Search results for: substance users
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2920

Search results for: substance users

1300 A Step-by-Step Analytical Protocol For Detecting and Identifying Minor Differences In Like Materials and Polymers Using Pyrolysis -Gas Chromatography/Mass Spectrometry Technique

Authors: Athena Nguyen, Rojin Belganeh

Abstract:

Detecting and identifying differences in like polymer materials are key factors in failure and deformulation analysis, and reverse engineering. Pyrolysis-GC/MS is an easy solid sample introduction technique which expands the application areas of gas chromatography and mass spectrometry. The Micro furnace pyrolyzer is directly interfaced with the GC injector preventing any potential of cold spot, carryover, and cross contamination. In this presentation, the analysis of the differences in three polystyrene samples is demonstrated. Although the three samples look very similar by Evolve gas analysis (EGA) and Flash pyrolysis, there are indications of small levels of other materials. By performing Thermal desorption-GC/MS, the additive compounds between samples show the differences. EGA, flash pyrolysis, and thermal desorption analysis are the different modes of operations of the micro-furnace pyrolyzer enabling users to perform multiple analytical techniques.

Keywords: Gas chromatography/Mass spectrometry, pyrolysis, pyrolyzer, thermal desorption-GC/MS

Procedia PDF Downloads 183
1299 Factors of Social Network Platform Usage and Privacy Risk: A Unified Theory of Acceptance and Use of Technology2 Model

Authors: Wang Xue, Fan Liwei

Abstract:

The trust and use of social network platforms by users are instrumental factors that contribute to the platform’s sustainable development. Studying the influential factors of the use of social network platforms is beneficial for developing and maintaining a large user base. This study constructed an extended unified theory of acceptance and use of technology (UTAUT2) moderating model with perceived privacy risks to analyze the factors affecting the trust and use of social network platforms. 444 participants completed our 35 surveys, and we verified the survey results by structural equation model. Empirical results reveal the influencing factors that affect the trust and use of social network platforms, and the extended UTAUT2 model with perceived privacy risks increases the applicability of UTAUT2 in social network scenarios. Social networking platforms can increase their use rate by increasing the economics, functionality, entertainment, and privacy security of the platform.

Keywords: perceived privacy risk, social network, trust, use, UTAUT2 model

Procedia PDF Downloads 94
1298 Analyzing On-Line Process Data for Industrial Production Quality Control

Authors: Hyun-Woo Cho

Abstract:

The monitoring of industrial production quality has to be implemented to alarm early warning for unusual operating conditions. Furthermore, identification of their assignable causes is necessary for a quality control purpose. For such tasks many multivariate statistical techniques have been applied and shown to be quite effective tools. This work presents a process data-based monitoring scheme for production processes. For more reliable results some additional steps of noise filtering and preprocessing are considered. It may lead to enhanced performance by eliminating unwanted variation of the data. The performance evaluation is executed using data sets from test processes. The proposed method is shown to provide reliable quality control results, and thus is more effective in quality monitoring in the example. For practical implementation of the method, an on-line data system must be available to gather historical and on-line data. Recently large amounts of data are collected on-line in most processes and implementation of the current scheme is feasible and does not give additional burdens to users.

Keywords: detection, filtering, monitoring, process data

Procedia PDF Downloads 551
1297 The Use of Videoconferencing in a Task-Based Beginners' Chinese Class

Authors: Sijia Guo

Abstract:

The development of new technologies and the falling cost of high-speed Internet access have made it easier for institutes and language teachers to opt different ways to communicate with students at distance. The emergence of web-conferencing applications, which integrate text, chat, audio / video and graphic facilities, offers great opportunities for language learning to through the multimodal environment. This paper reports on data elicited from a Ph.D. study of using web-conferencing in the teaching of first-year Chinese class in order to promote learners’ collaborative learning. Firstly, a comparison of four desktop videoconferencing (DVC) tools was conducted to determine the pedagogical value of the videoconferencing tool-Blackboard Collaborate. Secondly, the evaluation of 14 campus-based Chinese learners who conducted five one-hour online sessions via the multimodal environment reveals the users’ choice of modes and their learning preference. The findings show that the tasks designed for the web-conferencing environment contributed to the learners’ collaborative learning and second language acquisition.

