Search results for: information recognition
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12101

Search results for: information recognition

9431 On-Line Consumer Comments (E-Wom): A Case Qualitative Analysis on Resort Hotel Consumers

Authors: Yasin Bilim, Alaaddin Başoda

Abstract:

The recent growth of internet applications on hospitality and tourism provokes on-line consumer comments and reviews. Many researchers and practitioners have named this enormous potential as “e-WOM (electronic word of mouth)”. Travel comments are important experiential information for the potential travellers. Many researches have been conducted to analyse the effects of e-WOM on hotel consumers. Broadly quantitative methods have been used for analysing online comments. But, a few studies have mentioned about the positive practical aspects of the comments for hotel marketers. The study aims to show different usage and effects of hotel consumers’ comments. As qualitative analysis method, grounded theory, content and discourse analysis, were used. The data based on the 10 resort hotel consumers’ on-line comments. Results show that consumers tend to write comments about service person, rooms, food services and pool in their online space. These indicators can be used by hotel marketers as a marketing information tool.

Keywords: comments, E-WOM, hotel consumer, qualitative

Procedia PDF Downloads 227
9430 Investigating the Role of Artificial Intelligence in Developing Creativity in Architecture Education in Egypt: A Case Study of Design Studios

Authors: Ahmed Radwan, Ahmed Abdel Ghaney

Abstract:

This paper delves into the transformative potential of artificial intelligence (AI) in fostering creativity within the domain of architecture education, especially with a specific emphasis on its implications within the Design Studios; the convergence of AI and architectural pedagogy has introduced avenues for redefining the boundaries of creative expression and problem-solving. By harnessing AI-driven tools, students and educators can collaboratively explore a spectrum of design possibilities, stimulate innovative ideation, and engage in multidimensional design processes. This paper investigates the ways in which AI contributes to architectural creativity by facilitating generative design, pattern recognition, virtual reality experiences, and sustainable design optimization. Furthermore, the study examines the balance between AI-enhanced creativity and the preservation of core principles of architectural design/education, ensuring that technology is harnessed to augment rather than replace foundational design skills. Through an exploration of Egypt's architectural heritage and contemporary challenges, this research underscores how AI can synergize with cultural context and historical insights to inspire cutting-edge architectural solutions. By analyzing AI's impact on nurturing creativity among Egyptian architecture students, this paper seeks to contribute to the ongoing discourse on the integration of technology within global architectural education paradigms. It is hoped that this research will guide the thoughtful incorporation of AI in fostering creativity while preserving the authenticity and richness of architectural design education in Egypt and beyond.

Keywords: architecture, artificial intelligence, architecture education, Egypt

Procedia PDF Downloads 79
9429 Data Compression in Ultrasonic Network Communication via Sparse Signal Processing

Authors: Beata Zima, Octavio A. Márquez Reyes, Masoud Mohammadgholiha, Jochen Moll, Luca de Marchi

Abstract:

This document presents the approach of using compressed sensing in signal encoding and information transferring within a guided wave sensor network, comprised of specially designed frequency steerable acoustic transducers (FSATs). Wave propagation in a damaged plate was simulated using commercial FEM-based software COMSOL. Guided waves were excited by means of FSATs, characterized by the special shape of its electrodes, and modeled using PIC255 piezoelectric material. The special shape of the FSAT, allows for focusing wave energy in a certain direction, accordingly to the frequency components of its actuation signal, which makes available a larger monitored area. The process begins when a FSAT detects and records reflection from damage in the structure, this signal is then encoded and prepared for transmission, using a combined approach, based on Compressed Sensing Matching Pursuit and Quadrature Amplitude Modulation (QAM). After codification of the signal is in binary chars the information is transmitted between the nodes in the network. The message reaches the last node, where it is finally decoded and processed, to be used for damage detection and localization purposes. The main aim of the investigation is to determine the location of detected damage using reconstructed signals. The study demonstrates that the special steerable capabilities of FSATs, not only facilitate the detection of damage but also permit transmitting the damage information to a chosen area in a specific direction of the investigated structure.

Keywords: data compression, ultrasonic communication, guided waves, FEM analysis

Procedia PDF Downloads 124
9428 On the Principles of Self-determination, Remedial Secession, and Responsibility to Protect: The Case of Nagorno Karabakh

Authors: Sara Melkonyan

Abstract:

Over the past decades, the political (and partly legal) doctrine of remedial secession has emerged on the basis of the development of internationally recognized human rights and rights of peoples stemming from various multilateral treaties, which stipulates that aggrieved and persecuted nations have the right to secede from the parent state as a remedy for their continuous and unstoppable grievances. The 44-day war in Nagorno-Karabakh and the following events posed severe challenges for Nagorno-Karabakh and its people. Constant aggression and threat, the humanitarian crisis caused by the closure of the Lachin Corridor, the persistent threat of ethnic cleansing of Artsakhi Armenians, and the state policy that has been executed towards Artsakhi people by the Azerbaijani authorities come to prove that the Artsakhi people cannot survive under Azerbaijani control and secession may be the last resort for ending oppression. The paper tries to make parallels with similar cases and discuss the doctrine of remedial secession applied selectively among different cases. This paper aims to figure out why in some cases the secessionist movements succeeded to gain independence based on the doctrine of remedial secession, in other cases, they refused to gain recognition from the international community. Through analyzing the domestic-level and then international-level factors, the study concluded that the doctrine of remedial secession is inherently in the political realm and almost impossible to draw substantial “recipes” for warranting secession, and the latter is not applied similarly among the cases, so its success mainly depends on the geopolitical interests of the great powers involved.

