Search results for: internet of things (IOT)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2135

Search results for: internet of things (IOT)

515 Hash Based Block Matching for Digital Evidence Image Files from Forensic Software Tools

Authors: M. Kaya, M. Eris

Abstract:

Internet use, intelligent communication tools, and social media have all become an integral part of our daily life as a result of rapid developments in information technology. However, this widespread use increases crimes committed in the digital environment. Therefore, digital forensics, dealing with various crimes committed in digital environment, has become an important research topic. It is in the research scope of digital forensics to investigate digital evidences such as computer, cell phone, hard disk, DVD, etc. and to report whether it contains any crime related elements. There are many software and hardware tools developed for use in the digital evidence acquisition process. Today, the most widely used digital evidence investigation tools are based on the principle of finding all the data taken place in digital evidence that is matched with specified criteria and presenting it to the investigator (e.g. text files, files starting with letter A, etc.). Then, digital forensics experts carry out data analysis to figure out whether these data are related to a potential crime. Examination of a 1 TB hard disk may take hours or even days, depending on the expertise and experience of the examiner. In addition, it depends on examiner’s experience, and may change overall result involving in different cases overlooked. In this study, a hash-based matching and digital evidence evaluation method is proposed, and it is aimed to automatically classify the evidence containing criminal elements, thereby shortening the time of the digital evidence examination process and preventing human errors.

Keywords: block matching, digital evidence, hash list, evaluation of digital evidence

Procedia PDF Downloads 255
514 The Needs of People with a Diagnosis of Dementia and Their Carers and Families

Authors: James Boag

Abstract:

The needs of people with a diagnosis of dementia and their carers and families are physical, psychosocial, and psychological and begin at the time of diagnosis. There is frequently a lack of emotional support and counselling. Care- giving support is required from the presentation of the first symptoms of dementia until death. Alzheimer's disease begins decades before the clinical symptoms begin to appear, and in many cases, it remains undiagnosed, or diagnosed too late for any possible interventions to have any effect. However, if an incorrect diagnosis is given, it may result in a person being treated, without effect, for a type of dementia they do not have and delaying the interventions they should have received. Being diagnosed with dementia can cause emotional distress to the person, and physical and emotional support is needed, which will become more important as the disease progresses. The severity of the patient's dementia and their symptoms has a bearing of the impact on the carer and the support needed. A lack of insight and /or a denial of the diagnosis, grief, reacting to anticipated future losses, and coping methods to maximise the disease outcome, are things that should be addressed. Because of the stigma, it is important for carers not to lose contact with family and others because social isolation leads to depression and burnout. The impact on a carer's well- being and quality of life can be influenced by the severity of the illness, its type of dementia, its symptoms, healthcare support, financial and social status, career, age, health, residential setting, and relationship to the patient. Carer burnout due to lack of support leads to people diagnosed with dementia being put into residential care prematurely. Often dementia is not recognised as a terminal illness, limiting the ability of the person diagnosed with dementia and their carers to work on advance care planning and getting access to palliative and other support. Many carers have been satisfied with the physical support they were given in their everyday life, however, it was agreed that there was an immense unmet need for psychosocial support, especially after diagnosis and approaching end of life. Providing continuity and coordination of care is important. Training is necessary for providers to understand that every case is different, and they should understand the complexities. Grief, the emotional response to loss, is suffered during the progression of the disease and long afterwards, and carers should continue to be supported after the death of the person they were caring for.

Keywords: dementia, caring, challenges, needs

Procedia PDF Downloads 97
513 The Impact of Online Advertising on Generation Y’s Purchase Decision in Malaysia

Authors: Mui Joo Tang, Eang Teng Chan

Abstract:

Advertising is commonly used to foster sales and reputation of an institution. It is at first the growth of print advertising that has increased the population and number of periodicals of newspaper and its circulation. The rise of Internet and online media has somehow blurred the role of media and advertising though the intention is still to reach out to audience and to increase sales. The relationship between advertising and audience on a product purchase through persuasion has been developing from print media to online media. From the changing media environment and audience, it is the concern of this research to study the impact of online advertising to such a relationship cycle. The content of online advertisements is much of text, multimedia, photo, audio and video. The messages of such content format may indeed bring impacts to its audience and its credibility. This study is therefore reflecting the effectiveness of online advertisement and its influences on generation Y in their purchasing behavior. This study uses Media Dependency Theory to analyze the relationship between the impact of online advertisement and media usage pattern of generation Y. Hierarchy of Effectiveness Model is used as a marketing communication model to study the effectiveness of advertising and further to determine the impact of online advertisement on generation Y in their purchasing decision making. This research uses online survey to reach out the sample of generation Y. The results have shown that online advertisements do not affect much on purchase decision making even though generation Y relies much on the media content including online advertisement for its information and believing in its credibility. There are few other external factors that may interrupt the effectiveness of online advertising. The very obvious influence of purchasing behavior is actually derived from the peers.

