Search results for: gestural communication
1761 Linguistic Inclusion in the Work of International NGOs: English as Both an Opportunity and a Barrier
Authors: Marta Bas-Szymaszek
Abstract:
This research examines the intricate relationship between language practices and beliefs within international environmental non-governmental organizations (ENGOs), with a particular focus on the Climate Action Network Europe (CAN Europe). While acknowledging that ENGOs often employ multilingual staff, this study aims to analyze the dual role of English within this sector. While English facilitates practical communication among individuals from diverse backgrounds, it also perpetuates inequalities and marginalization within CAN Europe. Instances of linguistic dominance impede participation and representation, reinforcing language hierarchies. Furthermore, the symbolic power of English risks overshadowing the multilingual skills of NGO employees. Through fourteen in-depth interviews, focus group discussions, and observations, this research uncovers the lived experiences of individuals navigating Europe’s largest environmental NGO network. By analyzing CAN Europe’s implicit language policy and the hegemony of English, this study illuminates the challenges within multilingual settings. The organization advocates for the implementation of more inclusive language policies and practices, with the objective of recognizing and embracing linguistic diversity within international environmental NGOs.Keywords: language policy, English, NGOs, linguistic inclusion, multilingualism
Procedia PDF Downloads 431760 Authoring Tactile Gestures: Case Study for Emotion Stimulation
Authors: Rodrigo Lentini, Beatrice Ionascu, Friederike A. Eyssel, Scandar Copti, Mohamad Eid
Abstract:
The haptic modality has brought a new dimension to human computer interaction by engaging the human sense of touch. However, designing appropriate haptic stimuli, and in particular tactile stimuli, for various applications is still challenging. To tackle this issue, we present an intuitive system that facilitates the authoring of tactile gestures for various applications. The system transforms a hand gesture into a tactile gesture that can be rendering using a home-made haptic jacket. A case study is presented to demonstrate the ability of the system to develop tactile gestures that are recognizable by human subjects. Four tactile gestures are identified and tested to intensify the following four emotional responses: high valence – high arousal, high valence – low arousal, low valence – high arousal, and low valence – low arousal. A usability study with 20 participants demonstrated high correlation between the selected tactile gestures and the intended emotional reaction. Results from this study can be used in a wide spectrum of applications ranging from gaming to interpersonal communication and multimodal simulations.Keywords: tactile stimulation, tactile gesture, emotion reactions, arousal, valence
Procedia PDF Downloads 3711759 Instructional Leadership and Competency in Capacity Development among Principals: A Mediation with Self Efficacy in Moderate Performing Schools
Authors: Mohd Ibrahim K. Azeez, Mohammed Sani Ibrahim, Rosemawati Mustapa, Maisarah A. Malik, Chandrakala Varatharajoo, Wee Akina Sia Seng Lee
Abstract:
The leadership of the principals is known to be a key indicator in development and school performance. Therefore, this study was undertaken to assess the extent of the influence of instructional leadership in the field of supervision and curriculum focus on capacity development competence in the field of communication and teamwork. In addition, this study also examines self-efficacy mediator school leadership in the field of self-improvement and self-management of school principals. The study involved 383 guest teachers from 55 secondary schools for leadership in schools. Data was analyzed using SEM aid program AMOS 21. The final result shows partial mediation model was the best model fit to obtain the best goodness of fit of (X2/df = 4.663, CFI = 0.922, GFI = 0.778, TLI = 0914, NFI = 0.903, and RMSEA = 0.098) compared to the direct effect model of the findings (X2/df = 5.319, CFI = 0.908, GFI = 0755, TLI = 0.899, NFI = 0.889, and RMSEA = 0.106). While the findings of the fully mediator model with a self-efficacy refers principals as a mediator as follows (X2/df = 4.838, CFI = 0918, GFI = 0772, TLI = 0.910, NFI = 0.899, and RMSEA = 0.100). Therefore, it can be concluded that the findings clearly demonstrate self-efficacy variables principals become a mediator in the relationship between instructional leadership capacity and competency development.Keywords: instructional leadership, capacity development, self-efficacy, competency
Procedia PDF Downloads 7251758 Cyber Bullying Victimization of Elementary School Students and Their Reflections on the Victimization
Authors: Merve Sadetas Sezer, Ismail Sahin, Ahmet Oguz Akturk
Abstract:
With the use of developing technology, mostly in communication and entertainment, students spend considerable time on the internet. In addition to the advantages provided by the internet, social isolation brings problems such as addiction. This is one of the problems of the virtual violence. Cyber-bullying is the common name of the intensities which students are exposed on the internet. The purpose of this study designed as a qualitative research is to find out the cyber bullying varieties and its effects on elementary school students. The participants of this research are 6th, 7th and 8th grade students of a primary school and 24 students agreed to participate in the study. The students were asked to fill an interview with semi-structured open-ended questions. According to the results obtained in the research, the most important statements determined by the participants are breaking passwords on social networking sites, slang insult to blasphemy and taking friendship offers from unfamiliar people. According to participants from the research, the most used techniques to prevent themselves from cyber bullying are to complain to the site administrator, closing accounts on social networking sites and countercharging. Also, suggestions were presented according to the findings.Keywords: bullying, cyber-bullying, elementary, peer-relationship, virtual victimization
