Search results for: communication graph
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4563

Search results for: communication graph

2313 DAG Design and Tradeoff for Full Live Virtual Machine Migration over XIA Network

Authors: Dalu Zhang, Xiang Jin, Dejiang Zhou, Jianpeng Wang, Haiying Jiang

Abstract:

Traditional TCP/IP network is showing lots of shortages and research for future networks is becoming a hotspot. FIA (Future Internet Architecture) and FIA-NP (Next Phase) are supported by US NSF for future Internet designing. Moreover, virtual machine migration is a significant technique in cloud computing. As a network application, it should also be supported in XIA (expressive Internet Architecture), which is in both FIA and FIA-NP projects. This paper is an experimental study aims at verifying the feasibility of VM migration over XIA. We present three ways to maintain VM connectivity and communication states concerning DAG design and routing table modification. VM migration experiments are conducted intra-AD and inter-AD with KVM instances. The procedure is achieved by a migration control protocol which is suitable for the characters of XIA. Evaluation results show that our solutions can well supports full live VM migration over XIA network respectively, keeping services seamless.

Keywords: DAG, downtime, virtual machine migration, XIA

Procedia PDF Downloads 855
2312 Investigating the Relationship between Job Satisfaction, Role Identity, and Turnover Intention for Nurses in Outpatient Department

Authors: Su Hui Tsai, Weir Sen Lin, Rhay Hung Weng

Abstract:

There are numerous outpatient departments at hospitals with enormous amounts of outpatients. Although the work of outpatient nursing staff does not include the ward, emergency and critical care units that involve patient life-threatening conditions, the work is cumbersome and requires facing and dealing with a large number of outpatients in a short period of time. Therefore, nursing staff often do not feel satisfied with their work and cannot identify with their professional role, leading to intentions to leave their job. Thus, the main purpose of this study is to explore the correlation between the job satisfaction and role identity of nursing staff with turnover intention. This research was conducted using a questionnaire, and the subjects were outpatient nursing staff in three regional hospitals in Southern Taiwan. A total of 175 questionnaires were distributed, and 166 valid questionnaires were returned. After collecting the data, the reliability and validity of the study variables were confirmed by confirmatory factor analysis. The influence of role identity and job satisfaction on nursing staff’s turnover intention was analyzed by descriptive analysis, one-way ANOVA, Pearson correlation analysis and multiple regression analysis. Results showed that 'role identity' had significant differences in different types of marriages. Job satisfaction of 'grasp of environment' had significant differences in different levels of education. Job satisfaction of 'professional growth' and 'shifts and days off' showed significant differences in different types of marriages. 'Role identity' and 'job satisfaction' were negatively correlated with turnover intention respectively. Job satisfaction of 'salary and benefits' and 'grasp of environment' were significant predictors of role identity. The higher the job satisfaction of 'salary and benefits' and 'grasp of environment', the higher the role identity. Job satisfaction of 'patient and family interaction' were significant predictors of turnover intention. The lower the job satisfaction of 'patient and family interaction', the higher the turnover intention. This study found that outpatient nursing staff had the lowest satisfaction towards salary structure. It is recommended that bonuses, promotion opportunities and other incentives be established to increase the role identity of outpatient nursing staff. The results showed that the higher the job satisfaction of 'salary and benefits' and 'grasp of environment', the higher the role identity. It is recommended that regular evaluations be conducted to reward nursing staff with excellent service and invite nursing staff to share their work experiences and thoughts, to enhance nursing staff’s expectation and identification of their occupational role, as well as instilling the concept of organizational service and organizational expectations of emotional display. The results showed that the lower the job satisfaction of 'patient and family interaction', the higher the turnover intention. It is recommended that interpersonal communication and workplace violence prevention educational training courses be organized to enhance the communication and interaction of nursing staff with patients and their families.

Keywords: outpatient, job satisfaction, turnover, intention

Procedia PDF Downloads 146
2311 Studies on Partial Replacement of Cement by Rice Husk Ash under Sodium Phosphate Medium

Authors: Dharmana Pradeep, Chandan Kumar Patnaikuni, N. V. S. Venugopal

Abstract:

Rice Husk Ash (RHA) is a green product contains carbon and also loaded with silica. For the development of durability and strength of any concrete, curing phenomenon shall be very important. In this communication, we reported the exposure of partial replacement of cement with RHA at different percentages of 0%, 5%, 7.5%, 10%, 12.5% and 15% by weight under sodium phosphate curing atmosphere. The mix is designed for M40 grade concrete with the proportions of 1:2.2:3.72. The tests conducted on concrete was a compressive strength, and the specimens were cured in normal water & exposed to the chemical solution for 7, 28 & 56 days. For chemical curing 0.5% & 1% concentrated sodium phosphates were used and were compared with normal concrete strength results. The strength of specimens of 1% sodium phosphate exposure showed that the compressive strength decreased with increase in RHA percentages.

