Search results for: opinions of users
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3087

Search results for: opinions of users

957 Ethical Concerns in the Internet of Things and Smart Devices: Case Studies and Analysis

Authors: Mitchell Browe, Oriehi Destiny Anyaiwe, Zahraddeen Gwarzo

Abstract:

The Internet of Things (IoT) is a major evolution of technology and of the internet, which has the power to revolutionize the way people live. IoT has the power to change the way people interact with each other and with their homes; It has the ability to give people new ways to interact with and monitor their health; It can alter socioeconomic landscapes by providing new and efficient methods of resource management, saving time and money for both individuals and society as a whole; It even has the potential to save lives through autonomous vehicle technology and smart security measures. Unfortunately, nearly every revolution bears challenges which must be addressed to minimize harm by the new technology upon its adopters. IoT represents an internet technology revolution which has the potential to risk privacy, safety, and security of its users, should devices be developed, implemented, or utilized improperly. This article examines past and current examples of these ethical faults in an attempt to highlight the importance of consumer awareness of potential dangers of these technologies in making informed purchasing and utilization decisions, as well as to reveal how deficiencies and limitations of IoT devices should be better addressed by both companies and by regulatory bodies. Aspects such as consumer trust, corporate transparency, and misuse of individual data are all factors in the implementation of proper ethical boundaries in the IoT.

Keywords: IoT, ethical concerns, privacy, safety, security, smart devices

Procedia PDF Downloads 86
956 Social Technology and Youth Justice: An Exploration of Ethical and Practical Challenges

Authors: Ravinder Barn, Balbir Barn

Abstract:

This paper outlines ethical and practical challenges in the building of social technology for use with socially excluded and marginalised groups. The primary aim of this study was to design, deploy and evaluate social technology that may help to promote better engagement between case workers and young people to help prevent recidivism, and support young people’s transition towards social inclusion in society. A total of 107 practitioners/managers (n=64), and young people (n=43) contributed to the data collection via surveys, focus groups and 1-1 interviews. Through a process of co-design where end-users are involved as key contributors to social technological design, this paper seeks to make an important contribution to the area of participatory methodologies by arguing that whilst giving ‘voice’ to key stakeholders in the research process is crucial, there is a risk that competing voices may lead to tensions and unintended outcomes. The paper is contextualized within a Foucauldian perspective to examine significant concepts including power, authority and surveillance. Implications for youth justice policy and practice are considered. The authors conclude that marginalized youth and over-stretched practitioners are better served when such social technology is perceived and adopted as a tool of empowerment within a framework of child welfare and child rights.

Keywords: youth justice, social technology, marginalization, participatory research, power

Procedia PDF Downloads 448
955 The Impacts of Soft and Hard Enterprise Resource Planning to the Corporate Business Performance through the Enterprise Resource Planning Integrated System

Authors: Sautma Ronni Basana, Zeplin Jiwa Husada Tarigan, Widjojo Suprapto

Abstract:

Companies have already implemented the Enterprise Resource Planning (ERP) system to increase the data integration so that they can improve their business performance. Although some companies have managed to implement the ERP well, they still need to improve gradually so that the ERP functions can be optimized. To obtain a faster and more accurate data, the key users and IT department have to customize the process to suit the needs of the company. In reality, sustaining the ERP technology system requires soft and hard ERP so it enables to improve the business performance of the company. Soft and hard ERP are needed to build a tough system to ensure the integration among departments running smoothly. This research has three questions. First, is the soft ERP bringing impacts to the hard ERP and system integration. Then, is the hard ERP having impacts to the system integration. Finally, is the business performance of the manufacturing companies is affected by the soft ERP, hard ERP, and system integration. The questionnaires are distributed to 100 manufacturing companies in East Java, and are collected from 90 companies which have implemented the ERP, with the response rate of 90%. From the data analysis using PLS program, it is obtained that the soft ERP brings positive impacts to the hard ERP and system integration for the companies. Then, the hard ERP brings also positive impacts to the system integration. Finally, the business process performance of the manufacturing companies is affected by the system integration, soft ERP, and hard ERP simultaneously.

Keywords: soft ERP, hard ERP, system integration, business performance

Procedia PDF Downloads 405
954 Interface between Personal Values and Social Entrepreneurship in Social Projects That Develop Sports Practice

Authors: Leticia Lengler, Jefferson Oliveira, Vania Estivalete, Jordana Marques Kneipp

Abstract:

The context of social, economic and environmental transformations has driven innumerable changes in the organizational environment, influencing the social interactions that occur in this scenario. In this sense, social entrepreneurship emerges as a unique opportunity to challenge, question, rethink certain concepts and traditional theories widely discussed in relation to entrepreneurship. Therefore, the interest in studying personal values has been based on the idea that they might be predictors of the behavior of individuals. As an attempt to relate personal values with the characteristics of social entrepreneurs, this study aims to investigate the salient values and the social entrepreneurship perceptions that occur in two social projects responsible for developing sports skills among the students. For purposes of analysis, it is intended to consider: (i) a description of both Social Projects and their respective institutions, considering their history and relevance in the context; (ii) analysis of the personal values of the idealizers and teachers responsible for the projects, (iii) identification of the characteristics of social entrepreneurship manifested in the two projects, and (iv) discussion of similarities and disparities of the categories identified among the participants of the projects. Therefore, this study will carry a qualitative analysis from the interviews with 10 participants of each social project (named Projeto Remar/ASENA and Projeto Mãos Dadas/JUDÔ SANTA MARIA): 2 projects coordinators, 2 students, 2 parents of students, 2 physical education internships and 2 businessmen who stablished a partnership with each project. The data collection will be done through semi-structured interviews that are going to last around 30 minutes each, being recorded, transcribed and later analyzed, through the categorical analysis. The option for categorical analysis is supported by the fact that it is the best alternative when one wants to study values, opinions, attitudes and beliefs, through qualitative ones. In the present research, the pre-analysis phase consisted of an organization of the material collected during the research with Remar and Mãos Dadas Project, and a dynamic reading of this material, seeking to identify the characteristics of social entrepreneurship and values addressed in the study. In the analytical description phase, a more in-depth analysis of the material collected in the research will be carried out. The third phase, referred to as referential interpretation or treatment of results obtained will allow to verify the homogeneity and the heterogeneity among the participants' perceptions of the projects. Some preliminary results coming from the first interviews revealed the projects are guided by values such as cooperation, respect, well-being and nature preservation. These values are linked to the social entrepreneurship perception of the projects managers, who established their activities in behalf of the local community.

