Search results for: home users
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3836

Search results for: home users

1316 An Inclusion Project for Deaf Children into a Northern Italy Contest

Authors: G. Tamanza, A. Bossoni

Abstract:

84 deaf students (from primary school to college) and their families participated in this inclusion project in cooperation with numerous institutions in northern Italy (Brescia-Lombardy). Participants were either congenitally deaf or their deafness was related to other pathologies. This research promoted the integration of deaf students as they pass from primary school to high school to college. Learning methods and processes were studied that focused on encour­aging individual autonomy and socialization. The research team and its collaborators included school teachers, speech ther­apists, psychologists and home tutors, as well as teaching assistants, child neuropsychiatrists and other external authorities involved with deaf persons social inclusion programs. Deaf children and their families were supported, in terms of inclusion, and were made aware of the research team that focused on the Bisogni Educativi Speciali (BES or Special Educational Needs) (L.170/2010 - DM 5669/2011). This project included a diagnostic and evaluative phase as well as an operational one. Results demonstrated that deaf children were highly satisfied and confident; academic performance improved and collaboration in school increased. Deaf children felt that they had access to high school and college. Empowerment for the families of deaf children in terms of networking among local services that deal with the deaf also improved while family satisfaction also improved. We found that teachers and those who gave support to deaf children increased their professional skills. Achieving autonomy, instrumental, communicative and relational abilities were also found to be crucial. Project success was determined by temporal continuity, clear theoretical methodology, strong alliance for the project direction and a resilient team response.

Keywords: autonomy, inclusion, skills, well-being

Procedia PDF Downloads 283
1315 Challenges and Opportunities for M-Government Implementation in Saudi Arabia

Authors: A. Alssbaiheen, S. Love

Abstract:

Mobile government (m-government) is one of the promising technologies for developing the governance of developing countries. While developing countries often have less advanced internet infrastructure compared to the developed world, mobile phone penetration is very high in the Gulf Cooperation Council (GCC) countries and mobile internet use offers a means to transcend traditional logistical barriers to accessing government services. The study explores the challenges and opportunities of the mobile government in Saudi Arabia. Semi-structured interviews were conducted with a diverse cohort of Saudi mobile users. A total of 77 semi-structured interviews were collected and subsequently analysed using open, axial, and selective coding. The participants’ responses revealed that many opportunities exist for the development of m-government in Saudi Arabia, including high popular awareness of government initiatives in e-government, and willingness to use such services, largely due to the time-saving and convenience aspects it offers compared with traditional bureaucratic services. However, numerous barriers were identified, including the low quality and speed of the internet, service customization, and concerns about privacy data security. It was also felt that in addition to infrastructure challenges, the traditional bureaucratic attitude of government department would itself hinder the effective deployment and utilization of m-government services.

Keywords: awareness, barriers, challenges, government services, mobile government, m-government, opportunities

Procedia PDF Downloads 461
1314 Study of Incubation Centres and Its Role in Fostering Entrepreneurship in India with Special Reference to Centres Set up in IIMs/IITs

Authors: Kalpeshkumar L. Gupta, Shivali Rathore

Abstract:

India is home to over 30 crore rural poor, aware of the criticality of the situation that has made to come with an innovative business idea. Entrepreneurship in India is on the verge of explosive growth and which is actually need of an hour for employment generation, poverty elevation at grass root through developmental intervention. India economic progress has started from the development of its small and medium scale enterprises to ensure that the sectors continues to stay competitive and achieve sustained growth in the era of global economy many incubators centers has been established with the mission to give the encouragement to many innovative ideas. If we define an Incubator, it is simply an enclosed apparatus in which premature small babies are placed and which provides a controlled and protective environment for their care this gives them a chance to adjust to outside environment, and grow stronger before they face the outside world. In a similar way the startup entrepreneur’s business idea is incubated in the incubation centers. Entrepreneurship has been conventionally rated as risky career, to break the myth and to augment the supply of new entrepreneurs through education; research training the incubation centers has been established, their goal is to help create and grow young businesses by providing them with necessary support and financial and technical services. The startup companies spend on an average two years in a business incubator during which numerous benefits like funding, office space, equipment’s etc. is provided by the incubators to the startup business. Present paper will study the background, role, objectives of different incubators set up in Indian Institute of Management (IIMs) and Indian Institute of Technology (IITs) for our study.

Keywords: incubation centres, entrepreneurship, Indian Institute of Management, Indian Institute of Technology

Procedia PDF Downloads 254
1313 Mental Health Representation in Video Games

Authors: Leonid Rybakovski

Abstract:

Contemporary media offer a variety of themes for the diverse tastes of their audiences. The Digital games medium was mostly perceived as an instrument of entertainment. But being a part of global trends while constantly pushing the boundaries of storytelling in virtual reality and standing on the edge of technology also brings huge responsibility for game designers around the globe. A very recent emerging topic over the last years was an individual's mental state. In recent years there has been a shift in mental problems representations in commercial game releases such as Hell blade: Senua's Sacrifice and Sea of Solitude. The aim of this study is to research the approach of mental illness representation in media and digital games over the years and to suggest alternatives for putting characters who suffer from mental illness at the forefront of the storyline. This study traces dominant representations of characters with mental illness in digital games, reflecting the major change of the game industry toward inclusiveness. At the same time, the research embraces a hybrid approach to the academic study of digital games and includes the development of a game that follows a post-traumatic young girl, forcing the users to live her life through her eyes. The game prototype was developed as part of the Mdes Game Design and Development program and consisted of academic research and game development practices.

