Search results for: digital sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3610

Search results for: digital sharing

1930 Polarity Classification of Social Media Comments in Turkish

Authors: Migena Ceyhan, Zeynep Orhan, Dimitrios Karras

Abstract:

People in modern societies are continuously sharing their experiences, emotions, and thoughts in different areas of life. The information reaches almost everyone in real-time and can have an important impact in shaping people’s way of living. This phenomenon is very well recognized and advantageously used by the market representatives, trying to earn the most from this means. Given the abundance of information, people and organizations are looking for efficient tools that filter the countless data into important information, ready to analyze. This paper is a modest contribution in this field, describing the process of automatically classifying social media comments in the Turkish language into positive or negative. Once data is gathered and preprocessed, feature sets of selected single words or groups of words are build according to the characteristics of language used in the texts. These features are used later to train, and test a system according to different machine learning algorithms (Naïve Bayes, Sequential Minimal Optimization, J48, and Bayesian Linear Regression). The resultant high accuracies can be important feedback for decision-makers to improve the business strategies accordingly.

Keywords: feature selection, machine learning, natural language processing, sentiment analysis, social media reviews

Procedia PDF Downloads 134
1929 The Results of Research Based-Learning for Developing the Learning and Innovation Skills of Undergraduate Students

Authors: Jatuphum Ketchatturat

Abstract:

The objective of this research was to study the learning and innovation skills of undergraduate students after Research-Based Learning had been applied. Eighty research participants were selected from undergraduate students enrolled in Educational Research Program using the Purposive Sampling Method. Research Methodology was Descriptive Research, the research took one semester to complete. The research instruments consisted of (1) Research Skill Assessment Form, (2) Research Quality Assessment Form, (3) Scale of learning and innovation skills 25 items. The quantitative data were analysed using descriptive statistics including, frequency, percentage, average and standard deviation. The qualitative data were analyzed using content analysis. The research results were (1) The students were able to conduct research that focused on educational research, which has a fair to the excellent level of standards of a research learning outcome, research skills, and research quality. The student’s learning and innovation skills have relating to research skills and research quality. (2) The findings found that the students have been developed to be learning and innovation skills such as systematic thinking, analytical thinking, critical thinking, creative problem solving, collaborative, research-creation, communication, and knowledge and experience sharing to friends, community and society.

Keywords: learning and innovation skills, research based learning, research skills, undergraduate students

Procedia PDF Downloads 168
1928 Digitial Communication – The Future of Chronic Disease Management Is Healthcare Apps

Authors: Kirstin Griffin

Abstract:

During a period of increased anxiety and stress, communication became the essential tool to help the public stay informed and feel prepared during the Covid-19 pandemic. However, certain groups of patients were not feeling as reassured. The news and media blasted the message that patients with diabetes were “high-risk" in regards to contracting the Covid-19 infection. Routine clinics were being cancelled, GP practices were closing their doors, and patients with type 1 diabetes were understandably scared. The influx of calls to diabetes specialists nurses from concerned patients highlighted the need for better and more specialised information. An Application specifically for patients with type 1 diabetes was created to deliver this information, and it proved to be the essential communication tool that was desperately needed. The Application for patients with type 1 diabetes aimed to deliver specialist information to patients in regards to their diagnosis, management, and ongoing follow-up commitments. The Application gives practical advice on multiple areas of diabetes management, including sick-day rules and diabetic emergencies, as well as up-to-date information on technology, including setting up Libre devices and downloading glucose meters to facilitate attending virtual clinics. Delivery of this information in an easy-to-understand and comprehensive way is intended to improve patient engagement with diabetes services and ultimately empower patients in the control of their own disease. The application also offers a messaging service to allow the diabetes team to send out alerts to patient groups on specific issues, such as changes to clinics, or respond to recent news updates regarding Covid-19. The App was launched in NHS Fife in June 2020 and has amassed 800 active users so far. There is growing engagement with the App since its launch, with over 1000 user interactions in the last month alone. Feedback shows that 100% of users like the App and have found it useful in the management of their diabetes. The App has proven to be an essential tool in communication with one of the most vulnerable groups during the Covid-19 pandemic, and its ongoing development will continue to increase patient engagement and improve glycaemic control for patients with type 1 diabetes. The future of chronic disease management should involve digital solutions such as apps to further empower patients in their healthcare.

Keywords: diabetes, endocrinology, digital healthcare, medical apps

Procedia PDF Downloads 71
1927 Knowledge Management Factors Affecting the Level of Commitment

Authors: Abbas Keramati, Abtin Boostani, Mohammad Jamal Sadeghi

Abstract:

This paper examines the influence of knowledge management factors on organizational commitment for employees in the oil and gas drilling industry of Iran. We determine what knowledge factors have the greatest impact on the personnel loyalty and commitment to the organization using collected data from a survey of over 300 full-time personnel working in three large companies active in oil and gas drilling industry of Iran. To specify the effect of knowledge factors in the organizational commitment of the personnel in the studied organizations, the Principal Component Analysis (PCA) is used. Findings of our study show that the factors such as knowledge and expertise, in-service training, the knowledge value and the application of individuals’ knowledge in the organization as the factor “learning and perception of personnel from the value of knowledge within the organization” has the greatest impact on the organizational commitment. After this factor, “existence of knowledge and knowledge sharing environment in the organization”; “existence of potential knowledge exchanging in the organization”; and “organizational knowledge level” factors have the most impact on the organizational commitment of personnel, respectively.