Keywords: personal values, social entrepreneurship, social projects, sports participants

Procedia PDF Downloads 365
953 Integrating Artificial Neural Network and Taguchi Method on Constructing the Real Estate Appraisal Model

Authors: Mu-Yen Chen, Min-Hsuan Fan, Chia-Chen Chen, Siang-Yu Jhong

Abstract:

In recent years, real estate prediction or valuation has been a topic of discussion in many developed countries. Improper hype created by investors leads to fluctuating prices of real estate, affecting many consumers to purchase their own homes. Therefore, scholars from various countries have conducted research in real estate valuation and prediction. With the back-propagation neural network that has been popular in recent years and the orthogonal array in the Taguchi method, this study aimed to find the optimal parameter combination at different levels of orthogonal array after the system presented different parameter combinations, so that the artificial neural network obtained the most accurate results. The experimental results also demonstrated that the method presented in the study had a better result than traditional machine learning. Finally, it also showed that the model proposed in this study had the optimal predictive effect, and could significantly reduce the cost of time in simulation operation. The best predictive results could be found with a fewer number of experiments more efficiently. Thus users could predict a real estate transaction price that is not far from the current actual prices.

Keywords: artificial neural network, Taguchi method, real estate valuation model, investors

Procedia PDF Downloads 489
952 Adult Learners’ Code-Switching in the EFL Classroom: An Analysis of Frequency and Type of Code-Switching

Authors: Elizabeth Patricia Beck

Abstract:

Stepping into various English as foreign language classrooms, one will see some fundamental similarities. There will likely be groups of students working collaboratively, possibly sitting at tables together. They will be using a set coursebook or photocopies of materials developed by publishers or the teacher. The teacher will be carefully monitoring students’ behaviour and progress. The teacher will also likely be insisting that the students only speak English together, possibly having implemented a complex penalty and award systems to encourage this. This is communicative language teaching and it is commonly how foreign languages are taught around the world. Recently, there has been much interest in the codeswitching behaviour of learners in foreign or second language classrooms. It is a significant topic as it relates to second language acquisition theory, language teaching training and policy, and student expectations and classroom practice. Generally in an English as a foreign language context, an ‘English Only’ policy is the norm. This is based on historical factors, socio-political influence and theories surrounding language learning. The trend, however, is shifting and, based on these same factors, a re-examination of language use in the foreign language classroom is taking place. This paper reports the findings of an examination into the codeswitching behaviour of learners with a shared native language in an English classroom. Specifically, it addresses the question of classroom code-switching by adult learners in the EFL classroom during student-to-student, spoken interaction. Three generic categories of code switching are proposed based on published research and classroom practice. Italian adult learners at three levels were observed and patterns of language use were identified, recorded and analysed using the proposed categories. After observations were completed, a questionnaire was distributed to the students focussing on attitudes and opinions around language choice in the EFL classroom, specifically, the usefulness of L1 for specific functions in the classroom. The paper then investigates the relationship between learners’ foreign language proficiency and the frequency and type of code-switching that they engaged in, and the relationship between learners’ attitudes to classroom code-switching and their behaviour. Results show that code switching patterns underwent changes as the students’ level of English language proficiency improved, and that students’ attitudes towards code-switching generally correlated with their behaviour with some exceptions, however. Finally, the discussion focusses on the details of the language produced in observation, possible influencing factors that may affect the frequency and type of code switching that took place, and additional influencing factors that may affect students’ attitudes towards code switching in the foreign language classroom. An evaluation of the limitations of this study is offered and some suggestions are made for future research in this field of study.

Keywords: code-switching, EFL, second language aquisition, adult learners

Procedia PDF Downloads 276
951 Investigation of the Effects of Processing Parameters on Pla Based 3D Printed Tensile Samples

Authors: Saifullah Karimullah

Abstract:

Additive manufacturing techniques are becoming more common with the latest technological advancements. It is composed to bring a revolution in the way products are designed, planned, manufactured, and distributed to end users. Fused deposition modeling (FDM) based 3D printing is one of those promising aspects that have revolutionized the prototyping processes. The purpose of this design and study project is to design a customized laboratory-scale FDM-based 3D printer from locally available sources. The primary goal is to design and fabricate the FDM-based 3D printer. After the fabrication, a tensile test specimen would be designed in Solid Works or [Creo computer-aided design (CAD)] software. A .stl file is generated of the tensile test specimen through slicing software and the G-codes are inserted via a computer for the test specimen to be printed. Different parameters were under studies like printing speed, layer thickness and infill density of the printed object. Some parameters were kept constant such as temperature, extrusion rate, raster orientation etc. Different tensile test specimens were printed for a different sets of parameters of the FDM-based 3d printer. The tensile test specimen were subjected to tensile tests using a universal testing machine (UTM). Design Expert software has been used for analyses, So Different results were obtained from the different tensile test specimens. The best, average and worst specimen were also observed under a compound microscope to investigate the layer bonding in between.