Keywords: framing analysis, mental condition, up keying, game mechanics

Procedia PDF Downloads 169
1312 A Recommender System for Dynamic Selection of Undergraduates' Elective Courses

Authors: Adewale O. Ogunde, Emmanuel O. Ajibade

Abstract:

The task of selecting a few elective courses from a variety of available elective courses has been a difficult one for many students over the years. In many higher institutions, guidance and counselors or level advisers are usually employed to assist the students in picking the right choice of courses. In reality, these counselors and advisers are most times overloaded with too many students to attend to, and sometimes they do not have enough time for the students. Most times, the academic strength of the student based on past results are not considered in the new choice of electives. Recommender systems implement advanced data analysis techniques to help users find the items of their interest by producing a predicted likeliness score or a list of top recommended items for a given active user. Therefore, in this work, a collaborative filtering-based recommender system that will dynamically recommend elective courses to undergraduate students based on their past grades in related courses was developed. This approach employed the use of the k-nearest neighbor algorithm to discover hidden relationships between the related courses passed by students in the past and the currently available elective courses. Real students’ results dataset was used to build and test the recommendation model. The developed system will not only improve the academic performance of students, but it will also help reduce the workload on the level advisers and school counselors.

Keywords: collaborative filtering, elective courses, k-nearest neighbor algorithm, recommender systems

Procedia PDF Downloads 157
1311 The Design and Applied of Learning Management System via Social Media on Internet: Case Study of Operating System for Business Subject

Authors: Pimploi Tirastittam, Sawanath Treesathon, Amornrath Ongkawat

Abstract:

Learning Management System (LMS) is the system which uses to manage the learning in order to grouping the content and learning activity between the lecturer and learner including online examination and evaluation. Nowadays, it is the borderless learning era so the learning activities can be accessed from everywhere in the world and also anytime via the information technology and media. The learner can easily access to the knowledge so the different in time and distance is not a constraint for learning anymore. The learning pattern which was used in this research is the integration of the in-class learning and online learning via internet and will be able to monitor the progress by the Learning management system which will create the fast response and accessible learning process via the social media. In order to increase the capability and freedom of the learner, the system can show the current and history of the learning document, video conference and also has the chat room for the learner and lecturer to interact to each other. So the objectives of the “The Design and Applied of Learning Management System via Social Media on Internet: Case Study of Operating System for Business Subject” are to expand the opportunity of learning and to increase the efficiency of learning as well as increase the communication channel between lecturer and student. The data of this research was collect from 30 users of the system which are students who enroll in the subject. And the result of the research is in the “Very Good” which is conformed to the hypothesis.

Keywords: Learning Management System, social media, Operating System, information technology

Procedia PDF Downloads 347
1310 Fourier Transform and Machine Learning Techniques for Fault Detection and Diagnosis of Induction Motors

Authors: Duc V. Nguyen

Abstract:

Induction motors are widely used in different industry areas and can experience various kinds of faults in stators and rotors. In general, fault detection and diagnosis techniques for induction motors can be supervised by measuring quantities such as noise, vibration, and temperature. The installation of mechanical sensors in order to assess the health conditions of a machine is typically only done for expensive or load-critical machines, where the high cost of a continuous monitoring system can be Justified. Nevertheless, induced current monitoring can be implemented inexpensively on machines with arbitrary sizes by using current transformers. In this regard, effective and low-cost fault detection techniques can be implemented, hence reducing the maintenance and downtime costs of motors. This work proposes a method for fault detection and diagnosis of induction motors, which combines classical fast Fourier transform and modern/advanced machine learning techniques. The proposed method is validated on real-world data and achieves a precision of 99.7% for fault detection and 100% for fault classification with minimal expert knowledge requirement. In addition, this approach allows users to be able to optimize/balance risks and maintenance costs to achieve the highest bene t based on their requirements. These are the key requirements of a robust prognostics and health management system.

Keywords: fault detection, FFT, induction motor, predictive maintenance

Procedia PDF Downloads 158
1309 Energy Efficient Lighting in Educational Buildings through the Example of a High School in Istanbul

Authors: Nihan Gurel Ulusan

Abstract:

It is obvious that electrical energy, which is an inseparable part of modern day’s human and also the most important power source of our age, should be generated on a level that will suffice the nation’s requirements. The electrical energy used for a sustainable architectural design should be reduced as much as possible. Designing the buildings as energy efficient systems which aim at reducing the artificial illumination loads has been a current subject of our times as a result of concepts gaining importance like conscious consumption of energy sources, environment-friendly designs and sustainability. Reducing the consumption of electrical energy regarding the artificial lighting carries great significance, especially in the volumes which are used all day long like the educational buildings. Starting out with such an aim in this paper, the educational buildings are explored in terms of energy efficient lighting. Firstly, illumination techniques, illumination systems, light sources, luminaries, illumination controls and 'efficient energy' usage in lighting are mentioned. In addition, natural and artificial lighting systems used in educational buildings and also the spaces building up these kind buildings are examined in terms of energy efficient lighting. Lastly, the illumination properties of the school sample chosen for this study, Kağıthane Anadolu Lisesi, a typical high school in Istanbul, is observed. Suggestions are made in order to improve the system by evaluating the illumination properties of the classes with the survey carried out with the users.

