Search results for: online privacy
1064 Discovering the Effects of Guerrilla Advertisements on Perceiver's Ad Attitude, Ad Likability and Purchase Intention
Authors: S. Y. Ozkan, S. Taftaf
Abstract:
This study aims to investigate the possible effects of guerrilla advertising on consumers' attitudes as well as purchase intentions in comparison with traditional advertising. Participants who were over 18 years of age were recruited and completed an online questionnaire. Each participant was randomly assigned to one of the four well-known brand conditions. The study had a within-subjects design where each participant evaluated two advertisements, one guerrilla advertisement, and one traditional advertisement od one respective brand. Participants rated both traditional advertisement and guerrilla advertisement on ad attitude, ad likability, and purchase intention scales. Ad attitude was measured by using both positive and negative adjectives. The hypotheses were tested by paired samples t-test analysis. The results indicated that perceivers were able to differentiate advertisements that include guerrilla techniques and advertisements that include traditional methods from one another. Regardless of the brand manipulation, guerrilla advertisements lead significantly higher positive ad attitude, negative ad attitude, ad likability, and purchase intention compared to traditional advertisements. Therefore, the results showed that while using guerrilla advertising, companies should be aware of any ethical concerns that may emerge in consumers' minds. Present study is one of the rare studies that measures the perceptions of guerrilla and traditional advertisements in an empirical manner in Turkish context, showing that guerrilla advertisements may stimulate negative ad attitudes together with positive ad attitudes, increasing ad likability and purchase intention.Keywords: ad attitude, guerrilla advertisement, purchase intention, traditional advertisement
Procedia PDF Downloads 1391063 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks
Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba
Abstract:
The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.Keywords: authentication, long term evolution, security, vehicle-to-everything
Procedia PDF Downloads 1671062 Immersive Environment as an Occupant-Centric Tool for Architecture Criticism and Architectural Education
Authors: Golnoush Rostami, Farzam Kharvari
Abstract:
In recent years, developments in the field of architectural education have resulted in a shift from conventional teaching methods to alternative state-of-the-art approaches in teaching methods and strategies. Criticism in architecture has been a key player both in the profession and education, but it has been mostly offered by renowned individuals. Hence, not only students or other professionals but also critics themselves may not have the option to experience buildings and rely on available 2D materials, such as images and plans, that may not result in a holistic understanding and evaluation of buildings. On the other hand, immersive environments provide students and professionals the opportunity to experience buildings virtually and reflect their evaluation by experiencing rather than judging based on 2D materials. Therefore, the aim of this study is to compare the effect of experiencing buildings in immersive environments and 2D drawings, including images and plans, on architecture criticism and architectural education. As a result, three buildings that have parametric brick facades were studied through 2D materials and in Unreal Engine v. 24 as an immersive environment among 22 architecture students that were selected using convenient sampling and were divided into two equal groups using simple random sampling. This study used mixed methods, including quantitative and qualitative methods; the quantitative section was carried out by a questionnaire, and deep interviews were used for the qualitative section. A questionnaire was developed for measuring three constructs, including privacy regulation based on Altman’s theory, the sufficiency of illuminance levels in the building, and the visual status of the view (visually appealing views based on obstructions that may have been caused by facades). Furthermore, participants had the opportunity to reflect their understanding and evaluation of the buildings in individual interviews. Accordingly, the collected data from the questionnaires were analyzed using independent t-test and descriptive analyses in IBM SPSS Statistics v. 26, and interviews were analyzed using the content analysis method. The results of the interviews showed that the participants who experienced the buildings in the immersive environment were able to have a thorough and more precise evaluation of the buildings in comparison to those who studied them through 2D materials. Moreover, the analyses of the respondents’ questionnaires revealed that there were statistically significant differences between measured constructs among the two groups. The outcome of this study suggests that integrating immersive environments into the profession and architectural education as an effective and efficient tool for architecture criticism is vital since these environments allow users to have a holistic evaluation of buildings for vigorous and sound criticism.Keywords: immersive environments, architecture criticism, architectural education, occupant-centric evaluation, pre-occupancy evaluation
Procedia PDF Downloads 1341061 Recommender Systems Using Ensemble Techniques
Authors: Yeonjeong Lee, Kyoung-jae Kim, Youngtae Kim
Abstract:
This study proposes a novel recommender system that uses data mining and multi-model ensemble techniques to enhance the recommendation performance through reflecting the precise user’s preference. The proposed model consists of two steps. In the first step, this study uses logistic regression, decision trees, and artificial neural networks to predict customers who have high likelihood to purchase products in each product group. Then, this study combines the results of each predictor using the multi-model ensemble techniques such as bagging and bumping. In the second step, this study uses the market basket analysis to extract association rules for co-purchased products. Finally, the system selects customers who have high likelihood to purchase products in each product group and recommends proper products from same or different product groups to them through above two steps. We test the usability of the proposed system by using prototype and real-world transaction and profile data. In addition, we survey about user satisfaction for the recommended product list from the proposed system and the randomly selected product lists. The results also show that the proposed system may be useful in real-world online shopping store.Keywords: product recommender system, ensemble technique, association rules, decision tree, artificial neural networks
Procedia PDF Downloads 2941060 An Intelligent Tutoring System Enriched with 3D Virtual Reality for Dentistry Students
Authors: Meltem Eryılmaz
