Search results for: information and communication technology
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 18378

Search results for: information and communication technology

16158 Overcoming 4-to-1 Decryption Failure of the Rabin Cryptosystem

Authors: Muhammad Rezal Kamel Ariffin, Muhammad Asyraf Asbullah

Abstract:

The square root modulo problem is a known primitive in designing an asymmetric cryptosystem. It was first attempted by Rabin. Decryption failure of the Rabin cryptosystem caused by the 4-to-1 decryption output is overcome efficiently in this work. The proposed scheme to overcome the decryption failure issue (known as the AAβ-cryptosystem) is constructed using a simple mathematical structure, it has low computational requirements and would enable communication devices with low computing power to deploy secure communication procedures efficiently.

Keywords: Rabin cryptosystem, 4-to-1 decryption failure, square root modulo problem, integer factorization problem

Procedia PDF Downloads 449
16157 Robot-Assisted Learning for Communication-Care in Autism Intervention

Authors: Syamimi Shamsuddin, Hanafiah Yussof, Fazah Akhtar Hanapiah, Salina Mohamed, Nur Farah Farhan Jamil, Farhana Wan Yunus

Abstract:

Robot-based intervention for children with autism is an evolving research niche in human-robot interaction (HRI). Recent studies in this area mostly covered the role of robots in the clinical and experimental setting. Our previous work had shown that interaction with a robot pose no adverse effects on the children. Also, the presence of the robot, together with specific modules of interaction was associated with less autistic behavior. Extending this impact on school-going children, interactions that are in-tune with special education lessons are needed. This methodological paper focuses on how a robot can be incorporated in a current learning environment for autistic children. Six interaction scenarios had been designed based on the existing syllabus to teach communication skills, using the Applied Behavior Analysis (ABA) technique as the framework. Development of the robotic experience in class also covers the required set-up involving participation from teachers. The actual research conduct involving autistic children, teachers and robot shall take place in the next phase.

Keywords: autism spectrum disorder, ASD, humanoid robot, communication skills, robot-assisted learning

Procedia PDF Downloads 353
16156 Event Driven Dynamic Clustering and Data Aggregation in Wireless Sensor Network

Authors: Ashok V. Sutagundar, Sunilkumar S. Manvi

Abstract:

Energy, delay and bandwidth are the prime issues of wireless sensor network (WSN). Energy usage optimization and efficient bandwidth utilization are important issues in WSN. Event triggered data aggregation facilitates such optimal tasks for event affected area in WSN. Reliable delivery of the critical information to sink node is also a major challenge of WSN. To tackle these issues, we propose an event driven dynamic clustering and data aggregation scheme for WSN that enhances the life time of the network by minimizing redundant data transmission. The proposed scheme operates as follows: (1) Whenever the event is triggered, event triggered node selects the cluster head. (2) Cluster head gathers data from sensor nodes within the cluster. (3) Cluster head node identifies and classifies the events out of the collected data using Bayesian classifier. (4) Aggregation of data is done using statistical method. (5) Cluster head discovers the paths to the sink node using residual energy, path distance and bandwidth. (6) If the aggregated data is critical, cluster head sends the aggregated data over the multipath for reliable data communication. (7) Otherwise aggregated data is transmitted towards sink node over the single path which is having the more bandwidth and residual energy. The performance of the scheme is validated for various WSN scenarios to evaluate the effectiveness of the proposed approach in terms of aggregation time, cluster formation time and energy consumed for aggregation.

Keywords: wireless sensor network, dynamic clustering, data aggregation, wireless communication

Procedia PDF Downloads 435
16155 Spatial Deictics in Face-to-Face Communication: Findings in Baltic Languages

Authors: Gintare Judzentyte

Abstract:

The present research is aimed to discuss semantics and pragmatics of spatial deictics (deictic adverbs of place and demonstrative pronouns) in the Baltic languages: in spoken Lithuanian and in spoken Latvian. The following objectives have been identified to achieve the aim: 1) to determine the usage of adverbs of place in spoken Lithuanian and Latvian and to verify their meanings in face-to-face communication; 2) to determine the usage of demonstrative pronouns in spoken Lithuanian and Latvian and to verify their meanings in face-to-face communication; 3) to compare the systems between the two spoken languages and to identify the main tendencies. As meanings of demonstratives (adverbs of place and demonstrative pronouns) are context-bound, it is necessary to verify their usage in spontaneous interaction. Besides, deictic gestures play a very important role in face-to-face communication. Therefore, an experimental method is necessary to collect the data. Video material representing spoken Lithuanian and spoken Latvian was recorded by means of the method of a qualitative interview (a semi-structured interview: an empirical research is all about asking right questions). The collected material was transcribed and evaluated taking into account several approaches: 1) physical distance (location of the referent, visual accessibility of the referent); 2) deictic gestures (the combination of language and gesture is especially characteristic of the exophoric use); 3) representation of mental spaces in physical space (a speaker sometimes wishes to mark something that is psychically close as psychologically distant and vice versa). The research of the collected data revealed that in face-to-face communication the participants choose deictic adverbs of place instead of demonstrative pronouns to locate/identify entities in situations where the demonstrative pronouns would be expected in spoken Lithuanian and in spoken Latvian. The analysis showed that visual accessibility of the referent is very important in face-to-face communication, but the main criterion while localizing objects and entities is the need for contrast: lith. čia ‘here’, šis ‘this’, latv. šeit ‘here’, šis ‘this’ usually identify distant entities and are used instead of distal demonstratives (lith. ten ‘there’, tas ‘that’, latv. tur ‘there’, tas ‘that’), because the referred objects/subjects contrast to further entities. Furthermore, the interlocutors in examples from a spontaneously situated interaction usually extend their space and can refer to a ‘distal’ object/subject with a ‘proximal’ demonstrative based on the psychological choice. As the research of the spoken Baltic languages confirmed, the choice of spatial deictics in face-to-face communication is strongly effected by a complex of criteria. Although there are some main tendencies, the exact meaning of spatial deictics in the spoken Baltic languages is revealed and is relevant only in a certain context.

Keywords: Baltic languages, face-to-face communication, pragmatics, semantics, spatial deictics

Procedia PDF Downloads 276
16154 Biomedical Definition Extraction Using Machine Learning with Synonymous Feature

Authors: Jian Qu, Akira Shimazu

Abstract:

OOV (Out Of Vocabulary) terms are terms that cannot be found in many dictionaries. Although it is possible to translate such OOV terms, the translations do not provide any real information for a user. We present an OOV term definition extraction method by using information available from the Internet. We use features such as occurrence of the synonyms and location distances. We apply machine learning method to find the correct definitions for OOV terms. We tested our method on both biomedical type and name type OOV terms, our work outperforms existing work with an accuracy of 86.5%.

Keywords: information retrieval, definition retrieval, OOV (out of vocabulary), biomedical information retrieval

Procedia PDF Downloads 476
16153 Using the Internet of Things to Deal with Ventilators for Minimizing the Direct Contact with COVID-19 Patients

Authors: Mohammed Al-Shalabi

Abstract:

In recent years, the Internet of Things (IoT) has become an important technology for connecting various smart objects in many applications, especially in health monitoring applications. The IoT technology develops healthcare applications from traditional to personalized ones by making the treatment and monitoring of patients easier. Nowadays, especially during the COVID-19 pandemic, the necessity of enhancing healthcare monitoring applications to avoid the spreading of this pandemic is increased. In this paper, a mechanism is proposed to minimize direct contact with COVID-19 patients who need ventilators by using IoT technology. The proposed mechanism saves medical providers from COVID-19 infection and then minimizes the spreading of this disease.

Keywords: internet of things, healthcare monitoring, COVID-19, ventilators, thingspeak, clouds

Procedia PDF Downloads 116
16152 Rethinking News Aggregation to Achieve Depolarization

Authors: Kushagra Khandelwal, Chinmay Anand, Sharmistha Banerjee

Abstract:

This paper presents an approach to news aggregation that is aimed at solving the issues centered on depolarization and manipulation of news information and stories. Largest democracies across the globe face numerous issues related to news democratization. With the advancements in technology and increasing outreach, web has become an important information source which is inclusive of news. Research was focused on the current millennial population consisting of modern day internet users. The study involved literature review, an online survey, an expert interview with a journalist and a focus group discussion with the user groups. The study was aimed at investigating problems associated with the current news system from both the consumer as well as distributor point of view. The research findings helped in producing five key potential opportunity areas which were explored for design intervention. Upon ideation, we identified five design features which include opinion aggregation. Categorized opinions, news tracking, online discussion and ability to take actions that support news democratization.

