Search results for: Rasid Mail
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 84

Search results for: Rasid Mail

54 A Single Country Comparative Contextual Description Study of the Executive Authorities in Austria

Authors: Meryl Abigail Lucasan

Abstract:

The purpose of this research paper is to present a Single Country Comparative Contextual Description Study of the Executive Authorities in Austria, focusing with the Federal President, Cabinet members (Federal Chancellor, the Vice-Chancellor and the other Federal Ministers) and the State Government. In this paper, the roles and powers of the executive authorities of Austria will be enumerated and explained; and the behavior of the executive authorities of Austria will be described in detail. In addition, the researcher will provide a survey that was answered by an Austrian citizen through electronic mail to gain more concrete information about the current political condition in Austria. Based on research, Austria has a remarkable political stability. This paper will develop a conceptual framework or a sample paradigm to represent the political system in Austria, focusing on its states and Executive Authorities in achieving political stability.

Keywords: Austrian politics, executive branch of the government, federal government, political stability

Procedia PDF Downloads 236
53 Performance Comparison of ADTree and Naive Bayes Algorithms for Spam Filtering

Authors: Thanh Nguyen, Andrei Doncescu, Pierre Siegel

Abstract:

Classification is an important data mining technique and could be used as data filtering in artificial intelligence. The broad application of classification for all kind of data leads to be used in nearly every field of our modern life. Classification helps us to put together different items according to the feature items decided as interesting and useful. In this paper, we compare two classification methods Naïve Bayes and ADTree use to detect spam e-mail. This choice is motivated by the fact that Naive Bayes algorithm is based on probability calculus while ADTree algorithm is based on decision tree. The parameter settings of the above classifiers use the maximization of true positive rate and minimization of false positive rate. The experiment results present classification accuracy and cost analysis in view of optimal classifier choice for Spam Detection. It is point out the number of attributes to obtain a tradeoff between number of them and the classification accuracy.

Keywords: classification, data mining, spam filtering, naive bayes, decision tree

Procedia PDF Downloads 387
52 Aerodynamic Bicycle Torque Augmentation with a Wells Turbine in Wheels

Authors: Tsuyoshi Yamazaki, Etsuo Morishita

Abstract:

Cyclists often run through a crosswind and sometimes we experience the adverse pressure. We came to an idea that Wells turbine can be used as power augmentation device in the crosswind something like sails of a yacht. Wells turbine always rotates in the same direction irrespective of the incoming flow direction, and we use it in the small-scale power generation in the ocean where waves create an oscillating flow. We incorporate the turbine to the wheel of a bike. A commercial device integrates strain gauges in the crank of a bike and transmitted force and torque applied to the pedal of the bike as an e-mail to the driver’s mobile phone. We can analyze the unsteady data in a spreadsheet sent from the crank sensor. We run the bike with the crank sensor on the rollers at the exit of a low-speed wind tunnel and analyze the effect of the crosswind to the wheel with a Wells turbine. We also test the aerodynamic characteristics of the turbine separately. Although power gain depends on the flow direction, several Watts increase might be possible by the Wells turbine incorporated to a bike wheel.

Keywords: aerodynamics, Wells turbine, bicycle, wind engineering

Procedia PDF Downloads 158
51 The Study of Sensory Breadth Experiences in an Online Try-On Environment

Authors: Tseng-Lung Huang

Abstract:

Sensory breadth experiences, such as visualization, a sense of self-location, and haptic experiences, are critical in an online try-on environment. This research adopts an emotional appeal perspective, including concrete and abstract effects, to clarify the relationship between sensory experience and consumer's behavior intention in an online try-on context. This study employed an augmented reality interactive technology (ARIT) in an online clothes-fitting context and applied snowball sampling using e-mail to invite online consumers, first to use ARIT for trying on online apparel and then to complete a questionnaire. One hundred sixty-eight valid questionnaires were collected, and partial least squares (PLS) path modeling was used to test our hypotheses. The results showed that sensory breadth, by arousing concrete effect, induces impulse buying intention and willingness to pay a price premium of online shopping. Parasocial presence, as an abstract effect, diminishes the effect of concrete effects on willingness to pay a price premium.

Keywords: sensory breadth, impulsive behavior, price premium, emotional appeal, online try-on context

Procedia PDF Downloads 519
50 Management of the Experts in the Research Evaluation System of the University: Based on National Research University Higher School of Economics Example

Authors: Alena Nesterenko, Svetlana Petrikova

Abstract:

Research evaluation is one of the most important elements of self-regulation and development of researchers as it is impartial and independent process of assessment. The method of expert evaluations as a scientific instrument solving complicated non-formalized problems is firstly a scientifically sound way to conduct the assessment which maximum effectiveness of work at every step and secondly the usage of quantitative methods for evaluation, assessment of expert opinion and collective processing of the results. These two features distinguish the method of expert evaluations from long-known expertise widespread in many areas of knowledge. Different typical problems require different types of expert evaluations methods. Several issues which arise with these methods are experts’ selection, management of assessment procedure, proceeding of the results and remuneration for the experts. To address these issues an on-line system was created with the primary purpose of development of a versatile application for many workgroups with matching approaches to scientific work management. Online documentation assessment and statistics system allows: - To realize within one platform independent activities of different workgroups (e.g. expert officers, managers). - To establish different workspaces for corresponding workgroups where custom users database can be created according to particular needs. - To form for each workgroup required output documents. - To configure information gathering for each workgroup (forms of assessment, tests, inventories). - To create and operate personal databases of remote users. - To set up automatic notification through e-mail. The next stage is development of quantitative and qualitative criteria to form a database of experts. The inventory was made so that the experts may not only submit their personal data, place of work and scientific degree but also keywords according to their expertise, academic interests, ORCID, Researcher ID, SPIN-code RSCI, Scopus AuthorID, knowledge of languages, primary scientific publications. For each project, competition assessments are processed in accordance to ordering party demands in forms of apprised inventories, commentaries (50-250 characters) and overall review (1500 characters) in which expert states the absence of conflict of interest. Evaluation is conducted as follows: as applications are added to database expert officer selects experts, generally, two persons per application. Experts are selected according to the keywords; this method proved to be good unlike the OECD classifier. The last stage: the choice of the experts is approved by the supervisor, the e-mails are sent to the experts with invitation to assess the project. An expert supervisor is controlling experts writing reports for all formalities to be in place (time-frame, propriety, correspondence). If the difference in assessment exceeds four points, the third evaluation is appointed. As the expert finishes work on his expert opinion, system shows contract marked ‘new’, managers commence with the contract and the expert gets e-mail that the contract is formed and ready to be signed. All formalities are concluded and the expert gets remuneration for his work. The specificity of interaction of the examination officer with other experts will be presented in the report.

Keywords: expertise, management of research evaluation, method of expert evaluations, research evaluation

Procedia PDF Downloads 187
49 Face Recognition Using Eigen Faces Algorithm

Authors: Shweta Pinjarkar, Shrutika Yawale, Mayuri Patil, Reshma Adagale

Abstract:

Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this, demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application. Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this , demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application.

Keywords: face detection, face recognition, eigen faces, algorithm

Procedia PDF Downloads 337
48 A Phishing Email Detection Approach Using Machine Learning Techniques

Authors: Kenneth Fon Mbah, Arash Habibi Lashkari, Ali A. Ghorbani

Abstract:

Phishing e-mails are a security issue that not only annoys online users, but has also resulted in significant financial losses for businesses. Phishing advertisements and pornographic e-mails are difficult to detect as attackers have been becoming increasingly intelligent and professional. Attackers track users and adjust their attacks based on users’ attractions and hot topics that can be extracted from community news and journals. This research focuses on deceptive Phishing attacks and their variants such as attacks through advertisements and pornographic e-mails. We propose a framework called Phishing Alerting System (PHAS) to accurately classify e-mails as Phishing, advertisements or as pornographic. PHAS has the ability to detect and alert users for all types of deceptive e-mails to help users in decision making. A well-known email dataset has been used for these experiments and based on previously extracted features, 93.11% detection accuracy is obtainable by using J48 and KNN machine learning techniques. Our proposed framework achieved approximately the same accuracy as the benchmark while using this dataset.

Keywords: phishing e-mail, phishing detection, anti phishing, alarm system, machine learning

Procedia PDF Downloads 310
47 Survey of the Role of Contextualism in the Designing of Cultural Constructions Based on Rapoport Views

Authors: E. Zarei, M. Bazaei, A. Seifi, A. Keshavarzi

Abstract:

Amos Rapoport, based on his anthropology approach, believed that the space origins from the human body and influences on human body mutually. As a holistic approach in architecture, Contextualism describes a collection of views in philosophy which emphasize the context in which an action, utterance, or expression occurs, and argues that, in some important respect, the action, utterance, or expression can only be understood relative to that context. In this approach, the main goal – studying the role of cultural component in the Contextualism construction shaping up, based on Amos Rapoport’s anthropology approach- has being done by descriptive- analytic method. The results of the research indicate that in the field of Contextualism designing, referring to the cultural aspects are as necessary as the physical dimensions of a construction. Rapoport believes that the shape of a construction is influenced by cultural aspects and he suggests a kind of mutual interaction between human and environment that should be considered in housing. The mail goal of contextual architecture is to establish an interaction between environment, human and culture. According to this approach, a desirable design should be in harmony with this approach.

Keywords: Amos Rapoport, anthropology, contextual architecture, culture

Procedia PDF Downloads 373
46 Jordan Water District Interactive Billing and Accounting Information System

Authors: Adrian J. Forca, Simeon J. Cainday III

Abstract:

The Jordan Water District Interactive Billing and Accounting Information Systems is designed for Jordan Water District to uplift the efficiency and effectiveness of its services to its customers. It is designed to process computations of water bills in accurate and fast way through automating the manual process and ensures that correct rates and fees are applied. In addition to billing process, a mobile app will be integrated into it to support rapid and accurate water bill generation. An interactive feature will be incorporated to support electronic billing to customers who wish to receive water bills through the use of electronic mail. The system will also improve, organize and avoid data inaccuracy in accounting processes because data will be stored in a database which is designed logically correct through normalization. Furthermore, strict programming constraints will be plunged to validate account access privilege based on job function and data being stored and retrieved to ensure data security, reliability, and accuracy. The system will be able to cater the billing and accounting services of Jordan Water District resulting in setting forth the manual process and adapt to the modern technological innovations.