Procedia PDF Downloads 3491757 Design of a Multidisciplinary Project-Oriented Capstone Course for Mechanical Engineering Education
Authors: Chi-Cheng Cheng, Che-Hsin Lin, Yu-Jen Wang, Chua-Chin Wang
Abstract:
The project-oriented capstone course has become a required element for most engineering educational units. It is not only because the capstone course is an important criterion for international accreditation of engineering degree programs under Washington Accord, but also the capstone course provides an opportunity for students to apply what they have learned in their school years to actual engineering problems. Nevertheless, most project-oriented capstone courses are conducted with one single project for all students or teams. In other words, students work to reach the same or similar goals by coming up with different layouts and approaches. It appears not suitable for a multidisciplinary engineering department. Therefore, a one-year multidisciplinary project-oriented capstone course was designed for the junior year of the undergraduate program. About one-half of faculty members in the department needs to be involved in generating as many projects as possible to meet different students' interests and specialties. Project achievement has to be displayed and demonstrated in the annual exposition and competition at the end of this course. Significant success in attracting attention and hardworking of students on projects was witnessed for the past two pilot years. Analysis of course evaluation demonstrates positive impact on all perspectives despite of slightly negative influence due to poor communication and collaboration between students and their project supervisors.Keywords: Capstone course, CDIO, engineering education, project-oriented learning
Procedia PDF Downloads 4521756 Architecture for Multi-Unmanned Aerial Vehicles Based Autonomous Precision Agriculture Systems
Authors: Ebasa Girma, Nathnael Minyelshowa, Lebsework Negash
Abstract:
The use of unmanned aerial vehicles (UAVs) in precision agriculture has seen a huge increase recently. As such, systems that aim to apply various algorithms on the field need a structured framework of abstractions. This paper defines the various tasks of the UAVs in precision agriculture and models them into an architectural framework. The presented architecture is built on the context that there will be minimal physical intervention to do the tasks defined with multiple coordinated and cooperative UAVs. Various tasks such as image processing, path planning, communication, data acquisition, and field mapping are employed in the architecture to provide an efficient system. Besides, different limitation for applying Multi-UAVs in precision agriculture has been considered in designing the architecture. The architecture provides an autonomous end-to-end solution, starting from mission planning, data acquisition, and image processing framework that is highly efficient and can enable farmers to comprehensively deploy UAVs onto their lands. Simulation and field tests show that the architecture offers a number of advantages that include fault-tolerance, robustness, developer, and user-friendliness.Keywords: deep learning, multi-UAVs, precision agriculture, UAVs architecture
Procedia PDF Downloads 1141755 Emotion Recognition Using Artificial Intelligence
Authors: Rahul Mohite, Lahcen Ouarbya
Abstract:
This paper focuses on the interplay between humans and computer systems and the ability of these systems to understand and respond to human emotions, including non-verbal communication. Current emotion recognition systems are based solely on either facial or verbal expressions. The limitation of these systems is that it requires large training data sets. The paper proposes a system for recognizing human emotions that combines both speech and emotion recognition. The system utilizes advanced techniques such as deep learning and image recognition to identify facial expressions and comprehend emotions. The results show that the proposed system, based on the combination of facial expression and speech, outperforms existing ones, which are based solely either on facial or verbal expressions. The proposed system detects human emotion with an accuracy of 86%, whereas the existing systems have an accuracy of 70% using verbal expression only and 76% using facial expression only. In this paper, the increasing significance and demand for facial recognition technology in emotion recognition are also discussed.Keywords: facial reputation, expression reputation, deep gaining knowledge of, photo reputation, facial technology, sign processing, photo type
Procedia PDF Downloads 1211754 Examining Customer Acceptance of Chatbots in B2B Customer Service: A Factorial Survey
Authors: Kathrin Endres, Daniela Greven
Abstract:
Although chatbots are a widely known and established communication instrument in B2C customer services, B2B industries still hesitate to implement chatbots due to the incertitude of customer acceptance. While many studies examine the chatbot acceptance of B2C consumers, few studies are focusing on the B2B sector, where the customer is represented by a buying center consisting of several stakeholders. This study investigates the challenges of chatbot acceptance in B2B industries compared to challenges of chatbot acceptance from current B2C literature by interviewing experts from German chatbot vendors. The results show many similarities between the customer requirements of B2B customers and B2C consumers. Still, due to several stakeholders involved in the buying center, the features of the chatbot users are more diverse but obfuscated at the same time. Using a factorial survey, this study further examines the customer acceptance of varying situations of B2B chatbot designs based on the chatbot variables transparency, fault tolerance, complexity of products, value of products, as well as transfer to live chat service employees. The findings show that all variables influence the propensity to use the chatbot. The results contribute to a better understanding of how firms in B2B industries can design chatbots to advance their customer service and enhance customer satisfaction.Keywords: chatbots, technology acceptance, B2B customer service, customer satisfaction
