Search results for: concurrent users
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2604

Search results for: concurrent users

2574 Design and Implementation of Reliable Location-Based Social Community Services

Authors: B. J. Kim, K. W. Nam, S. J. Lee

Abstract:

Traditional social network services provide users with more information than is needed, and it is not easy to verify the authenticity of the information. This paper proposes a system that can only post messages where users are located to enhance the reliability of social networking services. The proposed system implements a Google Map API to post postings on the map and to read postings within a range of distances from the users’ location. The proposed system will only provide alerts, memories, and information about locations within a given range depending on the users' current location, providing reliable information that they believe will be necessary in real time. It is expected that the proposed system will be able to meet the real demands of users and create a more reliable social network services environment.

Keywords: social network, location, reliability, posting

Procedia PDF Downloads 224
2573 Comparing the Educational Effectiveness of eHealth to Deliver Health Knowledge between Higher Literacy Users and Lower Literacy Users

Authors: Yah-Ling Hung

Abstract:

eHealth is undoubtedly emerging as a promising vehicle to provide information for individual self-care management. However, the accessing ability, reading strategies and navigating behavior between higher literacy users and lower literacy users are significantly different. Yet, ways to tailor audiences’ health literacy and develop appropriate eHealth to feed their need become a big challenge. The purpose of this study is to compare the educational effectiveness of eHealth to deliver health knowledge between higher literacy users and lower literacy users, thus establishing useful design strategies of eHealth for users with different level of health literacy. The study was implemented in four stages, the first of which developed a website as the testing media to introduce health care knowledge relating to children’s allergy. Secondly, a reliability and validity test was conducted to make sure that all of the questions in the questionnaire were good indicators. Thirdly, a pre-post knowledge test was conducted with 66 participants, 33 users with higher literacy and 33 users with lower literacy respectively. Finally, a usability evaluation survey was undertaken to explore the criteria used by users with different levels of health literacy to evaluate eHealth. The results demonstrated that the eHealth Intervention in both groups had a positive outcome. There was no significant difference between the effectiveness of eHealth intervention between users with higher literacy and users with lower literacy. However, the average mean of lower literacy group was marginally higher than the average mean of higher literacy group. The findings also showed that the criteria used to evaluate eHealth could be analyzed in terms of the quality of information, appearance, appeal and interaction, but the users with lower literacy have different evaluation criteria from those with higher literacy. This is an interdisciplinary research which proposes the sequential key steps that incorporate the planning, developing and accessing issues that need to be considered when designing eHealth for patients with varying degrees of health literacy.

Keywords: eHealth, health intervention, health literacy, usability evaluation

Procedia PDF Downloads 110
2572 Management Systems as a Tool to Limit the End-Users Impacts on Energy Savings Achievements

Authors: Margarida Plana

Abstract:

The end-users behavior has been identified in the last years as one of the main responsible for the success degree of the energy efficiency improvements. It is essential to create tools to limit their impact on the final consumption. This paper is focused on presenting the results of the analysis developed on the basis of real projects’ data in order to quantify the impact of end-users behavior. The analysis is focused on how the behavior of building’s occupants can vary the achievement of the energy savings targets and how they can be limited. The results obtained show that the management systems are one of the main tools available to control and limit the end-users interaction with the equipment operation. In fact, the results will present the management systems as ‘a must’ on any energy efficiency project.

Keywords: end-users impacts, energy efficiency, energy savings, management systems

Procedia PDF Downloads 236
2571 Attribute Analysis of Quick Response Code Payment Users Using Discriminant Non-negative Matrix Factorization

Authors: Hironori Karachi, Haruka Yamashita

Abstract:

Recently, the system of quick response (QR) code is getting popular. Many companies introduce new QR code payment services and the services are competing with each other to increase the number of users. For increasing the number of users, we should grasp the difference of feature of the demographic information, usage information, and value of users between services. In this study, we conduct an analysis of real-world data provided by Nomura Research Institute including the demographic data of users and information of users’ usages of two services; LINE Pay, and PayPay. For analyzing such data and interpret the feature of them, Nonnegative Matrix Factorization (NMF) is widely used; however, in case of the target data, there is a problem of the missing data. EM-algorithm NMF (EMNMF) to complete unknown values for understanding the feature of the given data presented by matrix shape. Moreover, for comparing the result of the NMF analysis of two matrices, there is Discriminant NMF (DNMF) shows the difference of users features between two matrices. In this study, we combine EMNMF and DNMF and also analyze the target data. As the interpretation, we show the difference of the features of users between LINE Pay and Paypay.