Keywords: R2P, remedial secession, self-determination, conflicts

Procedia PDF Downloads 79
9427 Characterization Techniques for Studying Properties of Nanomaterials

Authors: Nandini Sharma

Abstract:

Monitoring the characteristics of a nanostructured material comprises measurements of structural, morphological, mechanical, optical and electronic properties of the synthesized nanopowder and different layers and coatings of nanomaterials coated on transparent conducting oxides (TCOs) substrates like fluorine doped tin oxide (FTO) or Indium doped tin oxide (ITO). This article focuses on structural and optical characterization with emphasis on measurements of the photocatalytic efficiency as a photocatalyst and their interpretation to extract relevant information about various TCOs and materials, their emitter regions, and surface passivation. It also covers a brief description of techniques based on photoluminescence that can portray high resolution pictorial graphs for application as solar energy devices. With the advancement in the scientific techniques, detailed information about the structural, morphological, and optical properties can be investigated, which is further useful for engineering and designing of an efficient device. The common principles involved in the prevalent characterization techniques aid to illustrate the range of options that can be broadened in near future for acurate device characterization and diagnosis.

Keywords: characterization, structural, optical, nanomaterial

Procedia PDF Downloads 146
9426 3D Building Model Utilizing Airborne LiDAR Dataset and Terrestrial Photographic Images

Authors: J. Jasmee, I. Roslina, A. Mohammed Yaziz & A.H Juazer Rizal

Abstract:

The need of an effective building information collection method is vital to support a diversity of land development activities. At present, advances in remote sensing such as airborne LiDAR (Light Detection and Ranging) is an established technology for building information collection, location, and elevation of the reflecting laser points towards the construction of 3D building models. In this study, LiDAR datasets and terrestrial photographic images of buildings towards the construction of 3D building models is explored. It is found that, the quantitative accuracy of the constructed 3D building model, namely in the horizontal and vertical components were ± 0.31m (RMSEx,y) and ± 0.145m (RMSEz) respectively. The accuracies were computed based on sixty nine (69) horizontal and twenty (20) vertical surveyed points. As for the qualitative assessment, it is shown that the appearance of the 3D building model is adequate to support the requirements of LOD3 presentation based on the OGC (Open Geospatial Consortium) standard CityGML.

Keywords: LiDAR datasets, DSM, DTM, 3D building models

Procedia PDF Downloads 321
9425 Sentiment Classification of Documents

Authors: Swarnadip Ghosh

Abstract:

Sentiment Analysis is the process of detecting the contextual polarity of text. In other words, it determines whether a piece of writing is positive, negative or neutral.Sentiment analysis of documents holds great importance in today's world, when numerous information is stored in databases and in the world wide web. An efficient algorithm to illicit such information, would be beneficial for social, economic as well as medical purposes. In this project, we have developed an algorithm to classify a document into positive or negative. Using our algorithm, we obtained a feature set from the data, and classified the documents based on this feature set. It is important to note that, in the classification, we have not used the independence assumption, which is considered by many procedures like the Naive Bayes. This makes the algorithm more general in scope. Moreover, because of the sparsity and high dimensionality of such data, we did not use empirical distribution for estimation, but developed a method by finding degree of close clustering of the data points. We have applied our algorithm on a movie review data set obtained from IMDb and obtained satisfactory results.

Keywords: sentiment, Run's Test, cross validation, higher dimensional pmf estimation

Procedia PDF Downloads 402
9424 The Relevance of the U-Shaped Learning Model to the Acquisition of the Difference between C'est and Il Est in the English Learners of French Context

Authors: Pooja Booluck

Abstract:

A U-shaped learning curve entails a three-step process: a good performance followed by a bad performance followed by a good performance again. U-shaped curves have been observed not only in language acquisition but also in various fields such as temperature face recognition object permanence to name a few. Building on previous studies of the curve child language acquisition and Second Language Acquisition this empirical study seeks to investigate the relevance of the U-shaped learning model to the acquisition of the difference between cest and il est in the English Learners of French context. The present study was developed to assess whether older learners of French in the ELF context follow the same acquisition pattern. The empirical study was conducted on 15 English learners of French which lasted six weeks. Compositions and questionnaires were collected from each subject at three time intervals (after one week after three weeks after six weeks) after which students work were graded as being either correct or incorrect. The data indicates that there is evidence of a U-shaped learning curve in the acquisition of cest and il est and students did follow the same acquisition pattern as children in regards to rote-learned terms and subject clitics. This paper also discusses the need to introduce modules on U-shaped learning curve in teaching curriculum as many teachers are unaware of the trajectory learners undertake while acquiring core components in grammar. In addition this study also addresses the need to conduct more research on the acquisition of rote-learned terms and subject clitics in SLA.

Keywords: child language acquisition, rote-learning, subject clitics, u-shaped learning model

Procedia PDF Downloads 293
9423 Deprivation of Visual Information Affects Differently the Gait Cycle in Children with Different Level of Motor Competence

Authors: Miriam Palomo-Nieto, Adrian Agricola, Rudolf Psotta, Reza Abdollahipour, Ludvik Valtr

Abstract:

The importance of vision and the visual control of movement have been labeled in the literature related to motor control and many studies have demonstrated that children with low motor competence may rely more heavily on vision to perform movements than their typically developing peers. The aim of the study was to highlight the effects of different visual conditions on motor performance during walking in children with different levels of motor coordination. Participants (n = 32, mean age = 8.5 years sd. ± 0.5) were divided into two groups: typical development (TD) and low motor coordination (LMC) based on the scores of the Movement Assessment Battery for Children (MABC-2). They were asked to walk along a 10 meters walkway where the Optojump-Next instrument was installed in a portable laboratory (15 x 3 m), which allows that all participants had the same visual information. They walked in self-selected speed under four visual conditions: full vision (FV), limited vision 100 ms (LV-100), limited vision 150 ms (LV-150) and non-vision (NV). For visual occlusion participants were equipped with Plato Goggles that shut for 100 and 150 ms, respectively, within each 2 sec. Data were analyzed in a two-way mixed-effect ANOVA including 2 (TD vs. LMC) x 4 (FV, LV-100, LV-150 & NV) with repeated-measures on the last factor (p ≤.05). Results indicated that TD children walked faster and with longer normalized steps length and strides than LMC children. For TD children the percentage of the single support and swing time were higher than for low motor competence children. However, the percentage of load response and pre swing was higher in the low motor competence children rather than the TD children. These findings indicated that through walking we could be able to identify different levels of motor coordination in children. Likewise, LMC children showed shorter percentages in those parameters regarding only one leg support, supporting the idea of balance problems.

