Search results for: instagram and libraries
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 347

Search results for: instagram and libraries

167 Discrimination against Women in Workplace: A Case Study on Hotel Dress Code

Authors: A. R. Anwar

Abstract:

The development of discrimination case which is now extended to the issue of female workers dress code in the hotel industry seen as a challenging topic and a solution is needed. Discrimination generally gives a negative impact on the victim and has a direct impact on female workers if it involves the issue of this dress code. Hence it is not appropriate if these genders are subjected to discrimination that prohibits them from wearing a hijab and required to wear a short skirt during working hours. On this basis, this study discusses the major problems pertaining to dress code faced by female workers in the Malaysian hotel industry. An interview with qualified parties from human resource department in each selected hotels has been conducted in which later generated the findings and supported by materials that obtained from libraries, archives and other databases. Through the research findings, several recommendations were introduced to reduce and eliminate the discrimination issue in Malaysian working sector particularly in the hotel industry in order to achieve the equality among men and women in the workplace.

Keywords: discrimination, dress code in the hotel, impact on female workers, equality

Procedia PDF Downloads 204
166 Enhancing Code Security with AI-Powered Vulnerability Detection

Authors: Zzibu Mark Brian

Abstract:

As software systems become increasingly complex, ensuring code security is a growing concern. Traditional vulnerability detection methods often rely on manual code reviews or static analysis tools, which can be time-consuming and prone to errors. This paper presents a distinct approach to enhancing code security by leveraging artificial intelligence (AI) and machine learning (ML) techniques. Our proposed system utilizes a combination of natural language processing (NLP) and deep learning algorithms to identify and classify vulnerabilities in real-world codebases. By analyzing vast amounts of open-source code data, our AI-powered tool learns to recognize patterns and anomalies indicative of security weaknesses. We evaluated our system on a dataset of over 10,000 open-source projects, achieving an accuracy rate of 92% in detecting known vulnerabilities. Furthermore, our tool identified previously unknown vulnerabilities in popular libraries and frameworks, demonstrating its potential for improving software security.

Keywords: AI, machine language, cord security, machine leaning

Procedia PDF Downloads 36
165 Digital Preservation: Requirement of 21st Century

Authors: Gaurav Kumar, Shilpa

Abstract:

Digital libraries have been established all over the world to create, maintain and to preserve the digital materials. This paper focuses on operational digital preservation systems specifically in educational organizations in India. It considers the broad range of digital objects including e-journals, technical reports, e-records, project documents, scientific data, etc. This paper describes the main objectives, process and technological issues involved in preservation of digital materials. Digital preservation refers to the various methods of keeping digital materials alive for the future. It includes everything from electronic publications on CD-ROM to Online database and collections of experimental data in digital format maintains the ability to display, retrieve and use digital collections in the face of rapidly changing technological and organizational infrastructures elements. This paper exhibits the importance and objectives of digital preservation. The necessities of preservation are hardware and software technology to interpret the digital documents and discuss various aspects of digital preservation.

Keywords: preservation, digital preservation, digital dark age, conservation, archive, repository, document, information technology, hardware, software, organization, machine readable format

Procedia PDF Downloads 457
164 Monstrous Beauty: Disability and Illness in Contemporary Pop Culture

Authors: Grzegorz Kubinski

Abstract:

In the proposed paper, we would like to present the phenomenon of disease and disability as an element of discourse redefining the contemporary canons of beauty and the category of normativity. In widely understood media, and above all in social media and fashion industry, the use of the disease as an aesthetic category has long been observed. There is an interesting case of promoting and maintaining a certain, ideal pattern of physical beauty, while at the same time very clear exploitation of various types of illnesses. The categories of disease and disabled body are shown as an element of the expression of the individuality and originality of one's own identity, while at the same time the disabled person is still experiencing social exclusion. Illness or body abnormality as an aesthetic category also functions as an ethical-political category. The analysis of the interrelations of these discourses will be presented on the example of selected projects present in social media, like Instagram or Facebook. We would like to present how old forms of 'curiosities' or 'abnormalities' turned into mainstream forms of a new aesthetic. For marginalized disabled people, there is a new form of expression and built their identity. But, there is an interesting point: are this contemporary forms of using disability and illness really new? Or maybe this is just another form of Wunderkammer or even cabinets of curiosities? We propose to analyze contemporary cultural and social context in order to clarify this issue. On the other hand, we would like to present some examples from personal interviews with disabled internet influencers and statements disabled persons concerning the role of the different body in society (e.g. #bodypositive, #perfeclyflawed).