Keywords: rice husk ash, compressive strength, sodium phosphate, curing

Procedia PDF Downloads 345
2310 Smart Unmanned Parking System Based on Radio Frequency Identification Technology

Authors: Yu Qin

Abstract:

In order to tackle the ever-growing problem of the lack of parking space, this paper presents the design and implementation of a smart unmanned parking system that is based on RFID (radio frequency identification) technology and Wireless communication technology. This system uses RFID technology to achieve the identification function (transmitted by 2.4 G wireless module) and is equipped with an STM32L053 micro controller as the main control chip of the smart vehicle. This chip can accomplish automatic parking (in/out), charging and other functions. On this basis, it can also help users easily query the information that is stored in the database through the Internet. Experimental tests have shown that the system has the features of low power consumption and stable operation, among others. It can effectively improve the level of automation control of the parking lot management system and has enormous application prospects.

Keywords: RFID, embedded system, unmanned, parking management

Procedia PDF Downloads 333
2309 Exploitation of Technology by the Tshwane Residence for Tourism Development Purposes

Authors: P. P. S. Sifolo, P. Tladi, J. Maimela

Abstract:

This article investigates technology used by Tshwane residents intended for tourism purposes. The aim is to contribute information to the Tshwane interested parties for planning and management concerning technology within the tourism sector. This study identified the types of tourist related technologies used by the Tshwane residents, be it for business purposes or personal use. The study connected the exploitation of technology for tourism purposes through unpacking the tourism sector as it utilizes technology. Quantitative research methodology was used whereby self-completed questionnaires were chosen as research instruments. The research study carried out a search for knowledge on technology for tourism and the Tshwane residents; however the study revealed that technology has certainly imprinted tourism massively because of its effectiveness and efficiency. Technology has assisted tourism businesses stay abreast of competition with ICT and because of that, SA is on the map as one the economically performing countries in Africa. Moreover, technology and tourism make a meaningful impact on job creation and Gross Domestic Product (GDP).

Keywords: tourism, information and communication technology, Tshwane residents, technology for tourism

Procedia PDF Downloads 391
2308 Improved Performance of Cooperative Scheme in the Cellular and Broadcasting System

Authors: Hyun-Jee Yang, Bit-Na Kwon, Yong-Jun Kim, Hyoung-Kyu Song

Abstract:

In the cooperative transmission scheme, both the cellular system and broadcasting system are composed. Two cellular base stations (CBSs) communicating with a user in the cell edge use cooperative transmission scheme in the conventional scheme. In the case that the distance between two CBSs and the user is distant, the conventional scheme does not guarantee the quality of the communication because the channel condition is bad. Therefore, if the distance between CBSs and a user is distant, the performance of the conventional scheme is decreased. Also, the bad channel condition has bad effects on the performance. The proposed scheme uses two relays to communicate well with CBSs when the channel condition between CBSs and the user is poor. Using the relay in the high attenuation environment can obtain both advantages of the high bit error rate (BER) and throughput performance.

Keywords: cooperative communications, diversity gain, OFDM, interworking system

Procedia PDF Downloads 576
2307 Design and Performance Analysis of Advanced B-Spline Algorithm for Image Resolution Enhancement

Authors: M. Z. Kurian, M. V. Chidananda Murthy, H. S. Guruprasad

Abstract:

An approach to super-resolve the low-resolution (LR) image is presented in this paper which is very useful in multimedia communication, medical image enhancement and satellite image enhancement to have a clear view of the information in the image. The proposed Advanced B-Spline method generates a high-resolution (HR) image from single LR image and tries to retain the higher frequency components such as edges in the image. This method uses B-Spline technique and Crispening. This work is evaluated qualitatively and quantitatively using Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). The method is also suitable for real-time applications. Different combinations of decimation and super-resolution algorithms in the presence of different noise and noise factors are tested.