Keywords: drilling industry, knowledge management, organizational commitment, loyalty, principle component analysis

Procedia PDF Downloads 336
1926 A Qualitative Exploration of the Strategic Management of Employee Resistance to Organisational Change

Authors: Muneeb Banday, Anukriti Dixit

Abstract:

Change in organizations is viewed as a conversion process of the organizational functioning. One of the crucial elements of this conversion process is the employee resistance to organizational change. The existing literature on change resistance has generally treated resistance as a barrier or an opportunity for successful implementation of change. However, there is little empirical research exploring how resistance to change is managed. This may be partially due to difficulty in getting information on resistance to change. The top management does not divulge such information to avoid negative evaluation whereas employees face huge risk in sharing information related to resistance. The focus of the study is to understand how the organization under study dealt with the employee resistance to change. The conversion process is a story of how the organization went from one stage to another. We used narrative approach to change. Data was collected data through company visits and interviews. The interviews were transcribed, coded, and themes were identified. We focused on the strands that left huge scope for alternative interpretations than the dominant narrative of change prevalent in the organization. The study reveals that the top management strategically uses the legitimacy of leadership, roles of key employees, and rationality of change to manage resistance.

Keywords: employee resistance, legitimacy of leadership, narrative analysis, organisational change

Procedia PDF Downloads 255
1925 Delivery of Patient-Directed Wound Care Via Mobile Application-Based Qualitative Analysis

Authors: Amulya Srivatsa, Gayatri Prakash, Deeksha Sarda, Varshni Nandakumar, Duncan Salmon

Abstract:

Delivery of Patient-Directed Wound Care Via Mobile Application-Based Qualitative Analysis Chronic wounds are difficult for patients to manage at-home due to their unpredictable healing process. These wounds are associated with increased morbidity and negatively affect physical and mental health. The solution is a mobile application that will have an algorithm-based checklist to determine the state of the wound based on different factors that vary from person to person. Once this information is gathered, the application will recommend a plan of care to the user and subsequent steps to be taken. The mobile application will allow users to perform a digital scan of the wound to extract quantitative information regarding wound width, length, and depth, which will then be uploaded to the EHR to notify the patient’s provider. This scan utilizes a photo taken by the user, who is prompted appropriately. Furthermore, users will enter demographic information and answer multiple choice and drop-down menus describing the wound state. The proposed solution can save patients from unnecessary trips to the hospital for chronic wound care. The next iteration of the application can incorporate AI to allow users to perform a digital scan of the wound to extract quantitative information regarding wound width, length, and depth, which can be shared with the patient’s provider to allow for more efficient treatment. Ultimately, this product can provide immediate and economical medical advice for patients that suffer from chronic wounds. Research Objectives: The application should be capable of qualitative analysis of a wound and recommend a plan of care to the user. Additionally, the results of the wound analysis should automatically upload to the patient’s EMR. Research Methodologies: The app has two components: the first is a checklist with tabs for varying factors that assists users in the assessment of their skin. Subsequently, the algorithm will create an at-home regimen for patients to follow to manage their wounds. Research Contributions: The app aims to return autonomy back to the patient and reduce the number of visits to a physician for chronic wound care. The app also serves to educate the patient on how best to care for their wounds.

Keywords: wound, app, qualitative, analysis, home, chronic

Procedia PDF Downloads 52
1924 A Self-Coexistence Strategy for Spectrum Allocation Using Selfish and Unselfish Game Models in Cognitive Radio Networks

Authors: Noel Jeygar Robert, V. K.Vidya

Abstract:

Cognitive radio is a software-defined radio technology that allows cognitive users to operate on the vacant bands of spectrum allocated to licensed users. Cognitive radio plays a vital role in the efficient utilization of wireless radio spectrum available between cognitive users and licensed users without making any interference to licensed users. The spectrum allocation followed by spectrum sharing is done in a fashion where a cognitive user has to wait until spectrum holes are identified and allocated when the licensed user moves out of his own allocated spectrum. In this paper, we propose a self –coexistence strategy using bargaining and Cournot game model for achieving spectrum allocation in cognitive radio networks. The game-theoretic model analyses the behaviour of cognitive users in both cooperative and non-cooperative scenarios and provides an equilibrium level of spectrum allocation. Game-theoretic models such as bargaining game model and Cournot game model produce a balanced distribution of spectrum resources and energy consumption. Simulation results show that both game theories achieve better performance compared to other popular techniques

Keywords: cognitive radio, game theory, bargaining game, Cournot game

Procedia PDF Downloads 273
1923 A New Method to Winner Determination for Economic Resource Allocation in Cloud Computing Systems

Authors: Ebrahim Behrouzian Nejad, Rezvan Alipoor Sabzevari

Abstract:

Cloud computing systems are large-scale distributed systems, so that they focus more on large scale resource sharing, cooperation of several organizations and their use in new applications. One of the main challenges in this realm is resource allocation. There are many different ways to resource allocation in cloud computing. One of the common methods to resource allocation are economic methods. Among these methods, the auction-based method has greater prominence compared with Fixed-Price method. The double combinatorial auction is one of the proper ways of resource allocation in cloud computing. This method includes two phases: winner determination and resource allocation. In this paper a new method has been presented to determine winner in double combinatorial auction-based resource allocation using Imperialist Competitive Algorithm (ICA). The experimental results show that in our new proposed the number of winner users is higher than genetic algorithm. On other hand, in proposed algorithm, the number of winner providers is higher in genetic algorithm.