Keywords: disability, new media, defect, fashion

Procedia PDF Downloads 188
163 Running the Athena Vortex Lattice Code in JAVA through the Java Native Interface

Authors: Paul Okonkwo, Howard Smith

Abstract:

This paper describes a methodology to integrate the Athena Vortex Lattice Aerodynamic Software for automated operation in a multivariate optimisation of the Blended Wing Body Aircraft. The Athena Vortex Lattice code developed at the Massachusetts Institute of Technology allows for the aerodynamic analysis of aircraft using the vortex lattice method. Ordinarily, the Athena Vortex Lattice operation requires a text file containing the aircraft geometry to be loaded into the AVL solver in order to determine the aerodynamic forces and moments. However, automated operation will be required to enable integration into a multidisciplinary optimisation framework. Automated AVL operation within the JAVA design environment will nonetheless require a modification and recompilation of AVL source code into an executable file capable of running on windows and other platforms without the –X11 libraries. This paper describes the procedure for the integrating the FORTRAN written AVL software for automated operation within the multivariate design synthesis optimisation framework for the conceptual design of the BWB aircraft.

Keywords: aerodynamics, automation, optimisation, AVL, JNI

Procedia PDF Downloads 565
162 Students’ Assessment of Teachers’ Attitude in Universities in Ondo State, Nigeria

Authors: Omoniyi A. Olubunmi, Omoniyi Olayide M.

Abstract:

This study was designed to assess the attitudes of Nigerian university teachers by their students in terms of teachers’ attitude to work, teaching and students. The study was a survey, and made use of the researcher’s designed questionnaire tagged Students’ Assessment Teachers Inventory (SATI), comprising 20 items, was used to collect data. The respondents were 300 students which were randomly selected from three universities in Ondo State. The SATI elicited information on different aspects of teachers’ attitude to work, teaching and students. The study was guided by two hypotheses. Data collected were analyzed using Pearson-r. The result showed that there was a significant relationship between teachers’ attitude to work (r = 0.343, p<0.01), teaching (r = 0.594, p<0.01) and students (r = 0.487, p<0.01). The study concluded that teachers’ attitudes to teaching profession in higher institutions in Ondo State were not favorable and this could be improved through capacity building for effective pedagogical skills, conducive environment, well equipped libraries and laboratories, and provision of incentives for university teachers.

Keywords: capacity building, pedagogical skills, teachers’ attitude, students’ assessment

Procedia PDF Downloads 292
161 The Relationship between the Use of Social Networks with Executive Functions and Academic Performance in High School Students in Tehran

Authors: Esmail Sadipour

Abstract:

The use of social networks is increasing day by day in all societies. The purpose of this research was to know the relationship between the use of social networks (Instagram, WhatsApp, and Telegram) with executive functions and academic performance in first-year female high school students. This research was applied in terms of purpose, quantitative in terms of data type, and correlational in terms of technique. The population of this research consisted of all female high school students in the first year of district 2 of Tehran. Using Green's formula, the sample size of 150 people was determined and selected by cluster random method. In this way, from all 17 high schools in district 2 of Tehran, 5 high schools were selected by a simple random method and then one class was selected from each high school, and a total of 155 students were selected. To measure the use of social networks, a researcher-made questionnaire was used, the Barclay test (2012) was used for executive functions, and last semester's GPA was used for academic performance. Pearson's correlation coefficient and multivariate regression were used to analyze the data. The results showed that there is a negative relationship between the amount of use of social networks and self-control, self-motivation and time self-management. In other words, the more the use of social networks, the fewer executive functions of students, self-control, self-motivation, and self-management of their time. Also, with the increase in the use of social networks, the academic performance of students has decreased.

Keywords: social networks, executive function, academic performance, working memory

Procedia PDF Downloads 96
160 Omani Community in Digital Age: A Study of Omani Women Using Back Channel Media to Empower Themselves for Frontline Entrepreneurship

Authors: Sangeeta Tripathi, Muna Al Shahri

Abstract:

This research article presents the changing role and status of women in Oman. Transformation of women’s status started with the regime of His Majesty Sultan Qaboos Bin Said in 1970. It is always desired by the Sultan to enable women in all the ways for the balance growth of the country. Forbidding full face veil for women in public offices is one of the best efforts for their empowerment. Women education is also increasing rapidly. They are getting friendly with new information communication technology and using different social media applications such as WhatsApp, Instagram and Facebook for interaction and economic growth. Though there are some traditional and tribal boundaries, women are infused with courage and enjoying fair treatment and equal opportunities in different career positions. The study will try to explore changing mindset of young Omani women towards these traditional tribal boundaries, cultural heritage, business and career: ‘How are young Omani women making balance between work and social prestige?’, ‘How are they preserving their cultural values, embracing new technologies and approaching social network to enhance their economic power.’ This paper will discover their hurdles while using internet for their new entrepreneur. It will also examine the prospects of online business in Oman. The mixed research methodology is applied to find out the result.

