Search results for: vehicle-to-everything communication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4146

Search results for: vehicle-to-everything communication

1566 Deep Learning to Improve the 5G NR Uplink Control Channel

Authors: Ahmed Krobba, Meriem Touzene, Mohamed Debeyche

Abstract:

The wireless communications system (5G) will provide more diverse applications and higher quality services for users compared to the long-term evolution 4G (LTE). 5G uses a higher carrier frequency, which suffers from information loss in 5G coverage. Most 5G users often cannot obtain high-quality communications due to transmission channel noise and channel complexity. Physical Uplink Control Channel (PUCCH-NR: Physical Uplink Control Channel New Radio) plays a crucial role in 5G NR telecommunication technology, which is mainly used to transmit link control information uplink (UCI: Uplink Control Information. This study based of evaluating the performance of channel physical uplink control PUCCH-NR under low Signal-to-Noise Ratios with various antenna numbers reception. We propose the artificial intelligence approach based on deep neural networks (Deep Learning) to estimate the PUCCH-NR channel in comparison with this approach with different conventional methods such as least-square (LS) and minimum-mean-square-error (MMSE). To evaluate the channel performance we use the block error rate (BLER) as an evaluation criterion of the communication system. The results show that the deep neural networks method gives best performance compared with MMSE and LS

Keywords: 5G network, uplink (Uplink), PUCCH channel, NR-PUCCH channel, deep learning

Procedia PDF Downloads 88
1565 Jordanian Men’s and Women’s Attitudes toward Intimate Partner Violence and Its Correlates with Family Functioning and Demographics

Authors: Fatmeh Alzoubi, Reem Ali

Abstract:

Jordan is a developing country in the Middle East and, much like other countries in the world, has high rates of intimate partner violence (IPV). Little information is available on Jordanian men’s and women’s attitudes toward IPV. The purpose of this study is to examine men’s and women’s attitudes toward IPV in Jordan and its relationship with some demographics and family functioning. A descriptive cross-sectional correlational design with a sample of 401 men and women was used. Descriptive statistics (M, SD), Pearson r, t test, and ANOVA were used. The results indicated that Jordanian men and women have a lower score of IPVAS, 40.06 (SD = 8.20), indicating lower acceptance of IPV compared with the literature. Family functioning was 3.12 (SD = 0.46), indicating more healthy families. Family functioning was negatively correlated with IPVAS scores (r = –.22, p = .00). All demographic variables showed small to moderate correlations with IPVAS. Education for both study participants and their spouses had a negative correlation with IPVAS (r = –.27, p = .00) and (r = –.20, p = .00), respectively. Male participants, individuals who were living with extended family, and those living in rural areas had significantly high IPVAS scores, indicating more accepting attitudes toward IPV. Practitioners should provide families with education on the methods of conflict resolution, effective communication within the family, problem-solving approaches, equal role distribution, and appropriate styles of establishing a family.

Keywords: intimate partner violence, Jordanian men and women’s health, attitudes, family functioning

Procedia PDF Downloads 121
1564 Fostering Fresh Graduate Students’ Confidence in Speaking English: An Action Research to Students of Muria Kudus University, Central Java, Indonesia

Authors: Farid Noor Romadlon

Abstract:

Welcoming the ASEAN Economic Community and globalization, people need to have a good communication skill. Being able to speak English is one of important qualification in this skill and as global citizen. This study focused on fostering fresh graduate students’ confidence in speaking English. So, students have good performance in speaking. There were thirty (30) students from first semester of English Education Department who joined Intensive Course class as the subject. They had poor motivation to speak English since English is a foreign language which is not exposed in their environment. This study used Three Communicative Activities technique in twelve successive meetings totally. It was done in two cycles (six meetings for each) since there were some activities should be improved in the first session (cycle). Oral test was administered to find the quantitative result and observation conducted to strengthen the finding. The result indicated that Three Communicative Activities improved students’ confidence in speaking English. They had significant progress in their performance in the class. The technique which allowed students to have more spaces to explore and express their ideas to their friends increased their confidence in their performance. The group or cooperative activities stimulated students to think critically in the discussion and promoted their confidence to talk more.

Keywords: students’ confidence, three communicative activities, speaking, Muria Kudus University

Procedia PDF Downloads 213
1563 Case Scenario Simulation concerning Eventual Ship Sourced Oil Spill, Expansion and Response Process in Istanbul Strait

Authors: Cihat Aşan

Abstract:

Istanbul Strait is a crucial and narrow waterway, not only having a role in linking two continents but also has a crossover mission for the petroleum, which is the biggest energy resource, between its supply and demand sources. Besides its substantial features, sensitivities like around 18 million populations in surroundings, military facilities, ports, oil lay down areas etc. also brings the high risk to use of Istanbul Strait. Based on the statistics of Turkish Ministry of Transportation, Maritime and Communication, although the number of vessel passage in Istanbul Strait is declining, tonnage of hazardous and flammable cargo like oil and chemical transportation is increasing and subsequently the risk of oil pollution, loss of life and property is also rising. Based on the mentioned above; it is crucial to be prepared for the initial and subsequent response to eventual ship sourced oil spill which may cause to block the Strait for an unbearable duration. In this study; preconditioned Istanbul Strait sensitive areas studies has been taken into account and possible oil spill scenario is loaded to PISCES 2 (Potential Incident Simulation Control and Evaluation System) decision support system for the determined specific sea area. Consequences of the simulation like oil expanding process, required number and types of assets to response, had in hand and evaluated.