Keywords: cloud computing, resource allocation, double auction, winner determination

Procedia PDF Downloads 350
1922 Application Research of Stilbene Crystal for the Measurement of Accelerator Neutron Sources

Authors: Zhao Kuo, Chen Liang, Zhang Zhongbing, Ruan Jinlu. He Shiyi, Xu Mengxuan

Abstract:

Stilbene, C₁₄H₁₂, is well known as one of the most useful organic scintillators for pulse shape discrimination (PSD) technique for its good scintillation properties. An on-line acquisition system and an off-line acquisition system were developed with several CAMAC standard plug-ins, NIM plug-ins, neutron/γ discriminating plug-in named 2160A and a digital oscilloscope with high sampling rate respectively for which stilbene crystals and photomultiplier tube detectors (PMT) as detector for accelerator neutron sources measurement carried out in China Institute of Atomic Energy. Pulse amplitude spectrums and charge amplitude spectrums were real-time recorded after good neutron/γ discrimination whose best PSD figure-of-merits (FoMs) are 1.756 for D-D accelerator neutron source and 1.393 for D-T accelerator neutron source. The probability of neutron events in total events was 80%, and neutron detection efficiency was 5.21% for D-D accelerator neutron sources, which were 50% and 1.44% for D-T accelerator neutron sources after subtracting the background of scattering observed by the on-line acquisition system. Pulse waveform signals were acquired by the off-line acquisition system randomly while the on-line acquisition system working. The PSD FoMs obtained by the off-line acquisition system were 2.158 for D-D accelerator neutron sources and 1.802 for D-T accelerator neutron sources after waveform digitization off-line processing named charge integration method for just 1000 pulses. In addition, the probabilities of neutron events in total events obtained by the off-line acquisition system matched very well with the probabilities of the on-line acquisition system. The pulse information recorded by the off-line acquisition system could be repetitively used to adjust the parameters or methods of PSD research and obtain neutron charge amplitude spectrums or pulse amplitude spectrums after digital analysis with a limited number of pulses. The off-line acquisition system showed equivalent or better measurement effects compared with the online system with a limited number of pulses which indicated a feasible method based on stilbene crystals detectors for the measurement of prompt neutrons neutron sources like prompt accelerator neutron sources emit a number of neutrons in a short time.

Keywords: stilbene crystal, accelerator neutron source, neutron / γ discrimination, figure-of-merits, CAMAC, waveform digitization

Procedia PDF Downloads 173
1921 Unleashing Potential in Pedagogical Innovation for STEM Education: Applying Knowledge Transfer Technology to Guide a Co-Creation Learning Mechanism for the Lingering Effects Amid COVID-19

Authors: Lan Cheng, Harry Qin, Yang Wang

Abstract:

Background: COVID-19 has induced the largest digital learning experiment in history. There is also emerging research evidence that students have paid a high cost of learning loss from virtual learning. University-wide survey results demonstrate that digital learning remains difficult for students who struggle with learning challenges, isolation, or a lack of resources. Large-scale efforts are therefore increasingly utilized for digital education. To better prepare students in higher education for this grand scientific and technological transformation, STEM education has been prioritized and promoted as a strategic imperative in the ongoing curriculum reform essential for unfinished learning needs and whole-person development. Building upon five key elements identified in the STEM education literature: Problem-based Learning, Community and Belonging, Technology Skills, Personalization of Learning, Connection to the External Community, this case study explores the potential of pedagogical innovation that integrates computational and experimental methodologies to support, enrich, and navigate STEM education. Objectives: The goal of this case study is to create a high-fidelity prototype design for STEM education with knowledge transfer technology that contains a Cooperative Multi-Agent System (CMAS), which has the objectives of (1) conduct assessment to reveal a virtual learning mechanism and establish strategies to facilitate scientific learning engagement, accessibility, and connection within and beyond university setting, (2) explore and validate an interactional co-creation approach embedded in project-based learning activities under the STEM learning context, which is being transformed by both digital technology and student behavior change,(3) formulate and implement the STEM-oriented campaign to guide learning network mapping, mitigate the loss of learning, enhance the learning experience, scale-up inclusive participation. Methods: This study applied a case study strategy and a methodology informed by Social Network Analysis Theory within a cross-disciplinary communication paradigm (students, peers, educators). Knowledge transfer technology is introduced to address learning challenges and to increase the efficiency of Reinforcement Learning (RL) algorithms. A co-creation learning framework was identified and investigated in a context-specific way with a learning analytic tool designed in this study. Findings: The result shows that (1) CMAS-empowered learning support reduced students’ confusion, difficulties, and gaps during problem-solving scenarios while increasing learner capacity empowerment, (2) The co-creation learning phenomenon have examined through the lens of the campaign and reveals that an interactive virtual learning environment fosters students to navigate scientific challenge independently and collaboratively, (3) The deliverables brought from the STEM educational campaign provide a methodological framework both within the context of the curriculum design and external community engagement application. Conclusion: This study brings a holistic and coherent pedagogy to cultivates students’ interest in STEM and develop them a knowledge base to integrate and apply knowledge across different STEM disciplines. Through the co-designing and cross-disciplinary educational content and campaign promotion, findings suggest factors to empower evidence-based learning practice while also piloting and tracking the impact of the scholastic value of co-creation under the dynamic learning environment. The data nested under the knowledge transfer technology situates learners’ scientific journey and could pave the way for theoretical advancement and broader scientific enervators within larger datasets, projects, and communities.