Keywords: additive manufacturing techniques, 3D printing, CAD software, UTM machine

Procedia PDF Downloads 103
950 An Empirical Study of Critical Success Factors for the Adoption of M-Government Services in Tanzania

Authors: Fredrick Ishengoma, Leonard Mselle, Hector Mongi

Abstract:

The growing number of mobile phone subscribers in Tanzania offers the government a new channel for the delivery of information and government services to citizens, thus mobile Government (m-Government). In Tanzania, m-Government services usage is in the early stages, and factors that influence its adoption are yet to be known. This study seeks to identify and understand the critical success factors (CSFs) that influence citizens’ behavioural intention (BI) to adopt m-Government services in Tanzania. The study employed the mobile services acceptance model (MSAM) and extends it with external factors relevant in the Tanzanian context. A survey questionnaire was used to collect primary data from users of m-Government services in Dar es salaam and Dodoma cities, and 253 responses were received. Data were analyzed by IBM-SPSS AMOS 23.0 software using structural equation modeling (SEM). The findings of the study indicate that perceived usefulness, trust, perceived mobility, power distance, quality of service, awareness, perceived cost, personal initiatives, and characteristics significantly influence the BI to adopt m-Government services. However, perceived ease of use was found statistically insignificant to predict BI. Furthermore, the interplay between CSFs, discussion on theoretical and practical implications that follow from the results are presented.

Keywords: adoption, critical success factors, structural equation modeling, m-Government, MSAM, Tanzania

Procedia PDF Downloads 149
949 Differences in Patient Satisfaction Observed between Female Japanese Breast Cancer Patients Who Receive Breast-Conserving Surgery or Total Mastectomy

Authors: Keiko Yamauchi, Motoyuki Nakao, Yoko Ishihara

Abstract:

The increase in the number of women with breast cancer in Japan has required hospitals to provide a higher quality of medicine so that patients are satisfied with the treatment they receive. However, patients’ satisfaction following breast cancer treatment has not been sufficiently studied. Hence, we investigated the factors influencing patient satisfaction following breast cancer treatment among Japanese women. These women underwent either breast-conserving surgery (BCS) (n = 380) or total mastectomy (TM) (n = 247). In March 2016, we conducted a cross-sectional internet survey of Japanese women with breast cancer in Japan. We assessed the following factors: socioeconomic status, cancer-related information, the role of medical decision-making, the degree of satisfaction regarding the treatments received, and the regret arising from the medical decision-making processes. We performed logistic regression analyses with the following dependent variables: extreme satisfaction with the treatments received, and regret regarding the medical decision-making process. For both types of surgery, the odds ratio (OR) of being extremely satisfied with the cancer treatment was significantly higher among patients who did not have any regrets compared to patients who had. Also, the OR tended to be higher among patients who chose to play a wanted role in the medical decision-making process, compared with patients who did not. In the BCS group, the OR of being extremely satisfied with the treatment was higher if, at diagnosis, the patient’s youngest child was older than 19 years, compared with patients with no children. The OR was also higher if patient considered the stage and characteristics of their cancer significant. The OR of being extremely satisfied with the treatments was lower among patients who were not employed on full-time basis, and among patients who considered the second medical opinions and medical expenses to be significant. These associations were not observed in the TM group. The OR of having regrets regarding the medical decision-making process was higher among patients who chose to play a role in the decision-making process as they preferred, and was also higher in patients who were employed on either a part-time or contractual basis. For both types of surgery, the OR was higher among patients who considered a second medical opinion to be significant. Regardless of surgical type, regret regarding the medical decision-making process decreases treatment satisfaction. Patients who received breast-conserving surgery were more likely to have regrets concerning the medical decision-making process if they could not play a role in the process as they preferred. In addition, factors associated with the satisfaction with treatment in BCS group but not TM group included the second medical opinion, medical expenses, employment status, and age of the youngest child at diagnosis.

Keywords: medical decision making, breast-conserving surgery, total mastectomy, Japanese

Procedia PDF Downloads 149
948 An Empirical Analysis on the Evolution Characteristics and Textual Content of Campus Football Policy in China

Authors: Shangjun Zou, Zhiyuan Wang, Songhui You

Abstract:

Introduction In recent years, the Chinese government has issued several policies to promote the institutional reform and innovation of the development of campus football, but many problems have been exposed in the process of policy implementation. Therefore, this paper attempts to conduct an empirical analysis of the campus football policy texts to reveal the dynamic development of the microsystem in the process of policy evolution. Methods The selected policy contents are coded by constructing a two-dimensional analysis framework of campus football policy tool-policy objective. Specifically, the X dimension consists of three oriented policy tools: environment, supply and demand, while the Y dimension is divided into six aspects of policy objectives, including institution, competition, player teaching, coach training, resource guarantee and popularization. And the distribution differences of textual analysis units on X and Y dimensions are tested by using SPSS22.0 so as to evaluate the characteristics and development trend of campus football policy on respective subjects. Results 1) In the policy evolution process of campus football stepping into the 2.0 Era, there were no significant differences in the frequency distribution of policy tools(p=0.582) and policy objectives(p=0.603). The collaborative governance of multiple participants has become the primary trend, and the guiding role of Chinese Football Association has gradually become prominent. 2) There were significant differences in the distribution of policy tools before the evolution at a 95% confidence level(p=0.041). With environmental tools always maintaining the dominant position, the overall synergy of policy tools increased slightly. 3) There were significant differences in the distribution of policy objectives after the evolution at a 90% confidence level(p=0.069). The competition system of policy objective has not received enough attention while the construction of institution and resource guarantee system has been strengthened. Conclusion The upgraded version of campus football should adhere to the education concept of health first, promote the coordinated development of youth cultural learning and football skills, and strive to achieve more solid popularization, more scientific institution, more comprehensive resource guarantee and adequate integration. At the same time, it is necessary to strengthen the collaborative allocation of policy tools and reasonable planning of policy objectives so as to promote the high quality and sustainable development of campus football in the New Era. Endnote The policy texts selected in this paper are “Implementation Opinions on Accelerating the Development of Youth Campus Football” and “Action Plans for the Construction of Eight Systems of National Youth Campus Football”, which were promulgated on August 13, 2015 and September 25, 2020 respectively.

