Search results for: multi-homing users
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2433

Search results for: multi-homing users

693 Implementing Biogas Technology in Rural Areas of Limpopo: Analysis of Gawula, Mopani District in South Africa

Authors: Thilivhali E. Rasimphi, David Tinarwo

Abstract:

Access to energy is crucial in poverty alleviation, economic growth, education, and agricultural improvement. The best renewable energy source is one which is locally available, affordable, and can easily be used and managed by local communities. The usage of renewable energy technology has the potential to alleviate many of the current problems facing rural areas. To address energy poverty, biogas technology has become an important part of resolving such. This study, therefore, examines the performance of digesters in Gawula village; it also identifies the contributing factors to the adoption and use of the technology. Data was collected using an open-ended questionnaire from biogas users. To evaluate the performance of the digesters, a data envelopment analysis (DEA) non-parametric technique was used, and to identify key factors affecting adoption, a logit model was applied. The reviewed critical barriers to biogas development in the area seem to be a poor institutional framework, poor infrastructure, a lack of technical support, user training on maintenance and operation, and as such, the implemented plants have failed to make the desired impact. Thus most digesters were abandoned. To create awareness amongst rural communities, government involvement is key, and there is a need for national programs. Biogas technology does what few other renewable energy technologies do, which is to integrate waste management and energy. This creates a substantial opportunity for biogas generation and penetration. That is, a promising pathway towards achieving sustainable development through biogas technology.

Keywords: domestic biogas technology, economic, sustainable, social, rural development

Procedia PDF Downloads 126
692 Psychological Impacts of Over-the-Top Services on Consumer Behaviors during the COVID-19 Pandemic

Authors: Hector Liu, Chih-Ming Tsai

Abstract:

Consumer behaviors in the subscription of over-the-top (OTT) media services have substantially changed because of the COVID-19 pandemic; hence, this study aims to determine the factors affecting subscription intentions. The increased usage of OTT media, particularly in the lockdowns during the COVID-19 pandemic, has intensified the competition between both global and local streaming providers. While studies have discussed antecedents accounting for this change, they have paid limited attention to the psychological factors that shape consumer behavior in using OTT services. Given the changes in consumers’ psychological states during the pandemic, this study seeks to fill the research gap by integrating the expectancy-value model to provide insights into the key gratifications that consumers seek and obtain and that have affected their subscription to OTT services. This study proposes a theoretical model and assesses this framework on data collected from 1,068 OTT service users in Taiwan. The results strengthen the literature by indicating a clear growth in the popularity and subscription of OTT services because of the COVID-19 lockdowns as well as factors such as perceived quality and satisfaction, which influence behavioral intentions for OTT services. Most crucially, however, OTT viewers who acquired a sense of belonging, a sense of being accompanied, and a sense of reduction in anxiety due to being quarantined and in lockdown show a higher tendency to continue their subscriptions to their OTT services of choice during the pandemic. With consumer behavior trends forever changed by the COVID-19 pandemic, the implications from this study provide OTT service platforms with an opportunity to capitalize on their current and potential customers’ changing desires, demands, and factors for a continued subscription.

Keywords: consumer behavior, COVID-19, expectancy-value model, OTT media services

Procedia PDF Downloads 91
691 Role of Social Media in Imparting Climate Change through Diffusion of Innovation

Authors: Zahra Ali Abbasi, Syed Muhammad Saqib Saleem

Abstract:

This research explores the relationship between social media and awareness about climate change amongst the university students of Lahore, Pakistan. The aim is to understand how the people of Pakistan perceive climate change, especially on the social media. A deductive and quantitative method is applied on the research to find out the awareness of climate change in the people using social media. For this purpose, a survey method is used, to analyze the response from 167 online respondents through stratified random sampling technique. The relation between multiple variables including awareness about important climatic events like Paris agreement, GreenTube, Smog in Lahore, Floods in Pakistan and other eminent incidents of climate change and social media are calculated by analyzing social media as a source to impart information about climate change. The results show that as people get aware of climate change, they post about different national and international events/incidents of climate which reveal a significant relationship between respondents' awareness about climate change and their posting and sharing of content about climate change. Another test indicates that respondents’ post/share/comment (impart) information about climate change when there is a shift in the climate both globally and nationally. However, the significance of both these correlations has been found to be negligible. Social media being an independent platform holds greater influencing power, hence, as consumers of the environment the users hold the responsibility of producing and sharing content at a global platform about climate. However, matters of politics, economy and religion seem to have overshadowed the significance of climate.