Abstract:
With the emergence of the COVID-19 infection outbreak, the socio-cultural, political, economic, educational systems dynamics of the world have gone through a major change, especially in the educational field, specifically dentistry preclinical education, where the students must have a certain amount of real-time experience in endodontics and other various procedures. The totality of the digital and physical elements that make our five sense organs feel as if we really exist in a virtual world is called virtual reality. Virtual reality, which is very popular today, has started to be used in education. With the inclusion of developing technology in education and training environments, virtual learning platforms have been designed to enrich students' learning experiences. The field of health is also affected by these current developments, and the number of virtual reality applications developed for students studying dentistry is increasing day by day. The most widely used tools of this technology are virtual reality glasses. With virtual reality glasses, you can look any way you want in a world designed in 3D and navigate as you wish. With this project, solutions that will respond to different types of dental practices of students who study dentistry with virtual reality applications are produced. With this application, students who cannot find the opportunity to work with patients in distance education or who want to improve themselves at home have unlimited trial opportunities. Unity 2021, Visual Studio 2019, Cardboard SDK are used in the study.Keywords: dentistry, intelligent tutoring system, virtual reality, online learning, COVID-19
Procedia PDF Downloads 2031059 Morality in Actual Behavior: The Moderation Effect of Identification with the Ingroup and Religion on Norm Compliance
Authors: Shauma L. Tamba
Abstract:
This study examined whether morality is the most important aspect in actual behavior. The prediction was that people tend to behave in line with moral (as compared to competence) norms, especially when such norms are presented by their ingroup. The actual behavior that was tested was support for a military intervention without a mandate from the UN. In addition, this study also examined whether identification with the ingroup and religion moderated the effect of group and norm on support for the norm that was prescribed by their ingroup. The prediction was that those who identified themselves higher with the ingroup moral would show a higher support for the norm. Furthermore, the prediction was also that those who have religion would show a higher support for the norm in the ingroup moral rather than competence. In an online survey, participants were asked to read a scenario in which a military intervention without a mandate was framed as either the moral (but stupid) or smart (but immoral) thing to do by members of their own (ingroup) or another (outgroup) society. This study found that when people identified themselves with the smart (but immoral) norm, they showed a higher support for the norm. However, when people identified themselves with the moral (but stupid) norm, they tend to show a lesser support towards the norm. Most of the results in the study did not support the predictions. Possible explanations and implications are discussed.Keywords: morality, competence, ingroup identification, religion, group norm
Procedia PDF Downloads 4081058 Evolution of Web Development Progress in Modern Information Technology
Authors: Abdul Basit Kiani
Abstract:
Web development, the art of creating and maintaining websites, has witnessed remarkable advancements. The aim is to provide an overview of some of the cutting-edge developments in the field. Firstly, the rise of responsive web design has revolutionized user experiences across devices. With the increasing prevalence of smartphones and tablets, web developers have adapted to ensure seamless browsing experiences, regardless of screen size. This progress has greatly enhanced accessibility and usability, catering to the diverse needs of users worldwide. Additionally, the evolution of web frameworks and libraries has significantly streamlined the development process. Tools such as React, Angular, and Vue.js have empowered developers to build dynamic and interactive web applications with ease. These frameworks not only enhance efficiency but also bolster scalability, allowing for the creation of complex and feature-rich web solutions. Furthermore, the emergence of progressive web applications (PWAs) has bridged the gap between native mobile apps and web development. PWAs leverage modern web technologies to deliver app-like experiences, including offline functionality, push notifications, and seamless installation. This innovation has transformed the way users interact with websites, blurring the boundaries between traditional web and mobile applications. Moreover, the integration of artificial intelligence (AI) and machine learning (ML) has opened new horizons in web development. Chatbots, intelligent recommendation systems, and personalization algorithms have become integral components of modern websites. These AI-powered features enhance user engagement, provide personalized experiences, and streamline customer support processes, revolutionizing the way businesses interact with their audiences. Lastly, the emphasis on web security and privacy has been a pivotal area of progress. With the increasing incidents of cyber threats, web developers have implemented robust security measures to safeguard user data and ensure secure transactions. Innovations such as HTTPS protocol, two-factor authentication, and advanced encryption techniques have bolstered the overall security of web applications, fostering trust and confidence among users. Hence, recent progress in web development has propelled the industry forward, enabling developers to craft innovative and immersive digital experiences. From responsive design to AI integration and enhanced security, the landscape of web development continues to evolve, promising a future filled with endless possibilities.Keywords: progressive web applications (PWAs), web security, machine learning (ML), web frameworks, advancement responsive web design
Procedia PDF Downloads 541057 A New Approach to Increase Consumer Understanding of Meal’s Quality – Food Focus Instead of Nutrient Focus
Authors: Elsa Lamy, Marília Prada, Ada Rocha, Cláudia Viegas
Abstract:
The traditional and widely used nutrition-focused approach to communicate with consumers is reductionist and makes it difficult for consumers to assess their food intake. Without sufficient nutrition knowledge and understanding, it would be difficult to choose a healthful diet based only on nutritional recommendations. This study aimed to evaluate the understanding of how food/nutritional information is presented in menus to Portuguese consumers, comparing the nutrient-focused approach (currently used Nutrition Declaration) and the new food-focused approach (the infographic). For data collection, a questionnaire was distributed online using social media channels. A main effect of format on ratings of meal balance and completeness (Fbalance(1,79) = 18.26, p < .001, ηp2 = .188; Fcompleteness(1,67) = 27.18, p < .001, ηp2 = .289). Overall, dishes paired with the nutritional information were rated as more balanced (Mbalance= 3.70, SE = .11; Mcompleteness = 4.00, SE = .14) than meals with the infographic representation (Mbalance = 3.14, SE = .11; Mcompleteness = 3.29, SE = .13). We also observed a main effect of the meal, F(3,237) = 48.90, p < .001, ηp2 = .382, such that M1 and M2 were perceived as less balanced than the M3 and M4, all p < .001. The use of a food-focused approach (infographic) helped participants identify the lack of balance in the less healthful meals (dishes M1 and M2), allowing for a better understanding of meals' compliance with recommendations contributing to better food choices and a healthier lifestyle.Keywords: food labelling, food and nutritional recommendations, infographics, portions based information
Procedia PDF Downloads 791056 Personas Help Understand Users’ Needs, Goals and Desires in an Online Institutional Repository
Authors: Maha ALjohani, James Blustein
Abstract:
Communicating users' needs, goals and problems help designers and developers overcome challenges faced by end users. Personas are used to represent end users’ needs. In our research, creating personas allowed the following questions to be answered: Who are the potential user groups? What do they want to achieve by using the service? What are the problems that users face? What should the service provide to them? To develop realistic personas, we conducted a focus group discussion with undergraduate and graduate students and also interviewed a university librarian. The personas were created to help evaluating the Institutional Repository that is based on the DSpace system. The profiles helped to communicate users' needs, abilities, tasks, and problems, and the task scenarios used in the heuristic evaluation were based on these personas. Four personas resulted of a focus group discussion with undergraduate and graduate students and from interviewing a university librarian. We then used these personas to create focused task-scenarios for a heuristic evaluation on the system interface to ensure that it met users' needs, goals, problems and desires. In this paper, we present the process that we used to create the personas that led to devise the task scenarios used in the heuristic evaluation as a follow up study of the DSpace university repository.Keywords: heuristic evaluation, institutional repositories, user experience, human computer interaction, user profiles, personas, task scenarios, heuristics
Procedia PDF Downloads 4991055 Stress and Coping Strategies: A Correlational Analysis to Profiling Maladaptive Behaviors at Work
Authors: Silvia Riva, Ezekiel Chinyio
Abstract:
Introduction: Workers in different sectors are prone to stress at varying levels. They also respond to stress in different ways. An inspiration was to study stress development amongst workers in a work dangerous setting (Construction Industry) as well as how they cope with specific stress incidences. Objective: The overarching objective of the study was to study and correlate between stress and coping strategies. The research was conducted in an organizational industrial setting, and its findings on the coping actions of construction workers are reported in this article. Methods: An online cross-sectional survey was conducted with 80 participants aged 18-62. These were working for three different construction organizations in the West Midland region of the UK. Their coping actions were assessed using the COPE Inventory (Carver, 2013) instrument while the level of stress was assessed by the Perceived Stress Scale (Cohen, 1994). Results: Out of 80 workers (20 female, 25%, mean age 40.66), positive reinterpretation (M=4.15, SD=2.60) and active coping (M=4.18, SD=2.55) were the two most adaptive strategies reported by the workers while the most frequent maladaptive behavior was mental disengagement (M=3.62, SD=2.25). Among the maladaptive tactics, alcohol and drug abuse was a significant moderator in stress reactions (t=6.12, p=.000). Conclusion: Some maladaptive strategies are adopted by construction workers to cope with stress. So, it could be argued that programs of stress prevention and control in the construction industry have a basis to develop solutions that can improve and strengthen effective interventions when workers are stressed or getting stressed.Keywords: coping, organization, strategies, stress
Procedia PDF Downloads 2171054 Contesting Blind Obedience in Islam within the Malay-Language Media: Case Study of 'I Want to Touch a Dog' Event
Authors: Aisya Zaharin
Abstract:
The reporting of Islam in the Malaysian government-controlled press is complicated and occurs almost daily. This is due to the Islamisation process that has been heavily politicized in recent years. This article analyses media representations of Islam in the Malaysian media through the social responsibility theory. A provocative case study of media reporting on the “I want to touch a dog” event was analysed since dog’s saliva is ritually considered unhygienic by Muslims. This paper will not question the Islamic ruling on the dog’s issue. Instead, it calls for discussions in relation to openness and maturity in religious discourse with respect to the dog’s saliva dialogue in 1937. It applies Hage’s “minor and major reality” to explain the increasing percentage of Muslim who define their own understandings of Islam vs the government’s dogmatic versions. This paper employs Alatas’s method of “sociological investigation in Southeast Asia” by using ethnographic examination on selected mass media. Through Asiacentricity approach, this paper revisited the local framework of Alatas’s New Man encouraging Muslims to engage in knowledge and to appreciate diversities in Islamic jurisprudences. Despite government’s control, findings showed that non-Malay languages and online media are more comprehensive in reporting the news about Islam. Clearly, there has to be a re-conceptualization of Islamic discourses in the Malay-language media.Keywords: dog, Fiqh, Islamic jurisprudence, Malaysian media, New Man, social responsibility
Procedia PDF Downloads 3171053 Open and Distance Learning (ODL) Education in Nigeria: Challenge of Academic Quality
Authors: Edu Marcelina, Sule Sheidu A., Nsor Eunice
Abstract:
As open and distance education is gradually becoming an acceptable means of solving the problem of access in higher education, quality has now become one of the main concerns among institutions and stakeholders of open and distance learning (ODL) and the education sector in general. This study assessed the challenges of academic quality in the open and distance learning (ODL) education in Nigeria using Distance Learning Institute (DLI), University of Lagos and National Open University of Nigeria as a case. In carrying out the study, a descriptive survey research design was employed. A researcher-designed and validated questionnaire was used to elicit responses that translated to the quantitative data for this study. The sample comprised 665 students of the Distance Learning Institute (DLI), and National Open University of Nigeria (NOUN), carefully selected through the method of simple random sampling. Data collected from the study were analyzed using Chi-Square (X2) at 0.05 Level of significance. The results of the analysis revealed that; the use of ICT tools is a factor in ensuring quality in the Open and Distance Learning (ODL) operations; the quality of the materials made available to ODL students will determine the quality of education that will be received by the students; and the time scheduled for students for self-study, online lecturing/interaction and face to face study and the quality of education in Open and Distance Learning Institutions has a lot of impact on the quality of education the students receive. Based on the findings, a number of recommendations were made.Keywords: open and distance learning, quality, ICT, face-to-face interaction
Procedia PDF Downloads 3761052 A Comparative Evaluation of the SIR and SEIZ Epidemiological Models to Describe the Diffusion Characteristics of COVID-19 Polarizing Viewpoints on Online
Authors: Maryam Maleki, Esther Mead, Mohammad Arani, Nitin Agarwal
Abstract:
This study is conducted to examine how opposing viewpoints related to COVID-19 were diffused on Twitter. To accomplish this, six datasets using two epidemiological models, SIR (Susceptible, Infected, Recovered) and SEIZ (Susceptible, Exposed, Infected, Skeptics), were analyzed. The six datasets were chosen because they represent opposing viewpoints on the COVID-19 pandemic. Three of the datasets contain anti-subject hashtags, while the other three contain pro-subject hashtags. The time frame for all datasets is three years, starting from January 2020 to December 2022. The findings revealed that while both models were effective in evaluating the propagation trends of these polarizing viewpoints, the SEIZ model was more accurate with a relatively lower error rate (6.7%) compared to the SIR model (17.3%). Additionally, the relative error for both models was lower for anti-subject hashtags compared to pro-subject hashtags. By leveraging epidemiological models, insights into the propagation trends of polarizing viewpoints on Twitter were gained. This study paves the way for the development of methods to prevent the spread of ideas that lack scientific evidence while promoting the dissemination of scientifically backed ideas.Keywords: mathematical modeling, epidemiological model, seiz model, sir model, covid-19, twitter, social network analysis, social contagion
Procedia PDF Downloads 621051 Learning Vocabulary with SkELL: Developing a Methodology with University Students in Japan Using Action Research
Authors: Henry R. Troy
Abstract:
Corpora are becoming more prevalent in the language classroom, especially in the development of dictionaries and course materials. Nevertheless, corpora are still perceived by many educators as difficult to use directly in the classroom, a process which is also known as “data-driven learning” (DDL). Action research has been identified as a method by which DDL’s efficiency can be increased, but it is also an approach few studies on DDL have employed. Studies into the effectiveness of DDL in language education in Japan are also rare, and investigations focused more on student and teacher reactions rather than pre and post-test scores are rarer still. This study investigates the student and teacher reactions to the use of SkELL, a free online corpus designed to be user-friendly, for vocabulary learning at a university in Japan. Action research is utilized to refine the teaching methodology, with changes to the method based on student and teacher feedback received via surveys submitted after each of the four implementations of DDL. After some training, the students used tablets to study the target vocabulary autonomously in pairs and groups, with the teacher acting as facilitator. The results show that the students enjoyed using SkELL and felt it was effective for vocabulary learning, while the teaching methodology grew in efficiency throughout the course. These findings suggest that action research can be a successful method for increasing the efficacy of DDL in the language classroom, especially with teachers and students who are new to the practice.Keywords: action research, corpus linguistics, data-driven learning, vocabulary learning
Procedia PDF Downloads 2461050 Autonomy in Pregnancy and Childbirth: The Next Frontier of Maternal Health Rights Advocacy
Authors: Alejandra Cardenas, Ona Flores, Fabiola Gretzinger
Abstract:
Since the 1990s, legal strategies for the promotion and protection of maternal health rights have achieved significant gains. Successful litigation in courts around the world have shown that these rights can be judicially enforceable. Governments and international organizations have acknowledged the importance of a human rights-based approach to maternal mortality and morbidity, and obstetric violence has been recognized as a human rights issue. Despite the progress made, maternal mortality has worsened in some regions of the world, while progress has stagnated elsewhere, and mistreatment in maternal care is reported almost universally. In this context, issues of maternal autonomy and decision-making during pregnancy, labor, and delivery as a critical barrier to access quality maternal health have been largely overlooked. Indeed, despite the principles of autonomy and informed consent in medical interventions being well-established in international and regional norms, how they are applied particularly during childbirth and pregnancy remains underdeveloped. National and global legal standards and decisions related to maternal health were reviewed and analyzed to determine how maternal autonomy and decision-making during pregnancy, labor, and delivery have been protected (or not) by international and national courts. The results of this legal research and analysis lead to the conclusion that a few standards have been set by courts regarding pregnant people’s rights to make choices during pregnancy and birth; however, most undermine the agency of pregnant people. These decisions recognize obstetric violence and gender-based discrimination, but fail to protect pregnant people’s autonomy, privacy, and their right to informed consent. As current human rights standards stand today, maternal health is the only field in medicine and law in which informed consent can be overridden, and patients can be forced to submit to treatments against their will. Unconsented treatment and loss of agency during pregnancy and childbirth can have long-term physical and mental impacts, reduce satisfaction and trust in health systems, and may deter future health-seeking behaviors. This research proposes a path forward that focuses on the pregnant person as an independent agent, relying on the doctrine of self-determination during pregnancy and childbirth, which includes access to the necessary conditions to enable autonomy and choice throughout pregnancy and childbirth as a critical step towards our approaches to reduce maternal mortality, morbidity, and mistreatment, and realize the promise of access to quality maternal health as a human right.Keywords: autonomy in childbirth and pregnancy, choice, informed consent, jurisprudential analysis