Keywords: accounting, bill, information system, interactive

Procedia PDF Downloads 225
45 Social Networking Sites: A Platform for Communication and Collaboration for Visually Impaired

Authors: Sufia Khowaja, Nishat Fatima

Abstract:

Social networking sites are significant for visually impaired to overcome the unique challenges they face and access the resources they need to succeed in their education and beyond which might be difficult to obtain through traditional means. It provides them an opportunity to build relationships, stay connected with their support network as well as to develop social skills which give them emotional support to fell less isolated. In this connection the study is conducted with the aim to determine the use of social networking sites, purpose of using and activities performed by visually impaired at Delhi University, Delhi, Jawaharlal Nehru University, Delhi and Jamia Milia Islamia, Delhi. The study followed survey technique in which structured interview is followed to collect data from 137 visually impaired students and analysed using ‘SPSS ver23’. The findings of the study revealed that mostly used social networking sites are whatsapp by 89.23% students of DU, 95.12% of JNU, 87.09% of JMI, followed by e-mail by 78.46% of DU, 78.04% of JNU, 64.51%; youtube by 73.84% DU, 90.24% JNU, 80.64% JMI. Purpose for using these sites is for academics mentioned by 96.92% DU, 100% JNU, 93.54% JMI. Activities performed on sites are sending and receiving messaging 96.92% DU, 92.68% JNU, 93.55% JMI, communicating with friends and family as well as getting academic information. Findings of the study will be helpful for libraries to disseminate their services and resources as well as latest updates to their visually impaired users with the help of most used tools.

Keywords: social networking sites, visually impaired, Delhi University, Jawaharlal Nehru University, Jamia Milia Islamia

Procedia PDF Downloads 67
44 Role of Business Incubators and Social Capital on Innovation and Growth of Firms: Evidence from Ethiopia

Authors: Hailemariam Gebremichael Gebretsadik, Abrham Hagos Tesfaslasea

Abstract:

To satisfy the high need for ICT entrepreneurship and rectify the weak entrepreneurial culture in Ethiopia, the country has established ICT Business incubation centers with the intention of preventing business failures, promoting innovation, and accelerating the growth and success of firms. This study investigates the role of business incubators and social capital on the innovation and growth of firms in Ethiopia. In this research, innovation and growth of firms were considered as dependent variables, whereas business incubation and social capital were treated as independent variables. The researcher employed an e-mail survey among 137 tenant Firms (Firms that joined and/or graduated to/from the Business incubation centers available in Ethiopia) to collect the data and obtained 113 responses that were appropriate for this research. The result of this study reveals that the dimensions of business incubation (physical resource, business support, and networking) have a significant effect on the innovation of Firms, but these dimensions of business incubation do not show a significant effect on the growth of firms. On the other hand, the dimensions of social capital (structural, cognitive, and relational) show a significant positive impact on the likelihood of Firms' growth but not on the innovation of firms. Moreover, the result of this study indicates that the dimensions of business incubation and social capital together have a significant effect on the likelihood of tenant firms innovating and growing.

Keywords: business incubation, innovation, social capital, tenant firms

Procedia PDF Downloads 53
43 To Design a Full Stack Online Educational Website Using HTML, CSS and Java Script

Authors: Yash Goyal, Manish Korde, Juned Siddiqui

Abstract:

Today online education has gained more popularity so that people can easily complete their curriculum on their own time. Virtual learning has been widely used by many educators, especially in higher education institutions due to its benefits to students and faculty. A good knowledge of teaching theory and instructional design systems is required to experience meaningful learning. However, most educational websites are not designed to adapt to all screen sizes. Making the website accessible on all screen sizes is our main objective, so we have created a website that is readily accessible across all screen sizes and accepts all types of payment methods. And we see generally educational websites interface is simple and unexciting. So, we have made a user interface attractive and user friendly. It is not enough for a website to be user-friendly, but also to be familiar to admins and to reduce the workload of the admin as well. We visited so many popular websites under development that they all had issues like responsiveness, simple interface, security measures, payment methods, etc. To overcome this limitation, we have created a website which has taken care of security issues that is why we have created only one admin id and it can be control from that only. And if the user has successfully done the payment, then the admin can send him a username and password through mail individually so there will no fraud in the payment of the course.

Keywords: responsive, accessible, attractive, interface, objective, security.

Procedia PDF Downloads 72
42 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 413
41 Climate Change Scenario Phenomenon in Malaysia: A Case Study in MADA Area

Authors: Shaidatul Azdawiyah Abdul Talib, Wan Mohd Razi Idris, Liew Ju Neng, Tukimat Lihan, Muhammad Zamir Abdul Rasid

Abstract:

Climate change has received great attention worldwide due to the impact of weather causing extreme events. Rainfall and temperature are crucial weather components associated with climate change. In Malaysia, increasing temperatures and changes in rainfall distribution patterns lead to drought and flood events involving agricultural areas, especially rice fields. Muda Agricultural Development Authority (MADA) is the largest rice growing area among the 10 granary areas in Malaysia and has faced floods and droughts in the past due to changing climate. Changes in rainfall and temperature patter affect rice yield. Therefore, trend analysis is important to identify changes in temperature and rainfall patterns as it gives an initial overview for further analysis. Six locations across the MADA area were selected based on the availability of meteorological station (MetMalaysia) data. Historical data (1991 to 2020) collected from MetMalaysia and future climate projection by multi-model ensemble of climate model from CMIP5 (CNRM-CM5, GFDL-CM3, MRI-CGCM3, NorESM1-M and IPSL-CM5A-LR) have been analyzed using Mann-Kendall test to detect the time series trend, together with standardized precipitation anomaly, rainfall anomaly index, precipitation concentration index and temperature anomaly. Future projection data were analyzed based on 3 different periods; early century (2020 – 2046), middle century (2047 – 2073) and late-century (2074 – 2099). Results indicate that the MADA area does encounter extremely wet and dry conditions, leading to drought and flood events in the past. The Mann-Kendall (MK) trend analysis test discovered a significant increasing trend (p < 0.05) in annual rainfall (z = 0.40; s = 15.12) and temperature (z = 0.61; s = 0.04) during the historical period. Similarly, for both RCP 4.5 and RCP 8.5 scenarios, a significant increasing trend (p < 0.05) was found for rainfall (RCP 4.5: z = 0.15; s = 2.55; RCP 8.5: z = 0.41; s = 8.05;) and temperature (RCP 4.5: z = 0.84; s = 0.02; RCP 8.5: z = 0.94; s = 0.05). Under the RCP 4.5 scenario, the average temperature is projected to increase up to 1.6 °C in early century, 2.0 °C in the middle century and 2.4 °C in the late century. In contrast, under RCP 8.5 scenario, the average temperature is projected to increase up to 1.8 °C in the early century, 3.1 °C in the middle century and 4.3 °C in late century. Drought is projected to occur in 2038 and 2043 (early century); 2052 and 2069 (middle century); and 2095, 2097 to 2099 (late century) under RCP 4.5 scenario. As for RCP 8.5 scenario, drought is projected to occur in 2021, 2031 and 2034 (early century); and 2069 (middle century). No drought is projected to occur in the late century under the RCP 8.5 scenario. Thus, this information can be used for the analysis of the impact of climate change scenarios on rice growth and yield besides other crops found in MADA area. Additionally, this study, it would be helpful for researchers and decision-makers in developing applicable adaptation and mitigation strategies to reduce the impact of climate change.

Keywords: climate projection, drought, flood, rainfall, RCP 4.5, RCP 8.5, temperature

Procedia PDF Downloads 54
40 R-Killer: An Email-Based Ransomware Protection Tool

Authors: B. Lokuketagoda, M. Weerakoon, U. Madushan, A. N. Senaratne, K. Y. Abeywardena

Abstract:

Ransomware has become a common threat in past few years and the recent threat reports show an increase of growth in Ransomware infections. Researchers have identified different variants of Ransomware families since 2015. Lack of knowledge of the user about the threat is a major concern. Ransomware detection methodologies are still growing through the industry. Email is the easiest method to send Ransomware to its victims. Uninformed users tend to click on links and attachments without much consideration assuming the emails are genuine. As a solution to this in this paper R-Killer Ransomware detection tool is introduced. Tool can be integrated with existing email services. The core detection Engine (CDE) discussed in the paper focuses on separating suspicious samples from emails and handling them until a decision is made regarding the suspicious mail. It has the capability of preventing execution of identified ransomware processes. On the other hand, Sandboxing and URL analyzing system has the capability of communication with public threat intelligence services to gather known threat intelligence. The R-Killer has its own mechanism developed in its Proactive Monitoring System (PMS) which can monitor the processes created by downloaded email attachments and identify potential Ransomware activities. R-killer is capable of gathering threat intelligence without exposing the user’s data to public threat intelligence services, hence protecting the confidentiality of user data.

Keywords: ransomware, deep learning, recurrent neural networks, email, core detection engine

Procedia PDF Downloads 181
39 Does The Implementation Of A Mindfulness Based Intervention Effect Stress and Burnout In Nursing

Authors: Jennifer Foss, DNP, RN-BC, NEA-BC

Abstract:

Stress and burnout in the bedside registered nurse have deleterious consequences for registered nurses, patients, and the hospitals that employ them. The objective of this study was to determine whether a sixty-minute mindfulness workshop was effective in reducing perceived levels of stress and decreasing mindfulness in registered nurses working in the acute care setting. Registered nurses at a community hospital in the Northeast part of the country were recruited through e-mail and flyers in breakrooms. Participants completed the Perceived Stress Scale (PSS) and Mindfulness Attention Awareness Scale (MAAS) two weeks prior to taking part in the intervention and two weeks post intervention. Of the twenty-three registered nurses who completed the baseline questionnaires, 91% were female with an average age between 30-39 years. Sixty-five percent of subjects completed the questionnaires two weeks post intervention. Two weeks post intervention, registered nurses reported a decrease in perception of stress (pre and post PSS was .133) and was not significant (t=1.293, df=14, p=.217). Likewise, an increase in mindful attention .325 was reported two-weeks post intervention and indicated a favorable tendency to enter a mindful state. This finding was also not significant (t=-1.990, df=14, p=.066). In this study, nurses reported decreases in perceived stress and increases in mindfulness after attending a sixty-minute mindfulness workshop. Further research is needed to determine the long-term impact of mindfulness-based training on nurses' stress and mindfulness skills. The results of this study add to the body of literature that supports the benefits of mindfulness-based interventions in the healthcare setting.