Keywords: climate change, diffusion of innovation, environment, social media, Pakistan

Procedia PDF Downloads 169
690 Associated Map and Inter-Purchase Time Model for Multiple-Category Products

Authors: Ching-I Chen

Abstract:

The continued rise of e-commerce is the main driver of the rapid growth of global online purchase. Consumers can nearly buy everything they want at one occasion through online shopping. The purchase behavior models which focus on single product category are insufficient to describe online shopping behavior. Therefore, analysis of multi-category purchase gets more and more popular. For example, market basket analysis explores customers’ buying tendency of the association between product categories. The information derived from market basket analysis facilitates to make cross-selling strategies and product recommendation system. To detect the association between different product categories, we use the market basket analysis with the multidimensional scaling technique to build an associated map which describes how likely multiple product categories are bought at the same time. Besides, we also build an inter-purchase time model for associated products to describe how likely a product will be bought after its associated product is bought. We classify inter-purchase time behaviors of multi-category products into nine types, and use a mixture regression model to integrate those behaviors under our assumptions of purchase sequences. Our sample data is from comScore which provides a panelist-label database that captures detailed browsing and buying behavior of internet users across the United States. Finding the inter-purchase time from books to movie is shorter than the inter-purchase time from movies to books. According to the model analysis and empirical results, this research finally proposes the applications and recommendations in the management.

Keywords: multiple-category purchase behavior, inter-purchase time, market basket analysis, e-commerce

Procedia PDF Downloads 352
689 An Exploratory Study to Investigate the Impact of Corporate Social Responsibility on Luxury Brand Avoidance in India

Authors: Glyn Atwal, Douglas Bryson

Abstract:

The rapid expansion of a consumer class in India has also coincided with an increasing awareness of social and environmental issues. The overall objective of this study explores to what extent Corporate Social Responsibility (CSR) can lead to luxury brand avoidance within an Indian context. In-depth interviews were conducted with luxury consumers in New Delhi. The demographic breakdown of those interviewed was 16 males and 9 females, aged between 21 and 44. Antecedents of brand avoidance could be sorted according to two main categories. The first category was consumer dissatisfaction due to poor product or service performance. Customer service, particularly within the hospitality sector, was identified as a defining source of brand avoidance. The second category was negative stereotypes of brand users. A salient finding was that no single participant explicitly identified CSR as a source of brand avoidance. However, the interviews revealed that luxury consumers are in fact concerned about CSR issues but assume that international luxury brands have a positive record on CSR performance. Interestingly, participants placed greater emphasis on the broader interpretation of ‘corporate reputation’ rather than specific social or environmental issues to determine the CSR performance of a luxury brand. The findings reported in this exploratory study suggest that Indian luxury consumers do value the overall CSR performance of luxury brands expressed as a brand responsibility or brand reputation, and this is a potential source of brand avoidance. International luxury brands need, therefore, consider developing but also communicating a positive CSR strategy in order to reduce the risk of customers forming negative opinions about the brand.

Keywords: brand avoidance, CSR, luxury

Procedia PDF Downloads 292
688 Developing a Spatial Decision Support System for Rationality Assessment of Land Use Planning Locations in Thai Binh Province, Vietnam

Authors: Xuan Linh Nguyen, Tien Yin Chou, Yao Min Fang, Feng Cheng Lin, Thanh Van Hoang, Yin Min Huang

Abstract:

In Vietnam, land use planning is the most important and powerful tool of the government for sustainable land use and land management. Nevertheless, many of land use planning locations are facing protests from surrounding households due to environmental impacts. In addition, locations are planned completely based on the subjective decisions of planners who are unsupported by tools or scientific methods. Hence, this research aims to assist the decision-makers in evaluating the rationality of planning locations by developing a Spatial Decision Support System (SDSS) using approaches of Geographic Information System (GIS)-based technology, Analytic Hierarchy Process (AHP) multi-criteria-based technique and Fuzzy set theory. An ArcGIS Desktop add-ins named SDSS-LUPA was developed to support users analyzing data and presenting results in friendly format. The Fuzzy-AHP method has been utilized as analytic model for this SDSS. There are 18 planned locations in Hung Ha district (Thai Binh province, Vietnam) as a case study. The experimental results indicated that the assessment threshold higher than 0.65 while the 18 planned locations were irrational because of close to residential areas or close to water sources. Some potential sites were also proposed to the authorities for consideration of land use planning changes.

Keywords: analytic hierarchy process, fuzzy set theory, land use planning, spatial decision support system

Procedia PDF Downloads 357
687 Using LTE-Sim in New Hanover Decision Algorithm for 2-Tier Macrocell-Femtocell LTE Network

Authors: Umar D. M., Aminu A. M., Izaddeen K. Y.

Abstract:

Deployments of mini macrocell base stations also referred to as femtocells, improve the quality of service of indoor and outdoor users. Nevertheless, mobility management remains a key issue with regards to their deployment. This paper is leaned towards this issue, with an in-depth focus on the most important aspect of mobility management -handover. In handover management, making a handover decision in the LTE two-tier macrocell femtocell network is a crucial research area. Decision algorithms in this research are classified and comparatively analyzed according to received signal strength, user equipment speed, cost function, and interference. However, it was observed that most of the discussed decision algorithms fail to consider cell selection with hybrid access policy in a single macrocell multiple femtocell scenario, another observation was a majority of these algorithms lack the incorporation of user equipment residence parameter. Not including this parameter boosts the number of unnecessary handover occurrence. To deal with these issues, a sophisticated handover decision algorithm is proposed. The proposed algorithm considers the user’s velocity, received signal strength, residence time, as well as the femtocell base station’s access policy. Simulation results have shown that the proposed algorithm reduces the number of unnecessary handovers when compared to conventional received signal strength-based handover decision algorithm.