Keywords: data science, non-negative matrix factorization, missing data, quality of services

Procedia PDF Downloads 98
2570 An Analysis of Iranian Social Media Users’ Perceptions of Published Images of Coronavirus Deaths

Authors: Ali Gheshmi

Abstract:

The highest rate of death, after World War II, is due to the Coronavirus epidemic and more than 2 million people have died since the epidemic outbreak in December 2019, so the word “death” is one of the highest frequency words in social media; moreover, the use of social media has grown due to quarantine and successive restrictions and lockdowns. The most important aspects of the approach used by this study include the analysis of Iranian social media users’ reactions to the images of those who died due to Coronavirus, investigating if seeing such images via social media is effective on the users’ perception of the closeness of death, and evaluating the extent to which the fear of Coronavirus death is instrumental in persuading users to observe health protocols or causing mental problems in social media users. Since the goal of this study is to discover how social media users perceive and react to the images of people who died of Coronavirus, the cultural studies approach is used Receipt analysis method and in-depth interviews will be used for collecting data from Iranian users; also, snowball sampling is used in this study. The probable results would show that cyberspace users experience the closeness of “death” more than any time else and to cope with these annoying images, avoid viewing them or if they view, it will lead them to suffer from mental problems.

Keywords: death, receipt analysis method, mental health, social media, Covid-19

Procedia PDF Downloads 123
2569 Family Relationships among Users and Non Users of Social Media

Authors: Sawsan Kamal Kalil El Galad, Heba Shafik Ibrahim Mohamed, Rania Ismail Moussa

Abstract:

New developments in the technological world have made the internet an innovative way for individuals and families to communicate. Social media sites help in fulfilling communication needs and wants of their users. The use of social media may have an effect on the family relation either in a positive or negative manner. This study aimed to investigate the family relationships among users and non users of social media. The study followed a cross- sectional descriptive comparative research design. It was conducted on 360 employees, at Damanhour University in Elbeheira, Egypt. Brief Family Relationship Scale (BFRS) was used to collect the data of this study. The results revealed that the mean score of the social media users is slightly increased in relation to the non users of social media mean score with no significant difference between both groups. It was concluded that using social media for short time has no effect on the family relationship, sitting with family in daily base satisfy the social and emotional needs of its member and enhance family relations. Recommendations encompassed that the time spent on social media should be assessed regularly to prevent being isolated from the family members. Educational programs to increase the parent’s awareness how to deal with their children regarding social media and its risks.

Keywords: social media, family relationships, communication needs, culture

Procedia PDF Downloads 71
2568 Hyper Presidentialism and First Year of the Turkish Type of Presidentialism

Authors: Ahmet Ekinci

Abstract:

The new government system of Turkey can be described as hyper-presidentialism, this is because the president then becomes the arbiter of all powers. In another word, the power to enact decrees, appoint bureaucrats and judicial officials into offices, and the power to dissolve a parliament belongs solely to the president. As a strong presidency fuse with a disciplined party system as well as concurrent elections and 10 percent electoral threshold, the president possibly poses a great danger to the separation of powers. Additionally, with regards to the presidential term, the president constitutionally holds the power to be elected only for two terms in Turkey. However, Erdoğan and his supporters believe that the 2017 constitutional amendments that changed the system of government have reset the agenda. Thus, the 2017 amendments offered Erdoğan a secret opportunity to join the presidential election race for a third and even a fourth term.

Keywords: hyper-presidentialism, Turkish presidentialism, presidential decree, concurrent election, Erdogan’s term limit, Turkish government system

Procedia PDF Downloads 115
2567 Understanding Ambivalent Behaviors of Social Media Users toward the 'Like' Function: A Social Capital Perspective

Authors: Jung Lee, L. G. Pee

Abstract:

The 'Like' function in social media platforms represents the immediate responses of social media users to postings and other users. A large number of 'likes' is often attributed to fame, agreement, and support from others that many users are proud of and happy with. However, what 'like' implies exactly in social media context is still in discussion. Some argue that it is an accurate parameter of the preferences of social media users, whereas others refute that it is merely an instant reaction that is volatile and vague. To address this gap, this study investigates how social media users perceive the 'like' function and behave differently based on their perceptions. This study posits the following arguments. First, 'like' is interpreted as a quantified form of social capital that resides in social media platforms. This incarnated social capital rationalizes the attraction of people to social media and belief that social media platforms bring benefits to their relationships with others. This social capital is then conceptualized into cognitive and emotive dimensions, where social capital in the cognitive dimension represents the awareness of the 'likes' quantitatively, whereas social capital in the emotive dimension represents the receptions of the 'likes' qualitatively. Finally, the ambivalent perspective of the social media users on 'like' (i.e., social capital) is applied. This view rationalizes why social media users appreciate the reception of 'likes' from others but are aware that those 'likes' can distort the actual responses of other users by sending erroneous signals. The rationale on this ambivalence is based on whether users perceive social media as private or public spheres. When social media is more publicized, the ambivalence is more strongly observed. By combining the ambivalence and dimensionalities of the social capital, four types of social media users with different mechanisms on liking behaviors are identified. To validate this work, a survey with 300 social media users is conducted. The analysis results support most of the hypotheses and confirm that people have ambivalent perceptions on 'like' as a social capital and that perceptions influence behavioral patterns. The implication of the study is clear. First, this study explains why social media users exhibit different behaviors toward 'likes' in social media. Although most of the people believe that the number of 'likes' is the simplest and most frank measure of supports from other social media users, this study introduces the users who do not trust the 'likes' as a stable and reliable parameter of social media. In addition, this study links the concept of social media openness to explain the different behaviors of social media users. Social media openness has theoretical significance because it defines the psychological boundaries of social media from the perspective of users.

Keywords: ambivalent attitude, like function, social capital, social media

Procedia PDF Downloads 200
2566 Comparison of Parallel CUDA and OpenMP Implementations of Memetic Algorithms for Solving Optimization Problems

Authors: Jason Digalakis, John Cotronis

Abstract:

Memetic algorithms (MAs) are useful for solving optimization problems. It is quite difficult to search the search space of the optimization problem with large dimensions. There is a challenge to use all the cores of the system. In this study, a sequential implementation of the memetic algorithm is converted into a concurrent version, which is executed on the cores of both CPU and GPU. For this reason, CUDA and OpenMP libraries are operated on the parallel algorithm to make a concurrent execution on CPU and GPU, respectively. The aim of this study is to compare CPU and GPU implementation of the memetic algorithm. For this purpose, fourteen benchmark functions are selected as test problems. The obtained results indicate that our approach leads to speedups up to five thousand times higher compared to one CPU thread while maintaining a reasonable results quality. This clearly shows that GPUs have the potential to acceleration of MAs and allow them to solve much more complex tasks.

Keywords: memetic algorithm, CUDA, GPU-based memetic algorithm, open multi processing, multimodal functions, unimodal functions, non-linear optimization problems

Procedia PDF Downloads 54
2565 User’s Susceptibility Factors to Malware Attacks: A Systematic Literature Review

Authors: Awad A. Younis, Elise Stronberg, Shifa Noor

Abstract:

Malware attacks due to end-user vulnerabilities have been noticeably increased in the past few years. Investigating the factors that make an end-user vulnerable to those attacks is critical because they can be utilized to set up proactive strategies such as awareness and education to mitigate the impacts of those attacks. Some existing studies investigated demographic, behavioral, and cultural factors that make an end-user susceptible to malware attacks. However, it has been challenging to draw more general conclusions from individual studies due to the varieties in the type of end-users and different types of malware. Therefore, we conducted a systematic literature review (SLR) of the existing research for end-user susceptibility factors to malware attacks. The results showed while some demographic factors are mostly associated with malware infection regardless of the end users' type, age, and gender are not consistent among the same and different types of end-users. Besides, the association of culture and personality factors with malware infection are consistent in most of the selected studies and for all type of end-users. Moreover, malware infection varies based on age, geographic location, and host types. We propose that future studies should carefully take into consideration the type of end-users because different end users may be exposed to different threats or be targeted based on their user domains’ characteristics. Additionally, as different types of malware use different tactics to trick end-users, taking the malware types into consideration is important.