Keywords: Stress, burnout, nursing, acute care nursing

Procedia PDF Downloads 35
38 Toxic Ingredients Contained in Our Cosmetics

Authors: El Alia Boularas, H. Bekkar, H. Larachi, H. Rezk-kallah

Abstract:

Introduction: Notwithstanding cosmetics are used in life every day, these products are not all innocuous and harmless, as they may contain ingredients responsible for allergic reactions and, possibly, for other health problems. Additionally, environmental pollution should be taken into account. Thus, it is time to investigate what is ‘hidden behind beauty’. Aims: 1.To investigate prevalence of 13 chemical ingredients in cosmetics being object of concern, which the Algerians use regularly. 2.To know the profile of questioned consumers and describe their opinion on cosmetics. Methods: The survey was carried out in year 2013 over a period of 3 months, among Algerian Internet users having an e-mail address or a Facebook account.The study investigated 13 chemical agents showing health and environmental problems, selected after analysis of the recent studies published on the subject, the lists of national and international regulatory references on chemical hazards, and querying the database Skin Deep presented by the Environmental Working Group. Results: 300 people distributed all over the Algerian territory participated in the survey, providing information about 731 cosmetics; 86% aged from 20 to 39 years, with a sex ratio=0,27. A percentage of 43% of the analyzed cosmetics contained at least one of the 13 toxic ingredients. The targeted ingredient that has been most frequently reported was ‘perfume’ followed by parabens and PEG.85% of the participants declared that cosmetics ‘can contain toxic substances’, 27% asserted that they verify regularly the list of ingredients when they buy cosmetics, 61% said that they try to avoid the toxic ingredients, among whom 24 % were more vigilant on the presence of parabens, 95% were in favour of the strengthening of the Algerian laws on cosmetics. Conclusion: The results of the survey provide the indication of a widespread presence of toxic chemical ingredients in personal care products that Algerians use daily.

Keywords: Algerians consumers, cosmetics, survey, toxic ingredients

Procedia PDF Downloads 256
37 Implementing 3D Printed Structures as the Newest Textile Form

Authors: Banu Hatice Gürcüm, Pınar Arslan, Mahmut Yalçın

Abstract:

From the oldest production methods with yarns used to weave, knit, braid and knot to the newest production methods with fibres used to stitch, bond or structures of innovative technologies, laminates, nanoparticles, composites or 3D printing systems, textile industry advanced through materials, processes and context mostly within the last five decades. The creative momentum of fabric like 3D printed structures have come to the point of transforming as for the newest form of textile applications. Moreover, pioneering studies on the applications of 3D Printing Technology and Additive Manufacturing have been focusing on fashion and apparel sector from the last two decades beginning with fashion designers. After the advent of chain-mail like structures and flexible micro or meso structures created by SLS rapid manufacturing a more textile-like behavior is achieved. Thus, the primary aim of this paper is to discuss the most important properties of traditional fabrics that are to be expected of future fabrics. For this reason, this study deals primarily with the physical properties like softness, hand, flexibility, drapability and wearability of 3D Printed structures necessary to identify the possible ways in which it can be used instead of contemporary textile structures, namely knitted and woven fabrics. The aim of this study is to compare the physical properties of 3D printed fabrics regarding different rapid manufacturing methods (FDM and SLS). The implemented method was Material Driven Design (MDD), which comprise the use of innovative materials according to the production techniques such as 3D printing system. As a result, advanced textile processes and materials enable to the creation of new types of fabric structures and rapid solutions in the field of textiles and 3D fabrics on the other hand, are to be used in this regard.

Keywords: 3D printing technology, FDM, SLS, textile structure

Procedia PDF Downloads 304
36 Query Task Modulator: A Computerized Experimentation System to Study Media-Multitasking Behavior

Authors: Premjit K. Sanjram, Gagan Jakhotiya, Apoorv Goyal, Shanu Shukla

Abstract:

In psychological research, laboratory experiments often face the trade-off issue between experimental control and mundane realism. With the advent of Immersive Virtual Environment Technology (IVET), this issue seems to be at bay. However there is a growing challenge within the IVET itself to design and develop system or software that captures the psychological phenomenon of everyday lives. One such phenomena that is of growing interest is ‘media-multitasking’ To aid laboratory researches in media-multitasking this paper introduces Query Task Modulator (QTM), a computerized experimentation system to study media-multitasking behavior in a controlled laboratory environment. The system provides a computerized platform in conducting an experiment for experimenters to study media-multitasking in which participants will be involved in a query task. The system has Instant Messaging, E-mail, and Voice Call features. The answers to queries are provided on the left hand side information panel where participants have to search for it and feed the information in the respective communication media blocks as fast as possible. On the whole the system will collect multitasking behavioral data. To analyze performance there is a separate output table that records the reaction times and responses of the participants individually. Information panel and all the media blocks will appear on a single window in order to ensure multi-modality feature in media-multitasking and equal emphasis on all the tasks (thus avoiding prioritization to a particular task). The paper discusses the development of QTM in the light of current techniques of studying media-multitasking.