Keywords: educational buildings, energy efficient, illumination techniques, lighting

Procedia PDF Downloads 275
1308 Childhood Warscape, Experiences from Children of War Offer Key Design Decisions for Safer Built Environments

Authors: Soleen Karim, Meira Yasin, Rezhin Qader

Abstract:

Children’s books present a colorful life for kids around the world, their current environment or what they could potentially have- a home, two loving parents, a playground, and a safe school within a short walk or bus ride. These images are only pages in a donated book for children displaced by war. The environment they live in is significantly different. Displaced children are faced with a temporary life style filled with fear and uncertainty. Children of war associate various structural institutions with a trauma and cannot enter the space, even if it is for their own future development, such as a school. This paper is a collaborative effort with students of the Kennesaw State University architecture department, architectural designers and a mental health professional to address and link the design challenges and the psychological trauma for children of war. The research process consists of a) interviews with former refugees, b) interviews with current refugee children, c) personal understanding of space through one’s own childhood, d) literature review of tested design methods to address various traumas. Conclusion: In addressing the built environment for children of war, it is necessary to address mental health and well being through the creation of space that is sensitive to the needs of children. This is achieved by understanding critical design cues to evoke normalcy and safe space through program organization, color, and symbiosis of synthetic and natural environments. By involving the children suffering from trauma in the design process, aspects of the design are directly enhanced to serve the occupant. Neglecting to involve the participants creates a nonlinear design outcome and does not serve the needs of the occupant to afford them equal opportunity learning and growth experience as other children around the world.

Keywords: activist architecture, childhood education, childhood psychology, adverse childhood experiences

Procedia PDF Downloads 133
1307 Key Drivers Influencing the Shopping Behaviour of Customers in Retail Store

Authors: Aamir Hasan, Subhash Mishra

Abstract:

The purpose of the study was to determine the key drivers which influence the shopping behavior of the customers in the retail store. In today‟s competitive world with increasing number of retail stores, the retailers need to be more customer oriented. Retail has changed and expanded in all lines of business, be it apparel,jewelry, footwear, groceries etc. The modern consumer is posing a challenging task for the Indian retailer. More aware, more confident and much more demanding, therefore the retailers are looking for ways to deliver better consumer value and to increase consumer purchase intention. Retailers tend to differentiate themselves by making their service easier to consumers. The study aims to study the key drivers that can influence shopping behavior in retail store. A survey (store intercept) method was employed to elicit primary information from 300 shoppers in different retail stores of Lucknow. The findings reveal the factors that play a greater role in influencing the shopping behavior of customers in retail store. As such, a survey of retail store customers‟ attitude towards reduced price, sales promotion, quality of the products, proximity to the home, customer service, store atmospherics were analyzed to identify the key drivers influencing shopping behavior in retail store. A questionnaire based on a five-item Likert scale, as well as random sampling, was employed for data collection. Data analysis was accomplished using SPSS software. The paper has found shopping experience, store image and value for money as three important variable out of which shopping experience emerged as a dominant factor which influences the consumer's shopping behavior in the retail store. Since the research has established empirical evidences in determining the key drivers which influences the shopping behavior of the customers in the retail store, it serves as a foundation for a deeper probe into the shopping behavior of the customers in the retail store research domain in the Indian context.

Keywords: retail, shopping, customers, questionnaire

Procedia PDF Downloads 416
1306 Empowering Certificate Management with Blockchain Technology

Authors: Yash Ambekar, Kapil Vhatkar, Prathamesh Swami, Kartikey Singh, Yashovardhan Kaware

Abstract:

The rise of online courses and certifications has created new opportunities for individuals to enhance their skills. However, this digital transformation has also given rise to coun- terfeit certificates. To address this multifaceted issue, we present a comprehensive certificate management system founded on blockchain technology and strengthened by smart contracts. Our system comprises three pivotal components: certificate generation, authenticity verification, and a user-centric digital locker for certificate storage. Blockchain technology underpins the entire system, ensuring the immutability and integrity of each certificate. The inclusion of a cryptographic hash for each certificate is a fundamental aspect of our design. Any alteration in the certificate’s data will yield a distinct hash, a powerful indicator of potential tampering. Furthermore, our system includes a secure digital locker based on cloud storage that empowers users to efficiently manage and access all their certificates in one place. Moreover, our project is committed to providing features for certificate revocation and updating, thereby enhancing the system’s flexibility and security. Hence, the blockchain and smart contract-based certificate management system offers a robust and one-stop solution to the escalating problem of counterfeit certificates in the digital era.

Keywords: blockchain technology, smart contracts, counterfeit certificates, authenticity verification, cryptographic hash, digital locker

Procedia PDF Downloads 41
1305 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories

Authors: Umesh Kumar Singh, Chanchala Joshi

Abstract:

With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.

