Search results for: Physical Internet
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7333

Search results for: Physical Internet

4543 Associated Map and Inter-Purchase Time Model for Multiple-Category Products

Authors: Ching-I Chen

Abstract:

The continued rise of e-commerce is the main driver of the rapid growth of global online purchase. Consumers can nearly buy everything they want at one occasion through online shopping. The purchase behavior models which focus on single product category are insufficient to describe online shopping behavior. Therefore, analysis of multi-category purchase gets more and more popular. For example, market basket analysis explores customers’ buying tendency of the association between product categories. The information derived from market basket analysis facilitates to make cross-selling strategies and product recommendation system. To detect the association between different product categories, we use the market basket analysis with the multidimensional scaling technique to build an associated map which describes how likely multiple product categories are bought at the same time. Besides, we also build an inter-purchase time model for associated products to describe how likely a product will be bought after its associated product is bought. We classify inter-purchase time behaviors of multi-category products into nine types, and use a mixture regression model to integrate those behaviors under our assumptions of purchase sequences. Our sample data is from comScore which provides a panelist-label database that captures detailed browsing and buying behavior of internet users across the United States. Finding the inter-purchase time from books to movie is shorter than the inter-purchase time from movies to books. According to the model analysis and empirical results, this research finally proposes the applications and recommendations in the management.

Keywords: multiple-category purchase behavior, inter-purchase time, market basket analysis, e-commerce

Procedia PDF Downloads 358
4542 Understanding the Perceived Barriers and Facilitators to Exercise Participation in the Workplace

Authors: Jayden R. Hunter, Brett A. Gordon, Stephen R. Bird, Amanda C. Benson

Abstract:

The World Health Organisation recognises the workplace as an important setting for exercise promotion, with potential benefits including improved employee health and fitness, and reduced worker absenteeism and presenteeism. Despite these potential benefits to both employee and employer, there is a lack of evidence supporting the long-term effectiveness of workplace exercise programs. There is, therefore, a need for better-informed programs that cater to employee exercise preferences. Specifically, workplace exercise programs should address any time, motivation, internal and external barriers to participation reported by sub-groups of employees. This study sought to compare exercise participation to perceived barriers and facilitators to workplace exercise engagement of university employees. This information is needed to design and implement wider-reaching programs aiming to maximise long-term employee exercise adherence and subsequent health, fitness and productivity benefits. An online survey was advertised at an Australian university with the potential to reach 3,104 full-time employees. Along with exercise participation (International physical activity questionnaire) and behaviour (stage of behaviour change in relation to physical activity questionnaire), perceived barriers (corporate exercise barriers scale) and facilitators to workplace exercise participation were identified. The survey response rate was 8.1% (252 full-time employees; 95% white-collar; 60% female; 79.4% aged 30–59 years; 57% professional and 38% academic). Most employees reported meeting (43.7%) or exceeding (42.9%) exercise guidelines over the previous week (i.e. ⩾30 min of moderate-intensity exercise on most days or ⩾ 25 min of vigorous-intensity exercise on at least three days per week). Reported exercise behaviour over the previous six months showed that 64.7% of employees were in maintenance, 8.3% were in action, 10.9% were in preparation, 12.4% were in contemplation, and 3.8% were in the pre-contemplation stage of change. Perceived barriers towards workplace exercise participation were significantly higher in employees not attaining weekly exercise guidelines compared to employees meeting or exceeding guidelines, including a lack of time or reduced motivation (p < 0.001; partial eta squared = 0.24 (large effect)), exercise attitude (p < 0.05; partial eta squared = 0.04 (small effect)), internal (p < 0.01; partial eta squared = 0.10 (moderate effect)) and external (p < 0.01; partial eta squared = 0.06 (moderate effect)) barriers. The most frequently reported exercise facilitators were personal training (particularly for insufficiently active employees; 33%) and group exercise classes (20%). The most frequently cited preferred modes of exercise were walking (70%), swimming (50%), gym (48%), and cycling (45%). In conclusion, providing additional means of support such as individualised gym, swimming and cycling programs with personal supervision and guidance may be particularly useful for employees not meeting recommended moderate-vigorous volumes of exercise, to help overcome reported exercise barriers in order to improve participation, health, and fitness. While individual biopsychosocial factors should be considered when making recommendations for interventions, the specific barriers and facilitators to workplace exercise participation identified by this study can inform the development of workplace exercise programs aiming to broaden employee engagement and promote greater ongoing exercise adherence. This is especially important for the uptake of less active employees who perceive greater barriers to workplace exercise participation than their more active colleagues.

Keywords: exercise barriers, exercise facilitators, physical activity, workplace health

Procedia PDF Downloads 140
4541 Hash Based Block Matching for Digital Evidence Image Files from Forensic Software Tools

Authors: M. Kaya, M. Eris

Abstract:

Internet use, intelligent communication tools, and social media have all become an integral part of our daily life as a result of rapid developments in information technology. However, this widespread use increases crimes committed in the digital environment. Therefore, digital forensics, dealing with various crimes committed in digital environment, has become an important research topic. It is in the research scope of digital forensics to investigate digital evidences such as computer, cell phone, hard disk, DVD, etc. and to report whether it contains any crime related elements. There are many software and hardware tools developed for use in the digital evidence acquisition process. Today, the most widely used digital evidence investigation tools are based on the principle of finding all the data taken place in digital evidence that is matched with specified criteria and presenting it to the investigator (e.g. text files, files starting with letter A, etc.). Then, digital forensics experts carry out data analysis to figure out whether these data are related to a potential crime. Examination of a 1 TB hard disk may take hours or even days, depending on the expertise and experience of the examiner. In addition, it depends on examiner’s experience, and may change overall result involving in different cases overlooked. In this study, a hash-based matching and digital evidence evaluation method is proposed, and it is aimed to automatically classify the evidence containing criminal elements, thereby shortening the time of the digital evidence examination process and preventing human errors.