Keywords: advanced b-spline, image super-resolution, mean square error (MSE), peak signal to noise ratio (PSNR), resolution down converter

Procedia PDF Downloads 399
2306 Existence of Financial Service Authority Prior to 2045

Authors: Syafril Hendrik Hutabarat, Hartiwiningsih, Pujiyono Suwadi

Abstract:

The Financial Service Authority (FSA) was formed as a response to the 1997 monetary crisis and the 2008 financial crisis so that it was more defensive in nature while developments in information and communication technology have required state policies to be more offensive to keep up with times. Reconstruction of Authorities of the FSA's Investigator is intended to keep the agency worthy to be part of an integrated criminal justice system in Indonesia which has implications for expanding its authority in line with efforts to protect and increase the welfare of the people. The results show that internal synergy between sub-sectors in the financial services sector is not optimised, some are even left behind so that the FSA is not truly an authority in the financial services sector. This research method is empirical. The goal of synergy must begin with internal synergy which has its moment when Indonesia gets a demographic bonus in the 2030s and becomes an international logistics hub supported by the national financial services sector.

Keywords: reconstruction, authorities, FSA investigators, synergy, demography

Procedia PDF Downloads 77
2305 Pharmacy Practice Research's Future

Authors: Ragy Raafat Gaber Attaalla

Abstract:

Background: The research begins with a summary of the state of pharmacy practice research, both now and in the future. The concerns that are relevant to practice research are then covered in this research to set the stage. These concerns include shifts in the demography of the population, technological advancements, the institutional function of pharmacies, consumer behavior, and the pharmacy profession itself. It also describes the significant changes in pharmacy practice research, such as interprofessional collaboration and patient teaming, the description and measurement of intervention results, and the cultural diversity of patients. Methods: It would be most frequently employed in the next pharmacy practice research are highlighted in the conclusion. They cover the cultural diversity of patients, documenting and assessing the results of interventions, and interdisciplinary communication and partnership with patients. Results: The rise of large and complicated data sets, the handling of electronic health records, and the use of a wide range of mixed techniques by pharmacy practice researchers are a few potential future methodological obstacles.

Keywords: pharmacy, practice, research, significant changes

Procedia PDF Downloads 3
2304 Establishing Multi-Leveled Computability as a Living-System Evolutionary Context

Authors: Ron Cottam, Nils Langloh, Willy Ranson, Roger Vounckx

Abstract:

We start by formally describing the requirements for environmental-reaction survival computation in a natural temporally-demanding medium, and develop this into a more general model of the evolutionary context as a computational machine. The effect of this development is to replace deterministic logic by a modified form which exhibits a continuous range of dimensional fractal diffuseness between the isolation of perfectly ordered localization and the extended communication associated with nonlocality as represented by pure causal chaos. We investigate the appearance of life and consciousness in the derived general model, and propose a representation of Nature within which all localizations have the character of quasi-quantal entities. We compare our conclusions with Heisenberg’s uncertainty principle and nonlocal teleportation, and maintain that computability is the principal influence on evolution in the model we propose.

Keywords: computability, evolution, life, localization, modeling, nonlocality

Procedia PDF Downloads 399
2303 Cultural Identity and Self-Censorship in Social Media: A Qualitative Case Study

Authors: Nastaran Khoshsabk

Abstract:

The evolution of communication through the Internet has influenced shaping and reshaping the self-presentation of social media users. Online communities both connect people and give voice to the voiceless allowing them to present themselves nationally and globally. People all around the world are experiencing censorship in different aspects of their life. Censorship can be externally imposed because of the political situations, or it can be self-imposed. Social media users choose the content they want to share and decide about the online audiences with whom they want to share this content. Most social media networks, such as Facebook, enable their users to be selective about the shared content and its availability to other people. However, sometimes instead of targeting a specific audience, users self-censor themselves or decide not to share various forms of information. These decisions are of particular importance in countries such as Iran where Internet is not the arena of free self-presentation and people are encouraged to stay away from political participation in the country and acting against the Islamic values. Facebook and some other social media tools are blocked in countries such as Iran. This project investigates the importance of social media in the life of Iranians to explore how they present themselves and construct their digital selves. The notion of cultural identity is applied in this research to explore the educational and informative role of social media in the identity formation and cultural representation of Facebook users. This study explores the self-censorship of Iranian adult Facebook users through their online self-representation and communication on the Internet. The data in this qualitative multiple case study have been collected through individual synchronous online interviews with the researcher’s Facebook friends and through the analysis of the participants’ Facebook profiles and activities over a period of six months. The data is analysed with an emphasis on the identity formation of participants through the recognition of the underlying themes. The exploration of online interviews is on the basis of participants’ personal accounts of self-censorship and cultural understanding through using social media. The driven codes and themes have been categorised considering censorship and place of culture on representation of self. Participants were asked to explain their views about censorship and conservatism through using social media. They reported their thoughts about deciding which content to share on Facebook and which to self-censor and their reasons behind these decisions. The codes and themes have been categorised considering censorship and its role in representation of idealised self. The ‘actual self’ showed to be hidden by an individual for different reasons such as its influence on their social status, academic achievements and job opportunities. It is hoped that this research will have implications for education contexts in countries that are experiencing social media filtering by offering an increased understanding of the importance of online communities; which can provide an educational environment to talk and learn about social taboos and constructing adults’ identity in virtual environment and through cultural self-presentation.