Keywords: generation Y, purchase decision, print media, online advertising, persuasion

Procedia PDF Downloads 527
512 Exploration of Correlation between Design Principles and Elements with the Visual Aesthetic in Residential Interiors

Authors: Ikra Khan, Reenu Singh

Abstract:

Composition is essential when designing the interiors of residential spaces. The ability to adopt a unique style of using design principles and design elements is another. This research report explores how the visual aesthetic within a space is achieved through the use of design principles and design elements while maintaining a signature style. It also observes the relationship between design styles and compositions that are achieved as a result of the implementation of the principles. Information collected from books and the internet helped to understand how a composition can be achieved in residential interiors by resorting to design principles and design elements as tools for achieving an aesthetic composition. It also helped determine the results of authentic representation of design ideas and how they make one’s work exceptional. A questionnaire survey was also conducted to understand the impact of a visually aesthetic residential interior of a signature style on the lifestyle of individuals residing in them. The findings denote a pattern in the application of design principles and design elements. Individual principles and elements or a combination of the same are used to achieve an aesthetically pleasing composition. This was supported by creating CAD illustrations of two different residential projects with varying approaches and design styles. These illustrations include mood boards, 3D models, and sectional elevations as rendered views to understand the concept design and its translation via these mediums. A direct relation is observed between the application of design principles and design elements to achieve visually aesthetic residential interiors that suit an individual’s taste. These practices can be applied when designing bespoke commercial as well as industrial interiors that are suited to specific aesthetic and functional needs.

Keywords: composition, design principles, elements, interiors, residential spaces

Procedia PDF Downloads 103
511 Effects of Application of Rice Husk Charcoal-Coated Urea and Rice Straw Compost on Growth, Yield, and Soil Properties of Rice

Authors: D. A. S. Gamage, B. F. A Basnayake, W. A. J. M. de Costa

Abstract:

Rice is one of the world’s most important cereals. Increasing food production both to meet in-country requirements and to help overcome food crises is one of the major issues facing Sri Lanka today. However, productive land is limited and has mostly been utilized either for food crop production or other uses. Agriculture plays an important and strategic role in the performance of Sri Lankan national economy. A variety of modern agricultural inputs have been introduced, namely ploughs and harvesters, pesticides, fertilizers and lime. Besides, there are several agricultural institutions developing and updating the management of agricultural sector. Modern agricultural inputs cooperate as a catalyst in raising the productivity. However, in the eagerness of gaining profits from the efficient and productive techniques, this modern agricultural input has affected the environment and living things especially those which have been blended from various chemical substance. The increased pressure to maintain a high level of rice output for consumption has resulted in increased use of pesticides and inorganic fertilizer on rice fields in Sri Lanka. The application of inorganic fertilizer has become a burdened to the country in many ways. The excessive reuse of the ground water resources with a considerable application of organic and chemical fertilizers will lead to a deterioration of the quality and quantity of water. Biochar is a form of charcoal produced through the heating of natural organic materials. It has received significant attention recently for its potential as a soil conditioner, a fertilizer and as a means of storing carbon in a sustainable manner. It is the best solution for managing the agricultural wastes while providing a useful product for increasing agricultural productivity and protecting the environment. The objective of this study was to evaluate rice husk charcoal coated urea as a slow releasing fertilizer and compare the total N, P, K, organic matter in soil and yield of rice production.

Keywords: biochar, paddy husk, soil conditioner, rice straw compost

Procedia PDF Downloads 351
510 Gulfnet: The Advent of Computer Networking in Saudi Arabia and Its Social Impact

Authors: Abdullah Almowanes

Abstract:

The speed of adoption of new information and communication technologies is often seen as an indicator of the growth of knowledge- and technological innovation-based regional economies. Indeed, technological progress and scientific inquiry in any society have undergone a particularly profound transformation with the introduction of computer networks. In the spring of 1981, the Bitnet network was launched to link thousands of nodes all over the world. In 1985 and as one of the first adopters of Bitnet, Saudi Arabia launched a Bitnet-based network named Gulfnet that linked computer centers, universities, and libraries of Saudi Arabia and other Gulf countries through high speed communication lines. In this paper, the origins and the deployment of Gulfnet are discussed as well as social, economical, political, and cultural ramifications of the new information reality created by the network. Despite its significance, the social and cultural aspects of Gulfnet have not been investigated in history of science and technology literature to a satisfactory degree before. The presented research is based on an extensive archival research aimed at seeking out and analyzing of primary evidence from archival sources and records. During its decade and a half-long existence, Gulfnet demonstrated that the scope and functionality of public computer networks in Saudi Arabia have to be fine-tuned for compliance with Islamic culture and political system of the country. It also helped lay the groundwork for the subsequent introduction of the Internet. Since 1980s, in just few decades, the proliferation of computer networks has transformed communications world-wide.

Keywords: Bitnet, computer networks, computing and culture, Gulfnet, Saudi Arabia

Procedia PDF Downloads 245
509 Algerian EFL Students' Perceptions towards the Development of Writing through Weblog Storytelling

Authors: Nawel Mansouri

Abstract:

Weblog as a form of internet-based resources has become popular as an authentic and constructive learning tool, especially in the language classroom. This research explores the use of weblog storytelling as a pedagogical tool to develop Algerian EFL students’ creative writing. This study aims to investigate the effectiveness of weblog- writing and the attitudes of both Algerian EFL students and teachers towards weblog storytelling. It also seeks to explore the potential benefits and problems that may affect the use of weblog and investigate the possible solutions to overcome the problems encountered. The research work relies on a mixed-method approach which combines both qualitative and quantitative methods. A questionnaire will be applied to both EFL teachers and students as a means to obtain preliminary data. Interviews will be integrated in accordance with the primary data that will be gathered from the questionnaire with the aim of validating its accuracy or as a strategy to follow up any unexpected results. An intervention will take place on the integration of weblog- writing among 15 Algerian EFL students for a period of two months where students are required to write five narrative essays about their personal experiences, give feedback through the use of a rubric to two or three of their peers, and edit their work based on the feedback. After completion, questionnaires and interviews will also take place as a medium to obtain both the students’ perspectives towards the use of weblog as an innovative teaching approach. This study is interesting because weblog storytelling has recently been emerged as a new form of digital communication and it is a new concept within Algerian context. Furthermore, the students will not just develop their writing skill through weblog storytelling but it can also serve as a tool to develop students’ critical thinking, creativity, and autonomy.