Keywords: experimentation system, human performance, media-multitasking, query-task

Procedia PDF Downloads 533
35 Enhancing National Integrity through Teaching Secular Perspectives in Medieval Indian History Curricula: A Secular Paradigms

Authors: Deepak Deshpande, Vikas Minchekar

Abstract:

Day by day in modern India communal forces became stronger and stronger. Each and every caste group trying to show their strength through massive marches. Such kind of marches or ralliesruinous national integrity in India. To test this assumption present investigation has been carried out. This research was undertaken by using survey techniques. The study has been carried out in two phases. In the first stage, the students’ attitudes were collected while in the second phase the views of the members of the historical association were collected. The social dominance orientation scale and sources of social dominance inventory have been administered on 200 college students belonging to Maratha caste. Analyzed data revealed ahigh level of social dominance in Maratha caste students. Approximately, 80 percent students have reported that they have learned such dominance from the medieval history. The other sources disappear very less prominent. These results and present Indian social situation have been communicated with the members of the historical association of India. The majority members of this association agreed with this reality. The consensus also received on that Maratha caste person experiencing dominance due to the misinterpretation of the King Shivaji Empire; synchronize by politicians. The survey monkey app was used through electronic mail to collect the views on ‘The attitude towards the modification of curricula questionnaire’. The maximum number of members of the historical association agreed to employ to teach the medieval Indian history accordingly the secular perspectives.

Keywords: social dominance orientation, secular perceptive, national integrity, Maratha caste and medieval Indian history

Procedia PDF Downloads 224
34 The Quality of Business Relationships in the Tourism System: An Imaginary Organisation Approach

Authors: Armando Luis Vieira, Carlos Costa, Arthur Araújo

Abstract:

The tourism system is viewable as a network of relationships amongst business partners where the success of each actor will ultimately be determined by the success of the whole network. Especially since the publication of Gümmesson’s (1996) ‘theory of imaginary organisations’, which suggests that organisational effectiveness largely depends on managing relationships and sharing resources and activities, relationship quality (RQ) has been increasingly recognised as a main source of value creation and competitive advantage. However, there is still ambiguity around this topic, and managers and researchers have been recurrently reporting the need to better understand and capitalise on the quality of interactions with business partners. This research aims at testing an RQ model from a relational, imaginary organisation’s approach. Two mail surveys provide the perceptions of 725 hotel representatives about their business relationships with tour operators, and 1,224 corporate client representatives about their business relationships with hotels (21.9 % and 38.8 % response rate, respectively). The analysis contributes to enhance our understanding on the linkages between RQ and its determinants, and identifies the role of their dimensions. Structural equation modelling results highlight trust as the dominant dimension, the crucial role of commitment and satisfaction, and suggest customer orientation as complementary building block. Findings also emphasise problem solving behaviour and selling orientation as the most relevant dimensions of customer orientation. The comparison of the two ‘dyads’ deepens the discussion and enriches the suggested theoretical and managerial guidelines concerning the contribution of quality relationships to business performance.

Keywords: corporate clients, destination competitiveness, hotels, relationship quality, structural equations modelling, tour operators

Procedia PDF Downloads 364
33 Voting Representation in Social Networks Using Rough Set Techniques

Authors: Yasser F. Hassan

Abstract:

Social networking involves use of an online platform or website that enables people to communicate, usually for a social purpose, through a variety of services, most of which are web-based and offer opportunities for people to interact over the internet, e.g. via e-mail and ‘instant messaging’, by analyzing the voting behavior and ratings of judges in a popular comments in social networks. While most of the party literature omits the electorate, this paper presents a model where elites and parties are emergent consequences of the behavior and preferences of voters. The research in artificial intelligence and psychology has provided powerful illustrations of the way in which the emergence of intelligent behavior depends on the development of representational structure. As opposed to the classical voting system (one person – one decision – one vote) a new voting system is designed where agents with opposed preferences are endowed with a given number of votes to freely distribute them among some issues. The paper uses ideas from machine learning, artificial intelligence and soft computing to provide a model of the development of voting system response in a simulated agent. The modeled development process involves (simulated) processes of evolution, learning and representation development. The main value of the model is that it provides an illustration of how simple learning processes may lead to the formation of structure. We employ agent-based computer simulation to demonstrate the formation and interaction of coalitions that arise from individual voter preferences. We are interested in coordinating the local behavior of individual agents to provide an appropriate system-level behavior.

Keywords: voting system, rough sets, multi-agent, social networks, emergence, power indices

Procedia PDF Downloads 373
32 The Impact of Work Stress on Professionals' Life and Health: The Usage of Instant Messaging Applications

Authors: Pui-Lai To, Chechen Liao, Ming-Chi Sung

Abstract:

Work and family life are the most important areas for men and women today. Every professional is required to meet and fulfill the responsibilities of work and family roles. Although the development and popularity of communication technology bring a lot of benefits, including effective and efficient communication, may also generate conflicts between work and family life. Since mobile devices and the applications of mobile devices, such as instant messages, are ubiquitous, the boundaries of work and family roles are increasingly blurred. Professionals may be in the risk of work over-loading and work-family conflict. This study examines the impact of work stress on professionals’ life and health in the context of instant messaging application of smart phone. This study uses a web-based questionnaire to collect samples. The questionnaires are sent via virtual community sites, instant messaging applications, and e-mail. The study develops and empirically validates a work-family conflict model by integrating the pressure theory and technostress factors. The causal relationship between variables in the research model is tested. In terms of data analysis, Partial Least Square (PLS) in Structural Equation Modeling (SEM) is used for sample analysis and research model testing. The results of this study are as follows. First, both the variables of work-related stress and technological violations positively affect the work-family conflict. Second, both the variables of work-loading and technology-overloading have no effect on work-family conflict. Third, work-family conflict has negative effect on job satisfaction, family satisfaction, physical health, and mental health.