Keywords: advertising, business, entrepreneurship, tribal barrier

Procedia PDF Downloads 304
159 A Study of Barriers and Challenges Associated with Agriculture E-commerce in Afghanistan

Authors: Khwaja Bahman Qaderi, Noorullah Rafiqee

Abstract:

Background: With today's increasing Internet users, e-commerce has become a viable model for strengthening relationships between sellers, entrepreneurs, and consumers due to its speed, efficiency, and cost reduction. Agriculture is the economic backbone for 80 percent of the Afghan population. According to MCIT statistics, there are currently around 10 million internet users in Afghanistan. With this data, it was expected that Afghan people should have utilized e-commerce in their agricultural aspects, although it appears to be less used. Objective: This study examines the scope of e-commerce in Afghanistan's agriculture enterprises, how they harness the potential of internet users, and what obstacles they face in implementing e-commerce in their businesses. Method: The study distributed a 39-question questionnaire to agribusinesses in five different zones of Afghanistan. After extracting the responses and excluding the incomplete questionnaires, 280 were included in the analysis step to perform a non-parametric sign test. Result: E-commerce in Afghanistan faces four major political, economic, Internet, and technological obstacles, and no company in the country has implemented e-commerce. In addition, e-commerce is still in its infancy among agricultural companies in the country. Internet use is still primarily limited to email and sharing product images on Facebook & Instagram for advertising purposes. There are no companies that conduct international transactions via the Internet. Conclusion: This study contributes to knowing the challenges and barriers that the agriculture e-commerce faces in Afghanistan to find the effective solutions to use the capacity of internet users in the country and increase the sales rate of agricultural products through the Internet.

Keywords: E-commerce, barriers and challenges, agriculture companies, Afghanistan

Procedia PDF Downloads 89
158 Embedded Test Framework: A Solution Accelerator for Embedded Hardware Testing

Authors: Arjun Kumar Rath, Titus Dhanasingh

Abstract:

Embedded product development requires software to test hardware functionality during development and finding issues during manufacturing in larger quantities. As the components are getting integrated, the devices are tested for their full functionality using advanced software tools. Benchmarking tools are used to measure and compare the performance of product features. At present, these tests are based on a variety of methods involving varying hardware and software platforms. Typically, these tests are custom built for every product and remain unusable for other variants. A majority of the tests goes undocumented, not updated, unusable when the product is released. To bridge this gap, a solution accelerator in the form of a framework can address these issues for running all these tests from one place, using an off-the-shelf tests library in a continuous integration environment. There are many open-source test frameworks or tools (fuego. LAVA, AutoTest, KernelCI, etc.) designed for testing embedded system devices, with each one having several unique good features, but one single tool and framework may not satisfy all of the testing needs for embedded systems, thus an extensible framework with the multitude of tools. Embedded product testing includes board bring-up testing, test during manufacturing, firmware testing, application testing, and assembly testing. Traditional test methods include developing test libraries and support components for every new hardware platform that belongs to the same domain with identical hardware architecture. This approach will have drawbacks like non-reusability where platform-specific libraries cannot be reused, need to maintain source infrastructure for individual hardware platforms, and most importantly, time is taken to re-develop test cases for new hardware platforms. These limitations create challenges like environment set up for testing, scalability, and maintenance. A desirable strategy is certainly one that is focused on maximizing reusability, continuous integration, and leveraging artifacts across the complete development cycle during phases of testing and across family of products. To get over the stated challenges with the conventional method and offers benefits of embedded testing, an embedded test framework (ETF), a solution accelerator, is designed, which can be deployed in embedded system-related products with minimal customizations and maintenance to accelerate the hardware testing. Embedded test framework supports testing different hardwares including microprocessor and microcontroller. It offers benefits such as (1) Time-to-Market: Accelerates board brings up time with prepacked test suites supporting all necessary peripherals which can speed up the design and development stage(board bring up, manufacturing and device driver) (2) Reusability-framework components isolated from the platform-specific HW initialization and configuration makes the adaptability of test cases across various platform quick and simple (3) Effective build and test infrastructure with multiple test interface options and preintegrated with FUEGO framework (4) Continuos integration - pre-integrated with Jenkins which enabled continuous testing and automated software update feature. Applying the embedded test framework accelerator throughout the design and development phase enables to development of the well-tested systems before functional verification and improves time to market to a large extent.

Keywords: board diagnostics software, embedded system, hardware testing, test frameworks

Procedia PDF Downloads 145
157 Integrating the Athena Vortex Lattice Code into a Multivariate Design Synthesis Optimisation Platform in JAVA

Authors: Paul Okonkwo, Howard Smith

Abstract:

This paper describes a methodology to integrate the Athena Vortex Lattice Aerodynamic Software for automated operation in a multivariate optimisation of the Blended Wing Body Aircraft. The Athena Vortex Lattice code developed at the Massachusetts Institute of Technology by Mark Drela allows for the aerodynamic analysis of aircraft using the vortex lattice method. Ordinarily, the Athena Vortex Lattice operation requires a text file containing the aircraft geometry to be loaded into the AVL solver in order to determine the aerodynamic forces and moments. However, automated operation will be required to enable integration into a multidisciplinary optimisation framework. Automated AVL operation within the JAVA design environment will nonetheless require a modification and recompilation of AVL source code into an executable file capable of running on windows and other platforms without the –X11 libraries. This paper describes the procedure for the integrating the FORTRAN written AVL software for automated operation within the multivariate design synthesis optimisation framework for the conceptual design of the BWB aircraft.

