Search results for: constructive communication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4352

Search results for: constructive communication

2522 A Middleware Management System with Supporting Holonic Modules for Reconfigurable Management System

Authors: Roscoe McLean, Jared Padayachee, Glen Bright

Abstract:

There is currently a gap in the technology covering the rapid establishment of control after a reconfiguration in a Reconfigurable Manufacturing System. This gap involves the detection of the factory floor state and the communication link between the factory floor and the high-level software. In this paper, a thin, hardware-supported Middleware Management System (MMS) is proposed and its design and implementation are discussed. The research found that a cost-effective localization technique can be combined with intelligent software to speed up the ramp-up of a reconfigured system. The MMS makes the process more intelligent, more efficient and less time-consuming, thus supporting the industrial implementation of the RMS paradigm.

Keywords: intelligent systems, middleware, reconfigurable manufacturing, management system

Procedia PDF Downloads 678
2521 Real-Time Aerial Marine Surveillance System for Safe Navigation

Authors: Vinesh Thiruchelvam, Umar Mumtaz Chowdry, Sathish Kumar Selvaperumal

Abstract:

The prime purpose of the project is to provide a sophisticated system for surveillance specialized for the Port Authorities in the Maritime Industry. The current aerial surveillance does not have a wide dimensioning view. The channels of communication is shared and not exclusive allowing for communications errors or disturbance mainly due to traffic. The scope is to analyze the various aspects as real-time aerial and marine surveillance is one of the most important methods which could ensure the domain security of the sailors. The system will improve real time data as obtained for the controller base station. The key implementation will be based on camera speed, angle and adherence to a sustainable power utilization module.

Keywords: SMS, real time, GUI, maritime industry

Procedia PDF Downloads 501
2520 The Effective Use of the Network in the Distributed Storage

Authors: Mamouni Mohammed Dhiya Eddine

Abstract:

This work aims at studying the exploitation of high-speed networks of clusters for distributed storage. Parallel applications running on clusters require both high-performance communications between nodes and efficient access to the storage system. Many studies on network technologies led to the design of dedicated architectures for clusters with very fast communications between computing nodes. Efficient distributed storage in clusters has been essentially developed by adding parallelization mechanisms so that the server(s) may sustain an increased workload. In this work, we propose to improve the performance of distributed storage systems in clusters by efficiently using the underlying high-performance network to access distant storage systems. The main question we are addressing is: do high-speed networks of clusters fit the requirements of a transparent, efficient and high-performance access to remote storage? We show that storage requirements are very different from those of parallel computation. High-speed networks of clusters were designed to optimize communications between different nodes of a parallel application. We study their utilization in a very different context, storage in clusters, where client-server models are generally used to access remote storage (for instance NFS, PVFS or LUSTRE). Our experimental study based on the usage of the GM programming interface of MYRINET high-speed networks for distributed storage raised several interesting problems. Firstly, the specific memory utilization in the storage access system layers does not easily fit the traditional memory model of high-speed networks. Secondly, client-server models that are used for distributed storage have specific requirements on message control and event processing, which are not handled by existing interfaces. We propose different solutions to solve communication control problems at the filesystem level. We show that a modification of the network programming interface is required. Data transfer issues need an adaptation of the operating system. We detail several propositions for network programming interfaces which make their utilization easier in the context of distributed storage. The integration of a flexible processing of data transfer in the new programming interface MYRINET/MX is finally presented. Performance evaluations show that its usage in the context of both storage and other types of applications is easy and efficient.

Keywords: distributed storage, remote file access, cluster, high-speed network, MYRINET, zero-copy, memory registration, communication control, event notification, application programming interface

Procedia PDF Downloads 222
2519 Identifying Project Delay Factors in the Australian Construction Industry

Authors: Syed Sohaib Bin Hasib, Hiyam Al-Kilidar

Abstract:

Meeting project deadlines is a major challenge for most construction projects. In this study, perceptions of contractors, clients, and consultants are compared relative to a list of factors derived from the review of the extant literature on project delay. 59 causes (categorized into 8 groups) of project delays were identified from the literature. A survey was devised to get insights and ranking of these factors from clients, consultants & contractors in the Australian construction industry. Findings showed that project delays in the Australian construction industry are mainly the result of skill shortages, interference in execution, and poor coordination and communication between the project stakeholders.