Keywords: cultural identity, identity formation, online communities, self-censorship

Procedia PDF Downloads 237
2302 Voltage Controlled Ring Oscillator for RF Applications in 0.18 µm CMOS Technology

Authors: Mohammad Arif Sobhan Bhuiyan, Zainal Abidin Nordin, Mamun Bin Ibne Reaz

Abstract:

A compact and power efficient high performance Voltage Controlled Oscillator (VCO) is a must in analog and digital circuits especially in the communication system, but the best trade-off among the performance parameters is a challenge for researchers. In this paper, a design of a compact 3-stage differential voltage controlled ring oscillator (VCRO) with low phase noise, low power and higher tuning bandwidth is proposed in 0.18 µm CMOS technology. The VCRO is designed with symmetric load and positive feedback techniques to achieve higher gain and minimum delay. The proposed VCRO can operate at tuning range of 3.9-5.0 GHz at 1.6 V supply voltage. The circuit consumes only 1.0757 mW of power and produces -129 dbc/Hz. The total active area of the proposed VCRO is only 11.74 x 37.73 µm2. Such a VCO can be the best choice for compact and low-power RF applications.

Keywords: CMOS, VCO, VCRO, oscillator

Procedia PDF Downloads 476
2301 The Role of Virtual Group Anonymity in the Generation, Selection, and Refinement of Ideas

Authors: Jonali Baruah, Keesha Green

Abstract:

This experimental study examines the effects of anonymity in video meeting groups across the stages of innovation (idea generation, selection, and refinement) on various measures of creativity. A sample of 92 undergraduate students participated in small groups of three to four members to complete creativity, decision-making, and idea-refinement task in either anonymous or identified conditions. The study followed two anonymity (anonymous and identified) X 3 stages of innovation (idea generation, idea selection, and idea refinement) in a mixed factorial design. Results revealed that the anonymous groups produced ideas of the highest average quality in the refinement phase of innovation. The results of this study enhanced our understanding of the productivity and creativity of groups in computer-mediated communication.

Keywords: creativity, anonymity, idea-generation, idea-refinement, innovation

Procedia PDF Downloads 137
2300 Comparative between Different Methodological Procedures Used to Obtain Information on the First Lexical Development in Bilingual Basque-Spanish Children

Authors: Asier Romero Andonegi, Irati De Pablo Delgado

Abstract:

The objective of this study is to explore the different methodological procedures that are used to obtain information on the early linguistic development of children. To this end, two different methodological procedures were carried out on the same sample: on the one hand, the MacArthur-Bates Communicative Development Inventories, in its adaptations in Spanish and Basque; and on the other hand, longitudinal observation through professional software: ELAN and CHAT. The sample consists of 8 Basque children/ages 16 to 30 months with different mother tongue (L1). The results show the usefulness of inventories in obtaining information on the development of early communication and language skills, but also their limitations mostly focused on the interpretive overvaluation of their children’s lexical development.