Keywords: aerodynamics, automation, optimisation, AVL, JNI

Procedia PDF Downloads 582
156 Using Social Media to Amplify Social Entrepreneurial Message

Authors: Irfan Khairi

Abstract:

It is arguable that today's social media has dramatically redefined human contact, and chiefly because the platforms enable communication opportunities unprecedented. Without question, billions of individuals globally engage in the media, a reality by no means lost on businesses and social entrepreneurs desirous of generating interest in a cause, movement, or other social effort. If, however, the opportunities are immense, so too is the competition. Private persons and entrepreneurial concerns alike virtually saturate the popular sites of Facebook, Twitter, and Instagram, and most are intent on capturing as much external interest as possible. At the same time, however, the social entrepreneur possesses an advantage over the individual concerned only the social aspects of the sites, as they express interests in, and measures applicable to, important causes of which the public at large may be unaware. There is, unfortunately, no single means of assuring success in using the media outlets to generate interest. Nonetheless, a general awareness of how social media sites function, as well as the psychological elements relevant to the functioning, is necessary. It is as important to comprehend basic realities of the platforms and approaches that fail as it is to develop strategy, for the latter relies on knowledge of the former. This awareness in place, the social entrepreneur is then better enabled to determine strategy, in terms of which sites to focus upon and how to most effectively convey their message. What is required is familiarity with the online communities, with attention to the specific advantages each provides. Ultimately, today's social entrepreneur may establish a highly effective platform of promotion and engagement, provided they fully comprehend the social investment necessary for success.

Keywords: social media, marketing, e-commerce, internet business

Procedia PDF Downloads 212
155 MIMIC: A Multi Input Micro-Influencers Classifier

Authors: Simone Leonardi, Luca Ardito

Abstract:

Micro-influencers are effective elements in the marketing strategies of companies and institutions because of their capability to create an hyper-engaged audience around a specific topic of interest. In recent years, many scientific approaches and commercial tools have handled the task of detecting this type of social media users. These strategies adopt solutions ranging from rule based machine learning models to deep neural networks and graph analysis on text, images, and account information. This work compares the existing solutions and proposes an ensemble method to generalize them with different input data and social media platforms. The deployed solution combines deep learning models on unstructured data with statistical machine learning models on structured data. We retrieve both social media accounts information and multimedia posts on Twitter and Instagram. These data are mapped into feature vectors for an eXtreme Gradient Boosting (XGBoost) classifier. Sixty different topics have been analyzed to build a rule based gold standard dataset and to compare the performances of our approach against baseline classifiers. We prove the effectiveness of our work by comparing the accuracy, precision, recall, and f1 score of our model with different configurations and architectures. We obtained an accuracy of 0.91 with our best performing model.

Keywords: deep learning, gradient boosting, image processing, micro-influencers, NLP, social media

Procedia PDF Downloads 183
154 Awareness, Use and Searching Behavior of 'Virtua' Online Public Access Catalog Users

Authors: Saira Soroya, Khalid Mahmood

Abstract:

Library catalogs open the door to the library collection. OPAC (Online Public Access Catalog) are one of the services offered by automated libraries. The present study aims to explore user’s awareness, the level of use and their searching behavior of OPAC with a purpose to give suggestions and ways to improve user-friendly features of library OPAC. The population consisted of OPAC users of Lahore University of Management Sciences (LUMS). Convenient sampling technique was carried out. Total sample size was 100 OPAC users. Quantitative research design, based on survey method used to carry out the study. The data collection instrument was adopted. Data was analyzed using SPSS. Results revealed that a considerable number of users were not aware of OPAC i.e. (30%); however, those who were aware were using basic features of the OPAC. It was found that lack of knowledge was considered the frequent reason for not using all features of OPAC. In this regard, it is strongly recommended that compulsory information literacy programme should be established.

Keywords: catalog, OPAC, library automation, usability study, university library

Procedia PDF Downloads 336
153 Assessment of Digital Literacy Skills of Librarians in Tertiary Institutions Inniger State

Authors: Mustapha Abdulkadir Gana, Jibrin Attahiru Alhassan, Adamu Musa Baba

Abstract:

The exponential growth of information sources, resources and the continued Communication Technology (ICT) sophistication of libraries all over the world call for capable and ICT compliant librarians in Nigeria, this article assesses the digital literacy skills of librarians in tertiary institutions in Niger state. The survey research method was applied in the study using a random sampling technique to draw the sample. Fifty-eight copies of the questionnaire were administered while forty-nine copies were completed, returned, and used in the study, which represents 84% of the response rate. Two research questions were answered, and data were analyzed using Statistical Package for the Social Sciences (SPSS). The finding uncovered that the librarians lack the requisite digital literacy skills to access the wealth of digital information resources available. The study recommends some steps to turn around the situations amongst; librarians must be empowered with all necessary digital literacy skills, embark on rigorous training and retraining programs, workshops, conferences, and seminars, there should also be a coherent training policy for the librarians on a sustainable basis to increase their requisite digital literacy skills.