Keywords: user-equipment, radio signal service, long term evolution, mobility management, handoff

Procedia PDF Downloads 109
686 Multi-Stream Graph Attention Network for Recommendation with Knowledge Graph

Authors: Zhifei Hu, Feng Xia

Abstract:

In recent years, Graph neural network has been widely used in knowledge graph recommendation. The existing recommendation methods based on graph neural network extract information from knowledge graph through entity and relation, which may not be efficient in the way of information extraction. In order to better propose useful entity information for the current recommendation task in the knowledge graph, we propose an end-to-end Neural network Model based on multi-stream graph attentional Mechanism (MSGAT), which can effectively integrate the knowledge graph into the recommendation system by evaluating the importance of entities from both users and items. Specifically, we use the attention mechanism from the user's perspective to distil the domain nodes information of the predicted item in the knowledge graph, to enhance the user's information on items, and generate the feature representation of the predicted item. Due to user history, click items can reflect the user's interest distribution, we propose a multi-stream attention mechanism, based on the user's preference for entities and relationships, and the similarity between items to be predicted and entities, aggregate user history click item's neighborhood entity information in the knowledge graph and generate the user's feature representation. We evaluate our model on three real recommendation datasets: Movielens-1M (ML-1M), LFM-1B 2015 (LFM-1B), and Amazon-Book (AZ-book). Experimental results show that compared with the most advanced models, our proposed model can better capture the entity information in the knowledge graph, which proves the validity and accuracy of the model.

Keywords: graph attention network, knowledge graph, recommendation, information propagation

Procedia PDF Downloads 95
685 Augmented Reality for Children Vocabulary Learning: Case Study in a Macau Kindergarten

Authors: R. W. Chan, Kan Kan Chan

Abstract:

Augmented Reality (AR), with the affordance of bridging between real world and virtual world, brings users immersive experience. It has been applied in education gradually and even come into practice in student daily learning. However, a systematic review shows that there are limited researches in the area of vocabulary acquisition in early childhood education. Since kindergarten is a key stage where children acquire language and AR as an emerging and potential technology to support the vocabulary acquisition, this study aims to explore its value in in real classroom with teacher’s view. Participants were a class of 5 to 6 years old kids studying in a Macau school that follows Cambridge curriculum and emphasizes multicultural ethos. There were 11 boys, 13 girls, and in a total of 24 kids. They learnt animal vocabulary using mobile device and AR flashcards, IPad to scan AR flashcards and interact with pop-up virtual objects. In order to estimate the effectiveness of using Augmented Reality, children attended vocabulary pre-posttest. In addition, teacher interview was administrated after this learning activity to seek practitioner’s opinion towards this technology. For data analysis, paired samples t-test was utilized to measure the instructional effect based on the pre-posttest data. Result shows that Augmented Reality could significantly enhance children vocabulary learning with large effect size. Teachers indicated that children enjoyed the AR learning activity but clear instruction is needed. Suggestions for the future implementation of vocabulary acquisition using AR are suggested.

Keywords: augmented reality, kindergarten children, vocabulary learning, Macau

Procedia PDF Downloads 130
684 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks

Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode

Abstract:

The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.

Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control

Procedia PDF Downloads 52
683 The Misuse of Social Media in Order to Exploit "Generation Y"; The Tactics of IS

Authors: Ali Riza Perçin, Eser Bingül

Abstract:

Internet technologies have created opportunities with which people share their ideologies, thoughts and products. This virtual world, named social media has given the chance of gathering individual users and people from the world's remote locations and establishing an interaction between them. However, to an increasingly higher degree terrorist organizations today use the internet and most notably social-network media to create the effects they desire through a series of on-line activities. These activities, designed to support their activities, include information collection (intelligence), target selection, propaganda, fundraising and recruitment to name a few. Meanwhile, these have been used as the most important tool for recruitment especially from the different region of the world, especially disenfranchised youth, in the West in order to mobilize support and recruit “foreign fighters.” The recruits have obtained the statue, which is not accessible in their society and have preferred the style of life that is offered by the terrorist organizations instead of their current life. Like other terrorist groups, for a while now the terrorist organization Islamic State (IS) in Iraq and Syria has employed a social-media strategy in order to advance their strategic objectives. At the moment, however, IS seems to be more successful in their on-line activities than other similar organizations. IS uses social media strategically as part of its armed activities and for the sustainability of their military presence in Syria and Iraq. In this context, “Generation Y”, which could exist at the critical position and undertake active role, has been examined. Additionally, the explained characteristics of “Generation Y” have been put forward and the duties of families and society have been stated as well.