Keywords: visual information, motor performance, walking pattern, optojump

Procedia PDF Downloads 574
9422 Admissibility as a Property of Evidence in Modern Conditions

Authors: Iryna Teslenko

Abstract:

According to the provisions of the current criminal procedural legislation of Ukraine, the issue of admissibility of evidence is closely related to both the right to a fair trial and the presumption of innocence. The general rule is that evidence obtained improperly or illegally cannot be taken into account in a court case. Therefore, the evidence base of the prosecution, collected at the stage of the pre-trial investigation, compliance with the requirements of the law during the collection of evidence, is of crucial importance for the criminal process, the violation of which entails the recognition of the relevant evidence as inadmissible, which can nullify all the efforts of the pre-trial investigation body and the prosecution. Therefore, the issue of admissibility of evidence in criminal proceedings is fundamentally important and decisive for the entire process. Research on this issue began in December 2021. At that time, there was still no clear understanding of what needed to be conveyed to the scientific community. In February 2022, the lives of all citizens of Ukraine have totally changed. A war broke out in the country. At a time when the entire world community is on the path of humanizing society, respecting the rights and freedoms of man and citizen, a military conflict has arisen in the middle of Europe - one country attacked another, war crimes are being committed. The world still cannot believe it, but it is happening here and now, people are dying, infrastructure is being destroyed, war crimes are being committed, contrary to the signed and ratified international conventions, and contrary to all the acquisitions and development of world law. At this time, the life of the world has divided into before and after February 24, 2022, the world cannot be the same as it was before, and the approach to solving legal issues in the criminal process, in particular, issues of proving the commission of crimes and the involvement of certain persons in their commission. An international criminal has appeared in the humane European world, who disregards all norms of law and morality, and does not adhere to any principles. Until now, the practice of the European Court of Human Rights and domestic courts of Ukraine treated with certain formalism, such a property of evidence in criminal proceedings as the admissibility of evidence. Currently, we have information that the Office of the Prosecutor of the International Criminal Court in The Hague has started an investigation into war crimes in Ukraine and is documenting them. In our opinion, the world cannot allow formalism in bringing a war criminal to justice. There is a war going on in Ukraine, the cities are under round-the-clock missile fire from the aggressor country, which makes it impossible to carry out certain investigative actions. If due to formal deficiencies, the collected evidence is declared inadmissible, it may lead to the fact that the guilty people will not be punished. And this, in turn, sends a message to other terrorists in the world about the impunity of their actions, the system of deterring criminals from committing criminal offenses (crimes) will collapse due to the understanding of the inevitability of punishment, and this will affect the entire world security and European security in particular. Therefore, we believe that the world cannot allow chaos in the issue of general security, there should be a transformation of the approach in general to such a property of evidence in the criminal process as admissibility in order to ensure the inevitability of the punishment of criminals. We believe that the scientific and legal community should not allow criminals to avoid responsibility. The evil that is destroying Ukraine should be punished. We must all together prove that legal norms are not just words written on paper but rules of behavior of all members of society, their non-observance leads to mandatory responsibility. Everybody who commits crimes will be punished, which is inevitable, and this principle is the guarantor of world security in the future.

Keywords: admissibility of evidence, criminal process, war, Ukraine

Procedia PDF Downloads 88
9421 Introducing Information and Communication Technologies in Prison: A Proposal in Favor of Social Reintegration

Authors: Carmen Rocio Fernandez Diaz

Abstract:

This paper focuses on the relevance of information and communication technologies (hereinafter referred as ‘ICTs’) as an essential part of the day-to-day life of all societies nowadays, as they offer the scenario where an immense number of behaviors are performed that previously took place in the physical world. In this context, areas of reality that have remained outside the so-called ‘information society’ are hardly imaginable. Nevertheless, it is possible to identify a means that continue to be behind this reality, and it is the penitentiary area regarding inmates rights, as security aspects in prison have already be improved by new technologies. Introducing ICTs in prisons is still a matter subject to great rejections. The study of comparative penitentiary systems worldwide shows that most of them use ICTs only regarding educational aspects of life in prison and that communications with the outside world are generally based on traditional ways. These are only two examples of the huge range of activities where ICTs can carry positive results within the prison. Those positive results have to do with the social reintegration of persons serving a prison sentence. Deprivation of liberty entails contact with the prison subculture and the harmful effects of it, causing in cases of long-term sentences the so-called phenomenon of ‘prisonization’. This negative effect of imprisonment could be reduced if ICTs were used inside prisons in the different areas where they can have an impact, and which are treated in this research, as (1) access to information and culture, (2) basic and advanced training, (3) employment, (4) communication with the outside world, (5) treatment or (6) leisure and entertainment. The content of all of these areas could be improved if ICTs were introduced in prison, as it is shown by the experience of some prisons of Belgium, United Kingdom or The United States. However, rejections to introducing ICTs in prisons obey to the fact that it could carry also risks concerning security and the commission of new offences. Considering these risks, the scope of this paper is to offer a real proposal to introduce ICTs in prison, trying to avoid those risks. This enterprise would be done to take advantage of the possibilities that ICTs offer to all inmates in order to start to build a life outside which is far from delinquency, but mainly to those inmates who are close to release. Reforming prisons in this sense is considered by the author of this paper an opportunity to offer inmates a progressive resettlement to live in freedom with a higher possibility to obey the law and to escape from recidivism. The value that new technologies would add to education, employment, communications or treatment to a person deprived of liberty constitutes a way of humanization of prisons in the 21st century.