Keywords: Istanbul strait, oil spill, PISCES simulator, initial response

Procedia PDF Downloads 344
1562 A Method of Representing Knowledge of Toolkits in a Pervasive Toolroom Maintenance System

Authors: A. Mohamed Mydeen, Pallapa Venkataram

Abstract:

The learning process needs to be so pervasive to impart the quality in acquiring the knowledge about a subject by making use of the advancement in the field of information and communication systems. However, pervasive learning paradigms designed so far are system automation types and they lack in factual pervasive realm. Providing factual pervasive realm requires subtle ways of teaching and learning with system intelligence. Augmentation of intelligence with pervasive learning necessitates the most efficient way of representing knowledge for the system in order to give the right learning material to the learner. This paper presents a method of representing knowledge for Pervasive Toolroom Maintenance System (PTMS) in which a learner acquires sublime knowledge about the various kinds of tools kept in the toolroom and also helps for effective maintenance of the toolroom. First, we explicate the generic model of knowledge representation for PTMS. Second, we expound the knowledge representation for specific cases of toolkits in PTMS. We have also presented the conceptual view of knowledge representation using ontology for both generic and specific cases. Third, we have devised the relations for pervasive knowledge in PTMS. Finally, events are identified in PTMS which are then linked with pervasive data of toolkits based on relation formulated. The experimental environment and case studies show the accuracy and efficient knowledge representation of toolkits in PTMS.

Keywords: knowledge representation, pervasive computing, agent technology, ECA rules

Procedia PDF Downloads 339
1561 Reversing Community Relationship From the I-It to I-Thou as a Tool for Conflict Resolution and Peace Building in Ethiopia

Authors: Sisaye Tamrat Ayalew

Abstract:

The study focuses on the nature of community relationships in Ethiopia, specifically the I-Thou and I-It relationships, and how they contribute to conflict resolution and peacebuilding. It highlights the importance of genuine dialogue and mutual understanding in creating a unified and peaceful society. It analyzes the nature of community relationships in Ethiopia and evaluate how these relationships either contribute to conflict resolution or exacerbate conflicts. It aims to understand the role of genuine dialogue (I-Thou relationship) versus monologue (I-It relationship) in building lasting peace in the country. The study adopts a qualitative approach, specifically hermeneutics, to explore and understand the nature of community relationships in Ethiopia. It involves analyzing the characteristics of both I-Thou and I-It relationships and examining how the political elites shape these relationships within the community. The findings of the study indicate that the predominant type of relationship in Ethiopian society is the I-It relationship, referred to as "com-animation". This relationship is characterized by mutual mistrust, prejudice, hostility, and misunderstanding. As a result, conflicts, mass killings, displacement, and human rights violations have occurred. The study emphasizes the importance of shifting from com-animation to communication (I-Thou relationship) in order to address conflicts and establish lasting peace.

Keywords: dialogue, I-thou relationship, peace building, I-It relationship

Procedia PDF Downloads 91
1560 The Use of Modern Technology to Enhance English Language Teaching and Learning: An Analysis

Authors: Fazilet Alachaher (Benzerdjeb)

Abstract:

From the chalkboard to the abacus and beyond, technology has always played an important role in education. Educational technology refers to any teaching tool that helps supports learning, and given the rapid advancements in Information Technology and multimedia applications, the potential to support the teaching of foreign languages in our universities is ever greater. In language teaching and learning, we have a lot of to choose from the world of technology: TV, CDs, DVDs, Computers, the Internet, Email, and Blogs. The use of modern technologies can enrich the experience of learning a foreign language because they provide features that are not present in traditional technology. They can offer a wide range of multimedia resources, opportunities for intensive one-to-one learning in language labs and resources for authentic materials, which can be motivating to both students and teachers. The advent of Information and Communication Technology (ICT) and online interaction can also open up new range of self-access and distance learning opportunities The two last decades have witnessed a revolution due to the onset of technology, and has changed the dynamics of various industries, and has also influenced the way people live and work in society. That is why using the multimedia to create a certain context to teach English has its unique advantages. This paper tries then to analyse the necessity of multimedia technology to language teaching and brings out the problems faced by using these technologies. It also aims at making English teachers aware of the strategies to use it in an effective manner.