Keywords: computer-mediated communication (CMC), CALL evaluation, TBLT, web-conferencing, online Chinese teaching

Procedia PDF Downloads 303
1296 Customizable Sonic EEG Neurofeedback Environment to Train Self-Regulation of Momentary Mental and Emotional State

Authors: Cyril Kaplan, Nikola Jajcay

Abstract:

We developed purely sonic, musical based, highly customizable EEG neurofeedback environment designed to administer a new neurofeedback training protocol. The training protocol concentrates on improving the ability to switch between several mental states characterized by different levels of arousal, each of them correlated to specific brain wave activity patterns in several specific regions of neocortex. This paper describes the neurofeedback training environment we developed and its specificities, thus can be helpful as a manual to guide other neurofeedback users (both researchers and practitioners) interested in our editable open source program (available to download and usage under CC license). Responses and reaction of first trainees that used our environment are presented in this article. Combination of qualitative methods (thematic analysis of neurophenomenological insights of trainees and post-session semi-structured interviews) and quantitative methods (power spectra analysis of EEG recorded during the training) were employed to obtain a multifaceted view on our new training protocol.

Keywords: EEG neurofeedback, mixed methods, self-regulation, switch-between-states training

Procedia PDF Downloads 216
1295 Transient Voltage Distribution on the Single Phase Transmission Line under Short Circuit Fault Effect

Authors: A. Kojah, A. Nacaroğlu

Abstract:

Single phase transmission lines are used to transfer data or energy between two users. Transient conditions such as switching operations and short circuit faults cause the generation of the fluctuation on the waveform to be transmitted. Spatial voltage distribution on the single phase transmission line may change owing to the position and duration of the short circuit fault in the system. In this paper, the state space representation of the single phase transmission line for short circuit fault and for various types of terminations is given. Since the transmission line is modeled in time domain using distributed parametric elements, the mathematical representation of the event is given in state space (time domain) differential equation form. It also makes easy to solve the problem because of the time and space dependent characteristics of the voltage variations on the distributed parametrically modeled transmission line.

Keywords: energy transmission, transient effects, transmission line, transient voltage, RLC short circuit, single phase

Procedia PDF Downloads 219
1294 Language Use in Computer-Mediated Communication and Users’ Social Identity

Authors: Miramar Damanhouri

Abstract:

This study examines the relationship between language use in computer-mediated communication and the social identity of the user. The data were collected by surveying 298 Saudi bilingual speakers who are familiar with Arabizi, a blend of Latin characters and Arabic numerals to transliterate Arabic sounds, and then analyzed quantitatively by running tests for statistical confidence in order to determine differences in perceptions between young adults (ages 15-25 years) and middle-aged adults (ages 26-50 years). According to the findings of this study, English is the dominant language among most of the young adults surveyed, and when they do use Arabic, they use Arabizi because of its flexibility, compatibility with modern technology, and its acceptance among people of their age and sociocultural backgrounds. On the other hand, most middle-aged adults surveyed here tend to use Arabic, as they believe that they should show their loyalty to their origin. The results of the study demonstrate a mutual relationship between language use in computer-mediated communication and the user’s social identity, as language is used both to reflect and construct that identity.

Keywords: Arabizi, computer mediated communication, digital communication, language use

Procedia PDF Downloads 130
1293 Analysing Social Media Coverage of Political Speeches in Relation to Discourse and Context

Authors: Yaser Mohammed Altameemi

Abstract:

This research looks at the representation of the social media for the Saudi Government decrees regarding the developmental projects of the Saudi 2030 vision. The paper analyses a television interview with the Crown Prince Mohammed Bin Salman who talks about the progress of the Saudi vision of 2030, and how the government had acted as response to the COVID-19 pandemic. The interview was on 28/4/2021. The paper analyses the tweets on Twitter that cover the interview for the purpose of investigating the development of concepts and meanings regarding the Saudi peoples’ orientations towards the Saudi projects. The data include all related tweets from the day of the interview and the following seven days after the interview. The finding of the collocation analysis suggests that nationalism notion is explicitly expressed by users in Twitter. The main finding of this paper suggests the importance of further analyses for the concordance lines. However, the collocation network suggests that there is a clear highlight for nationalism.