Keywords: deprivation of freedom, information and communication technologies, imprisonment, social reintegration

Procedia PDF Downloads 165
9420 Study on Wireless Transmission for Reconnaissance UAV with Wireless Sensor Network and Cylindrical Array of Microstrip Antennas

Authors: Chien-Chun Hung, Chun-Fong Wu

Abstract:

It is important for a commander to have real-time information to aware situations and to make decision in the battlefield. Results of modern technique developments have brought in this kind of information for military purposes. Unmanned aerial vehicle (UAV) is one of the means to gather intelligence owing to its widespread applications. It is still not clear whether or not the mini UAV with short-range wireless transmission system is used as a reconnaissance system in Taiwanese. In this paper, previous experience on the research of the sort of aerial vehicles has been applied with a data-relay system using the ZigBee modulus. The mini UAV developed is expected to be able to collect certain data in some appropriate theaters. The omni-directional antenna with high gain is also integrated into mini UAV to fit the size-reducing trend of airborne sensors. Two advantages are so far obvious. First, mini UAV can fly higher than usual to avoid being attacked from ground fires. Second, the data will be almost gathered during all maneuvering attitudes.

Keywords: mini UAV, reconnaissance, wireless transmission, ZigBee modulus

Procedia PDF Downloads 194
9419 Rainfall Estimation Using Himawari-8 Meteorological Satellite Imagery in Central Taiwan

Authors: Chiang Wei, Hui-Chung Yeh, Yen-Chang Chen

Abstract:

The objective of this study is to estimate the rainfall using the new generation Himawari-8 meteorological satellite with multi-band, high-bit format, and high spatiotemporal resolution, ground rainfall data at the Chen-Yu-Lan watershed of Joushuei River Basin (443.6 square kilometers) in Central Taiwan. Accurate and fine-scale rainfall information is essential for rugged terrain with high local variation for early warning of flood, landslide, and debris flow disasters. 10-minute and 2 km pixel-based rainfall of Typhoon Megi of 2016 and meiyu on June 1-4 of 2017 were tested to demonstrate the new generation Himawari-8 meteorological satellite can capture rainfall variation in the rugged mountainous area both at fine-scale and watershed scale. The results provide the valuable rainfall information for early warning of future disasters.

Keywords: estimation, Himawari-8, rainfall, satellite imagery

Procedia PDF Downloads 194
9418 Condition Assessment of State-Owned Immovable Assets in South Africa

Authors: Collen Maseloane, Chris Cloete

Abstract:

The study investigated the status of building condition assessments of state-owned immovable assets in South Africa. A stratified random sample of 200 (out of 372) personnel was drawn from the eight rele-vant business units of the Department of Public Works (DPW). A questionnaire comprising open-ended questions was distributed to the sampled participants and a total of 139 completed questionnaires were received. A significant number of state asset properties were found to be in poor condition owing to the asset managers’ inability to access automated information on the conditions of assets. It is recommended that the immovable asset register of the Department requires constant enhancement to update information on the condition of each state-owned immovable asset under its custodianship. Implementation of the proposals should contribute to the maintenance of the value of state assets in South Africa.

Keywords: building condition assessment, immovable asset register, life cycle asset management, public works, South Africa

Procedia PDF Downloads 142
9417 Development of Electronic Governance as an Element of Reforming State Governance According to the Adjarian Example

Authors: Irakli Manvelidze, Genadi Iashvili, Giga Phartenadze, Giorgi Katamadze

Abstract:

Establishment of electronic governance in the region is facing serious problems. Organizational, technical, social and methodological problems have been identified after the research. These problems currently create serious barriers and prevent the development of effective e-governance. Lack of human resources, difference in program targets of the centre and the region, lack of citizens’ awareness about the project of electronic governance are other issues that should be mentioned. In spite of positive changes the overall situation concerning development of modern information-communication technologies in Adjara is not satisfactory. The information systems in the region can be described as transforming in a democratic way which needs serious reforms. Current situation shows that unsystematic, uncoordinated actions were made which overall represents more chaotic rather than coordinated systematic process. Therefore, a strategic document ‘Adjarian Electronic Government’ should be created which will ensure systematic development of electronic governance in the region. The implementation of the strategy of ‘Adjarian Electronic Government’ should be based on not only conceptual and instrumental but also legal basics. A legal normative basis should be created which will include formation of electronic government’s instrumental basis as well as creation of united regional system of electronic document management. Meanwhile types of documents which would be used in inter institutional relations should be defined under a legal norm. Creation of regional united system of e-filing will regulate regional public institutions, relations between local self-government and public organizations as well as it will ensure coordinated work of all regional public institutions.

Keywords: e-government, information society, public administration, reforming state governance, public institutions

Procedia PDF Downloads 282
9416 The Survey Research and Evaluation of Green Residential Building Based on the Improved Group Analytical Hierarchy Process Method in Yinchuan

Authors: Yun-na Wu, Zhen Wang

Abstract:

Due to the economic downturn and the deterioration of the living environment, the development of residential buildings as high energy consuming building is gradually changing from “extensive” to green building in China. So, the evaluation system of green building is continuously improved, but the current evaluation work has the following problems: (1) There are differences in the cost of the actual investment and the purchasing power of residents, also construction target of green residential building is single and lacks multi-objective performance development. (2) Green building evaluation lacks regional characteristics and cannot reflect the different regional residents demand. (3) In the process of determining the criteria weight, the experts’ judgment matrix is difficult to meet the requirement of consistency. Therefore, to solve those problems, questionnaires which are about the green residential building for Ningxia area are distributed, and the results of questionnaires can feedback the purchasing power of residents and the acceptance of the green building cost. Secondly, combined with the geographical features of Ningxia minority areas, the evaluation criteria system of green residential building is constructed. Finally, using the improved group AHP method and the grey clustering method, the criteria weight is determined, and a real case is evaluated, which is located in Xing Qing district, Ningxia. A conclusion can be obtained that the professional evaluation for this project and good social recognition is basically the same.

