into the relationship between non-verbal communication and EI, potentially influencing the design of exchange programs to include EI development components and enhancing the effectiveness of international education initiatives.Keywords: emotional intelligence, higher education exchange program, non-verbal communication, intercultural communication, cognitive linguistics
Procedia PDF Downloads 2520768 Effect Analysis of an Improved Adaptive Speech Noise Reduction Algorithm in Online Communication Scenarios
Authors: Xingxing Peng
Abstract:
With the development of society, there are more and more online communication scenarios such as teleconference and online education. In the process of conference communication, the quality of voice communication is a very important part, and noise may cause the communication effect of participants to be greatly reduced. Therefore, voice noise reduction has an important impact on scenarios such as voice calls. This research focuses on the key technologies of the sound transmission process. The purpose is to maintain the audio quality to the maximum so that the listener can hear clearer and smoother sound. Firstly, to solve the problem that the traditional speech enhancement algorithm is not ideal when dealing with non-stationary noise, an adaptive speech noise reduction algorithm is studied in this paper. Traditional noise estimation methods are mainly used to deal with stationary noise. In this chapter, we study the spectral characteristics of different noise types, especially the characteristics of non-stationary Burst noise, and design a noise estimator module to deal with non-stationary noise. Noise features are extracted from non-speech segments, and the noise estimation module is adjusted in real time according to different noise characteristics. This adaptive algorithm can enhance speech according to different noise characteristics, improve the performance of traditional algorithms to deal with non-stationary noise, so as to achieve better enhancement effect. The experimental results show that the algorithm proposed in this chapter is effective and can better adapt to different types of noise, so as to obtain better speech enhancement effect.Keywords: speech noise reduction, speech enhancement, self-adaptation, Wiener filter algorithm
Procedia PDF Downloads 5920767 Cultural Barriers in the Communication of Breast Cancer in Sub-Saharan Africa
Authors: Kayum Fokoue Carole
Abstract:
This paper aims at verifying the effectiveness of reaching target populations while paying attention to their cultural background when communicating new knowledge, ideas or technology in a multicultural world. Our case study is an experiment on the communication of knowledge on breast cancer in three sub-Saharan countries (Ghana, Tchad, and Cameroon health). The methodology consisted of submitting a semi-structured questionnaire to local populations in some localities in these target countries in order to determine the cultural barriers hindering the effective communication of knowledge on breast cancer. Once this done, sensitization documents on breast cancer were translated into Ewe (Ghana), Mbaye (Tchad), Ghomala’, Ewondo, and Fufulde (Cameroon). In each locality, a sensitization programme was organised for two groups. For one group, the cultural barriers discovered were taken into consideration while communicating during the programme whereas in the other group, they were not. Another questionnaire was disseminated after three months to verify the level of appropriation of those who attended the campaign based on Chumbow’s appropriation theory. This paper, therefore, discusses some spiritual beliefs, representations and practices in the target African communities hindering effective communication of issues on breast cancer in the target localities. Findings reveal that only 38% of respondents in the group of those for whom cultural barriers were not taken into account during the programme had a high level of appropriation while for the other group, 86% had a high level of appropriation. This is evidence that the communication of issues on breast cancer can be more effective by reaching different populations in a language they best master while paying attention to their culture. Therefore, international communication of new knowledge should be culturally contextualised. Suggestions at the end of the paper are directed towards the achievement of these goals. The present work promotes international partnership in addressing and resolving global health preoccupations since research findings from one community/country can be mutualized in partnership with other communities and countries.Keywords: cultural barriers, communication, health, breast cancer
Procedia PDF Downloads 33920766 Tamukkana, Ancient Achaemenids City near the Persian Gulf
Authors: Ghulamhossein Nezami
Abstract:
Civilizations based in Iran, especially in the south, have always realized the all-around importance of the Persian Sea and for various reasons, have paid full attention to it. The first of these was the pre-Aryan government, Ilam in the coastal province of Sharihum and the city of Lian (now the port of Bushehr) in terms of trade, defense and religion. With the establishment of the Achaemenids on the entire plateau of Iran to the center of Persia, they created several communication routes from Parseh to the shores of the Persian Gulf, which ended in the present Bushehr province. This coastal area was extended by a road in the coastal plain to the more southern parts of the ports of Ausinze - according to Ptolemy the port of Siraf before the Sassanids - and Epstane and Hormozia in the present-day Strait of Hormuz. Meanwhile, the ancient city of Temukknana, whose new historical documents testify to its extraordinary importance in the Achaemenid period, especially Darius I of the Achaemenids, from a strategic position with the coastal areas, the coasts and on the other hand with the gamers, the political center. - Achaemenid administration, had. New archeological evidence, research, and excavations show that both the famous Achaemenid kings and courtiers paid special attention to Tamukknana. The discovery of a tomb and three Achaemenid palaces from before the reign of Cyrus to Xerxes in this region showed the importance of the strategic, security-defense and commercial position of this region, extraordinary for the Achaemenids. Therefore, the city of Temukkana in the Dashtestan region of present-day Bushehr province became an important Achaemenid center on the Persian Gulf coast and became the political-economic center of gravity of the Achaemenids and the regulator of communication networks on the Persian Gulf coast. This event showed that the Achaemenids attached importance to their economic goals and oversight of their vast territory by the Persian Gulf. Methods: Book resources and field study.Keywords: Achaemenids, Bushehr, Persian Gulf, Tamukkana
Procedia PDF Downloads 19320765 Moodle-Based E-Learning Course Development for Medical Interpreters
Authors: Naoko Ono, Junko Kato
Abstract:
According to the Ministry of Justice, 9,044,000 foreigners visited Japan in 2010. The number of foreign residents in Japan was over 2,134,000 at the end of 2010. Further, medical tourism has emerged as a new area of business. Against this background, language barriers put the health of foreigners in Japan at risk, because they have difficulty in accessing health care and communicating with medical professionals. Medical interpreting training is urgently needed in response to language problems resulting from the rapid increase in the number of foreign workers in Japan over recent decades. Especially, there is a growing need in medical settings in Japan to speak international languages for communication, with Tokyo selected as the host city of the 2020 Summer Olympics. Due to the limited number of practical activities on medical interpreting, it is difficult for learners to acquire the interpreting skills. In order to eliminate the shortcoming, a web-based English-Japanese medical interpreting training system was developed. We conducted a literature review to identify learning contents, core competencies for medical interpreters by using Pubmed, PsycINFO, Cochrane Library, and Google Scholar. Selected papers were investigated to find core competencies in medical interpreting. Eleven papers were selected through literature review indicating core competencies for medical interpreters. Core competencies in medical interpreting abstracted from the literature review, showed consistency in previous research whilst the content of the programs varied in domestic and international training programs for medical interpreters. Results of the systematic review indicated five core competencies: (a) maintaining accuracy and completeness; (b) medical terminology and understanding the human body; (c) behaving ethically and making ethical decisions; (d) nonverbal communication skills; and (e) cross-cultural communication skills. We developed an e-leaning program for training medical interpreters. A Web-based Medical Interpreter Training Program which cover these competencies was developed. The program included the following : online word list (Quizlet), allowing student to study online and on their smartphones; self-study tool (Quizlet) for help with dictation and spelling; word quiz (Quizlet); test-generating system (Quizlet); Interactive body game (BBC);Online resource for understanding code of ethics in medical interpreting; Webinar about non-verbal communication; and Webinar about incompetent vs. competent cultural care. The design of a virtual environment allows the execution of complementary experimental exercises for learners of medical interpreting and introduction to theoretical background of medical interpreting. Since this system adopts a self-learning style, it might improve the time and lack of teaching material restrictions of the classroom method. In addition, as a teaching aid, virtual medical interpreting is a powerful resource for the understanding how actual medical interpreting can be carried out. The developed e-learning system allows remote access, enabling students to perform experiments at their own place, without being physically in the actual laboratory. The web-based virtual environment empowers students by granting them access to laboratories during their free time. A practical example will be presented in order to show capabilities of the system. The developed web-based training program for medical interpreters could bridge the gap between medical professionals and patients with limited English proficiency.Keywords: e-learning, language education, moodle, medical interpreting
Procedia PDF Downloads 366