Procedia PDF Downloads 1241753 Providing Emotional Support to Children under Long-Term Health Treatments
Authors: Ramón Cruzat, Sergio F. Ochoa, Ignacio Casas, Luis A. Guerrero, José Bravo
Abstract:
Patients under health treatments that involve long stays at a hospital or health centre (e.g. cancer, organ transplants and severe burns), tend to get bored or depressed because of the lack of social interaction with family and friends. Such a situation also affects the evolution and effectiveness of their treatments. In many cases, the solution to this problem involves extra challenges, since many patients need to rest quietly (or remain in bed) to their being contagious. Considering the weak health condition in which usually are these kinds, keeping them motivated and quiet represents an important challenge for nurses and caregivers. This article presents a mobile ubiquitous game called MagicRace, which allows hospitalized kinds to interact socially with one another without putting to risk their sensitive health conditions. The game does not require a communication infrastructure at the hospital, but instead, it uses a mobile ad hoc network composed of the handheld devices used by the kids to play. The usability and performance of this application was tested in two different sessions. The preliminary results show that users experienced positive feelings from this experience.Keywords: ubiquitous game, children's emotional support, social isolation, mobile collaborative interactions
Procedia PDF Downloads 4301752 Management Competency in Logistical Function: The Skills That Will Master a Logistical Manager
Authors: Fatima Ibnchahid
Abstract:
Competence approach is considered, since the early 80's as one of the major development of HR policies. Many approaches to manage the professional skills were declined. Some processes are mature whereas the others have been abandoned. Competence can be defined as the set of knowledge (theoretical and practical), know-how (experience) and life skills (personality traits) mobilized by a person in the company. The skills must master a logistics manager are divided into two main categories: depending on whether technical skills, or managerial skills and human. The firsts are broken down into skills on logistical techniques and on general skills in business, seconds in social skills (self with others) and personal (with oneself). Logisticians are faced with new challenges and new constraints that are revolutionizing the way to treat the physical movement of goods and operations related to information flows that trigger, they control and guide the physical movements of these major changes, we can mention the development of information technology and communication, the emergence of strong environmental and security constraints. These changes have important effects on the skills needs of the members of the logistical function and sensitive development for training requested by logistical managers to perform better in their job changes. In this article, we will address two main points, first, a brief overview of the management skills and secondly answer the question asked in the title of the article to know what are the skills that will master a logistical manager.Keywords: skills, competence, management, logistical function
Procedia PDF Downloads 2821751 Smart Card Technology Adaption in a Hospital Setting
Authors: H. K. V. Narayan
Abstract:
This study was conducted at Tata Memorial Hospital (TMH), Mumbai, India. The study was to evaluate the impact of adapting Smart Card (SC) for clinical and business transactions in order to reduce Lead times and to enforce business rules of the hospital. The objective for implementing the Smart Card was to improve the patient perception of quality in terms of structures process and outcomes and also to improve the productivity of the Institution. The Smart Card was implemented in phases from 2011 and integrated with the Hospital Information System (HIS/EMR). The implementation was a learning curve for all the stake holders as software obviated the need to use hardcopies of transactions. The acceptability to the stake holders was challenge in change management. The study assessed the impact 3 years into the implementation and the observed trends have suggested that it has decreased the lead times for services and increased the no of transactions and thereby the productivity. Patients who used to complain of multiple queues and cumbersome transactions now compliment the administration for effective use of Information and Communication Technology.Keywords: smart card, high availability of health care information, reduction in potential medical errors due to elimination of transcription errors, reduction in no of queues, increased transactions, augmentation of revenue
Procedia PDF Downloads 2851750 Social Media Mining with R. Twitter Analyses
Authors: Diana Codat
Abstract:
Tweets' analysis is part of text mining. Each document is a written text. It's possible to apply the usual text search techniques, in particular by switching to the bag-of-words representation. But the tweets induce peculiarities. Some may enrich the analysis. Thus, their length is calibrated (at least as far as public messages are concerned), special characters make it possible to identify authors (@) and themes (#), the tweet and retweet mechanisms make it possible to follow the diffusion of the information. Conversely, other characteristics may disrupt the analyzes. Because space is limited, authors often use abbreviations, emoticons to express feelings, and they do not pay much attention to spelling. All this creates noise that can complicate the task. The tweets carry a lot of potentially interesting information. Their exploitation is one of the main axes of the analysis of the social networks. We show how to access Twitter-related messages. We will initiate a study of the properties of the tweets, and we will follow up on the exploitation of the content of the messages. We will work under R with the package 'twitteR'. The study of tweets is a strong focus of analysis of social networks because Twitter has become an important vector of communication. This example shows that it is easy to initiate an analysis from data extracted directly online. The data preparation phase is of great importance.Keywords: data mining, language R, social networks, Twitter