Keywords: CVSS score, risk level, security measurement, vulnerability category

Procedia PDF Downloads 318
1304 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 123
1303 Impact of Advertisement on Audience Retention of YouTube Comedy Skits – The Most Watched Content on YouTube in Lagos, Nigeria

Authors: Igbozuruike Chigozie Jude, Agwu Agwu Ejem

Abstract:

This study investigated that advertisement has an impact on audience retention on YouTube Comedy skits, which is the most watched content on YouTube in Lagos, Nigeria. The main objective was to determine if the advertisements affect the average number of times they spend watching YouTube comedy skits. The study was anchored on Festinger's (1952) cognitive dissonance theory. The research method for this exercise was a survey to get responses from people in Lagos state on how they react to the advertisements they face when watching YouTube comedy skits in Lagos state. The sample size derived from the Krejcie and Morgan (1970) Table was 384 YouTube users. The instrument that was used to gather data was a questionnaire. The findings showed that the adverts have far-reaching exposure by the target audience, but most of the audience perceived them to be intrusive. It was also found that there is not enough evidence to infer that advertisement is indeed impacting audience retention on YouTube comedy skits in Lagos, Nigeria. The reason is that, for a majority of the audience, adverts do not essentially affect their retention on those skits, but for a considerable percentage (34%), these adverts do break their concentration and affect how much time they end up spending on the YouTube comedy skits. It was recommended that, among others, there should be regular monitoring and adaptation of YouTube advertisements to the audience preferences and behaviors of the audience. Insights on changes or trends in audience preferences can be gained through surveys.

Keywords: advertisement, audience, YouTube, comedy skits, Lagos Nigeria

Procedia PDF Downloads 72
1302 ADA Tool for Satellite InSAR-Based Ground Displacement Analysis: The Granada Region

Authors: M. Cuevas-González, O. Monserrat, A. Barra, C. Reyes-Carmona, R.M. Mateos, J. P. Galve, R. Sarro, M. Cantalejo, E. Peña, M. Martínez-Corbella, J. A. Luque, J. M. Azañón, A. Millares, M. Béjar, J. A. Navarro, L. Solari

Abstract:

Geohazard prone areas require continuous monitoring to detect risks, understand the phenomena occurring in those regions and prevent disasters. Satellite interferometry (InSAR) has come to be a trustworthy technique for ground movement detection and monitoring in the last few years. InSAR based techniques allow to process large areas providing high number of displacement measurements at low cost. However, the results provided by such techniques are usually not easy to interpret by non-experienced users hampering its use for decision makers. This work presents a set of tools developed in the framework of different projects (Momit, Safety, U-Geohaz, Riskcoast) and an example of their use in the Granada Coastal area (Spain) is shown. The ADA (Active Displacement Areas) tool have been developed with the aim of easing the management, use and interpretation of InSAR based results. It provides a semi-automatic extraction of the most significant ADAs through the application ADAFinder tool. This tool aims to support the exploitation of the European Ground Motion Service (EU-GMS), which will provide consistent, regular and reliable information regarding natural and anthropogenic ground motion phenomena all over Europe.

Keywords: ground displacements, InSAR, natural hazards, satellite imagery

Procedia PDF Downloads 202
1301 A Study on the Impact of Covid-19 on Primary Healthcare Workers in Ekiti State, South-West Nigeria

Authors: Adeyinka Adeniran, Omowunmi Bakare, Esther Oluwole, Florence Chieme, Temitope Durojaiye, Modupe Akinyinka, Omobola Ojo, Babatunde Olujobi, Marcus Ilesanmi, Akintunde Ogunsakin

Abstract:

Introduction: Globally, COVID-19 has greatly impacted the human race physically, socially, mentally, and economically. However, healthcare workers seemed to bear the greatest impact. The study, therefore, sought to assess the impact of COVID-19 on the primary healthcare workers in Ekiti, South-west Nigeria. Methods: The study was a cross-sectional descriptive study using a quantitative data collection method of 716 primary healthcare workers in Ekiti state. Respondents were selected using an online convenience sampling method via their social media platforms. Data was collected, collated, and analyzed using SPSS version 25 software and presented as frequency tables, mean and standard deviation. Bivariate and multivariate analyses were conducted using a t-test, and the level of statistical significance was set at p<0.05. Results: Less than half (47.1%) of respondents were between 41-50 age group and a mean age of 44.4+6.4SD. A majority (89.4%) were female, and almost all (96.2%) were married. More than (90%) had ever heard of Coronavirus, and (85.8%) had to spend more money on activities of daily living such as transportation (90.1%), groceries (80.6%), assisting relations (95.8%) and sanitary measures (disinfection) at home (95.0%). COVID-19 had a huge negative impact on about (89.7%) of healthcare workers, with a mean score of 22+4.8. Conclusion: COVID-19 negatively impacted the daily living and professional duties of primary healthcare workers, which reflected their psychological, physical, social, and economic well-being. Disease outbreaks are unlikely to disappear in the near future. Hence, global proactive interventions and homegrown measures should be adopted to protect healthcare workers and save lives.

Keywords: Covid-19, health workforce, primary health care, health systems, depression

Procedia PDF Downloads 77
1300 Impact of Charging PHEV at Different Penetration Levels on Power System Network

Authors: M. R. Ahmad, I. Musirin, M. M. Othman, N. A. Rahmat

Abstract:

Plug-in Hybrid-Electric Vehicle (PHEV) has gained immense popularity in recent years. PHEV offers numerous advantages compared to the conventional internal-combustion engine (ICE) vehicle. Millions of PHEVs are estimated to be on the road in the USA by 2020. Uncoordinated PHEV charging is believed to cause severe impacts to the power grid; i.e. feeders, lines and transformers overload and voltage drop. Nevertheless, improper PHEV data model used in such studies may cause the findings of their works is in appropriated. Although smart charging is more attractive to researchers in recent years, its implementation is not yet attainable on the street due to its requirement for physical infrastructure readiness and technology advancement. As the first step, it is finest to study the impact of charging PHEV based on real vehicle travel data from National Household Travel Survey (NHTS) and at present charging rate. Due to the lack of charging station on the street at the moment, charging PHEV at home is the best option and has been considered in this work. This paper proposed a technique that comprehensively presents the impact of charging PHEV on power system networks considering huge numbers of PHEV samples with its traveling data pattern. Vehicles Charging Load Profile (VCLP) is developed and implemented in IEEE 30-bus test system that represents a portion of American Electric Power System (Midwestern US). Normalization technique is used to correspond to real time loads at all buses. Results from the study indicated that charging PHEV using opportunity charging will have significant impacts on power system networks, especially whereas bigger battery capacity (kWh) is used as well as for higher penetration level.