Keywords: strategies English teaching, multimedia technology, advantages, disadvantages, English learning

Procedia PDF Downloads 464
1559 Students’ Level of Knowledge Construction and Pattern of Social Interaction in an Online Forum

Authors: K. Durairaj, I. N. Umar

Abstract:

The asynchronous discussion forum is one of the most widely used activities in learning management system environment. Online forum allows participants to interact, construct knowledge, and can be used to complement face to face sessions in blended learning courses. However, to what extent do the students perceive the benefits or advantages of forum remain to be seen. Through content and social network analyses, instructors will be able to gauge the students’ engagement and knowledge construction level. Thus, this study aims to analyze the students’ level of knowledge construction and their participation level that occur through online discussion. It also attempts to investigate the relationship between the level of knowledge construction and their social interaction patterns. The sample involves 23 students undertaking a master course in one public university in Malaysia. The asynchronous discussion forum was conducted for three weeks as part of the course requirement. The finding indicates that the level of knowledge construction is quite low. Also, the density value of 0.11 indicating that the overall communication among the participants in the forum is low. This study reveals that strong and significant correlations between SNA measures (in-degree centrality, out-degree centrality) and level of knowledge construction. Thus, allocating these active students in a different groups aids the interactive discussion takes place. Finally, based upon the findings, some recommendations to increase students’ level of knowledge construction and also for further research are proposed.

Keywords: asynchronous discussion forums, content analysis, knowledge construction, social network analysis

Procedia PDF Downloads 375
1558 Development and Management of Integrated Mineral Resource Policy for Environmental Sustainability: The Mindanao Experience, the Philippines

Authors: Davidson E. Egirani, Nanfe R. Poyi, Napoleon Wessey

Abstract:

This paper would report the environmental challenges faced by stakeholders in the development and management of mineral resources in Mindanao mining region of the Philippines. The paper would proffer solutions via the development and management of integrated mineral resource framework. This is by interfacing the views of government, operating mining companies and the mining host communities. The project methods involved the desktop review of existing local, regional, national environmental and mining legislation. This was followed up with visits to mining sites and discussions were held with stakeholders in the mineral sector. The findings from a 2-year investigation would reveal lack of information, education, and communication campaign by stakeholders on environmental, health, political, and social issues in the mining industry. Small-scale miners lack the professional muscles for a balance shift of emphasis to sustainable and responsible mining to avoid environmental degradation and human health effect. Therefore, there is a need to balance ecological requirements, sustainability of the environment and development of mineral resources. This paper would provide an environmentally friendly mineral resource development framework.

Keywords: ecological requirements, environmental degradation, human health, mining legislation, responsible mining

Procedia PDF Downloads 132
1557 Horizontal-Vertical and Enhanced-Unicast Interconnect Testing Techniques for Network-on-Chip

Authors: Mahdiar Hosseinghadiry, Razali Ismail, F. Fotovati

Abstract:

One of the most important and challenging tasks in testing network-on-chip based system-on-chips (NoC based SoCs) is to verify the communication entity. It is important because of its usage for transferring both data packets and test patterns for intellectual properties (IPs) during normal and test mode. Hence, ensuring of NoC reliability is required for reliable IPs functionality and testing. On the other hand, it is challenging due to the required time to test it and the way of transferring test patterns from the tester to the NoC components. In this paper, two testing techniques for mesh-based NoC interconnections are proposed. The first one is based on one-by-one testing and the second one divides NoC interconnects into three parts, horizontal links of switches in even columns, horizontal links of switches in odd columns and all vertical. A design for testability (DFT) architecture is represented to send test patterns directly to each switch under test and also support the proposed testing techniques by providing a loopback path in each switch. The simulation results shows the second proposed testing mechanism outperforms in terms of test time because this method test all the interconnects in only three phases, independent to the number of existed interconnects in the network, while test time of other methods are highly dependent to the number of switches and interconnects in the NoC.

Keywords: on chip, interconnection testing, horizontal-vertical testing, enhanced unicast

Procedia PDF Downloads 554
1556 Challenges and Opportunities for Implementing Integrated Project Delivery Method in Public Sector Construction

Authors: Ahsan Ahmed, Ming Lu, Syed Zaidi, Farhan Khan

Abstract:

The Integrated Project Delivery (IPD) method has been proposed as the solution to tackle complexity and fragmentation in the real world while addressing the construction industry’s growing needs for productivity and sustainability. Although the private sector has taken the initiative in implementing IPD and taken advantage of new technology such as building information modeling (BIM) in delivering projects, IPD remains less known and rarely used in public sector construction. The focus of this paper is set on the use of IPD in projects in public sector, which is potentially complemented by the use of analytical functionalities for workface planning and construction oriented design enabled by recent research advances in BIM. Experiences and lessons learned from implementing IPD in the private sector and in BIM-based construction automation research would play a vital role in reducing barriers and eliminating issues in connection with project delivery in the public sector. The paper elaborates issues challenges, contractual relationships and the interactions throughout the planning, design and construction phases in the context of implementing IPD on construction projects in the public sector. A slab construction case is used as a ‘sandbox’ model to elaborate (1) the ideal way of communication, integration, and collaboration among all the parties involved in project delivery in planning and (2) the execution of projects by using IDP principles and optimization, simulation analyses.