Keywords: evaluation, green residential building, grey clustering method, group AHP

Procedia PDF Downloads 397
9415 Guard@Lis: Birdwatching Augmented Reality Mobile Application

Authors: Jose A. C. Venancio, Alexandrino J. M. Goncalves, Anabela Marto, Nuno C. S. Rodrigues, Rita M. T. Ascenso

Abstract:

Nowadays, it is common to find people who are concerned about getting away from the everyday life routine, looking forward to outcome well-being and pleasant emotions. Trying to disconnect themselves from the usual places of work and residence, they pursue different places, such as tourist destinations, aiming to have unexpected experiences. In order to make this exploration process easier, cities and tourism agencies seek new opportunities and solutions, creating routes with diverse cultural landmarks, including natural landscapes and historic buildings. These offers frequently aspire to the preservation of the local patrimony. In nature and wildlife, birdwatching is an activity that has been increasing, both in cities and in the countryside. This activity seeks to find, observe and identify the diversity of birds that live permanently or temporarily in these places, and it is usually supported by birdwatching guides. Leiria (Portugal) is a well-known city, presenting several historical and natural landmarks, like the Lis river and the castle where King D. Dinis lived in the 13th century. Along the Lis River, a conservation process was carried out and a pedestrian route was created (Polis project). This is considered an excellent spot for birdwatching, especially for the gray heron (Ardea cinerea) and for the kingfisher (Alcedo atthis). There is also a route through the city, from the riverside to the castle, which encloses a characterized variety of species, such as the barn swallow (Hirundo rustica), known for passing through different seasons of the year. Birdwatching is sometimes a difficult task since it is not always possible to see all bird species that inhabit a given place. For this reason, a need to create a technological solution was found to ease this activity. This project aims to encourage people to learn about the various species of birds that live along the Lis River and to promote the preservation of nature in a conscious way. This work is being conducted in collaboration with Leiria Municipal Council and with the Environmental Interpretation Centre. It intends to show the majesty of the Lis River, a place visited daily by several people, such as children and families, who use it for didactic and recreational activities. We are developing a mobile multi-platform application (Guard@Lis) that allows bird species to be observed along a given route, using representative digital 3D models through the integration of augmented reality technologies. Guard@Lis displays a route with points of interest for birdwatching and a list of species for each point of interest, along with scientific information, images and sounds for every species. For some birds, to ensure their observation, the user can watch them in loco, in their real and natural environment, with their mobile device by means of augmented reality, giving the sensation of presence of these birds, even if they cannot be seen in that place at that moment. The augmented reality feature is being developed with Vuforia SDK, using a hybrid approach to recognition and tracking processes, combining marks and geolocation techniques. This application proposes routes and notifies users with alerts for the possibility of viewing models of augmented reality birds. The final Guard@Lis prototype will be tested by volunteers in-situ.

Keywords: augmented reality, birdwatching route, mobile application, nature tourism, watch birds using augmented reality

Procedia PDF Downloads 178
9414 Examining Media Literacy Strategies through Questionnaires and Analyzing the Behavioral Patterns of Middle-Aged and Elderly Persons

Authors: Chia Yen Li, Wen Huei Chou, Mieko Ohsuga, Tsuyoshi Inoue

Abstract:

The evolution of the digital age has led to people’s lives being pervaded by both facts and misinformation, challenging media literacy (ML). Middle-aged and elderly persons (MEPs) are prone to disseminating large amounts of misinformation, which often endangers their lives due to erroneously believing such information. At present, several countries have actively established fact-checking platforms to combat misinformation, but they are unable to keep pace with the rapid proliferation of such information on social media. In this study, the questionnaire survey method was used to collect data on MEPs’ behavior, cognition, attitudes, and concepts of social media when using a mobile instant messaging app called LINE; analyze their behavioral patterns and reasons for sharing misinformation; and summarize design strategies for improving their ML. The findings can serve as a reference in future related research.

Keywords: media literacy, middle-aged and elderly persons, social media, misinformation

Procedia PDF Downloads 112
9413 Pivoting to Fortify our Digital Self: Revealing the Need for Personal Cyber Insurance

Authors: Richard McGregor, Carmen Reaiche, Stephen Boyle

Abstract:

Cyber threats are a relatively recent phenomenon and offer cyber insurers a dynamic and intelligent peril. As individuals en mass become increasingly digitally dependent, Personal Cyber Insurance (PCI) offers an attractive option to mitigate cyber risk at a personal level. This abstract proposes a literature review that conceptualises a framework for siting Personal Cyber Insurance (PCI) within the context of cyberspace. The lack of empirical research within this domain demonstrates an immediate need to define the scope of PCI to allow cyber insurers to understand personal cyber risk threats and vectors, customer awareness, capabilities, and their associated needs. Additionally, this will allow cyber insurers to conceptualise appropriate frameworks allowing effective management and distribution of PCI products and services within a landscape often in-congruent with risk attributes commonly associated with traditional personal line insurance products. Cyberspace has provided significant improvement to the quality of social connectivity and productivity during past decades and allowed enormous capability uplift of information sharing and communication between people and communities. Conversely, personal digital dependency furnish ample opportunities for adverse cyber events such as data breaches and cyber-attacksthus introducing a continuous and insidious threat of omnipresent cyber risk–particularly since the advent of the COVID-19 pandemic and wide-spread adoption of ‘work-from-home’ practices. Recognition of escalating inter-dependencies, vulnerabilities and inadequate personal cyber behaviours have prompted efforts by businesses and individuals alike to investigate strategies and tactics to mitigate cyber risk – of which cyber insurance is a viable, cost-effective option. It is argued that, ceteris parabus, the nature of cyberspace intrinsically provides characteristic peculiarities that pose significant and bespoke challenges to cyber insurers, often in-congruent with risk attributes commonly associated with traditional personal line insurance products. These challenges include (inter alia) a paucity of historical claim/loss data for underwriting and pricing purposes, interdependencies of cyber architecture promoting high correlation of cyber risk, difficulties in evaluating cyber risk, intangibility of risk assets (such as data, reputation), lack of standardisation across the industry, high and undetermined tail risks, and moral hazard among others. This study proposes a thematic overview of the literature deemed necessary to conceptualise the challenges to issuing personal cyber coverage. There is an evident absence of empirical research appertaining to PCI and the design of operational business models for this business domain, especially qualitative initiatives that (1) attempt to define the scope of the peril, (2) secure an understanding of the needs of both cyber insurer and customer, and (3) to identify elements pivotal to effective management and profitable distribution of PCI - leading to an argument proposed by the author that postulates that the traditional general insurance customer journey and business model are ill-suited for the lineaments of cyberspace. The findings of the review confirm significant gaps in contemporary research within the domain of personal cyber insurance.