Keywords: cybersecurity, malware, end-users, demographics, personality, culture, systematic literature review

Procedia PDF Downloads 204
2564 Fears of Strangers: Causes of Anonymity Rejection on Virtual World

Authors: Proud Arunrangsiwed

Abstract:

This research is a collaborative narrative research, which is mixed with issues of selected papers and researcher's experience as an anonymous user on social networking sites. The objective of this research is to understand the reasons of the regular users who reject to contact with anonymous users, and to study the communication traditions used in the selected studies. Anonymous users are rejected by regular users, because of the fear of cyber bully, the fear of unpleasant behaviors, and unwillingness of changing communication norm. The suggestion for future research design is to use longitudinal design or quantitative design; and the theory in rhetorical tradition should be able to help develop a strong trust message.

Keywords: anonymous, anonymity, online identity, trust message, reliability

Procedia PDF Downloads 337
2563 Cooperative Cross Layer Topology for Concurrent Transmission Scheduling Scheme in Broadband Wireless Networks

Authors: Gunasekaran Raja, Ramkumar Jayaraman

Abstract:

In this paper, we consider CCL-N (Cooperative Cross Layer Network) topology based on the cross layer (both centralized and distributed) environment to form network communities. Various performance metrics related to the IEEE 802.16 networks are discussed to design CCL-N Topology. In CCL-N topology, nodes are classified as master nodes (Master Base Station [MBS]) and serving nodes (Relay Station [RS]). Nodes communities are organized based on the networking terminologies. Based on CCL-N Topology, various simulation analyses for both transparent and non-transparent relays are tabulated and throughput efficiency is calculated. Weighted load balancing problem plays a challenging role in IEEE 802.16 network. CoTS (Concurrent Transmission Scheduling) Scheme is formulated in terms of three aspects – transmission mechanism based on identical communities, different communities and identical node communities. CoTS scheme helps in identifying the weighted load balancing problem. Based on the analytical results, modularity value is inversely proportional to that of the error value. The modularity value plays a key role in solving the CoTS problem based on hop count. The transmission mechanism for identical node community has no impact since modularity value is same for all the network groups. In this paper three aspects of communities based on the modularity value which helps in solving the problem of weighted load balancing and CoTS are discussed.

Keywords: cross layer network topology, concurrent scheduling, modularity value, network communities and weighted load balancing

Procedia PDF Downloads 229
2562 An Experimental Study of Online Peer-to-Peer Language Learning

Authors: Abrar Al-Hasan

Abstract:

Web 2.0 has significantly increased the amount of information available to users not only about firms and their offerings, but also about the activities of other individuals in their networks and markets. It is widely acknowledged that this increased availability of ‘social’ information, particularly about other individuals, is likely to influence a user’s behavior and choices. However, there are very few systematic studies of how such increased information transparency on the behavior of other users in a focal users’ network influences a focal users’ behavior in the emerging marketplace of online language learning. This study seeks to examine the value and impact of ‘social activities’ – wherein, a user sees and interacts with the learning activities of her peers – on her language learning efficiency. An online experiment in a peer-to-peer language marketplace was conducted to compare the learning efficiency of users with ‘social’ information versus users with no ‘social’ information. The results of this study highlight the impact and importance of ‘social’ information within the language learning context. The study concludes by exploring how these insights may inspire new developments in online education.

Keywords: e-Learning, language learning marketplace, peer-to-peer, social network

Procedia PDF Downloads 357
2561 End-User Behavior: Analysis of Their Role and Impacts on Energy Savings Achievements

Authors: Margarida Plana

Abstract:

End-users behavior has become one of the main aspects to be solved on energy efficiency projects. Especially on the residential sector, the end-users have a direct impact that affects the achievement of energy saving’s targets. This paper is focused on presenting and quantify the impact of end-users behavior on basis of the analysis of real projects’ data. The analysis study which is the role of buiding’s occupants and how their behavior can change the success of energy efficiency projects how to limit their impact. The results obtained show two main conclusions. The first one is easiest to solve: we need to control and limit the end-users interaction with the equipment operation to be able to reach the targets fixed. The second one: as the plugged equipment are increasing exponentially on the residential sector, big efforts of disseminations are needed in order to explain to citizens the impact of their day by day actions through dissemination campaigns.