Keywords: campus football, content analysis, evolution characteristics, policy objective, policy tool

Procedia PDF Downloads 190
947 Types of Taboo Expressions in Igbo Society

Authors: Christian Nwaoha

Abstract:

This study investigates taboo expressions and classifications in Igbo discourse, their socio-cultural factors affecting their usage. The study classifies Linguistic taboo expressions by their discourse into five categories: morality-related taboo, veneration-related, decorum-related, religion-related and fear-related taboo expressions. This study argues that while religion-related and decorum-related taboos are unmentioned and have no euphemistic synonyms is because they are closely tied to various Igbo deities and objects, while morality, veneration, and fear-related have permissible alternatives. A descriptive research design was adopted and the data collection was by questionnaire and oral interview. The result of the research proves that aside of the categories of taboos in Igbo, socially, the styles of discourse have some levels of gender, age and class-connected taboos, which for instance, in gender-connected taboos, women in Igbo are forbidden to use style of discourse that are connected with genital organs in social gathering comprising men and women. The same has to do with class-connected where much younger men can use some certain expressions that are taboo, but in much older men gathering such expressions would be tagged forbidden in the context. The study further reveals that there are occasions in which these taboos can be used with reasons. The research concludes that using these taboos in literary text can enhance clear understanding of Igbo taboos to the users and learners of Igbo language.

Keywords: taboo expressions, classifications, Igbo, socio-cultural factors, discourse

Procedia PDF Downloads 231
946 British Female Muslim Converts: An Investigation into Their De-Conversions from Islam

Authors: Mona Alyedreessy

Abstract:

This study, which is based on a qualitative study sample of thirty-four British converts from different ages, ethnicities, social classes, areas and religious backgrounds in London, investigates the common challenges, problems and abuse in the name of Islam that many British female Muslim converts experienced during their time as Muslims, which caused them to leave the faith. It is an important study, as it creates an awareness of the weaknesses found in western Muslim societies and in various Islamic educational programs that causes people to leave Islam and contribute towards its negative reputation in the media. The women in this study shared common problems regarding gender and racial discrimination, identity development, feminism, marriage, parenting, Muslim culture, isolation, extremism, belonging and practising Islam in both Muslim and non-Muslim societies with differing sacrifices and consequences that caused them to de-convert. The study argues that many of the personal, religious and social problems female Muslim converts experience are due to a lack of knowledge about Islam and their rights as Muslim women, which often results in them being vulnerable and influenced by the opinions, attitudes and actions of uneducated, abusive, non-practising and extremist Muslims. For example, it was found that young female converts in particular were often taken advantage of and manipulated into believing that many negative actions displayed by patriarchal Muslim husbands were a part of Islam. This created much confusion, especially when their husbands used specific Quran texts and Hadiths to justify their abuse, authority and attitudes that made them miserable. As a result and based on the positive experiences of some converts, the study found that obtaining a broad Islamic education that started with an intimate study of the Prophet Muhammad’s biography alongside being guided by the teachings of western Muslim scholars contributed greatly towards a more enjoyable conversion journey, as women were able to identify and avoid problematic Muslims and abuse in the name of Islam. This in turn helped to create a healthier family unit and Muslim society. Those who enjoyed being Muslims were able to create a balanced western Muslim identity by negotiating and applying their own morals and western values to their understanding of The Prophet’s biography and The Quran and integrated Islamic values into their own secular western environments that were free from foreign cultural practices. The outcomes of the study also highlight some effective modern approaches to da’wah based on the teachings of The Prophet Mohammad and other prophets for young Arab and Asian Muslims who marry, study and live among non-Muslims and converts.

Keywords: abuse, apostasy, converts, Muslims

Procedia PDF Downloads 232
945 Challenges and Opportunities for M-Government Implementation in Saudi Arabia

Authors: A. Alssbaiheen, S. Love

Abstract:

Mobile government (m-government) is one of the promising technologies for developing the governance of developing countries. While developing countries often have less advanced internet infrastructure compared to the developed world, mobile phone penetration is very high in the Gulf Cooperation Council (GCC) countries and mobile internet use offers a means to transcend traditional logistical barriers to accessing government services. The study explores the challenges and opportunities of the mobile government in Saudi Arabia. Semi-structured interviews were conducted with a diverse cohort of Saudi mobile users. A total of 77 semi-structured interviews were collected and subsequently analysed using open, axial, and selective coding. The participants’ responses revealed that many opportunities exist for the development of m-government in Saudi Arabia, including high popular awareness of government initiatives in e-government, and willingness to use such services, largely due to the time-saving and convenience aspects it offers compared with traditional bureaucratic services. However, numerous barriers were identified, including the low quality and speed of the internet, service customization, and concerns about privacy data security. It was also felt that in addition to infrastructure challenges, the traditional bureaucratic attitude of government department would itself hinder the effective deployment and utilization of m-government services.