Keywords: cyberspace, personal cyber risk, personal cyber insurance, customer journey, business model

Procedia PDF Downloads 103
9412 Public Service Ethics in Public Administration: An Empirical Investigation

Authors: Kalsoom Sumra

Abstract:

The increasing concern of public sector reforms brings new challenges to public service ethics in developing countries not only at central level but also at local level. This paper aims to identify perceptions on public service ethics of public officials and examines more generally the understanding of public servants in Pakistan towards public service ethics in local public organizations. The study uses an independently administered structured questionnaire to collect data to know the extent of the recognition of public service ethics in local organizations. A total of 150 completed questionnaires are analyzed received from public servants working at the local level in Pakistan. The analysis explores how traditional, social patterns and cultural ethics can provide us with a rounded picture of the main antecedents, moderators of public service ethics in Pakistan. Moreover, the findings of this study contribute in association of public service ethics which are crucial in ongoing political and administrative culture of Pakistan, the most crucial core for public organizational ethical climate. This study also has numerous implications for local public administration and it highlights the importance of expanding research agenda on public service ethics in developing settings with challenging institutional contexts with imperfect training and operating environments. This study may well be particularly important for practice of public service ethics in developing countries in public administration. To the best of author’s knowledge, this study is the first of its kind to provide an initial step in practical implications to emphasize relevant public service ethics in public administration in developing transparent and accountable organization.

Keywords: public service ethics, accountability and transparency, public service reforms, public administration, organizational ethical climate

Procedia PDF Downloads 349
9411 The Use of Medicinal Plants among Middle Aged People in Rural Area, West Java, Indonesia

Authors: Rian Diana, Naufal Muharam Nurdin, Faisal Anwar, Hadi Riyadi, Ali Khomsan

Abstract:

The use of traditional medicine (herbs and medicinal plants) are common among Indonesian people especially the elderly. Few study explore the use of medicinal plants in middle aged people. This study aims to collect information on the use of medicinal plants in middle aged people in rural areas. This cross sectional study included 224 subjects aged 45-59 years old and conducted in Cianjur District, West Java in 2014. Semi-structured questionnaires were used to collect information about preference in treatment of illness, the use of medicinal plants, and their purposes. Information also recorded plant names, parts used, mode of preparation, and dosage. Buying drugs in stall (83.9%) is the first preference in treatment of illness, followed by modern treatment 19.2% (doctors) and traditional treatment 17.0% (herbs/medicinal plants). 87 subjects (38.8%) were using herbs and medicinal plants for curative (66.7%), preventive (31.2%), and rehabilitative (2.1%) purposes. In this study, 48 species are used by the subjects. Physalis minima L. 'cecenet', Orthosiphon aristatus Mic. 'kumis kucing', and Annona muricata 'sirsak' are commonly used for the treatment of hypertension and stiffness. Leaves (64.6%) are the most common part used. Medicinal plants were washed and boiled in a hot water. Subject drinks the herbs with a different dosage. One in three middle aged people used herbal and medicinal plants for curative and preventive treatment particularly hypertension and stiffness. Increasing knowledge about herbal or medicinal plants dosage and their interaction with medical drugs are important to do.Doses vary between 1-3 glasses/day for treatment and 1-2 glasses/months for prevention of diseases.

Keywords: herbs, hypertension, medicinal plants, middle age, rural

Procedia PDF Downloads 243
9410 Roles Currently Played by Educational Middle Leaders

Authors: Elaine Marta Pereira Aaltonen

Abstract:

Effective school leadership materialised in educational settings through the high standard professional performance of senior and middle leaders, has increasingly become an education policy priority around the world due to a wide recognition that schools need knowledgeable, skilled, and committed leaders, along with great teachers, in order to ensure outstanding education at all levels of schooling. The scope of this paper is the work of middle leaders, whose direct influence on teachers and classroom teaching, thus, on student learning outcomes, is a key component for successful school systems. It particularly aims at sharing some of the findings obtained through an academic study recently carried out by the same researcher, which was focused on enhancing understanding about aspects related to the professional performance of educational middle leaders, applied to the context of the lower elementary school division of a private mainstream school located in Brazil. The master´s dissertation findings included identifying the roles performed by a team of educational middle leaders throughout the year of 2021, as well as gaining insights on their perceptions about the roles performed, both through an electronic questionnaire and individual face-to-face interviews. Not only the roles of the middle leaders who participated in the research have been identified through the qualitative case study undertaken, but additional research finding lying within the sphere of the categorisation of such roles, based upon coherent domains of practice, has possibly been made. Hence, the main purpose of this paper is to outline the findings concerning the current roles played by educational middle leaders.

