Search results for: information use behaviour
9690 Strategic Thinking to Change Behavior and Improve Sanitation in Jodipan and Kesatrian, Malang, East Java, Indonesia
Authors: Prasanti Widyasih Sarli, Prayatni Soewondo
Abstract:
Greater access to sanitation in developing countries is urgent. However even though sanitation is crucial, overall budget for sanitation is limited. With this budget limitation, it is important to (1) allocate resources strategically to maximize impact and (2) take into account communal agency to potentially be a source for sanitation improvements. The Jodipan and Kesatrian Project in Malang, Indonesia is an interesting alternative for solving the sanitation problem in which resources were allocated strategically and communal agency was also observed. Although the projects initial goal was only to improve visually the situation in the slums, it became a new tourist destination, and the economic benefit that came with it had an effect also on the change of behavior of the residents and the government towards sanitation. It also grew from only including the Kesatrian Village to expanding to the Jodipan Village in the course of less than a year. To investigate the success of this project, in this paper a descriptive model will be used and data will be drawn from intensive interviews with the initiators of the project, residents affected by the project and government officials. In this research it is argued that three points mark the success of the project: (1) the strategic initial impact due to choice of location, (2) the influx of tourists that triggered behavioral change among residents and, (3) the direct economic impact which ensured its sustainability and growth by gaining government officials support and attention for more public spending in the area for slum development and sanitation improvement.Keywords: behaviour change, sanitation, slum, strategic thinking
Procedia PDF Downloads 3279689 Method of Synthesis of Controlled Generators Balanced a Strictly Avalanche Criteria-Functions
Authors: Ali Khwaldeh, Nimer Adwan
Abstract:
In this paper, a method for constructing a controlled balanced Boolean function satisfying the criterion of a Strictly Avalanche Criteria (SAC) effect is proposed. The proposed method is based on the use of three orthogonal nonlinear components which is unlike the high-order SAC functions. So, the generator synthesized by the proposed method has separate sets of control and information inputs. The proposed method proves its simplicity and the implementation ability. The proposed method allows synthesizing a SAC function generator with fixed control and information inputs. This ensures greater efficiency of the built-in oscillator compared to high-order SAC functions that can be used as a generator. Accordingly, the method is completely formalized and implemented as a software product.Keywords: boolean function, controlled balanced boolean function, strictly avalanche criteria, orthogonal nonlinear
Procedia PDF Downloads 1569688 The Use of Social Media and Its Impact on the Learning Behavior of ESL University Students for Sustainable Education in Pakistan
Authors: Abdullah Mukhtar, Shehroz Mukhtar, Amina Mukhtar, Choudhry Shahid, Hafiz Raza Razzaq, Saif Ur Rahman
Abstract:
The aim of this study is to find out the negative and positive impacts of social media platforms on the attitude toward learning and the educational environment of the student community. Social Media platforms have become a source of collaboration with one another throughout the globe, making it a small world. This study performs a focalized investigation of the adverse and constructive factors that have a strong impact not only on psychological adjustments but also on the academic performance of peers. This study is quantitative research adopting a random sampling method in which the participants were the students at the university. The researcher distributed 1000 questionnaires among the university students from different departments and asked them to fill in the data on the Lickert Scale. The participants are from the age group of 18-24 years. The study applies user and gratification theory in order to examine the behavior of students practicing social media in their academic and personal lives. The findings of the study reveal that the use of social media platforms in the Pakistani context has less positive impact as compared to negative impacts on the behavior of students towards learning. The research suggests that usage of online social media platforms should be taught to students; awareness must the created among the users of social media by means of seminars, workshops and by media itself to overcome the negative impacts of social media, leading towards sustainable education in Pakistan.Keywords: social media, positive impacts, negative impacts, sustainable education, learning behaviour
Procedia PDF Downloads 569687 The Impact of Life Satisfaction on Substance Abuse: Delinquency as a Mediator
Authors: Mahadzirah Mohamad, Morliyati Mohammad, Nor Azman Mat Ali, Zainudin Awang
Abstract:
Globally, youth substance abuse has been identified as the problem that causes substantial damage not only to individuals, but also to families and communities. In addition, substance abuse youths have become unproductive resources that would play lesser roles in the nation’s development. The increasing trend of substance abuse among youths has raised a lot of concern among various quarters in Malaysia. It has also been reported that Malay youths are the majority group involved in substance abuse. However, it was noted that life satisfaction had been found to be an important mitigating factor that addressed substance abuse. The objectives of the study were twofold: firstly, to ascertain the effect of life satisfaction on substance abuse among Malay youth. Secondly, to identify the role of delinquency on the relationship between life satisfaction and substance abuse. This study adopted a cross-sectional research design. Self-administered questionnaires were distributed to 500 Malay youths at the youth programmes using a two-step sampling technique: area sampling and systematic sampling. The research hypotheses were tested using Structural Equation Modelling. The findings of the study revealed that there is no significance relationship between life satisfaction and substance abuse. There is a significant inverse relationship between life satisfaction and delinquency. Moreover, delinquency has a positive significant influence on substance abuse. The use of Bootstrapping analysis proved that delinquency plays a full mediating role in the relationship between life satisfaction and substance abuse. This study suggested that life satisfaction has no effect on youth substance abuse. In order to reduce substance abuse, efforts should be undertaken to reduce delinquency behaviour by increasing youth life satisfaction.Keywords: delinquency, life satisfaction, substance abuse, youth