Keywords: citizen journalism, democratization, depolarized news, napsterization, news aggregation, opinions

Procedia PDF Downloads 199
16151 Using Geographic Information Systems in the Desertification Risk’s Cartography: Case South of the Aurès Region, Algeria

Authors: Benmessaoud Hassen

Abstract:

The sensitivity to the desertification map of the south of Aurès region has been elaborated by the crossing of four thematic layers capable to have an impact on the process of desertification. The following step is inspired of MEDALUS (Mediterranean desertification and land Use), which use qualitative index to define the environment zones sensitive to the desertification. The cartographical information of vegetation, the climate, the soil and the socioeconomic state descended from cartographic data transformed to numerical data then seized on, structured and managed by an algorithm dedicated to a geographical information system. In step with information, each layer makes object of 3 or 4 classes, the geometrical median of the four layers used are leaded to sensitivity classes (ISD) of different mapped environment.

Keywords: information systems, thematic layers, the sensitivity to the desertification map, concept MEDALUS, South of Aurès

Procedia PDF Downloads 409
16150 Media Framing and Agenda-Setting of Hurricane Harvey’s News Coverage: A Content Analysis of The New York Times, The Wall Street Journal, and The Houston Chronicle from 2017 To 2018

Authors: S M Asger Ali, Duane A. Gill

Abstract:

During crisis moments like a natural disaster, people tend to rely on the mass media to get up-to-date information and stay informed. However, when media are covering crisis news, they may lose some objectivity, and rather than providing balanced news coverage, media may become critical towards the government and private sectors for their participation in disaster response and recovery processes. This paper investigated the print media coverage of Hurricane Harvey and utilized data from three newspapers: the New York Times (online), the Wall Street Journal (online), and the Houston Chronicle. By examining the media's use of descriptors, quotes, wording, and images, this research explored how media coverage framed government and private sectors for their role in Harvey's response and recovery. Findings revealed that the human-interest frame received the most media attention, and the morality frame received less attention. Regarding tone, this study found that the media's overall tone for government response was neutral. However, the tone for the federal government was slightly negative, while the tone for city and state level of government was slightly positive. By examining the media's tone and frame, this research contributes to the literature on risk communication, mass media, and disaster studies.

Keywords: hurricane Harvey, mass media, risk communication, disaster response, media framing, crisis news coverage

Procedia PDF Downloads 180
16149 Project Based Learning in Language Lab: An Analysis in ESP Learning Context

Authors: S. Priya

Abstract:

A project based learning assignment in English for Specific Purposes (ESP) context based on Communicative English as prescribed in the university syllabus for engineering students and its learning outcome from ESP context is the focus of analysis through this paper. The task based on Project Based Learning (PBL) was conducted in the digital language lab which had audio visual aids to support the team presentation. The total strength of 48 students of Mechanical Branch were divided into 6 groups, each consisting of 8 students. The group members were selected on random numbering basis. They were given a group task to represent a power point presentation on a topic related to their core branch. They had to discuss the issue and choose their topic and represent in a given format. It provided the individual role of each member in the presentation. A brief overview of the project and the outcome of its technical aspects were also had to be included. Each group had to highlight the contributions of that innovative technology through their presentation. The power point should be provided in a CD format. The variations in the choice of subjects, their usage of digital technologies, co-ordination for competition, learning experience of first time stage presentation, challenges of team cohesiveness were some criteria observed as their learning experience. For many other students undergoing the stages of planning, preparation and practice as steps for presentation had been the learning outcomes as given through their feedback form. The evaluation pattern is distributed for individual contribution and group effectiveness which promotes quality of presentation. The evaluated skills are communication skills, group cohesiveness, and audience response, quality of technicality and usage of technical terms. This paper thus analyses how project based learning improves the communication, life skills and technical skills in English for Specific learning context through PBL.