Keywords: social media, twitter, political interview, prince Mohammed Bin Salman, Saudi vision 2030

Procedia PDF Downloads 186
1292 Parent’s Preferences about Technology-Based Therapy for Children and Young People on the Autism Spectrum – a UK Survey

Authors: Athanasia Kouroupa, Karen Irvine, Sivana Mengoni, Shivani Sharma

Abstract:

Exploring parents’ preferences towards technology-based interventions for children on the autism spectrum can inform future research and support technology design. The study aimed to provide a comprehensive description of parents’ knowledge and preferences about innovative technology to support children on the autism spectrum. Survey data were collected from parents (n = 267) internationally. The survey included information about the use of conventional (e.g., smartphone, iPod, tablets) and non-conventional (e.g., virtual reality, robot) technologies. Parents appeared to prefer conventional technologies such as tablets and dislike non-conventional ones. They highlighted the positive contribution technology brought to the children’s lives during the pandemic. A few parents were equally concerned that the compulsory introduction of technology during the pandemic was associated with elongated time on devices. The data suggested that technology-based interventions are not widely known, need to be financially approachable and achieve a high standard of design to engage users.

Keywords: autism, intervention, preferences, technology

Procedia PDF Downloads 130
1291 Designing an Online Case-Based Library for Technology Integration in Teacher Education

Authors: Mustafa Tevfik Hebebci, Sirin Kucuk, Ismail Celik, A. Oguz Akturk, Ismail Sahin, Fetah Eren

Abstract:

The purpose of this paper is to introduce an interactive online case-study library website developed in a national project. The design goal of the website is to provide interactive, enhanced, case-based and online educational resource for educators through the purpose and within the scope of a national project. The ADDIE instructional design model was used in the development of the website for interactive case-based library. This library is developed on a web-based platform, which is important in terms of manageability, accessibility, and updateability of data. Users are able to sort the displayed case-studies by their titles, dates, ratings, view counts, etc. The usability test is used and the expert opinion is taken for the evaluation of the website. This website is a tool to integrate technology into education. It is believed that this website will be beneficial for pre-service and in-service teachers in terms of their professional developments.

Keywords: ADDIE, case-based library, design, technology integration

Procedia PDF Downloads 439
1290 Smart Sustainable University Campus: Aspects on Efficient Space Utilization at National Taiwan University of Science and Technology

Authors: Wei-Hwa Chiang, Yu-Ching Cheng, Pei-Hsien Kao, Yu-Chi Lai

Abstract:

A smart sustainable university campus is multi-dimensional. The success requires intensive inter-disciplinary coordination among all users and the expert group and long-term optimization. This paper reported the design and realization process of the dense and campus NTUST campus where space sharing is essential. Two-phase web-based interviews with students were conducted regarding where they study between classes as well as how they move within the campus. Efficient and active utilization of public and semi-public spaces, in particular, the ones near the ground, were progressively designed and realized where lobbies, corridors, reading rooms, and classrooms not in use were considered. Most of the spaces were equipped with smart monitoring and controls in terms of access, lighting, ceiling fans, air condition, and energy use. Mobile device apps were developed regarding the management of the spaces while information about energy use, environmental quality, and the smart sustainable campus project itself were provided to stimulate the awareness of sustainability and active participation in optimizing the campus.

Keywords: smart, sustainability, campus, space utilization

Procedia PDF Downloads 148
1289 Secure E-Voting Using Blockchain Technology

Authors: Barkha Ramteke, Sonali Ridhorkar

Abstract:

An election is an important event in all countries. Traditional voting has several drawbacks, including the expense of time and effort required for tallying and counting results, the cost of papers, arrangements, and everything else required to complete a voting process. Many countries are now considering online e-voting systems, but the traditional e-voting systems suffer a lack of trust. It is not known if a vote is counted correctly, tampered or not. A lack of transparency means that the voter has no assurance that his or her vote will be counted as they voted in elections. Electronic voting systems are increasingly using blockchain technology as an underlying storage mechanism to make the voting process more transparent and assure data immutability as blockchain technology grows in popularity. The transparent feature, on the other hand, may reveal critical information about applicants because all system users have the same entitlement to their data. Furthermore, because of blockchain's pseudo-anonymity, voters' privacy will be revealed, and third parties involved in the voting process, such as registration institutions, will be able to tamper with data. To overcome these difficulties, we apply Ethereum smart contracts into blockchain-based voting systems.