Keywords: integrated project delivery, IPD, building information modeling, BIM

Procedia PDF Downloads 204
1555 New Media and Social Media Laws and Ethics in United Arab Emirates

Authors: Ahmed Farouk Radwan, Sheren Mousa

Abstract:

There are many laws and regulations governing the use of new and social media in the United Arab Emirates. During the past few years, the importance of using these platforms in the fields of media and government communication has increased, as well as at the level of individual use. In 2016, the National Media Council Law was issued to regulate traditional and new media field, and gave the council the power to oversee and undertake the media affairs in the state. NMC is mandated to: Develop the UAE’s media policy, Draft media legislation and ensure its execution and Prohibited media content ,Co-ordinate the media policy between the emirates in line with the UAE’s domestic and foreign policy, Ensure support for the federation and project national unity. All media organizations in the UAE must comply with the regulations and rules issued by council. Social media influencers have to be licensed by NMC if they accept paid ads to be published on their accounts. The study explores other laws concerning of new media and social media regulations and ethics including Combatting Cybercrimes law, Combating Discrimination and Hatred law, The Government Guidelines for social media users in the UAE, The Guidelines for the practices of electronic participation and social networking, Copyright Law, and Child Rights Law. The study clarifies the legal articles, items and standards in all these laws which related with the new media and social platforms and also determines the prohibited digital practices and the cultural norms governing it.

Keywords: media laws, media ethics, new media , UAE

Procedia PDF Downloads 169
1554 Quantum Cryptography: Classical Cryptography Algorithms’ Vulnerability State as Quantum Computing Advances

Authors: Tydra Preyear, Victor Clincy

Abstract:

Quantum computing presents many computational advantages over classical computing methods due to the utilization of quantum mechanics. The capability of this computing infrastructure poses threats to standard cryptographic systems such as RSA and AES, which are designed for classical computing environments. This paper discusses the impact that quantum computing has on cryptography, while focusing on the evolution from classical cryptographic concepts to quantum and post-quantum cryptographic concepts. Standard Cryptography is essential for securing data by utilizing encryption and decryption methods, and these methods face vulnerability problems due to the advancement of quantum computing. In order to counter these vulnerabilities, the methods that are proposed are quantum cryptography and post-quantum cryptography. Quantum cryptography uses principles such as the uncertainty principle and photon polarization in order to provide secure data transmission. In addition, the concept of Quantum key distribution is introduced to ensure more secure communication channels by distributing cryptographic keys. There is the emergence of post-quantum cryptography which is used for improving cryptographic algorithms in order to be more secure from attacks by classical and quantum computers. Throughout this exploration, the paper mentions the critical role of the advancement of cryptographic methods to keep data integrity and privacy safe from quantum computing concepts. Future research directions that would be discussed would be more effective cryptographic methods through the advancement of technology.

Keywords: quantum computing, quantum cryptography, cryptography, data integrity and privacy

Procedia PDF Downloads 27
1553 The Impact of Brand-Related User-Generated Content on Brand Positioning: A Study on Private Higher Education Institutes in Vietnam

Authors: Charitha Harshani Perera, Rajkishore Nayak, Long Thang Van Nguyen

Abstract:

With the advent of social media, Vietnam has changed the way customers perceive the information about the brand. In the context of higher education, the adoption of social media has received attention with the increasing rate of social media usage among undergraduates. Brand-related user-generated content (UGC) on social media emphasizes the social ties between users and users’ participation, which promotes the communication to build and maintain the relationship with the brands. Although brand positioning offers a significant competitive advantage, the association with brand-related user-generated content in social media with brand positioning in the context of higher education is still an under-researched area. Accordingly, using social identity theory and social exchange theory, this research aims to deepen our understanding of the influence of brand-related user-generated content on brand positioning and purchase intention. Employing a quantitative survey design,384 Vietnamese undergraduates were selected based on purposive sampling. The findings suggest that brand-related user-generated content influence brand positioning and brand choice intention. However, there is a significant mediating effect of the reliability and understandability of the content.

Keywords: brand positioning, brand-related user-generated content, emerging countries, higher education

Procedia PDF Downloads 179
1552 Designing and Implementation of MPLS Based VPN

Authors: Muhammad Kamran Asif

Abstract:

MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively.