Keywords: construction, delay factors, time delay, australian construction industry

Procedia PDF Downloads 177
2518 Online Think–Pair–Share in a Third-Age Information and Communication Technology Course

Authors: Daniele Traversaro

Abstract:

Problem: Senior citizens have been facing a challenging reality as a result of strict public health measures designed to protect people from the COVID-19 outbreak. These include the risk of social isolation due to the inability of the elderly to integrate with technology. Never before have information and communication technology (ICT) skills become essential for their everyday life. Although third-age ICT education and lifelong learning are widely supported by universities and governments, there is a lack of literature on which teaching strategy/methodology to adopt in an entirely online ICT course aimed at third-age learners. This contribution aims to present an application of the Think-Pair-Share (TPS) learning method in an ICT third-age virtual classroom with an intergenerational approach to conducting online group labs and review activities. This collaborative strategy can help increase student engagement, promote active learning and online social interaction. Research Question: Is collaborative learning applicable and effective, in terms of student engagement and learning outcomes, for an entirely online third-age ICT introductory course? Methods: In the TPS strategy, a problem is posed by the teacher, students have time to think about it individually, and then they work in pairs (or small groups) to solve the problem and share their ideas with the entire class. We performed four experiments in the ICT course of the University of the Third Age of Genova (University of Genova, Italy) on the Microsoft Teams platform. The study cohort consisted of 26 students over the age of 45. Data were collected through online questionnaires. Two have been proposed, one at the end of the first activity and another at the end of the course. They consisted of five and three close-ended questions, respectively. The answers were on a Likert scale (from 1 to 4) except two questions (which asked the number of correct answers given individually and in groups) and the field for free comments/suggestions. Results: Results show that groups perform better than individual students (with scores greater than one order of magnitude) and that most students found it helpful to work in groups and interact with their peers. Insights: From these early results, it appears that TPS is applicable to an online third-age ICT classroom and useful for promoting discussion and active learning. Despite this, our experimentation has a number of limitations. First of all, the results highlight the need for more data to be able to perform a statistical analysis in order to determine the effectiveness of this methodology in terms of student engagement and learning outcomes as a future direction.

Keywords: collaborative learning, information technology education, lifelong learning, older adult education, think-pair-share

Procedia PDF Downloads 190
2517 Subjectivity in Miracle Aesthetic Clinic Ambient Media Advertisement

Authors: Wegig Muwonugroho

Abstract:

Subjectivity in advertisement is a ‘power’ possessed by advertisements to construct trend, concept, truth, and ideology through subconscious mind. Advertisements, in performing their functions as message conveyors, use such visual representation to inspire what’s ideal to the people. Ambient media is advertising medium making the best use of the environment where the advertisement is located. Miracle Aesthetic Clinic (Miracle) popularizes the visual representation of its ambient media advertisement through the omission of face-image of both female mannequins that function as its ambient media models. Usually, the face of a model in advertisement is an image commodity having selling values; however, the faces of ambient media models in Miracle advertisement campaign are suppressed over the table and wall. This face concealing aspect creates not only a paradox of subjectivity but also plurality of meaning. This research applies critical discourse analysis method to analyze subjectivity in obtaining the insight of ambient media’s meaning. First, in the stage of textual analysis, the embedding attributes upon female mannequins imply that the models are denoted as the representation of modern women, which are identical with the identities of their social milieus. The communication signs aimed to be constructed are the women who lose their subjectivities and ‘feel embarrassed’ to flaunt their faces to the public because of pimples on their faces. Second, in the stage of analysis of discourse practice, it points out that ambient media as communication media has been comprehensively responded by the targeted audiences. Ambient media has a role as an actor because of its eyes-catching setting, and taking space over the area where the public are wandering around. Indeed, when the public realize that the ambient media models are motionless -unlike human- stronger relation then appears, marked by several responses from targeted audiences. Third, in the stage of analysis of social practice, soap operas and celebrity gossip shows on the television become a dominant discourse influencing advertisement meaning. The subjectivity of Miracle Advertisement corners women by the absence of women participation in public space, the representation of women in isolation, and the portrayal of women as an anxious person in the social rank when their faces suffered from pimples. The Ambient media as the advertisement campaign of Miracle is quite success in constructing a new trend discourse of face beauty that is not limited on benchmarks of common beauty virtues, but the idea of beauty can be presented by ‘when woman doesn’t look good’ visualization.

Keywords: ambient media, advertisement, subjectivity, power

Procedia PDF Downloads 324
2516 Developing Cultural Competence as Part of Nursing Studies: Language, Customs and Health Issues

Authors: Mohammad Khatib, Salam Hadid

Abstract:

Introduction: Developing nurses' cultural competence begins in their basic training and requires them to participate in an array of activities which raise their awareness and stimulate their interest, desire and curiosity about different cultures, by creating opportunities for intercultural meetings promoting the concept of 'culture' and its components, including recognition of cultural diversity and the legitimacy of the other. Importantly, professionals need to acquire specific cultural knowledge and thorough understanding of the values, norms, customs, beliefs and symbols of different cultures. Similarly, they need to be given opportunities to practice the verbal and non-verbal communication skills of other cultures according to their cultural codes. Such a system is being implemented as part of nursing studies at Zefat Academic College in two study frameworks; firstly, a course integrating nursing theory and practice in multicultural nursing; secondly, a course in learning the languages spoken in Israel focusing on medical and nursing terminology. Methods: Students participating in the 'Transcultural Nursing' course come from a variety of backgrounds: Jews, or Arabs, religious, or secular; Muslim, Christian, new immigrants, Ethiopians or from other cultural affiliations. They are required to present and discuss cultural practices that affect health. In addition, as part of the language course, students learn and teach their friends 5 spoken languages (Arabic, Russian, Amharian, Yidish, and Sign language) focusing on therapeutic interaction and communication using the vocabulary and concepts necessary for the therapeutic encounter. An evaluation of the process and the results was done using a structured questionnaire which includes series of questions relating to the contributions of the courses to their cultural knowledge, awareness and skills. 155 students completed the questionnaire. Results: A preliminary assessment of this educational system points an increase in cultural awareness and knowledge among the students as well as in their willingness to recognize the other's difference. A positive atmosphere of multiculturalism is reflected in students' mutual interest and respect was created. Students showed a deep understanding of cultural issues relating to health and care (consanguinity and genetics, food customs; cultural events, reincarnation, traditional treatments etc.). Most of the students were willing to recommend the courses to others and suggest some changes relating learning methods (more simulations, role playing and activities).

Keywords: cultural competence, nursing education, culture, language

Procedia PDF Downloads 278
2515 Radio Frequency Identification Encryption via Modified Two Dimensional Logistic Map

Authors: Hongmin Deng, Qionghua Wang

Abstract:

A modified two dimensional (2D) logistic map based on cross feedback control is proposed. This 2D map exhibits more random chaotic dynamical properties than the classic one dimensional (1D) logistic map in the statistical characteristics analysis. So it is utilized as the pseudo-random (PN) sequence generator, where the obtained real-valued PN sequence is quantized at first, then applied to radio frequency identification (RFID) communication system in this paper. This system is experimentally validated on a cortex-M0 development board, which shows the effectiveness in key generation, the size of key space and security. At last, further cryptanalysis is studied through the test suite in the National Institute of Standards and Technology (NIST).

Keywords: chaos encryption, logistic map, pseudo-random sequence, RFID

Procedia PDF Downloads 402
2514 Private Coded Computation of Matrix Multiplication

Authors: Malihe Aliasgari, Yousef Nejatbakhsh

Abstract:

The era of Big Data and the immensity of real-life datasets compels computation tasks to be performed in a distributed fashion, where the data is dispersed among many servers that operate in parallel. However, massive parallelization leads to computational bottlenecks due to faulty servers and stragglers. Stragglers refer to a few slow or delay-prone processors that can bottleneck the entire computation because one has to wait for all the parallel nodes to finish. The problem of straggling processors, has been well studied in the context of distributed computing. Recently, it has been pointed out that, for the important case of linear functions, it is possible to improve over repetition strategies in terms of the tradeoff between performance and latency by carrying out linear precoding of the data prior to processing. The key idea is that, by employing suitable linear codes operating over fractions of the original data, a function may be completed as soon as enough number of processors, depending on the minimum distance of the code, have completed their operations. The problem of matrix-matrix multiplication in the presence of practically big sized of data sets faced with computational and memory related difficulties, which makes such operations are carried out using distributed computing platforms. In this work, we study the problem of distributed matrix-matrix multiplication W = XY under storage constraints, i.e., when each server is allowed to store a fixed fraction of each of the matrices X and Y, which is a fundamental building of many science and engineering fields such as machine learning, image and signal processing, wireless communication, optimization. Non-secure and secure matrix multiplication are studied. We want to study the setup, in which the identity of the matrix of interest should be kept private from the workers and then obtain the recovery threshold of the colluding model, that is, the number of workers that need to complete their task before the master server can recover the product W. The problem of secure and private distributed matrix multiplication W = XY which the matrix X is confidential, while matrix Y is selected in a private manner from a library of public matrices. We present the best currently known trade-off between communication load and recovery threshold. On the other words, we design an achievable PSGPD scheme for any arbitrary privacy level by trivially concatenating a robust PIR scheme for arbitrary colluding workers and private databases and the proposed SGPD code that provides a smaller computational complexity at the workers.

Keywords: coded distributed computation, private information retrieval, secret sharing, stragglers

Procedia PDF Downloads 125
2513 Tracing the Evolution of English and Urdu Languages: A Linguistic and Cultural Analysis

Authors: Aamna Zafar

Abstract:

Through linguistic and cultural analysis, this study seeks to trace the development of the English and Urdu languages. Along with examining how the vocabulary and syntax of English and Urdu have evolved over time and the linguistic trends that may be seen in these changes, this study will also look at the historical and cultural influences that have shaped the languages throughout time. The study will also look at how English and Urdu have changed over time, both in terms of language use and communication inside each other's cultures and globally. We'll research how these changes affect social relations and cultural identity, as well as how they might affect the future of these languages.