Keywords: language lab, ESP context, communicative skills, life skills

Procedia PDF Downloads 231
16148 Exploring the Activity Fabric of an Intelligent Environment with Hierarchical Hidden Markov Theory

Authors: Chiung-Hui Chen

Abstract:

The Internet of Things (IoT) was designed for widespread convenience. With the smart tag and the sensing network, a large quantity of dynamic information is immediately presented in the IoT. Through the internal communication and interaction, meaningful objects provide real-time services for users. Therefore, the service with appropriate decision-making has become an essential issue. Based on the science of human behavior, this study employed the environment model to record the time sequences and locations of different behaviors and adopted the probability module of the hierarchical Hidden Markov Model for the inference. The statistical analysis was conducted to achieve the following objectives: First, define user behaviors and predict the user behavior routes with the environment model to analyze user purposes. Second, construct the hierarchical Hidden Markov Model according to the logic framework, and establish the sequential intensity among behaviors to get acquainted with the use and activity fabric of the intelligent environment. Third, establish the intensity of the relation between the probability of objects’ being used and the objects. The indicator can describe the possible limitations of the mechanism. As the process is recorded in the information of the system created in this study, these data can be reused to adjust the procedure of intelligent design services.

Keywords: behavior, big data, hierarchical hidden Markov model, intelligent object

Procedia PDF Downloads 221
16147 Social Change and Cultural Sustainability in the Wake of Digital Media Revolution in South Asia

Authors: Binod C. Agrawal

Abstract:

In modern history, industrial and media merchandising in South Asia from East Asia, Europe, United States and other countries of the West is over 200 years old. Hence, continued external technology and media exposure is not a new experience in multi-lingual and multi religious South Asia which evolved cultural means to withstand structural change. In the post-World War II phase, media exposure especially of telecommunication, film, Internet, radio, print media and television have increased manifold. South Asia did not lose any time in acquiring and adopting digital media accelerated by chip revolution, computer and satellite communication. The penetration of digital media and utilization are exceptionally high though the spread has an unequal intensity, use and effects. The author argues that industrial and media products are “cultural products” apart from being “technological products”; hence their influences are most felt in the cultural domain which may lead to blunting of unique cultural specifics in the multi-cultural, multi-lingual and multi religious South Asia. Social scientists, political leaders and parents have voiced concern of “Cultural domination”, “Digital media colonization” and “Westernization”. Increased digital media access has also opened up doors of pornography and other harmful information that have sparked fresh debates and discussions about serious negative, harmful, and undesirable social effects especially among youth. Within ‘techno-social’ perspective, based on recent research studies, the paper aims to describe and analyse possible socio-economic change due to digital media penetration. Further, analysis supports the view that the ancient multi-lingual and multi-religious cultures of South Asia due to inner cultural strength may sustain without setting in a process of irreversible structural changes in South Asia.

Keywords: cultural sustainability, digital media effects, digital media impact in South Asia, social change in South Asia

Procedia PDF Downloads 338
16146 Mobile Cloud Application in Design Build Bridge Construction

Authors: Meng Sun, Bin Wei

Abstract:

In the past decades, design-build has become a more popular project delivery system especially for the large scaled infrastructure project in North America. It provides a one-stop shopping system for the client therefore improves the efficiency of construction, and reduces the risks and overall cost for the clients. Compared to the project with traditional delivery method, design-build project requires contractor and designer to work together efficiently to deliver the best-value solutions through the construction process. How to facilitate a solid integration and efficient interaction between contractor and designer often affects the schedule, budget and quality of the construction therefore becomes a key factor to the success of a design-build project. This paper presents a concept of using modern mobile cloud technology to provide an integrated solution during the design-build construction. It uses mobile cloud architecture to provide a platform for real-time field progress, change request approval, job progress log, and project time entry with devices integration for field information and communications. The paper uses a real filed change notice as an example to demonstrate how mobile cloud technology applies in a design-build project and how it can improve the project efficiency.

Keywords: cloud, design-build, field change notice, mobile application

Procedia PDF Downloads 236
16145 Improving Low English Oral Skills of 5 Second-Year English Major Students at Debark University

Authors: Belyihun Muchie

Abstract:

This study investigates the low English oral communication skills of 5 second-year English major students at Debark University. It aims to identify the key factors contributing to their weaknesses and propose effective interventions to improve their spoken English proficiency. Mixed-methods research will be employed, utilizing observations, questionnaires, and semi-structured interviews to gather data from the participants. To clearly identify these factors, structured and informal observations will be employed; the former will be used to identify their fluency, pronunciation, vocabulary use, and grammar accuracy, and the later will be suited to observe the natural interactions and communication patterns of learners in the classroom setting. The questionnaires will assess their self-perceptions of their skills, perceived barriers to fluency, and preferred learning styles. Interviews will also delve deeper into their experiences and explore specific obstacles faced in oral communication. Data analysis will involve both quantitative and qualitative responses. The structured observation and questionnaire will be analyzed quantitatively, whereas the informal observation and interview transcripts will be analyzed thematically. Findings will be used to identify the major causes of low oral communication skills, such as limited vocabulary, grammatical errors, pronunciation difficulties, or lack of confidence. They are also helpful to develop targeted solutions addressing these causes, such as intensive pronunciation practice, conversation simulations, personalized feedback, or anxiety-reduction techniques. Finally, the findings will guide designing an intervention plan for implementation during the action research phase. The study's outcomes are expected to provide valuable insights into the challenges faced by English major students in developing oral communication skills, contribute to the development of evidence-based interventions for improving spoken English proficiency in similar contexts, and offer practical recommendations for English language instructors and curriculum developers to enhance student learning outcomes. By addressing the specific needs of these students and implementing tailored interventions, this research aims to bridge the gap between theoretical knowledge and practical speaking ability, equipping them with the confidence and skills to flourish in English communication settings.

Keywords: oral communication skills, mixed-methods, evidence-based interventions, spoken English proficiency

Procedia PDF Downloads 38
16144 An Eco-Translatology Approach to the Translation of Spanish Tourism Advertising in Digital Communication in Chinese

Authors: Mingshu Liu, Laura Santamaria, Xavier Carmaniu Mainadé

Abstract:

As one of the sectors most affected by the COVID-19 pandemic, tourism is facing challenges in revitalizing the industry. But at the same time, it would be a good opportunity to take advantage of digital communication as an effective tool for tourism promotion. Our proposal aims to verify the linguistic operations on online platforms in China. The research is carried out based on the theory of Eco-traductology put forward by Gengshen Hu, whose contribution focuses on the translator's adaptation to the ecosystem environment and the three elaborated parameters (linguistic, cultural and communicative). We also relate it to Even-Zohar's and Toury's theoretical postulates on the Polysystem to elaborate on interdisciplinary methodology. Such a methodology allows us to analyze personal treatments and phraseology in the target text. As for the corpus, we adopt the official Spanish-language website of Turismo de España as the source text and the postings on the two major social networks in China, Weibo and Wechat, in 2019. Through qualitative analysis, we conclude that, in the tourism advertising campaign on Chinese social networks, chengyu (Chinese phraseology) and honorific titles are used very frequently.

Keywords: digital communication, eco-traductology, polysystem theory, tourism advertising

Procedia PDF Downloads 215
16143 Comparison of Blockchain Ecosystem for Identity Management

Authors: K. S. Suganya, R. Nedunchezhian

Abstract:

In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management.

Keywords: blockchain, consensus protocols, bitcoin, identity theft, digital identity management, pandemic, COVID-19, self-sovereign identity

Procedia PDF Downloads 112
16142 Historical Geography of Lykaonia Region

Authors: Asuman Baldiran, Erdener Pehlivan

Abstract:

In this study, the root of the name Lykaonia and the geographical area defined as Lykaonia Region are mentioned. In this context, information concerning the settlements of Paleolithic Age, Neolithic Age and Chalcolithic Age are given place. Particularly the settlements belonging to Classical Age are localized and brief information about the history of these settlements is provided. In the light of this information, roads of Antique period in the region are evaluated.

Keywords: ancient cities, central anatolia, historical geography, Lykaonia region

Procedia PDF Downloads 368
16141 Examining the Usefulness of an ESP Textbook for Information Technology: Learner Perspectives

Authors: Yun-Husan Huang

Abstract:

Many English for Specific Purposes (ESP) textbooks are distributed globally as the content development is often obliged to compromises between commercial and pedagogical demands. Therefore, the issue of regional application and usefulness of globally published ESP textbooks has received much debate. For ESP instructors, textbook selection is definitely a priority consideration for curriculum design. An appropriate ESP textbook can facilitate teaching and learning, while an inappropriate one may cause a disaster for both teachers and students. This study aims to investigate the regional application and usefulness of an ESP textbook for information technology (IT). Participants were 51 sophomores majoring in Applied Informatics and Multimedia at a university in Taiwan. As they were non-English majors, their English proficiency was mostly at elementary and elementary-to-intermediate levels. This course was offered for two semesters. The textbook selected was Oxford English for Information Technology. At class end, the students were required to complete a survey comprising five choices of Very Easy, Easy, Neutral, Difficult, and Very Difficult for each item. Based on the content design of the textbook, the survey investigated how the students viewed the difficulty of grammar, listening, speaking, reading, and writing materials of the textbook. In terms of difficulty, results reveal that only 22% of them found the grammar section difficult and very difficult. For listening, 71% responded difficult and very difficult. For general reading, 55% responded difficult and very difficult. For speaking, 56% responded difficult and very difficult. For writing, 78% responded difficult and very difficult. For advanced reading, 90% reported difficult and very difficult. These results indicate that, except the grammar section, more than half of the students found the textbook contents difficult in terms of listening, speaking, reading, and writing materials. Such contradictory results between the easy grammar section and the difficult four language skills sections imply that the textbook designers do not well understand the English learning background of regional ESP learners. For the participants, the learning contents of the grammar section were the general grammar level of junior high school, while the learning contents of the four language skills sections were more of the levels of college English majors. Implications from the findings are obtained for instructors and textbook designers. First of all, existing ESP textbooks for IT are few and thus textbook selections for instructors are insufficient. Second, existing globally published textbooks for IT cannot be applied to learners of all English proficiency levels, especially the low level. With limited textbook selections, third, instructors should modify the selected textbook contents or supplement extra ESP materials to meet the proficiency level of target learners. Fourth, local ESP publishers should collaborate with local ESP instructors who understand best the learning background of their students in order to develop appropriate ESP textbooks for local learners. Even though the instructor reduced learning contents and simplified tests in curriculum design, in conclusion, the students still found difficult. This implies that in addition to the instructor’s professional experience, there is a need to understand the usefulness of the textbook from learner perspectives.

Keywords: ESP textbooks, ESP materials, ESP textbook design, learner perspectives on ESP textbooks

Procedia PDF Downloads 331
16140 The Impact of Intercultural Communicative Competence on the Academic Achievement of English Language Learners: Students Working in the Sector of Tourism in Jordan (Petra and Jerash) as a Case Study

Authors: Haneen Alrawashdeh, Naciye Kunt

Abstract:

Intercultural communicative competence or (ICC), is an extension of communicative competence that takes into account the intercultural aspect of learning a foreign language. Accordingly, this study aimed at investigating the intercultural interaction impact on English as a foreign language learners' academic achievement of language as a scholastic subject and their motivation towards learning it. To achieve the aim of the study, a qualitative research approach was implemented by means of semi-structured interviews. Interview sessions were conducted with eight teachers of English as well as ten English language learners who work in the tourism industry in a variety of career paths, such as selling antiques and traditional costumes. An analysis of learners' grades of English subjects from 2014 to 2019 academic years was performed by using the Open Education Management Information System Database in Jordan to support the findings of the study. The results illustrated that due to the fact that they work in the tourism sector, students gain skills and knowledge that assist them in better academic achievement in the subject of English by practicing intercultural communication with different nationalities on a daily basis; intercultural communication enhances students speaking skills, lexicon, and fluency; however, despite that their grades showed increasing, from teachers perspectives, intercultural communicative competence reduces their linguistic accuracy and ability to perform English academic writing in academic contexts such as exams.

Keywords: intercultural communicative competence, Jordan, language learning motivation, language academic achievement

Procedia PDF Downloads 189
16139 An Analysis of Interactional Metadiscourse Devices in Communication Arts Research Articles

Authors: Woravit Kitjaroenpaiboon, Kanyarat Getkham

Abstract:

This corpus analysis is a quantitative study which intended to investigate the uses of four main interactional metadiscourse devices including fourteen sub-devices in the introduction and the discussion sections of the twenty communication arts research articles taken from Online Journal of Communication and Media technologies by applying ‘AntConc’ software and PASW 18.0. The findings reveal that the three most frequently used devices in the introduction parts are attitudinal marker (adjective), booster (verb), and hedge (modal verb) while the three most frequently found devices in the discussion sections are attitudinal marker (adjective), hedge (modal verb) and booster (verb). There are nine sub-interactional metadiscourse devices among each of which significant difference exist in both introduction and discussion sections. They are attitudinal marker (adverb), attitudinal marker (adjective), booster (verb), booster (adverb), booster (adjective), hedge (modal verb), hedge (lexical verb), hedge (adverb), and hedge (adjective), while another five sub-interactional metadiscourse devices; self-mention, attitudinal marker (verb), attitudinal marker (noun), hedge (noun), and Hedge (phraseology) are found to have has no significant difference between the uses of each device in the introduction and discussion sections. The results also revealed that low and positive relationships exist among thirteen devices. One device which has no relationship with others is attitudinal marker (verb).