Keywords: social media, "generation Y", terrorist organization, islamic state IS

Procedia PDF Downloads 410
682 Simulation of the Collimator Plug Design for Prompt-Gamma Activation Analysis in the IEA-R1 Nuclear Reactor

Authors: Carlos G. Santos, Frederico A. Genezini, A. P. Dos Santos, H. Yorivaz, P. T. D. Siqueira

Abstract:

The Prompt-Gamma Activation Analysis (PGAA) is a valuable technique for investigating the elemental composition of various samples. However, the installation of a PGAA system entails specific conditions such as filtering the neutron beam according to the target and providing adequate shielding for both users and detectors. These requirements incur substantial costs, exceeding $100,000, including manpower. Nevertheless, a cost-effective approach involves leveraging an existing neutron beam facility to create a hybrid system integrating PGAA and Neutron Tomography (NT). The IEA-R1 nuclear reactor at IPEN/USP possesses an NT facility with suitable conditions for adapting and implementing a PGAA device. The NT facility offers a thermal flux slightly colder and provides shielding for user protection. The key additional requirement involves designing detector shielding to mitigate high gamma ray background and safeguard the HPGe detector from neutron-induced damage. This study employs Monte Carlo simulations with the MCNP6 code to optimize the collimator plug for PGAA within the IEA-R1 NT facility. Three collimator models are proposed and simulated to assess their effectiveness in shielding gamma and neutron radiation from nucleon fission. The aim is to achieve a focused prompt-gamma signal while shielding ambient gamma radiation. The simulation results indicate that one of the proposed designs is particularly suitable for the PGAA-NT hybrid system.

Keywords: MCNP6.1, neutron, prompt-gamma ray, prompt-gamma activation analysis

Procedia PDF Downloads 49
681 Intelligent Parking Systems for Quasi-Close Communities

Authors: Ayodele Adekunle Faiyetole, Olumide Olawale Jegede

Abstract:

This paper presents the experimental design and needs justifications for a localized intelligent parking system (L-IPS), ideal for quasi-close communities with increasing vehicular volume that depends on limited or constant parking facilities. For a constant supply in parking facilities, the demand for an increasing vehicular volume could lead to poor time conservation or extended travel time, traffic congestion or impeded mobility, and safety issues. Increased negative environmental and economic externalities are other associated and consequent downsides of disparities in demand and supply. This L-IPS is designed using a microcontroller, ultrasonic sensors, LED indicators, such that the current status, in terms of parking spots availability, can be known from the main entrance to the community or a parking zone on a LCD screen. As an advanced traffic management system (ATMS), the L-IPS is designed to resolve aspects of infrastructure-to-driver (I2D) communication and parking detection issues. Thus, this L-IPS can act as a timesaver for users by helping them know the availability of parking spots. Providing on-time, informed routing, to a next preference or seamless moving to berth on the available spot on a proximate facility as the case may be. Its use could also increase safety and increase mobility, and fuel savings and costs, therefore, reducing negative environmental and economic externalities due to transportation systems.

Keywords: intelligent parking systems, localized intelligent parking system, intelligent transport systems, advanced traffic management systems, infrastructure-to-drivers communication

Procedia PDF Downloads 155
680 Policy Analysis on Family Planning in Pakistan: Providing Options to Improve Service Provision

Authors: M. Moiz

Abstract:

Family planning has been known and accepted as a key tool to decrease fertility, provides birth spacing and plays a vital role to attain better outcomes for maternal and child health. Pakistan initiated various family planning programs to preserve maternal and child health for six decades. However, less contraceptive use leading to high fertility and low birth spacing is ultimately a risk for increasing morbidity and mortality. As an outcome of 2012 London Summit on Family Planning where 20 countries including Pakistan made its commitment to increase contraceptive prevalence rate by 55% and provide a universal access to reproductive health to protect human rights of women and ensure safe, choice informed and affordable contraceptives throughout the country. This paper will assess some of the factors of service delivery, coverage and the role of Ministry of Health and Population Welfare Department in providing Family Planning services and how it can be improved in Pakistan. In view of Pakistan Demographic Health Survey 2017-18, there are total nine million potential users of contraceptives and one third among them never used with unmet need while every fifth pregnancy ends into abortion indicates need for Family Planning services. In order to explain this concern, a comprehensive analysis has been done on role of governance in implementing family planning policy and its limitations are discussed. Moreover, this paper highlights policy options and recommendations for improving service provision through public and private sector in creating demand for Family Planning services in Pakistan.

Keywords: contraceptive prevalence rate, family planning, maternal and child health, policy options

Procedia PDF Downloads 142
679 Deaf Inmates in Canadian Prisons: Addressing Discrimination through Staff Training Videos with Deaf Actors

Authors: Tracey Bone

Abstract:

Deaf inmates, whose first or preferred language is a Signed Language, experience barriers to accessing the necessary two-way communication with correctional staff, and the educational and social programs that will enhance their eligibility for conditional release from the federal prison system in Canada. The development of visual content to enhance the knowledge and skill development of correctional staff is a contemporary strategy intended to significantly improve the correctional experience for deaf inmates. This presentation reports on the development of two distinct training videos created to enhance staff’s understanding of the needs of deaf inmates; one a two-part simulation of an interaction with a deaf inmate, the second an interview with a deaf academic. Part one of video one demonstrates the challenges and misunderstandings inherent in communicating across languages without a qualified sign language interpreter; the second part demonstrates the ease of communication when communication needs are met. Video two incorporates the experiences of a deaf academic to provide the cultural grounding necessary to educate staff in the unique experiences associated with being a visual language user. Lack of staff understanding or awareness of deaf culture and language must not be acceptable reasons for the inadequate treatment of deaf visual language users in federal prisons. This paper demonstrates a contemporary approach to meeting the human rights and needs of this unique and often ignored inmate subpopulation. The deaf community supports this visual approach to enhancing staff understanding of the unique needs of this population. A study of its effectiveness is currently underway.