Keywords: co-creation, cross-disciplinary, knowledge transfer, STEM education, social network analysis

Procedia PDF Downloads 100
1920 An International Curriculum Development for Languages and Technology

Authors: Miguel Nino

Abstract:

When considering the challenges of a changing and demanding globalizing world, it is important to reflect on how university students will be prepared for the realities of internationalization, marketization and intercultural conversation. The present study is an interdisciplinary program designed to respond to the needs of the global community. The proposal bridges the humanities and science through three different fields: Languages, graphic design and computer science, specifically, fundamentals of programming such as python, java script and software animation. Therefore, the goal of the four year program is twofold: First, enable students for intercultural communication between English and other languages such as Spanish, Mandarin, French or German. Second, students will acquire knowledge in practical software and relevant employable skills to collaborate in assisted computer projects that most probable will require essential programing background in interpreted or compiled languages. In order to become inclusive and constructivist, the cognitive linguistics approach is suggested for the three different fields, particularly for languages that rely on the traditional method of repetition. This methodology will help students develop their creativity and encourage them to become independent problem solving individuals, as languages enhance their common ground of interaction for culture and technology. Participants in this course of study will be evaluated in their second language acquisition at the Intermediate-High level. For graphic design and computer science students will apply their creative digital skills, as well as their critical thinking skills learned from the cognitive linguistics approach, to collaborate on a group project design to find solutions for media web design problems or marketing experimentation for a company or the community. It is understood that it will be necessary to apply programming knowledge and skills to deliver the final product. In conclusion, the program equips students with linguistics knowledge and skills to be competent in intercultural communication, where English, the lingua franca, remains the medium for marketing and product delivery. In addition to their employability, students can expand their knowledge and skills in digital humanities, computational linguistics, or increase their portfolio in advertising and marketing. These students will be the global human capital for the competitive globalizing community.

Keywords: curriculum, international, languages, technology

Procedia PDF Downloads 430
1919 Comparison between RILM, JSTOR, and WorldCat Used to Search for Secondary Literature

Authors: Stacy Jarvis

Abstract:

Databases such as JSTOR, RILM and WorldCat have been the main source and storage of literature in the music orb. The Reference Index to Music Literature is a bibliographic database of over 2.6 million citations to writings about music from over 70 countries. The Research Institute produces RILM for the Study of Music at the University of Buffalo. JSTOR is an e-library of academic journals, books, and primary sources. Database JSTOR helps scholars find, utilise, and build upon a vast range of literature through a powerful teaching and research platform. Another database, WorldCat, is the world's biggest library catalogue, assisting scholars in finding library materials online. An evaluation of these databases in the music sphere is conducted by looking into the description and intended use and finding similarities and differences among them. Through comparison, it is found that these aim to serve different purposes, though they have the same goal of providing and storing literature. Also, since each database has different parts of literature that it majors on, the intended use of the three databases is evaluated. This can be found in the description, scope, and intended uses section. These areas are crucial to the research as it addresses the functional or literature differences among the three databases. It is also found that these databases have different quantitative potentials. This is determined by addressing the year each database began collecting literature and the number of articles, periodicals, albums, conference proceedings, music, dissertations, digital media, essays collections, journal articles, monographs, online resources, reviews, and reference materials that can be found in each one of them. This can be found in the sections- description, scope and intended uses and the importance of the database in identifying literature on different topics. To compare the delivery of services to the users, the importance of databases in identifying literature on different topics is also addressed in the section -the importance of databases in identifying literature on different topics. Even though these databases are used in research, they all have disadvantages and advantages. This is addressed in the sections on advantages and disadvantages. This will be significant in determining which of the three is the best. Also, it will help address how the shortcomings of one database can be addressed by utilising two databases together while conducting research. It is addressed in the section- a combination of RILM and JSTOR. All this information revolves around the idea that a huge amount of quantitative and qualitative data can be found in the presented databases on music and digital content; however, each of the given databases has a different construction and material features contributing to the musical scholarship in its way.

Keywords: RILM, JSTOR, WorldCat, database, literature, research

Procedia PDF Downloads 69
1918 An Automatic Model Transformation Methodology Based on Semantic and Syntactic Comparisons and the Granularity Issue Involved

Authors: Tiexin Wang, Sebastien Truptil, Frederick Benaben

Abstract:

Model transformation, as a pivotal aspect of Model-driven engineering, attracts more and more attentions both from researchers and practitioners. Many domains (enterprise engineering, software engineering, knowledge engineering, etc.) use model transformation principles and practices to serve to their domain specific problems; furthermore, model transformation could also be used to fulfill the gap between different domains: by sharing and exchanging knowledge. Since model transformation has been widely used, there comes new requirement on it: effectively and efficiently define the transformation process and reduce manual effort that involved in. This paper presents an automatic model transformation methodology based on semantic and syntactic comparisons, and focuses particularly on granularity issue that existed in transformation process. Comparing to the traditional model transformation methodologies, this methodology serves to a general purpose: cross-domain methodology. Semantic and syntactic checking measurements are combined into a refined transformation process, which solves the granularity issue. Moreover, semantic and syntactic comparisons are supported by software tool; manual effort is replaced in this way.

Keywords: automatic model transformation, granularity issue, model-driven engineering, semantic and syntactic comparisons

Procedia PDF Downloads 372
1917 Navigating through Organizational Change: TAM-Based Manual for Digital Skills and Safety Transitions

Authors: Margarida Porfírio Tomás, Paula Pereira, José Palma Oliveira

Abstract:

Robotic grasping is advancing rapidly, but transferring techniques from rigid to deformable objects remains a challenge. Deformable and flexible items, such as food containers, demand nuanced handling due to their changing shapes. Bridging this gap is crucial for applications in food processing, surgical robotics, and household assistance. AGILEHAND, a Horizon project, focuses on developing advanced technologies for sorting, handling, and packaging soft and deformable products autonomously. These technologies serve as strategic tools to enhance flexibility, agility, and reconfigurability within the production and logistics systems of European manufacturing companies. Key components include intelligent detection, self-adaptive handling, efficient sorting, and agile, rapid reconfiguration. The overarching goal is to optimize work environments and equipment, ensuring both efficiency and safety. As new technologies emerge in the food industry, there will be some implications, such as labour force, safety problems and acceptance of the new technologies. To overcome these implications, AGILEHAND emphasizes the integration of social sciences and humanities, for example, the application of the Technology Acceptance Model (TAM). The project aims to create a change management manual, that will outline strategies for developing digital skills and managing health and safety transitions. It will also provide best practices and models for organizational change. Additionally, AGILEHAND will design effective training programs to enhance employee skills and knowledge. This information will be obtained through a combination of case studies, structured interviews, questionnaires, and a comprehensive literature review. The project will explore how organizations adapt during periods of change and identify factors influencing employee motivation and job satisfaction. This project received funding from European Union’s Horizon 2020/Horizon Europe research and innovation program under grant agreement No101092043 (AGILEHAND).