Procedia PDF Downloads 3539686 Changing the Way South Africa Think about Parking Provision at Tertiary Institutions
Authors: M. C. Venter, G. Hitge, S. C. Krygsman, J. Thiart
Abstract:
For decades, South Africa has been planning transportation systems from a supply, rather than a demand side, perspective. In terms of parking, this relates to requiring the minimum parking provision that is enforced by city officials. Newer insight is starting to indicate that South Africa needs to re-think this philosophy in light of a new policy environment that desires a different outcome. Urban policies have shifted from reliance on the private car for access, to employing a wide range of alternative modes. Car dominated travel is influenced by various parameters, of which the availability and location of parking plays a significant role. The question is therefore, what is the right strategy to achieve the desired transport outcomes for SA. The focus of this paper is used to assess this issue with regard to parking provision, and specifically at a tertiary institution. A parking audit was conducted at the Stellenbosch campus of Stellenbosch University, monitoring occupancy at all 60 parking areas, every hour during business hours over a five-day period. The data from this survey was compared with the prescribed number of parking bays according to the Stellenbosch Municipality zoning scheme (requiring a minimum of 0.4 bays per student). The analysis shows that by providing 0.09 bays per student, the maximum total daily occupation of all the parking areas did not exceed an 80% occupation rate. It is concluded that the prevailing parking standards are not supportive of the new urban and transport policy environment, but that it is extremely conservative from a practical demand point of view.Keywords: parking provision, parking requirements, travel behaviour, travel demand management
Procedia PDF Downloads 1819685 An Investigation of Customer Relationship Management of Tourism
Authors: Wanida Suwunniponth
Abstract:
This research paper aimed to developing a causal relationship model of success factors of customer relationship management of tourism in Thailand and to investigating relationships among the potential factors that facilitate the success of customer relationship management (CRM). The research was conducted in both quantitative and qualitative methods, by utilizing both questionnaire and in-depth interview. The questionnaire was used in collecting the data from 250 management staff in the hotels located within Bangkok area. Sampling techniques used in this research included cluster sampling according to the service quality and simple random sampling. The data input was analyzed by use of descriptive analysis and System Equation Model (SEM). The research findings demonstrated important factors accentuated by most respondents towards the success of CRM, which were organization, people, information technology and the process of CRM. Moreover, the customer relationship management of tourism business in Thailand was found to be successful at a very significant level. The hypothesis testing showed that the hypothesis was accepted, as the factors concerning with organization, people and information technology played an influence on the process and the success of customer relationship management, whereas the process of customer relationship management factor manipulated its success. The findings suggested that tourism business in Thailand with the implementation of customer relationship management should opt in improvement approach in terms of managerial structure, corporate culture building with customer- centralized approach accentuated, and investment of information technology and customer analysis, in order to capacitate higher efficiency of customer relationship management process that would result in customer satisfaction and retention of service.Keywords: customer relationship management, casual relationship model, tourism, Thailand
Procedia PDF Downloads 3309684 Analysis of Changes in Land Uses Planning for Bangalore City as per Master Plans
Authors: Minakshi Goswami, M. V. Khire
Abstract:
The urban land use is an outcome of geographical and socio economic factors over the decades. Hence, spatial information on land use and possibilities of alternate use is essential for the selection, planning and implementation to meet the increasing demands of human needs and welfare of the urban area. This information assists in monitoring the land use resulting out of charging demands of increasing urban population over the decades. So in this paper, a detailed work on urban land use pattern, with a special reference to build up land in Bangalore city is analyzed in view of the various master plans from 1975to 2011. An attempt has been made to study the status of urban land use of Bangalore city during this period to detect the changes on land utilization rate that has taken place in each master plan period, particularly in the built-up land. The set of measures taken by the city corporation to contain the problems regarding the extremely bothering existing land use in Bangalore city is analyzed.Keywords: built up land, land use changes, master plan, population
Procedia PDF Downloads 4639683 Development of Mucoadhesive Multiparticulate System for Nasal Drug Delivery
Authors: K. S. Hemant Yadav, H. G. Shivakumar
Abstract:
The present study investigation was to prepare and evaluate the mucoadhesive multi-particulate system for nasal drug delivery of anti-histaminic drug. Ebastine was chosen as the model drug. Drug loaded nanoparticles of Ebastine were prepared by ionic gelation method using chitosan as polymer using the drug-polymer weight ratios 1:1, 1:2, 1:3. Sodium tripolyphosphate (STPP) was used as the cross-linking agent in the range of 0.5 and 0.7% w/v. FTIR and DSC studies indicated that no chemical interaction occurred between the drug and polymers. Particle size ranged from 169 to 500 nm. The drug loading and entrapment efficiency was found to increase with increase in chitosan concentration and decreased with increase in poloxamer 407 concentration. The results of in vitro mucoadhesion carried out showed that all the prepared formulation had good mucoadhesive property and mucoadhesion increases with increase in the concentration of chitosan. The in vitro release pattern of all the formulations was observed to be in a biphasic manner characterized by slight burst effect followed by a slow release. By the end of 8 hrs, formulation F6 showed a release of only 86.9% which explains its sustained behaviour. The ex-vivo permeation of the pure drug ebastine was rapid than the optimized formulation(F6) indicating the capability of the chitosan polymer to control drug permeation rate through the sheep nasal mucosa. The results indicated that the mucoadhesive nanoparticulate system can be used for the nasal delivery of antihistaminic drugs in an effective manner.Keywords: nasal, nanoparticles, ebastine, anti-histaminic drug, mucoadhesive multi-particulate system
Procedia PDF Downloads 4199682 Bile Salt Induced Microstructural Changes of Gemini Surfactant Micelles
Authors: Vijaykumar Patel, P. Bahadur
Abstract:
Microstructural evolution of a cationic gemini surfactant 12-4-12 micelles in the presence of bile salts has been investigated using different techniques. A negative value of interaction parameter evaluated from surface tension measurements is a signature of strong synergistic interaction between oppositely charged surfactants. Both the bile salts compete with each other in inducing the micellar transition of 12-4-12 micelles depending on their hydrophobicity. Viscosity measurements disclose that loading of bile salts induces morphological changes in 12-4-12 micelles; sodium deoxycholate is more efficient in altering the aggregation behaviour of 12-4-12 micelles compared to sodium cholate and presents pronounced increase in viscosity and micellar growth which is suppressed at elevated temperatures. A remarkable growth of 12-4-12 micelles in the presence of sodium deoxycholate at low pH has been ascribed to the solubilization of bile acids formed in acidic medium. Small angle neutron scattering experiments provided size and shape of 12-4-12/bile salt mixed micelles are explicated on the basis of hydrophobicity of bile salts. The location of bile salts in micelle was determined from nuclear overhauser effect spectroscopy. The present study characterizes 12-4-12 gemini-bile salt mixed systems which significantly enriches our knowledge, and such a structural transition provides an opportunity to use these bioamphiphiles as delivery vehicles and in some pharmaceutical formulations.Keywords: gemini surfactants, bile salts, SANS (small angle neutron scattering), NOESY (nuclear overhauser effect spectroscopy)
Procedia PDF Downloads 1519681 Employing a System of Systems Approach in the Maritime RobotX Challenge: Incorporating Information Technology Students in the Development of an Autonomous Catamaran
Authors: Adam Jenkins
Abstract:
The Maritime RobotX Challenge provides a platform for postgraduate students conducting research in autonomous robotic systems to participate in an international competition. Although targeted to postgraduate students, the problem domain lends itself to a wide range of different levels of student expertise. In 2022, undergraduate Information Technology students from the University of South Australia undertook the challenge, utilizing a System of the Systems approach to the project's architecture. Each student group produced an independent solution to an identified task, which was then implemented on a Single Board Computer (SBC). A Central Control System then engaged each solution when appropriate, allowing the encapsulated SBC systems to manage each task as it was encountered. This approach facilitated collaboration among the multiple independent student teams over an 18-month period, and the fundamental system-agnostic architecture allowed for both the variance in student solutions and the limitations caused by the global electronics shortage. By adopting this approach, Information Technology teams were able to work independently yet produce an effective solution, leveraging their expertise to develop and construct an autonomous catamaran capable of meeting the competition's demanding requirements while producing a high level of engagement. The System of Systems approach is recommended to other universities interested in competing at this level and engaging students in a real-world problem.Keywords: case study, robotics, education, programming, system of systems, multi-disciplinary collaboration
Procedia PDF Downloads 769680 Application of Griddization Management to Construction Hazard Management
Authors: Lingzhi Li, Jiankun Zhang, Tiantian Gu
Abstract:
Hazard management that can prevent fatal accidents and property losses is a fundamental process during the buildings’ construction stage. However, due to lack of safety supervision resources and operational pressures, the conduction of hazard management is poor and ineffective in China. In order to improve the quality of construction safety management, it is critical to explore the use of information technologies to ensure that the process of hazard management is efficient and effective. After exploring the existing problems of construction hazard management in China, this paper develops the griddization management model for construction hazard management. First, following the knowledge grid infrastructure, the griddization computing infrastructure for construction hazards management is designed which includes five layers: resource entity layer, information management layer, task management layer, knowledge transformation layer and application layer. This infrastructure will be as the technical support for realizing grid management. Second, this study divides the construction hazards into grids through city level, district level and construction site level according to grid principles. Last, a griddization management process including hazard identification, assessment and control is developed. Meanwhile, all stakeholders of construction safety management, such as owners, contractors, supervision organizations and government departments, should take the corresponding responsibilities in this process. Finally, a case study based on actual construction hazard identification, assessment and control is used to validate the effectiveness and efficiency of the proposed griddization management model. The advantage of this designed model is to realize information sharing and cooperative management between various safety management departments.Keywords: construction hazard, griddization computing, grid management, process