Keywords: accommodations, American Sign Language (ASL), deaf inmates, sensory deprivation

Procedia PDF Downloads 133
678 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 25
677 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy

Authors: Neda Seyyedi, Reza Berangi

Abstract:

Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.

Keywords: VOIP networks, flooding attacks, entropy, computer networks

Procedia PDF Downloads 385
676 Accounting Quality and The Adoption of IFRS: Evidence from China

Authors: Khaldoon G. Albitar, Hassan Y. Kikhia, Jin P. Zhang

Abstract:

Since 2007, all companies listed on both Shanghai Stock Exchange and Shenzhen Stock Exchange are required to prepare their consolidated financial statements in accordance with International Financial Reporting Standards (IFRS). This study investigates the impact of adopting IFRS on accounting quality for a sample of listed on Chinese companies during the period 2003-2013 with sample of 10846 observations over a four-year period before and a five-year period after the adoption of IFRS. This study tests whether the level of earnings management is significantly lower after the adoption of IFRS, and reported earnings is more value relevant during the IFRS period by using the Ohlson model and Jones model, as modified by Dechow. The empirical results show that accounting quality improved with lower earnings management and higher value relevant after the adoption of IFRS in China. The current study contributes to the literature on IFRS adoption and earning quality in two ways. First, As most of the existing studies on earnings quality and IFRS have been conducted on data from the U.S and European countries, this study fills a gap in the existing literature by studying the effect of adoption of IFRS on earnings quality in an emerging market. Second, the findings of our study have important implications for policymakers, auditors, multinational firms, and users of financial reports. As the rapid growth of China's economy gains global recognition, the Chinese stock market is capturing the attention of international investor.

Keywords: international financial reporting standards (ifrs), accounting quality, earnings management, value relevance, china

Procedia PDF Downloads 315
675 Digital Forensic Exploration Framework for Email and Instant Messaging Applications

Authors: T. Manesh, Abdalla A. Alameen, M. Mohemmed Sha, A. Mohamed Mustaq Ahmed

Abstract:

Email and instant messaging applications are foremost and extensively used electronic communication methods in this era of information explosion. These applications are generally used for exchange of information using several frontend applications from various service providers by its users. Almost all such communications are now secured using SSL or TLS security over HTTP communication. At the same time, it is also noted that cyber criminals and terrorists have started exchanging information using these methods. Since communication is encrypted end-to-end, tracing significant forensic details and actual content of messages are found to be unattended and severe challenges by available forensic tools. These challenges seriously affect in procuring substantial evidences against such criminals from their working environments. This paper presents a vibrant forensic exploration and architectural framework which not only decrypts any communication or network session but also reconstructs actual message contents of email as well as instant messaging applications. The framework can be effectively used in proxy servers and individual computers and it aims to perform forensic reconstruction followed by analysis of webmail and ICQ messaging applications. This forensic framework exhibits a versatile nature as it is equipped with high speed packet capturing hardware, a well-designed packet manipulating algorithm. It regenerates message contents over regular as well as SSL encrypted SMTP, POP3 and IMAP protocols and catalyzes forensic presentation procedure for prosecution of cyber criminals by producing solid evidences of their actual communication as per court of law of specific countries.

Keywords: forensics, network sessions, packet reconstruction, packet reordering

Procedia PDF Downloads 321
674 An Optimal Path for Virtual Reality Education using Association Rules

Authors: Adam Patterson

Abstract:

This study analyzes the self-reported experiences of virtual reality users to develop insight into an optimal learning path for education within virtual reality. This research uses a sample of 1000 observations to statistically define factors influencing (i) immersion level and (ii) motion sickness rating for virtual reality experience respondents of college age. This paper recommends an efficient duration for each virtual reality session, to minimize sickness and maximize engagement, utilizing modern machine learning methods such as association rules. The goal of this research, in augmentation with previous literature, is to inform logistical decisions relating to implementation of pilot instruction for virtual reality at the collegiate level. Future research will include a Randomized Control Trial (RCT) to quantify the effect of virtual reality education on student learning outcomes and engagement measures. Current research aims to maximize the treatment effect within the RCT by optimizing the learning benefits of virtual reality. Results suggest significant gender heterogeneity amongst likelihood of reporting motion sickness. Females are 1.7 times more likely, than males, to report high levels of motion sickness resulting from a virtual reality experience. Regarding duration, respondents were 1.29 times more likely to select the lowest level of motion sickness after an engagement lasting between 24.3 and 42 minutes. Conversely, respondents between 42 to 60 minutes were 1.2 times more likely to select the higher levels of motion sickness.