Keywords: plug-in hybrid electric vehicle, transportation electrification, impact of charging PHEV, electricity demand profile, load profile

Procedia PDF Downloads 279
1299 Benefits of Occupational Therapy for Children with Intellectual Disabilities in the Aspects of Vocational Activities and Instrumental Activities of Daily Life

Authors: Shakhawath Hossain, Tazkia Tahsin

Abstract:

Introduction/Background: Intellectual disability is a disability characterized by significant limitations both in intellectual functioning and in adaptive behavior, which covers many everyday social and practical skills. Vocational education is a multi-professional approach that is provided to individuals of working age with health-related impairments, limitations, or restrictions with work functioning and whose primary aim is to optimize work participation. Instrumental Activities of Daily Living activities to support daily life within the home and community. Like as community mobility, financial management, meal preparation, and clean-up, shopping. Material and Method: Electronic searches of Medline, PubMed, Google scholar, OT Seeker literature using the key terms of intellectual disability, vocational rehabilitation, instrumental activities of daily living and Occupational Therapy, as well as a thorough manual search for relevant literature. Results: There were 13 articles, all qualitative and quantitative, which are included in this review. All studies were mixed methods in design. To take the Occupational Therapy services, there is a significant improvement in their children's various areas like as sensory issues, cognitive abilities, perceptual skills, visual, motor planning, and group therapy. After taking the vocational and instrumental activities of daily living training children with intellectual disabilities to participate in their daily activities and work as an employee different company or organizations. Conclusion: The persons with intellectual disability are an integral part of our society who deserves social support and opportunities like other human beings. From the result section of the project papers, it is found that the significant benefits of Occupational Therapy services in the aspects of vocational and instrumental activities of daily living.

Keywords: occupational therapy, daily living activities, intellectual disabilities, instrumental ADL

Procedia PDF Downloads 126
1298 Robot Control by ERPs of Brain Waves

Authors: K. T. Sun, Y. H. Tai, H. W. Yang, H. T. Lin

Abstract:

This paper presented the technique of robot control by event-related potentials (ERPs) of brain waves. Based on the proposed technique, severe physical disabilities can free browse outside world. A specific component of ERPs, N2P3, was found and used to control the movement of robot and the view of camera on the designed brain-computer interface (BCI). Users only required watching the stimuli of attended button on the BCI, the evoked potentials of brain waves of the target button, N2P3, had the greatest amplitude among all control buttons. An experimental scene had been constructed that the robot required walking to a specific position and move the view of camera to see the instruction of the mission, and then completed the task. Twelve volunteers participated in this experiment, and experimental results showed that the correct rate of BCI control achieved 80% and the average of execution time was 353 seconds for completing the mission. Four main contributions included in this research: (1) find an efficient component of ERPs, N2P3, for BCI control, (2) embed robot's viewpoint image into user interface for robot control, (3) design an experimental scene and conduct the experiment, and (4) evaluate the performance of the proposed system for assessing the practicability.

Keywords: severe physical disabilities, robot control, event-related potentials (ERPs), brain-computer interface (BCI), brain waves

Procedia PDF Downloads 366
1297 Effective Strategies Migrants Adopted to Improve Food Security in a Regional Area of Australia

Authors: Joanne Sin Wei Yeoh, Quynh Lê, Daniel R. Terry, Rosa Mc Manamey

Abstract:

Food security is a global issue and one of the concerns in Australia, particularly in regional and rural areas. Despite Australia’s current ability to produce enough food to feed more than its current population, evidence has been accumulating over the last decade to demonstrate many Australians struggle to feed themselves, including immigrants from cultural and linguistically diverse (CALD) backgrounds. This study aims to identify the acculturation strategies used by migrants to enhance their approach to food security in Tasmania. The study employed a mixed methods approach that used both questionnaires and semi-structured interviews with migrants living in Tasmania. Descriptive and inferential statistics was used to analyse data collected from questionnaire, whereas, thematic analysis was employed to analyse the interview data. Migrants (n=301) completed the questionnaire with a response rate of 50.2% and 33 follow-up interviews were conducted. We found that majority of the migrants (70.0%) replaced food ingredients and went without the food they could not buy from shops with similar ingredients. Support and advice from friends were effective ways to improve their food access. Additionally, length of stays in Tasmania and region of origin were significantly associated with the ways migrants dealing with food security. The interview results revealed that migrants managed to adapt to the new food culture by using different acculturation strategies, including access food ingredients from other country; adjusting or adapting; home gardening and access to technology. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. To summarize, migrants employed different strategies for food security while acculturating into the new environment. Our findings could become the guidelines for migrants and relevant government or private sectors that address food security.