Procedia PDF Downloads 1841749 Examining Three Psychosocial Factors of Tax Compliance in Self-Employed Individuals using the Mindspace Framework - Evidence from Australia and Pakistan
Authors: Amna Tariq Shah
Abstract:
Amid the pandemic, the contemporary landscape has experienced accelerated growth in small business activities and an expanding digital marketplace, further exacerbating the issue of non-compliance among self-employed individuals through aggressive tax planning and evasion. This research seeks to address these challenges by developing strategic tax policies that promote voluntary compliance and improve taxpayer facilitation. The study employs the innovative MINDSPACE framework to examine three psychosocial factors—tax communication, tax literacy, and shaming—to optimize policy responses, address administrative shortcomings, and ensure adequate revenue collection for public goods and services. Preliminary findings suggest that incomprehensible communication from tax authorities drives individuals to seek alternative, potentially biased sources of tax information, thereby exacerbating non-compliance. Furthermore, the study reveals low tax literacy among Australian and Pakistani respondents, with many struggling to navigate complex tax processes and comprehend tax laws. Consequently, policy recommendations include simplifying tax return filing and enhancing pre-populated tax returns. In terms of shaming, the research indicates that Australians, being an individualistic society, may not respond well to shaming techniques due to privacy concerns. In contrast, Pakistanis, as a collectivistic society, may be more receptive to naming and shaming approaches. The study employs a mixed-method approach, utilizing interviews and surveys to analyze the issue in both jurisdictions. The use of mixed methods allows for a more comprehensive understanding of tax compliance behavior, combining the depth of qualitative insights with the generalizability of quantitative data, ultimately leading to more robust and well-informed policy recommendations. By examining evidence from opposite jurisdictions, namely a developed country (Australia) and a developing country (Pakistan), the study's applicability is enhanced, providing perspectives from two disparate contexts that offer insights from opposite ends of the economic, cultural, and social spectra. The non-comparative case study methodology offers valuable insights into human behavior, which can be applied to other jurisdictions as well. The application of the MINDSPACE framework in this research is particularly significant, as it introduces a novel approach to tax compliance behavior analysis. By integrating insights from behavioral economics, the framework enables a comprehensive understanding of the psychological and social factors influencing taxpayer decision-making, facilitating the development of targeted and effective policy interventions. This research carries substantial importance as it addresses critical challenges in tax compliance and administration, with far-reaching implications for revenue collection and the provision of public goods and services. By investigating the psychosocial factors that influence taxpayer behavior and utilizing the MINDSPACE framework, the study contributes invaluable insights to the field of tax policy. These insights can inform policymakers and tax administrators in developing more effective tax policies that enhance taxpayer facilitation, address administrative obstacles, promote a more equitable and efficient tax system, and foster voluntary compliance, ultimately strengthening the financial foundation of governments and communities.Keywords: individual tax compliance behavior, psychosocial factors, tax non-compliance, tax policy
Procedia PDF Downloads 751748 Performance of Coded Multi-Line Copper Wire for G.fast Communications in the Presence of Impulsive Noise
Authors: Israa Al-Neami, Ali J. Al-Askery, Martin Johnston, Charalampos Tsimenidis
Abstract:
In this paper, we focus on the design of a multi-line copper wire (MLCW) communication system. First, we construct our proposed MLCW channel and verify its characteristics based on the Kolmogorov-Smirnov test. In addition, we apply Middleton class A impulsive noise (IN) to the copper channel for further investigation. Second, the MIMO G.fast system is adopted utilizing the proposed MLCW channel model and is compared to a single line G-fast system. Second, the performance of the coded system is obtained utilizing concatenated interleaved Reed-Solomon (RS) code with four-dimensional trellis-coded modulation (4D TCM), and compared to the single line G-fast system. Simulations are obtained for high quadrature amplitude modulation (QAM) constellations that are commonly used with G-fast communications, the results demonstrate that the bit error rate (BER) performance of the coded MLCW system shows an improvement compared to the single line G-fast systems.Keywords: G.fast, Middleton Class A impulsive noise, mitigation techniques, Copper channel model
Procedia PDF Downloads 1321747 Optimization of SWL Algorithms Using Alternative Adder Module in FPGA
Authors: Tayab D. Memon, Shahji Farooque, Marvi Deshi, Imtiaz Hussain Kalwar, B. S. Chowdhry
Abstract:
Recently single-bit ternary FIR-like filter (SBTFF) hardware synthesize in FPGA is reported and compared with multi-bit FIR filter on similar spectral characteristics. Results shows that SBTFF dominates upon multi-bit filter overall. In this paper, an optimized adder module for ternary quantized sigma-delta modulated signal is presented. The adder is simulated using ModelSim for functional verification the area-performance of the proposed adder were obtained through synthesis in Xilinx and compared to conventional adder trees. The synthesis results show that the proposed adder tree achieves higher clock rates and lower chip area at higher inputs to the adder block; whereas conventional adder tree achieves better performance and lower chip area at lower number of inputs to the same adder block. These results enhance the usefulness of existing short word length DSP algorithms for fast and efficient mobile communication.Keywords: short word length (SWL), DSP algorithms, FPGA, SBTFF, VHDL