Keywords: block matching, digital evidence, hash list, evaluation of digital evidence

Procedia PDF Downloads 246
4540 Intersections and Cultural Landscape Interpretation, in the Case of Ancient Messene in the Peloponnese

Authors: E. Maistrou, P. Themelis, D. Kosmopoulos, K. Boulougoura, A. M. Konidi, K. Moretti

Abstract:

InterArch is an ongoing research project that is running since September 2020 and aims to propose a digital application for the enhancement of the cultural landscape, which emphasizes the contribution of physical space and time in digital data organization. The research case study refers to Ancient Messene in the Peloponnese, one of the most important archaeological sites in Greece. The project integrates an interactive approach to the natural environment, aiming at a manifold sensory experience. It combines the physical space of the archaeological site with the digital space of archaeological and cultural data while, at the same time, it embraces storytelling processes by engaging an interdisciplinary approach that familiarizes the user to multiple semantic interpretations. The research project is co‐financed by the European Union and Greek national funds, through the Operational Program Competitiveness, Entrepreneurship, and Innovation, under the call RESEARCH - CREATE – INNOVATE (project code: Τ2ΕΔΚ-01659). It involves mutual collaboration between academic and cultural institutions and the contribution of an IT applications development company. New technologies and the integration of digital data enable the implementation of non‐linear narratives related to the representational characteristics of the art of collage. Various images (photographs, drawings, etc.) and sounds (narrations, music, soundscapes, audio signs, etc.) could be presented according to our proposal through new semiotics of augmented and virtual reality technologies applied in touch screens and smartphones. Despite the fragmentation of tangible or intangible references, material landscape formations, including archaeological remains, constitute the common ground that can inspire cultural narratives in a process that unfolds personal perceptions and collective imaginaries. It is in this context that cultural landscape may be considered an indication of space and historical continuity. It is in this context that history could emerge, according to our proposal, not solely as a previous inscription but also as an actual happening. As a rhythm of occurrences suggesting mnemonic references and, moreover, evolving history projected on the contemporary ongoing cultural landscape.

Keywords: cultural heritage, digital data, landscape, archaeological sites, visitors’ itineraries

Procedia PDF Downloads 69
4539 The Impact of Online Advertising on Generation Y’s Purchase Decision in Malaysia

Authors: Mui Joo Tang, Eang Teng Chan

Abstract:

Advertising is commonly used to foster sales and reputation of an institution. It is at first the growth of print advertising that has increased the population and number of periodicals of newspaper and its circulation. The rise of Internet and online media has somehow blurred the role of media and advertising though the intention is still to reach out to audience and to increase sales. The relationship between advertising and audience on a product purchase through persuasion has been developing from print media to online media. From the changing media environment and audience, it is the concern of this research to study the impact of online advertising to such a relationship cycle. The content of online advertisements is much of text, multimedia, photo, audio and video. The messages of such content format may indeed bring impacts to its audience and its credibility. This study is therefore reflecting the effectiveness of online advertisement and its influences on generation Y in their purchasing behavior. This study uses Media Dependency Theory to analyze the relationship between the impact of online advertisement and media usage pattern of generation Y. Hierarchy of Effectiveness Model is used as a marketing communication model to study the effectiveness of advertising and further to determine the impact of online advertisement on generation Y in their purchasing decision making. This research uses online survey to reach out the sample of generation Y. The results have shown that online advertisements do not affect much on purchase decision making even though generation Y relies much on the media content including online advertisement for its information and believing in its credibility. There are few other external factors that may interrupt the effectiveness of online advertising. The very obvious influence of purchasing behavior is actually derived from the peers.

Keywords: generation Y, purchase decision, print media, online advertising, persuasion

Procedia PDF Downloads 515
4538 Exploration of Correlation between Design Principles and Elements with the Visual Aesthetic in Residential Interiors

Authors: Ikra Khan, Reenu Singh

Abstract:

Composition is essential when designing the interiors of residential spaces. The ability to adopt a unique style of using design principles and design elements is another. This research report explores how the visual aesthetic within a space is achieved through the use of design principles and design elements while maintaining a signature style. It also observes the relationship between design styles and compositions that are achieved as a result of the implementation of the principles. Information collected from books and the internet helped to understand how a composition can be achieved in residential interiors by resorting to design principles and design elements as tools for achieving an aesthetic composition. It also helped determine the results of authentic representation of design ideas and how they make one’s work exceptional. A questionnaire survey was also conducted to understand the impact of a visually aesthetic residential interior of a signature style on the lifestyle of individuals residing in them. The findings denote a pattern in the application of design principles and design elements. Individual principles and elements or a combination of the same are used to achieve an aesthetically pleasing composition. This was supported by creating CAD illustrations of two different residential projects with varying approaches and design styles. These illustrations include mood boards, 3D models, and sectional elevations as rendered views to understand the concept design and its translation via these mediums. A direct relation is observed between the application of design principles and design elements to achieve visually aesthetic residential interiors that suit an individual’s taste. These practices can be applied when designing bespoke commercial as well as industrial interiors that are suited to specific aesthetic and functional needs.