Keywords: roles, middle leaders, educational leadership, school leadership, and management

Procedia PDF Downloads 104
9409 Facilitating Conditions Mediating SME’s Intention to Use Social Media for Knowledge Sharing

Authors: Stevens Phaphadi Mamorobela

Abstract:

The Covid-19 pandemic has accelerated the use of social media in SMEs to stay abreast with information about the latest news and developments and to predict the future world of business. The national shutdown regulations for curbing the spread of the Covid-19 virus resulted in SMEs having to distribute large volumes of information through social media platforms to collaborate and conduct business remotely. How much of the information shared on social media is used by SMEs as significant knowledge for economic rent is yet to be known. This study aims to investigate the facilitating conditions that enable SMEs’ intention to use social media as a knowledge-sharing platform to create economic rent and to cope with the Covid-19 challenges. A qualitative research approach was applied where semi-structured interviews were conducted with 13 SME owners located in the Gauteng province in South Africa to identify and explain the facilitating conditions of SMEs towards their intention to use social media as a knowledge-sharing tool in the Covid-19 era. The study discovered that the national lockdown regulations towards curbing the spread of the Covid-19 pandemic had compelled SMEs to adopt digital technologies that enabled them to quickly transform their business processes to cope with the challenges of the pandemic. The facilitating conditions, like access to high bandwidth internet coverage in the Gauteng region, enable SMEs to have strong intentions to use social media to distribute content and to reach out to their target market. However, the content is shared informally using diverse social media platforms without any guidelines for transforming content into rent-yielding knowledge.

Keywords: facilitating conditions, knowledge sharing, social media, intention to use, SME

Procedia PDF Downloads 106
9408 A Study of the British Security Disembedding Mechanism from a Comparative Political Perspective: Centering on the Bosnia War and the Russian-Ukrainian War

Authors: Yuhong Li, Luyu Mao

Abstract:

Globalization has led to an increasingly interconnected international community and transmitted risks to every corner of the world through the chain of globalization. Security risks arising from international conflicts seem inescapable. Some countries have begun to build their capacity to deal with the globalization of security risks. They establish disembedding security mechanisms that transcend spatial or temporal boundaries and promote security cooperation with countries or regions that are not geographically close. This paper proposes four hypotheses of the phenomenon of "risks and security disembedding" in the post-Cold War international society and uses them to explain The United Kingdom’s behavior in the Bosnian War and the Russo-Ukrainian War. In the Bosnian War, confident in its own security and focused on maintaining European stability, The UK has therefore chosen to be cautious in its use of force in international frameworks such as the EU and to maintain a very limited intervention in Bosnia and Herzegovina's affairs. In contrast, the failure of the EU and NATO’s security mechanism in the Russo-Ukrainian war heightened Britain's anxiety, and the volatile international situation led it to show a strong tendency towards security disembedding, choosing to conclude security communities with extra-territorial states. Analysis suggests that security mechanisms are also the starting point of conflict and that countries will rely more on disembedding mechanisms to counteract the global security risks. The current mechanism of security disembedding occurs as a result of the global proliferation of security perceptions as a symbolic token and the recognition of an expert system of security mechanisms formed by states with similar security perceptions.

Keywords: disembedding mechanism, bosnia war, the russian-ukrainian war, british security strategy

Procedia PDF Downloads 87
9407 The Dangers of Attentional Inertia in the Driving Task

Authors: Catherine Thompson, Maryam Jalali, Peter Hills

Abstract:

The allocation of visual attention is critical when driving and anything that limits attention will have a detrimental impact on safety. Engaging in a secondary task reduces the amount of attention directed to the road because drivers allocate resources towards this task, leaving fewer resources to process driving-relevant information. Yet the dangers associated with a secondary task do not end when the driver returns their attention to the road. Instead, the attentional settings adopted to complete a secondary task may persist to the road, affecting attention, and therefore affecting driver performance. This 'attentional inertia' effect was investigated in the current work. Forty drivers searched for hazards in driving video clips while their eye-movements were recorded. At varying intervals they were instructed to attend to a secondary task displayed on a tablet situated to their left-hand side. The secondary task consisted of three separate computer games that induced horizontal, vertical, and random eye movements. Visual search and hazard detection in the driving clips were compared across the three conditions of the secondary task. Results showed that the layout of information in the secondary task, and therefore the allocation of attention in this task, had an impact on subsequent search in the driving clips. Vertically presented information reduced the wide horizontal spread of search usually associated with accurate driving and had a negative influence on the detection of hazards. The findings show the additional dangers of engaging in a secondary task while driving. The attentional inertia effect has significant implications for semi-autonomous and autonomous vehicles in which drivers have greater opportunity to direct their attention away from the driving task.

Keywords: attention, eye-movements, hazard perception, visual search

Procedia PDF Downloads 165
9406 One Step Further: Pull-Process-Push Data Processing

Authors: Romeo Botes, Imelda Smit

Abstract:

In today’s modern age of technology vast amounts of data needs to be processed in real-time to keep users satisfied. This data comes from various sources and in many formats, including electronic and mobile devices such as GPRS modems and GPS devices. They make use of different protocols including TCP, UDP, and HTTP/s for data communication to web servers and eventually to users. The data obtained from these devices may provide valuable information to users, but are mostly in an unreadable format which needs to be processed to provide information and business intelligence. This data is not always current, it is mostly historical data. The data is not subject to implementation of consistency and redundancy measures as most other data usually is. Most important to the users is that the data are to be pre-processed in a readable format when it is entered into the database. To accomplish this, programmers build processing programs and scripts to decode and process the information stored in databases. Programmers make use of various techniques in such programs to accomplish this, but sometimes neglect the effect some of these techniques may have on database performance. One of the techniques generally used,is to pull data from the database server, process it and push it back to the database server in one single step. Since the processing of the data usually takes some time, it keeps the database busy and locked for the period of time that the processing takes place. Because of this, it decreases the overall performance of the database server and therefore the system’s performance. This paper follows on a paper discussing the performance increase that may be achieved by utilizing array lists along with a pull-process-push data processing technique split in three steps. The purpose of this paper is to expand the number of clients when comparing the two techniques to establish the impact it may have on performance of the CPU storage and processing time.