Keywords: end-users impacts, energy efficiency, energy savings, impact limitations

Procedia PDF Downloads 329
2560 Kinematic Analysis of the Calf Raise Test Using a Mobile iOS Application: Validation of the Calf Raise Application

Authors: Ma. Roxanne Fernandez, Josie Athens, Balsalobre-Fernandez, Masayoshi Kubo, Kim Hébert-Losier

Abstract:

Objectives: The calf raise test (CRT) is used in rehabilitation and sports medicine to evaluate calf muscle function. For testing, individuals stand on one leg and go up on their toes and back down to volitional fatigue. The newly developed Calf Raise application (CRapp) for iOS uses computer-vision algorithms enabling objective measurement of CRT outcomes. We aimed to validate the CRapp by examining its concurrent validity and agreement levels against laboratory-based equipment and establishing its intra- and inter-rater reliability. Methods: CRT outcomes (i.e., repetitions, positive work, total height, peak height, fatigue index, and peak power) were assessed in thirteen healthy individuals (6 males, 7 females) on three occasions and both legs using the CRapp, 3D motion capture, and force plate technologies simultaneously. Data were extracted from two markers: one placed immediately below the lateral malleolus and another on the heel. Concurrent validity and agreement measures were determined using intraclass correlation coefficients (ICC₃,ₖ), typical errors expressed as coefficient of variations (CV), and Bland-Altman methods to assess biases and precision. Reliability was assessed using ICC3,1 and CV values. Results: Validity of CRapp outcomes was good to excellent across measures for both markers (mean ICC ≥0.878), with precision plots showing good agreement and precision. CV ranged from 0% (repetitions) to 33.3% (fatigue index) and were, on average better for the lateral malleolus marker. Additionally, inter- and intra-rater reliability were excellent (mean ICC ≥0.949, CV ≤5.6%). Conclusion: These results confirm the CRapp is valid and reliable within and between users for measuring CRT outcomes in healthy adults. The CRapp provides a tool to objectivise CRT outcomes in research and practice, aligning with recent advances in mobile technologies and their increased use in healthcare.

Keywords: calf raise test, mobile application, validity, reliability

Procedia PDF Downloads 141
2559 Effect of Concurrent Training and Detraining on Insulin Resistance in Obese Children

Authors: Kaveh Azadeh, Saeid Fazelifar

Abstract:

The main purpose of the present study was to examine the effect of 12 weeks (3 days/week) concurrent training followed by 4 weeks detraining on insulin resistance in obese boys without dietary intervention. Methods: 24 obese children boys (body mass index> 28, age= 11- 13year old) voluntarily participated in the study. Biochemical factors, body composition, and functional physical fitness were assessed in three stages [baseline, after 12 week’s combined endurance and resistance training and 4 week’s detraining in the experimental group (n=12); baseline and after 12 weeks in control group (n=12)]. Results: Indepented - Sample T test revealed that in experimental group after 12weeks trainings the insulin resistance, and body fat mass were significantly declined, whereas endurance and strength of abdominal muscles significantly increased compared to control group (p<0/05). One-way ANOVA for three different periods showed that insulin resistance, body fat mass, strength of abdominal muscles after 12week training was significantly improved in the experimental group compared with the baseline. Following 4weeks detraining insulin resistance again significantly increased (p<0/05). After detraining disturbances of physiological adaptation in obese children have more rapid course in comparison with those anthropological and functional indices. Conclusion: Results showed that participation in the regular concurrent trainings provides a decrease of insulin resistance in obese children. It may serve as a strategy in treatment of obesity and management on insulin resistance, as well as to increase endurance and strength muscles in obese children. Adaptations resulting from regular exercises following detraining are reversible.

Keywords: endurance and resistance trainings, detraining, insulin resistance, obese children

Procedia PDF Downloads 170
2558 Challenges in Multi-Cloud Storage Systems for Mobile Devices

Authors: Rajeev Kumar Bedi, Jaswinder Singh, Sunil Kumar Gupta

Abstract:

The demand for cloud storage is increasing because users want continuous access their data. Cloud Storage revolutionized the way how users access their data. A lot of cloud storage service providers are available as DropBox, G Drive, and providing limited free storage and for extra storage; users have to pay money, which will act as a burden on users. To avoid the issue of limited free storage, the concept of Multi Cloud Storage introduced. In this paper, we will discuss the limitations of existing Multi Cloud Storage systems for mobile devices.