Keywords: corpus analysis, interactional metadiscourse devices, communication arts research articles, media technologies

Procedia PDF Downloads 359
16138 Crop Price Variation and Water Saving Technologies in Iran

Authors: Saeed Yazdani, Shahrbanoo Bagheri, Sepideh Nikravesh

Abstract:

Considering the importance and scarcity of water resources, the efficient management of water resources is of great importance. Adoption of modern irrigation technology is considered to be a key of increasing the efficiency of water used in agriculture. Policy makers have implemented several ways to induce the adoption of new irrigation technology. The empirical studies show that farmers are reluctant to utilize the use of new irrigation methods. This study aims to assess factors affecting on farmer’s decision on the application of water saving technologies with emphasize on crop price variation and water sources. A Logit model was employed to examine the impact of different variables on use of water saving technology. The required data gathered from a sample of 204 farmers in the year 2012. The results indicate that different variables such as crop price variability, water supply source, high-value crops, farm size, income, education, membership in cooperatives have a positive effect and variables such as age and number of plots have a negative impact on the probability of adopting modern water saving technologies.

Keywords: irrigation, water, water saving technology, scarcity

Procedia PDF Downloads 210
16137 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 112
16136 The Appropriate Patent System to Promote Economic Growth in Afghanistan

Authors: Mohammad Reza Fooladi

Abstract:

The patent system which fits with industrial and economic situation in the country, by strengthening research and development, technology transfer and increasing foreign investment can provide economic and industrial growth of the countries. However, the extent and manner of support should be commensurate with the country's conditions and comply with significant rules to have a positive effect on research and development, technology transfer and the amount of foreign investment. The present article tries to while reviewing the state of effectiveness of the patent system on economic growth, to illustrate the characteristics of the patent system fits Afghanistan and according to this matter provide the necessary recommendations about the improvement of laws and regulations related to the patent in Afghanistan.

Keywords: patent, economic growth, technology transfer, Afghanistan

Procedia PDF Downloads 393
16135 Optimization for Autonomous Robotic Construction by Visual Guidance through Machine Learning

Authors: Yangzhi Li

Abstract:

Network transfer of information and performance customization is now a viable method of digital industrial production in the era of Industry 4.0. Robot platforms and network platforms have grown more important in digital design and construction. The pressing need for novel building techniques is driven by the growing labor scarcity problem and increased awareness of construction safety. Robotic approaches in construction research are regarded as an extension of operational and production tools. Several technological theories related to robot autonomous recognition, which include high-performance computing, physical system modeling, extensive sensor coordination, and dataset deep learning, have not been explored using intelligent construction. Relevant transdisciplinary theory and practice research still has specific gaps. Optimizing high-performance computing and autonomous recognition visual guidance technologies improves the robot's grasp of the scene and capacity for autonomous operation. Intelligent vision guidance technology for industrial robots has a serious issue with camera calibration, and the use of intelligent visual guiding and identification technologies for industrial robots in industrial production has strict accuracy requirements. It can be considered that visual recognition systems have challenges with precision issues. In such a situation, it will directly impact the effectiveness and standard of industrial production, necessitating a strengthening of the visual guiding study on positioning precision in recognition technology. To best facilitate the handling of complicated components, an approach for the visual recognition of parts utilizing machine learning algorithms is proposed. This study will identify the position of target components by detecting the information at the boundary and corner of a dense point cloud and determining the aspect ratio in accordance with the guidelines for the modularization of building components. To collect and use components, operational processing systems assign them to the same coordinate system based on their locations and postures. The RGB image's inclination detection and the depth image's verification will be used to determine the component's present posture. Finally, a virtual environment model for the robot's obstacle-avoidance route will be constructed using the point cloud information.

Keywords: robotic construction, robotic assembly, visual guidance, machine learning

Procedia PDF Downloads 72
16134 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis

Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim

Abstract:

As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.