Keywords: linguistic and cultural analysis, historical factors, cultural factors, vocabulary, syntax, significance

Procedia PDF Downloads 76
2512 Digimesh Wireless Sensor Network-Based Real-Time Monitoring of ECG Signal

Authors: Sahraoui Halima, Dahani Ameur, Tigrine Abedelkader

Abstract:

DigiMesh technology represents a pioneering advancement in wireless networking, offering cost-effective and energy-efficient capabilities. Its inherent simplicity and adaptability facilitate the seamless transfer of data between network nodes, extending the range and ensuring robust connectivity through autonomous self-healing mechanisms. In light of these advantages, this study introduces a medical platform harnessed with DigiMesh wireless network technology characterized by low power consumption, immunity to interference, and user-friendly operation. The primary application of this platform is the real-time, long-distance monitoring of Electrocardiogram (ECG) signals, with the added capacity for simultaneous monitoring of ECG signals from multiple patients. The experimental setup comprises key components such as Raspberry Pi, E-Health Sensor Shield, and Xbee DigiMesh modules. The platform is composed of multiple ECG acquisition devices labeled as Sensor Node 1 and Sensor Node 2, with a Raspberry Pi serving as the central hub (Sink Node). Two communication approaches are proposed: Single-hop and multi-hop. In the Single-hop approach, ECG signals are directly transmitted from a sensor node to the sink node through the XBee3 DigiMesh RF Module, establishing peer-to-peer connections. This approach was tested in the first experiment to assess the feasibility of deploying wireless sensor networks (WSN). In the multi-hop approach, two sensor nodes communicate with the server (Sink Node) in a star configuration. This setup was tested in the second experiment. The primary objective of this research is to evaluate the performance of both Single-hop and multi-hop approaches in diverse scenarios, including open areas and obstructed environments. Experimental results indicate the DigiMesh network's effectiveness in Single-hop mode, with reliable communication over distances of approximately 300 meters in open areas. In the multi-hop configuration, the network demonstrated robust performance across approximately three floors, even in the presence of obstacles, without the need for additional router devices. This study offers valuable insights into the capabilities of DigiMesh wireless technology for real-time ECG monitoring in healthcare applications, demonstrating its potential for use in diverse medical scenarios.

Keywords: DigiMesh protocol, ECG signal, real-time monitoring, medical platform

Procedia PDF Downloads 81
2511 A Named Data Networking Stack for Contiki-NG-OS

Authors: Sedat Bilgili, Alper K. Demir

Abstract:

The current Internet has become the dominant use with continuing growth in the home, medical, health, smart cities and industrial automation applications. Internet of Things (IoT) is an emerging technology to enable such applications in our lives. Moreover, Named Data Networking (NDN) is also emerging as a Future Internet architecture where it fits the communication needs of IoT networks. The aim of this study is to provide an NDN protocol stack implementation running on the Contiki operating system (OS). Contiki OS is an OS that is developed for constrained IoT devices. In this study, an NDN protocol stack that can work on top of IEEE 802.15.4 link and physical layers have been developed and presented.

Keywords: internet of things (IoT), named-data, named data networking (NDN), operating system

Procedia PDF Downloads 173
2510 Technology in English Language Teaching and Its Benefits in Improving Language Skills

Authors: Yasir Naseem

Abstract:

In this fast-growing and evolving world, usage and adoption of technology have displayed an essential component of the learning process, both in and out of the class, which converges and incorporates every domain of the learning aspects. It aids in learning distinct entities irrespective of their levels of challenge. It also incorporates both viewpoints of learning, i.e., competence as well as the performances of the learner. In today's learning scenario, nearly every language class ordinarily uses some form of technology. It integrates with various teaching methodologies and transforms in a way that now it grew as an integral part of the language learning courses. It has been employed to facilitate, promote, and enhances language learning. It facilitates educators in numerous ways and enhances their methodologies by equipping them to modify classroom activities, which covers every aspect of language learning.

Keywords: communication, methodology, technology, skills

Procedia PDF Downloads 179
2509 Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups

Authors: Erhan Turgut, Salih Ergün, Abdülkadir Öz

Abstract:

Terror is a modern war strategy which uses violence as a means of communication in order to achieve political objectives. In today’s security environment narrowing the propaganda field of terrorist organization is the primary goal for the security forces. In this sense, providing and maintaining public support is the most necessary ability for security units. Rather than enemy and threat-oriented approach, homeland security oriented approach is essential to ensure public support. In this study, terror assumed as a homeland security issue and assigning the law enforcement forces with military status is analyzed.

