Search results for: social software
13732 Impact of Social Media on the Functioning of the Indian Government: A Critical Analysis
Authors: Priya Sepaha
Abstract:
Social media has loomed as the most effective tool in recent times to flag the causes, contents, opinions and direction of any social movement and has demonstrated that it will have a far-reaching effect on government as well. This study focuses on India which has emerged as the fastest growing community on social media. Social movement activists, in particular, have extensively utilized the power of digital social media to streamline the effectiveness of social protest on a particular issue through extensive successful mass mobilizations. This research analyses the role and impact of social media as a power to catalyze the social movements in India and further seeks to describe how certain social movements are resisted, subverted, co-opted and/or deployed by social media. The impact assessment study has been made with the help of cases, policies and some social movement which India has witnessed the assertion of numerous social issues perturbing the public which eventually paved the way for remarkable judicial decisions. The paper concludes with the observations that despite its pros and cons, the impacts of social media on the functioning of the Indian Government have demonstrated that it has already become an indispensable tool in the hands of social media-suave Indians who are committed to bring about a desired change.Keywords: social media, social movements, impact, law, government
Procedia PDF Downloads 16113731 Axiomatic Design and Organization Design: Opportunities and Challenges in Transferring Axiomatic Design to the Social Sciences
Authors: Nicolay Worren, Christopher A. Brown
Abstract:
Axiomatic design (AD) has mainly been applied to support the design of physical products and software solutions. However, it was intended as a general design approach that would also be applicable to the design of social systems, including organizations (i.e., organization design). In this article, we consider how AD may be successfully transferred to the field of organizational design. On the one hand, it provides a much-needed pragmatic approach that can help leaders clarify the link between the purpose and structure of their organizations, identify ineffective organizational structures, and increase the chance of achieving strategic goals. On the other hand, there are four conceptual challenges that may create uncertainty and resistance among scholars and practitioners educated in the social sciences: 1) The exclusive focus in AD on negative interdependencies ('coupling'); 2) No obvious way of representing the need for integration across design parameters (DPs); 3) A lack of principles for handling control processes that seem to require 'deliberate coupling' of FRs; and 4) A lack of principles for handling situations where conflicting FRs (i.e., coupling) might require integration rather than separation. We discuss alternative options for handling these challenges so that scholars and practitioners can make use of AD for organization design.Keywords: axiomatic design, organization design, social systems, concept definitions
Procedia PDF Downloads 12613730 Analytical Study of Data Mining Techniques for Software Quality Assurance
Authors: Mariam Bibi, Rubab Mehboob, Mehreen Sirshar
Abstract:
Satisfying the customer requirements is the ultimate goal of producing or developing any product. The quality of the product is decided on the bases of the level of customer satisfaction. There are different techniques which have been reported during the survey which enhance the quality of the product through software defect prediction and by locating the missing software requirements. Some mining techniques were proposed to assess the individual performance indicators in collaborative environment to reduce errors at individual level. The basic intention is to produce a product with zero or few defects thereby producing a best product quality wise. In the analysis of survey the techniques like Genetic algorithm, artificial neural network, classification and clustering techniques and decision tree are studied. After analysis it has been discovered that these techniques contributed much to the improvement and enhancement of the quality of the product.Keywords: data mining, defect prediction, missing requirements, software quality
Procedia PDF Downloads 46713729 Designing a Legal Framework for Social Innovation
Authors: Prapin Nuchpiam
Abstract:
The importance of social innovation has become increasingly significant as the process of developing effective solutions to social problems and being a force of change for people’s better quality of life. In order to promote social innovation, active collaboration between government, business organizations, and the civil society sector is needed. A proper legal framework also plays an important role in building the social innovation ecosystem. Currently, there is no specific law designed for social innovation or a so-called “social innovation law”. One of the legal frameworks for social innovation is the development of hybrid legal forms for social enterprises such as the UK’s Community Interest Company (CIC), the US’s Low-Profit Limited Liability Company (L3C) and the US’s Benefit Corporation (B-Corp), among others. This is because social enterprise is recognized as an organizational form of social innovation with its aim for social benefit goals and the achievement of financial sustainability. Nonetheless, there has been a debate over the differences and similarities between social innovation and social enterprise. Thus, social enterprise law might not fit well with social innovation, resulting in a search for a legal framework specially designed for social innovation. This paper aims to study the interrelationship between social innovation, social enterprise, and the role of law to see whether we need a specific law for social innovation. If so, what should such a legal framework look like? The paper will provide a critical analysis of innovative legal forms for social enterprise as a type of social innovation law. A proper legal framework for social innovation could help promote the sector, which could result in finding new solutions to social problems. It will also bring about a greater common understanding of the exciting development of legal scholarship in this way, which will, in turn, serve as a productive basis or direction for further research on this increasingly important topic.Keywords: social innovation, social enterprise, legal framework, regulation
Procedia PDF Downloads 9513728 Software Development to Empowering Digital Libraries with Effortless Digital Cataloging and Access
Authors: Abdul Basit Kiani
Abstract:
The software for the digital library system is a cutting-edge solution designed to revolutionize the way libraries manage and provide access to their vast collections of digital content. This advanced software leverages the power of technology to offer a seamless and user-friendly experience for both library staff and patrons. By implementing this software, libraries can efficiently organize, store, and retrieve digital resources, including e-books, audiobooks, journals, articles, and multimedia content. Its intuitive interface allows library staff to effortlessly manage cataloging, metadata extraction, and content enrichment, ensuring accurate and comprehensive access to digital materials. For patrons, the software offers a personalized and immersive digital library experience. They can easily browse the digital catalog, search for specific items, and explore related content through intelligent recommendation algorithms. The software also facilitates seamless borrowing, lending, and preservation of digital items, enabling users to access their favorite resources anytime, anywhere, on multiple devices. With robust security features, the software ensures the protection of intellectual property rights and enforces access controls to safeguard sensitive content. Integration with external authentication systems and user management tools streamlines the library's administration processes, while advanced analytics provide valuable insights into patron behavior and content usage. Overall, this software for the digital library system empowers libraries to embrace the digital era, offering enhanced access, convenience, and discoverability of their vast collections. It paves the way for a more inclusive and engaging library experience, catering to the evolving needs of tech-savvy patrons.Keywords: software development, empowering digital libraries, digital cataloging and access, management system
Procedia PDF Downloads 8213727 Basic Need Satisfaction and Students’ Willingness to Use Spreadsheet Software
Authors: Anne Sørebø
Abstract:
The present study was designed to test how fulfilment of three basic psychological needs influence students development of perceived usefulness (PU) and ease of use (EOU) in connection with use of a spreadsheet. Both PU and EOU are assumed to be critical for development of students' willingness to utilize spreadsheet in future work within business administration. A questionnaire was completed by 196 business students in Norway. We found that satisfying the need for competence and autonomy is most critical for willingness to utilize the software package. The results also indicate that satisfying the need for relatedness, surprisingly, has no influence on students’ willingness to utilize the software package. A key implication of the present research is that teachers mainly should focus on fulfilling students need for competence and self-determination when the purpose is to motivate them to utilize new software. That students’ should develop their own competence when using a new technology is somewhat obvious, but that the feeling of being self-determined needs to be a complementary element in this connection is not necessary seen as obvious.Keywords: spreadsheet, business students, technology acceptance, basic psychological needs
Procedia PDF Downloads 39213726 Design an Algorithm for Software Development in CBSE Envrionment Using Feed Forward Neural Network
Authors: Amit Verma, Pardeep Kaur
Abstract:
In software development organizations, Component based Software engineering (CBSE) is emerging paradigm for software development and gained wide acceptance as it often results in increase quality of software product within development time and budget. In component reusability, main challenges are the right component identification from large repositories at right time. The major objective of this work is to provide efficient algorithm for storage and effective retrieval of components using neural network and parameters based on user choice through clustering. This research paper aims to propose an algorithm that provides error free and automatic process (for retrieval of the components) while reuse of the component. In this algorithm, keywords (or components) are extracted from software document, after by applying k mean clustering algorithm. Then weights assigned to those keywords based on their frequency and after assigning weights, ANN predicts whether correct weight is assigned to keywords (or components) or not, otherwise it back propagates in to initial step (re-assign the weights). In last, store those all keywords into repositories for effective retrieval. Proposed algorithm is very effective in the error correction and detection with user base choice while choice of component for reusability for efficient retrieval is there.Keywords: component based development, clustering, back propagation algorithm, keyword based retrieval
Procedia PDF Downloads 37813725 Grading Fourteen Zones of Isfahan in Terms of the Impact of Globalization on the Urban Fabric of the City, Using the TOPSIS Model
Authors: A. Zahedi Yeganeh, A. Khademolhosseini, R. Mokhtari Malekabadi
Abstract:
Undoubtedly one of the most far-reaching and controversial topics considered in the past few decades, has been globalization. Globalization lies in the essence of the modern culture. It is a complex and rapidly expanding network of links and mutual interdependence that is an aspect of modern life; though some argue that this link existed since the beginning of human history. If we consider globalization as a dynamic social process in which the geographical constraints governing the political, economic, social and cultural relationships have been undermined, it might not be possible to simply describe its impact on the urban fabric. But since in this phenomenon the increase in communications of societies (while preserving the main cultural - regional characteristics) with one another and the increase in the possibility of influencing other societies are discussed, the need for more studies will be felt. The main objective of this study is to grade based on some globalization factors on urban fabric applying the TOPSIS model. The research method is descriptive - analytical and survey. For data analysis, the TOPSIS model and SPSS software were used and the results of GIS software with fourteen cities are shown on the map. The results show that the process of being influenced by the globalization of the urban fabric of fourteen zones of Isfahan was not similar and there have been large differences in this respect between city zones; the most affected areas are zones 5, 6 and 9 of the municipality and the least impact has been on the zones 4 and 3 and 2.Keywords: grading, globalization, urban fabric, 14 zones of Isfahan, TOPSIS model
Procedia PDF Downloads 31513724 Reductions of Control Flow Graphs
Authors: Robert Gold
Abstract:
Control flow graphs are a well-known representation of the sequential control flow structure of programs with a multitude of applications. Not only single functions but also sets of functions or complete programs can be modelled by control flow graphs. In this case the size of the graphs can grow considerably and thus makes it difficult for software engineers to analyse the control flow. Graph reductions are helpful in this situation. In this paper we define reductions to subsets of nodes. Since executions of programs are represented by paths through the control flow graphs, paths should be preserved. Furthermore, the composition of reductions makes a stepwise analysis approach possible.Keywords: control flow graph, graph reduction, software engineering, software applications
Procedia PDF Downloads 55213723 Cakrawala Baca Transformation Model into Social Enterprise: A Benchmark Approach from Socentra Agro Mandiri (SAM) and Agritektur
Authors: Syafinatul Fitri
Abstract:
Cakrawala Baca is one of social organization in Indonesia that realize to transform its organization into social enterprise to create more sustainable organization that result more sustainable social impact. Cakrawala Baca implements voluntary system for its organization and it has passive social target. It funds its program by several fund rising activities that depend on donors or sponsor. Therefore social activity that held does not create sustainable social impact. It is different with social enterprise that usually more independent in funding its activity through social business and implement active social target and professional work for organization member. Therefore social enterprise can sustain its organization and then able to create sustainable social impact. Developing transformation model from social movement into social enterprise is the focus of this study. To achieve the aim of study, benchmark approach from successful social enterprise in Indonesia that has previously formed as social movement is employed. The benchmark is conducted through internal and external scanning that result the understanding of how they transformed into social enterprise. After understanding SAM and Agritektur transformation, transformation pattern is formulated based on their transformation similarities. This transformation pattern will be implemented to formulate the transformation plan for Cakrawala Baca to be a social enterprise.Keywords: social movement/social organization, non-profit organization (NPO), social enterprise, transformation, Benchmarks approach