Keywords: digital, information, literacy, skills

Procedia PDF Downloads 151
152 Patients’ Perspective on Early Discharge with Drain in situ after Breast Cancer Surgery

Authors: Laila Al-Balushi, Suad Al-Kharosui

Abstract:

Due to the increasing number of breast cancer cases in Oman and the impact of the novel coronavirus disease 2019 (COVID-19 on bed situation in the hospital, a policy of early discharge (ED) with drain after breast cancer surgery was initiated at one of the tertiary hospitals in Oman. The uniqueness of this policy is no home visit follow-up, conducted after discharge and the main mode of communication was Instagram media. This policy then was evaluated by conducting a quasi-experimental study using a questionnaire with ten open and closed-ended questions, five questions to explore patient experience using a five-point Likert scale. A total of 41 female patients responded to the questionnaire. Almost 96% of the participants stated being well informed about drain care pre- and post-surgery at home. 9% of the participants developed early sign of infection and was managed at out-patient clinics. Participants with bilateral drains expressed more pain than those with single drain. 90% stated satisfied being discharged with breast drain whereas 10% preferred to stay in the hospital until the drains were removed. This study found that the policy of ED with a drain after BC surgery is practical and well-accepted by most patients. The role of breast nurse and presence of family and institutional support enhanced the success of the policy implementation. To optimize patient care, conducting a training program by breast nurse for nurses at local health centres about care management of patients with drain could improve care and enhance patient satisfaction.

Keywords: breast cancer, surgery, early discharge, surgical drain

Procedia PDF Downloads 95
151 Beyond the Jingoism of “Infodemic” in the Use of Language: Prospects for a Better Nigeria

Authors: Anacletus Ogbunkwu

Abstract:

It is very disheartening that fake news or inaccurate information spread like wide fire and even with greater speed than fact based news/information. The peak of this anomaly is manifest in information management on the Corona virus pandemic, political/leadership based information, ethnic bigotry, unwarranted panics, false alarms, religious fanaticism, and business moguls in their advertorials, comedies, etc. This ugly situation has left Nigeria and her citizens with emotional trauma, unguided agitations, incessant tribal wars, lost of life and property, widened disunity among Nigerian ethnic and religious groups, amplified insecurity, aided election violence, etc. Unfortunately, among the major driving factors to this misinformation and conspiracy are the official/government and private news agencies, gossip, comedians, and social media handles such as; facebook, twitter, whatsapp, instagram, and online news agencies, etc. Thus this paper examines the impact of misinformation here referred to as infodemic. Also, it studies the epistemic effect of misinformation on the citizens of Nigeria in order to find ways of abating this anomaly for a better society. The methods of exposition and hermeneutics will be used in order to gain in-depth study of the details of infodemic in Nigeria and to offer philosophical analysis/interpretation of data as gathered, respectively. This paper concludes that misinformation or fake news has a perilous effect of epistemic mistrust to Nigeria and her citizens; hence infodemic is a cog in the wheel of National progress.

Keywords: nigeria, infodemic, language, media, news, progress

Procedia PDF Downloads 118
150 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 271
149 Social Media Marketing and Blog Usage in Business Schools: An Exploratory Study

Authors: Grzegorz Mazurek, Michal Kucia

Abstract:

The following study of a preliminary character, presents a first step of multifaceted study on the usage of social media in HEIs. It examines a significance, potential, and managerial implications of social media marketing and blogs usage in HEIs – namely in the sphere of business schools. Social media – particularly: blogging and virtual platforms such as Facebook, Twitter or Instagram have been covered at length in publications of both theoretical and practical nature as of late. Still, the amount of information related to the framework of application of social media in HEIs is rather limited. A pre-designed observation matrix has been used to collect primary data found at websites of different HEIs and to include blog observations. Additionally, a pilot study based on on-line questionnaires with marketing officers of HEI schools has been conducted. The main aim of the study was to identify and elaborate on matters like the scope of social media usage (and blogs in particular) in practice, recognition of the functions fulfilled by social media and blogs, or the anticipated potential of social media for HEIs. The study reveals that the majority of business schools highly ranked in Financial Times rankings use social media and interactive functionalities of their web sites, however, mostly for promotional reasons, and they are targeted at new students. The usage of blogs, though, is not so common and in most cases, blogs are independent platforms, not managed but supported by organizations. Managers and specialists point to lack of resources, insufficient users’ engagement and lack of strategic approach to social media as the main reasons of not advancing in the usage of blogs and social media platforms.