Procedia PDF Downloads 521049 Generalized Synchronization in Systems with a Complex Topology of Attractor
Authors: Olga I. Moskalenko, Vladislav A. Khanadeev, Anastasya D. Koloskova, Alexey A. Koronovskii, Anatoly A. Pivovarov
Abstract:
Generalized synchronization is one of the most intricate phenomena in nonlinear science. It can be observed both in systems with a unidirectional and mutual type of coupling including the complex networks. Such a phenomenon has a number of practical applications, for example, for the secure information transmission through the communication channel with a high level of noise. Known methods for the secure information transmission needs in the increase of the privacy of data transmission that arises a question about the observation of such phenomenon in systems with a complex topology of chaotic attractor possessing two or more positive Lyapunov exponents. The present report is devoted to the study of such phenomenon in two unidirectionally and mutually coupled dynamical systems being in chaotic (with one positive Lyapunov exponent) and hyperchaotic (with two or more positive Lyapunov exponents) regimes, respectively. As the systems under study, we have used two mutually coupled modified Lorenz oscillators and two unidirectionally coupled time-delayed generators. We have shown that in both cases the generalized synchronization regime can be detected by means of the calculation of Lyapunov exponents and phase tube approach whereas due to the complex topology of attractor the nearest neighbor method is misleading. Moreover, the auxiliary system approaches being the standard method for the synchronous regime observation, for the mutual type of coupling results in incorrect results. To calculate the Lyapunov exponents in time-delayed systems we have proposed an approach based on the modification of Gram-Schmidt orthogonalization procedure in the context of the time-delayed system. We have studied in detail the mechanisms resulting in the generalized synchronization regime onset paying a great attention to the field where one positive Lyapunov exponent has already been become negative whereas the second one is a positive yet. We have found the intermittency here and studied its characteristics. To detect the laminar phase lengths the method based on a calculation of local Lyapunov exponents has been proposed. The efficiency of the method has been verified using the example of two unidirectionally coupled Rössler systems being in the band chaos regime. We have revealed the main characteristics of intermittency, i.e. the distribution of the laminar phase lengths and dependence of the mean length of the laminar phases on the criticality parameter, for all systems studied in the report. This work has been supported by the Russian President's Council grant for the state support of young Russian scientists (project MK-531.2018.2).Keywords: complex topology of attractor, generalized synchronization, hyperchaos, Lyapunov exponents
Procedia PDF Downloads 2751048 Empowering Certificate Management with Blockchain Technology
Authors: Yash Ambekar, Kapil Vhatkar, Prathamesh Swami, Kartikey Singh, Yashovardhan Kaware
Abstract:
The rise of online courses and certifications has created new opportunities for individuals to enhance their skills. However, this digital transformation has also given rise to coun- terfeit certificates. To address this multifaceted issue, we present a comprehensive certificate management system founded on blockchain technology and strengthened by smart contracts. Our system comprises three pivotal components: certificate generation, authenticity verification, and a user-centric digital locker for certificate storage. Blockchain technology underpins the entire system, ensuring the immutability and integrity of each certificate. The inclusion of a cryptographic hash for each certificate is a fundamental aspect of our design. Any alteration in the certificate’s data will yield a distinct hash, a powerful indicator of potential tampering. Furthermore, our system includes a secure digital locker based on cloud storage that empowers users to efficiently manage and access all their certificates in one place. Moreover, our project is committed to providing features for certificate revocation and updating, thereby enhancing the system’s flexibility and security. Hence, the blockchain and smart contract-based certificate management system offers a robust and one-stop solution to the escalating problem of counterfeit certificates in the digital era.Keywords: blockchain technology, smart contracts, counterfeit certificates, authenticity verification, cryptographic hash, digital locker
Procedia PDF Downloads 461047 Transitioning Teacher Identity during COVID-19: An Australian Early Childhood Education Perspective
Authors: J. Jebunnesa, Y. Budd, T. Mason
Abstract:
COVID-19 changed the pedagogical expectations of early childhood education as many teachers across Australia had to quickly adapt to new teaching practices such as remote teaching. An important factor in the successful implementation of any new teaching and learning approach is teacher preparation, however, due to the pandemic, the transformation to remote teaching was immediate. A timely question to be asked is how early childhood teachers managed the transition from face-to-face teaching to remote teaching and what was learned through this time. This study explores the experiences of early childhood educators in Australia during COVID-19 lockdowns. Data were collected from an online survey conducted through the official Facebook forum of “Early Childhood Education and Care Australia,” and a constructivist grounded theory methodology was used to analyse the data. Initial research results suggest changing expectations of teachers’ roles and responsibilities during the lockdown, with a significant category related to transitioning teacher identities emerging. The concept of transitioning represents the shift from the role of early childhood educator to educational innovator, essential worker, social worker, and health officer. The findings illustrate the complexity of early childhood educators’ roles during the pandemic.Keywords: changing role of teachers, constructivist grounded theory, lessons learned, teaching during COVID-19
Procedia PDF Downloads 991046 The Conceptual Relationships in N+N Compounds in Arabic Compared to English
Authors: Abdel Rahman Altakhaineh
Abstract:
This paper has analysed the conceptual relations between the elements of NN compounds in Arabic and compared them to those found in English based on the framework of Conceptual Semantics and a modified version of Parallel Architecture referred to as Relational Morphology. The analysis revealed that the repertoire of possible semantic relations between the two nouns in Arabic NN compounds reproduces that in English NN compounds and that, therefore, the main difference is in headedness (right-headed in English, left-headed in Arabic). Adopting RM allows productive and idiosyncratic elements to interweave with each other naturally. Semantically transparent compounds can be stored in memory or produced and understood online, while compounds with different degrees of semantic idiosyncrasy are stored in memory. Furthermore, the predictable parts of idiosyncratic compounds are captured by general schemas. In compounds, such schemas pick out the range of possible semantic relations between the two nouns. Finally, conducting a cross-linguistic study of the systematic patterns of possible conceptual relationships between compound elements is an area worthy of further exploration. In addition, comparing and contrasting compounding in Arabic and Hebrew, especially as they are both Semitic languages, is another area that needs to be investigated thoroughly. It will help morphologists understand the extent to which Jackendoff’s repertoire of semantic relations in compounds is universal. That is, if a language as distant from English as Arabic displays a similar range of cases, this is evidence for a (relatively) universal set of relations from which individual languages may pick and choose.Keywords: conceptual semantics, morphology, compounds, arabic, english
Procedia PDF Downloads 1001045 Rethinking Peace Journalism in Pakistan: A Critical Analysis of News Discourse on the Afghan Refugee Repatriation Conflict
Authors: Ayesha Hasan
Abstract:
This study offers unique perspectives and analyses of peace and conflict journalism through interpretative repertoire, media frames, and critical discourse analyses. Two major English publications in Pakistan, representing both long and short-form journalism, are investigated to uncover how the Afghan refugee repatriation from Pakistan in 2016-17 has been framed in Pakistani English media. Peace journalism focuses on concepts such as peace initiatives and peace building, finding common ground, and preventing further conflict. This study applies Jake Lynch’s Coding Criteria to guide the critical discourse analysis and Lee and Maslog’s Peace Journalism Quotient to examine the extent of peace journalism in each text. This study finds that peace journalism is missing in Pakistani English press, but represented, to an extent, in long-form print and online coverage. Two new alternative frames are also proposed. This study gives an in-depth understanding of if and how journalists in Pakistan are covering conflicts and framing stories that can be identified as peace journalism. This study represents significant contributions to the remarkably limited scholarship on peace and conflict journalism in Pakistan and extends Shabbir Hussain’s work on critical pragmatic perspectives on peace journalism in Pakistan.Keywords: Afghan refugee repatriation, Critical discourse analysis, Media framing , Peace and conflict journalism
Procedia PDF Downloads 2011044 AI-Enabled Smart Contracts for Reliable Traceability in the Industry 4.0
Authors: Harris Niavis, Dimitra Politaki
Abstract:
The manufacturing industry was collecting vast amounts of data for monitoring product quality thanks to the advances in the ICT sector and dedicated IoT infrastructure is deployed to track and trace the production line. However, industries have not yet managed to unleash the full potential of these data due to defective data collection methods and untrusted data storage and sharing. Blockchain is gaining increasing ground as a key technology enabler for Industry 4.0 and the smart manufacturing domain, as it enables the secure storage and exchange of data between stakeholders. On the other hand, AI techniques are more and more used to detect anomalies in batch and time-series data that enable the identification of unusual behaviors. The proposed scheme is based on smart contracts to enable automation and transparency in the data exchange, coupled with anomaly detection algorithms to enable reliable data ingestion in the system. Before sensor measurements are fed to the blockchain component and the smart contracts, the anomaly detection mechanism uniquely combines artificial intelligence models to effectively detect unusual values such as outliers and extreme deviations in data coming from them. Specifically, Autoregressive integrated moving average, Long short-term memory (LSTM) and Dense-based autoencoders, as well as Generative adversarial networks (GAN) models, are used to detect both point and collective anomalies. Towards the goal of preserving the privacy of industries' information, the smart contracts employ techniques to ensure that only anonymized pointers to the actual data are stored on the ledger while sensitive information remains off-chain. In the same spirit, blockchain technology guarantees the security of the data storage through strong cryptography as well as the integrity of the data through the decentralization of the network and the execution of the smart contracts by the majority of the blockchain network actors. The blockchain component of the Data Traceability Software is based on the Hyperledger Fabric framework, which lays the ground for the deployment of smart contracts and APIs to expose the functionality to the end-users. The results of this work demonstrate that such a system can increase the quality of the end-products and the trustworthiness of the monitoring process in the smart manufacturing domain. The proposed AI-enabled data traceability software can be employed by industries to accurately trace and verify records about quality through the entire production chain and take advantage of the multitude of monitoring records in their databases.Keywords: blockchain, data quality, industry4.0, product quality
Procedia PDF Downloads 1891043 Utilization of Online Risk Mapping Techniques versus Desktop Geospatial Tools in Making Multi-Hazard Risk Maps for Italy
Authors: Seyed Vahid Kamal Alavi
Abstract:
Italy has experienced a notable quantity and impact of disasters due to natural hazards and technological accidents caused by diverse risk sources on its physical, technological, and human/sociological infrastructures during past decade. This study discusses the frequency and impacts of the most three physical devastating natural hazards in Italy for the period 2000–2013. The approach examines the reliability of a range of open source WebGIS techniques versus a proposed multi-hazard risk management methodology. Spatial and attribute data which include USGS publically available hazard data and thirteen years Munich RE recorded data for Italy with different severities have been processed, visualized in a GIS (Geographic Information System) framework. Comparison of results from the study showed that the multi-hazard risk maps generated using open source techniques do not provide a reliable system to analyze the infrastructures losses in respect to national risk sources while they can be adopted for general international risk management purposes. Additionally, this study establishes the possibility to critically examine and calibrate different integrated techniques in evaluating what better protection measures can be taken in an area.Keywords: multi-hazard risk mapping, risk management, GIS, Italy