Keywords: terrorism, counter-terrorism, military status law-enforcement, terrorist groups

Procedia PDF Downloads 464
2508 Analyzing Political Cartoons in Arabic-Language Media after Trump's Jerusalem Move: A Multimodal Discourse Perspective

Authors: Inas Hussein

Abstract:

Communication in the modern world is increasingly becoming multimodal due to globalization and the digital space we live in which have remarkably affected how people communicate. Accordingly, Multimodal Discourse Analysis (MDA) is an emerging paradigm in discourse studies with the underlying assumption that other semiotic resources such as images, colours, scientific symbolism, gestures, actions, music and sound, etc. combine with language in order to  communicate meaning. One of the effective multimodal media that combines both verbal and non-verbal elements to create meaning is political cartoons. Furthermore, since political and social issues are mirrored in political cartoons, these are regarded as potential objects of discourse analysis since they not only reflect the thoughts of the public but they also have the power to influence them. The aim of this paper is to analyze some selected cartoons on the recognition of Jerusalem as Israel's capital by the American President, Donald Trump, adopting a multimodal approach. More specifically, the present research examines how the various semiotic tools and resources utilized by the cartoonists function in projecting the intended meaning. Ten political cartoons, among a surge of editorial cartoons highlighted by the Anti-Defamation League (ADL) - an international Jewish non-governmental organization based in the United States - as publications in different Arabic-language newspapers in Egypt, Saudi Arabia, UAE, Oman, Iran and UK, were purposively selected for semiotic analysis. These editorial cartoons, all published during 6th–18th December 2017, invariably suggest one theme: Jewish and Israeli domination of the United States. The data were analyzed using the framework of Visual Social Semiotics. In accordance with this methodological framework, the selected visual compositions were analyzed in terms of three aspects of meaning: representational, interactive and compositional. In analyzing the selected cartoons, an interpretative approach is being adopted. This approach prioritizes depth to breadth and enables insightful analyses of the chosen cartoons. The findings of the study reveal that semiotic resources are key elements of political cartoons due to the inherent political communication they convey. It is proved that adequate interpretation of the three aspects of meaning is a prerequisite for understanding the intended meaning of political cartoons. It is recommended that further research should be conducted to provide more insightful analyses of political cartoons from a multimodal perspective.

Keywords: Multimodal Discourse Analysis (MDA), multimodal text, political cartoons, visual modality

Procedia PDF Downloads 241
2507 A Low-Area Fully-Reconfigurable Hardware Design of Fast Fourier Transform System for 3GPP-LTE Standard

Authors: Xin-Yu Shih, Yue-Qu Liu, Hong-Ru Chou

Abstract:

This paper presents a low-area and fully-reconfigurable Fast Fourier Transform (FFT) hardware design for 3GPP-LTE communication standard. It can fully support 32 different FFT sizes, up to 2048 FFT points. Besides, a special processing element is developed for making reconfigurable computing characteristics possible, while first-in first-out (FIFO) scheduling scheme design technique is proposed for hardware-friendly FIFO resource arranging. In a synthesis chip realization via TSMC 40 nm CMOS technology, the hardware circuit only occupies core area of 0.2325 mm2 and dissipates 233.5 mW at maximal operating frequency of 250 MHz.

Keywords: reconfigurable, fast Fourier transform (FFT), single-path delay feedback (SDF), 3GPP-LTE

Procedia PDF Downloads 279
2506 Homogenization of Culture and Its Effect on Preferred Reading of Media Communications Aimed at Members of Generation Z

Authors: Philip Katz

Abstract:

The research examines preferred reading of contemporary ads aimed at Generation Z through digital media. A qualitative analysis of focus groups consisting of members of Generation Z from 13 countries in Europe, the Middle East, South America and Asia has shown that, among this cohort, the influence of national culture does not create a strong impediment to understanding media communications targeting Generation Z. The familiarity of members of Generation Z with other countries’ popular culture through the spread of digital media has allowed a homogenizing effect and allowed a greater understanding of those cultures among this generation that lessens the impact of geographic separation.

Keywords: audience, Generation Z, marketing communication, preferred reading

Procedia PDF Downloads 178
2505 Hate Speech Detection Using Deep Learning and Machine Learning Models

Authors: Nabil Shawkat, Jamil Saquer

Abstract:

Social media has accelerated our ability to engage with others and eliminated many communication barriers. On the other hand, the widespread use of social media resulted in an increase in online hate speech. This has drastic impacts on vulnerable individuals and societies. Therefore, it is critical to detect hate speech to prevent innocent users and vulnerable communities from becoming victims of hate speech. We investigate the performance of different deep learning and machine learning algorithms on three different datasets. Our results show that the BERT model gives the best performance among all the models by achieving an F1-score of 90.6% on one of the datasets and F1-scores of 89.7% and 88.2% on the other two datasets.