Procedia PDF Downloads 50913722 Software Architecture Optimization Using Swarm Intelligence Techniques
Authors: Arslan Ellahi, Syed Amjad Hussain, Fawaz Saleem Bokhari
Abstract:
Optimization of software architecture can be done with respect to a quality attributes (QA). In this paper, there is an analysis of multiple research papers from different dimensions that have been used to classify those attributes. We have proposed a technique of swarm intelligence Meta heuristic ant colony optimization algorithm as a contribution to solve this critical optimization problem of software architecture. We have ranked quality attributes and run our algorithm on every QA, and then we will rank those on the basis of accuracy. At the end, we have selected the most accurate quality attributes. Ant colony algorithm is an effective algorithm and will perform best in optimizing the QA’s and ranking them.Keywords: complexity, rapid evolution, swarm intelligence, dimensions
Procedia PDF Downloads 26113721 Some Trends in Analysis of Two-Way Solid Slabs
Authors: Reem I. Al-Ya' Goub, Nasim Shatarat
Abstract:
This paper presents the results of analytical and comparative study among software programs' outputs in analysis of some two way solid slabs; flat plate, flat slab with beams and flat slab with drop panels problems that already been analyzed using Classical Equivalent Frame Method (CEFM) by several reinforced concrete book authors. The primary objective of this research is to determine the moment results using various software programs. Then, a summary of the results and differences percentages were obtained to show how analysis procedure effects the outputs of calculations that vary from software program to another when comparing them with the results of CEFM. Moment values were obtained using either the Equivalent Frame Method (EFM) or Finite Element Method (FEM) that's used among many software programs. The results of the analyses demonstrate that software programs vary markedly in terms of the information they provide to the structural designer regarding values of the model insertion, stiffness, effective moment of inertia used and specially the moment values.Keywords: two-way solid slabs, flat plate, flat slab with beams, flat slab with drop panels, analysis, modeling, EFM, CEFM, FEM
Procedia PDF Downloads 41113720 Scrum Challenges and Mitigation Practices in Global Software Development of an Integrated Learning Environment: Case Study of Science, Technology, Innovation, Mathematics, Engineering for the Young
Authors: Evgeniia Surkova, Manal Assaad, Hleb Makeyeu, Juho Makio
Abstract:
The main objective of STIMEY (Science, Technology, Innovation, Mathematics, Engineering for the Young) project is the delivery of a hybrid learning environment that combines multi-level components such as social media concepts, robotic artefacts, and radio, among others. It is based on a well-researched pedagogical framework to attract European youths to STEM (science, technology, engineering, and mathematics) education and careers. To develop and integrate these various components, STIMEY is executed in iterative research cycles leading to progressive improvements. Scrum was the development methodology of choice in the project, as studies indicated its benefits as an agile methodology in global software development, especially of e-learning and integrated learning projects. This paper describes the project partners’ experience with the Scrum framework, discussing the challenges faced in its implementation and the mitigation practices employed. The authors conclude with exploring user experience tools and principles for future research, as a novel direction in supporting the Scrum development team.Keywords: e-learning, global software development, scrum, STEM education
Procedia PDF Downloads 17913719 A Systematic Literature Review on Security and Privacy Design Patterns
Authors: Ebtehal Aljedaani, Maha Aljohani
Abstract:
Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns
Procedia PDF Downloads 13213718 Organizational Performance and Impact of Social Innovation
Authors: Alfonso Unceta, Javier Castro-Spila
Abstract:
This paper offers a conceptual and empirical exploration between the organizational performance and the impact of social innovation. The paper contributes on the social innovation field in three domains: a) It provides analytical and empirical evidence linking organizational performance to the impact of social innovation; b) it provides a first outline of impact assessment of social innovation when it is developed by a diversity of heterogeneous actors (systemic social innovation); c) it provides a first outline for the development of innovation policies to support social innovations according to a typology of organizations and a typology of impact.Keywords: absorptive capacity, social innovation impact, organizational performance, RESINDEX, Basque Country