Keywords: blogs, social media marketing, higher education institutions, business schools, value co-creation

Procedia PDF Downloads 265
148 Modification of the Athena Vortex Lattice Code for the Multivariate Design Synthesis Optimisation of the Blended Wing Body Aircraft

Authors: Paul Okonkwo, Howard Smith

Abstract:

This paper describes a methodology to integrate the Athena Vortex Lattice Aerodynamic Software for automated operation in a multivariate optimisation of the Blended Wing Body Aircraft. The Athena Vortex Lattice code developed at the Massachusetts Institute of Technology by Mark Drela allows for the aerodynamic analysis of aircraft using the vortex lattice method. Ordinarily, the Athena Vortex Lattice operation requires a text file containing the aircraft geometry to be loaded into the AVL solver in order to determine the aerodynamic forces and moments. However, automated operation will be required to enable integration into a multidisciplinary optimisation framework. Automated AVL operation within the JAVA design environment will nonetheless require a modification and recompilation of AVL source code into an executable file capable of running on windows and other platforms without the –X11 libraries. This paper describes the procedure for the integrating the FORTRAN written AVL software for automated operation within the multivariate design synthesis optimisation framework for the conceptual design of the BWB aircraft.

Keywords: aerodynamics, automation, optimisation, AVL

Procedia PDF Downloads 656
147 Author Self-Archiving in Open Access Institutional Repositories for Awareness Creation in Universities

Authors: Kwame Kodua-Ntim

Abstract:

The study explored the authors self-archiving to create awareness of open-access institutional repositories in universities. The qualitative approach of the study was informed by the interpretive paradigm as well as the case research design. The target population for the study was all twelve (12) open-access institutional repositories managers and administrators purposively selected from the five (5) universities in Ghana. The universities were chosen since they were the only ones listed in the Directory of Open Access Repositories. Interviews were conducted using a semi-structured interview guide and data were analyzed using thematic analysis. The study revealed that academics had some information about self-archiving in open-access institutional repositories and university libraries with open-access institutional repositories were using DSpace software. Managers and administrators of open-access institutional repositories mediated content uploaded and believed that author self-archiving could improve awareness of open-access institutional repositories. The study recommended that universities should fully implement the author’s self-archiving protocol, and academics should be trained to be able to upload research works onto open-access institutional repositories. Furthermore, the university and university library should provide rigorous policies on author self-archiving and incentives for author self-archiving in the open access institutional repositories.

Keywords: author, awareness, institutional repositories, open access, open archive, self-archiving

Procedia PDF Downloads 87
146 Freedom of Speech and Involvement in Hatred Speech on Social Media Networks

Authors: Sara Chinnasamy, Michelle Gun, M. Adnan Hashim

Abstract:

Federal Constitution guarantees Malaysians the right to free speech and expression; yet hatred speech can be commonly found on social media platforms such as Facebook, Twitter, and Instagram. In Malaysia social media sphere, most hatred speech involves religion, race and politics. Recent cases of racial attacks on social media have created social tensions among Malaysians. Many Malaysians always argue on their rights to freedom of speech. However, there are laws that limit their expression to the public and protecting social media users from being a victim of hate speech. This paper aims to explore the attitude and involvement of Malaysian netizens towards freedom of speech and hatred speech on social media. It also examines the relationship between involvement in hatred speech among Malaysian netizens and attitude towards freedom of speech. For most Malaysians, practicing total freedom of speech in the open is unthinkable. As a result, the best channel to articulate their feelings and opinions liberally is the internet. With the advent of the internet medium, more and more Malaysians are conveying their viewpoints using the various internet channels although sensitivity of the audience is seldom taken into account. Consequently, this situation has led to pockets of social disharmony among the citizens. Although this unhealthy activity is denounced by the authority, netizens are generally of the view that they have the right to write anything they want. Using the quantitative method, survey was conducted among Malaysians aged between 18 and 50 years who are active social media users. Results from the survey reveal that despite a weak relationship level between hatred speech involvement on social media and attitude towards freedom of speech, the association is still considerably significant. As such, it can be safely presumed that hatred speech on social media occurs due to the freedom of speech that exists by way of social media channels.

Keywords: freedom of speech, hatred speech, social media, Malaysia, netizens

Procedia PDF Downloads 457
145 Visualized Flow Patterns around and inside a Two-Sided Wind-Catcher in the Presence of Upstream Structures

Authors: M. Afshin, A. Sohankar, M. Dehghan Manshadi, M. R. Daneshgar, G. R. Dehghan Kamaragi

Abstract:

In this paper, the influence of an upstream structure on the flow pattern within and around the wind-catcher is experimentally investigated by smoke flow visualization techniques. Wind-catchers are an important part of natural ventilation in residential buildings or public places such as shopping centers, libraries, etc. Wind-catchers might be also used in places of high urban densities; hence their potential to provide natural ventilation in this case is dependent on the presence of upstream objects. In this study, the two-sided wind-catcher model was based on a real wind-catcher observed in the city of Yazd, Iran. The present study focuses on the flow patterns inside and outside the isolated two-sided wind-catcher, and on a two-sided wind-catcher in the presence of an upstream structure. The results show that the presence of an upstream structure influences the airflow pattern force and direction. Placing a high upstream object reverses the airflow direction inside the wind-catcher.