Keywords: food security, migrants, strategies, inferential statistics

Procedia PDF Downloads 520
1296 Investigating the Relative Priority of the Factors Affecting Customer Satisfaction in Gaining the Competitive Advantage in Pars-Khazar Company

Authors: Samaneh Pouyanfar, Michael Oliff

Abstract:

The industry of home appliances may beone of theindustries which has the highest competition, and actually what can guarantee the survival of this industry is discovering the superior services. A trend to provide quality products and services plays an important role in this industry because discovering the services is counted as a vital affair for Manufacturing Organizations’ survival and profitability. Given the importance of the topic, this paper attempts to investigate the relative priority of the factors influencing the customer satisfaction in gaining the competitive advantage in Pars-Khazar Company. In sum, 96 executives of Pars-Khazar Company where investigated in a census. For this purpose, after reviewing the research literature and performing deep interviews between pundits and experts active in the industry, the research questionnaire was made based on variables affecting customer satisfaction and components determining business competitive advantage. Determining the content validity took place by judgement of the experts. The reliability of each structure was measured based on Cronbach’s alpha coefficient. Since the value of Cronbach's alpha was higher than 0.7 for each structure, internal consistency of statements was high and the reliability of the questionnaire was acceptable. The data analysis was also done with Kulmgrf-asmyrnf test and Friedman test using SPSS software. The results showed that in dimension of factors affecting customer satisfaction, the History of trade name (brand), Familiarity with the product brand, Brand reputation and Safety have the highest value of priority respectively, and the variable of firm growth has the highest value of priority among the components determining the performance of competitive advantage.

Keywords: customer satisfaction, competitive advantage, brand history, safety, growth

Procedia PDF Downloads 224
1295 The Correlation of Environmental Risk Factors with Malaria at Tasikmalaya District, 2013

Authors: Destriyanti Sugiarti, Ririn A Wulandari

Abstract:

Background: Malaria disease was widespread in many countries, both tropical and sub-tropical. Tasikmalaya is a region that experienced an increase in malaria cases over the last 5 years and highest in 2013, a total of 168 positive cases of malaria. Tasikmalaya region consists of coastal and mountain areas, it has a potential place for Anopheles mosquito breeding, i.e swamp, lagoon, andrice fields.The purpose of this study was to determine the correlation of environmental risk factors with the incidence of malaria in Tasikmalaya. Methods: The design of the study is case control study with 140 samples in 5 sub-district (Cineam, Cikatomas, Cipatujah, Salopa, and Jatiwaras). This study examines the environmental factors that influence the incidence of malaria in Tasikmalaya District in 2013. The research used 14 variables: individual characteristics (education, knowledge, occupation) and environmental risk factors (mobility to endemic areas, use mosquito nets, use of wire gauze at home, use mosquito repellent, repellent use, the presence of a large animal in a cage, breeding place, the presence of larvae, temperature and humidity chamber). Results: Results demonstrated an association between occupation (0.22; 0.10-0.47), the mobility of the population to the endemic areas (37.4; 14.29-98.18) ,the presence of larvae (5.26; 1.41-19.74), and the room temperature with optimum temperature for mosquito breeding is 25-30oC (3.25; 1.62- 6.50). Conclusion: The dominant factor affecting the spread of malaria in Tasikmalaya is the mobility of the population to endemic areas. The results of the study suggest migration survey conducted activity and health promotion for preventive efforts against malaria in malaria-endemic areas, and to encourage people to behave healthy life by freeing environment of mosquito larvae and protect themselves from mosquito bites.

Keywords: Environmental risk factors, malaria, correlation, Anopheles

Procedia PDF Downloads 437
1294 Automated Testing to Detect Instance Data Loss in Android Applications

Authors: Anusha Konduru, Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

Mobile applications are increasing in a significant amount, each to address the requirements of many users. However, the quick developments and enhancements are resulting in many underlying defects. Android apps create and handle a large variety of 'instance' data that has to persist across runs, such as the current navigation route, workout results, antivirus settings, or game state. Due to the nature of Android, an app can be paused, sent into the background, or killed at any time. If the instance data is not saved and restored between runs, in addition to data loss, partially-saved or corrupted data can crash the app upon resume or restart. However, it is difficult for the programmer to manually test this issue for all the activities. This results in the issue of data loss that the data entered by the user are not saved when there is any interruption. This issue can degrade user experience because the user needs to reenter the information each time there is an interruption. Automated testing to detect such data loss is important to improve the user experience. This research proposes a tool, DroidDL, a data loss detector for Android, which detects the instance data loss from a given android application. We have tested 395 applications and found 12 applications with the issue of data loss. This approach is proved highly accurate and reliable to find the apps with this defect, which can be used by android developers to avoid such errors.

Keywords: Android, automated testing, activity, data loss

Procedia PDF Downloads 229
1293 Research Methodology and Mixed Methods (Qualitative and Quantitative) for Ph.D. Construction Management – Post-Disaster Reconstruction

Authors: Samuel Quashie

Abstract:

Ph.D. Construction Management methodology and mixed methods are organized to guide the researcher to assemble and assess data in the research activities. Construction management research is close to business management and social science research. It also contributes to researching the phenomenon and answering the research question, generating an integrated management system for post-disaster reconstruction in construction and related industries. Research methodology and methods drive the research to achieve the goal or goals, contribute to knowledge, or increase knowledge. This statement means the research methodology, mixed methods, aim, objectives, and processes address the research question, facilitate its achievement and foundation to conduct the study. Mixed methods use project-based case studies, interviews, observations, literature and archival document reviews, research questionnaires, and surveys, and evaluation of integrated systems used in the construction industry and related industries to address the research work. The research mixed methods (qualitative, quantitative) define the research topic and establish a more in-depth study. The research methodology is action research, which involves the collaboration of participants and service users to collect and evaluate data, studying the phenomenon, research question(s) to improve the situation in post-disaster reconstruction phase management.