Keywords: awareness, barriers, challenges, government services, mobile government, m-government, opportunities

Procedia PDF Downloads 463
944 Increasing the Dialogue in Workplaces Enhances the Age-Friendly Organisational Culture and Helps Employees Face Work-Related Dilemmas

Authors: Heli Makkonen, Eini Hyppönen

Abstract:

The ageing of employees, the availability of workforce, and employees’ engagement in work are today’s challenges in the field of health care and social services, and particularly in the care of older people. Therefore, it is important to enhance both the attractiveness of the work in the field of older people’s care and the retention of employees in the field, and also to pay attention to the length of careers. The length of careers can be affected, for example, by developing an age-friendly organisational culture. Changing the organisational culture in a workplace is, however, a slow process which requires engagement from employees and enhanced dialogue between employees. This article presents an example of age-friendly organisational culture in an older people’s care unit and presents the results of the development of this organisational culture to meet the identified development challenges. In this research-based development process, cycles used in action research were applied. Three workshops were arranged for employees in a service home for older people. The workshops worked as interventions, and the employees and their manager were given several consecutive assignments to be completed between them. In addition to workshops, the employees benchmarked two other service homes. In the workshops, data was collected by observing and documenting the conversations. After that, thematic analysis was used to identify the factors connected to an age-friendly organisational culture. By analysing the data and comparing it to previous studies, some dilemmas we recognised that were hindering or enhancing the attractiveness of work and the retention of employees in this nursing home. After each intervention, the process was reflected and evaluated, and the next steps were planned. The areas of development identified in the study were related to, for example, the flexibility of work, holistic ergonomics, the physical environment at the workplace, and the workplace culture. Some of the areas of development were taken over by the work community and carried out in cooperation with e.g. occupational health care. We encouraged the work community, and the employees provided us with information about their progress. In this research project, the focus was on the development of the workplace culture and, in particular, on the development of the culture of interaction. The workshops showed employees’ attitudes and strong opinions, which can be a challenge from the point of view of the attractiveness of work and the retention of employees in the field. On the other hand, the data revealed that the work community has an interest in developing the dialogue in the work community. Enhancing the dialogue gave the employees the opportunity and resources to face even challenging dilemmas related to the attractiveness of work and the retention of employees in the field. The psychological safety was also enhanced at the same time. The results of this study are part of a broader study that aims at building a model for extending older employees’ careers.

Keywords: age-friendliness, attractiveness of work, dialogue, older people, organisational culture, workplace culture

Procedia PDF Downloads 76
943 Mental Health Representation in Video Games

Authors: Leonid Rybakovski

Abstract:

Contemporary media offer a variety of themes for the diverse tastes of their audiences. The Digital games medium was mostly perceived as an instrument of entertainment. But being a part of global trends while constantly pushing the boundaries of storytelling in virtual reality and standing on the edge of technology also brings huge responsibility for game designers around the globe. A very recent emerging topic over the last years was an individual's mental state. In recent years there has been a shift in mental problems representations in commercial game releases such as Hell blade: Senua's Sacrifice and Sea of Solitude. The aim of this study is to research the approach of mental illness representation in media and digital games over the years and to suggest alternatives for putting characters who suffer from mental illness at the forefront of the storyline. This study traces dominant representations of characters with mental illness in digital games, reflecting the major change of the game industry toward inclusiveness. At the same time, the research embraces a hybrid approach to the academic study of digital games and includes the development of a game that follows a post-traumatic young girl, forcing the users to live her life through her eyes. The game prototype was developed as part of the Mdes Game Design and Development program and consisted of academic research and game development practices.

Keywords: framing analysis, mental condition, up keying, game mechanics

Procedia PDF Downloads 173
942 A Recommender System for Dynamic Selection of Undergraduates' Elective Courses

Authors: Adewale O. Ogunde, Emmanuel O. Ajibade

Abstract:

The task of selecting a few elective courses from a variety of available elective courses has been a difficult one for many students over the years. In many higher institutions, guidance and counselors or level advisers are usually employed to assist the students in picking the right choice of courses. In reality, these counselors and advisers are most times overloaded with too many students to attend to, and sometimes they do not have enough time for the students. Most times, the academic strength of the student based on past results are not considered in the new choice of electives. Recommender systems implement advanced data analysis techniques to help users find the items of their interest by producing a predicted likeliness score or a list of top recommended items for a given active user. Therefore, in this work, a collaborative filtering-based recommender system that will dynamically recommend elective courses to undergraduate students based on their past grades in related courses was developed. This approach employed the use of the k-nearest neighbor algorithm to discover hidden relationships between the related courses passed by students in the past and the currently available elective courses. Real students’ results dataset was used to build and test the recommendation model. The developed system will not only improve the academic performance of students, but it will also help reduce the workload on the level advisers and school counselors.

Keywords: collaborative filtering, elective courses, k-nearest neighbor algorithm, recommender systems

Procedia PDF Downloads 165
941 The Design and Applied of Learning Management System via Social Media on Internet: Case Study of Operating System for Business Subject

Authors: Pimploi Tirastittam, Sawanath Treesathon, Amornrath Ongkawat

Abstract:

Learning Management System (LMS) is the system which uses to manage the learning in order to grouping the content and learning activity between the lecturer and learner including online examination and evaluation. Nowadays, it is the borderless learning era so the learning activities can be accessed from everywhere in the world and also anytime via the information technology and media. The learner can easily access to the knowledge so the different in time and distance is not a constraint for learning anymore. The learning pattern which was used in this research is the integration of the in-class learning and online learning via internet and will be able to monitor the progress by the Learning management system which will create the fast response and accessible learning process via the social media. In order to increase the capability and freedom of the learner, the system can show the current and history of the learning document, video conference and also has the chat room for the learner and lecturer to interact to each other. So the objectives of the “The Design and Applied of Learning Management System via Social Media on Internet: Case Study of Operating System for Business Subject” are to expand the opportunity of learning and to increase the efficiency of learning as well as increase the communication channel between lecturer and student. The data of this research was collect from 30 users of the system which are students who enroll in the subject. And the result of the research is in the “Very Good” which is conformed to the hypothesis.