Keywords: private information, value, users, perceived risk, online information privacy, attributes

Procedia PDF Downloads 221
16133 An Assessment of the Digital Transformation of Radio

Authors: Fatih Sogut

Abstract:

Developments in information technologies have caused significant changes in terms of radio and television broadcasting. With these changes in terms of production format, transmission techniques and service delivery, the distinction between traditional media and New Media has emerged. The viewer/listener, who was in a passive position before, is now in an active position and has a say in many matters, including content production. Visual and auditory data transfer has diversified and become easier thanks to the convergence phenomenon. These transformations and developments also affected one of the oldest electronic communication tools, radio. In this study, in order to adapt to the new era that emerged with the digital age, the change in radio broadcasting and the factors that led to this change were tried to be explained.

Keywords: Internet, radio broadcasting, digital transformation, Internet broadcasting

Procedia PDF Downloads 159
16132 Information Technology Service Management System Measurement Using ISO20000-1 and ISO15504-8

Authors: Imam Asrowardi, Septafiansyah Dwi Putra, Eko Subyantoro

Abstract:

Process assessments can improve IT service management system (IT SMS) processes but the assessment method is not always transparent. This paper outlines a project to develop a solution- mediated process assessment tool to enable transparent and objective SMS process assessment. Using the international standards for SMS and process assessment, the tool is being developed following the International standard approach in collaboration and evaluate by expert judgment from committee members and ITSM practitioners.

Keywords: SMS, tools evaluation, ITIL, ISO service

Procedia PDF Downloads 463
16131 Evolution of Fashion Design in the Era of High-Tech Culture

Authors: Galina Mihaleva, C. Koh

Abstract:

Fashion, like many other design fields, undergoes numerous evolutions throughout the ages. This paper aims to recognize and evaluate the significance of advance technology in fashion design and examine how it changes the role of modern fashion designers by modifying the creation process. It also touches on how modern culture is involved in such developments and how it affects fashion design in terms of conceptualizing and fabrication. The methodology used is through surveying the various examples of technological applications to fashion design and drawing parallels between what was achievable then and what is achievable now. By comparing case studies, existing fashion design examples and crafting method experimentations; we then spot patterns in which to predict the direction of future developments in the field. A breakdown on the elements of technology in fashion design helps us understand the driving force behind such a trend. The results from explorations in the paper have shown that there is an observed pattern of a distinct increase in interest and progress in the field of fashion technology, which leads to the birth of hybrid crafting methods. In conclusion, it is shown that as fashion technology continues to evolve, their role in clothing crafting becomes more prominent and grows far beyond the humble sewing machine.

Keywords: fashion design, functional aesthetics, smart textiles, 3D printing

Procedia PDF Downloads 390
16130 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 283
16129 Islam and Globalization: Accommodation or Containment of One by the Other

Authors: Mohammed Isah Shehu

Abstract:

This paper examined the context of globalization and Islam and accommodation or containment of one by the other. The paper is born out of the misconception and misunderstanding among many people that globalization is purely Western, anti-Islam and that Islam, globalization and Islam are diametrically opposed as such have no places for accommodating each other. The study used secondary sources to gather data. The study found that from its origin, Islam is in the whole context, a globalized religion and the contemporary globalization is already contained by Islam; that while contemporary globalization is centered on Western world, values and preferences (Western civilization, information and communication technology, free markets, trade and investments); some of the major foundation works that are aiding globalization were originally handiworks of past great Muslims (Islamic civilizations, Order of Algebra, tools of Navigation, Calligraphy, Medicine, Astronomy et cetera) whose major values are not Islamic; with globalization the Muslims have greater opportunities of spreading of Islam and practicing it in a most conducive atmosphere, easy and fast linkage with their fellow Muslim brothers wherever they may be; easier and freer world of trade and have the best opportunities to most things. The study however observed that Western contemporary globalization poses threats to religions such as those of globalization of immorality, injustice, trade with anti-Islamic terms and conditions, internationalized crime et cetera. Muslims would have to avoid or be cautious of many things for Islam is a complete religion that has what is forbidden and allowed (halaal and haramm) based on principles of (Shariah, justice to all, humanity and compassion, obedience to and seeking Allah’s pleasure); to Muslims, Contemporary globalization has to be in conformity with original provisions of Islam. The study recommended that Muslims must rise up in seeking knowledge on Islam and all other fields, further intellectual explorations of works by Muslim scholars/thinkers so that any advancement in globalization would be properly domesticated within Islam for the Muslims to make optimum use of any advancement to the benefit of Islam.

Keywords: accommodation, containment, Islam, globalization

Procedia PDF Downloads 271