Keywords: MPLS, VPN, NMS, ATM, asynchronous transfer mode

Procedia PDF Downloads 331
1551 The Usefulness and Future of Hearing Aids Technologies and Their Impact on Hearing

Authors: Amirreza Razzaghipour Sorkhab

Abstract:

Hearing loss is one of the greatest common chronic health situations of older people. Hearing aids are the common treatment, and they recover the quality of life in older adults. Even so, comparatively few older adults with simple, mild to moderate, adult-onset, sensorineural hearing loss use hearing aids. It shouldn’t be expected that more expensive hearing aids always produce better outcomes. Given the importance of quality pledge, approaches of quantifying hearing aid fitting achievement are needed. Studies showed an important reduction in handicap following 3 weeks of hearing aid use, signifying the feasibility of using the Hearing Hindrance Inventory for the Elderly as an outcome measure for hearing aid success after a brief interval of hearing aid use. The results showed important development of the quality of life after three months of using a hearing aid in all members and improvement of their most important problems, i.e., the communication and exchange of data. Hearing loss can impair the conversation of information and so decreases the quality of life. Hearing aids have progressivemeaningfully over the past decade, chiefly due to the growing of digital technology. The next decade should see an even greater number of innovations to hearing aid technology. Development in digital hearing aids will be driven by investigate advances in the next fields such as wireless technology, hearing science, and cognitive scienceMoreover, emerging trends such as connectivity and individuation will also drive new technology. We hope that the advancement of technology will be enough to meet the needs of people with hearing aids.

Keywords: hearing loss, hearing aid, hearing aid technology, health

Procedia PDF Downloads 108
1550 Nurses’ Views on ‘Effective Nurse Leader’ Characteristics in Iraq

Authors: S. Abed, S. O’Neill

Abstract:

This research explored ward nurses’ views about the characteristics of effective nurse leaders in the context of Iraq as a developing country, where the delivery of health care continues to face disruption and change. It is well established that the provision of modern health care requires effective nurse leaders, but in countries such as Iraq the lack of effective nurse leaders is noted as a major challenge. In a descriptive quantitative study, a survey questionnaire was administered to 210 ward nurses working in two public hospitals in a major city in the north of Iraq. The participating nurses were of the opinion that the effectiveness of their nurse leaders was evident in their ability to demonstrate: good clinical knowledge, effective communication and managerial skills. They also viewed their leaders as needing to hold high-level nursing qualifications, though this was not necessarily the case in practice. Additionally, they viewed nurse leaders’ personal qualities as important, which included politeness, ethical behaviour, and trustworthiness. When considered against the issues raised in interviews with a smaller group (20) of senior nurse leaders, representative of the various occupational levels, implications identify the need for professional development that focuses on how the underpinning competencies relate to leadership and how transformational leadership is evidenced in practice.

Keywords: health care, nurse education, nursing in Iraq, nurse leadership

Procedia PDF Downloads 276
1549 Recognizing an Individual, Their Topic of Conversation and Cultural Background from 3D Body Movement

Authors: Gheida J. Shahrour, Martin J. Russell

Abstract:

The 3D body movement signals captured during human-human conversation include clues not only to the content of people’s communication but also to their culture and personality. This paper is concerned with automatic extraction of this information from body movement signals. For the purpose of this research, we collected a novel corpus from 27 subjects, arranged them into groups according to their culture. We arranged each group into pairs and each pair communicated with each other about different topics. A state-of-art recognition system is applied to the problems of person, culture, and topic recognition. We borrowed modeling, classification, and normalization techniques from speech recognition. We used Gaussian Mixture Modeling (GMM) as the main technique for building our three systems, obtaining 77.78%, 55.47%, and 39.06% from the person, culture, and topic recognition systems respectively. In addition, we combined the above GMM systems with Support Vector Machines (SVM) to obtain 85.42%, 62.50%, and 40.63% accuracy for person, culture, and topic recognition respectively. Although direct comparison among these three recognition systems is difficult, it seems that our person recognition system performs best for both GMM and GMM-SVM, suggesting that inter-subject differences (i.e. subject’s personality traits) are a major source of variation. When removing these traits from culture and topic recognition systems using the Nuisance Attribute Projection (NAP) and the Intersession Variability Compensation (ISVC) techniques, we obtained 73.44% and 46.09% accuracy from culture and topic recognition systems respectively.

Keywords: person recognition, topic recognition, culture recognition, 3D body movement signals, variability compensation

Procedia PDF Downloads 543
1548 Vietnamese Indigenous Healing’s Implication for Vietnamese Women Counseling in Korea

Authors: Youngsub Oh, Youngsoon Kim

Abstract:

As the second largest group among international marriages in Korea, Vietnamese married immigrant women have been exposed to psychological crisis like divorce and family violence. The purpose of this study is to understand how to counsel those women from the perspective of indigenous healing as their own psychological problem-solving way. To this end, this study reviewed Vietnamese cultural literatures on their mentality as well as Vietnamese medical literatures on indigenous healing. The research results are as follows: First, cultural foundations that have formed Vietnamese mentality are Confucian value system, reserved communication, and religious pluralism. These cultural backgrounds play an important role in understanding their own therapeutic tradition. Second, Vietnamese indigenous healing considers cause of mental disease as a collapse of balance between mind and body and environment. Thus, indigenous treatment deals with psychological problems through a recovery of the balance from the holistic perspective. In fact, indigenous healing has been actively practiced in everyday place as well as hospital until today. The implications of Vietnamese indigenous healing for multicultural counseling in Korea are as follows: First, Korean counselors need to interactively understand their own assumptions on indigenous healing as well as counselees’ own assumptions. Second, a variety of psychological intervention strategies can be drawn from Vietnamese indigenous healing. Third, indigenous healing needs to be integrated with modern techniques of counseling and psychotherapy, as both treatments are not mutually exclusive but complementary.