Keywords: blockchain, AMV chain, electronic voting, decentralized

Procedia PDF Downloads 131
1288 Syntactic Ambiguity and Syntactic Analysis: Transformational Grammar Approach

Authors: Olufemi Olupe

Abstract:

Within linguistics, various approaches have been adopted to the study of language. One of such approaches is the syntax. The syntax is an aspect of the grammar of the language which deals with how words are put together to form phrases and sentences and how such structures are interpreted in language. Ambiguity, which is also germane in this discourse is about the uncertainty of meaning as a result of the possibility of a phrase or sentence being understood and interpreted in more than one way. In the light of the above, this paper attempts a syntactic study of syntactic ambiguities in The English Language, using the Transformational Generative Grammar (TGG) Approach. In doing this, phrases and sentences were raised with each description followed by relevant analysis. Finding in the work reveals that ambiguity cannot always be disambiguated by the means of syntactic analysis alone without recourse to semantic interpretation. The further finding shows that some syntactical ambiguities structures cannot be analysed on two surface structures in spite of the fact that there are more than one deep structures. The paper concludes that in as much as ambiguity remains in language; it will continue to pose a problem of understanding to a second language learner. Users of English as a second language, must, however, make a conscious effort to avoid its usage to achieve effective communication.

Keywords: language, syntax, semantics, morphology, ambiguity

Procedia PDF Downloads 387
1287 Reading against the Grain: Transcodifying Stimulus Meaning

Authors: Aba-Carina Pârlog

Abstract:

On translating, reading against the grain results in a wrong effect in the TL. Quine’s ocular irradiation plays an important part in the process of understanding and translating a text. The various types of textual radiation must be rendered by the translator by paying close attention to the types of field that produce it. The literary work must be seen as an indirect cause of an expressive effect in the TL that is supposed to be similar to the effect it has in the SL. If the adaptive transformative codes are so flexible that they encourage the translator to repeatedly leave out parts of the original work, then a subversive pattern emerges which changes the entire book. In this case, the translator is a writer per se who decides what goes in and out of the book, how the style is to be ciphered and what elements of ideology are to be highlighted. Figurative language must not be flattened for the sake of clarity or naturalness. The missing figurative elements make the translated text less interesting, less challenging and less vivid which reflects poorly on the writer. There is a close connection between style and the writer’s person. If the writer’s style is very much changed in a translation, the translation is useless as the original writer and his / her imaginative world can no longer be discovered. Then, a different writer appears and his / her creation surfaces. Changing meaning considered as a “negative shift” in translation defines one of the faulty transformative codes used by some translators. It is a dangerous tool which leads to adaptations that sometimes reflect the original less than the reader would wish to. It contradicts the very essence of the process of translation which is that of making a work available in a foreign language. Employing speculative aesthetics at the level of a text indicates the wish to create manipulative or subversive effects in the translated work. This is generally achieved by adding new words or connotations, creating new figures of speech or using explicitations. The irradiation patterns of the original work are neglected and the translator creates new meanings, implications, emphases and contexts. Again s/he turns into a new author who enjoys the freedom of expressing his / her ideas without the constraints of the original text. The stimulus meaning of a text is very important for a translator which is why reading against the grain is unadvisable during the process of translation. By paying attention to the waves of the SL input, a faithful literary work is produced which does not contradict general knowledge about foreign cultures and civilizations. Following personal common sense is essential in the field of translation as well as everywhere else.

Keywords: stimulus meaning, substance of expression, transformative code, translation

Procedia PDF Downloads 441
1286 Benchmarking of Pentesting Tools

Authors: Esteban Alejandro Armas Vega, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

The benchmarking of tools for dynamic analysis of vulnerabilities in web applications is something that is done periodically, because these tools from time to time update their knowledge base and search algorithms, in order to improve their accuracy. Unfortunately, the vast majority of these evaluations are made by software enthusiasts who publish their results on blogs or on non-academic websites and always with the same evaluation methodology. Similarly, academics who have carried out this type of analysis from a scientific approach, the majority, make their analysis within the same methodology as well the empirical authors. This paper is based on the interest of finding answers to questions that many users of this type of tools have been asking over the years, such as, to know if the tool truly test and evaluate every vulnerability that it ensures do, or if the tool, really, deliver a real report of all the vulnerabilities tested and exploited. This kind of questions have also motivated previous work but without real answers. The aim of this paper is to show results that truly answer, at least on the tested tools, all those unanswered questions. All the results have been obtained by changing the common model of benchmarking used for all those previous works.