Procedia PDF Downloads 3461746 Experiences during the First Year of Practice among New Nurses
Authors: Chanya Thanomlikhit, Pataraporn Kheawwan
Abstract:
Transition from student to staff nurse can be difficult for nurses beginning their nursing profession. Objective: The purpose of this study was to explore the transition experiences during the first year of practice among new nurses in Thailand. Methods: A descriptive design using a survey questionnaire was used. One hundred seventy-eight new graduate nurses from one tertiary hospital in Thailand participated in this study. Data were collected using paper-and-pencil format of the Revised Casey-Fink Graduate Nurse Experience Survey. Results: Participants reported three types of difficulties they were experiencing during the first year of practice including role expectation, lack of confidence, and workload. New nurses reported uncomfortable to perform high risk skills such as code/emergency, ventilator care, EKG, and chest tube care. Organizing, prioritizing and communication were rated as difficult tasks during 12-month transition period. New nurses satisfied the benefit package they received from the institution, however, salary was lowest satisfied. Conclusion: Results inform transition program development for new nurses. Initiative of systems that support for the graduate nurse during the first year of practice is suggested.Keywords: new graduate nurse, transition, nurse residency program, clinical education
Procedia PDF Downloads 2381745 Optimizing the Public Policy Information System under the Environment of E-Government
Authors: Qian Zaijian
Abstract:
E-government is one of the hot issues in the current academic research of public policy and management. As the organic integration of information and communication technology (ICT) and public administration, e-government is one of the most important areas in contemporary information society. Policy information system is a basic subsystem of public policy system, its operation affects the overall effect of the policy process or even exerts a direct impact on the operation of a public policy and its success or failure. The basic principle of its operation is information collection, processing, analysis and release for a specific purpose. The function of E-government for public policy information system lies in the promotion of public access to the policy information resources, information transmission through e-participation, e-consultation in the process of policy analysis and processing of information and electronic services in policy information stored, to promote the optimization of policy information systems. However, due to many factors, the function of e-government to promote policy information system optimization has its practical limits. In the building of E-government in our country, we should take such path as adhering to the principle of freedom of information, eliminating the information divide (gap), expanding e-consultation, breaking down information silos and other major path, so as to promote the optimization of public policy information systems.Keywords: China, e-consultation, e-democracy, e-government, e-participation, ICTs, public policy information systems
Procedia PDF Downloads 8651744 Method of False Alarm Rate Control for Cyclic Redundancy Check-Aided List Decoding of Polar Codes
Authors: Dmitry Dikarev, Ajit Nimbalker, Alexei Davydov
Abstract:
Polar coding is a novel example of error correcting codes, which can achieve Shannon limit at block length N→∞ with log-linear complexity. Active research is being carried to adopt this theoretical concept for using in practical applications such as 5th generation wireless communication systems. Cyclic redundancy check (CRC) error detection code is broadly used in conjunction with successive cancellation list (SCL) decoding algorithm to improve finite-length polar code performance. However, there are two issues: increase of code block payload overhead by CRC bits and decrease of CRC error-detection capability. This paper proposes a method to control CRC overhead and false alarm rate of polar decoding. As shown in the computer simulations results, the proposed method provides the ability to use any set of CRC polynomials with any list size while maintaining the desired level of false alarm rate. This level of flexibility allows using polar codes in 5G New Radio standard.Keywords: 5G New Radio, channel coding, cyclic redundancy check, list decoding, polar codes
Procedia PDF Downloads 2381743 Attitude towards the Consumption of Social Media: Analyzing Young Consumers’ Travel Behavior
Authors: Farzana Sharmin, Mohammad Tipu Sultan, Benqian Li
Abstract:
Advancement of new media technology and consumption of social media have altered the way of communication in the tourism industry, mostly for consumers’ travel planning, online purchase, and experience sharing activity. There is an accelerating trend among young consumers’ to utilize this new media technology. This paper aims to analyze the attitude of young consumers’ about social media use for travel purposes. The convenience random sample method used to collect data from an urban area of Shanghai (China), consists of 225 young consumers’. This survey identified behavioral determinants of social media consumption by the extended theory of planned behavior (TPB). The instrument developed support on previous research to test hypotheses. The results of structural analyses indicate that attitude towards the use of social media is affected by external factors such as availability and accessibility of technology. In addition, subjective norm and perceived behavioral control have partially influenced the attitude of respondents’. The results of this study could help to improve social media travel marketing and promotional strategies for respective groups.Keywords: social media, theory of planned behavior, travel behavior, young consumer