Keywords: indigenous healing, Korea, multicultural counseling, Vietnamese married immigrant women

Procedia PDF Downloads 293
1547 The Effectiveness of Banks’ Web Sites: A Study of Turkish Banking Sector

Authors: Raif Parlakkaya, Huseyin Cetin, Duygu Irdiren

Abstract:

By the development of World Wide Web, the usage rate of Internet has rapidly grown globally; and provided a basis for the emergence of electronic business. As well as other sectors, the banking sector has adopted the use of internet with the developments in information and communication technologies. Due to the public disclosure and transparency principle of Corporate Governance, the importance of information disclosure of banks on their web sites has increased significantly. For the purpose of this study, a Bank Disclosure Attribute Index (BDAI) in Turkey has been constructed through classifying the information disclosure on banks’ web sites into general, financial, investors and corporate governance attributes. All 47 banks in Turkish Banking System have been evaluated according to the index with the aim of providing a comparison between banks. By Chi Square Test, Pearson Correlation, T-Test, and ANOVA statistical tools, it has been concluded that the majority of banks in Turkey have shared information on their web sites adequately with respect to their total index score. Although there is a positive correlation between various types of information on banks’ web sites, there is no uniformity among them. Also, no significant difference between various types of information disclosure and bank types has been observed. Compared with the total index score averages of the five largest banks in Turkey, there are some banks that need to improve the content of their web sites.

Keywords: internet banking, websites evaluation, customer adoption, Turkey

Procedia PDF Downloads 400
1546 Double Layer Security Authentication Model for Automatic Dependent Surveillance-Broadcast

Authors: Buse T. Aydin, Enver Ozdemir

Abstract:

An automatic dependent surveillance-broadcast (ADS-B) system has serious security problems. In this study, a double layer authentication scheme between the aircraft and ground station, aircraft to aircraft, ground station to ATC tower is designed to prevent any unauthorized aircrafts from introducing themselves as friends. This method can be used as a solution to the problem of authentication. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or unknown according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as friend. As a result, the ADS-B messages coming from this authenticated friendly aircraft will be processed. In this method, even if the embedded key is captured by the unknown aircraft, without the information of the second layer, the unknown aircraft can easily be determined. Overall, in this work, we present a reliable system by adding physical layer in the authentication process.

Keywords: ADS-B, authentication, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 179
1545 Development of 3D Laser Scanner for Robot Navigation

Authors: Ali Emre Öztürk, Ergun Ercelebi

Abstract:

Autonomous robotic systems needs an equipment like a human eye for their movement. Robotic camera systems, distance sensors and 3D laser scanners have been used in the literature. In this study a 3D laser scanner has been produced for those autonomous robotic systems. In general 3D laser scanners are using 2 dimension laser range finders that are moving on one-axis (1D) to generate the model. In this study, the model has been obtained by a one-dimensional laser range finder that is moving in two –axis (2D) and because of this the laser scanner has been produced cheaper. Furthermore for the laser scanner a motor driver, an embedded system control board has been used and at the same time a user interface card has been used to make the communication between those cards and computer. Due to this laser scanner, the density of the objects, the distance between the objects and the necessary path ways for the robot can be calculated. The data collected by the laser scanner system is converted in to cartesian coordinates to be modeled in AutoCAD program. This study shows also the synchronization between the computer user interface, AutoCAD and the embedded systems. As a result it makes the solution cheaper for such systems. The scanning results are enough for an autonomous robot but the scan cycle time should be developed. This study makes also contribution for further studies between the hardware and software needs since it has a powerful performance and a low cost.

Keywords: 3D laser scanner, embedded system, 1D laser range finder, 3D model

Procedia PDF Downloads 277
1544 Building an E-Platform for Virtual Research Teams in Educational Science

Authors: Hanan A. Abdulhameed, Huda Y. Alyami

Abstract:

The study presents a new international direction to conduct collaborative educational research. It follows a qualitative and quantitative methodology in investigating the main requirements to build an e-platform for Virtual Research Teams (VRTs). The e-platform considers three main components: First, the human and cultural structure, second, the institutional/organizational structure, and third, the technological structure. The study mainly focuses on the third component, the technological structure (the e-platform), and studies how to incorporate the other components: The human/cultural structure and the institutional/organizational structure in order to build an effective e-platform. The importance of the study is that it presents a comprehensive study about VRTs in terms of definition, types, structure, and main challenges. In addition, it suggests a practical way that benefits from the information and communication technology to conduct collaborative educational research by building and managing virtual research teams through an effective e-platform. The study draws the main framework to build an e-platform for collaborative educational research teams in Arab World. Thus, it tackles mainly the theoretical aspects, the framework of an effective e-platform. Then, it presents the evaluation of 18 Arab educational experts' to the proposed e-platform.