Keywords: composition, design principles, elements, interiors, residential spaces

Procedia PDF Downloads 91
4537 Gulfnet: The Advent of Computer Networking in Saudi Arabia and Its Social Impact

Authors: Abdullah Almowanes

Abstract:

The speed of adoption of new information and communication technologies is often seen as an indicator of the growth of knowledge- and technological innovation-based regional economies. Indeed, technological progress and scientific inquiry in any society have undergone a particularly profound transformation with the introduction of computer networks. In the spring of 1981, the Bitnet network was launched to link thousands of nodes all over the world. In 1985 and as one of the first adopters of Bitnet, Saudi Arabia launched a Bitnet-based network named Gulfnet that linked computer centers, universities, and libraries of Saudi Arabia and other Gulf countries through high speed communication lines. In this paper, the origins and the deployment of Gulfnet are discussed as well as social, economical, political, and cultural ramifications of the new information reality created by the network. Despite its significance, the social and cultural aspects of Gulfnet have not been investigated in history of science and technology literature to a satisfactory degree before. The presented research is based on an extensive archival research aimed at seeking out and analyzing of primary evidence from archival sources and records. During its decade and a half-long existence, Gulfnet demonstrated that the scope and functionality of public computer networks in Saudi Arabia have to be fine-tuned for compliance with Islamic culture and political system of the country. It also helped lay the groundwork for the subsequent introduction of the Internet. Since 1980s, in just few decades, the proliferation of computer networks has transformed communications world-wide.

Keywords: Bitnet, computer networks, computing and culture, Gulfnet, Saudi Arabia

Procedia PDF Downloads 237
4536 Algerian EFL Students' Perceptions towards the Development of Writing through Weblog Storytelling

Authors: Nawel Mansouri

Abstract:

Weblog as a form of internet-based resources has become popular as an authentic and constructive learning tool, especially in the language classroom. This research explores the use of weblog storytelling as a pedagogical tool to develop Algerian EFL students’ creative writing. This study aims to investigate the effectiveness of weblog- writing and the attitudes of both Algerian EFL students and teachers towards weblog storytelling. It also seeks to explore the potential benefits and problems that may affect the use of weblog and investigate the possible solutions to overcome the problems encountered. The research work relies on a mixed-method approach which combines both qualitative and quantitative methods. A questionnaire will be applied to both EFL teachers and students as a means to obtain preliminary data. Interviews will be integrated in accordance with the primary data that will be gathered from the questionnaire with the aim of validating its accuracy or as a strategy to follow up any unexpected results. An intervention will take place on the integration of weblog- writing among 15 Algerian EFL students for a period of two months where students are required to write five narrative essays about their personal experiences, give feedback through the use of a rubric to two or three of their peers, and edit their work based on the feedback. After completion, questionnaires and interviews will also take place as a medium to obtain both the students’ perspectives towards the use of weblog as an innovative teaching approach. This study is interesting because weblog storytelling has recently been emerged as a new form of digital communication and it is a new concept within Algerian context. Furthermore, the students will not just develop their writing skill through weblog storytelling but it can also serve as a tool to develop students’ critical thinking, creativity, and autonomy.

Keywords: Weblog writing, EFL writing, EFL learners' attitudes, EFL teachers' views

Procedia PDF Downloads 164
4535 US-Iran Hostage Crisis by the Metaphor of Argo in the Light of Post-Modernist Post-Colonial and Realist Theories

Authors: Hatice Idil Gorgen

Abstract:

This paper argues that discourses and textuality which is literary tool of Western ethnocentrism create aggressive foreign policy against the West by Non-West countries. Quasi-colonial experiences create an inferiority complex on officially or not colonized areas by reconstructing their identity. This reconstructed identity leads revolution and resistance movement to feel secure themselves as a psychological defense against colonial powers. Knowledge learned by successful implementation of discourses grants right to has power for authority, in addition to serving as a tool to reinforce power of authority by its cognitive traits on foreign policy decision making. The combination of these points contributes to shaping and then make predictable state policies. In the methodology of paper, secondary data was firstly reviewed through university library using a range of sources such as academic abstract, OPAC system, bibliography databases and internet search engines. The film of Argo was used to strengthen and materialize theoretical explanations as a metaphor. This paper aims to highlight the cumulative effects on the construction of the identity throughout embedded discourses by textuality. To demonstrate it by a metaphor, Argo will be used as a primary source for good story-telling about history. U.S-Iran hostage crisis is mainly applied by aiming to see foundations Iran’s behavior in the context of its revolutionary identity and major influences of actions of U.S on it.

Keywords: discourse, post colonialism, post modernism, objectivity

Procedia PDF Downloads 145
4534 A Study of Behaviors in Using Social Networks of Corporate Personnel of Suan Sunandha Rajabhat University

Authors: Wipada Chaiwchan

Abstract:

This research aims to study behaviors in using social networks of Corporate personnel of Suan Sunandha Rajabhat University. The sample used in the study were two groups: 1) Academic Officer 70 persons and 2) Operation Officer 143 persons were used in this study. The tools in this research consisted of questionnaire which the data were analyzed by using percentage, average (X) and Standard deviation (S.D.) and Independent Sample T-Test to test the difference between the mean values obtained from two independent samples, and One-way anova to analysis of variance, and Multiple comparisons to test that the average pair of different methods by Fisher’s Least Significant Different (LSD). The study result found that the most of corporate personnel have purpose in using social network to information awareness aspect was knowledge and online conference with social media. By using the average more than 3 hours per day in everyday. Using time in working in one day and there are computers connected to the Internet at home, by using the communication in the operational processes. Behaviors using social networks in relation to gender, age, job title, department, and type of personnel. Hypothesis testing, and analysis of variance for the effects of this analysis is divided into three aspects: The use of online social networks, the attitude of the users and the security analysis has found that Corporate Personnel of Suan Sunandha Rajabhat University. Overall and specifically at the high level, and considering each item found all at a high level. By sorting of the social network (X=3.22), The attitude of the users (X= 3.06) and the security (X= 3.11). The overall behaviors using of each side (X=3.11).