Keywords: cloud storage, data privacy, data security, multi cloud storage, mobile devices

Procedia PDF Downloads 664
2557 Emotions and Message Sharing on the Chinese Microblog

Authors: Yungeng Xie, Cong Liu, Yi Liu, Xuanao Wan

Abstract:

The study aims to explore microblog users’ emotion expression and sharing behaviors on the Chinese microblog (Weibo). The first theme of study analyzed whether microblog emotions impact readers’ message sharing behaviors, specifically, how the strength of emotion (positive and negative) in microblog messages facilitate/inhibit readers’ sharing behaviors. The second theme compared the differences among the three types of microblog users (i.e., verified enterprise users, verified individual users and unverified users) in terms of their profiles and microblog behaviors. A total of 7114 microblog messages about 24 hot public events in China were sampled from Sina Weibo. The first study results show that strength of negative emotions that microblog messages carry significantly increase the possibility of the message being shared. The second study results indicate that there are significant differences across the three types of users in terms of their emotion expression and its influence on microblog behaviors.

Keywords: emotion expression, information diffusion, microblog, sharing

Procedia PDF Downloads 213
2556 Community Forestry Programme through the Local Forest Users Group, Nepal

Authors: Daniyal Neupane

Abstract:

Establishment of community forestry in Nepal is a successful step in the conservation of forests. Community forestry programme through the local forest users group has shown its positive impacts in the society. This paper discusses an overview of the present scenario of the community forestry in Nepal. It describes the brief historical background, some important forest legislations, and organization of forest. The paper also describes the internal conflicts between forest users and district forest offices, and possible resolution. It also suggests some of the aspects of community forestry in which the research needs to be focused for the better management of the forests in Nepal.

Keywords: community forest, conservation of forest, local forest users group, better management, Nepal

Procedia PDF Downloads 276
2555 Meeting User’s Information Need: A Study on the Acceptance of Mobile Library Service at UGM Library

Authors: M. Fikriansyah Wicaksono, Rafael Arief Budiman, M. Very Setiawan

Abstract:

Currently, a wide range of innovative mobile library (M-Library) service is provided for the users in the library. The M-Library service is an innovation that aims to bring the collections of the library to users who currently use their smartphone so often. With M-Library services, it is expected that the users can fulfill their information needs more conveniently and practically. This study aims to find out how users use M-Library services provided by UGM library. This study applied a quantitative approach to investigate how to use the application M-Library. The Technology Acceptance Model (TAM) theory is applied to perform the analysis in terms of perceived usefulness, perceived ease of use, attitude towards behavior, behavioral intention and actual system usage. The results show that overall the users found that the M-Library application is useful to meet their information needs. Such as facilitate user to access e-resources, search UGM library collections, online booking collections, and reminder for returning book.

Keywords: m-library, mobile library services, technology acceptance, library of UGM

Procedia PDF Downloads 200
2554 Prevalence and Factors Associated With Concurrent Use of Herbal Medicine and Anti-retroviral Therapy Among HIV/Aids Patients Attending Selected HIV Clinics in Wakiso District

Authors: Nanteza Rachel

Abstract:

Background: Worldwide, there were 36.7 million people living with Human Immunodeficiency Virus (HIV) in 2015, up from 35 million at the end of 2013. Wakiso district is one of the hotspots for the Human Immunodeficiency Virus (HIV)/ Acquired Immune Deficiency Syndrome (AIDS) infection in Uganda, with the prevalence of 8.1 %. Herbal medicine has gained popularity among Human Immunodeficiency Virus (HIV)/ Acquired Immune Deficiency Syndrome (AIDS) patients as adjuvant therapy to reduce the adverse effects of ART. Regardless of the subsidized and physical availability of the Anti-Retroviral Therapy (ART), majority of Africans living with Human Immunodeficiency Virus (HIV)/ Acquired Immune Deficiency Syndrome (AIDS) resort to adding to their ART traditional medicine. Result found out from a pilot observation made by the PI that indicate 13 out of 30 People Living with AIDS(PLWA) who are attending Human Immunodeficiency Virus (HIV) clinics in Wakiso district reported to be using herbal preparations despite the fact that they were taking Anti Retro Viral (ARVs) this prompted this study to be done. Purpose of the study: To determine the prevalence and factors associated with concurrent use of herbal medicine and anti-retroviral therapy among HIV/AIDS patients attending selected HIV clinics in Wakiso district. Methodology: This was a cross sectional study with both quantitative data collection (use of a questionnaire) and qualitative data collection (key informants’ interviews). A mixed method of sampling was used, that is, purposive and random sampling. Purposive sampling was based on the location in the district and used to select 7 health facilities basing on the 7 health sub districts from Wakiso. Simple random sampling was used to select one HIV clinic from each of the 7 health sub districts. Furthermore, the study units were enrolled in to the study as they entered into the HIV clinics, and 105 respondents were interviewed. Both manual and computer packages (SPSS) were used to analyze the data Results: The prevalence of concurrent use of herbal medicine and ART was 38 (36.2%). Commonly HIV symptom treated with herbs was fever 27(71.1%), diarrhea 3(7.9%) and cough 2(5.3%). Commonly used herbs for fever (Omululuza (Vernonica amydalina), Ekigagi (Aloe sp), Nalongo (Justicia betonica Linn) while for diarrhea was Ntwatwa. The side effects also included; too much pain, itchy pain of HIV, aneamia,felt sick, loss/gain appetite, joint pain and bad dreams. Herbs used to sooth the side effects were; for aneamia was avocado leaves Parea Americana mill The significant factors associated with concurrent use of herbal medicine were being familiar with herbs and conventional medicine for management HIV symptoms being expensive. The other significant factor was exhibiting hostility to patients by health personnel providing HIV care. Conclusion: Herbal medicine is widely used by clients in HIV/AIDS care. Patients being familiar with herbs and conventional medicine being expensive were associated with concurrent use of herbal medicine and ART. The exhibition of hostility to the HIV/AIDS patients by the health care providers was also associated with concurrent use of herbal medicine and ART among HIV/AIDS patients.