Keywords: applications and integration of e-education, practices and cases in e-education, systems and technologies in e-education, technology adoption and diffusion of e-learning

Procedia PDF Downloads 51
673 Enabling Oral Communication and Accelerating Recovery: The Creation of a Novel Low-Cost Electroencephalography-Based Brain-Computer Interface for the Differently Abled

Authors: Rishabh Ambavanekar

Abstract:

Expressive Aphasia (EA) is an oral disability, common among stroke victims, in which the Broca’s area of the brain is damaged, interfering with verbal communication abilities. EA currently has no technological solutions and its only current viable solutions are inefficient or only available to the affluent. This prompts the need for an affordable, innovative solution to facilitate recovery and assist in speech generation. This project proposes a novel concept: using a wearable low-cost electroencephalography (EEG) device-based brain-computer interface (BCI) to translate a user’s inner dialogue into words. A low-cost EEG device was developed and found to be 10 to 100 times less expensive than any current EEG device on the market. As part of the BCI, a machine learning (ML) model was developed and trained using the EEG data. Two stages of testing were conducted to analyze the effectiveness of the device: a proof-of-concept and a final solution test. The proof-of-concept test demonstrated an average accuracy of above 90% and the final solution test demonstrated an average accuracy of above 75%. These two successful tests were used as a basis to demonstrate the viability of BCI research in developing lower-cost verbal communication devices. Additionally, the device proved to not only enable users to verbally communicate but has the potential to also assist in accelerated recovery from the disorder.

Keywords: neurotechnology, brain-computer interface, neuroscience, human-machine interface, BCI, HMI, aphasia, verbal disability, stroke, low-cost, machine learning, ML, image recognition, EEG, signal analysis

Procedia PDF Downloads 105
672 Considerations upon Structural Health Monitoring of Small to Medium Wind Turbines

Authors: Nicolae Constantin, Ştefan Sorohan

Abstract:

The small and medium wind turbines are running in quite different conditions as compared to the big ones. Consequently, they need also a different approach concerning the structural health monitoring (SHM) issues. There are four main differences between the above mentioned categories: (i) significantly smaller dimensions, (ii) considerably higher rotation speed, (iii) generally small distance between the turbine and the energy consumer and (iv) monitoring assumed in many situations by the owner. In such conditions, nondestructive inspections (NDI) have to be made as much as possible with affordable, yet effective techniques, requiring portable and accessible equipment. Additionally, the turbines and accessories should be easy to mount, dispose and repair. As the materials used for such unit can be metals, composites and combined, the technologies should be adapted accordingly. An example in which the two materials co-exist is the situation in which the damaged metallic skin of a blade is repaired with a composite patch. The paper presents the inspection of the bonding state of the patch, using portable ultrasonic equipment, able to put in place the Lamb wave method, which proves efficient in global and local inspections as well. The equipment is relatively easy to handle and can be borrowed from specialized laboratories or used by a community of small wind turbine users, upon the case. This evaluation is the first in a row, aimed to evaluate efficiency of NDI performed with rather accessible, less sophisticated equipment and related inspection techniques, having field inspection capabilities. The main goal is to extend such inspection procedures to other components of the wind power unit, such as the support tower, water storage tanks, etc.

Keywords: structural health monitoring, small wind turbines, non-destructive inspection, field inspection capabilities

Procedia PDF Downloads 324
671 Analysis of Hotel Websites to Attract Tourists in Iran, Case Study: Yazd County

Authors: Leila Habibi, Hadi Hakimi, Hadi Sadeghian, Maryam Jafari Mehrabadi

Abstract:

Nowadays, the importance of information technology and web-based information in tourism is very obvious. Increasing of sales and promotion of brands, the rise of information about tourist attractions and tourist areas, entrepreneurship and making money, introducing of hotels and side information to tourists via web are some examples of website effects on tourism. The hotels using web-based information can succeed in attracting tourists and improve the quality of services to the tourists. So, the study of hotel websites has become one of the most important issues in tourism. Therefore, this research aims to analyze the status of hotel websites in Yazd County as one of the most tourist visited counties in Iran. The quality of hotel website in a county can be very vital for tourism. Hence, this research compares the status of hotel websites in Yazd County with standard indexes and items that extracted from literature and theoretical framework. Content analysis is used for analyzing hotel websites with indexes and items in methodology. In the other words, all of the items are compared with the content of hotel-websites in Yazd one by one. Finally, every hotel archived final score which represents the position of the hotel among the others. All of scores and status of hotels are displayed in their own figures. The result of this research shows that many hotels do not offer standard web-based services and information. So, the existing situation is not very suitable for the attraction of web users or improving the tourism. The result of this research may help the managers and authorities of tourism to offer and improve the web-based services and information.