Keywords: social network, behaviors, social media, computer information systems

Procedia PDF Downloads 386
4533 Improving Medication Understanding, Use and Self-Efficacy among Stroke Patients: A Randomised Controlled Trial; Study Protocol

Authors: Jamunarani Appalasamy, Tha Kyi Kyi, Quek Kia Fatt, Joyce Pauline Joseph, Anuar Zaini M. Zain

Abstract:

Background: The Health Belief Theory had always been associated with chronic disease management. Various health behaviour concepts and perception branching from this Health Belief Theory had involved with medication understanding, use, and self-efficacy which directly link to medication adherence. In a previous quantitative and qualitative study, stroke patients in Malaysia were found to be strongly believing information obtained by various sources such as the internet and social communication. This action leads to lower perception of their stroke preventative medication benefit which in long-term creates non-adherence. Hence, this study intends to pilot an intervention which uses audio-visual concept incorporated with mHealth service to enhance learning and self-reflection among stroke patients to manage their disease. Methods/Design: Twenty patients will be allocated to a proposed intervention whereas another twenty patients are allocated to the usual treatment. The intervention involves a series of developed audio-visual videos sent via mobile phone which later await for responses and feedback from the receiver (patient) via SMS or recorded calls. The primary outcome would be the medication understanding, use and self-efficacy measured over two months pre and post intervention. Secondary outcome is measured from changes of blood parameters and other self-reported questionnaires. Discussion: This study shall also assess uptake/attrition, feasibility, and acceptability of this intervention. Trial Registration: NMRR-15-851-24737 (IIR)

Keywords: health belief, medication understanding, medication use, self-efficacy

Procedia PDF Downloads 209
4532 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy

Authors: Neda Seyyedi, Reza Berangi

Abstract:

Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.

Keywords: VOIP networks, flooding attacks, entropy, computer networks

Procedia PDF Downloads 393
4531 Bianchi Type- I Viscous Fluid Cosmological Models with Stiff Matter and Time Dependent Λ- Term

Authors: Rajendra Kumar Dubey

Abstract:

Einstein’s field equations with variable cosmological term Λ are considered in the presence of viscous fluid for Bianchi type I space time. Exact solutions of Einstein’s field equations are obtained by assuming cosmological term Λ Proportional to (R is a scale factor and m is constant). We observed that the shear viscosity is found to be responsible for faster removal of initial anisotropy in the universe. The physical significance of the cosmological models has also been discussed.

Keywords: bianchi type, I cosmological model, viscous fluid, cosmological constant Λ

Procedia PDF Downloads 517
4530 The Research of Students Internet in Choosing the Technical and Professional Course in Izeh: Educational Year 2001-2002

Authors: Seyyed Kavous Abbasi

Abstract:

Technical and professional branch is a subcategory of high school educational system. It deals with the programs which have been designed for the promotion of applied science and necessary skill and growth of potential talents in students. The purpose of performance of this branch is preparing of preponderance of in police in different section of industries and service. The aim of this research is the survey of group relation family, economic, educational and individual factors and the student's tendency toward technical professional courses. The method of the study is descriptive survey. 195 subjects were chosen randomly from all the male and female students of technical and professional school in Izeh. Instrument for this research was research-made questionnaire consisting of 22 questions on the base of likers spectrum. The reliability of this questionnaire has been estimated 0.8. Analyses of research data has been performed in two levels of descriptive and inferential statistics. Analyses of data has shown that the family factors with average of 3.12, individual factors 3.95, economic factors 3.92 and educational factors 3.57 more than middle level have more effects , in comparison with the factor of group relation with average of 2.79 less than average level in tendency the technical and professional course . Comparison of effective factors in tendency to technical and professional course has shown that individual factors had the most effects and the group relation factors had the least effects. Comparison between male and female subject's ideas showed that there is a different between their ideas about economics and family factors.

Keywords: high school, relation family, individual factors, analysis interest

Procedia PDF Downloads 236
4529 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment

Authors: Wen Shyong Hsieh, Chih Hsueh Lin

Abstract:

In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.

Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication

Procedia PDF Downloads 379
4528 Realising the Socio-Economic Rights of Refugees Under Human Rights Law: A Case Study of South Africa

Authors: Taguekou Kenfack Alexie

Abstract:

For a long time, refugee protection has constituted one of the main concerns of the international community as a whole and for the South African government in particular.The focus of this paper is on the challenges refugees face in accessing their rights in South Africa. In particular, it analyses the legal framework for the protection of the socio economic rights of refugees under international law, regional and domestic law and the extent to which the rights have been realized. The main hypothesis of the study centered on the fact that the social protection of refugees in South Africa is in conformity with international standards. To test this hypothesis, the qualitative research method was applied. Refugee related legal instruments were analyzed as well as academic publications, organizational reports and internet sources. The data analyzed revealed that there has been enormous progress in meeting international standards in the areas of education, emergency relief and assistance, protection of women and refugee children. The results also indicated that much remain to be desired in such areas as nutrition, shelter, health care, freedom of movement and very importantly, employment and social security. The paper also seeks to address the obstacles which prevent the proper treatment of refugees and to make recommendations as how the South African government can better regulate the treatment of refugees living in its territory.Recommendations include the amendment of the legal instruments that provide the normative framework for protection and improvement of protection policies to reflect the changing dynamics.