Keywords: Weblog writing, EFL writing, EFL learners' attitudes, EFL teachers' views

Procedia PDF Downloads 174
508 US-Iran Hostage Crisis by the Metaphor of Argo in the Light of Post-Modernist Post-Colonial and Realist Theories

Authors: Hatice Idil Gorgen

Abstract:

This paper argues that discourses and textuality which is literary tool of Western ethnocentrism create aggressive foreign policy against the West by Non-West countries. Quasi-colonial experiences create an inferiority complex on officially or not colonized areas by reconstructing their identity. This reconstructed identity leads revolution and resistance movement to feel secure themselves as a psychological defense against colonial powers. Knowledge learned by successful implementation of discourses grants right to has power for authority, in addition to serving as a tool to reinforce power of authority by its cognitive traits on foreign policy decision making. The combination of these points contributes to shaping and then make predictable state policies. In the methodology of paper, secondary data was firstly reviewed through university library using a range of sources such as academic abstract, OPAC system, bibliography databases and internet search engines. The film of Argo was used to strengthen and materialize theoretical explanations as a metaphor. This paper aims to highlight the cumulative effects on the construction of the identity throughout embedded discourses by textuality. To demonstrate it by a metaphor, Argo will be used as a primary source for good story-telling about history. U.S-Iran hostage crisis is mainly applied by aiming to see foundations Iran’s behavior in the context of its revolutionary identity and major influences of actions of U.S on it.

Keywords: discourse, post colonialism, post modernism, objectivity

Procedia PDF Downloads 160
507 A Study of Behaviors in Using Social Networks of Corporate Personnel of Suan Sunandha Rajabhat University

Authors: Wipada Chaiwchan

Abstract:

This research aims to study behaviors in using social networks of Corporate personnel of Suan Sunandha Rajabhat University. The sample used in the study were two groups: 1) Academic Officer 70 persons and 2) Operation Officer 143 persons were used in this study. The tools in this research consisted of questionnaire which the data were analyzed by using percentage, average (X) and Standard deviation (S.D.) and Independent Sample T-Test to test the difference between the mean values obtained from two independent samples, and One-way anova to analysis of variance, and Multiple comparisons to test that the average pair of different methods by Fisher’s Least Significant Different (LSD). The study result found that the most of corporate personnel have purpose in using social network to information awareness aspect was knowledge and online conference with social media. By using the average more than 3 hours per day in everyday. Using time in working in one day and there are computers connected to the Internet at home, by using the communication in the operational processes. Behaviors using social networks in relation to gender, age, job title, department, and type of personnel. Hypothesis testing, and analysis of variance for the effects of this analysis is divided into three aspects: The use of online social networks, the attitude of the users and the security analysis has found that Corporate Personnel of Suan Sunandha Rajabhat University. Overall and specifically at the high level, and considering each item found all at a high level. By sorting of the social network (X=3.22), The attitude of the users (X= 3.06) and the security (X= 3.11). The overall behaviors using of each side (X=3.11).

Keywords: social network, behaviors, social media, computer information systems

Procedia PDF Downloads 394
506 Post-Islamic Utopias, Contentious Memory and the Revolutionary Mobilization in Iran

Authors: Saeed Saffar-Heidari

Abstract:

This article aims to study the recent Iranian national uprising of “Women, Life, Freedom” as a site of memory which renders the political possibility of imagining the post-Islamic futures in Iran. “Women, Life, Freedom” movement in Iran has been arguably the most pervasive social movement since the Islamic Revolution (1979) as it has posed serious issues and conflicts for the present Islamic state in Iran. The core argument of this article, however, is oriented toward the critical role of collective memory as a means of political transition and revolutionary mobilization. “Women, Life, Freedom” movement, among other things, has revitalized the popular binary opposition of pre-1979 and post-1979 Iran through which the Ancien Régime or the pre-1979 era is likely to be interpreted, read, and remembered in terms of present post-1979 cultural and political demands. As remembering involves everyday participation in shaping and reshaping the past through new codes, criteria, and values, it is argued that the presentist refashioning and remembering of the pre-1979 monarchical era has been one of the major facilitatory forces for the on-going revolutionary mobilization in Iran. The construction of the pre-1979 memory and the return of the dynastic specter has played a significant role in revolutionary mobilization as it has provided the protesters with the possible perspectives of post-Islamic regime in Iran. Additionally, the question of compulsory “Hijab” (veiling) as the prime mover of "Women, Life, Freedom” movement in Iran has strongly contributed to the everyday comparative discourse of pre/post 1979 memory. According to this presentist remembering of pre-1979, the Pahlavi dynasty would be conceived as a symbol of modernization, westernization, secularization, and non-compulsory Hijab. While the memory of the pre-revolutionary Iran is genuinely an imaginative as well as a constructed entity that finally culminates in the public condemnation of the very Islamic revolution (1979), it serves the enrichment of the Iranian political imagination as it paves the ways for the revolutionary mobilization and then the overthrowing of the Islamic regime in Iran. This article makes a case for the ways that the public narrative and discourse around the Islamic regime (especially the Islamic Hijab) led to the refashioning of the memory of pre-1979 era and inspired he revolutionary mobilization in Iran.