Keywords: e-tourism, hotel websites, tourism, web-tourism

Procedia PDF Downloads 271
670 Machine Learning Approach for Stress Detection Using Wireless Physical Activity Tracker

Authors: B. Padmaja, V. V. Rama Prasad, K. V. N. Sunitha, E. Krishna Rao Patro

Abstract:

Stress is a psychological condition that reduces the quality of sleep and affects every facet of life. Constant exposure to stress is detrimental not only for mind but also body. Nevertheless, to cope with stress, one should first identify it. This paper provides an effective method for the cognitive stress level detection by using data provided from a physical activity tracker device Fitbit. This device gathers people’s daily activities of food, weight, sleep, heart rate, and physical activities. In this paper, four major stressors like physical activities, sleep patterns, working hours and change in heart rate are used to assess the stress levels of individuals. The main motive of this system is to use machine learning approach in stress detection with the help of Smartphone sensor technology. Individually, the effect of each stressor is evaluated using logistic regression and then combined model is built and assessed using variants of ordinal logistic regression models like logit, probit and complementary log-log. Then the quality of each model is evaluated using Akaike Information Criterion (AIC) and probit is assessed as the more suitable model for our dataset. This system is experimented and evaluated in a real time environment by taking data from adults working in IT and other sectors in India. The novelty of this work lies in the fact that stress detection system should be less invasive as possible for the users.

Keywords: physical activity tracker, sleep pattern, working hours, heart rate, smartphone sensor

Procedia PDF Downloads 241
669 Study of the Performances of an Environmental Concrete Based on Recycled Aggregates and Marble Waste Fillers Addition

Authors: Larbi Belagraa, Miloud Beddar, Abderrazak Bouzid

Abstract:

The needs of the construction sector still increasing for concrete. However, the shortage of natural resources of aggregate could be a problem for the concrete industry, in addition to the negative impact on the environment due to the demolition wastes. Recycling aggregate from construction and demolition (C&D) waste presents a major interest for users and researchers of concrete since this constituent can occupies more than 70% of concrete volume. The aim of the study here in is to assess the effect of sulfate resistant cement combined with the local mineral addition of marble waste fillers on the mechanical behavior of a recycled aggregate concrete (RAC). Physical and mechanical properties of RAC including the density, the flexural and the compressive strength were studied. The non destructive test methods (pulse-velocity, rebound hammer) were performed . The results obtained were compared to crushed aggregate concrete (CAC) using the normal compressive testing machine test method. The optimal content of 5% marble fillers showed an improvement for both used test methods (compression, flexion and NDT). Non-destructive methods (ultrasonic and rebound hammer test) can be used to assess the strength of RAC, but a correction coefficient is required to obtain a similar value to the compressive strength given by the compression tests. The study emphasizes that these waste materials can be successfully and economically utilized as additional inert filler in RAC formulation within similar performances compared to a conventional concrete.

Keywords: marble waste fillers, mechanical strength, natural aggregate, non-destructive testing (NDT), recycled aggregate concrete

Procedia PDF Downloads 291
668 Early Depression Detection for Young Adults with a Psychiatric and AI Interdisciplinary Multimodal Framework

Authors: Raymond Xu, Ashley Hua, Andrew Wang, Yuru Lin

Abstract:

During COVID-19, the depression rate has increased dramatically. Young adults are most vulnerable to the mental health effects of the pandemic. Lower-income families have a higher ratio to be diagnosed with depression than the general population, but less access to clinics. This research aims to achieve early depression detection at low cost, large scale, and high accuracy with an interdisciplinary approach by incorporating clinical practices defined by American Psychiatric Association (APA) as well as multimodal AI framework. The proposed approach detected the nine depression symptoms with Natural Language Processing sentiment analysis and a symptom-based Lexicon uniquely designed for young adults. The experiments were conducted on the multimedia survey results from adolescents and young adults and unbiased Twitter communications. The result was further aggregated with the facial emotional cues analyzed by the Convolutional Neural Network on the multimedia survey videos. Five experiments each conducted on 10k data entries reached consistent results with an average accuracy of 88.31%, higher than the existing natural language analysis models. This approach can reach 300+ million daily active Twitter users and is highly accessible by low-income populations to promote early depression detection to raise awareness in adolescents and young adults and reveal complementary cues to assist clinical depression diagnosis.

Keywords: artificial intelligence, COVID-19, depression detection, psychiatric disorder

Procedia PDF Downloads 115
667 Meta-analysis of Technology Acceptance for Mobile and Digital Libraries in Academic Settings

Authors: Nosheen Fatima Warraich

Abstract:

One of the most often used models in information system (IS) research is the technology acceptance model (TAM). This meta-analysis aims to measure the relationship between TAM variables, Perceived Ease of Use (PEOU), and Perceived Usefulness (PU) with users’ attitudes and behavioral intention (BI) in mobile and digital libraries context. It also examines the relationship of external variables (information quality and system quality) with TAM variables (PEOU and PU) in digital libraries settings. This meta-analysis was performed through PRISMA-P guidelines. Four databases (Google Scholar, Web of Science, Scopus, and LISTA) were utilized for searching, and the search was conducted according to defined criteria. The findings of this study revealed a large effect size of PU and PEOU with BI. There was also a large effect size of PU and PEOU with attitude. A medium effect size was found between SysQ -> PU, InfoQ-> PU, and SysQ -> PEOU. However, there was a small effect size between InfoQ and PEOU. It fills the literature gap and also confirms that TAM is a valid model for the acceptance and use of technology in mobile and digital libraries context. Thus, its findings would be helpful for developers and designers in designing and developing mobile library apps. It will also be beneficial for library authorities and system librarians in designing and developing digital libraries in academic settings.