Procedia PDF Downloads 1961742 Equivalent Circuit Representation of Lossless and Lossy Power Transmission Systems Including Discrete Sampler
Authors: Yuichi Kida, Takuro Kida
Abstract:
In a new smart society supported by the recent development of 5G and 6G Communication systems, the im- portance of wireless power transmission is increasing. These systems contain discrete sampling systems in the middle of the transmission path and equivalent circuit representation of lossless or lossy power transmission through these systems is an important issue in circuit theory. In this paper, for the given weight function, we show that a lossless power transmission system with the given weight is expressed by an equivalent circuit representation of the Kida’s optimal signal prediction system followed by a reactance multi-port circuit behind it. Further, it is shown that, when the system is lossy, the system has an equivalent circuit in the form of connecting a multi-port positive-real circuit behind the Kida’s optimal signal prediction system. Also, for the convenience of the reader, in this paper, the equivalent circuit expression of the reactance multi-port circuit and the positive- real multi-port circuit by Cauer and Ohno, whose information is currently being lost even in the world of the Internet.Keywords: signal prediction, pseudo inverse matrix, artificial intelligence, power transmission
Procedia PDF Downloads 1221741 University Short Courses Web Application Using ASP.Net
Authors: Ahmed Hariri
Abstract:
E-Learning has become a necessity in the advanced education. It is easier for the student and teacher communication also it speed up the process with less time and less effort. With the progress and the enormous development of distance education must keep up with this age of making a website that allows students and teachers to take all the advantages of advanced education. In this regards, we developed University Short courses web application which is specially designed for Faculty of computing and information technology, Rabigh, Kingdom of Saudi Arabia. After an elaborate review of the current state-of-the-art methods of teaching and learning, we found that instructors deliver extra short courses and workshop to students to enhance the knowledge of students. Moreover, this process is completely manual. The prevailing methods of teaching and learning consume a lot of time; therefore in this context, University Short courses web application will help to make process easy and user friendly. The site allows for students can view and register short courses online conducted by instructor also they can see courses starting dates, finishing date and locations. It also allows the instructor to put things on his courses on the site and see the students enrolled in the study material. Finally, student can print the certificate after finished the course online. ASP.NET, SQLSERVER, JavaScript SQL SERVER Database will use to develop the University Short Courses web application.Keywords: e-learning, short courses, ASP.NET, SQL SERVER
Procedia PDF Downloads 1341740 The Use of Hedging Devices in Studens’ Oral Presentation
Authors: Siti Navila
Abstract:
Hedging as a kind of pragmatic competence is an essential part in achieving the goal in communication, especially in academic discourse where the process of sharing knowledge among academic community takes place. Academic discourse demands an appropriateness and modesty of an author or speaker in stating arguments, to name but few, by considering the politeness, being cautious and tentative, and differentiating personal opinions and facts in which these aspects can be achieved through hedging. This study was conducted to find the hedging devices used by students as well as to analyze how they use them in their oral presentation. Some oral presentations from English Department students of the State University of Jakarta on their Academic Presentation course final test were recorded and explored formally and functionally. It was found that the most frequent hedging devices used by students were shields from all hedging devices that students commonly used when they showed suggestion, stated claims, showed opinion to provide possible but still valid answer, and offered the appropriate solution. The researcher suggests that hedging can be familiarized in learning, since potential conflicts that is likely to occur while delivering ideas in academic contexts such as disagreement, criticism, and personal judgment can be reduced with the use of hedging. It will also benefit students in achieving the academic competence with an ability to demonstrate their ideas appropriately and more acceptable in academic discourse.Keywords: academic discourse, hedging, hedging devices, lexical hedges, Meyer classification
Procedia PDF Downloads 4601739 Chinese Vocabulary Acquisition and Mobile Assisted Language Learning
Authors: Yuqing Sun
Abstract:
Chinese has been regarded as one of the most difficult languages in learning due to its complex spelling structure, difficult pronunciation, as well as its varying forms. Since vocabulary acquisition is the basic process to acquire a language, to express yourself, to compose a sentence, and to conduct a communication, so learning the vocabulary is of great importance. However, the vocabulary contains pronunciation, spelling, recognition and application which may seem as a huge work. This may pose a question for the language teachers (language teachers in China who teach Chinese to the foreign students): How to teach them in an effective way? Traditionally, teachers have no choice but teach it all by themselves, then with the development of technology, they can use computer as a tool to help them (Computer Assisted Language Learning or CALL). Now, they move into the Mobile Assisted Language Learning (MALL) method to guide their teaching, upon which the appraisal is convincing. It diversifies the learning material and the way of output, which can activate learners’ curiosity and accelerate their understanding. This paper will focus on actual case studies occurring in the universities in China of teaching the foreign students to learn Chinese, and the analysis of the utilization of WeChat channel as an example of MALL model to explore the active role of MALL to enhance the effectiveness of Chinese vocabulary acquisition.Keywords: Chinese, vocabulary acquisition, MALL, case