Keywords: hate speech, machine learning, deep learning, abusive words, social media, text classification

Procedia PDF Downloads 139
2504 Citizen Participation in Smart Cities: Singapore and Tokyo

Authors: Thomas Benson

Abstract:

Smart cities have been heralded as multi-faceted entities which utilise information and communication technologies to enhance citizen participation. The purpose of this paper is to outline authoritative definitions of smart cities and citizen participation and investigate smart city citizen-centrism rhetoric by examining urban governance and citizen participation processes. Drawing on extant literature and official city government documents and websites, Singapore (Singapore) and Tokyo (Japan) are chosen as comparable smart city case studies. For the smart city to be truly realised, this paper concludes that smart cities must do more to incorporate genuine citizen participation mechanisms.

Keywords: citizen participation, smart cities, urban governance, Singapore, Tokyo

Procedia PDF Downloads 154
2503 A Scheme Cooperating with Cryptography to Enhance Security in Satellite Communications

Authors: Chieh-Fu Chang, Wan-Hsin Hsieh

Abstract:

We have proposed a novel scheme— iterative word-extension (IWE) to enhance the cliff effect of Reed-Solomon codes regarding the error performance at a specific Eb/N0. The scheme can be readily extended to block codes and the important properties of IWE are further investigated here. In order to select proper block codes specifying the desired cliff Eb/N0, the associated features of IWE are explored. These properties and features grant IWE ability to enhance security regarding the received Eb/N0 in physical layer so that IWE scheme can cooperate with the traditional presentation layer approach — cryptography, to meet the secure requirements in diverse applications. The features and feasibility of IWE scheme in satellite communication are finally discussed.

Keywords: security, IWE, cliff effect, space communications

Procedia PDF Downloads 427
2502 The Effects of SMS on the Formal Writings of the Students: A Comparative Study among the Students of Different Departments of IUB

Authors: Sumaira Saleem

Abstract:

This study reveals that the use of SMS effect the formal writing of the students. SMS is in vogue sine the last decade but its detrimental effects are effecting not only to the set norms but also deviant forms of expressions have come into the community to which all are not acquainted and it creates a hurdle in effective communication. It also determines the reasons behind the usage of SMS practices in the formal writings like in assignments and examinations. For this study a questionnaire was designed for faculty and students the data was collected from The Islamia University Bahawalpur and the formal work of the students was also collected to check the manifestation of SMS practices in writings. Data was analysed on excel sheet and the tables and graphs are used to explain the ratios and percentages of SMS usage. The results show that the usage of SMS has very strong effect upon the students writing.

Keywords: technology, writing, effects, SMS

Procedia PDF Downloads 383
2501 Remote Wireless Communications Lab in Real Time

Authors: El Miloudi Djelloul

Abstract:

Technology nowadays enables the remote access to laboratory equipment and instruments via Internet. This is especially useful in engineering education, where students can conduct laboratory experiment remotely. Such remote laboratory access can enable student to use expensive laboratory equipment, which is not usually available to students. In this paper, we present a method of creating a Web-based Remote Laboratory Experimentation in the master degree course “Wireless Communications Systems” which is part of “ICS (Information and Communication Systems)” and “Investment Management in Telecommunications” curriculums. This is done within the RIPLECS Project and the NI2011 FF005 Research Project “Implementation of Project-Based Learning in an Interdisciplinary Master Program”.

Keywords: remote access, remote laboratory, wireless telecommunications, external antenna-switching controller board (EASCB)

Procedia PDF Downloads 516
2500 Information Technologies in Automotive Assembly Industry in Thailand

Authors: Jirarat Teeravaraprug, Usawadee Inklay

Abstract:

This paper gave an attempt in prioritizing information technologies that organizations should give concentration. The case study was organizations in the automotive assembly industry in Thailand. Data were first collected to gather all information technologies known and used in the automotive assembly industry in Thailand. Five experts from the industries were surveyed based on the concept of fuzzy DEMATEL. The information technologies were categorized into six groups, which were communication, transaction, planning, organization management, warehouse management, and transportation. The cause groups of information technologies for each group were analysed and presented. Moreover, the relationship between the used and the significant information technologies was given. Discussions based on the used information technologies and the research results are given.

Keywords: information technology, automotive assembly industry, fuzzy DEMATEL

Procedia PDF Downloads 347
2499 Effects of Ubiquitous 360° Learning Environment on Clinical Histotechnology Competence

Authors: Mari A. Virtanen, Elina Haavisto, Eeva Liikanen, Maria Kääriäinen

Abstract:

Rapid technological development and digitalization has affected also on higher education. During last twenty years multiple of electronic and mobile learning (e-learning, m-learning) platforms have been developed and have become prevalent in many universities and in the all fields of education. Ubiquitous learning (u-learning) is not that widely known or used. Ubiquitous learning environments (ULE) are the new era of computer-assisted learning. They are based on ubiquitous technology and computing that fuses the learner seamlessly into learning process by using sensing technology as tags, badges or barcodes and smart devices like smartphones and tablets. ULE combines real-life learning situations into virtual aspects and can be flexible used in anytime and anyplace. The aim of this study was to assess the effects of ubiquitous 360 o learning environment on higher education students’ clinical histotechnology competence. A quasi-experimental study design was used. 57 students in biomedical laboratory science degree program was assigned voluntarily to experiment (n=29) and to control group (n=28). Experimental group studied via ubiquitous 360o learning environment and control group via traditional web-based learning environment (WLE) in a 8-week educational intervention. Ubiquitous 360o learning environment (ULE) combined authentic learning environment (histotechnology laboratory), digital environment (virtual laboratory), virtual microscope, multimedia learning content, interactive communication tools, electronic library and quick response barcodes placed into authentic laboratory. Web-based learning environment contained equal content and components with the exception of the use of mobile device, interactive communication tools and quick response barcodes. Competence of clinical histotechnology was assessed by using knowledge test and self-report developed for this study. Data was collected electronically before and after clinical histotechnology course and analysed by using descriptive statistics. Differences among groups were identified by using Wilcoxon test and differences between groups by using Mann-Whitney U-test. Statistically significant differences among groups were identified in both groups (p<0.001). Competence scores in post-test were higher in both groups, than in pre-test. Differences between groups were very small and not statistically significant. In this study the learning environment have developed based on 360o technology and successfully implemented into higher education context. And students’ competence increases when ubiquitous learning environment were used. In the future, ULE can be used as a learning management system for any learning situation in health sciences. More studies are needed to show differences between ULE and WLE.

Keywords: competence, higher education, histotechnology, ubiquitous learning, u-learning, 360o

Procedia PDF Downloads 287
2498 ICTs Knowledge as a Way of Enhancing Literacy and Lifelong Learning in Nigeria

Authors: Jame O. Ezema, Odenigbo Veronica

Abstract:

The study covers the topic Information Communication and Technology (ICTs) knowledge as a way of enhancing Literacy and Lifelong learning in Nigeria. This work delved into defining of ICTs. Types of ICTs and media technologies were also mentioned. It further explained how ICTs can be strengthened and the uses of ICTs in education was duly emphasized. The paper also enumerated some side effects of ICTs on learners while the role of ICTs in enhancing literacy was explained. The study carried out strategies to use ICTs meaningfully in Literacy Programs and also emphasized the word lifelong learning in Nigeria. Some recommendations were made towards acquiring ICTs knowledge, so as to enhance Literacy and Lifelong learning in Nigeria.

Keywords: literacy, distance-learning, life-long learning for sustainable development, e-learning

Procedia PDF Downloads 508
2497 New Result for Optical OFDM in Code Division Multiple Access Systems Using Direct Detection

Authors: Cherifi Abdelhamid

Abstract:

In optical communication systems, OFDM has received increased attention as a means to overcome various limitations of optical transmission systems such as modal dispersion, relative intensity noise, chromatic dispersion, polarization mode dispersion and self-phase modulation. The multipath dispersion limits the maximum transmission data rates. In this paper we investigate OFDM system where multipath induced intersymbol interference (ISI) is reduced and we increase the number of users by combining OFDM system with OCDMA system using direct detection Incorporate OOC (orthogonal optical code) for minimize a bit error rate.

Keywords: OFDM, OCDMA, OOC (orthogonal optical code), (ISI), prim codes (Pc)

Procedia PDF Downloads 652
2496 Interlingual Translation of Manipuri Folktales with the Ideas of André Lefevere's Translation

Authors: Thoudam Jomita Devi

Abstract:

This paper is an attempt to analyze the problems of translating Manipuri folktales into English and the strategies deployed. In Manipuri, folktales are known as Fungawari/Phungawari, which is similar to a western bed time story. The work is with the special reference to folktales of Meetei community. Meetei are the majority ethnic group of Manipur, India. For this paper’s purpose, two folktales Shandrembi Cheisra and Pebet will be chosen for analysis and discussion. The translation of folktales can contribute to intercultural communication and bridge the gap between the generations. Translating Manipuri Folktales is problematic on both cultural and linguistic levels. Therefore, the aim of this analysis is to understand, how the idea of André Lefevere (1992) translation could be implicated in translating Manipuri folktales.

Keywords: cultural, folktales, intercultural, interlingual, translation

Procedia PDF Downloads 188
2495 Constructivist Grounded Theory of Intercultural Learning

Authors: Vaida Jurgile

Abstract:

Intercultural learning is one of the approaches taken to understand the cultural diversity of the modern world and to accept changes in cultural identity and otherness and the expression of tolerance. During intercultural learning, students develop their abilities to interact and communicate with their group members. These abilities help to understand social and cultural differences, to form one’s identity, and to give meaning to intercultural learning. Intercultural education recognizes that a true understanding of differences and similarities of another culture is necessary in order to lay the foundations for working together with others, which contributes to the promotion of intercultural dialogue, appreciation of diversity, and cultural exchange. Therefore, it is important to examine the concept of intercultural learning, revealed through students’ learning experiences and understanding of how this learning takes place and what significance this phenomenon has in higher education. At a scientific level, intercultural learning should be explored in order to uncover the influence of cultural identity, i.e., intercultural learning should be seen in a local context. This experience would provide an opportunity to learn from various everyday intercultural learning situations. Intercultural learning can be not only a form of learning but also a tool for building understanding between people of different cultures. The research object of the study is the process of intercultural learning. The aim of the dissertation is to develop a grounded theory of the process of learning in an intercultural study environment, revealing students’ learning experiences. The research strategy chosen in this study is a constructivist grounded theory (GT). GT is an inductive method that seeks to form a theory by applying the systematic collection, synthesis, analysis, and conceptualization of data. The targeted data collection was based on the analysis of data provided by previous research participants, which revealed the need for further research participants. During the research, only students with at least half a year of study experience, i.e., who have completed at least one semester of intercultural studies, were purposefully selected for the research. To select students, snowballing sampling was used. 18 interviews were conducted with students representing 3 different fields of sciences (social sciences, humanities, and technology sciences). In the process of intercultural learning, language expresses and embodies cultural reality and a person’s cultural identity. It is through language that individual experiences are expressed, and the world in which Others exist is perceived. The increased emphasis is placed on the fact that language conveys certain “signs’ of communication and perception with cultural value, enabling the students to identify the Self and the Other. Language becomes an important tool in the process of intercultural communication because it is only through language that learners can communicate, exchange information, and understand each other. Thus, in the process of intercultural learning, language either promotes interpersonal relationships with foreign students or leads to mutual rejection.

Keywords: intercultural learning, grounded theory, students, other

Procedia PDF Downloads 69
2494 Basotho Cultural Shift: The Role of Dress in the Shift

Authors: Papali Elizabeth Maqalika

Abstract:

Introduction: Dress is used daily and can be used to define culture, and through it, individuals form a sense of self and identity. One of the characteristics of culture is that it evolves; Basotho culture is no exception to this. It has evolved through rites of entry, significant ceremonies, daily living, and an approach to others. Most of these affect and have been affected by the local/traditional dress. The study focused on the evolution of culture, and the role played by dress as it is one of the major contributors to non-verbal communication. Methodology: Secondary data were used since most of the original cultural practices are no longer held dear in the value system and so no longer practiced. Interviews were conducted to get some insights from the senior citizens and their responses compared to those of the present adults. Content analysis was used for the interview data. Results: The nature of governance in Lesotho has clearly contributed to the current cultural state of confusion. The Basotho culture has indeed shifted, and the difference in dress code explains it. Acculturation, the alteration in environments, and the type of occasions Basotho attended lately contributed to the shift. Technology brought about a difference in the mode of transport, sports, household activities, and gender roles. Conclusion and Recommendations: It was concluded that since culture is imparted through socialisation, a change in availability of most Basotho women leaves little time left for socialisation with children and resorts to other upbringing patterns, most of which are not cultural; this has brought a cultural shift. In addition, acculturation has contributed massively to the value system of Basotho. The type of dress worn by Basotho presently shifts the culture, and the shifting culture also shifts the dress required to suit the present culture. Because of the type of mindset Basotho has now, it is recommended that cultural days be observed in schools, including the multi-racial ones, and media should assist in this information transmission. The campaigns regarding the value of traditional dress and what it represents are recommended. The local dressmakers manufacturing the Seshoeshoe and any other traditional dress need to be educated about the fabric history, fiber content, and consequent care to be in a position to guide ultimate consumers of the products. Awareness campaigns that the culture shifts and may not necessarily result in negative should be ventured. Cultural exhibitions should also be held ideally at places that hold some cultural heritage. The ministry of sports and culture, together with that of tourism, should run with cultural awareness and enriching vision with a focus on education as opposed to revenue collection.

Keywords: Basotho, culture, dress, acculturation, influence, cultural heritage, socialization, non-verbal communication, Seshoeshoe

Procedia PDF Downloads 80
2493 Pythagorean-Platonic Lattice Method for Finding all Co-Prime Right Angle Triangles

Authors: Anthony Overmars, Sitalakshmi Venkatraman

Abstract:

This paper presents a method for determining all of the co-prime right angle triangles in the Euclidean field by looking at the intersection of the Pythagorean and Platonic right angle triangles and the corresponding lattice that this produces. The co-prime properties of each lattice point representing a unique right angle triangle are then considered. This paper proposes a conjunction between these two ancient disparaging theorists. This work has wide applications in information security where cryptography involves improved ways of finding tuples of prime numbers for secure communication systems. In particular, this paper has direct impact in enhancing the encryption and decryption algorithms in cryptography.

Keywords: Pythagorean triples, platonic triples, right angle triangles, co-prime numbers, cryptography

Procedia PDF Downloads 242