Keywords: HIV patients, herbal medicine, antiretroviral therapy, factors associated

Procedia PDF Downloads 65
2553 Differences in Motivations for the Use of Facebook between Males and Females

Authors: Arti Bakhshi, Remia Mahajan

Abstract:

Social networking sites have evolved with great pace and India has been no exception. Facebook is the top most rated social networking site (SNS) in India. Though this site is mostly used by younger generations, the popularity of this site is increasing among all masses and classes. The current paper explores gender differences in motivations for the use of Facebook. Of the sample (N=556), 229 male and 327 female Facebook users from India were asked to rate the motivations for the use of Facebook from ‘most preferred’ to ‘least preferred’. The five motivations studied were- time passing, information, relationship development, relationship maintenance and trend following. The cross tab chi square analyses revealed significant differences in three out of five motivations between male and female Facebook users, namely time passing, relationship development and trend following. Female Facebook users rated ‘time passing’ as a more preferred motivation in comparison to male Facebook users, while male users rated ‘relationship development’ and ‘trend following’ motivations as more preferred in comparison to female Facebook users. Suggestions for future research are discussed.

Keywords: facebook, gender, motivations, social networking sites

Procedia PDF Downloads 451
2552 AI Features in Netflix

Authors: Dona Abdulwassi, Dhaee Dahlawi, Yara Zainy, Leen Joharji

Abstract:

The relationship between Netflix and artificial intelligence is discussed in this paper. Netflix uses the most effective and efficient approaches to apply artificial intelligence, machine learning, and data science. Netflix employs the personalization tool for their users, recommending or suggesting shows based on what those users have already watched. The researchers conducted an experiment to learn more about how Netflix is used and how AI affects the user experience. The main conclusions of this study are that Netflix has a wide range of AI features, most users are happy with their Netflix subscriptions, and the majority prefer Netflix to alternative apps.

Keywords: easy accessibility, recommends, accuracy, privacy

Procedia PDF Downloads 43
2551 A Self-Coexistence Strategy for Spectrum Allocation Using Selfish and Unselfish Game Models in Cognitive Radio Networks

Authors: Noel Jeygar Robert, V. K.Vidya

Abstract:

Cognitive radio is a software-defined radio technology that allows cognitive users to operate on the vacant bands of spectrum allocated to licensed users. Cognitive radio plays a vital role in the efficient utilization of wireless radio spectrum available between cognitive users and licensed users without making any interference to licensed users. The spectrum allocation followed by spectrum sharing is done in a fashion where a cognitive user has to wait until spectrum holes are identified and allocated when the licensed user moves out of his own allocated spectrum. In this paper, we propose a self –coexistence strategy using bargaining and Cournot game model for achieving spectrum allocation in cognitive radio networks. The game-theoretic model analyses the behaviour of cognitive users in both cooperative and non-cooperative scenarios and provides an equilibrium level of spectrum allocation. Game-theoretic models such as bargaining game model and Cournot game model produce a balanced distribution of spectrum resources and energy consumption. Simulation results show that both game theories achieve better performance compared to other popular techniques