Procedia PDF Downloads 3711042 Digital Twin of Real Electrical Distribution System with Real Time Recursive Load Flow Calculation and State Estimation
Authors: Anosh Arshad Sundhu, Francesco Giordano, Giacomo Della Croce, Maurizio Arnone
Abstract:
Digital Twin (DT) is a technology that generates a virtual representation of a physical system or process, enabling real-time monitoring, analysis, and simulation. DT of an Electrical Distribution System (EDS) can perform online analysis by integrating the static and real-time data in order to show the current grid status and predictions about the future status to the Distribution System Operator (DSO), producers and consumers. DT technology for EDS also offers the opportunity to DSO to test hypothetical scenarios. This paper discusses the development of a DT of an EDS by Smart Grid Controller (SGC) application, which is developed using open-source libraries and languages. The developed application can be integrated with Supervisory Control and Data Acquisition System (SCADA) of any EDS for creating the DT. The paper shows the performance of developed tools inside the application, tested on real EDS for grid observability, Smart Recursive Load Flow (SRLF) calculation and state estimation of loads in MV feeders.Keywords: digital twin, distributed energy resources, remote terminal units, supervisory control and data acquisition system, smart recursive load flow
Procedia PDF Downloads 1101041 Use of Cloud-Based Virtual Classroom in Connectivism Learning Process to Enhance Information Literacy and Self-Efficacy for Undergraduate Students
Authors: Kulachai Kultawanich, Prakob Koraneekij, Jaitip Na-Songkhla
Abstract:
The way of learning has been changed into a new paradigm since the improvement of network and communication technology, so learners have to interact with massive amount of the information. Thus, information literacy has become a critical set of abilities required by every college and university in the world. Connectivism is considered to be an alternative way to design information literacy course in online learning environment, such as Virtual Classroom (VC). With the change of learning pedagogy, VC is employed to improve the social capability by integrating cloud-based technology. This paper aims to study the use of Cloud-based Virtual Classroom (CBVC) in Connectivism learning process to enhance information literacy and self-efficacy of twenty-one undergraduate students who registered in an e-publishing course at Chulalongkorn University. The data were gathered during 6 weeks of the study by using the following instruments: (1) Information literacy test (2) Information literacy rubrics (3) Information Literacy Self-Efficacy (ILSE) Scales and (4) Questionnaire. The result indicated that students have information literacy and self-efficacy posttest mean scores higher than pretest mean scores at .05 level of significant after using CBVC in Connectivism learning process. Additionally, the study identified that the Connectivism learning process proved useful for developing information rich environment and a sense of community, and the CBVC proved useful for developing social connection.Keywords: cloud-based, virtual classroom, connectivism, information literacy
Procedia PDF Downloads 4531040 The Effect of the Covid-19 Pandemic on Foreign Students Studying in Hungary – What Changed?
Authors: Anita Kéri
Abstract:
Satisfying foreign student needs has been in the center of research interest in the past several years. Higher education institutions have been exploring factors influencing foreign student satisfactionto stay competitive on the educational market. Even though foreign student satisfaction and loyalty are topics investigated deeply in the literature, the academic years of 2020 and 2021 have revealed challenges never experienced before. With the COVID-19 pandemic, new factors have emerged that might influence foreign student satisfaction and loyalty in higher education. The aim of the current research is to shed lights on what factors influence foreign student satisfaction and loyalty in the post-pandemic educational era and to reveal if the effects of factors influencing satisfaction and loyalty have changed compared to previous findings. Initial results show that students are less willing to participate in online surveys during and after the pandemic. The return rate of the survey instrument is below 5%. Results also reveal that there is a slight difference in what factors have significant effects on school-related and non-school-related satisfaction and overall loyalty, measured pre- and post-pandemic times. The results of the current study help us determine what factors higher education institutions need to consider when planning the future service affordances for their foreign students that might influence their satisfaction and loyalty.Keywords: pandemic, COVID-19, satisfacion, loyalty, service quality, higher education
Procedia PDF Downloads 1631039 Leveraging Large Language Models to Build a Cutting-Edge French Word Sense Disambiguation Corpus
Authors: Mouheb Mehdoui, Amel Fraisse, Mounir Zrigui
Abstract:
With the increasing amount of data circulating over the Web, there is a growing need to develop and deploy tools aimed at unraveling semantic nuances within text or sentences. The challenges in extracting precise meanings arise from the complexity of natural language, while words usually have multiple interpretations depending on the context. The challenge of precisely interpreting words within a given context is what the task of Word Sense Disambiguation meets. It is a very old domain within the area of Natural Language Processing aimed at determining a word’s meaning that it is going to carry in a particular context, hence increasing the correctness of applications processing the language. Numerous linguistic resources are accessible online, including WordNet, thesauri, and dictionaries, enabling exploration of diverse contextual meanings. However, several limitations persist. These include the scarcity of resources for certain languages, a limited number of examples within corpora, and the challenge of accurately detecting the topic or context covered by text, which significantly impacts word sense disambiguation. This paper will discuss the different approaches to WSD and review corpora available for this task. We will contrast these approaches, highlighting the limitations, which will allow us to build a corpus in French, targeted for WSD.Keywords: semantic enrichment, disambiguation, context fusion, natural language processing, multilingual applications
Procedia PDF Downloads 61038 The Postcolonial Everyday: the Construction of Daily Barriers in the Experience of Asylum Seekers and Refugees in the UK
Authors: Sarah Elmammeri
Abstract:
This paper will represent the postcolonial every day in the journey of asylum seekers through the asylum process in the UK. It represents everyday borders, which are defined as everyday barriers, and obstacles facing asylum seekers and refugees in the host country. These everyday barriers can be legal, financial, social and educational under the umbrella of the racialized administrative border creating a package. The arguments build on a set of 21 semi-structured interviews in English and Arabic. The interviews were conducted in the UK, online via zoom lasting between 25 minutes and 2 hours with asylum seekers, refugees, Non-governmental organisations workers and volunteers. The interviews focus on the meaning of borders both physical and metaphorical and ways to challenge the ongoing postcolonial everyday border practices. The findings conclude that these barriers are there deliberately and intentionally to target asylum seekers and limit their legal right to claim asylum in a form of policy and regulations. People in the asylum process, NGO workers, and refugees relate to this aspect of the everyday borders. Second, these barriers come intertwined together creating a structure that interferes with the daily life of an asylum seeker and later affects people with refugee status creating racialised barriers starting with the structural and official form of it: the asylum process. These structural barriers will be linked forming a multi-level barrier enhancing the racialisation of people who are categorised and selected.Keywords: everyday borders, asylum policies, inclusion and exclusion, refugees and asylum seekers
Procedia PDF Downloads 1201037 The Psychological Significance of Cultural and Religious Values Among the Arab Population
Authors: Michel Mikhail
Abstract:
Introduction: Values, which are the guiding principles and beliefs of our lives, have an influence on one’s psychological health. This study aims to investigate how Schwartz’s four higher-order values (conservation, openness to change, self-transcendence, and self-enhancement) and religious values influence psychological health among the Arab population. Methods: A total of 1,023 respondents from nine Arab countries aged 18 to 71 filled out an online survey with measures of the following constructs: Schwartz’s four higher-order values (Portrait Value Questionnaire-21), religious values (Sahin’s Index of Islamic Moral Values), and general psychological health (General Health Questionnaire-28). Results: Two models of multiple regression were conducted to investigate the relationships between values and psychological health. Higher conservation, self-enhancement, and religious values were significantly associated with better psychological health, with conservation losing significance after adding religious values to the model. All of Schwartz’s four values were found to have a significant relationship with religious values. More self-enhancement and conservation values were associated with higher identification of religious values, and the opposite was true for the other two values. Conclusion: The findings challenged existing assumptions that conservation values relate negatively to psychological health. This finding could be explained by the congruence of conservation values and the Arab culture. The most powerful relationships were those of self-enhancement and religious values, both of which were positively associated with psychological health. As such, therapists should be aware to reconsider biases against religious or conservation values and rather pay attention to their potential positive influence over one’s psychological health.Keywords: counseling psychology, counseling and cultural values, counseling and religious values, psychotherapy and Arab values
Procedia PDF Downloads 481036 Heritage and Tourism in the Era of Big Data: Analysis of Chinese Cultural Tourism in Catalonia
Authors: Xinge Liao, Francesc Xavier Roige Ventura, Dolores Sanchez Aguilera
Abstract:
With the development of the Internet, the study of tourism behavior has rapidly expanded from the traditional physical market to the online market. Data on the Internet is characterized by dynamic changes, and new data appear all the time. In recent years the generation of a large volume of data was characterized, such as forums, blogs, and other sources, which have expanded over time and space, together they constitute large-scale Internet data, known as Big Data. This data of technological origin that derives from the use of devices and the activity of multiple users is becoming a source of great importance for the study of geography and the behavior of tourists. The study will focus on cultural heritage tourist practices in the context of Big Data. The research will focus on exploring the characteristics and behavior of Chinese tourists in relation to the cultural heritage of Catalonia. Geographical information, target image, perceptions in user-generated content will be studied through data analysis from Weibo -the largest social networks of blogs in China. Through the analysis of the behavior of heritage tourists in the Big Data environment, this study will understand the practices (activities, motivations, perceptions) of cultural tourists and then understand the needs and preferences of tourists in order to better guide the sustainable development of tourism in heritage sites.Keywords: Barcelona, Big Data, Catalonia, cultural heritage, Chinese tourism market, tourists’ behavior
Procedia PDF Downloads 1381035 Occurrence of Antibiotics of Veterinary Use in Water of the Lake Titicaca: Its Environmental Implication and Human Health
Authors: Franz Zirena Vilca, Nestor Cahui Galarza, Walter Alejandro Zamalloa Cuba, Edith Tello Palma, Teofilo Donaires Flores, Valdemar Luiz Tornisielo
Abstract:
The production of rainbow trout in the Lake Titicaca represents an important economic activity for Peru. The city of Puno is responsible for 83% of this production, so the use of antibiotics within the aquaculture system is not alien to this reality. Meanwhile, the waters of Lake Titicaca represent an important source for the supply of drinking water for 80% of the population of the Puno city. In this paper, twelve antibiotics for veterinary use were monitored in water samples during two seasons: dry (July 2015) and rainy (February 2016), water samples from trout production systems, near the water catching point in the lake and drinking water in the city house of Puno were considered. The samples were analyzed using liquid chromatography coupled to mass spectrometry and solid online phase extraction (On-line SPE-LC-MS/MS), all samples analyzed showed concentrations of Ciprofloxacin up to 65.2 ng L⁻¹ at the rainy season. On the other hand, 63% of water samples from the dry season and 36 % from the rainy season showed Chlortetracycline up to 8.7 and 6.1 ng L⁻¹, respectively. The presence of residues of veterinary antibiotics in drinking water means a serious health risk for 80% of the population of Puno since all these people are supplied from this source.Keywords: chromatography, DNA damage, environmental risk, water pollution
Procedia PDF Downloads 230