Keywords: change management, technology acceptance model, organizational change, health and safety

Procedia PDF Downloads 30
1916 Self-Disclosure of Location: Influences of Personality Traits, Intrinsic Motivations and Extrinsic Motivations

Authors: Chechen Liao, Sheng Yi Lin

Abstract:

With the popularity of smartphone usage and the flourish of social networks, many people began to use the 'check-in' functions to share their location information and days of live and self-disclosure. In order to increase exposure and awareness, some stores provide discounts and other benefits to attract consumers to 'check-in' in their stores. The purpose of this study was to investigate whether personality traits, intrinsic motivations, extrinsic motivations, and privacy concerns would affect self-disclosure of location for consumers. Research data were collected from 407 individuals that have used Facebook check-in in Taiwan. This study used SmartPLS 2.0 structural equation modeling to validate the model. The results show that information sharing, information storage, enjoyment, self-presentation, get a feedback, economic reward, and keep up with trends had significant positive effects on self-disclosure. While extroversion and openness to use have significant positive effects on self-disclosure, conscientiousness and privacy concerns have significant negative effects on self-disclosure. The results of the study provide academic and practical implications for the future growth of location-based self-disclosure.

Keywords: check-in, extrinsic motivation, intrinsic motivation, personality trait, self-disclosure

Procedia PDF Downloads 154
1915 Sigma-Delta ADCs Converter a Study Case

Authors: Thiago Brito Bezerra, Mauro Lopes de Freitas, Waldir Sabino da Silva Júnior

Abstract:

The Sigma-Delta A/D converters have been proposed as a practical application for A/D conversion at high rates because of its simplicity and robustness to imperfections in the circuit, also because the traditional converters are more difficult to implement in VLSI technology. These difficulties with conventional conversion methods need precise analog components in their filters and conversion circuits, and are more vulnerable to noise and interference. This paper aims to analyze the architecture, function and application of Analog-Digital converters (A/D) Sigma-Delta to overcome these difficulties, showing some simulations using the Simulink software and Multisim.

Keywords: analysis, oversampling modulator, A/D converters, sigma-delta

Procedia PDF Downloads 313
1914 Development of a Real-Time Simulink Based Robotic System to Study Force Feedback Mechanism during Instrument-Object Interaction

Authors: Jaydip M. Desai, Antonio Valdevit, Arthur Ritter

Abstract:

Robotic surgery is used to enhance minimally invasive surgical procedure. It provides greater degree of freedom for surgical tools but lacks of haptic feedback system to provide sense of touch to the surgeon. Surgical robots work on master-slave operation, where user is a master and robotic arms are the slaves. Current, surgical robots provide precise control of the surgical tools, but heavily rely on visual feedback, which sometimes cause damage to the inner organs. The goal of this research was to design and develop a real-time simulink based robotic system to study force feedback mechanism during instrument-object interaction. Setup includes three Velmex XSlide assembly (XYZ Stage) for three dimensional movement, an end effector assembly for forceps, electronic circuit for four strain gages, two Novint Falcon 3D gaming controllers, microcontroller board with linear actuators, MATLAB and Simulink toolboxes. Strain gages were calibrated using Imada Digital Force Gauge device and tested with a hard-core wire to measure instrument-object interaction in the range of 0-35N. Designed simulink model successfully acquires 3D coordinates from two Novint Falcon controllers and transfer coordinates to the XYZ stage and forceps. Simulink model also reads strain gages signal through 10-bit analog to digital converter resolution of a microcontroller assembly in real time, converts voltage into force and feedback the output signals to the Novint Falcon controller for force feedback mechanism. Experimental setup allows user to change forward kinematics algorithms to achieve the best-desired movement of the XYZ stage and forceps. This project combines haptic technology with surgical robot to provide sense of touch to the user controlling forceps through machine-computer interface.

Keywords: surgical robot, haptic feedback, MATLAB, strain gage, simulink

Procedia PDF Downloads 520
1913 Smartphones in the (Class) Room in Pandemic and Post-pandemic Times: a Study in an Ecological Perspective

Authors: Junia Braga, Antonio carlos Martins, Marcos Racilan

Abstract:

Drawing on the ecological approach, this paper reports a qualitative study that aims to understand how mobile technologies were integrated during the pandemic in the context of language teaching and the use of these technologies in post-pandemic times. Seventy-six teachers answered a questionnaire about their experiences. The findings show how the network with peers scaffolded this experience and played a crucial role in their appropriation of those technologies. They also suggest that this network may have contributed to the normalisation of digital technology use.