Procedia PDF Downloads 48613717 Power System Modeling for Calculations in Frequency and Steady State Domain
Authors: G. Levacic, A. Zupan
Abstract:
Application of new technological solutions and installation of new elements into the network requires special attention when investigating its interaction with the existing power system. Special attention needs to be devoted to the occurrence of harmonic resonance. Sources of increasing harmonic penetration could be wind power plants, Flexible Alternating Current Transmission System (FACTS) devices, underground and submarine cable installations etc. Calculation in frequency domain with various software, for example, the software for power systems transients EMTP-RV presents one of the most common ways to obtain the harmonic impedance of the system. Along calculations in frequency domain, such software allows performing of different type of calculations as well as steady-state domain. This paper describes a power system modeling with software EMTP-RV based on data from SCADA/EMS system. The power flow results on 220 kV and 400 kV voltage levels retrieved from EMTP-RV are verified by comparing with power flow results from power transmissions system planning software PSS/E. The determination of the harmonic impedance for the case of remote power plant connection with cable up to 2500 Hz is presented as an example of calculations in frequency domain.Keywords: power system modeling, frequency domain, steady state, EMTP-RV, PSS/E
Procedia PDF Downloads 32213716 Working Improvement of Modern Finance in Millennium World
Authors: Saeed Mohammadirad
Abstract:
Financing activities involve long-term liabilities, stockholders' equity (or owner's equity), and changes to short-term borrowings. Finance is very important for every business activities. To perform the finance we have to follow the accounting languages bases on the nature of the business. If all are one package in the software, it is easy to handle, monitor, control, plan, organize, direct and budget the finance. Let us make a challenge in the computer software for the whole finance packages of every business related activities. In this article, it mentioned about the finance functions in the various levels of the business activities and how it should be maintained properly to avoid the unethical events.Keywords: financing activities, business activities, computer software, unethical events
Procedia PDF Downloads 35613715 Using the Weakest Precondition to Achieve Self-Stabilization in Critical Networks
Authors: Antonio Pizzarello, Oris Friesen
Abstract:
Networks, such as the electric power grid, must demonstrate exemplary performance and integrity. Integrity depends on the quality of both the system design model and the deployed software. Integrity of the deployed software is key, for both the original versions and the many that occur throughout numerous maintenance activity. Current software engineering technology and practice do not produce adequate integrity. Distributed systems utilize networks where each node is an independent computer system. The connections between them is realized via a network that is normally redundantly connected to guarantee the presence of a path between two nodes in the case of failure of some branch. Furthermore, at each node, there is software which may fail. Self-stabilizing protocols are usually present that recognize failure in the network and perform a repair action that will bring the node back to a correct state. These protocols first introduced by E. W. Dijkstra are currently present in almost all Ethernets. Super stabilization protocols capable of reacting to a change in the network topology due to the removal or addition of a branch in the network are less common but are theoretically defined and available. This paper describes how to use the Software Integrity Assessment (SIA) methodology to analyze self-stabilizing software. SIA is based on the UNITY formalism for parallel and distributed programming, which allows the analysis of code for verifying the progress property p leads-to q that describes the progress of all computations starting in a state satisfying p to a state satisfying q via the execution of one or more system modules. As opposed to demonstrably inadequate test and evaluation methods SIA allows the analysis and verification of any network self-stabilizing software as well as any other software that is designed to recover from failure without external intervention of maintenance personnel. The model to be analyzed is obtained by automatic translation of the system code to a transition system that is based on the use of the weakest precondition.Keywords: network, power grid, self-stabilization, software integrity assessment, UNITY, weakest precondition
Procedia PDF Downloads 22313714 Social Enterprises in Rural Canada
Authors: Prescott C. Ensign
Abstract:
Social enterprises play a vital role in Canada’s rural and northern communities. Most operate as non-profit organizations, use market approaches, and generate revenue from services or goods to support goals that address social, cultural, and environmental issues. As provincial and federal governments make reductions to programs providing social services to local communities, rural and northern residents who already have fewer resources from which to draw will be especially affected. Social enterprises will be called on to take up the slack. The aim of this paper is to provide a more comprehensive picture of the social enterprise as an organization and to understand the impact that context/ecosystem has on a social enterprise as it develops.Keywords: social enterprises, structuration, embeddedness, ecosystem
Procedia PDF Downloads 13213713 Using Social Network Analysis for Cyber Threat Intelligence
Authors: Vasileios Anastopoulos
Abstract:
Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis
Procedia PDF Downloads 17813712 Investigating the Relationship of Social Capital with Student's Aggressive Behavior: Case Study of Male Students of Middle School in Isfahan
Authors: Mohammadreza Kolaei, Vahid Ghasemi, Ebrahim Ansari
Abstract:
This research was carried out with the aim of investigating the relationship between social capital and aggressive behavior of students (Case study: male students of middle school in Isfahan). In terms of methodology, this research is an applied research which is done by descriptive-analytical method and survey method. The instrument for collecting the data was a questionnaire consisting of: questionnaire for measuring aggressive behavior and social capital questionnaire, which was used after the validity and reliability of this questionnaire. On the other hand, the statistical population of the study consisted of all students in the guidance school of Isfahan in the academic year of 2016. For determining the sample size, the Kerjesy and Morgan tables were used and the sampling method of this multi-stage random sampling was used. After collecting the data, they were analyzed by SPSS software. The findings of the research showed that at 95% confidence level, the student's social capital increases, reducing his aggressiveness. Also, the amount of student aggression is estimated at 4% according to its social capital. Also, with increasing social capital of the school, the student's student aggression is reduced, with the student's student aggression's exposure to her social capital being estimated at 3%. On the other hand, increasing the amount of mother's presence in the home decreases the amount of student aggression. Also, the amount of student aggression is estimated at 1% according to the amount of mother's presence in her home. Ultimately, the amount of student aggression decreases with increasing presence of father at home. Also, the amount of student aggression is estimated at 2% according to the variable of father's presence in his home.Keywords: investigating, social capital, aggressive behavior, students, middle school, Isfahan
Procedia PDF Downloads 28513711 Teachers’ Perceptions of the Efficacy of Social Stories in the Development of Social Skills for Students with Autism in Saudi Arabia
Authors: Faihan Alotaibi
Abstract:
This study explores Saudi teachers’ perceptions of the efficacy of social stories in the development of social skills in students with autism in Riyadh, Saudi Arabia in two phases. Data were collected in sequential quantitative and qualitative phases. Participants in this study were 100 teachers in the quantitative phase and 15 teachers were interviewed. In this poster, the researcher will present the data result in the qualitative second phase in which an understanding of teachers’ experiences was deepened by conducting semi-structured interviews with a purposeful sample of fifteen teachers of diverse experience, covering six initial themes: the social story concept, sources of social stories, the effectiveness of social stories in improving social skills in students with autism, barriers to using social stories for students with autism, cultural consideration and context of social stories, and factors which contribute to the best use of social stories to developing of social skills for students with autism.Keywords: autism, social storyteachers’ perceptions, intervention, social skills
Procedia PDF Downloads 38213710 Hydrodynamic Study and Sizing of a Distillation Column by HYSYS Software
Authors: Derrouazin Mohammed Redhouane, Souakri Mohammed Lotfi, Henini Ghania
Abstract:
This work consists, first of all, of mastering one of the powerful process simulation tools currently used in the industrial processes, which is the HYSYS sizing software, and second, of simulating a petroleum distillation column. This study is divided into two parts; where the first one consists of a dimensioning of the column with a fast approximating method using state equations, iterative calculations, and then a precise simulation method with the HYSYS software. The second part of this study is a hydrodynamic study in order to verify by obtained results the proper functioning of the plates.Keywords: industry process engineering, water distillation, environment, HYSYS simulation tool
Procedia PDF Downloads 12913709 A Comparative Study of Three Major Performance Testing Tools
Authors: Abdulaziz Omar Alsadhan, Mohd Mudasir Shafi
Abstract:
Performance testing is done to prove the reliability of any software product. There are a number of tools available in the markets that are used to perform performance testing. In this paper we present a comparative study of the three most commonly used performance testing tools. These tools cover the major share of the performance testing market and are widely used. In this paper we compared the tools on five evaluation parameters which are; User friendliness, portability, tool support, compatibility and cost. The conclusion provided at the end of the paper is based on our study and does not support any tool or company.Keywords: software development, software testing, quality assurance, performance testing, load runner, rational testing, silk performer
Procedia PDF Downloads 60813708 A Small Graphic Lie. The Photographic Quality of Pierre Bourdieu’s Correspondance Analysis
Authors: Lene Granzau Juel-Jacobsen
Abstract:
The problem of beautification is an obvious concern of photography, claiming reference to reality, but it also lies at the very heart of social theory. As we become accustomed to sophisticated visualizations of statistical data in pace with the development of software programs, we should not only be inclined to ask new types of research questions, but we also need to confront social theories based on such visualization techniques with new types of questions. Correspondence Analysis, GIS analysis, Social Network Analysis, and Perceptual Maps are current examples of visualization techniques popular within the social sciences and neighboring disciplines. This article discusses correspondence analysis, arguing that the graphic plot of correspondence analysis is to be interpreted much similarly to a photograph. It refers no more evidently or univocally to reality than a photograph, representing social life no more truthfully than a photograph documents. Pierre Bourdieu’s theoretical corpus, especially his theory of fields, relies heavily on correspondence analysis. While much attention has been directed towards critiquing the somewhat vague conceptualization of habitus, limited focus has been placed on the equally problematic concepts of social space and field. Based on a re-reading of the Distinction, the article argues that the concepts rely on ‘a small graphic lie’ very similar to a photograph. Like any other piece of art, as Bourdieu himself recognized, the graphic display is a politically and morally loaded representation technique. However, the correspondence analysis does not necessarily serve the purpose he intended. In fact, it tends towards the pitfalls he strove to overcome.Keywords: datavisualization, correspondance analysis, bourdieu, Field, visual representation
Procedia PDF Downloads 6813707 Analyzing the Impact of Code Commenting on Software Quality
Authors: Thulya Premathilake, Tharushi Perera, Hansi Thathsarani, Tharushi Nethmini, Dilshan De Silva, Piyumika Samarasekara
Abstract:
One of the most efficient ways to assist developers in grasping the source code is to make use of comments, which can be found throughout the code. When working in fields such as software development, having comments in your code that are of good quality is a fundamental requirement. Tackling software problems while making use of programs that have already been built. It is essential for the intention of the source code to be made crystal apparent in the comments that are added to the code. This assists programmers in better comprehending the programs they are working on and enables them to complete software maintenance jobs in a more timely manner. In spite of the fact that comments and documentation are meant to improve readability and maintainability, the vast majority of programmers place the majority of their focus on the actual code that is being written. This study provides a complete and comprehensive overview of the previous research that has been conducted on the topic of code comments. The study focuses on four main topics, including automated comment production, comment consistency, comment classification, and comment quality rating. One is able to get the knowledge that is more complete for use in following inquiries if they conduct an analysis of the proper approaches that were used in this study issue.Keywords: code commenting, source code, software quality, quality assurance
Procedia PDF Downloads 8513706 The Social Origin Pay Gap in the UK Household Longitudinal Study
Authors: Michael Vallely
Abstract:
This paper uses data from waves 1 to 10 (2009-2019) of the UK Household Longitudinal Study to examine the social origin pay gap in the UK labour market. We find that regardless of how we proxy social origin, whether it be using the dominance approach, total parental occupation, parental education, total parental education, or the higher parental occupation and higher parental education, the results have one thing in common; in all cases, we observe a significant social origin pay gap for those from the lower social origins with the largest pay gap observed for those from the ‘lowest’ social origin. The results may indicate that when we consider the occupational status and education of both parents, previous estimates of social origin pay gaps and the number of individuals affected may have been underestimated. We also observe social origin pay gaps within educational attainment groups, such as degree holders, and within professional and managerial occupations. Therefore, this paper makes a valuable contribution to the social origin pay gap literature as it provides empirical evidence of a social origin pay gap using a large-scale UK dataset and challenges the argument that education is the great ‘social leveller’.Keywords: social class, social origin, pay gaps, wage inequality