Keywords: international community, refugee, socioeconomic rights, social protection

Procedia PDF Downloads 272
4527 English Test Success among Syrian Refugee Girls Attending Language Courses in Lebanon

Authors: Nina Leila Mussa

Abstract:

Background: The devastating effects of the war on Syria’s educational infrastructure has been widely reported, with millions of children denied access. However, among those who resettled in Lebanon, the impact of receiving educational assistance on their abilities to pass the English entrance exam is not well described. The aim of this study was to identify predictors of success among Syrian refugees receiving English language courses in a Lebanese university. Methods: The database of Syrian refugee girls matriculated in English courses at the American University of Beirut (AUB) was reviewed. The study period was 7/2018-09/2020. Variables compared included: family size and income, welfare status, parents’ education, English proficiency, access to the internet, and need for external help with homework. Results: For the study period, there were 28 girls enrolled. The average family size was 6 (range 4-9), with eight having completed primary, 14 secondary education, and 6 graduated high school. Eighteen were single-income families. After 12 weeks of English courses, 16 passed the Test of English as Foreign Language (TOEFL) from the first attempt, and 12 failed. Out of the 12, 8 received external help, and 6 passed on the second attempt, which brings the total number of successful passing to 22. Conclusion: Despite the tragedy of war, girls receiving assistance in learning English in Lebanon are able to pass the basic language test. Investment in enhancing those educational experiences will be determinantal in achieving widespread progress among those at-risk children.

Keywords: refugee girls, TOEFL, education, success

Procedia PDF Downloads 117
4526 EU Border Externalisation in Conflict Zones: Living at and Migrating Across the Iran-Turkey Border

Authors: Karolína Augustovaá

Abstract:

Turkey’s eastern borders have been at the center of criticism by the European Commission who condemns restrictions against Kurdish civilians as the result of Turkey’s military operations against terrorist organizations (namely PKK). Yet, the Commission has launched economic and political support for numerous military projects along the Iran-Turkey border to fight cross-border crime (namely “illegal” migration) along its external borders. Whilst border externalization has been extensively examined in the EU’s wide neighborhood, its analysis from the ground in conflict zones is emerging. The existing analysis also rarely considers the impact of external border management beyond international migration - on the local context and its people. However, tough externalization policies at borders, where local wars are fought, are fundamental to scrutinize as they invite us to question the effects of EU’s migration management on diverse communities navigating their life along external borders. To fill this research lacunae, this article examines intersections between the local military operations and international (EU-Turkey) migration management at the Turkey’s border with Iran and questions their impact on the everyday struggles of people living at and migrating across the border. To do so, it applies critical feminist and military literature to border studies. Methodologically, the article draws upon ethnographic research in Van (Eastern Turkey), using participant observations and interviews with sixty participants. This article argues that the EU’s externalization policies add to the violence generated by the local militarized conflict and eventually (re-)produce it in the forms of push-backs and physical violence against people who daily cross the border irregularly for their physical/economic survival. By doing so, I suggest that (inter)national fears of terrorism and migration inter-sect, materialize and affect everyday sites of diverse racialized groups living at and moving across external borders, such as international migrants (Afghans) and the local residents (Kurds) at the Turkey-Iran border. This article highlights the need to analyze the local border context in tandem with international migration management in the EU’s wider neighborhood to understand how conflict and violence evolves there.

Keywords: european union border externalization, eastern turkey, migration, conflict, kurdish question

Procedia PDF Downloads 194
4525 Design of Built-Spaces and Enhanced Psychological Wellbeing by Limiting Effect of SBS: An Analytical Study across Students in Indian Universities

Authors: Sadaf H. Khan, Jyoti Kumar

Abstract:

Sick Building Syndrome (SBS) is a situation in which inhabitants of a building develop illness symptoms or get infected with a chronic disease as a result of the building in which they reside or work. Certain symptoms tend to get more severe as an individual spends more time in the building; however, they generally improve with time or even disappear when they leave that space. Though ‘Design of Built-Spaces’ is a crucial factor in regulating these symptoms but it still needs to be identified further as to what specific design features of a ‘Built-Space’ trigger sick building syndrome (SBS). Much of the research work present to date is focused on the physiological or physical sickness caused due to inappropriate built-space design. In this paper, the psychological aspects of sick building syndrome (SBS) will be investigated across the adult population, more specifically graduate students in India trying to settle in back to their previous physical work environments, i.e., campus, classrooms, hostels, after a very long hold which lasted more than a year due to lockdowns during Covid-19 crisis all over the world. The study will follow an analytical approach and the data will be collected through self-reported online surveys. The purpose of this study is to enquire causal agents, diagnosable symptoms and remedial design of built spaces which can enhance the productive level of built environments and better facilitate the inhabitants by improving their psychological wellbeing, which is the most uprising concern. The fact that SBS symptoms can be studied only within the initial few weeks as an occupant starts interacting with a built-environment and leaves as the occupant leaves that space or zone, the post-lockdown incoming of students back to their respective campuses provides an opportunity to clearly draw multiple conclusions of the relationship that exist between the Design of Built-Spaces and Psychological Sickness Syndrome associated with it. The study will be one of a kind approach for understanding and formulating methods to improve psychological wellbeing within a built-setting by better identifying factors associated with these psychological symptoms, including anxiety, mental fatigue, reduced attention span and reduced memory span as refined symptoms of SBS discussed in 1987 by Molhave within his study.