Keywords: natural ventilation, smoke flow visualization, two-sided wind-catcher, flow patterns

Procedia PDF Downloads 573
144 Russian, Soviet and Post-Soviet Studies on Ismailism

Authors: Dagikhudo Dagiev

Abstract:

This paper is a thorough contribution to the analysis of Russian, Soviet and post-Soviet scholarship on the study of Ismailism in Central Asia. It focuses on the lengthy development of Russian studies on Ismailism from the Russian colonial domination to the entire period of Soviet rule, down to the collapse of the Soviet Union and the last two decades of post-Soviet history. These studies, conducted along the lines of various disciplines in the span of more than one hundred years, have resulted in a large amount of scholarly contributions. This paper aims at probing the virtues and shortcoming of such scholarship. Particularly, our investigation of the specialised fields in the Russian-Soviet Studies has required laborious researches in Russian and Central Asian libraries, which have enabled us to provide a guide through this literature, assessing its ideological leanings and qualities, institutions and level of scholarship. Despite some shortcomings, due to Marxism and the authoritarian rule of the Communist Party over the socio-religious life of the people and religious communities, Soviet studies have produced many positive insights on Ismailis studies. These captured almost every aspects of the life of the Ismaili community from anthropology to archaeology, ethnography, history, philosophy, ritual practice and, most importantly, collection and preservation of Ismaiili manuscripts, which will be examined and assessed in this study.

Keywords: Central Asian Studies, Ismailism, Russian Studies, Soviet Studies

Procedia PDF Downloads 293
143 The Role of Paper in the Copy Identification of Safavid Era Shahnamehs of Tabriz Doctrine

Authors: Ashrafosadat Mousavi Lar, Elahe Moravej

Abstract:

To investigate and explain the history of each copy, we must refer to its past because it highlights parts of the civilization of people among which this copy has been codified. In this paper, eight Ferdowsi’s Shahnameh of Safavid era of Tabriz doctrine available in Iranian libraries and museums are studied. Undoubtedly, it can be said that Ferdowsi’s Shahnameh is one of the most important books that has been transcribed many times in different eras because it explains the Iranian champions’ prowess and it includes the history of Iran from Pishdadian to Sasanian dynasty. In addition, it has been attractive for governors and artists. The research methodology of this article is based on the analytical-descriptive arguments. The research hypothesis is based on papers used in Shahnameh writing in Safavid era of Tabriz doctrine were mostly Isfahanian papers existed. At that time, Isfahanian paper was unique in terms of quality, clarity, flatness of the sheets, volume, shape, softness and elegance, strength, and smoothness. This paper was mostly used to prepare the courtier and exquisite copies. This shows that the prepared copies in Safavid era of Tabriz doctrine were very important because the artists and people who ordered and were out of the court have ordered Isfahanian paper for writing their books.

Keywords: paper, Shahnameh, Safavid era, Tabriz doctrine

Procedia PDF Downloads 289
142 Represent Light and Shade of Old Beijing: Construction of Historical Picture Display Platform Based on Geographic Information System (GIS)

Authors: Li Niu, Jihong Liang, Lichao Liu, Huidi Chen

Abstract:

With the drawing of ancient palace painter, the layout of Beijing famous architect and the lens under photographers, a series of pictures which described whether emperors or ordinary people, whether gardens or Hutongs, whether historical events or life scenarios has emerged into our society. These precious resources are scattered around and preserved in different places Such as organizations like archives and libraries, along with individuals. The research combined decentralized photographic resources with Geographic Information System (GIS), focusing on the figure, event, time and location of the pictures to map them with geographic information in webpage and to display them productively. In order to meet the demand of reality, we designed a metadata description proposal, which is referred to DC and VRA standards. Another essential procedure is to formulate a four-tier classification system to correspond with the metadata proposals. As for visualization, we used Photo Waterfall and Time Line to display our resources in front end. Last but not the least, leading the Web 2.0 trend, the research developed an artistic, friendly, expandable, universal and user involvement platform to show the historical and culture precipitation of Beijing.

Keywords: historical picture, geographic information system, display platform, four-tier classification system

Procedia PDF Downloads 270
141 Employing QR Code as an Effective Educational Tool for Quick Access to Sources of Kindergarten Concepts

Authors: Ahmed Amin Mousa, M. Abd El-Salam

Abstract:

This study discusses a simple solution for the problem of shortage in learning resources for kindergarten teachers. Occasionally, kindergarten teachers cannot access proper resources by usual search methods as libraries or search engines. Furthermore, these methods require a long time and efforts for preparing. The study is expected to facilitate accessing learning resources. Moreover, it suggests a potential direction for using QR code inside the classroom. The present work proposes that QR code can be used for digitizing kindergarten curriculums and accessing various learning resources. It investigates using QR code for saving information related to the concepts which kindergarten teachers use in the current educational situation. The researchers have established a guide for kindergarten teachers based on the Egyptian official curriculum. The guide provides different learning resources for each scientific and mathematical concept in the curriculum, and each learning resource is represented as a QR code image that contains its URL. Therefore, kindergarten teachers can use smartphone applications for reading QR codes and displaying the related learning resources for students immediately. The guide has been provided to a group of 108 teachers for using inside their classrooms. The results showed that the teachers approved the guide, and gave a good response.