Keywords: post-islamic, utopias, memory, revolutionary, mobilization, Iran

Procedia PDF Downloads 120
505 Improving Medication Understanding, Use and Self-Efficacy among Stroke Patients: A Randomised Controlled Trial; Study Protocol

Authors: Jamunarani Appalasamy, Tha Kyi Kyi, Quek Kia Fatt, Joyce Pauline Joseph, Anuar Zaini M. Zain

Abstract:

Background: The Health Belief Theory had always been associated with chronic disease management. Various health behaviour concepts and perception branching from this Health Belief Theory had involved with medication understanding, use, and self-efficacy which directly link to medication adherence. In a previous quantitative and qualitative study, stroke patients in Malaysia were found to be strongly believing information obtained by various sources such as the internet and social communication. This action leads to lower perception of their stroke preventative medication benefit which in long-term creates non-adherence. Hence, this study intends to pilot an intervention which uses audio-visual concept incorporated with mHealth service to enhance learning and self-reflection among stroke patients to manage their disease. Methods/Design: Twenty patients will be allocated to a proposed intervention whereas another twenty patients are allocated to the usual treatment. The intervention involves a series of developed audio-visual videos sent via mobile phone which later await for responses and feedback from the receiver (patient) via SMS or recorded calls. The primary outcome would be the medication understanding, use and self-efficacy measured over two months pre and post intervention. Secondary outcome is measured from changes of blood parameters and other self-reported questionnaires. Discussion: This study shall also assess uptake/attrition, feasibility, and acceptability of this intervention. Trial Registration: NMRR-15-851-24737 (IIR)

Keywords: health belief, medication understanding, medication use, self-efficacy

Procedia PDF Downloads 220
504 Comparing Three Complementary Interventions (Mindfulness-Meditation, Gratitude, and Affirmations) in the Context of Stress

Authors: Regina Bowler

Abstract:

Rationale & Aims: Complementary interventions such as mindfulness-meditation, gratitude, and self-affirmation are often used by therapists to treat stress. Many studies have been conducted using these interventions either individually or adjunctively with regard to stress. However, there has been little work comparing these interventions to investigate which of them is the most effective in treating stress. This study aims to compare these interventions and to determine which of them has the strongest perceived and physiological impact on stress. Participants: 120 law students preparing to take the bar exam: 3 experimental groups of 30 individuals, 1 control group of 30 individuals. Methods: One day prior to administering the interventions, baseline salivary cortisol samples will be taken, and the participants will complete the perceived stress scale (Cohen et al., 1983). Thirty days prior to the bar exam, each experimental group will be given an intervention to practice. Interventions will be practiced once in the morning after waking and once at night at bedtime. In group one, each participant will do a recorded three-minute mindfulness meditation. In group two, each participant will practice gratitude by writing down three things he/she/they are grateful for. In group three, each participant will practice affirmation by writing three sentences affirming his/her/their core values. The control group will not have an intervention to practice. Starting experimental day 1, upon waking and prior to practicing the intervention, the participants will take a salivary cortisol sample. Then they will practice their given intervention. Every night, before going to bed, the participants will practice their given intervention for a second time. The participants will practice their interventions and take salivary cortisol samples for 28 days. After each seven-day period (days 7, 14, 21, 28), the participants will fill out a brief questionnaire about the effects their intervention has on their stress, daily life, and relationships with themselves and others. On day 29, the participants will take a final salivary cortisol sample and will fill out the Perceived Stress Scale (Cohen et al., 1983). Applications of findings: Findings from this study would inform therapists of best practices when working with clients with stress. Moreover, therapists will gain knowledge of how individuals perceive these interventions and their impact on stress, daily life, somatic symptoms, and relationships with self and others. Thus, therapists will be able to administer these interventions with more precision to the stress-related contexts and issues their clients bring.

Keywords: stress, mindfulness-meditation, gratitude, affirmations, complementary interventions

Procedia PDF Downloads 42
503 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy

Authors: Neda Seyyedi, Reza Berangi

Abstract:

Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.

Keywords: VOIP networks, flooding attacks, entropy, computer networks

Procedia PDF Downloads 405
502 The Research of Students Internet in Choosing the Technical and Professional Course in Izeh: Educational Year 2001-2002

Authors: Seyyed Kavous Abbasi

Abstract:

Technical and professional branch is a subcategory of high school educational system. It deals with the programs which have been designed for the promotion of applied science and necessary skill and growth of potential talents in students. The purpose of performance of this branch is preparing of preponderance of in police in different section of industries and service. The aim of this research is the survey of group relation family, economic, educational and individual factors and the student's tendency toward technical professional courses. The method of the study is descriptive survey. 195 subjects were chosen randomly from all the male and female students of technical and professional school in Izeh. Instrument for this research was research-made questionnaire consisting of 22 questions on the base of likers spectrum. The reliability of this questionnaire has been estimated 0.8. Analyses of research data has been performed in two levels of descriptive and inferential statistics. Analyses of data has shown that the family factors with average of 3.12, individual factors 3.95, economic factors 3.92 and educational factors 3.57 more than middle level have more effects , in comparison with the factor of group relation with average of 2.79 less than average level in tendency the technical and professional course . Comparison of effective factors in tendency to technical and professional course has shown that individual factors had the most effects and the group relation factors had the least effects. Comparison between male and female subject's ideas showed that there is a different between their ideas about economics and family factors.

Keywords: high school, relation family, individual factors, analysis interest

Procedia PDF Downloads 245
501 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment

Authors: Wen Shyong Hsieh, Chih Hsueh Lin

Abstract:

In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.

Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication

Procedia PDF Downloads 391
500 Realising the Socio-Economic Rights of Refugees Under Human Rights Law: A Case Study of South Africa

Authors: Taguekou Kenfack Alexie

Abstract:

For a long time, refugee protection has constituted one of the main concerns of the international community as a whole and for the South African government in particular.The focus of this paper is on the challenges refugees face in accessing their rights in South Africa. In particular, it analyses the legal framework for the protection of the socio economic rights of refugees under international law, regional and domestic law and the extent to which the rights have been realized. The main hypothesis of the study centered on the fact that the social protection of refugees in South Africa is in conformity with international standards. To test this hypothesis, the qualitative research method was applied. Refugee related legal instruments were analyzed as well as academic publications, organizational reports and internet sources. The data analyzed revealed that there has been enormous progress in meeting international standards in the areas of education, emergency relief and assistance, protection of women and refugee children. The results also indicated that much remain to be desired in such areas as nutrition, shelter, health care, freedom of movement and very importantly, employment and social security. The paper also seeks to address the obstacles which prevent the proper treatment of refugees and to make recommendations as how the South African government can better regulate the treatment of refugees living in its territory.Recommendations include the amendment of the legal instruments that provide the normative framework for protection and improvement of protection policies to reflect the changing dynamics.

Keywords: international community, refugee, socioeconomic rights, social protection

Procedia PDF Downloads 282
499 English Test Success among Syrian Refugee Girls Attending Language Courses in Lebanon

Authors: Nina Leila Mussa

Abstract:

Background: The devastating effects of the war on Syria’s educational infrastructure has been widely reported, with millions of children denied access. However, among those who resettled in Lebanon, the impact of receiving educational assistance on their abilities to pass the English entrance exam is not well described. The aim of this study was to identify predictors of success among Syrian refugees receiving English language courses in a Lebanese university. Methods: The database of Syrian refugee girls matriculated in English courses at the American University of Beirut (AUB) was reviewed. The study period was 7/2018-09/2020. Variables compared included: family size and income, welfare status, parents’ education, English proficiency, access to the internet, and need for external help with homework. Results: For the study period, there were 28 girls enrolled. The average family size was 6 (range 4-9), with eight having completed primary, 14 secondary education, and 6 graduated high school. Eighteen were single-income families. After 12 weeks of English courses, 16 passed the Test of English as Foreign Language (TOEFL) from the first attempt, and 12 failed. Out of the 12, 8 received external help, and 6 passed on the second attempt, which brings the total number of successful passing to 22. Conclusion: Despite the tragedy of war, girls receiving assistance in learning English in Lebanon are able to pass the basic language test. Investment in enhancing those educational experiences will be determinantal in achieving widespread progress among those at-risk children.

Keywords: refugee girls, TOEFL, education, success

Procedia PDF Downloads 123
498 Using Indigenous Knowledge Systems in Teaching Early Literacy: A Case Study of Zambian Public Preschools

Authors: Ronald L. Kaunda

Abstract:

The education system in Zambia still bears scars of colonialism in the area of policy, curriculum and implementation. This historical context resulted in the failure by the Government of the Republic of Zambia to achieve literacy goals expected among school going children. Specifically, research shows that the use of English for initial literacy and Western based teaching methods to engage learners in literacy activities at lower levels of education including preschool has exacerbated this situation. In 2014, the Government of the Republic of Zambia implemented a new curriculum that, among others things, required preschool teachers to use local and cultural materials and familiar languages for early literacy teaching from preschool to grade 4. This paper presents findings from a study that sought to establish ways in which preschool teachers use Zambian Indigenous knowledge systems and Indigenous teaching strategies to support literacy development among preschool children. The study used Indigenous research methodology for data collection and iterative feature of Constructivist Grounded Theory (CGT) in the data collection process and analysis. This study established that, as agents of education, preschool teachers represented community adult educators because of some roles which they played beyond their academic mandate. The study further found that classrooms as venues of learning were equipped with learning corners reflecting Indigenous literacy materials and Indigenous ways of learning. Additionally, the study found that learners were more responsive to literacy lessons because of the use of familiar languages and local contextualized environments that supported their own cultural ways of learning. The study recommended that if the education system in Zambia is to be fully inclusive of Indigenous knowledge systems and cultural ways of learning, the education policy and curriculum should include conscious steps on how this should be implemented at the classroom level. The study further recommended that more diverse local literacy materials and teaching aids should be produced for use in the classroom.

Keywords: agents of learning, early literacy, indigenous knowledge systems, venues of education

Procedia PDF Downloads 166
497 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 108
496 Inappropriate Antibiotic Use: An Online Survey in Thailand

Authors: Surarong Chinwong, Namthip Intarakumhang Na Rachasima, Siyaporn Kuikhiew, Dujrudee Chinwong

Abstract:

Irrational use of medicines is a major problem in public health. Half of all patients take medicines incorrectly. An inappropriate use of antibiotics is one of the common types of irrational medicine use; for example, patients use antibiotic for treatment of common cold or diarrhea. Objectives: This cross-sectional study aimed to investigate the behaviors on antibiotic use, using amoxicillin and norfloxacin as examples, as well as sources of received health information. Methods: An online self-administered questionnaire was used to collect data from participants in Thailand between September and December 2015. Participants were asked about their behaviors on antibiotic use. Data were analyzed using descriptive statistics. Results: Of all 405 participants, most were female (65.3 %), aged 18-30 years (49.4 %), undergraduate or lower (69.7%), and civil servant or state enterprises (31.7 %). We found inappropriate behaviors in use of amoxicillin or norfloxacin: 1) there were 201/400 participants (50.3%) taking amoxicillin right away in case of having a common cold, such as having sore throat, running nose, and cough; 2) there were 170/405 participants (42.0%) using amoxicillin for relieving inflammatory symptoms, e.g. muscle inflammation or osteoarthritis; 3) there were 71/398 participants (17.8%) using amoxicillin as a muscle relaxant; 4) there were 135/398 participants (33.9%) using norfloxacin for treating diarrhea. Sources of health information received by the participants were from the internet (78.5%), the radio and/or television (42.2%), advertising publishing (33.3 %), and word of mouth (30.1%). Conclusion: This study showed improper behaviors in antibiotic use especially amoxicillin and norfloxacin. Health care providers including pharmacists should raise the public awareness on dangers of inappropriate antibiotic use and promote the rational use of antibiotics.