Keywords: technology acceptance model (tam), perceived ease of use, perceived usefulness, information quality, system quality, meta-analysis, systematic review, digital libraries, and mobile library apps.

Procedia PDF Downloads 53
666 Achieving Quality of Life and Sustainability in Mexican Cities, the Case of the Housing Complex “Villa del Campo”, Tijuana, Mexico

Authors: María de los Ángeles Zárate López, Juan Antonio Pitones Rubio

Abstract:

Quality of life and sustainability in cities are among the most important challenges faced by designers, city planners and urban managers. The Mexican city of Tijuana has a particular dynamic in its demographics which has been accelerated by its border city condition, putting to the test the ability from authorities to provide the population with the necessary services to aspire for a deserving quality of life. In the recent story of Tijuana, we found that the housing policy and the solutions presented by private housing developers have not met the best living conditions for end users by far, thereby adding issues to current social problems which impact the whole metropolitan area, including damage to the natural environment. Therefore this research presents the case study about the situation of a suburban housing development near Tijuana named “Villa del Campo” and exposes the problems of this specific project (originally labelled as a “sustainable” proposal) demonstrating that, once built, the place does not reflect the quality of life that it promised as a project. Currently, this housing development has a number of problematic issues such as the faulty operating conditions of public utilities and serious cases of crime inside the neighborhood. There is no intention to only expose the negative side of this case study, but to explore some alternatives which could help solving the most serious problems at the place, considering possible architectural and landscape interventions within the housing complex to help achieve the optimal conditions of livability and sustainability required by their inhabitants.

Keywords: suburban, housing, quality of life, sustainability, Tijuana, demographics

Procedia PDF Downloads 367
665 The Rehabilitation of Drug Addiction by Thai Indigenous Knowledge: A Case Study of Thamkrabok Monastery

Authors: Wanwimon Mekwimon

Abstract:

Drug addiction is a serious problem in Thailand which has occurred continuously and repeatedly and enormously impacting health and economy of drug users. The indigenous wisdom and folk medicine is an attractive alternative choice, especially in detoxification and rehabilitation period. There are two objectives: First is to study about rehabilitation process and the curing for drug eaters and 2nd is to investigate the effectiveness of the curing and rehabilitation process by indigenous wisdom at Tamkrabok monastery, Pra-Puttabat district, Saraburi province. The main informants are 10 curers, 15 patients and 17 after-1-year rehabilitators. In the process, the semi-structured questionnaire is administered, the data are analyzed and proved by triangulation. The curing and rehabilitation process which use herbal remedies has a period of 15 days (5 days for detoxification and 10 days for recovery period) and the occupational training and self-consciousness awakening were delivered. The follow-up process includes twice-a-month recall for 6 months, follow-up letters and in depth interview with their families. The outcome of 1 year post-treatment was 94% (16 from 17). There are many reasons for not relapsing: the recovering patients have drawn on their inner strength, self-awareness and coping skill as well as their family and social support while rehabilitation process which includes difficulties in contacting with family members. They can void themselves from high risk situations to relapse. Recommendations: The follow-up system should be improved for continuous quality improvement, there should be the qualification standard for herbal remedies and the comparison among rehabilitation process of Tamkrabok and another methods are to be guideline for the further development.

Keywords: rehabilitation, drug addiction, Thai indigenous knowledge, herbal remedies

Procedia PDF Downloads 237
664 Language Learning Motivation in Mozambique: A Quantitative Study of University Students

Authors: Simao E. Luis

Abstract:

From the 1960s to the 1990s, the social-psychological framework of language attitudes that emerged from the Canadian research tradition was very influential. Integrativeness was one of the main variables in Gardner’s theory because refugees and immigrants were motivated to learn English and French to integrate into the Canadian community. Second language (L2) scholars have expressed concerns over integrativeness because it cannot explain the motivation of L2 learners in global contexts. This study aims to investigate student motivation to learn English as a foreign language in Mozambique, and to contribute to the ongoing validation of the L2 Motivational Self System theory in an under-researched country. One hundred thirty-seven (N=137) university students completed a well-established motivation questionnaire. The data were analyzed with SPSS, and descriptive statistics, correlations, multiple regressions, and MANOVA were conducted. Results show that many variables contribute to motivated learning behavior, particularly the L2 learning experience and attitudes towards the English language. Statistically significant differences were found between males and females, with males expressing more motivation to learn the English language for personal interests. Statistically significant differences were found between older and younger students, with older students reporting more vivid images of themselves as future English language users. These findings have pedagogical implications because motivational strategies are positively correlated with student motivated learning behavior. Therefore, teachers should design L2 tasks that can help students to develop their future L2 selves.

Keywords: English as a foreign language, L2 motivational self system, Mozambique, university students

Procedia PDF Downloads 106