Keywords: cybersecurity, IDS, security, web scanners, web vulnerabilities

Procedia PDF Downloads 316
1285 Specified Human Motion Recognition and Unknown Hand-Held Object Tracking

Authors: Jinsiang Shaw, Pik-Hoe Chen

Abstract:

This paper aims to integrate human recognition, motion recognition, and object tracking technologies without requiring a pre-training database model for motion recognition or the unknown object itself. Furthermore, it can simultaneously track multiple users and multiple objects. Unlike other existing human motion recognition methods, our approach employs a rule-based condition method to determine if a user hand is approaching or departing an object. It uses a background subtraction method to separate the human and object from the background, and employs behavior features to effectively interpret human object-grabbing actions. With an object’s histogram characteristics, we are able to isolate and track it using back projection. Hence, a moving object trajectory can be recorded and the object itself can be located. This particular technique can be used in a camera surveillance system in a shopping area to perform real-time intelligent surveillance, thus preventing theft. Experimental results verify the validity of the developed surveillance algorithm with an accuracy of 83% for shoplifting detection.

Keywords: Automatic Tracking, Back Projection, Motion Recognition, Shoplifting

Procedia PDF Downloads 328
1284 Effects and Coping Strategies of Cyber Bullying in Pakistan: A Gender Response

Authors: Rabia Qusien

Abstract:

New media has emerged as a significant force in the society which connects people across the globe. Where new media brought many advantages for its users, there is a darker aspect of new technology in the form of cyberbullying. Researcher has employed survey method to reach to its targeted audience. Sample of 604 respondents was selected from one of metropolitan city of Pakistan Lahore to collect the data. Equal sample from both genders was selected to apply gender analysis. Results of this study indicate that cyber bullying is having significant psychological and educational effects. Females face more cyber bullying incidents as compared to males so they face more severe effects of cyber bullying. A comprehensive analysis of managing strategies depicts that mostly youth tries to handle this issue personally but at times they seek the support of their family and friends when they face severe issues. Due to privacy concerns females get more upset and they are more likely to seek social support from friends and family.

Keywords: cyber bullying, cyber victims, educational impacts, psychological impacts

Procedia PDF Downloads 138
1283 Structural Analysis of Multi-Pressure Integrated Vessel for Sport-Multi-Artificial Environment System

Authors: Joon-Ho Lee, Jeong-Hwan Yoon, Jung-Hwan Yoon, Sangmo Kang, Su-Yeon Hong, Hyun-Woo Jeong, Jaeick Chae

Abstract:

There are several dedicated individual chambers for sports that are supplied and used, but none of them are multi-pressured all-in-one chambers that can provide a sports multi-environment simultaneously. In this study, we design a multi-pressure (positive/atmospheric/negative pressure) integrated vessel that can be used for the sport-multi-artificial environment system. We presented additional vessel designs with enlarged space for the tall users; with reinforcement pads added to reduce the maximum stress in the joints of its shells, and then carried out numerical analysis for the structural analysis with maximum stress and structural safety. Under the targeted allowable pressure conditions, maximum stresses occurred at the joint of the shell, and the entrance, the safety of the structure was checked with the allowable stress of its material.

Keywords: structural analysis, multi-pressure, integrated vessel, sport-multi-artificial environment

Procedia PDF Downloads 528
1282 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-time

Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl

Abstract:

In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method Web-App auto-generated twin data structure replication. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi" has been developed. A special login form has been developed with a special instance of data validation; this verification process secures the web application from its early stages. The system has been tested and validated, up to 99% of SQLi attacks have been prevented.

Keywords: SQL injection, attacks, web application, accuracy, database

Procedia PDF Downloads 145
1281 Non-Profit Organizations and the Future: Framework for the Preparation and Presentation of Annual Reports

Authors: Nadzira Yahaya, Saunah Zainon, Marshita Hashim, Ruhaya Atan

Abstract:

Non-profit organizations (NPOs) in Malaysia are diverse in their origins, structures, objectives, and stakeholders. The largest category of NPOs is from charity and religious category while many other categories such as youth, professionals, women, education and mutual benefits either operate independently or controlled by governments. NPOs have stewardship obligations to their stakeholders and other users of their annual reports, including the public at large. The existing accounting practices without the proper framework of the preparation and presentation of annual reports resulted in a lack of uniformity in the preparation and presentation of NPOs annual reports. Furthermore, a lack of awareness of the applicability of accounting standards and the adoption of different bases of accounting resulted in the need for framework in the preparation and presentation of financial statements for true and fair view of the state of affairs and the operating result of the NPOs activities. This study presents the proposed framework for the preparation and presentation of NPOs annual reports to help the organizations provide high-quality reporting for them to be accountable for good stewardship.