Keywords: antibiotic use, amoxicillin, norfloxacin, rational drug use

Procedia PDF Downloads 273
495 Philippine National Police Strategies in the Implementation of 'Peace and Order Agenda for Transformation and Upholding of the Rule-Of-Law' Plan 2030

Authors: Ruby A. L. Espineli

Abstract:

The study assessed the Philippine National Police strategies in the implementation of ‘Peace and Order Agenda for Transformation and Upholding of the Rule-of-Law’ P.A.T.R.O.L Plan 2030. Its operational roadmap presents four perspectives which include resource management, learning and growth, process excellence; and community. Focused group discussion, observation, and distribution of survey questionnaire to selected PNP officers and community members were done to identify and describe the implementation, problems encountered and measures to address the problems of the PNP P.A.T.R.O.L Plan 2030. In resource management, PNP allocates most sufficient funds in providing service firearms, patrol vehicle, and internet connections. In terms of learning and growth, the attitude of PNP officers is relatively higher than their knowledge and skills. Moreover, in terms of process excellence, the PNP use several crime preventions and crime solution strategies to deliver an immediate response to calls of the community. As regards, community perspective, PNP takes effort in establishing partnership with community. It is also interesting to note that PNP officers and community were both undecided on the existence of problems encountered in the implementation of P.A.T.R.O.L Plan 2030. But, they had proactive behavior as they agreed on all the specified measures to address the problems encountered in implementation of PNP P.A.T.R.O.L. Plan 2030. A strategic framework, based on the findings was formulated in this study that could improve and entrench the harmonious working relationship between the PNP and stakeholders in the enhancement of the implementation of PNP P.A.T.R.O.L. Plan 2030.

Keywords: community perspectives, learning and growth, process excellence, resource management

Procedia PDF Downloads 235
494 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security

Authors: Magdalena Musiał-Karg

Abstract:

The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.

Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)

Procedia PDF Downloads 240
493 Study of Personality, Fear of Negative Evaluation and Life-Orientation in Convicts and Under-Trials

Authors: Sneh Laller, Kamini C. Tanwar

Abstract:

Human beings are social animals. The scenario is changing and people become angry towards petty things and this may lead to committing a crime. Objective: The aim of the present research is: 1. To find out the difference between convicts and under-trials on different dimensions of Personality, Fear of Negative Evaluation (FNE) and Life-orientation; 2. To find out the difference between male and female jail inmates on different dimensions of Personality, Fear of Negative Evaluation (FNE) and Life-orientation; 3. To find out the relationship between different dimensions of Personality, Fear of Negative Evaluation (FNE) and Life-orientation in convicts and under-trials; 4. To find out the relationship between different dimensions of Personality, Fear of Negative Evaluation (FNE) and Life-orientation in male and female jail inmates. Method: The study was conducted on 100 participants (consisting of 50 convicts- 25 males and 25 females, and 50 under-trials- 25 males and 25 females); age range was 20-60 years. The NEO Five-Factor Inventory-3 by McCrae, Costa (2010), Brief Fear of Negative Evaluation scale- II by Leary (1983) and Life Orientation Test-R by Scheier et al. (1994) was used and purposive sampling technique was done for data collection. The t-test was applied to find out the comparison and Pearson correlation was applied to determine the relationship between personality, FNE and life-orientation in both the groups. Results: There is a significant difference in the dimension of personality that is neuroticism and life-orientation in convicts and under-trials and also, in the dimensions of personality such as neuroticism, extraversion, openness to experience and agreeableness, and FNE in male and female jail inmates. In convicts the dimension of personality, agreeableness shows significant positive correlation with life-orientation (r = 0.430**) whereas, in under-trials the dimension of personality, agreeableness shows significant positive correlation with FNE (r = 0.315*) and another dimension of personality, extraversion shows significant negative correlation with life-orientation (r = -0.409**). In male jail inmates, the dimension of personality, agreeableness shows significant positive correlation with FNE (r = 0.474**) whereas in female jail inmates, the dimension of personality, openness to experience shows significant negative correlation with FNE (r = -0.356*) and significant positive correlation of neuroticism with life-orientation (r = 0.292*). Conclusion: It was found that under-trials are neurotic and life-oriented than convicts, and female jail inmates are also neurotic and exhibit fear of negative evaluation whereas male jail inmates are extravert and agreeable.