Keywords: collaborative research, educational science, E-platform, social research networks sites (SRNS), virtual research teams (VRTs)

Procedia PDF Downloads 462
1543 Concept to Enhance the Project Success and Promote the Implementation of Success Factors in Infrastructure Projects

Authors: A. Elbaz, K. Spang

Abstract:

Infrastructure projects are often subjected to delays and cost overruns and mistakenly described as unsuccessful projects. These projects have many peculiarities such as public attention, impact on the environment, subjected to special regulations, etc. They also deal with several stakeholders with different motivations and face unique risks. With this in mind we need to reconsider our approach to manage them, define their success factors and implement these success factors. Infrastructure projects are not only lacking a unified meaning of project success or a definition of success factors, but also a clear method to implement these factors. This paper investigates this gap and introduces a concept to implement success factors in an efficient way, taking into consideration the specific characteristics of infrastructure projects. This concept consists of six enablers such as project organization, project team, project management workflow, contract management, communication and knowledge transfer and project documentations. These enablers allow other success factors to be efficiently implemented in projects. In conclusion, this paper provides project managers as well as company managers with a tool to define and implement success factors efficiently in their projects, along with upgrading their assets for the coming projects. This tool consists of processes and validated checklists to ensure the best use of company resources and knowledge. Due to the special features of infrastructure projects this tool will be tested in the German infrastructure market. However, it is meant to be adaptable to other markets and industries.

Keywords: infrastructure projects, operative success factors, project success, success factors, transportation projects

Procedia PDF Downloads 130
1542 The Adoption of Technological Innovations in a B2C Context: An Empirical Study on the Higher Education Industry in Egypt

Authors: Maha Mourad, Rania Samir

Abstract:

This paper seeks to explain the adoption of technological innovations in a business to consumer context. Specifically, the use of web based technology (WEBCT/blackboard) in the delivery of educational material and communication with students at universities in Egypt is the focus of this study. The analysis draws on existing research in a B2C context which highlights the importance of internal organization characteristics, perceived attributes of the innovation as well as consumer based factors as the main drivers of adoption. A distinctive B2C model is developed drawing on Roger’s innovation adoption model, as well as theoretical and empirical foundations in previous innovation adoption literature to study the adoption of technological innovations in higher education in Egypt. The model proposes that the adoption decision is dependent on a combination of perceived attributes of the innovation, inter-organization factors and consumer factors. The model is testified drawing on the results of empirical work in the form of a large survey conducted on students in three different universities in Egypt (one public, one private and one international). In addition to the attributes of the innovation, specific organization factors (such as university resources) as well as consumer factors were identified as likely to have an important influence on the adoption of technological innovations in higher education.

Keywords: innovation, WEBCT, higher education, adoption, Egypt

Procedia PDF Downloads 548
1541 An Enhanced Hybrid Backoff Technique for Minimizing the Occurrence of Collision in Mobile Ad Hoc Networks

Authors: N. Sabiyath Fatima, R. K. Shanmugasundaram

Abstract:

In Mobile Ad-hoc Networks (MANETS), every node performs both as transmitter and receiver. The existing backoff models do not exactly forecast the performance of the wireless network. Also, the existing models experience elevated packet collisions. Every time a collision happens, the station’s contention window (CW) is doubled till it arrives at the utmost value. The main objective of this paper is to diminish collision by means of contention window Multiplicative Increase Decrease Backoff (CWMIDB) scheme. The intention of rising CW is to shrink the collision possibility by distributing the traffic into an outsized point in time. Within wireless Ad hoc networks, the CWMIDB algorithm dynamically controls the contention window of the nodes experiencing collisions. During packet communication, the backoff counter is evenly selected from the given choice of [0, CW-1]. At this point, CW is recognized as contention window and its significance lies on the amount of unsuccessful transmission that had happened for the packet. On the initial transmission endeavour, CW is put to least amount value (C min), if transmission effort fails, subsequently the value gets doubled, and once more the value is set to least amount on victorious broadcast. CWMIDB is simulated inside NS2 environment and its performance is compared with Binary Exponential Backoff Algorithm. The simulation results show improvement in transmission probability compared to that of the existing backoff algorithm.

Keywords: backoff, contention window, CWMIDB, MANET

Procedia PDF Downloads 280
1540 A Multidimensional Exploration of Narcissistic Personality Disorder Through Psycholinguistic Analysis and Neuroscientific Correlates

Authors: Dalia Elleuch

Abstract:

Narcissistic Personality Disorder (NPD) manifests as a personality disorder marked by inflated self-importance, heightened sensitivity to criticism, a lack of empathy, a preoccupation with appearance over substance, and features such as arrogance, grandiosity, a constant need for admiration, a tendency to exploit others, and an inclination towards demanding special treatment due to a sense of excessive entitlement (APA, 2013). This interdisciplinary study delves into NPD through the systematic synthesis of psycholinguistic analysis and neuroscientific correlates. The cognitive and emotional dimensions of NPD reveal linguistic patterns, including grandiosity, entitlement, and manipulative communication. Neuroscientific investigations reveal structural brain differences and alterations in functional connectivity, further explaining the neural underpinnings of social cognition deficits observed in individuals with NPD. Genetic predispositions and neurotransmitter imbalances add a layer of complexity to the understanding of NPD. The necessity for linguistic intervention in diagnosing and treating Narcissistic Personality Disorder is underscored by an interdisciplinary study that intricately synthesizes psycholinguistic analysis and neuroscientific correlates, offering a comprehensive understanding of NPD’s cognitive, emotional, and neural dimensions and paving the way for future practical, theoretical, and pedagogical approaches to address the complexities of this personality disorder.