Keywords: annual reports, framework, NPOs, preparation and presentation

Procedia PDF Downloads 436
1280 Social Accountability: Persuasion and Debate to Contain Corruption

Authors: A. Lambert-Mogiliansky

Abstract:

In this paper, we investigate the properties of simple rules for reappointment aimed at holding a public official accountable and monitor his activity. The public official allocates budget resources to various activities which results in the delivery of public services to citizens. He has discretion over the use of resource so he can divert some of them for private ends. Because of a liability constraint, zero diversion can never be secured in all states. The optimal reappointment mechanism under complete information is shown to exhibit some leniency thus departing from the zero tolerance principle. Under asymmetric information (about the state), a rule with random verification in a pre-announced subset is shown to be optimal in a class of common rules. Surprisingly, those common rules make little use of hard information about service delivery when available. Similarly, PO's claim about his record is of no value to improve the performance of the examined rules. In contrast requesting that the PO defends his records publicly can be very useful if the service users are given the chance to refute false claims with cheap talk complaints: the first best complete information outcome can be approached in the absence of any observation by the manager of the accountability mechanism.

Keywords: accountability, corruption, persuasion, debate

Procedia PDF Downloads 374
1279 Improved Throttled Load Balancing Approach for Cloud Environment

Authors: Sushant Singh, Anurag Jain, Seema Sabharwal

Abstract:

Cloud computing is advancing with a rapid speed. Already, it has been adopted by a huge set of users. Easy to use and anywhere access like potential of cloud computing has made it more attractive relative to other technologies. This has resulted in reduction of deployment cost on user side. It has also allowed the big companies to sell their infrastructure to recover the installation cost for the organization. Roots of cloud computing have extended from Grid computing. Along with the inherited characteristics of its predecessor technologies it has also adopted the loopholes present in those technologies. Some of the loopholes are identified and corrected recently, but still some are yet to be rectified. Two major areas where still scope of improvement exists are security and performance. The proposed work is devoted to performance enhancement for the user of the existing cloud system by improving the basic throttled mapping approach between task and resources. The improved procedure has been tested using the cloud analyst simulator. The results are compared with the original and it has been found that proposed work is one step ahead of existing techniques.

Keywords: cloud analyst, cloud computing, load balancing, throttled

Procedia PDF Downloads 245
1278 The Practices Perspective in Communication, Consumer and Cultural Studies: A Post-Heideggerian Narrative

Authors: Tony Wilson

Abstract:

This paper sets out a practices perspective or practices theory, which has become pervasive from business to sociological studies. In doing so, it locates the perspective historically (in the work of the philosopher Heidegger) and provides a contemporary illustration of its application to communication, consumer and cultural studies as central to this conference theme. The structured account of practices (as articulated in eight ‘axioms’) presented towards the conclusion of this paper is an initial statement - planned to encourage further detailed qualitative and systematic research in areas of interest to the conference. Practice theories of equipped and situated construction of participatory meaning (as in media and marketing consuming) are frequently characterized as lacking common ground, or core principles. This paper explores whether by retracing a journey to earlier philosophical underwriting, a shared territory promoting new research can be located as current philosophical hermeneutics. Moreover, through returning to hermeneutic first principles, the paper shows that a series of spatio-temporal metaphors become available - appropriate to analyzing communication as a process across disciplines in which it is considered. Thus one can argue, for instance, that media users engage (enter) digital text from their diverse ‘horizons of expectation’, in a productive enlarging ‘fusion’ of horizons of understanding, thereby ‘projecting’ a new narrative, integrated in a ‘hermeneutic circle’ of meaning. A politics of communication studies may contest a horizon of understanding - so engaging in critical ‘distancing’. Marketing’s consumers can occupy particular places on a horizon of understanding. Media users pass over borders of changing, revised perspectives. Practices research can now not only be discerned in multiple disciplines but equally crosses disciplines. The ubiquitous practice of media use by managers and visitors in a shopping mall - the mediatization of malls - responds to investigating not just with media study expertise, but from an interpretive marketing perspective. How have mediated identities of person or place been changed? Emphasizing understanding of entities in a material environment as ‘equipment’, practices theory enables the quantitative correlation of use and demographic variable as ‘Zeug Score’. Human behavior is fundamentally habitual - shaped by its tacit assumptions - occasionally interrupted by reflection. Practices theory acknowledges such action to be minimally monitored yet nonetheless considers it as constructing narrative. Thus presented in research, ‘storied’ behavior can then be seen to be (in)formed and shaped from a shifting hierarchy of ‘horizons’ or of perspectives - from habituated to reflective - rather than a single seamless narrative. Taking a communication practices perspective here avoids conflating tacit, transformative and theoretical understanding in research. In short, a historically grounded and unifying statement of contemporary practices theory will enhance its potential as a tool in communication, consumer and cultural research, landscaping interpretative horizons of human behaviour through exploring widely the culturally (in)formed narratives equipping and incorporated (reflectively, unreflectively) in people’s everyday lives.