Keywords: ecological perspective, language teaching, mobile technologies, teacher education

Procedia PDF Downloads 86
1912 A Scoping Review of Technology-Facilitated Gender-Based Violence: Findings from Asia

Authors: Vaiddehi Bansal, Laura Hinson, Mayumi Rezwan, Erin Leasure, Mithila Iyer, Connor Roth, Poulomi Pal, Kareem Kysia

Abstract:

As digital usage becomes increasingly ubiquitous worldwide, technology-facilitated gender-based violence (GBV) has garnered increasing attention in the recent years, especially during the COVID-19 pandemic. This form of violence is defined as “action by one or more people that harms others based on their sexual or gender identity or by enforcing harmful gender norms. This action is carried out using the internet and/or mobile technology that harms others based on their sexual or gender identity or by enforcing harmful gender norms”.Common forms of technology-facilitated GBV include cyberstalking, cyberbullying, sexual harassment, image-based abuse, doxing, hacking, gendertrolling, hate speech, and impersonation. Most literature on this pervasive yet complex issue has emerged from high-income countries, and few studies comprehensively summarize its prevalence, manifestations, and implications. This rigorous scoping review examines the evidence base of this phenomenon in low and middle-income countries across Asia, summarizing trends and gaps to inform actionable recommendations. The research team developed search terms to conduct a comprehensive search of peer-reviewed and grey literature. Query results were eligible for inclusion if they were published in English between 2006-2021 and with an explicit emphasis on technology-facilitated violence, gender, and the countries of interest in the Asia region. Title, abstracts, and full-texts were independently screened by two reviewers based on inclusion criteria, and data was extracted through deductive coding. Of 2,042 articles screened, 97 met inclusion criteria. The review revealed a gap in the evidence-base in Central Asia and the Pacific Islands. Findings across South and Southeast Asia indicate that technology-facilitated GBV comprises various forms of abuse, violence, and harassment that are largely shaped by country-specific societal norms and technological landscapes. The literature confirms that women, girls, and sexual minorities, especially those with intersecting marginalized identities, are often more vulnerable to experiencing online violence. Cultural norms and patriarchal structures tend to stigmatize survivors, limiting their ability to seek social and legal support. Survivors are also less likely to report their experience due to barriers such as lack of awareness of reporting mechanisms, the perception that digital platforms will not address their complaints, and cumbersome reporting systems. The COVID-19 pandemic has further exacerbated perpetration and strained support mechanisms. Prevalence varies by the form of violence but is difficult to estimate accurately due to underreporting and disjointed, outdated, or non-existent legal definitions. Addressing technology-facilitated GBV in Asia requires collective action from multiple actors, including government authorities, technology companies, digital and feminist movements, NGOs, and researchers.

Keywords: gender-based violence, technology, online sexual harassment, image-based abuse

Procedia PDF Downloads 113
1911 Horizontal Cooperative Game Theory in Hotel Revenue Management

Authors: Ririh Rahma Ratinghayu, Jayu Pramudya, Nur Aini Masruroh, Shi-Woei Lin

Abstract:

This research studies pricing strategy in cooperative setting of hotel duopoly selling perishable product under fixed capacity constraint by using the perspective of managers. In hotel revenue management, competitor’s average room rate and occupancy rate should be taken into manager’s consideration in determining pricing strategy to generate optimum revenue. This information is not provided by business intelligence or available in competitor’s website. Thus, Information Sharing (IS) among players might result in improved performance of pricing strategy. IS is widely adopted in the logistics industry, but IS within hospitality industry has not been well-studied. This research put IS as one of cooperative game schemes, besides Mutual Price Setting (MPS) scheme. In off-peak season, hotel manager arranges pricing strategy to offer promotion package and various kinds of discounts up to 60% of full-price to attract customers. Competitor selling homogenous product will react the same, then triggers a price war. Price war which generates lower revenue may be avoided by creating collaboration in pricing strategy to optimize payoff for both players. In MPS cooperative game, players collaborate to set a room rate applied for both players. Cooperative game may avoid unfavorable players’ payoff caused by price war. Researches on horizontal cooperative game in logistics show better performance and payoff for the players, however, horizontal cooperative game in hotel revenue management has not been demonstrated. This paper aims to develop hotel revenue management models under duopoly cooperative schemes (IS & MPS), which are compared to models under non-cooperative scheme too. Each scheme has five models, Capacity Allocation Model; Demand Model; Revenue Model; Optimal Price Model; and Equilibrium Price Model. Capacity Allocation Model and Demand Model employs self-hotel and competitor’s full and discount price as predictors under non-linear relation. Optimal price is obtained by assuming revenue maximization motive. Equilibrium price is observed by interacting self-hotel’s and competitor’s optimal price under reaction equation. Equilibrium is analyzed using game theory approach. The sequence applies for three schemes. MPS Scheme differently aims to optimize total players’ payoff. The case study in which theoretical models are applied observes two hotels offering homogenous product in Indonesia during a year. The Capacity Allocation, Demand, and Revenue Models are built using multiple regression and statistically tested for validation. Case study data confirms that price behaves within demand model in a non-linear manner. IS Models can represent the actual demand and revenue data better than Non-IS Models. Furthermore, IS enables hotels to earn significantly higher revenue. Thus, duopoly hotel players in general, might have reasonable incentives to share information horizontally. During off-peak season, MPS Models are able to predict the optimal equal price for both hotels. However, Nash equilibrium may not always exist depending on actual payoff of adhering or betraying mutual agreement. To optimize performance, horizontal cooperative game may be chosen over non-cooperative game. Mathematical models can be used to detect collusion among business players. Empirical testing can be used as policy input for market regulator in preventing unethical business practices potentially harming society welfare.

Keywords: horizontal cooperative game theory, hotel revenue management, information sharing, mutual price setting

Procedia PDF Downloads 271
1910 The Impact of Facebook Brand Pages Engagement on Consumers Purchase Behaviour

Authors: Sudarsan Jayasingh, R. Venkatesh

Abstract:

Increasing number of customers gets connected to social networking sites, such as Facebook and Twitter to details about the brand communications. This survey, based on a convenience sample, aimed to find the reason for the participants to like Facebook fan pages, how often they visit and interact with the pages that they like, and how is it related with their purchase behaviour. 104 respondents completed the online survey. Overall, the study aimed at determining whether or not creating and maintaining a Facebook fan page is a beneficial tool for brands to communicate with their consumer base.