Procedia PDF Downloads 14413705 Initial Concept of Islamic Social Entrepreneurship: Identification of Research Gap from Existing Model
Authors: Mohd Adib Abd Muin
Abstract:
Social entrepreneurship has become a new phenomenon in a country in order to reduce social problems and eradicate poverty communities. However, the study based on Islamic social entrepreneurship from the social entrepreneurial activity is still new especially in the Islamic perspective. In addition, this research found that is lacking of model on social entrepreneurship that focus on Islamic perspective. Therefore, the objective of this paper is to identify the issues and research gap based on Islamic perspective from existing models and to develop a concept of Islamic social entrepreneurship according to Islamic perspective and Maqasid Shari’ah. The research method used in this study is literature review and comparative analysis from 11 existing models of social entrepreneurship. The research finding shows that 11 existing models on social entrepreneurship has been analyzed and it shows that the existing models on social entrepreneurship do not emphasize on Islamic perspective.Keywords: component, social entrepreneurship, Islamic perspective, research gap
Procedia PDF Downloads 44913704 An Examination of the Relationship between Adolescents' Social Media Use and Social Appearance Anxiety
Authors: Aynur Bütün Ayhan, Utku Beyazıt
Abstract:
Adolescents can be heavily influenced by social media content as they develop their identities and body images. Therefore, the intensive use of social media platforms may have important effects on their body image beliefs. In this context, the objective of the present study was to assess the relationship between adolescents' social media use and their body image concerns. The study included 265 adolescents (133 girls and 132 boys) between the ages of 15 and 17 who were attending a high school in Ankara, Türkiye. In the study, the adolescents were administered the Social Media Addiction Scale to assess their level of social media use and the Social Appearance Anxiety Scale to assess their social appearance anxiety. Prior to analysis, a normality test was applied, and it was determined that the data displayed a non-parametric distribution. As a result, a significant positive relationship (r=.322, p<.01) was found between adolescents' level of social use and social appearance anxiety. It was also determined that social media addiction and social appearance anxiety significantly differed (p<.05) according to adolescents' opinions about their own bodies, being influenced by body images they see on social media and weight perceptions. The findings suggest that social media use should be managed carefully for adolescents to develop a healthy body image.Keywords: social media, adolescent, social appearence, anxiety
Procedia PDF Downloads 2313703 FRATSAN: A New Software for Fractal Analysis of Signals
Authors: Hamidreza Namazi
Abstract:
Fractal analysis is assessing fractal characteristics of data. It consists of several methods to assign fractal characteristics to a dataset which may be a theoretical dataset or a pattern or signal extracted from phenomena including natural geometric objects, sound, market fluctuations, heart rates, digital images, molecular motion, networks, etc. Fractal analysis is now widely used in all areas of science. An important limitation of fractal analysis is that arriving at an empirically determined fractal dimension does not necessarily prove that a pattern is fractal; rather, other essential characteristics have to be considered. For this purpose a Visual C++ based software called FRATSAN (FRActal Time Series ANalyser) was developed which extract information from signals through three measures. These measures are Fractal Dimensions, Jeffrey’s Measure and Hurst Exponent. After computing these measures, the software plots the graphs for each measure. Besides computing three measures the software can classify whether the signal is fractal or no. In fact, the software uses a dynamic method of analysis for all the measures. A sliding window is selected with a value equal to 10% of the total number of data entries. This sliding window is moved one data entry at a time to obtain all the measures. This makes the computation very sensitive to slight changes in data, thereby giving the user an acute analysis of the data. In order to test the performance of this software a set of EEG signals was given as input and the results were computed and plotted. This software is useful not only for fundamental fractal analysis of signals but can be used for other purposes. For instance by analyzing the Hurst exponent plot of a given EEG signal in patients with epilepsy the onset of seizure can be predicted by noticing the sudden changes in the plot.Keywords: EEG signals, fractal analysis, fractal dimension, hurst exponent, Jeffrey’s measure
Procedia PDF Downloads 467