Procedia PDF Downloads 4141738 Antecedents of Knowledge Sharing: Investigating the Influence of Knowledge Sharing Factors towards Postgraduate Research Supervision
Authors: Arash Khosravi, Mohamad Nazir Ahmad
Abstract:
Today’s economy is a knowledge-based economy in which knowledge is a crucial facilitator to individuals, as well as being an instigator of success. Due to the impact of globalization, universities face new challenges and opportunities. Accordingly, they ought to be more innovative and have their own competitive advantages. One of the most important goals of universities is the promotion of students as professional knowledge workers. Therefore, knowledge sharing and transferring at tertiary level between students and supervisors is vital in universities, as it decreases the budget and provides an affordable way of doing research. Knowledge-sharing impact factors can be categorized into three groups, namely: organizational, individual and technical factors. There are some individual barriers to knowledge sharing, namely: lack of time and trust, lack of communication skills and social networks. IT systems such as e-learning, blogs and portals can increase knowledge sharing capability. However, it must be stated that IT systems are only tools and not solutions. Individuals are still responsible for sharing information and knowledge. This paper proposes new research model to examine the effect of individual factors and organisational factors, namely: learning strategy, trust culture, supervisory support, as well as technological factor on knowledge sharing in a research supervision process at the University of Technology Malaysia.Keywords: knowledge management, knowledge sharing, research supervision, knowledge transferring
Procedia PDF Downloads 4451737 Determination of International Jurisdiction of Courts over Disputes Arising from Electronic Consumer Contracts
Authors: Aslihan Coban
Abstract:
As a result of the rapid development of information communication technology, especially the internet, consumers have become an active party in commerce and in law. Consequently, the protection of consumers in cross-border contracts has become increasingly important. This paper is confined to the international jurisdiction of courts over disputes arising from electronic consumer contracts according to the ‘5718 Turkish Act on Private International Law and Civil Procedure’ and the ‘1215/2012 Council Regulation On Jurisdiction and The Recognition and Enforcement Of Judgments In Civil and Commercial Matters’ (Hereafter ‘Brussels I Regulation’). The international jurisdiction of courts for consumer contracts is recognized under both acts above-mentioned; however, there exist some differences between the said legal regulations. Firstly, while there is a specific provision for electronic consumer contracts in Brussels I Regulation, there is no specific provision in the Turkish Act. Secondly, under the Turkish Act, habitual residence, domicile, and workplace of the other party who is not a consumer are all accepted as jurisdiction elements; while domicile is the only jurisdiction element in Brussels I Regulation. Thirdly, the ability to make jurisdiction agreements in disputes arising from electronic consumer contracts is a controversial issue under the Turkish Act while it is explicitly regulated under Brussels I Regulation that such jurisdiction agreements can be concluded by complying with certain conditions.Keywords: Brussels I Regulation, electronic consumer contracts, jurisdiction, jurisdiction agreement
Procedia PDF Downloads 1611736 System and Method for Providing Web-Based Remote Application Service
Authors: Shuen-Tai Wang, Yu-Ching Lin, Hsi-Ya Chang
Abstract:
With the development of virtualization technologies, a new type of service named cloud computing service is produced. Cloud users usually encounter the problem of how to use the virtualized platform easily over the web without requiring the plug-in or installation of special software. The object of this paper is to develop a system and a method enabling process interfacing within an automation scenario for accessing remote application by using the web browser. To meet this challenge, we have devised a web-based interface that system has allowed to shift the GUI application from the traditional local environment to the cloud platform, which is stored on the remote virtual machine. We designed the sketch of web interface following the cloud virtualization concept that sought to enable communication and collaboration among users. We describe the design requirements of remote application technology and present implementation details of the web application and its associated components. We conclude that this effort has the potential to provide an elastic and resilience environment for several application services. Users no longer have to burden the system maintenances and reduce the overall cost of software licenses and hardware. Moreover, this remote application service represents the next step to the mobile workplace, and it lets user to use the remote application virtually from anywhere.Keywords: virtualization technology, virtualized platform, web interface, remote application
Procedia PDF Downloads 2891735 Collaborative Writing on Line with Apps During the Time of Pandemic: A Systematic Literature Review
Authors: Giuseppe Liverano
Abstract:
Today’s school iscalledupon to take the lead role in supporting students towards the formation of conscious identity and a sense of responsible citizenship, through the development of key competencies for lifelong learning A rolethatrequiresit to be ready for change and to respond to the ever new needs of students, by adopting new pedagogical and didactic models and new didactic devices. Information and Communication Technologies, in this sense, reveal themselves to be usefulresourcesthatpermit to focus attention on the learning of eachindividualstudentunderstoodas a dynamic and relational process of constructing shared and participatedmeanings. The use of collaborative writing apps represents a democratic and shared knowledge way of constructionthroughICTs. It promotes the learning of reading-writing, literacy, and the development of transversal competencies in an inclusive perspective peer-to-peer comparison and reflectionthatstimulates the transfer of thought into speech and writing, the transformation of knowledge through a trialogicalapproach to learning generates enthusiasm and strengthensmotivationItrepresents a “different” way of expressing the training needs which come from several disciplinary fields of subjects with different cultures. The contribution aims to reflect on the formative value of collaborative writing through apps and analyse some proposals on line at school during the time of pandemic in order to highlight their critical aspects and pedagogical perspectives.Keywords: collaborative writing, formative value, online, apps, pandemic
Procedia PDF Downloads 1571734 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count
Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney
Abstract:
Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python
Procedia PDF Downloads 1431733 Analysis of the Use of a NAO Robot to Improve Social Skills in Children with Autism Spectrum Disorder in Saudi Arabia
Authors: Eman Alarfaj, Hissah Alabdullatif, Huda Alabdullatif, Ghazal Albakri, Nor Shahriza Abdul Karim
Abstract:
Autism Spectrum Disorder is extensively spread amid children; it affects their social, communication and interactive skills. As robotics technology has been proven to be a significant helpful utility those able individuals to overcome their disabilities. Robotic technology is used in ASD therapy. The purpose of this research is to show how Nao robots can improve the social skills for children who suffer from autism in Saudi Arabia by interacting with the autistic child and perform a number of tasks. The objective of this research is to identify, implement, and test the effectiveness of the module for interacting with ASD children in an autism center in Saudi Arabia. The methodology in this study followed the ten layers of protocol that needs to be followed during any human-robot interaction. Also, in order to elicit the scenario module, TEACCH Autism Program was adopted. Six different qualified interaction modules have been elicited and designed in this study; the robot will be programmed to perform these modules in a series of controlled interaction sessions with the Autistic children to enhance their social skills.Keywords: humanoid robot Nao, ASD, human-robot interaction, social skills
Procedia PDF Downloads 2641732 A Multimodal Discourse Analysis of Gender Representation on Health and Fitness Magazine Cover Pages
Authors: Nashwa Elyamany
Abstract:
In visual cultures, namely that of the United States, media representations are such influential and pervasive reflections of societal norms and expectations to the extent that they impact the manner in which both genders view themselves. Health and fitness magazines fall within the realm of visual culture. Since the main goal of communication is to ensure proper dissemination of information in order for the target audience to grasp the intended messages, it becomes imperative that magazine publishers, editors, advertisers and image producers use different modes of communication within their reach to convey messages to their readers and viewers. A rapid waxing flow of multimodality floods popular discourse, particularly health and fitness magazine cover pages. The use of well-crafted cover lines and visual images is imbued with agendas, consumerist ideologies and properties capable of effectively conveying implicit and explicit meaning to potential readers and viewers. In essence, the primary goal of this thesis is to interrogate the multi-semiotic operations and manifestations of hegemonic masculinity and femininity in male and female body culture, particularly on the cover pages of the twin American magazines Men's Health and Women's Health using corpora that spanned from 2011 to the mid of 2016. The researcher explores the semiotic resources that contribute to shaping and legitimizing a new form of postmodern, consumerist, gendered discourse that positions the reader-viewer ideologically. Methodologically, the researcher carries out analysis on the macro and micro levels. On the macro level, the researcher takes on a critical stance to illuminate the ideological nature of the multimodal ensemble of the cover pages, and, on the micro level, seeks to put forward new theoretical and methodological routes through which the semiotic choices well invested on the media texts can be more objectively scrutinized. On the macro level, a 'themes' analysis is initially conducted to isolate the overarching themes that dominate the fitness discourse on the cover pages under study. It is argued that variation in terms of frequencies of such themes is indicative, broadly speaking, of which facets of hegemonic masculinity and femininity are infused in the fitness discourse on the cover pages. On the micro level, this research work encompasses three sub-levels of analysis. The researcher follows an SF-MMDA approach, drawing on a trio of analytical frameworks: Halliday's SFG for the verbal analysis; Kress & van Leeuween's VG for the visual analysis; and CMT in relation to Sperber & Wilson's RT for the pragma-cognitive analysis of multimodal metaphors and metonymies. The data is presented in terms of detailed descriptions in conjunction with frequency tables, ANOVA with alpha=0.05 and MANOVA in the multiple phases of analysis. Insights and findings from this multi-faceted, social-semiotic analysis are interpreted in light of Cultivation Theory, Self-objectification Theory and the literature to date. Implications for future research include the implementation of a multi-dimensional approach whereby linguistic and visual analytical models are deployed with special regards to cultural variation.Keywords: gender, hegemony, magazine cover page, multimodal discourse analysis, multimodal metaphor, multimodal metonymy, systemic functional grammar, visual grammar
Procedia PDF Downloads 349