Keywords: communication, consumer, cultural practices, hermeneutics

Procedia PDF Downloads 264
1277 Securing Internet of Things Devices in Healthcare industry: An Investigation into Efficient and Effective Authorization Procedures

Authors: Maruf Farhan, Abdul Salih, Sikandar Ali Tahir

Abstract:

Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed method, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. A Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector.

Keywords: Iot, DID, authorization, verifiable credentials

Procedia PDF Downloads 68
1276 The Impact of the Length of Time Spent on the Street on Adjustment to Homelessness

Authors: Jakub Marek, Marie Vagnerova, Ladislav Csemy

Abstract:

Background: The length of time spent on the street influences the degree of adjustment to homelessness. Over the years spent sleeping rough, homeless people gradually lose the ability to control their lives and their return to mainstream society becomes less and less likely. Goals: The aim of the study was to discover whether and how men who have been sleeping rough for more than ten years differ from those who have been homeless for four years or less. Methods: The research was based on a narrative analysis of in-depth interviews focused on the respondent’s entire life story, i.e. their childhood, adolescence, and the period of adulthood preceding homelessness. It also asked the respondents about how they envisaged the future. The group under examination comprised 51 homeless men aged 37 – 54. The first subgroup contained 29 men who have been sleeping rough for 10 – 21 years, the second group contained 22 men who have been homeless for four years or less. Results: Men who have been sleeping rough for more than ten years had problems adapting as children. They grew up in a problematic family or in an institution and acquired only a rudimentary education. From the start they had problems at work, found it difficult to apply themselves, and found it difficult to hold down a job. They tend to have high-risk personality traits and often a personality disorder. Early in life they had problems with alcohol or drugs and their relationships were unsuccessful. If they have children, they do not look after them. They are reckless even in respect of the law and often commit crime. They usually ended up on the street in their thirties. Most of this subgroup of homeless people lack motivation and the will to make any fundamental change to their lives. They identify with the homeless community and have no other contacts. Men who have been sleeping rough for four years or less form two subgroups. There are those who had a normal childhood, attended school and found work. They started a family but began to drink, and as a consequence lost their family and their job. Such men end up on the street between the ages of 35 and 40. And then there are men who become homeless after the age of 40 because of an inability to cope with a difficult situation, e.g. divorce or indebtedness. They are not substance abusers and do not have a criminal record. Such people can be offered effective assistance to return to mainstream society by the social services because they have not yet fully self-identified with the homeless community and most of them have retained the necessary abilities and skills. Conclusion: The length of time a person has been homeless is an important factor in respect of social prevention. It is clear that the longer a person is homeless, the worse are their chances of being reintegrated into mainstream society.

Keywords: risk factors, homelessness, chronicity, narrative analysis

Procedia PDF Downloads 164
1275 The Determinants of Behavioral Intention to Use toward T-Cash Services Provider in Jakarta and Surburban Area

Authors: Stephen Coandadiputra, Chrestella Carissa

Abstract:

Technology is created to simplify human’s life. One of current technology which being called as the second wave internet generation is the internet of things. Internet of things lets thousands of devices connected each other. In today's marketing world, IOT has brought customer into the next level which helping the customer to shorten every transaction they are conducting from traditional approach to sophisticated approach. However, the implementation of technology has always obstacles. The objective of this paper is to explore the determinants of customer to accepts such technology like the internet of things within their transaction. According to TAM (Technology Acceptance Model), researcher constructs the acceptance of internet of things based on perceived usefulness, perceived ease of use and trust and social factor and the two customer characteristics: perceived enjoyment and perceived behavioral control. This research uses exploratory research design which being facilitated by spreading questionnaire to 145 T-cash users in Jakarta and in its suburban region. At least, 190 samples were observed and questioned accordingly. All the collected data will be analyzed using Lisrel.