Keywords: built-environment psychology, built-space design, healthcare architecture, psychological wellbeing

Procedia PDF Downloads 154
4524 Renovation of Dilapidated Areas and Sustainable Reconstruction of Various Parts of Tehran, Iran

Authors: Alireza Rahpeyma

Abstract:

One of the most significant challenges faced by cities is inefficient and deteriorated urban fabric. Deteriorated areas bring about numerous issues, including economic, social, physical, and infrastructural problems, sewage management, environmental concerns, and security issues. One of the crucial necessities of modern urban life is the revitalization and renovation of these urban fabrics. Another important aspect is preserving a cohesive cultural and social identity during the urban renewal process. Urban renovation and upgrading are not a one-time occurrence but rather an ongoing process that ultimately needs to become ingrained in the system. This process is not swift; it involves sensitive and intricate stages that require well-designed plans within short, medium, and long-term timeframes. To revitalize dilapidated areas, a comprehensive understanding of the urban region's sustainability is essential. The goal of this study is to provide a suitable model for the upgrading and renewal of areas 2, 4, 5, 7, 8, and 10 in Tehran, preserving the heritage within these urban fabrics (urban assets), including the valuable morphologies of these areas, to prevent financial wastage. This study was conducted descriptively and analytically using the SWOT technique and GIS software. The research results regarding urban upgrading and renewal bring about the following points: 1) Urban upgrading and renewal ensure satisfactory efficiency, justice, environmental quality, safety and security, hygiene, sewage management, and the comfort and aesthetics of urban spaces. 2) Employing the above processes in old city centers re-establishes the historical and cultural connection between people and their past, a past that is evolving and improving and will not repeat itself. 3) Despite the expansion and growth of Iranian cities, cultural and national identity can be preserved by adhering to healthy urban revitalization principles. 4) Proper urban upgrading and renewal prevent social fragmentation, deviant behavioral patterns, psychological and occupational disorders, and financial losses. In general, preserving the identity and urban life in renovation and upgrading must be comprehensive, encompassing various dimensions, including physical, social, economic, political, and administrative aspects.

Keywords: dilapidated areas, renovation, sustainable reconstruction, Tehran-Iran

Procedia PDF Downloads 41
4523 Effect of Preoperative Single Dose Dexamethasone and Lignocaine on Post-Operative Quality of Recovery and Pain Relief after Laparoscopic Cholecystectomy

Authors: Gurjeet Khurana, Surender Singh, Poonam Arora, Praveendra K. Sachan

Abstract:

Introduction: Post-operative quality of recovery is the key outcome in the perspective of anesthesiologist. It is directly related to patient satisfaction. This is unsurprising, considering most aspects of a poor quality recovery after surgery will impair satisfaction with care. This study was thus undertaken to evaluate effects of Dexamethasone and Lignocaine on Quality of Recovery using QoR- 40 questionnaire and compare their effects. Material and methods: After obtaining the ethical committee approval and written informed consent, 67 patients of 18-60 years, ASA grade I and II scheduled for elective laparoscopic cholecystectomy were randomly allocated into two groups. Group I of 34 patients received 2mg/kg lignocaine diluted to 10ml with normal saline. Group 2 of 33 patients received 0.1 mg/kg I/V Dexamethasone diluted to 10ml with normal saline. QoR-40 was assessed on pre-operative day, and again QoR-40 was assessed at 24 hr post-operative day-1. Postoperative pain scores, nausea and vomiting and shoulder pain were secondary outcomes. Results: The Global QoR-40 was more than 180 at 24 hr in both the groups. The Dexamethasone group had higher Global QoR-40 than lignocaine group 187.94 v/s 182.85. Amongst dimensions of QoR-40 Dexamethasone had statistically better physical comfort, physical independence, and pain relief as compared to Lignocaine. Positive items had excellent responses in Dexamethasone group. Headache, backache and sore throat were also less severe in Dexamethasone group as compared to Lignocaine group. Dexamethasone group had lower VAS compared to lignocaine group. Similarly, there was less fentanyl consumption in dexamethasone group (364.08 ± 127.31) in postoperative period when compared to the lignocaine group (412.31 ± 147.8). Group receiving dexamethasone had 36% increase in appetite compared to lignocaine group (17.6%), which facilitated early oral feeding. Frequency of PONV was less in group-2 at different time interval as compared to group 1. Total episode of PONV were 18 in group 1 and 7 in group 2. Statistically significant difference was seen among two groups (p value= 0.007). Use of antiemetic was more in group 1 as compared to group 2 at all the times, though it was not statistically significant at different time intervals. Antiemetics were administered to 18 patients in group 1 as compared to 5 patients in group 2 postoperatively. Statistically significant difference (p value= 0.011) was seen in total antiemetic consumption. Conclusion: Our study demonstrated that pre-operative administration of a single dose of dexamethasone enhanced the quality of recovery after laparoscopic cholecystectomy as compared to Lignocaine bolus dose.