Keywords: methodology, Ph.D. research, post-disaster reconstruction, mixed-methods qualitative and quantitative

Procedia PDF Downloads 224
1292 A Fuzzy Inference System for Predicting Air Traffic Demand Based on Socioeconomic Drivers

Authors: Nur Mohammad Ali, Md. Shafiqul Alam, Jayanta Bhusan Deb, Nowrin Sharmin

Abstract:

The past ten years have seen significant expansion in the aviation sector, which during the previous five years has steadily pushed emerging countries closer to economic independence. It is crucial to accurately forecast the potential demand for air travel to make long-term financial plans. To forecast market demand for low-cost passenger carriers, this study suggests working with low-cost airlines, airports, consultancies, and governmental institutions' strategic planning divisions. The study aims to develop an artificial intelligence-based methods, notably fuzzy inference systems (FIS), to determine the most accurate forecasting technique for domestic low-cost carrier demand in Bangladesh. To give end users real-world applications, the study includes nine variables, two sub-FIS, and one final Mamdani Fuzzy Inference System utilizing a graphical user interface (GUI) made with the app designer tool. The evaluation criteria used in this inquiry included mean square error (MSE), accuracy, precision, sensitivity, and specificity. The effectiveness of the developed air passenger demand prediction FIS is assessed using 240 data sets, and the accuracy, precision, sensitivity, specificity, and MSE values are 90.83%, 91.09%, 90.77%, and 2.09%, respectively.

Keywords: aviation industry, fuzzy inference system, membership function, graphical user interference

Procedia PDF Downloads 66
1291 Acoustic Echo Cancellation Using Different Adaptive Algorithms

Authors: Hamid Sharif, Nazish Saleem Abbas, Muhammad Haris Jamil

Abstract:

An adaptive filter is a filter that self-adjusts its transfer function according to an optimization algorithm driven by an error signal. Because of the complexity of the optimization algorithms, most adaptive filters are digital filters. Adaptive filtering constitutes one of the core technologies in digital signal processing and finds numerous application areas in science as well as in industry. Adaptive filtering techniques are used in a wide range of applications, including adaptive noise cancellation and echo cancellation. Acoustic echo cancellation is a common occurrence in today’s telecommunication systems. The signal interference caused by acoustic echo is distracting to both users and causes a reduction in the quality of the communication. In this paper, we review different techniques of adaptive filtering to reduce this unwanted echo. In this paper, we see the behavior of techniques and algorithms of adaptive filtering like Least Mean Square (LMS), Normalized Least Mean Square (NLMS), Variable Step-Size Least Mean Square (VSLMS), Variable Step-Size Normalized Least Mean Square (VSNLMS), New Varying Step Size LMS Algorithm (NVSSLMS) and Recursive Least Square (RLS) algorithms to reduce this unwanted echo, to increase communication quality.

Keywords: adaptive acoustic, echo cancellation, LMS algorithm, adaptive filter, normalized least mean square (NLMS), variable step-size least mean square (VSLMS)

Procedia PDF Downloads 71
1290 Analyzing the Food as a Form of Creativity: The Case of the Bijlmermeer in Amsterdam-Zuidoost

Authors: Marc Polo, Núria Arbonés Arán

Abstract:

Amsterdam is considered one of the great European capitals, which concentrates the headquarters of various multinational companies and which, in addition, enjoys a huge tourist attraction. Its typical residential buildings next to the canals, the museums, or its striking "Red Light District" are a great focus of attraction. In 2019 almost 9 million tourists visited it, but few of them traveled to the farthest neighborhood in the city: Amsterdam-Zuidoost (Amsterdam-Southeast). This neighborhood is geographically separated from the urban core, which makes it an exclave of Amsterdam as it does not border any of the other boroughs. Bijlmermeer neighborhood is the largest of the Amsterdam-Zuidoost, and it was born in the 1960s with the expectations of becoming the city of the future. Its main architect, Siegfried Nassuth, was inspired by the Swiss Le Corbusier to design nearly 18,000 homes, most of which were in high-rise tower blocks and built together, forming a recognizable "honeycombed" pattern. For more than 40 years, a series of infrastructure and social vicissitudes have made the neighborhood outline quite different as it was expected to be. It helped also varied elements such as ethnicity, demolitions, or unoccupied apartments. The called “city of the future” became home to immigrants, drug addicts, and vandals, and the conflicts denigrated the Amsterdam-Zuidoost. This work analyzes the evolution of the Bijlmermeer from its origins and illustrates relevant international referents able to help the area. The purpose of the work is to show how different variations along the recent history didn't help enough, but how there are positive perspectives for the future taking advantage of the food as a creative issue. The research, based on academic literature, existing material in different stadiums, plus the analysis of the city imaginaries, will help to concrete relevant elements in terms of innovation, creativity, and disruption. Despite of radical renewal that is taking place, the research will demonstrate that there are still new opportunities for the old Bijlmermeer.