Keywords: behavioral intention to use, internet of things, near field communication, technology acceptance model

Procedia PDF Downloads 329
1274 Gamification Using Stochastic Processes: Engage Children to Have Healthy Habits

Authors: Andre M. Carvalho, Pedro Sebastiao

Abstract:

This article is based on a dissertation that intends to analyze and make a model, intelligently, algorithms based on stochastic processes of a gamification application applied to marketing. Gamification is used in our daily lives to engage us to perform certain actions in order to achieve goals and gain rewards. This strategy is an increasingly adopted way to encourage and retain customers through game elements. The application of gamification aims to encourage children between 6 and 10 years of age to have healthy habits and the purpose of serving as a model for use in marketing. This application was developed in unity; we implemented intelligent algorithms based on stochastic processes, web services to respond to all requests of the application, a back-office website to manage the application and the database. The behavioral analysis of the use of game elements and stochastic processes in children’s motivation was done. The application of algorithms based on stochastic processes in-game elements is very important to promote cooperation and to ensure fair and friendly competition between users which consequently stimulates the user’s interest and their involvement in the application and organization.

Keywords: engage, games, gamification, randomness, stochastic processes

Procedia PDF Downloads 324
1273 An Adaptive Opportunistic Transmission for Unlicensed Spectrum Sharing in Heterogeneous Networks

Authors: Daehyoung Kim, Pervez Khan, Hoon Kim

Abstract:

Efficient utilization of spectrum resources is a fundamental issue of wireless communications due to its scarcity. To improve the efficiency of spectrum utilization, the spectrum sharing for unlicensed bands is being regarded as one of key technologies in the next generation wireless networks. A number of schemes such as Listen-Before-Talk(LBT) and carrier sensor adaptive transmission (CSAT) have been suggested from this aspect, but more efficient sharing schemes are required for improving spectrum utilization efficiency. This work considers an opportunistic transmission approach and a dynamic Contention Window (CW) adjustment scheme for LTE-U users sharing the unlicensed spectrum with Wi-Fi, in order to enhance the overall system throughput. The decision criteria for the dynamic adjustment of CW are based on the collision evaluation, derived from the collision probability of the system. The overall performance can be improved due to the adaptive adjustment of the CW. Simulation results show that our proposed scheme outperforms the Distributed Coordination Function (DCF) mechanism of IEEE 802.11 MAC.

Keywords: spectrum sharing, adaptive opportunistic transmission, unlicensed bands, heterogeneous networks

Procedia PDF Downloads 345
1272 New Types of Fitness Equipment for Seniors-Based on Beginning Movement Load Training

Authors: Chia-Chi Chen, Tai-Sheng Huang

Abstract:

Ageing society has been spread around the world. The global population is not only ageing but also declining. The structure of population has changed, which has a significant impact on both the economies and industries. Thus, how to be a healthy senior citizen to relieve the burden to the family and society will be a popular issue. Although fitness equipment manufacturing industry has been mature, the ageing population is still increasing. Therefore, this study aims to design an innovative style of fitness equipment for senior citizens, based on BMLT presented by Dr. Koyama Hirofumi. The analysis of current fitness equipment on the market and the future trend will be applied in the study. With the coming of information age, senior citizens in the future are the users of information product for sure, and the new style of fitness equipment will be combined with information technology as well. Through this study, it is believed to design an innovative style of fitness equipment for seniors and help them live heartier and happier lives.

Keywords: aging society, BMLT (Beginning Movement Load Training), seniors, new style of fitness equipment

Procedia PDF Downloads 210
1271 The Duty of Application and Connection Providers Regarding the Supply of Internet Protocol by Court Order in Brazil to Determine Authorship of Acts Practiced on the Internet

Authors: João Pedro Albino, Ana Cláudia Pires Ferreira de Lima

Abstract:

Humanity has undergone a transformation from the physical to the virtual world, generating an enormous amount of data on the world wide web, known as big data. Many facts that occur in the physical world or in the digital world are proven through records made on the internet, such as digital photographs, posts on social media, contract acceptances by digital platforms, email, banking, and messaging applications, among others. These data recorded on the internet have been used as evidence in judicial proceedings. The identification of internet users is essential for the security of legal relationships. This research was carried out on scientific articles and materials from courses and lectures, with an analysis of Brazilian legislation and some judicial decisions on the request of static data from logs and Internet Protocols (IPs) from application and connection providers. In this article, we will address the determination of authorship of data processing on the internet by obtaining the IP address and the appropriate judicial procedure for this purpose under Brazilian law.

Keywords: IP address, digital forensics, big data, data analytics, information and communication technology

Procedia PDF Downloads 119