Keywords: Learning Management System, social media, Operating System, information technology

Procedia PDF Downloads 356
940 Fourier Transform and Machine Learning Techniques for Fault Detection and Diagnosis of Induction Motors

Authors: Duc V. Nguyen

Abstract:

Induction motors are widely used in different industry areas and can experience various kinds of faults in stators and rotors. In general, fault detection and diagnosis techniques for induction motors can be supervised by measuring quantities such as noise, vibration, and temperature. The installation of mechanical sensors in order to assess the health conditions of a machine is typically only done for expensive or load-critical machines, where the high cost of a continuous monitoring system can be Justified. Nevertheless, induced current monitoring can be implemented inexpensively on machines with arbitrary sizes by using current transformers. In this regard, effective and low-cost fault detection techniques can be implemented, hence reducing the maintenance and downtime costs of motors. This work proposes a method for fault detection and diagnosis of induction motors, which combines classical fast Fourier transform and modern/advanced machine learning techniques. The proposed method is validated on real-world data and achieves a precision of 99.7% for fault detection and 100% for fault classification with minimal expert knowledge requirement. In addition, this approach allows users to be able to optimize/balance risks and maintenance costs to achieve the highest bene t based on their requirements. These are the key requirements of a robust prognostics and health management system.

Keywords: fault detection, FFT, induction motor, predictive maintenance

Procedia PDF Downloads 170
939 Energy Efficient Lighting in Educational Buildings through the Example of a High School in Istanbul

Authors: Nihan Gurel Ulusan

Abstract:

It is obvious that electrical energy, which is an inseparable part of modern day’s human and also the most important power source of our age, should be generated on a level that will suffice the nation’s requirements. The electrical energy used for a sustainable architectural design should be reduced as much as possible. Designing the buildings as energy efficient systems which aim at reducing the artificial illumination loads has been a current subject of our times as a result of concepts gaining importance like conscious consumption of energy sources, environment-friendly designs and sustainability. Reducing the consumption of electrical energy regarding the artificial lighting carries great significance, especially in the volumes which are used all day long like the educational buildings. Starting out with such an aim in this paper, the educational buildings are explored in terms of energy efficient lighting. Firstly, illumination techniques, illumination systems, light sources, luminaries, illumination controls and 'efficient energy' usage in lighting are mentioned. In addition, natural and artificial lighting systems used in educational buildings and also the spaces building up these kind buildings are examined in terms of energy efficient lighting. Lastly, the illumination properties of the school sample chosen for this study, Kağıthane Anadolu Lisesi, a typical high school in Istanbul, is observed. Suggestions are made in order to improve the system by evaluating the illumination properties of the classes with the survey carried out with the users.

Keywords: educational buildings, energy efficient, illumination techniques, lighting

Procedia PDF Downloads 282
938 Empowering Certificate Management with Blockchain Technology

Authors: Yash Ambekar, Kapil Vhatkar, Prathamesh Swami, Kartikey Singh, Yashovardhan Kaware

Abstract:

The rise of online courses and certifications has created new opportunities for individuals to enhance their skills. However, this digital transformation has also given rise to coun- terfeit certificates. To address this multifaceted issue, we present a comprehensive certificate management system founded on blockchain technology and strengthened by smart contracts. Our system comprises three pivotal components: certificate generation, authenticity verification, and a user-centric digital locker for certificate storage. Blockchain technology underpins the entire system, ensuring the immutability and integrity of each certificate. The inclusion of a cryptographic hash for each certificate is a fundamental aspect of our design. Any alteration in the certificate’s data will yield a distinct hash, a powerful indicator of potential tampering. Furthermore, our system includes a secure digital locker based on cloud storage that empowers users to efficiently manage and access all their certificates in one place. Moreover, our project is committed to providing features for certificate revocation and updating, thereby enhancing the system’s flexibility and security. Hence, the blockchain and smart contract-based certificate management system offers a robust and one-stop solution to the escalating problem of counterfeit certificates in the digital era.

Keywords: blockchain technology, smart contracts, counterfeit certificates, authenticity verification, cryptographic hash, digital locker

Procedia PDF Downloads 46
937 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories

Authors: Umesh Kumar Singh, Chanchala Joshi

Abstract:

With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.

Keywords: CVSS score, risk level, security measurement, vulnerability category

Procedia PDF Downloads 321
936 Socio-Sensorial Assessment of Nursing Homes in Singapore: Towards Integrated Enabling Design

Authors: Zdravko Trivic, John Chye Fung, Ruzica Bozovic-Stamenovic

Abstract:

Within the context of rapidly ageing population in Singapore and the pressing demands on both caregivers and care providers, an integrated approach to ageing-friendly and ability-sensitive enabling environment becomes an imperative. This particularly applies to nursing home environments and their immediate surroundings, as they are becoming one of the main available options of long-term care for many senior adults who are unable to age at home. Yet, despite the considerable efforts to break the still predominant clinical approach to eldercare and to introduce more home-like design and person-centric care model, nursing homes keep being stigmatised and perceived as not so desirable environments to grow old in. The challenges are further emphasised by the associated physical, sensorial, psychological and cognitive declines that are the common consequences of ageing. Such declines have an immense impact on almost all aspects of older adults’ daily functioning, including problems with mobility and spatial orientation, difficulties in communication, withdrawal from social interaction, higher level of depression and decreased sense of independence and autonomy. However, typical nursing home designs tend to neglect the full capacities of balanced and carefully integrated multisensory stimuli as active component of care and ability building. This paper outlines part of a larger multi-disciplinary study of six nursing homes in Singapore, with overarching objectives to create new models of supportive nursing home environments that go beyond the clinical care model and encourage community integration with the nursing home settings. The paper focuses on the largely neglected aspects of sensorial comfort and multi-sensorial properties of nursing homes, including both indoor and immediate outdoor spaces (boundaries). The objective was to investigate the sensory rhythms and explore their role in nursing home users’ daily routine and therapeutic capacities. Socio-sensory rhythms were captured and analysed through a combination of on-site sensory recordings of “objective” quantitative sensory data (air temperature and humidity, sound level and luminance) using multi-function environment meter, perceived experienced data, spatial mapping, first-person observations of nursing home users’ activity patterns, and interviews. This was done in addition to employment of available assessment tools, such as Wisconsin Person Directed Care assessment tool, Dementia Quality of Life [DQoL] instrument, and Resident Environment Impact Scale [REIS], as these tools address the issues of sensorial experience insufficiently and selectively. Key findings indicate varied levels of sensory comfort, as well as diversity, intensity, and customisation of multi-sensory conditions within different nursing home spaces. Sensory stimulation is typically concentrated in communal living areas of the nursing homes or in the areas that often provide controlled or limited access, including specifically designed sensory rooms and outdoor green spaces (gardens and terraces). Opportunities for sensory stimulation are particularly limited for bed-bound senior residents and within more functional areas, such as corridors. This suggests that the capacities of nursing home designs to provide more diverse and better integrated pleasant sensory conditions as integrated “therapeutic devices” to build nursing home residents’ physical and mental abilities, encourage activity and improve wellbeing are far from exhausted.

Keywords: ageing-supportive environment, enabling design, multi-sensory assessment, nursing home environment

Procedia PDF Downloads 172
935 The Role of Celebrities in the Securitization and Desecuritization of Syrian Migrants on Social Media in Turkiye

Authors: Yelda Yenel, Orkut Acele

Abstract:

This research aims to examine the role of celebrities in the securitization and desecuritization of Syrian migrants in Türkiye on social media platforms. Traditionally, the securitization process has been driven by political actors and mainstream media. However, with the rise of social media, celebrities have emerged as influential actors, contributing to these processes. The topic of Syrian migrants, particularly those arriving in Türkiye after 2011, has sparked national debates, framing them both as a security threat and as a humanitarian issue, thereby dividing public opinion.The primary objective of this study is to analyze celebrities’ discourses about migrants on social media and to explore how these narratives contribute to the processes of securitization (presenting migrants as a threat) and desecuritization (framing migrants within a humanitarian context). This research will focus on social media platforms such as Twitter and Instagram, examining celebrities' posts and analyzing the narratives produced through content and discourse analysis techniques.By investigating how celebrities frame the migrant issue and how these frames resonate with the public, this study seeks to explore the impact of celebrity discourse on the securitization and desecuritization processes. Additionally, it will examine the influence of celebrities on social media users, offering a new perspective on how securitization theory is shaped by the role of celebrities in the digital age.

Keywords: securitization, desecuritization, celebrities, Syrian migrants, social media discourse

Procedia PDF Downloads 20
934 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 133
933 Impact of Advertisement on Audience Retention of YouTube Comedy Skits – The Most Watched Content on YouTube in Lagos, Nigeria

Authors: Igbozuruike Chigozie Jude, Agwu Agwu Ejem

Abstract:

This study investigated that advertisement has an impact on audience retention on YouTube Comedy skits, which is the most watched content on YouTube in Lagos, Nigeria. The main objective was to determine if the advertisements affect the average number of times they spend watching YouTube comedy skits. The study was anchored on Festinger's (1952) cognitive dissonance theory. The research method for this exercise was a survey to get responses from people in Lagos state on how they react to the advertisements they face when watching YouTube comedy skits in Lagos state. The sample size derived from the Krejcie and Morgan (1970) Table was 384 YouTube users. The instrument that was used to gather data was a questionnaire. The findings showed that the adverts have far-reaching exposure by the target audience, but most of the audience perceived them to be intrusive. It was also found that there is not enough evidence to infer that advertisement is indeed impacting audience retention on YouTube comedy skits in Lagos, Nigeria. The reason is that, for a majority of the audience, adverts do not essentially affect their retention on those skits, but for a considerable percentage (34%), these adverts do break their concentration and affect how much time they end up spending on the YouTube comedy skits. It was recommended that, among others, there should be regular monitoring and adaptation of YouTube advertisements to the audience preferences and behaviors of the audience. Insights on changes or trends in audience preferences can be gained through surveys.

Keywords: advertisement, audience, YouTube, comedy skits, Lagos Nigeria

Procedia PDF Downloads 84
932 ADA Tool for Satellite InSAR-Based Ground Displacement Analysis: The Granada Region

Authors: M. Cuevas-González, O. Monserrat, A. Barra, C. Reyes-Carmona, R.M. Mateos, J. P. Galve, R. Sarro, M. Cantalejo, E. Peña, M. Martínez-Corbella, J. A. Luque, J. M. Azañón, A. Millares, M. Béjar, J. A. Navarro, L. Solari

Abstract:

Geohazard prone areas require continuous monitoring to detect risks, understand the phenomena occurring in those regions and prevent disasters. Satellite interferometry (InSAR) has come to be a trustworthy technique for ground movement detection and monitoring in the last few years. InSAR based techniques allow to process large areas providing high number of displacement measurements at low cost. However, the results provided by such techniques are usually not easy to interpret by non-experienced users hampering its use for decision makers. This work presents a set of tools developed in the framework of different projects (Momit, Safety, U-Geohaz, Riskcoast) and an example of their use in the Granada Coastal area (Spain) is shown. The ADA (Active Displacement Areas) tool have been developed with the aim of easing the management, use and interpretation of InSAR based results. It provides a semi-automatic extraction of the most significant ADAs through the application ADAFinder tool. This tool aims to support the exploitation of the European Ground Motion Service (EU-GMS), which will provide consistent, regular and reliable information regarding natural and anthropogenic ground motion phenomena all over Europe.