Keywords: amsterdam, bijlmermeer, creativity, food

Procedia PDF Downloads 113
1289 Gender Identify and Agency of Traumatized Subjects in Incestuous Family

Authors: Jenyu Peng

Abstract:

Incestuous abuse can be considered a form of domestic violence that exemplifies gender inequality. It challenges the common image of home as “haven of safety”. In Taiwan, even after years of feminist NGOs’ effort to encourage victims to speak up, the shared cultural representations of family, still praising piety towards the parents, seem to keep the incest trauma in secret. As clinical practitioners have observed, most devastating psychological sequels of incest trauma are often related to silencing. Thus one can expect that in families centered cultures, the difficulties for victims to disclose are greater, and the traumatic consequences more severe. This poses crucial therapeutic issues for clinicians working in those cultures. Since 2009, the author, a trained psychoanalyst and researcher, has been conducting “clinical fieldwork” on incest trauma in Taiwan. Employing ethnographical method, our theoretical references are both psychoanalytical and anthropological. The necessity of interdisciplinary efforts in incest trauma research will be addressed and discussed. The analyses of the present paper will focus on five incestuous families: four Han families, and one aboriginal. Although Taiwanese aboriginal peoples have been pretty much sinicized since decades, it is worth observing the convergent and divergent aspects in these two cultures. Moreover, findings of a previous research conducted in France during 2002-2004 will serve as background for the purpose of comparison. The results will be presented along with three questions: 1) How the perception of family influences the process of disclosure? 2) How the incestuous experience comes into play with victims’ gender identity and sexuality, pivotal for the subjectification? 3) How victims more successful in gendered subjectification modify their dynamics with their traumatizing family? This research finds that most victims tend to defend their own incestuous families, and that victims’ subjectivity and agency are actually entangled in the power structure of incestuous family.

Keywords: incestuous family, subjectification, gender identity, agency

Procedia PDF Downloads 347
1288 Teaching Techno-Criticism to Digital Natives: Participatory Journalism as Pedagogical Practice

Authors: Stephen D. Caldes

Abstract:

Teaching media and digital literacy to “digital natives” presents a unique set of pedagogical obstacles, especially when critique is involved, as these early-adopters tend to deify most technological and/or digital advancements and inventions. Knowing no other way of being, these natives are often reluctant to hear criticisms of the way they receive information, educate themselves, communicate with others, and even become enculturated because critique often connotes generational gaps and/or clandestine efforts to produce neo-Luddites. To digital natives, techno-criticism is more the result of an antiquated, out-of-touch agenda rather than a constructive, progressive praxis. However, the need to cultivate a techno-critical perspective among technology’s premier users has, perhaps, never been more pressing. In an effort to sidestep reluctance and encourage critical thought about where we are in terms of digital technology and where exactly it may be taking us, this essay outlines a new model for teaching techno-criticism to digital natives. Specifically, it recasts the techniques of participatory journalism—helping writers and readers understand subjects outside of their specific historical context—as progressive, interdisciplinary pedagogy. The model arises out of a review of relevant literature and data gathered via literary analysis and participant observation. Given the tenuous relationships between novel digital advancements, individual identity, collective engagement, and, indeed, Truth/fact, shepherding digital natives toward routine practice of “techno-realism” seems of utter importance.

Keywords: digital natives, journalism education, media literacy, techno-criticism

Procedia PDF Downloads 310
1287 Public Perception and Willingness to Undergo Cosmetic Procedures during COVID-19 Pandemic: A Questionnaire-Based Study Applied to Asymptomatic Individuals

Authors: Ibrahim Alreshidi, Aseel Albrekeit, Ruaa Alharthi

Abstract:

Background: As a result of the spread of COVID-19 at the beginning of 2020, many governments, including Saudi Arabia, have suspended operations in many agencies. Most dermatologists have restricted their practice, including cosmetic procedures, to ensure social distancing. On the 7th of May 2020, Saudi authorities reduced the restriction of COVID-19 virus preventative measures, allowing clinics to start accepting patients following the ministry of health protocols. Objectives: Evaluation of the public's perception and willingness to undergo cosmetic procedures during COVID-19 outbreaks in Saudi Arabia. Materials and methods: A descriptive, cross-sectional, questionnaire-based study was carried out among the individuals who lack typical symptoms of COVID-19 infection in Saudi Arabia. A self-designed web-based questionnaire was developed; content face validity and a pilot study were done. The questionnaire was distributed electronically from the 8th of May until the 31st of May 2020. Results: A total of 656 individuals who lack typical symptoms of COVID-19 infection were included in this analysis. Only 10.5% of participants expressed their will to do cosmetic procedures during the COVID-19 pandemic. More than 90% of the participants believed that the COVID-19 pandemic was either somewhat serious (52.9%) or very serious (38.7%). The willingness to do cosmetic procedures during the COVID-19 pandemic remained unaltered when the price was discounted (p<0.001) and when infection control measures were ensured (p<0.001). Conclusion: The COVID-19 pandemic had a negative impact on the practice of cosmetic dermatology. Fear of transferring the infection to a beloved home member is the main reason to avoid these procedures. Generating well-structured safety guidelines to decrease the risk of this unusual virus transmission in dermatology practice and creating financial incentives may help increase the public willingness to do these cosmetic procedures during this pandemic.

Keywords: COVID-19 pandemic, cosmetic procedures, questionnaire, dermatology

Procedia PDF Downloads 175