Keywords: facebook brand pages, social media, consumer engagement, digital engagement, purchase behaviour

Procedia PDF Downloads 300
1909 Extraction of Text Subtitles in Multimedia Systems

Authors: Amarjit Singh

Abstract:

In this paper, a method for extraction of text subtitles in large video is proposed. The video data needs to be annotated for many multimedia applications. Text is incorporated in digital video for the motive of providing useful information about that video. So need arises to detect text present in video to understanding and video indexing. This is achieved in two steps. First step is text localization and the second step is text verification. The method of text detection can be extended to text recognition which finds applications in automatic video indexing; video annotation and content based video retrieval. The method has been tested on various types of videos.

Keywords: video, subtitles, extraction, annotation, frames

Procedia PDF Downloads 583
1908 Attitude towards the Consumption of Social Media: Analyzing Young Consumers’ Travel Behavior

Authors: Farzana Sharmin, Mohammad Tipu Sultan, Benqian Li

Abstract:

Advancement of new media technology and consumption of social media have altered the way of communication in the tourism industry, mostly for consumers’ travel planning, online purchase, and experience sharing activity. There is an accelerating trend among young consumers’ to utilize this new media technology. This paper aims to analyze the attitude of young consumers’ about social media use for travel purposes. The convenience random sample method used to collect data from an urban area of Shanghai (China), consists of 225 young consumers’. This survey identified behavioral determinants of social media consumption by the extended theory of planned behavior (TPB). The instrument developed support on previous research to test hypotheses. The results of structural analyses indicate that attitude towards the use of social media is affected by external factors such as availability and accessibility of technology. In addition, subjective norm and perceived behavioral control have partially influenced the attitude of respondents’. The results of this study could help to improve social media travel marketing and promotional strategies for respective groups.

Keywords: social media, theory of planned behavior, travel behavior, young consumer

Procedia PDF Downloads 177
1907 Applications of Artificial Intelligence (AI) in Cardiac imaging

Authors: Angelis P. Barlampas

Abstract:

The purpose of this study is to inform the reader, about the various applications of artificial intelligence (AI), in cardiac imaging. AI grows fast and its role is crucial in medical specialties, which use large amounts of digital data, that are very difficult or even impossible to be managed by human beings and especially doctors.Artificial intelligence (AI) refers to the ability of computers to mimic human cognitive function, performing tasks such as learning, problem-solving, and autonomous decision making based on digital data. Whereas AI describes the concept of using computers to mimic human cognitive tasks, machine learning (ML) describes the category of algorithms that enable most current applications described as AI. Some of the current applications of AI in cardiac imaging are the follows: Ultrasound: Automated segmentation of cardiac chambers across five common views and consequently quantify chamber volumes/mass, ascertain ejection fraction and determine longitudinal strain through speckle tracking. Determine the severity of mitral regurgitation (accuracy > 99% for every degree of severity). Identify myocardial infarction. Distinguish between Athlete’s heart and hypertrophic cardiomyopathy, as well as restrictive cardiomyopathy and constrictive pericarditis. Predict all-cause mortality. CT Reduce radiation doses. Calculate the calcium score. Diagnose coronary artery disease (CAD). Predict all-cause 5-year mortality. Predict major cardiovascular events in patients with suspected CAD. MRI Segment of cardiac structures and infarct tissue. Calculate cardiac mass and function parameters. Distinguish between patients with myocardial infarction and control subjects. It could potentially reduce costs since it would preclude the need for gadolinium-enhanced CMR. Predict 4-year survival in patients with pulmonary hypertension. Nuclear Imaging Classify normal and abnormal myocardium in CAD. Detect locations with abnormal myocardium. Predict cardiac death. ML was comparable to or better than two experienced readers in predicting the need for revascularization. AI emerge as a helpful tool in cardiac imaging and for the doctors who can not manage the overall increasing demand, in examinations such as ultrasound, computed tomography, MRI, or nuclear imaging studies.

Keywords: artificial intelligence, cardiac imaging, ultrasound, MRI, CT, nuclear medicine

Procedia PDF Downloads 61
1906 The Use of Hedging Devices in Studens’ Oral Presentation

Authors: Siti Navila

Abstract:

Hedging as a kind of pragmatic competence is an essential part in achieving the goal in communication, especially in academic discourse where the process of sharing knowledge among academic community takes place. Academic discourse demands an appropriateness and modesty of an author or speaker in stating arguments, to name but few, by considering the politeness, being cautious and tentative, and differentiating personal opinions and facts in which these aspects can be achieved through hedging. This study was conducted to find the hedging devices used by students as well as to analyze how they use them in their oral presentation. Some oral presentations from English Department students of the State University of Jakarta on their Academic Presentation course final test were recorded and explored formally and functionally. It was found that the most frequent hedging devices used by students were shields from all hedging devices that students commonly used when they showed suggestion, stated claims, showed opinion to provide possible but still valid answer, and offered the appropriate solution. The researcher suggests that hedging can be familiarized in learning, since potential conflicts that is likely to occur while delivering ideas in academic contexts such as disagreement, criticism, and personal judgment can be reduced with the use of hedging. It will also benefit students in achieving the academic competence with an ability to demonstrate their ideas appropriately and more acceptable in academic discourse.