Keywords: convicts, fear of negative evaluation, life-orientation, personality, under-trials

Procedia PDF Downloads 160
492 Design of Effective Decoupling Point in Build-To-Order Systems: Focusing on Trade-Off Relation between Order-To-Delivery Lead Time and Work in Progress

Authors: Zhiyong Li, Hiroshi Katayama

Abstract:

Since 1990s, e-commerce and internet business have been grown gradually over the word and customers tend to express their demand attributes in terms of specification requirement on parts, component, product structure etc. This paper deals with designing effective decoupling points for build to order systems under e-commerce environment, which can be realized through tradeoff relation analysis between two major criteria, customer order lead time and value of work in progress. These KPIs are critical for successful BTO business, namely time-based service effectiveness on coping with customer requirements for the first issue and cost effective ness with risk aversive operations for the second issue. Approach of this paper consists of investigation of successful business standing for BTO scheme, manufacturing model development of this scheme, quantitative evaluation of proposed models by calculation of two KPI values under various decoupling point distributions and discussion of the results brought by pattern of decoupling point distribution, where some cases provide the pareto optimum performances. To extract the relevant trade-off relation between considered KPIs among 2-dimensional resultant performance, useful logic developed by former research work, i.e. Katayama and Fonseca, is applied. Obtained characteristics are evaluated as effective information for managing BTO manufacturing businesses.

Keywords: build-to-order (BTO), decoupling point, e-commerce, order-to-delivery lead time (ODLT), work in progress (WIP)

Procedia PDF Downloads 325
491 Comparison of Risk Analysis Methodologies Through the Consequences Identification in Chemical Accidents Associated with Dangerous Flammable Goods Storage

Authors: Daniel Alfonso Reséndiz-García, Luis Antonio García-Villanueva

Abstract:

As a result of the high industrial activity, which arises from the search to satisfy the needs of products and services for society, several chemical accidents have occurred, causing serious damage to different sectors: human, economic, infrastructure and environmental losses. Historically, with the study of this chemical accidents, it has been determined that the causes are mainly due to human errors (inexperienced personnel, negligence, lack of maintenance and deficient risk analysis). The industries have the aim to increase production and reduce costs. However, it should be kept in mind that the costs involved in risk studies, implementation of barriers and safety systems is much cheaper than paying for the possible damages that could occur in the event of an accident, without forgetting that there are things that cannot be replaced, such as human lives.Therefore, it is of utmost importance to implement risk studies in all industries, which provide information for prevention and planning. The aim of this study is to compare risk methodologies by identifying the consequences of accidents related to the storage of flammable, dangerous goods for decision making and emergency response.The methodologies considered in this study are qualitative and quantitative risk analysis and consequence analysis. The latter, by means of modeling software, which provides radius of affectation and the possible scope and magnitude of damages.By using risk analysis, possible scenarios of occurrence of chemical accidents in the storage of flammable substances are identified. Once the possible risk scenarios have been identified, the characteristics of the substances, their storage and atmospheric conditions are entered into the software.The results provide information that allows the implementation of prevention, detection, control, and combat elements for emergency response, thus having the necessary tools to avoid the occurrence of accidents and, if they do occur, to significantly reduce the magnitude of the damage.This study highlights the importance of risk studies applying tools that best suited to each case study. It also proves the importance of knowing the risk exposure of industrial activities for a better prevention, planning and emergency response.

Keywords: chemical accidents, emergency response, flammable substances, risk analysis, modeling

Procedia PDF Downloads 91
490 Computer Science, Mass Communications, and Social Entrepreneurship: An Interdisciplinary Approach to Teaching Interactive Storytelling for the Greater Good

Authors: Susan Cardillo

Abstract:

This research will consider ways to bridge the gap between Computer Science and Media Communications and while doing so create Social Entrepreneurship for student success. New Media, as it has been referred to, is considered content available on-demand through Internet, a digital device, usually containing some kind of interactivity and creative participation. It is the interplay between technology, images, media and communications. The next generation of the newspaper, radio, television, and film students need to have a working knowledge of the technologies that are available for the creation of their work and taught to use this knowledge to create a voice. The work is interdisciplinary; in communications, we understand the necessity of reporting and disseminating information. In documentary film we understand the instructional and historic aspects of media and technology and in the non-profit sector, we see the need for expanding outlets for good. So, the true necessity is to utilize ‘new media’ technologies to advance social causes while reporting information, teaching and creating art. Goals: The goal of this research is to give communications students a better understanding of the technology that is both, currently at their disposal, and on the horizon, so that they can use it in their media, communications and art endeavors to be a voice for their generation. There is no longer a need to be a computer scientist to have a working knowledge of communication technologies and how they will benefit our work. There are many free and easy to use applications available for the creation of interactive communications. Methodology: This is Qualitative-Case Study that puts these ideas into action. There is a survey at the end of the experiment that is qualitative in nature and allows for the participants to share ideas and feelings about the technology and approach.

Keywords: interactive storytelling, web documentary, mass communications, teaching

Procedia PDF Downloads 280
489 Iris Cancer Detection System Using Image Processing and Neural Classifier

Authors: Abdulkader Helwan

Abstract:

Iris cancer, so called intraocular melanoma is a cancer that starts in the iris; the colored part of the eye that surrounds the pupil. There is a need for an accurate and cost-effective iris cancer detection system since the available techniques used currently are still not efficient. The combination of the image processing and artificial neural networks has a great efficiency for the diagnosis and detection of the iris cancer. Image processing techniques improve the diagnosis of the cancer by enhancing the quality of the images, so the physicians diagnose properly. However, neural networks can help in making decision; whether the eye is cancerous or not. This paper aims to develop an intelligent system that stimulates a human visual detection of the intraocular melanoma, so called iris cancer. The suggested system combines both image processing techniques and neural networks. The images are first converted to grayscale, filtered, and then segmented using prewitt edge detection algorithm to detect the iris, sclera circles and the cancer. The principal component analysis is used to reduce the image size and for extracting features. Those features are considered then as inputs for a neural network which is capable of deciding if the eye is cancerous or not, throughout its experience adopted by many training iterations of different normal and abnormal eye images during the training phase. Normal images are obtained from a public database available on the internet, “Mile Research”, while the abnormal ones are obtained from another database which is the “eyecancer”. The experimental results for the proposed system show high accuracy 100% for detecting cancer and making the right decision.