Keywords: dexamethasone, lignocaine, QoR-40 questionnaire, quality of recovery

Procedia PDF Downloads 115
4522 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 99
4521 Inappropriate Antibiotic Use: An Online Survey in Thailand

Authors: Surarong Chinwong, Namthip Intarakumhang Na Rachasima, Siyaporn Kuikhiew, Dujrudee Chinwong

Abstract:

Irrational use of medicines is a major problem in public health. Half of all patients take medicines incorrectly. An inappropriate use of antibiotics is one of the common types of irrational medicine use; for example, patients use antibiotic for treatment of common cold or diarrhea. Objectives: This cross-sectional study aimed to investigate the behaviors on antibiotic use, using amoxicillin and norfloxacin as examples, as well as sources of received health information. Methods: An online self-administered questionnaire was used to collect data from participants in Thailand between September and December 2015. Participants were asked about their behaviors on antibiotic use. Data were analyzed using descriptive statistics. Results: Of all 405 participants, most were female (65.3 %), aged 18-30 years (49.4 %), undergraduate or lower (69.7%), and civil servant or state enterprises (31.7 %). We found inappropriate behaviors in use of amoxicillin or norfloxacin: 1) there were 201/400 participants (50.3%) taking amoxicillin right away in case of having a common cold, such as having sore throat, running nose, and cough; 2) there were 170/405 participants (42.0%) using amoxicillin for relieving inflammatory symptoms, e.g. muscle inflammation or osteoarthritis; 3) there were 71/398 participants (17.8%) using amoxicillin as a muscle relaxant; 4) there were 135/398 participants (33.9%) using norfloxacin for treating diarrhea. Sources of health information received by the participants were from the internet (78.5%), the radio and/or television (42.2%), advertising publishing (33.3 %), and word of mouth (30.1%). Conclusion: This study showed improper behaviors in antibiotic use especially amoxicillin and norfloxacin. Health care providers including pharmacists should raise the public awareness on dangers of inappropriate antibiotic use and promote the rational use of antibiotics.

Keywords: antibiotic use, amoxicillin, norfloxacin, rational drug use

Procedia PDF Downloads 264
4520 Multifield Problems in 3D Structural Analysis of Advanced Composite Plates and Shells

Authors: Salvatore Brischetto, Domenico Cesare

Abstract:

Major improvements in future aircraft and spacecraft could be those dependent on an increasing use of conventional and unconventional multilayered structures embedding composite materials, functionally graded materials, piezoelectric or piezomagnetic materials, and soft foam or honeycomb cores. Layers made of such materials can be combined in different ways to obtain structures that are able to fulfill several structural requirements. The next generation of aircraft and spacecraft will be manufactured as multilayered structures under the action of a combination of two or more physical fields. In multifield problems for multilayered structures, several physical fields (thermal, hygroscopic, electric and magnetic ones) interact each other with different levels of influence and importance. An exact 3D shell model is here proposed for these types of analyses. This model is based on a coupled system including 3D equilibrium equations, 3D Fourier heat conduction equation, 3D Fick diffusion equation and electric and magnetic divergence equations. The set of partial differential equations of second order in z is written using a mixed curvilinear orthogonal reference system valid for spherical and cylindrical shell panels, cylinders and plates. The order of partial differential equations is reduced to the first one thanks to the redoubling of the number of variables. The solution in the thickness z direction is obtained by means of the exponential matrix method and the correct imposition of interlaminar continuity conditions in terms of displacements, transverse stresses, electric and magnetic potentials, temperature, moisture content and transverse normal multifield fluxes. The investigated structures have simply supported sides in order to obtain a closed form solution in the in-plane directions. Moreover, a layerwise approach is proposed which allows a 3D correct description of multilayered anisotropic structures subjected to field loads. Several results will be proposed in tabular and graphical formto evaluate displacements, stresses and strains when mechanical loads, temperature gradients, moisture content gradients, electric potentials and magnetic potentials are applied at the external surfaces of the structures in steady-state conditions. In the case of inclusions of piezoelectric and piezomagnetic layers in the multilayered structures, so called smart structures are obtained. In this case, a free vibration analysis in open and closed circuit configurations and a static analysis for sensor and actuator applications will be proposed. The proposed results will be useful to better understand the physical and structural behaviour of multilayered advanced composite structures in the case of multifield interactions. Moreover, these analytical results could be used as reference solutions for those scientists interested in the development of 3D and 2D numerical shell/plate models based, for example, on the finite element approach or on the differential quadrature methodology. The correct impositions of boundary geometrical and load conditions, interlaminar continuity conditions and the zigzag behaviour description due to transverse anisotropy will be also discussed and verified.

Keywords: composite structures, 3D shell model, stress analysis, multifield loads, exponential matrix method, layer wise approach

Procedia PDF Downloads 58
4519 POP Music and Tai Chi – Movement and Stillness Intertwined in The Contemporary World

Authors: Patricia Portugal Marques de Carvalho Lourenço

Abstract:

Pop Music embodies both the music that is popular with the audiences and the one that is widespread amongst the general public associated with a state of mind and rhythm. Tai Chi epitomises Yin and Yang, two interconnected opposite states of being. Undivided, they are one, a neutral state of consciousness that does not swing to either pole. It remains constant and even minded. Sound flows and vibrations cause movement, a physical response to the tempo. When an excessive movement is reached leads to stillness therefore, extreme Yang leads to Yin. Pop Music and Tai Chi are comparable to state of inner being versus a state of outer being, emotional control versus emotional expression, stillness, and movement; opposites that are independent of one another yet interdependent concepts in motion.

Keywords: Pop music, C-Pop, Tai Chi, Ba Gua, communication, entertainment education

Procedia PDF Downloads 220
4518 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.

Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity

Procedia PDF Downloads 26
4517 Accreditation and Quality Assurance of Nigerian Universities: The Management Imperative

Authors: F. O Anugom

Abstract:

The general functions of the university amongst other things include teaching, research and community service. Universities are recognized as the apex of learning, accumulating and imparting knowledge and skills of all kinds to students to enable them to be productive, earn their living and to make optimum contributions to national development. This is equivalent to the production of human capital in the form of high level manpower needed to administer the educational society, be useful to the society and manage the economy. Quality has become a matter of major importance for university education in Nigeria. Accreditation is the systematic review of educational programs to ensure that acceptable standards of education, scholarship and infrastructure are being maintained. Accreditation ensures that institution maintain quality. The process is designed to determine whether or not an institution has met or exceeded the published standards for accreditation, and whether it is achieving its mission and stated purposes. Ensuring quality assurance in accreditation process falls in the hands of university management which justified the need for this study. This study examined accreditation and quality assurance: the management imperative. Three research questions and three hypotheses guided the study. The design was a correlation survey with a population of 2,893 university administrators out of which 578 Heads of department and Dean of faculties were sampled. The instrument for data collection was titled Programme Accreditation Exercise scale with high levels of reliability. The research questions were answered with Pearson ‘r’ statistics. T-test statistics was used to test the hypotheses. It was found among others that the quality of accredited programme depends on the level of funding of universities in Nigeria. It was also indicated that quality of programme accreditation and physical facilities of universities in Nigeria have high relationship. But it was also revealed that programme accreditation is positively related to staffing in Nigerian universities. Based on the findings of the study, the researcher recommend that academic administrators should be included in the team of those who ensure quality programs in the universities. Private sector partnership should be encouraged to fund programs to ensure quality of programme in the universities. Independent agencies should be engaged to monitor the activities of accreditation teams to avoid bias.

Keywords: accreditation, quality assurance, national universities commission , physical facilities, staffing

Procedia PDF Downloads 187
4516 Isolation and Synthesis of 1’-S-1’-Acetoxycavicol Acetate as Potent Antidandruff Agent

Authors: M. Vijaya Bhaskar Reddy

Abstract:

The air-dried and powdered methanol solvent extraction of the rhizomes of Alpinia galangal is subjected to bio-assay guided fractionation and isolation yielded a known compound namely, 1'-S-1'-Acetoxychavicol acetate (1). The isolated known compound has been identified based on the physical, spectral data (IR, ¹H, ¹³C, NMR and mass spectroscopy) and comparison with an authentic sample. Finally isolated 1'-S-1'-Acetoxychavicol acetate (1) was confirmed by synthesis. The crude methanol extract and identified known compound (1) were tested for antidandruff property against Malassezia furfur showed with MIC 1000 µg/mL and 7.81 µg/mL, respectively.

Keywords: Alpinia galanga, isolation, 1'-S-1'-Acetoxychavicol acetate, antidandruff activity, Malassezia furfur

Procedia PDF Downloads 160
4515 Removal of P-Nitrophenol in Wastewater by Using Fe-Nano Zeolite Synthesized

Authors: Pham-Thi Huong, Byeong-Kyu Lee, Chi-Hyeon Lee, JiTae Kim

Abstract:

This study analyzed the removal of p-nitrophenol from wastewater using Fe-nano zeolite synthesized. The basic physical-chemical properties of Fe-nano zeolite was determined by X-ray diffraction (XRD), Fourier transform infrared (FTIR) spectroscopy. We focus on finding out the optimum conditions in adsorption and desorption processes for removal of p-nitrophenol by using Fe-nano zeolite in wastewater. The optimum pH for p-nitrophenol removal in wastewater was 5.0. Adsorption isotherms were better fitted with the Langmuir isotherm than with the Freundlich with 165.58 mg/g adsorption capacity of p-nitrophenol. These findings support potential of Fe-nano zeolite as an effective adsorbent for p-nitrophenol removal from wastewater.

Keywords: Fe-nano zeolite, adsorption, wastewater, regeneration

Procedia PDF Downloads 296
4514 Philippine National Police Strategies in the Implementation of 'Peace and Order Agenda for Transformation and Upholding of the Rule-Of-Law' Plan 2030

Authors: Ruby A. L. Espineli

Abstract:

The study assessed the Philippine National Police strategies in the implementation of ‘Peace and Order Agenda for Transformation and Upholding of the Rule-of-Law’ P.A.T.R.O.L Plan 2030. Its operational roadmap presents four perspectives which include resource management, learning and growth, process excellence; and community. Focused group discussion, observation, and distribution of survey questionnaire to selected PNP officers and community members were done to identify and describe the implementation, problems encountered and measures to address the problems of the PNP P.A.T.R.O.L Plan 2030. In resource management, PNP allocates most sufficient funds in providing service firearms, patrol vehicle, and internet connections. In terms of learning and growth, the attitude of PNP officers is relatively higher than their knowledge and skills. Moreover, in terms of process excellence, the PNP use several crime preventions and crime solution strategies to deliver an immediate response to calls of the community. As regards, community perspective, PNP takes effort in establishing partnership with community. It is also interesting to note that PNP officers and community were both undecided on the existence of problems encountered in the implementation of P.A.T.R.O.L Plan 2030. But, they had proactive behavior as they agreed on all the specified measures to address the problems encountered in implementation of PNP P.A.T.R.O.L. Plan 2030. A strategic framework, based on the findings was formulated in this study that could improve and entrench the harmonious working relationship between the PNP and stakeholders in the enhancement of the implementation of PNP P.A.T.R.O.L. Plan 2030.

Keywords: community perspectives, learning and growth, process excellence, resource management

Procedia PDF Downloads 223