Keywords: performance measures, algorithm techniques, data processing, push data, process data, array list

Procedia PDF Downloads 244
9405 Typology of Fake News Dissemination Strategies in Social Networks in Social Events

Authors: Mohadese Oghbaee, Borna Firouzi

Abstract:

The emergence of the Internet and more specifically the formation of social media has provided the ground for paying attention to new types of content dissemination. In recent years, Social media users share information, communicate with others, and exchange opinions on social events in this space. Many of the information published in this space are suspicious and produced with the intention of deceiving others. These contents are often called "fake news". Fake news, by disrupting the circulation of the concept and similar concepts such as fake news with correct information and misleading public opinion, has the ability to endanger the security of countries and deprive the audience of the basic right of free access to real information; Competing governments, opposition elements, profit-seeking individuals and even competing organizations, knowing about this capacity, act to distort and overturn the facts in the virtual space of the target countries and communities on a large scale and influence public opinion towards their goals. This process of extensive de-truthing of the information space of the societies has created a wave of harm and worries all over the world. The formation of these concerns has led to the opening of a new path of research for the timely containment and reduction of the destructive effects of fake news on public opinion. In addition, the expansion of this phenomenon has the potential to create serious and important problems for societies, and its impact on events such as the 2016 American elections, Brexit, 2017 French elections, 2019 Indian elections, etc., has caused concerns and led to the adoption of approaches It has been dealt with. In recent years, a simple look at the growth trend of research in "Scopus" shows an increasing increase in research with the keyword "false information", which reached its peak in 2020, namely 524 cases, reached, while in 2015, only 30 scientific-research contents were published in this field. Considering that one of the capabilities of social media is to create a context for the dissemination of news and information, both true and false, in this article, the classification of strategies for spreading fake news in social networks was investigated in social events. To achieve this goal, thematic analysis research method was chosen. In this way, an extensive library study was first conducted in global sources. Then, an in-depth interview was conducted with 18 well-known specialists and experts in the field of news and media in Iran. These experts were selected by purposeful sampling. Then by analyzing the data using the theme analysis method, strategies were obtained; The strategies achieved so far (research is in progress) include unrealistically strengthening/weakening the speed and content of the event, stimulating psycho-media movements, targeting emotional audiences such as women, teenagers and young people, strengthening public hatred, calling the reaction legitimate/illegitimate. events, incitement to physical conflict, simplification of violent protests and targeted publication of images and interviews were introduced.

Keywords: fake news, social network, social events, thematic analysis

Procedia PDF Downloads 63
9404 Double Layer Security Model for Identification Friend or Foe

Authors: Buse T. Aydın, Enver Ozdemir

Abstract:

In this study, a double layer authentication scheme between the aircraft and the Air Traffic Control (ATC) tower is designed to prevent any unauthorized aircraft from introducing themselves as friends. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or foe according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as a friend. In this method, even if embedded key is captured by the enemy aircraft, without the information of the second layer, the enemy can easily be determined. Overall, in this work, we present a more reliable system by adding a physical layer in the authentication process.

Keywords: ADS-B, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 161
9403 Raman, Atomic Force Microscopy and Mass Spectrometry for Isotopic Ratios Methods Used to Investigate Human Dentine and Enamel

Authors: Nicoleta Simona Vedeanu, Rares Stiufiuc, Dana Alina Magdas

Abstract:

A detailed knowledge of the teeth structure is mandatory to understand and explain the defects and the dental pathology, but especially to take a correct decision regarding dental prophylaxis and treatment. The present work is an alternative study to the traditional investigation methods used in dentistry, a study based on the use of modern, sensitive physical methods to investigate human enamel and dentin. For the present study, several teeth collected from patients of different ages were used for structural and dietary investigation. The samples were investigated by Raman spectroscopy for the molecular structure analysis of dentin and enamel, atomic force microscopy (AFM) to view the dental topography at the micrometric size and mass spectrometry for isotopic ratios as a fingerprint of patients’ personal diet. The obtained Raman spectra and their interpretation are in good correlation with the literature and may give medical information by comparing affected dental structures with healthy ones. AFM technique gave us the possibility to study in details the dentin and enamel surface to collect information about dental hardness or dental structural changes. δ¹³C values obtained for the studied samples can be classified in C4 category specific to young people and children diet (sweets, cereals, juices, pastry). The methods used in this attempt furnished important information about dentin and enamel structure and dietary habits and each of the three proposed methods can be extended at a larger level in the study of the teeth structure.

Keywords: AFM, dentine, enamel, Raman spectroscopy

Procedia PDF Downloads 145
9402 Ambivalence as Ethical Practice: Methodologies to Address Noise, Bias in Care, and Contact Evaluations

Authors: Anthony Townsend, Robyn Fasser

Abstract:

While complete objectivity is a desirable scientific position from which to conduct a care and contact evaluation (CCE), it is precisely the recognition that we are inherently incapable of operating objectively that is the foundation of ethical practice and skilled assessment. Drawing upon recent research from Daniel Kahneman (2021) on the differences between noise and bias, as well as different inherent biases collectively termed “The Elephant in the Brain” by Kevin Simler and Robin Hanson (2019) from Oxford University, this presentation addresses both the various ways in which our judgments, perceptions and even procedures can be distorted and contaminated while conducting a CCE, but also considers the value of second order cybernetics and the psychodynamic concept of ‘ambivalence’ as a conceptual basis to inform our assessment methodologies to limit such errors or at least better identify them. Both a conceptual framework for ambivalence, our higher-order capacity to allow for the convergence and consideration of multiple emotional experiences and cognitive perceptions to inform our reasoning, and a practical methodology for assessment relying on data triangulation, Bayesian inference and hypothesis testing is presented as a means of promoting ethical practice for health care professionals conducting CCEs. An emphasis on widening awareness and perspective, limiting ‘splitting’, is demonstrated both in how this form of emotional processing plays out in alienating dynamics in families as well as the assessment thereof. In addressing this concept, this presentation aims to illuminate the value of ambivalence as foundational to ethical practice for assessors.

Keywords: ambivalence, forensic, psychology, noise, bias, ethics

Procedia PDF Downloads 87