Keywords: iris cancer, intraocular melanoma, cancerous, prewitt edge detection algorithm, sclera

Procedia PDF Downloads 503
488 A Study to Explore the Views of Students regarding E-Learning as an Instructional Tool at University Level

Authors: Zafar Iqbal

Abstract:

This study involved students of 6th semester enrolled in a Bachelor of Computer Science Program at university level. In this era of science and technology, e-learning can be helpful for grassroots in providing them access to education tenant in less developed areas. It is a potential substitute of face-to-face teaching being used in different countries. The purpose of the study was to explore the views of students about e-learning (Facebook) as an instructional tool. By using purposive sampling technique an intact class of 30 students included both male and female were selected where e-learning was used as an instructional tool. The views of students were explored through qualitative approach by using focus group interviews. The approach was helpful to develop comprehensive understanding of students’ views towards e- learning. In addition, probing questions were also asked and recorded. Data was transcribed, generated nodes and then coded text against these nodes. For this purpose and further analysis, NVivo 10 software was used. Themes were generated and tangibly presented through cluster analysis. Findings were interesting and provide sufficient evidence that face book is a subsequent e-learning source for students of higher education. Students acknowledged it as best source of learning and it was aligned with their academic and social behavior. It was not time specific and therefore, feasible for students who work day time and can get on line access to the material when they got free time. There were some distracters (time wasters) reported by the students but can be minimized by little effort. In short, e-learning is need of the day and potential learning source for every individual who have access to internet living at any part of the globe.

Keywords: e-learning, facebook, instructional tool, higher education

Procedia PDF Downloads 374
487 Community-Based Assessment Approach to Empower Child with Disabilities: Institutional Study on Deaf Art Community in Yogyakarta, Indonesia

Authors: Mukhamad Fatkhullah, Arfan Fadli, Marini Kristina Situmeang, Siti Hazar Sitorus

Abstract:

The emergence of a community of people with disabilities along with the various works produced has made great progress to open the public eye to their existence in society. This study focuses attention on a community that is suspected to be one of the pioneers in pursuing the movement. It is Deaf Art Community (DAC), a community of persons with disabilities based in Yogyakarta, with deaf and speech-impaired members who use sign language in everyday communication. Knowing the movement of disabled communities is a good thing, the description of the things behind it then important to know as the basis for initiating similar movements. This research focuses on the question of how community of people with disabilities begin to take shape in different regions and interact with collaborative events. Qualitative method with in-depth interview as data collection techniques was used to describe the process of formation and the emergence of community. The analytical unit in the study initially focuses on the subject in the community, but in the process, it develops to institutional analysis. Therefore some informants were determined purposively and expanded using the snowball technique. The theory used in this research is Phenomenology of Alfred Schutz to be able to see reality from the subject and institutional point of view. The results of this study found that the community is formed because the existing educational institutions (both SLB and inclusion) are less able to empower and make children with disabilities become equal with the society. Through the SLB, the presence of children with disabilities becomes isolated from the society, especially in children of his or her age. Therefore, discrimination and labeling will never be separated from society's view. Meanwhile, facilities for the basic needs of children with disabilities can not be fully provided. Besides that, the guarantee of discrimination, glances, and unpleasant behavior from children without disability does not exist, which then indicates that the existing inclusion schools offer only symbolic acceptance. Thus, both in SLB and Inclusive Schools can not empower children with disabilities. Community-based assistance, in this case, has become an alternative to actually empowering children with disabilities. Not only giving them a place to interact, through the same community, children with disabilities will be guided to discover their talents and develop their potential to be self-reliant in the future.

Keywords: children with disabilities, community-based assessment, community empowerment, social equity

Procedia PDF Downloads 263
486 Gold, Power, Protest, Examining How Digital Media and PGIS are Used to Protest the Mining Industry in Colombia

Authors: Doug Specht

Abstract:

This research project sought to explore the links between digital media, PGIS and social movement organisations in Tolima, Colombia. The primary aim of the research was to examine how knowledge is created and disseminated through digital media and GIS in the region, and whether there exists the infrastructure to allow for this. The second strand was to ascertain if this has had a significant impact on the way grassroots movements work and produce collective actions. The third element is a hypothesis about how digital media and PGIS could play a larger role in activist activities, particularly in reference to the extractive industries. Three theoretical strands have been brought together to provide a basis for this research, namely (a) the politics of knowledge, (b) spatial management and inclusion, and (c) digital media and political engagement. Quantitative data relating to digital media and mobile internet use was collated alongside qualitative data relating to the likelihood of using digital media in activist campaigns, with particular attention being given to grassroots movements working against extractive industries in the Tolima region of Colombia. Through interviews, surveys and GIS analysis it has been possible to build a picture of online activism and the role of PPGIS within protest movement in the region of Tolima, Colombia. Results show a gap between the desires of social movements to use digital media and the skills and finances required to implement programs that utilise it. Maps and GIS are generally reserved for legal cases rather than for informing the lay person. However, it became apparent that the combination of digital/social media and PPGIS could play a significant role in supporting the work of grassroots movements.

Keywords: PGIS, GIS, social media, digital media, mining, colombia, social movements, protest

Procedia PDF Downloads 427