Keywords: early language development, language evaluation, lexicon, MacArthur-Bates communicative development inventories

Procedia PDF Downloads 157
2299 Simulation Approach for a Comparison of Linked Cluster Algorithm and Clusterhead Size Algorithm in Ad Hoc Networks

Authors: Ameen Jameel Alawneh

Abstract:

A Mobile ad-hoc network (MANET) is a collection of wireless mobile hosts that dynamically form a temporary network without the aid of a system administrator. It has neither fixed infrastructure nor wireless ad hoc sessions. It inherently reaches several nodes with a single transmission, and each node functions as both a host and a router. The network maybe represented as a set of clusters each managed by clusterhead. The cluster size is not fixed and it depends on the movement of nodes. We proposed a clusterhead size algorithm (CHSize). This clustering algorithm can be used by several routing algorithms for ad hoc networks. An elected clusterhead is assigned for communication with all other clusters. Analysis and simulation of the algorithm has been implemented using GloMoSim networks simulator, MATLAB and MAPL11 proved that the proposed algorithm achieves the goals.

Keywords: simulation, MANET, Ad-hoc, cluster head size, linked cluster algorithm, loss and dropped packets

Procedia PDF Downloads 392
2298 Interplay with Difference and Identification: Alevi and Sunni Intermarriages in Turkey

Authors: Gül Özateşler Ülkücan

Abstract:

This article dwells on the findings of a research project from 2014 to 2017 on intermarriages between people from Alevi and Sunni communities in the city of Izmir, on the western coast of Turkey. The research is composed of 43 individual in-depth interviews with Alevi-Sunni couples (18 couples and 7 individuals, to represent 25 couples in total). It reveals how classifying identities, people's self and group identifications and understanding of difference interplay throughout close interactions of marital experiences. The couples' sense of difference and categorical identifications are built through not only individual interactions but also historical construction of Aleviness and Sunniness, current debates on Islam, political discourses in Turkey, and the representation of locality. The research, thus, contributes to the discussions on the concepts of identity, culture, religion, marriage and communication in the peculiarities of the Turkish context.

Keywords: Aleviness, difference, identifications, intermarriages, Sunniness, Turkey

Procedia PDF Downloads 359
2297 The Impact of Online Advertising on Consumer Purchase Behaviour Based on Malaysian Organizations

Authors: Naser Zourikalatehsamad, Seyed Abdorreza Payambarpour, Ibrahim Alwashali, Zahra Abdolkarimi

Abstract:

The paper aims to evaluate the effect of online advertising on consumer purchase behavior in Malaysian organizations. The paper has potential to extend and refine theory. A survey was distributed among Students of UTM university during the winter 2014 and 160 responses were collected. Regression analysis was used to test the hypothesized relationships of the model. Result shows that the predictors (cost saving factor, convenience factor and customized product or services) have positive impact on intention to continue seeking online advertising.

Keywords: consumer purchase, convenience, customized product, cost saving, customization, flow theory, mass communication, online advertising ads, online advertising measurement, online advertising mechanism, online intelligence system, self-confidence, willingness to purchase

Procedia PDF Downloads 481
2296 The Role of Digital Media in the Change of Saudi Nationalism: A Systematic Review and Meta-Analysis

Authors: Alaa Alshaikh

Abstract:

While digital technologies were initially seen as harbingers of globalisation and cosmopolitanism, scholars increasingly acknowledge their role in the rise of nationalism. This paper studies the national identity in light of the digital media in Saudi Arabia. It offers an extensive meta-analysis of the evolution of the national identity on social media. It examines the national identity and its components and deals with the difference between it and digital nationalism, which is formed and affected by the country's fulfillment of the citizen's needs. Hereto a systematic examination of all 40 articles published between October 2016 and December 2022 was conducted. Findings indicate that three characteristics of contemporary nationalism are partly linked to recent shifts in digital communication: diversification, fragmentation, and commodification. The paper concludes by considering the implications of our arguments for future research in the field.

Keywords: meta analysis, Saudi Arabia, nationalism, social media

Procedia PDF Downloads 131
2295 Biomimetic Adhesive Pads for Precision Manufacturing Robots

Authors: Hoon Yi, Minho Sung, Hangil Ko, Moon Kyu Kwak, Hoon Eui Jeong

Abstract:

Inspired by the remarkable adhesion properties of gecko lizards, bio-inspired dry adhesives with smart adhesion properties have been developed in the last decade. Compared to earlier dry adhesives, the recently developed ones exhibit excellent adhesion strength, smart directional adhesion, and structural robustness. With these unique adhesion properties, bio-inspired dry adhesive pads have strong potential for use in precision industries such as semiconductor or display manufacturing. In this communication, we present a new manufacturing technology based on advanced dry adhesive systems that enable precise manipulation of large-area substrates over repeating cycles without any requirement for external force application. This new manufacturing technique is also highly accurate and environment-friendly, and thus has strong potential as a next-generation clean manufacturing technology.