Keywords: mental health, physical health, technostress, work-family conflict, work-related stress

Procedia PDF Downloads 264
31 Signs, Signals and Syndromes: Algorithmic Surveillance and Global Health Security in the 21st Century

Authors: Stephen L. Roberts

Abstract:

This article offers a critical analysis of the rise of syndromic surveillance systems for the advanced detection of pandemic threats within contemporary global health security frameworks. The article traces the iterative evolution and ascendancy of three such novel syndromic surveillance systems for the strengthening of health security initiatives over the past two decades: 1) The Program for Monitoring Emerging Diseases (ProMED-mail); 2) The Global Public Health Intelligence Network (GPHIN); and 3) HealthMap. This article demonstrates how each newly introduced syndromic surveillance system has become increasingly oriented towards the integration of digital algorithms into core surveillance capacities to continually harness and forecast upon infinitely generating sets of digital, open-source data, potentially indicative of forthcoming pandemic threats. This article argues that the increased centrality of the algorithm within these next-generation syndromic surveillance systems produces a new and distinct form of infectious disease surveillance for the governing of emergent pathogenic contingencies. Conceptually, the article also shows how the rise of this algorithmic mode of infectious disease surveillance produces divergences in the governmental rationalities of global health security, leading to the rise of an algorithmic governmentality within contemporary contexts of Big Data and these surveillance systems. Empirically, this article demonstrates how this new form of algorithmic infectious disease surveillance has been rapidly integrated into diplomatic, legal, and political frameworks to strengthen the practice of global health security – producing subtle, yet distinct shifts in the outbreak notification and reporting transparency of states, increasingly scrutinized by the algorithmic gaze of syndromic surveillance.

Keywords: algorithms, global health, pandemic, surveillance

Procedia PDF Downloads 156
30 Water Quality Calculation and Management System

Authors: H. M. B. N Jayasinghe

Abstract:

The water is found almost everywhere on Earth. Water resources contain a lot of pollution. Some diseases can be spread through the water to the living beings. So to be clean water it should undergo a number of treatments necessary to make it drinkable. So it is must to have purification technology for the wastewater. So the waste water treatment plants act a major role in these issues. When considering the procedures taken after the water treatment process was always based on manual calculations and recordings. Water purification plants may interact with lots of manual processes. It means the process taking much time consuming. So the final evaluation and chemical, biological treatment process get delayed. So to prevent those types of drawbacks there are some computerized programmable calculation and analytical techniques going to be introduced to the laboratory staff. To solve this problem automated system will be a solution in which guarantees the rational selection. A decision support system is a way to model data and make quality decisions based upon it. It is widely used in the world for the various kind of process automation. Decision support systems that just collect data and organize it effectively are usually called passive models where they do not suggest a specific decision but only reveal information. This web base system is based on global positioning data adding facility with map location. Most worth feature is SMS and E-mail alert service to inform the appropriate person on a critical issue. The technological influence to the system is HTML, MySQL, PHP, and some other web developing technologies. Current issues in the computerized water chemistry analysis are not much deep in progress. For an example the swimming pool water quality calculator. The validity of the system has been verified by test running and comparison with an existing plant data. Automated system will make the life easier in productively and qualitatively.

Keywords: automated system, wastewater, purification technology, map location

Procedia PDF Downloads 225
29 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique

Authors: Veysel Çelik, Aynur Aker, Ebru Güç

Abstract:

Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.

Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy

Procedia PDF Downloads 97
28 Promoting Civic Health through Patient Voter Registration

Authors: Amit Syal, Madeline Grade, Alister Martin

Abstract:

Background: Cross-sectional and longitudinal studies demonstrate an association between health and voting. Furthermore, voting enables populations to support policies that impact their health via social determinants like income, education, housing, and healthcare access. Unfortunately, many barriers exist which disproportionately affect the civic participation of certain minority groups. Health professionals have an important role to play in addressing the civic health of all patients and empowering underrepresented communities. Description: Vot-ER is a non-partisan, nonprofit organization that aims to reduce barriers to civic participation by helping patients register to vote while in healthcare settings. The initial approach involved iPad-based kiosks in the emergency department waiting rooms, allowing patients to register themselves while waiting. After the COVID-19 pandemic began, Vot-ER expanded its touchless digital approaches. Vot-ER provides healthcare workers across the country with “Healthy Democracy Kits” consisting of badge backers, posters, discharge paperwork, and other resources. These contain QR and text codes that direct users to an online platform for registering to vote or requesting a mail-in ballot, available in English or Spanish. Outcomes: From May to November 2020, Vot-ER helped prepare 46,320 people to vote. 13,192 individual healthcare providers across all 50 states signed up for and received Healthy Democracy Kits. 80 medical schools participated in the Healthy Democracy Campaign competition. Over 500 institutions ordered site-based materials. Conclusions: A healthy democracy is one in which all individuals in a community have equal and fair opportunities for their voices to be heard. Healthcare settings, such as hospitals, are appropriate and effective venues for increasing both voter registration and education.