Procedia PDF Downloads 2759679 Finite Element Simulation of RC Exterior Beam-Column Joints Using Damage Plasticity Model
Authors: A. M. Halahla, M. H. Baluch, M. K. Rahman, A. H. Al-Gadhib, M. N. Akhtar
Abstract:
In the present study, 3D simulation of a typical exterior (RC) beam–column joint (BCJ) strengthened with carbon fiber-reinforced plastic (CFRP) sheet are carried out. Numerical investigations are performed using a nonlinear finite element ( FE) analysis by incorporating damage plasticity model (CDP), for material behaviour the concrete response in compression, tension softening were used, linear plastic with isotropic hardening for reinforcing steel, and linear elastic lamina material model for CFRP sheets using the commercial FE software ABAQUS. The numerical models developed in the present study are validated with the results obtained from the experiment under monotonic loading using the hydraulic Jack in displacement control mode. The experimental program includes casting of deficient BCJ loaded to failure load for both un-strengthened and strengthened BCJ. The failure mode, and deformation response of CFRP strengthened and un-strengthened joints and propagation of damage in the components of BCJ are discussed. Finite element simulations are compared with the experimental result and are noted to yield reasonable comparisons. The damage plasticity model was able to capture with good accuracy of the ultimate load and the mode of failure in the beam column joint.Keywords: reinforced concrete, exterior beam-column joints, concrete damage plasticity model, computational simulation, 3-D finite element model
Procedia PDF Downloads 3839678 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours
Authors: Elham Rajabian
Abstract:
The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture
Procedia PDF Downloads 979677 Using Atomic Force Microscope to Investigate the Influence of UVA Radiation and HA on Cell Behaviour and Elasticity of Dermal Fibroblasts
Authors: Pei-Hsiu Chiang, Ling Hong Huang, Hsin-I Chang
Abstract:
In this research, we used UVA irradiation, which can penetrate into dermis and fibroblasts, the most abundant cells in dermis, to investigate the effect of UV light on dermis, such as inflammation, ECM degradation and elasticity loss. Moreover, this research is focused on the influence of hyaluronic acid (HA) on UVA treated dermal fibroblasts. We aim to establish whether HA can effectively relief ECM degradation, and restore the elasticity of UVA-damaged fibroblasts. Prolonged exposure to UVA radiation can damage fibroblasts and led variation in cell morphology and reduction in cell viability. Besides, UVA radiation can induce IL-1β expression on fibroblasts and then promote MMP-1 and MMP-3 expression, which can accelerate ECM degradation. On the other hand, prolonged exposure to UVA radiation reduced collagen and elastin synthesis on fibroblasts. Due to the acceleration of ECM degradation and the reduction of ECM synthesis, Atomic force microscope (AFM) was used to analyze the elasticity reduction on UVA-damaged fibroblasts. UVA irradiation causes photoaging on fibroblasts. UVA damaged fibroblasts with HA treatment can down-regulate the gene expression of MMP-1, MMP-3, and then slow down ECM degradation. On the other hand, HA may restore elastin and collagen synthesis in UV-damaged fibroblasts. Based on the slowdown of ECM degradation, UVA-damaged fibroblast elasticity can be effectively restored by HA treatment. In summary, HA can relief the photoaging conditions on fibroblasts, but may not be able to return fibroblasts to normal, healthy state. Although HA cannot fully recover UVA-damaged fibroblasts, HA is still potential for repairing photoaging skin.Keywords: atomic force microscope, hyaluronic acid, UVA radiation, dermal fibroblasts
Procedia PDF Downloads 3919676 Effect of Parenting Style on Aggression and Empathy in Children Between the Ages of 10-12
Authors: Debangana Mukherjee
Abstract:
This study delves into the pivotal role of parenting styles in shaping the development of aggression and empathy in children aged 10 to 12. Using a sample of 300 school students, we employed self-assessment questionnaires and scales to investigate correlations between parenting styles—authoritative, authoritarian, permissive, and neglectful—and behavioural traits, focusing on aggression and empathy as primary outcomes. The findings underscore the intricate relationships between parenting styles, aggressive behaviours, and empathetic tendencies. Notably, certain parenting approaches demonstrated strong correlations with specific behavioural outcomes. For instance, authoritarian parenting showed associations with increased aggression and reduced empathy, while authoritative parenting exhibited the opposite trend. These correlations emphasize the potential impact of parenting styles on children's behavioural development during this critical transitional phase. However, this study is limited by its correlational nature, which does not imply causation. The complexities of human behaviour, the limited scope of analysis, and the need for further research into causative relationships and cultural influences call for a nuanced understanding of these dynamics. Moving forward, longitudinal studies, causality investigations, consideration of cultural diversity, and exploration of additional variables could enrich our understanding of the interplay between parenting styles, empathy, and aggression. Validating these findings across diverse populations and refining interventions could pave the way for nurturing healthy behavioural development in children.Keywords: aggression, correlational nature, empathy, longitudinal studies, parenting style
Procedia PDF Downloads 539675 The Influence of Parenting Patterns on Adolescent Deliquincy
Authors: Salsabila Rizka Pratama
Abstract:
In this day and age, delinquency has become common to young children, and it is a violation of the norms, and legal systems of a society that are carried out during adolescenceIt is the transition from childhood to adulthood. PerversionYouth from criminal law are a common problem among adolescents in homes, schools, and communities. Without proper treatment, delinquency can turn into a crime and is likely to send a child to prison. If dug deeper, the development of delinquency is strongly influenced by family and community life. Families play an important role in the prevention of delinquency. One way a family can help prevent delinquency is by using the proper upbringing. The upbringing that parents use affects children's behavior. Improper parenting can lead to delinquency. On the other hand, proper parenting will prevent delinquency. But delinquency is not influenced only by parental upbringing, the appearance of delinquency can be influenced by the environment, religion, economic factors, information technology factors.Keywords: parenting, parents, juvenile delinquency, family, youth, crime, environment, religion, economy, information technology
Procedia PDF Downloads 1549674 Mobile Augmented Reality for Collaboration in Operation
Authors: Chong-Yang Qiao
Abstract:
Mobile augmented reality (MAR) tracking targets from the surroundings and aids operators for interactive data and procedures visualization, potential equipment and system understandably. Operators remotely communicate and coordinate with each other for the continuous tasks, information and data exchange between control room and work-site. In the routine work, distributed control system (DCS) monitoring and work-site manipulation require operators interact in real-time manners. The critical question is the improvement of user experience in cooperative works through applying Augmented Reality in the traditional industrial field. The purpose of this exploratory study is to find the cognitive model for the multiple task performance by MAR. In particular, the focus will be on the comparison between different tasks and environment factors which influence information processing. Three experiments use interface and interaction design, the content of start-up, maintenance and stop embedded in the mobile application. With the evaluation criteria of time demands and human errors, and analysis of the mental process and the behavior action during the multiple tasks, heuristic evaluation was used to find the operators performance with different situation factors, and record the information processing in recognition, interpretation, judgment and reasoning. The research will find the functional properties of MAR and constrain the development of the cognitive model. Conclusions can be drawn that suggest MAR is easy to use and useful for operators in the remote collaborative works.Keywords: mobile augmented reality, remote collaboration, user experience, cognition model
Procedia PDF Downloads 1979673 Concentration of Waste Waters by Enzyme-Assisted Low-Temperature Evaporation
Authors: Ahokas Mikko, Taskila Sanna, Varrio Kalle, Tanskanen Juha
Abstract:
The present research aimed at the development of an energy efficient process for the concentration of starchy waste waters. The selected principle is mechanical vapor recompression evaporation (MVR) which leads to concentrated solid material and evaporated water phase. Evaporation removes water until a certain viscosity limit is reached. Materials with high viscosity cannot be concentrated using standard evaporators due to limitations of pumps and other constraints, such as wetting. Control of viscosity is thus essential for efficient evaporation. This applies especially to fluids in which due starch or other compounds the viscosity tends to increase via removal of water. In the present research, the effect of enzymes on evaporation of highly viscous starch industry waste waters was investigated. Wastewater samples were received from starch industry at pH of 4.8. Response surface methodology (RSM) was applied for the investigation of factor effects on the behaviour of concentrate during evaporation. The RSM was prepared using quadratic face-centered central composite design (CCF). The evaporation performance was evaluated by monitoring the viscosity of fluid during processing. Based on viscosity curves, the addition of glucoamylase reduced the viscosity during evaporation. This assumption was confirmed by CCF, suggesting that the use of starch decomposing glucoamylase allowed evaporation of the starchy wastewater to a relatively high total solid concentration without a detrimental increase in the viscosity. The results suggest that use of enzymes for reduction of viscosity during the evaporation allows more effective concentration of the wastewater and thereby recovery of potable water.Keywords: viscous, wastewater, treatment, evaporation, concentration
Procedia PDF Downloads 2449672 Smartphones: Tools for Enhancing Teaching in Nigeria’s Higher Institutions
Authors: Ma'amun Muhammed
Abstract:
The ability of smartphones in enhancing communication, providing access to business and serving as a pool for information retrieval has a far reaching and potentially beneficial impacts on enhancing teaching in higher institutions in the developing countries like Nigeria. Nigeria as one of the fast growing economies in Africa, whose citizens patronize smartphones can utilize this opportunity by inculcating the culture of using smartphones not only for communication, business transaction, banking etc. but also for enhancing teaching in the higher institutions. Smartphones have become part and parcel of our lives, particularly among young people. The primary objective of this paper is to ascertain the use of smartphones in enhancing teaching in Nigeria’s higher institutions, to achieve this, content analysis was used thoroughly. This paper examines the opportunities offered by smartphones to the students of higher institutions of learning, the challenges being faced by lecturers of these institutions in classrooms. Lastly, it offers solution on how some of these critical challenges will be overcame, so as to utilize the technology of these devices.Keywords: communication, information retrieval, mobile phone, smartphones teaching
Procedia PDF Downloads 4239671 A Robust Spatial Feature Extraction Method for Facial Expression Recognition
Authors: H. G. C. P. Dinesh, G. Tharshini, M. P. B. Ekanayake, G. M. R. I. Godaliyadda
Abstract:
This paper presents a new spatial feature extraction method based on principle component analysis (PCA) and Fisher Discernment Analysis (FDA) for facial expression recognition. It not only extracts reliable features for classification, but also reduces the feature space dimensions of pattern samples. In this method, first each gray scale image is considered in its entirety as the measurement matrix. Then, principle components (PCs) of row vectors of this matrix and variance of these row vectors along PCs are estimated. Therefore, this method would ensure the preservation of spatial information of the facial image. Afterwards, by incorporating the spectral information of the eigen-filters derived from the PCs, a feature vector was constructed, for a given image. Finally, FDA was used to define a set of basis in a reduced dimension subspace such that the optimal clustering is achieved. The method of FDA defines an inter-class scatter matrix and intra-class scatter matrix to enhance the compactness of each cluster while maximizing the distance between cluster marginal points. In order to matching the test image with the training set, a cosine similarity based Bayesian classification was used. The proposed method was tested on the Cohn-Kanade database and JAFFE database. It was observed that the proposed method which incorporates spatial information to construct an optimal feature space outperforms the standard PCA and FDA based methods.Keywords: facial expression recognition, principle component analysis (PCA), fisher discernment analysis (FDA), eigen-filter, cosine similarity, bayesian classifier, f-measure
Procedia PDF Downloads 4259670 The Traveling Business Websites Quality that Effect to Overall Impression of the Tourist in Thailand
Authors: Preecha Phongpeng
Abstract:
The objectives of this research are to assess the prevalence of travel businesses websites in Thailand, investigate and evaluate the quality of travel business websites in Thailand. The sample size includes 323 websites from the population of 1,458 websites. The study covers 4 types of travel business websites including: 78 general travel agents, 30 online reservation travel agents, 205 hotels, 7 airlines, and 3 car-rental companies with nation-wide operation. The findings indicated that e-tourism in Thailand is at its growth stage, with only 13% of travel businesses having websites, 28% of them providing e-mail and the quality of travel business websites in Thailand was at the average level. Seven common problems were found in websites: lack of travel essential information, insufficient transportation information, lack of navigation tools, lack of link pages to other organizations, lack of safety features, unclear online booking functions, and lack of special features also as well.Keywords: traveling business, website evaluation, e-commerce, e-tourism
Procedia PDF Downloads 3029669 Digital Forensic Exploration Framework for Email and Instant Messaging Applications
Authors: T. Manesh, Abdalla A. Alameen, M. Mohemmed Sha, A. Mohamed Mustaq Ahmed
Abstract:
Email and instant messaging applications are foremost and extensively used electronic communication methods in this era of information explosion. These applications are generally used for exchange of information using several frontend applications from various service providers by its users. Almost all such communications are now secured using SSL or TLS security over HTTP communication. At the same time, it is also noted that cyber criminals and terrorists have started exchanging information using these methods. Since communication is encrypted end-to-end, tracing significant forensic details and actual content of messages are found to be unattended and severe challenges by available forensic tools. These challenges seriously affect in procuring substantial evidences against such criminals from their working environments. This paper presents a vibrant forensic exploration and architectural framework which not only decrypts any communication or network session but also reconstructs actual message contents of email as well as instant messaging applications. The framework can be effectively used in proxy servers and individual computers and it aims to perform forensic reconstruction followed by analysis of webmail and ICQ messaging applications. This forensic framework exhibits a versatile nature as it is equipped with high speed packet capturing hardware, a well-designed packet manipulating algorithm. It regenerates message contents over regular as well as SSL encrypted SMTP, POP3 and IMAP protocols and catalyzes forensic presentation procedure for prosecution of cyber criminals by producing solid evidences of their actual communication as per court of law of specific countries.Keywords: forensics, network sessions, packet reconstruction, packet reordering
Procedia PDF Downloads 3449668 The Relationship between Job Stress and Handover Effectiveness of Nurses
Authors: Rujnan Tuna, Ayse Cil Akinci
Abstract:
Work life takes up an important place in human life, and an employed person faces many stimuli from internal and external environments and is affected by them in a positive or negative way. Also, the handover process, which is the process of sharing information about the patient with other health professionals, is an important criterion to maintain patient care and enhance the quality of care provided. Handover is a key component for sustaining daily basic clinical practices and is also essential to maintain the safe patient care. This investigation followed a descriptive and correlation design in order to establish job stress and the handover efficiency of nurses and the relationship in between. The study was conducted with 192 nurses working in a public hospital in Istanbul between January and March 2017. Descriptive information form, Job Stressors Scale, and Handover Evaluation Scale were used to collect the data of the study. The data were analyzed by using IBM SPSS Statistics 22.0 statistical software. Approvals from participants, managers of institution, and ethics committee were taken for the study. As a result of the research, it was found that job stress was above the median value, and the highest score in the ‘work role conflict’ subdimension. Also, it was found that the effectiveness of the nurses' handover effectiviness was above the median value and the highest score in the ‘quality of information’ subdimension. In the study, there was a negatively weak correlation between ‘work role overload’ subdimension of Job Stressors Scale and ‘interaction and support’ subdimension of Handover Evaluation Scale. There is a need for further study in order to maintain patient safety.Keywords: handover, job stress, nurse, patient
Procedia PDF Downloads 1689667 A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain
Authors: Hiroaki Nasu, Ryota Miyamoto, Yuta Kodera, Yasuyuki Nogami
Abstract:
To promote Industry 4.0 and Society 5.0 and so on, it is important to connect and share data so that every member can trust it. Blockchain (BC) technology is currently attracting attention as the most advanced tool and has been used in the financial field and so on. However, the data collaboration using BC has not progressed sufficiently among companies on the supply chain of manufacturing industry that handle sensitive data such as product quality, manufacturing conditions, etc. There are two main reasons why data utilization is not sufficiently advanced in the industrial supply chain. The first reason is that manufacturing information is top secret and a source for companies to generate profits. It is difficult to disclose data even between companies with transactions in the supply chain. In the blockchain mechanism such as Bitcoin using PKI (Public Key Infrastructure), in order to confirm the identity of the company that has sent the data, the plaintext must be shared between the companies. Another reason is that the merits (scenarios) of collaboration data between companies are not specifically specified in the industrial supply chain. For these problems this paper proposes a Business to Business (B2B) collaboration system using homomorphic encryption and BC technique. Using the proposed system, each company on the supply chain can exchange confidential information on encrypted data and utilize the data for their own business. In addition, this paper considers a scenario focusing on quality data, which was difficult to collaborate because it is a top secret. In this scenario, we show a implementation scheme and a benefit of concrete data collaboration by proposing a comparison protocol that can grasp the change in quality while hiding the numerical value of quality data.Keywords: business to business data collaboration, industrial supply chain, blockchain, homomorphic encryption
Procedia PDF Downloads 1369666 Visualisation in Health Communication: Taking Weibo Interaction in COVD19 as the Example
Authors: Zicheng Zhang, Linli Zhang
Abstract:
As China's biggest social media platform, Weibo has taken on essential health communication responsibilities during the pandemic. This research takes 105 posters in 15 health-related official Weibo accounts as the analysis objects to explore COVID19 health information communication and visualisation. First, the interaction between the audiences and Weibo, including forwarding, comments, and likes, is statistically analysed. The comments about the information design are extracted manually, and then the sentiment analysis is carried out to verdict audiences' views about the poster's design. The forwarding and comments are quantified as the attention index for a reference to the degree of likes. In addition, this study also designed an evaluation scale based on the standards of Health Literacy Resource by the Centers for Medicare& Medicaid Services (US). Then designers scored all selected posters one by one. Finally, combining the data of the two parts, concluded that: 1. To a certain extent, people think that the posters do not deliver substantive and practical information; 2. Non-knowledge posters(i.e., cartoon posters) gained more Forwarding and Likes, such as Go, Wuhan poster; 3. The analysis of COVID posters is still mainly picture-oriented, mainly about encouraging people to overcome difficulties; 4. Posters for pandemic prevention usually contain more text and fewer illustrations and do not clearly show cultural differences. In conclusion, health communication usually involves a lot of professional knowledge, so visualising that knowledge in an accessible way for the general public is challenging. The relevant posters still have the problems of lack of effective communication, superficial design, and insufficient content accessibility.Keywords: weibo, visualisation, covid posters, poster design
Procedia PDF Downloads 1289665 Evaluation of Food Services by the Patients in Hospitals of Athens in Greece
Authors: I. Mentziou, C. Delezos, A. Nestoridou, G. Boskou
Abstract:
Introduction: The system of production and distribution of meals can have a significant impact on the food intake of hospital patients who are likely to develop malnutrition. In hospitals, the consequences of food borne infections can range from annoying to life-threatening for a patient, since they can lead up to death in vulnerable groups. Aim: The aim of the present study was to evaluate the satisfaction of the patients from the food services in Greek hospitals. Methods: Eleven hospitals of the Attica region were chosen. The sample derived from 637 adult patients who were hospitalized in those hospitals, during the period September 2009 - April 2010. Tailor made questionnaires were used to interview patients upon their satisfaction from the current food service system as well as from the total quality management system of the hospital. The number of completed questionnaires was proportional to the hospital capacity. Results: The majority of the patients seem to be pleased from the quality and the variety of the meals; they judged positively the behaviour of the food service personnel and the hygiene of serving conditions. Patients made suggestions for more frequent meals, larger variety of choices and better presented meals served under proper hygiene conditions by the personnel. Conclusions: The results indicate that the patients are satisfied in regards to the meal choices and the serving methods. However, factors like temperature and hygiene conditions are not always perceived to be in a way that fulfills the necessary prerequisite requirements. A total quality management system as a driver for better patient satisfaction is Indispensable.Keywords: evaluation, food service, HACCP, hospital, patients
Procedia PDF Downloads 5159664 Path Planning for Unmanned Aerial Vehicles in Constrained Environments for Locust Elimination
Authors: Aadiv Shah, Hari Nair, Vedant Mittal, Alice Cheeran
Abstract:
Present-day agricultural practices such as blanket spraying not only lead to excessive usage of pesticides but also harm the overall crop yield. This paper introduces an algorithm to optimize the traversal of an unmanned aerial vehicle (UAV) in constrained environments. The proposed system focuses on the agricultural application of targeted spraying for locust elimination. Given a satellite image of a farm, target zones that are prone to locust swarm formation are detected through the calculation of the normalized difference vegetation index (NDVI). This is followed by determining the optimal path for traversal of a UAV through these target zones using the proposed algorithm in order to perform pesticide spraying in the most efficient manner possible. Unlike the classic travelling salesman problem involving point-to-point optimization, the proposed algorithm determines an optimal path for multiple regions, independent of its geometry. Finally, the paper explores the idea of implementing reinforcement learning to model complex environmental behaviour and make the path planning mechanism for UAVs agnostic to external environment changes. This system not only presents a solution to the enormous losses incurred due to locust attacks but also an efficient way to automate agricultural practices across the globe in order to improve farmer ergonomics.Keywords: locust, NDVI, optimization, path planning, reinforcement learning, UAV
Procedia PDF Downloads 2519663 N400 Investigation of Semantic Priming Effect to Symbolic Pictures in Text
Authors: Thomas Ousterhout
Abstract:
The purpose of this study was to investigate if incorporating meaningful pictures of gestures and facial expressions in short sentences of text could supplement the text with enough semantic information to produce and N400 effect when probe words incongruent to the picture were subsequently presented. Event-related potentials (ERPs) were recorded from a 14-channel commercial grade EEG headset while subjects performed congruent/incongruent reaction time discrimination tasks. Since pictures of meaningful gestures have been shown to be semantically processed in the brain in a similar manner as words are, it is believed that pictures will add supplementary information to text just as the inclusion of their equivalent synonymous word would. The hypothesis is that when subjects read the text/picture mixed sentences, they will process the images and words just like in face-to-face communication and therefore probe words incongruent to the image will produce an N400.Keywords: EEG, ERP, N400, semantics, congruency, facilitation, Emotiv
Procedia PDF Downloads 2589662 Deep Vision: A Robust Dominant Colour Extraction Framework for T-Shirts Based on Semantic Segmentation
Authors: Kishore Kumar R., Kaustav Sengupta, Shalini Sood Sehgal, Poornima Santhanam
Abstract:
Fashion is a human expression that is constantly changing. One of the prime factors that consistently influences fashion is the change in colour preferences. The role of colour in our everyday lives is very significant. It subconsciously explains a lot about one’s mindset and mood. Analyzing the colours by extracting them from the outfit images is a critical study to examine the individual’s/consumer behaviour. Several research works have been carried out on extracting colours from images, but to the best of our knowledge, there were no studies that extract colours to specific apparel and identify colour patterns geographically. This paper proposes a framework for accurately extracting colours from T-shirt images and predicting dominant colours geographically. The proposed method consists of two stages: first, a U-Net deep learning model is adopted to segment the T-shirts from the images. Second, the colours are extracted only from the T-shirt segments. The proposed method employs the iMaterialist (Fashion) 2019 dataset for the semantic segmentation task. The proposed framework also includes a mechanism for gathering data and analyzing India’s general colour preferences. From this research, it was observed that black and grey are the dominant colour in different regions of India. The proposed method can be adapted to study fashion’s evolving colour preferences.Keywords: colour analysis in t-shirts, convolutional neural network, encoder-decoder, k-means clustering, semantic segmentation, U-Net model
Procedia PDF Downloads 1119661 Analysis of Citation Rate and Data Reuse for Openly Accessible Biodiversity Datasets on Global Biodiversity Information Facility
Authors: Nushrat Khan, Mike Thelwall, Kayvan Kousha
Abstract:
Making research data openly accessible has been mandated by most funders over the last 5 years as it promotes reproducibility in science and reduces duplication of effort to collect the same data. There are evidence that articles that publicly share research data have higher citation rates in biological and social sciences. However, how and whether shared data is being reused is not always intuitive as such information is not easily accessible from the majority of research data repositories. This study aims to understand the practice of data citation and how data is being reused over the years focusing on biodiversity since research data is frequently reused in this field. Metadata of 38,878 datasets including citation counts were collected through the Global Biodiversity Information Facility (GBIF) API for this purpose. GBIF was used as a data source since it provides citation count for datasets, not a commonly available feature for most repositories. Analysis of dataset types, citation counts, creation and update time of datasets suggests that citation rate varies for different types of datasets, where occurrence datasets that have more granular information have higher citation rates than checklist and metadata-only datasets. Another finding is that biodiversity datasets on GBIF are frequently updated, which is unique to this field. Majority of the datasets from the earliest year of 2007 were updated after 11 years, with no dataset that was not updated since creation. For each year between 2007 and 2017, we compared the correlations between update time and citation rate of four different types of datasets. While recent datasets do not show any correlations, 3 to 4 years old datasets show weak correlation where datasets that were updated more recently received high citations. The results are suggestive that it takes several years to cumulate citations for research datasets. However, this investigation found that when searched on Google Scholar or Scopus databases for the same datasets, the number of citations is often not the same as GBIF. Hence future aim is to further explore the citation count system adopted by GBIF to evaluate its reliability and whether it can be applicable to other fields of studies as well.Keywords: data citation, data reuse, research data sharing, webometrics
Procedia PDF Downloads 178