Keywords: kindergarten, child, learning resources, QR code, smart phone, mobile

Procedia PDF Downloads 289
140 Smelling Our Way through Names: Understanding the Potential of Floral Volatiles as Taxonomic Traits in the Fragrant Ginger Genus Hedychium

Authors: Anupama Sekhar, Preeti Saryan, Vinita Gowda

Abstract:

Plants, due to their sedentary lifestyle, have evolved mechanisms to synthesize a huge diversity of complex, specialized chemical metabolites, a majority of them being volatile organic compounds (VOCs). These VOCs are heavily involved in their biotic and abiotic interactions. Since chemical composition could be under the same selection processes as other morphological characters, we test if VOCs can be used to taxonomically distinguish species in the well-studied, fragrant ginger genus -Hedychium (Zingiberaceae). We propose that variations in the volatile profiles are suggestive of adaptation to divergent environments, and their presence could be explained by either phylogenetic conservatism or ecological factors. In this study, we investigate the volatile chemistry within Hedychium, which is endemic to Asian palaeotropics. We used an unsupervised clustering approach which clearly distinguished most taxa, and we used ancestral state reconstruction to estimate phylogenetic signals and chemical trait evolution in the genus. We propose that taxonomically, the chemical composition could aid in species identification, especially in species complexes where taxa are not morphologically distinguishable, and extensive, targeted chemical libraries will help in this effort.

Keywords: chemotaxonomy, dynamic headspace sampling, floral fragrance, floral volatile evolution, gingers, Hedychium

Procedia PDF Downloads 95
139 Herapeutic Modalities for Anorexia Nervosa in Adolescents: A Narrative Review

Authors: Adam Al-Harbi, Chanel Powell, Katelyn Ward

Abstract:

In the age of social media and online body forums, the perception of body image among teenagers is constantly evolving. Growing up in an era of instant comparison facilitated by the internet, adolescents often struggle with self-identity, comparing their lives and bodies to countless others online. This environment has made it easier for them to access information on restrictive diets and fasting, contributing to the unfortunate glamorization of eating disorders. Although beauty standards have existed for centuries, social media amplifies these pressures. Platforms such as Instagram and TikTok have created spaces where teens are constantly exposed to idealized body types and beauty standards. This exposure often leads to harmful comparisons, fostering feelings of inadequacy and negative self-worth. Research indicates that adolescents, especially young girls, are at heightened risk for developing eating disorders like anorexia nervosa as they internalize these unrealistic standards. Anorexia nervosa, which has the highest mortality rate of any psychiatric disorder, is particularly alarming, with one in five anorexia deaths resulting from suicide. Young individuals with anorexia are twelve times more likely to die than their peers without the disorder. This paper aims to summarize the current state of literature comparing cognitive-behavioral therapy (CBT) and family-based therapy (FBT) in reducing morbidity, and mortality, and preventing symptom recurrence among adolescents with anorexia. CBT is a widely used treatment for eating disorders, particularly anorexia nervosa, while FBT is notable for its involvement of family members, which is crucial for developing teens and adolescents.

Keywords: psychology, CBT, FBT, eating disorders, anorexia, therapeutic modalities

Procedia PDF Downloads 19
138 Digitalization of Functional Safety - Increasing Productivity while Reducing Risks

Authors: Michael Scott, Phil Jarrell

Abstract:

Digitalization seems to be everywhere these days. So if one was to digitalize Functional Safety, what would that require: • Ability to directly use data from intelligent P&IDs / process design in a PHA / LOPA • Ability to directly use data from intelligent P&IDs in the SIS Design to support SIL Verification Calculations, SRS, C&Es, Functional Test Plans • Ability to create Unit Operation / SIF Libraries to radically reduce engineering manhours while ensuring consistency and improving quality of SIS designs • Ability to link data directly from a PHA / LOPA to SIS Designs • Ability to leverage reliability models and SRS details from SIS Designs to automatically program the Safety PLC • Ability to leverage SIS Test Plans to automatically create Safety PLC application logic Test Plans for a virtual FAT • Ability to tie real-time data from Process Historians / CMMS to assumptions in the PHA / LOPA and SIS Designs to generate leading indicators on protection layer health • Ability to flag SIS bad actors for proactive corrective actions prior to a near miss or loss of containment event What if I told you all of this was available today? This paper will highlight how the digital revolution has revolutionized the way Safety Instrumented Systems are designed, configured, operated and maintained.

Keywords: IEC 61511, safety instrumented systems, functional safety, digitalization, IIoT

Procedia PDF Downloads 181