Keywords: ground displacements, InSAR, natural hazards, satellite imagery

Procedia PDF Downloads 220
931 Robot Control by ERPs of Brain Waves

Authors: K. T. Sun, Y. H. Tai, H. W. Yang, H. T. Lin

Abstract:

This paper presented the technique of robot control by event-related potentials (ERPs) of brain waves. Based on the proposed technique, severe physical disabilities can free browse outside world. A specific component of ERPs, N2P3, was found and used to control the movement of robot and the view of camera on the designed brain-computer interface (BCI). Users only required watching the stimuli of attended button on the BCI, the evoked potentials of brain waves of the target button, N2P3, had the greatest amplitude among all control buttons. An experimental scene had been constructed that the robot required walking to a specific position and move the view of camera to see the instruction of the mission, and then completed the task. Twelve volunteers participated in this experiment, and experimental results showed that the correct rate of BCI control achieved 80% and the average of execution time was 353 seconds for completing the mission. Four main contributions included in this research: (1) find an efficient component of ERPs, N2P3, for BCI control, (2) embed robot's viewpoint image into user interface for robot control, (3) design an experimental scene and conduct the experiment, and (4) evaluate the performance of the proposed system for assessing the practicability.

Keywords: severe physical disabilities, robot control, event-related potentials (ERPs), brain-computer interface (BCI), brain waves

Procedia PDF Downloads 369
930 Automated Testing to Detect Instance Data Loss in Android Applications

Authors: Anusha Konduru, Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

Mobile applications are increasing in a significant amount, each to address the requirements of many users. However, the quick developments and enhancements are resulting in many underlying defects. Android apps create and handle a large variety of 'instance' data that has to persist across runs, such as the current navigation route, workout results, antivirus settings, or game state. Due to the nature of Android, an app can be paused, sent into the background, or killed at any time. If the instance data is not saved and restored between runs, in addition to data loss, partially-saved or corrupted data can crash the app upon resume or restart. However, it is difficult for the programmer to manually test this issue for all the activities. This results in the issue of data loss that the data entered by the user are not saved when there is any interruption. This issue can degrade user experience because the user needs to reenter the information each time there is an interruption. Automated testing to detect such data loss is important to improve the user experience. This research proposes a tool, DroidDL, a data loss detector for Android, which detects the instance data loss from a given android application. We have tested 395 applications and found 12 applications with the issue of data loss. This approach is proved highly accurate and reliable to find the apps with this defect, which can be used by android developers to avoid such errors.

Keywords: Android, automated testing, activity, data loss

Procedia PDF Downloads 237
929 Research Methodology and Mixed Methods (Qualitative and Quantitative) for Ph.D. Construction Management – Post-Disaster Reconstruction

Authors: Samuel Quashie

Abstract:

Ph.D. Construction Management methodology and mixed methods are organized to guide the researcher to assemble and assess data in the research activities. Construction management research is close to business management and social science research. It also contributes to researching the phenomenon and answering the research question, generating an integrated management system for post-disaster reconstruction in construction and related industries. Research methodology and methods drive the research to achieve the goal or goals, contribute to knowledge, or increase knowledge. This statement means the research methodology, mixed methods, aim, objectives, and processes address the research question, facilitate its achievement and foundation to conduct the study. Mixed methods use project-based case studies, interviews, observations, literature and archival document reviews, research questionnaires, and surveys, and evaluation of integrated systems used in the construction industry and related industries to address the research work. The research mixed methods (qualitative, quantitative) define the research topic and establish a more in-depth study. The research methodology is action research, which involves the collaboration of participants and service users to collect and evaluate data, studying the phenomenon, research question(s) to improve the situation in post-disaster reconstruction phase management.

Keywords: methodology, Ph.D. research, post-disaster reconstruction, mixed-methods qualitative and quantitative

Procedia PDF Downloads 231
928 Multi-Scale Control Model for Network Group Behavior

Authors: Fuyuan Ma, Ying Wang, Xin Wang

Abstract:

Social networks have become breeding grounds for the rapid spread of rumors and malicious information, posing threats to societal stability and causing significant public harm. Existing research focuses on simulating the spread of information and its impact on users through propagation dynamics and applies methods such as greedy approximation strategies to approximate the optimal control solution at the global scale. However, the greedy strategy at the global scale may fall into locally optimal solutions, and the approximate simulation of information spread may accumulate more errors. Therefore, we propose a multi-scale control model for network group behavior, introducing individual and group scales on top of the greedy strategy’s global scale. At the individual scale, we calculate the propagation influence of nodes based on their structural attributes to alleviate the issue of local optimality. At the group scale, we conduct precise propagation simulations to avoid introducing cumulative errors from approximate calculations without increasing computational costs. Experimental results on three real-world datasets demonstrate the effectiveness of our proposed multi-scale model in controlling network group behavior.

Keywords: influence blocking maximization, competitive linear threshold model, social networks, network group behavior

Procedia PDF Downloads 21