Keywords: academic discourse, hedging, hedging devices, lexical hedges, Meyer classification

Procedia PDF Downloads 448
1905 Reliability Analysis of Computer Centre at Yobe State University Using LRU Algorithm

Authors: V. V. Singh, Yusuf Ibrahim Gwanda, Rajesh Prasad

Abstract:

In this paper, we focus on the reliability and performance analysis of Computer Centre (CC) at Yobe State University, Damaturu, Nigeria. The CC consists of three servers: one database mail server, one redundant and one for sharing with the client computers in the CC (called as a local server). Observing the different possibilities of the functioning of the CC, the analysis has been done to evaluate the various popular measures of reliability such as availability, reliability, mean time to failure (MTTF), profit analysis due to the operation of the system. The system can ultimately fail due to the failure of router, redundant server before repairing the mail server and switch failure. The system can also partially fail when a local server fails. The failed devices have restored according to Least Recently Used (LRU) techniques. The system can also fail entirely due to a cooling failure of the server, electricity failure or some natural calamity like earthquake, fire tsunami, etc. All the failure rates are assumed to be constant and follow exponential time distribution, while the repair follows two types of distributions: i.e. general and Gumbel-Hougaard family copula distribution.

Keywords: reliability, availability Gumbel-Hougaard family copula, MTTF, internet data centre

Procedia PDF Downloads 515
1904 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 386
1903 Business Entrepreneurs in the Making

Authors: Talha Sareshwala

Abstract:

The purpose of this research paper is to revise the skills of an entrepreneur in the making and to guide future Entrepreneurs into a promising future. The study presents a broader review of entrepreneurship, starting from its definition and antecedents. A well-developed original set of guidelines can help budding entrepreneurs and practitioners seeking an answer to being successful as an entrepreneur. It is a journey full of excitement, experiences, rewards, and learning. Dedication, work ethics and a never-say-die attitude will largely contribute to the success as a businessman and an entrepreneur. This paper is sharing an experience of how an entrepreneur can act as a catalyst for young minds while ensuring them that ethics and principles do pay in business when followed in true spirit and action. It is very important for an entrepreneur to enhance his product or services, marketing skills, and market share, along with providing customer satisfaction and opportunities for teams to improve their leadership qualities. To have strong employee loyalty and job satisfaction among its employees. Based on Research objectives, primarily in-depth interviews and focused group interviews were conducted as a qualitative research method. And to support this survey, questionnaires were used as a qualitative research method to explore how Indian Entrepreneurs face the challenge of the changing, volatile socio-political environment in India.

Keywords: entrepreneur, business ethics, sales, marketing

Procedia PDF Downloads 76
1902 Multi-Generational Analysis of Perception and Acceptance of Mental Illnesses: Current Indian Context

Authors: Anvi Kumar

Abstract:

This paper explores the attitudes and awareness of multiple generations ranging from Boomers I to GenZ (i.e. from 1954 to 2012) towards mental health issues. A convenient sample of 191 people was gathered in India aged 11-77. 20 people each were considered from 5 generational cohorts, namely- Boomers I, Boomers II, Gen X, Millennials, and Gen Z. The study tool comprised a survey that included demographic questions and the Community Attitude towards Mental Illness (CAMI) scale by Taylor & Dear (1981). Descriptive statistics, ANOVA, and Bonferonni’s post-hoc analysis have been used to perform the analysis. The findings reveal that the level of kindness towards those who struggle with mental health varies through certain age groups. An overall sense of exclusion of those struggling with mental health is prevalent among all age groups. GenZ’s awareness of mental health issues is primarily via social media, as against the rest of the generations seeking it from close relatives and friends. The study’s findings suggest a need to investigate further the quality of mental health knowledge content and its consumption pattern. Understanding the dynamics of information sharing and the potential for biases requires further discovery.

Keywords: attitude, behaviour, mental illness, Gen Z, millennials, Gen Y, multi-generations, generational differences

Procedia PDF Downloads 61
1901 Software User Experience Enhancement through Collaborative Design

Authors: Shan Wang, Fahad Alhathal, Daniel Hobson

Abstract:

User-centered design skills play an important role in crafting a positive and intuitive user experience for software applications. Embracing a user-centric design approach involves understanding the needs, preferences, and behaviors of the end-users throughout the design process. This mindset not only enhances the usability of the software but also fosters a deeper connection between the digital product and its users. This paper encompasses a 6-month knowledge exchange collaboration project between an academic institution and an external industry in 2023, aims to improve the user experience of a digital platform utilized for a knowledge management tool, to understand users' preferences for features, identify sources of frustration, and pinpoint areas for enhancement. This research conducted one of the most effective methods to implement user-centered design through co-design workshops for testing user onboarding experiences that involve the active participation of users in the design process. More specifically, in January 2023, we organized eight workshops with a diverse group of 11 individuals. Throughout these sessions, we accumulated a total of 11 hours of qualitative data in both video and audio formats. Subsequently, we conducted an analysis of user journeys, identifying common issues and potential areas for improvement. This analysis was pivotal in guiding the knowledge management software in prioritizing feature enhancements and design improvements. Employing a user-centered design thinking process, we developed a series of graphic design solutions in collaboration with the software management tool company. These solutions were targeted at refining onboarding user experiences, workplace interfaces, and interactive design. Some of these design solutions were translated into tangible interfaces for the knowledge management tool. By actively involving users in the design process and valuing their input, developers can create products that are not only functional but also resonate with the end-users, ultimately leading to greater success in the competitive software landscape. In conclusion, this paper not only contributes insights into designing onboarding user experiences for software within a co-design approach but also presents key theories on leveraging the user-centered design process in software design to enhance overall user experiences.

Keywords: user experiences, co-design, design process, knowledge management tool, user-centered design

Procedia PDF Downloads 41