Keywords: gecko, manufacturing robot, precision manufacturing

Procedia PDF Downloads 505
2294 Design of Broadband W-Slotted Microstrip Patch Antenna

Authors: Neeraj G. Nahata, K. S. Bhagat

Abstract:

Microstrip patch antenna widely used in communication area because it offers low profile, narrow bandwidth, high gain, and compact in size. It has big disadvantage of narrow bandwidth. To improve the bandwidth a W-slot technique is used, it is efficient to enhance the bandwidth of antenna. The feeding point of antenna is very important for efficient operation, so coaxial feeding technique is applied to microstrip patch antenna for impedance matching. A broadband W-slot microstrip patch antenna is designed successfully which attains a bandwidth of 22.74% at 10dB return loss with centre frequency of 4.5GHz and also it attains maximum directivity 8.78dBi. It is designed by cutting a W-slot into the patch of antenna, because of this resonant slot, the antenna gives broad bandwidth. This antenna is best suitable for C-band frequency spectrum. The proposed antenna is designed and simulated using IE3D software.

Keywords: broadband, microstrip antenna, VSWR, W-slotted patch

Procedia PDF Downloads 320
2293 Customers' Attitudes towards Marketing Mix Affecting Purchasing Behavior of Starbucks Coffee (Thailand) Customers in Bangkok

Authors: Polamorn Tamprateep, Warapong Thakanun

Abstract:

This researchs' objectives are: 1. To study the customer demographics that affects the purchasing behavior; 2. To study the marketing mix that affects the purchasing behavior; 3. To study the relationship between purchasing behavior and customers’ perception of Brand Equity. Population of this research is Starbucks Coffee (Thailand) customers in Bangkok. The tool used in this study was questionnaire created from concepts, theories and related researches. The study showed that, of 400 respondents, overall opinion received high score (xˉ= 3.77). When each item is considered, it was found that ‘Staff are knowledgeable in providing service.’, ‘ Staff are friendly.’, ‘Staff possess good communication skill with customers.’, ‘Staff know all types of coffee well.’, and ‘Staff are enthusiastic in giving service.’, all these items received high score with a mean of 3.92, 3.87, 3.77, 3.71 and 3.63, respectively.

Keywords: mix attitude of the product, consumer, buying behavior, Starbucks

Procedia PDF Downloads 264
2292 The Examination of Prospective ICT Teachers’ Attitudes towards Application of Computer Assisted Instruction

Authors: Agâh Tuğrul Korucu, Ismail Fatih Yavuzaslan, Lale Toraman

Abstract:

Nowadays, thanks to development of technology, integration of technology into teaching and learning activities is spreading. Increasing technological literacy which is one of the expected competencies for individuals of 21st century is associated with the effective use of technology in education. The most important factor in effective use of technology in education institutions is ICT teachers. The concept of computer assisted instruction (CAI) refers to the utilization of information and communication technology as a tool aided teachers in order to make education more efficient and improve its quality in the process of educational. Teachers can use computers in different places and times according to owned hardware and software facilities and characteristics of the subject and student in CAI. Analyzing teachers’ use of computers in education is significant because teachers are the ones who manage the course and they are the most important element in comprehending the topic by students. To accomplish computer-assisted instruction efficiently is possible through having positive attitude of teachers. Determination the level of knowledge, attitude and behavior of teachers who get the professional knowledge from educational faculties and elimination of deficiencies if any are crucial when teachers are at the faculty. Therefore, the aim of this paper is to identify ICT teachers' attitudes toward computer-assisted instruction in terms of different variables. Research group consists of 200 prospective ICT teachers studying at Necmettin Erbakan University Ahmet Keleşoğlu Faculty of Education CEIT department. As data collection tool of the study; “personal information form” developed by the researchers and used to collect demographic data and "the attitude scale related to computer-assisted instruction" are used. The scale consists of 20 items. 10 of these items show positive feature, while 10 of them show negative feature. The Kaiser-Meyer-Olkin (KMO) coefficient of the scale is found 0.88 and Barlett test significance value is found 0.000. The Cronbach’s alpha reliability coefficient of the scale is found 0.93. In order to analyze the data collected by data collection tools computer-based statistical software package used; statistical techniques such as descriptive statistics, t-test, and analysis of variance are utilized. It is determined that the attitudes of prospective instructors towards computers do not differ according to their educational branches. On the other hand, the attitudes of prospective instructors who own computers towards computer-supported education are determined higher than those of the prospective instructors who do not own computers. It is established that the departments of students who previously received computer lessons do not affect this situation so much. The result is that; the computer experience affects the attitude point regarding the computer-supported education positively.