Keywords: Narcissistic Personality Disorder (NPD), psycholinguistic analysis, neuroscientific correlates, interpersonal dysfunction, cognitive empathy

Procedia PDF Downloads 65
1539 Implementing a Plurilingual Approach to ELF in Primary School: An International Comparative Study

Authors: A. Chabert

Abstract:

The present paper is motivated by the current influence of communicative approaches in language policies around the globe (especially through the Common European Framework of Reference), along with the exponential spread of English as a Lingua Franca worldwide. This study focuses on English language learning and teaching in the last year of primary education in Spain (in the bilingual Valencian region), Norway (in the Trondelag region), and China (in the Hunan region) and proposes a plurilingual communicative approach to ELT in line with ELF awareness and the current retheorisation of ELF within multilingualism (Jenkins, 2018). This study, interdisciplinary in nature, attempts to find a convergence point among English Language Teaching, English as a Lingua Franca, Language Ecology and Multilingualism, breaking with the boundaries that separate languages in language teaching and acknowledging English as international communication, while protecting the mother tongue and language diversity within multilingualism. Our experiment included over 400 students across Spain, Norway, and China, and the outcomes obtained demonstrate that despite the different factors involved in different cultures and contexts, a plurilingual approach to English learning improved English scores by 20% in each of the contexts. Through our study, we reflect on the underestimated value of the mother tongue in ELT, as well as the need for a sustainable ELF perspective in education worldwide.

Keywords: English as a Lingua Franca, English language teaching, language ecology, multilingualism

Procedia PDF Downloads 133
1538 Black Protests in Poland: Analysis of Women's Movement in Poland, 2016-2018

Authors: Aneta Ostaszewska

Abstract:

The purpose of this research is to reflect on 'black protests' of women in Poland. 'Black protests' have been organized nationwide since October 2016 as a sign of opposition and resistance to anti-women government’s policy and its attempts to exacerbate abortion law. Women protest not only in the biggest cities (Warsaw, Cracow or Wroclaw) but in over 140 towns and villages all over Poland. The research represents qualitative methodological approach – an active research method. It has involved the observation, description, and analysis of 'black protests' carried out mainly in Warsaw (the capital of Poland). The focus has been on behavior and attitudes of protesting women: protesters’ slogans, statements, and views, the ways of dressing up, ways of participating and involvement in protests. Research also involves the analysis of social media discourse: the analysis of content published by women on social media. Black protests are an example of a grassroots social initiative of women in Poland. What unites women is opposition to government policy. The primary space of communication has become the Internet – especially social media (Facebook). A new social movement 'Dziewuchy dziewuchom' (Girls for girls) has been born as well as organization of 'Ogolnopolski Strajk Kobiet' (Nationwide women's strike) as a result of 'black protest'. These protests and marches became a way of emphasizing women’s subjectivity as well as political and civic activity.

Keywords: women, black protests, communitas, experience, Poland, abortion law

Procedia PDF Downloads 375
1537 Development of an Automatic Monitoring System Based on the Open Architecture Concept

Authors: Andrii Biloshchytskyi, Serik Omirbayev, Alexandr Neftissov, Sapar Toxanov, Svitlana Biloshchytska, Adil Faizullin

Abstract:

Kazakhstan has adopted a carbon neutrality strategy until 2060. In accordance with this strategy, it is necessary to introduce various tools to maintain the environmental safety of the environment. The use of IoT, in combination with the characteristics and requirements of Kazakhstan's environmental legislation, makes it possible to develop a modern environmental monitoring system. The article proposes a solution for developing an example of an automated system for the continuous collection of data on the concentration of pollutants in the atmosphere based on an open architecture. The Audino-based device acts as a microcontroller. It should be noted that the transmission of measured values is carried out via an open wireless communication protocol. The architecture of the system, which was used to build a prototype based on sensors, an Arduino microcontroller, and a wireless data transmission module, is presented. The selection of elementary components may change depending on the requirements of the system; the introduction of new units is limited by the number of ports. The openness of solutions allows you to change the configuration depending on the conditions. The advantages of the solutions are openness, low cost, versatility and mobility. However, there is no comparison of the working processes of the proposed solution with traditional ones.

Keywords: environmental monitoring, greenhouse gases emissions, environmental pollution, Industry 4.0, IoT, microcontroller, automated monitoring system.

Procedia PDF Downloads 51