Keywords: civic health, enfranchisement, physician, voting

Procedia PDF Downloads 149
27 A Study of Industrial Symbiosis and Implementation of Indigenous Circular Economy Technique on an Indian Industrial Area

Authors: A. Gokulram

Abstract:

Industrial waste is often categorized as commercial and non-commercial waste by market value. In many Indian industries and other industrialized countries, the commercial value waste is capitalized and non-commercial waste is dumped to landfill. A lack of adequate research on industrial waste leads to the failure of effective resource management and the non-commercial waste are being considered as commercially non-viable residues. The term Industrial symbiosis refers to the direct inter-firm reuse or exchange of material and energy resource. The resource efficiency of commercial waste is mainly followed by an informal symbiosis in our research area. Some Industrial residues are reused within the facility where they are generated, others are reused directly nearby industrial facilities and some are recycled via the formal and informal market. The act of using industrial waste as a resource for another product faces challenges in India. This research study has observed a major negligence of trust and communication among several bodies to implement effective circular economy in India. This study applies interviewing process across researchers, government bodies, industrialist and designers to understand the challenges of circular economy in India. The study area encompasses an industrial estate in Ahmedabad in the state of Gujarat which comprises of 1200 industries. The research study primarily focuses on making industrial waste as commercial ready resource and implementing Indigenous sustainable practice in modern context to improve resource efficiency. This study attempted to initiate waste exchange platform among several industrialist and used varied methodologies from mail questionnaire to telephone survey. This study makes key suggestions to policy change and sustainable finance to improve circular economy in India.

Keywords: effective resource management, environmental policy, indigenous technique, industrial symbiosis, sustainable finance

Procedia PDF Downloads 115
26 Evaluation of Student Satisfaction Level Towards Anadolu University E-Services through E-Government Model and Importance Performance Analysis Method

Authors: Emrah Ayhan, Puspa Saananta Irfani, Ömer Doğukan Şahin

Abstract:

Public services, which are important for the order and continuity of social life, have begun to transform into electronic services (E-service) with the development of information and communication technologies in recent years. In particular, as a result of the widespread use of the internet and the increase in citizen demands, it has become necessary to provide public services electronically. In addition to facilitating traditional public services, new types of e-services strengthen the interaction, cooperation, accessibility, transparency, citizen participation (e-governance) and accountability between citizens and the state. In this context, the factors in the literature that are considered to influence the citizens’ satisfaction towards e-services will be examined through the example of student satisfaction with the e-services (Anasis, Mergen, E-mail, library, cafeteria and other transactions) offered by Anadolu University (Eskişehir, Türkiye) through university website and mobile application. The data for the analysis will be obtained from the survey research that will be used to measure user satisfaction with university e-services of 1,000 students studying at 9 different faculties and graduate schools of Anadolu University. These data will be analyzed with a unique methodology that uses the E-GovQual model and Importance Performance Analysis (IPA) methods together. The e-GovQual model serves as a framework for evaluating the quality of e-services, allowing a detailed understanding of students' perceptions. On the other hand, the IPA method will be used to determine the performance level of Anadolu University in the provision of e-services and to understand the areas that require improvement and student expectations. Strategic goals and suggestions will be made to decision-makers, students, and researchers in line with the findings obtained in the research. Thus, it is planned to contribute to e-governance and user satisfaction in educational institutions and to reveal practical implications for optimizing online platforms to better serve student needs.

Keywords: e-service, Anadolu university, student satisfaction, e-governance, e-govqual, importance performance analysis

Procedia PDF Downloads 26
25 The Representations of Protesters in the UK National Daily Press: Pro- And Anti- Brexit Demonstrations 2016-2019

Authors: Charlotte-Rose Kennedy

Abstract:

In a political climate divided by Brexit, it is crucial to be critical of the press, as it is the apparatus which political authorities use to impose their laws and shape public opinion. Although large protests have the power to shake and disrupt policy-making by making it difficult for governments to ignore their goals, the British press historically constructs protesters as delegitimate, deviant, and criminal, which could limit protests’ credibility and democratic power. This paper explores how the remain supporting daily UK press (The Mirror, Financial Times, The Independent, The Guardian) and the leave supporting daily UK press (The Daily Mail, The Daily Star, The Sun, The Express, The Telegraph) discursively constructed every pro- and anti-Brexit demonstration from 2016 to 2019. 702 instances of the terms ‘protester’, ‘protesters’, ‘protestor’ and ‘protestors’ were analyzed through both transitivity analysis and critical discourse analysis. This mixed-methods approach allowed for the analysis of how the UK press perpetuated and upheld social ideologies about protests through their specific grammatical and language choices. The results of this analysis found that both remain and leave supporting press utilized the same discourses to report on protests they oppose and protests they support. For example, the remain backing The Mirror used water metaphors regularly associated with influxes of refugees and asylum seekers to support the protesters on the remain protest ‘Final Say’, and oppose the protesters on the leave protest ‘March to Leave’. Discourses of war, violence, and victimhood are also taken on by both sides of the press Brexit debate and are again used to support and oppose the same arguments. Finally, the paper concludes that these analogous discourses do nothing to help the already marginalized social positions of protesters in the UK and could potentially lead to reduced public support for demonstrations. This could, in turn, facilitate the government in introducing increasingly restrictive legislation in relation to freedom of assembly rights, which could be detrimental to British democracy.

Keywords: Brexit, critical discourse analysis, protests, transitivity analysis, UK press

Procedia PDF Downloads 152