Keywords: computer based instruction, teacher candidate, attitude, technology based instruction, information and communication technologies

Procedia PDF Downloads 295
2291 Evolution of Classroom Languaging over the Years: Prospects for Teaching Mathematics Differently

Authors: Jabulani Sibanda, Clemence Chikiwa

Abstract:

This paper traces diverse language practices representative of equally diverse conceptions of language. To be dynamic with languaging practices, one needs to appreciate nuanced languaging practices, their challenges, prospects, and opportunities. The paper presents what we envision as three major conceptions of language that give impetus to diverse language practices. It examines theoretical models of the bilingual mental lexicon and how they inform language practices. The paper explores classroom languaging practices that have been promulgated and experimented with. The paper advocates the deployment of multisensory semiotic systems to complement linguistic classroom communication and the acknowledgement of learners’ linguistic and semiotic resources as valid in the learning enterprise. It recommends the enactment of specific clauses on language in education policies and curriculum documents that empower classroom interactants to exercise discretion in languaging practices.

Keywords: languaging, monolingual, multilingual, semiotic and linguistic repertoire

Procedia PDF Downloads 73
2290 The Content-Based Classroom: Perspectives on Integrating Language and Content

Authors: Mourad Ben Bennani

Abstract:

Views of language and language learning have undergone a tremendous change over the last decades. Language is no longer seen as a set of structured rules. It is rather viewed as a tool of interaction and communication. This shift in views has resulted in change in viewing language learning, which gave birth to various approaches and methodologies of language teaching. Two of these approaches are content-based instruction and content and language integrated learning (CLIL). These are similar approaches which integrate content and foreign/second language learning through various methodologies and models as a result of different implementations around the world. This presentation deals with sociocultural view of CBI and CLIL. It also defines language and content as vital components of CBI and CLIL. Next it reviews the origins of CBI and the continuum perspectives and CLIL definitions and models featured in the literature. Finally it summarizes current aspects around research in program evaluation with a focus on the benefits and challenges of these innovative approaches for second language teaching.

Keywords: CBI, CLIL, CBI continuum, CLIL models

Procedia PDF Downloads 436
2289 Design and Implementation of Active Radio Frequency Identification on Wireless Sensor Network-Based System

Authors: Che Z. Zulkifli, Nursyahida M. Noor, Siti N. Semunab, Shafawati A. Malek

Abstract:

Wireless sensors, also known as wireless sensor nodes, have been making a significant impact on human daily life. The Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two complementary technologies; hence, an integrated implementation of these technologies expands the overall functionality in obtaining long-range and real-time information on the location and properties of objects and people. An approach for integrating ZigBee and RFID networks is proposed in this paper, to create an energy-efficient network improved by the benefits of combining ZigBee and RFID architecture. Furthermore, the compatibility and requirements of the ZigBee device and communication links in the typical RFID system which is presented with the real world experiment on the capabilities of the proposed RFID system.

Keywords: mesh network, RFID, wireless sensor network, zigbee

Procedia PDF Downloads 461
2288 From “Deafness” to “Aphasia”: A Study of Social Retreat of Families With Hearing-Impaired Children. Interviews with 12 Mothers of Hearing-Impaired Children in Beijing

Authors: Yang Jiayue, Liang Junwen

Abstract:

Case interviews with 12 mothers of hearing-impaired children in Beijing found that families with hard-of-hearing children make all-out efforts for rescue and rehabilitation until they exhaust family resources, they travel to work places, homes, and rehabilitation institutions every day, and social relations gradually shrink inward. In the stigmatized social environment, children with hearing impairment find it difficult to integrate into regular communication and gradually return to a silent world; their parents also suffer from social discrimination and affiliate stigma, and they gradually reduce contact with others. Finally, families with hearing-impaired children become invisible people in society; the "deafness" of children leads families to "loss of voice."

Keywords: family with hearing-impaired children, social retreat, social exclusion, stigma

Procedia PDF Downloads 74
2287 Development and Implementation of Early Childhood Media Literacy Education Program

Authors: Kim Haekyoung, Au Yunkyoung

Abstract:

As digital technology continues to advance and become more widely accessible, young children are also growing up experiencing various media from infancy. In this changing environment, educating young children on media literacy has become an increasingly important task. With the diversification of media, it has become more necessary for children to understand, utilize, and critically explore the meaning of multimodal texts, which include text, images, and sounds connected to each other. Early childhood is a period when media literacy can bloom, and educational and policy support are needed to enable young children to express their opinions, communicate, and participate fully. However, most current media literacy education for young children focuses solely on teaching how to use media, with limited practical application and utilization. Therefore, this study aims to develop an inquiry-based media literacy education program for young children using topic-specific media content and explore the program's potential and impact on children's media literacy learning. Based on a theoretical and literature review on media literacy education, analysis of existing educational programs, and a survey on the current status and teacher perception of media literacy education for young children, this study developed a media literacy education program for young children considering the components of media literacy (understanding media characteristics, self-regulation, self-expression, critical understanding, ethical norms, social communication). To verify the effectiveness of the program, it was implemented with 20 five-year-old children from C City S Kindergarten, starting from March 24 to May 26, 2022, once a week for a total of 6 sessions. To explore quantitative changes before and after program implementation, repeated-measures analysis of variance was conducted, and qualitative analysis was used to analyze observed changes in the process. significant improvement in media literacy levels, such as understanding media characteristics, self-regulation, self-expression, critical understanding, ethical norms, and social communication. The developed inquiry-based media literacy education program for young children in this study can be effectively applied to enhance children's media literacy education and help improve their media literacy levels. Observed changes in the process also confirmed that children improved their ability to learn various topics, express their thoughts, and communicate with others using media content. These findings emphasize the importance of developing and implementing media literacy education programs and can help children develop the ability to safely and effectively use media in their media environment. Based on exploring the potential and impact of the inquiry-based media literacy education program for young children, this study confirmed positive changes in children's media literacy levels as a result of the program's implementation. These findings suggest that beyond education on how to use media, it can help develop children's ability to safely and effectively use media in their media environment. Furthermore, to improve children's media literacy levels and create a safe media environment, a variety of content and methodologies are needed, and continuous development and evaluation of educational programs are anticipated.

Keywords: young children, media literacy, media literacy education program, media content

Procedia PDF Downloads 71
2286 Capacity Estimation of Hybrid Automated Repeat Request Protocol for Low Earth Orbit Mega-Constellations

Authors: Arif Armagan Gozutok, Alper Kule, Burak Tos, Selman Demirel

Abstract:

Wireless communication chain requires effective ways to keep throughput efficiency high while it suffers location-dependent, time-varying burst errors. Several techniques are developed in order to assure that the receiver recovers the transmitted information without errors. The most fundamental approaches are error checking and correction besides re-transmission of the non-acknowledged packets. In this paper, stop & wait (SAW) and chase combined (CC) hybrid automated repeat request (HARQ) protocols are compared and analyzed in terms of throughput and average delay for the usage of low earth orbit (LEO) mega-constellations case. Several assumptions and technological implementations are considered as well as usage of low-density parity check (LDPC) codes together with several constellation orbit configurations.

Keywords: HARQ, LEO, satellite constellation, throughput

Procedia PDF Downloads 145
2285 A Formal Verification Approach for Linux Kernel Designing

Authors: Zi Wang, Xinlei He, Jianghua Lv, Yuqing Lan

Abstract:

Kernel though widely used, is complicated. Errors caused by some bugs are often costly. Statically, more than half of the mistakes occur in the design phase. Thus, we introduce a modeling method, KMVM (Linux Kernel Modeling and verification Method), based on type theory for proper designation and correct exploitation of the Kernel. In the model, the Kernel is separated into six levels: subsystem, dentry, file, struct, func, and base. Each level is treated as a type. The types are specified in the structure and relationship. At the same time, we use a demanding path to express the function to be implemented. The correctness of the design is verified by recursively checking the type relationship and type existence. The method has been applied to verify the OPEN business of VFS (virtual file system) in Linux Kernel. Also, we have designed and developed a set of security communication mechanisms in the Kernel with verification.

Keywords: formal approach, type theory, Linux Kernel, software program

Procedia PDF Downloads 137
2284 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 301