Keywords: cognitive radio, game theory, bargaining game, Cournot game

Procedia PDF Downloads 260
2550 A Preliminary Investigation on Factors that Influence Road Users Speeding Behaviors in Selected Roads of Peninsular Malaysia

Authors: Farah Fazlinda Binti Mohamad, Siti Hikmah Binti Musthar, Ahmad Saifizul Bin Abdullah, Jamilah Mohamad, Mohamed Rehan Karim

Abstract:

Road safety is intolerable issue. It affects and impinges on everyone's life as the roads shared by everyone. The most vulnerable victims were the road users who cater the roads every day. It is an appalling when World Health Organization reported that Malaysian road users were ranked worst in Asian countries with 23 deaths for every 100,000 of population over the span of 12 years (World Health Organization, 2009). From this report, it is found that speeding has contributed to 60% of all accidents in the country. Therefore, this study aims to elucidate on speeding matter that occur among road users in selected roads of Peninsular Malaysia. This study on the other hand, provides an insight understanding on the factors affecting behaviour of road users to speeding in selected roads of Peninsular Malaysia. To answer the study aims, 500 sets of questionnaires were distributed among 500 respondents in selected roads of Peninsular Malaysia to obtain their opinions on the matter. The respondents were from different demographics backgrounds to have fair explanation on the issue. The answers have been analysed using descriptive analysis. The results indicated psychological factors of road users appeared to be prominent in explaining road users’ behaviour to speeding. Male road users were also found dominant in speeding compared to female. Thus, this has increased their vulnerability to road injuries and deaths. These findings are very useful in order for us to improve our driving behaviour. Relevant authorities should also revise the existing countermeasures as well as designing the new countermeasures for the road users. It is nevertheless important to comprehend this speeding issue and factors associating it. This matter should be taken seriously and responsibly by each road users as road safety is a responsible of all.

Keywords: road safety, speeding, countermeasures, accidents

Procedia PDF Downloads 464
2549 Smart Online Library Catalog System with Query Expansion for the University of the Cordilleras

Authors: Vincent Ballola, Raymund Dilan, Thelma Palaoag

Abstract:

The Smart Online Library Catalog System with Query Expansion seeks to address the low usage of the library because of the emergence of the Internet. Library users are not accustomed to catalog systems that need a query to have the exact words without any mistakes for decent results to appear. The graphical user interface of the current system has a rather skewed learning curve for users to adapt with. With a simple graphical user interface inspired by Google, users can search quickly just by inputting their query and hitting the search button. Because of the query expansion techniques incorporated into the new system such as stemming, thesaurus search, and weighted search, users can have more efficient results from their query. The system will be adding the root words of the user's query to the query itself which will then be cross-referenced to a thesaurus database to search for any synonyms that will be added to the query. The results will then be arranged by the number of times the word has been searched. Online queries will also be added to the results for additional references. Users showed notable increases in efficiency and usability due to the familiar interface and query expansion techniques incorporated in the system. The simple yet familiar design led to a better user experience. Users also said that they would be more inclined in using the library because of the new system. The incorporation of query expansion techniques gives a notable increase of results to users that in turn gives them a wider range of resources found in the library. Used books mean more knowledge imparted to the users.

Keywords: query expansion, catalog system, stemming, weighted search, usability, thesaurus search

Procedia PDF Downloads 363
2548 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 365
2547 Personas Help Understand Users’ Needs, Goals and Desires in an Online Institutional Repository

Authors: Maha ALjohani, James Blustein

Abstract:

Communicating users' needs, goals and problems help designers and developers overcome challenges faced by end users. Personas are used to represent end users’ needs. In our research, creating personas allowed the following questions to be answered: Who are the potential user groups? What do they want to achieve by using the service? What are the problems that users face? What should the service provide to them? To develop realistic personas, we conducted a focus group discussion with undergraduate and graduate students and also interviewed a university librarian. The personas were created to help evaluating the Institutional Repository that is based on the DSpace system. The profiles helped to communicate users' needs, abilities, tasks, and problems, and the task scenarios used in the heuristic evaluation were based on these personas. Four personas resulted of a focus group discussion with undergraduate and graduate students and from interviewing a university librarian. We then used these personas to create focused task-scenarios for a heuristic evaluation on the system interface to ensure that it met users' needs, goals, problems and desires. In this paper, we present the process that we used to create the personas that led to devise the task scenarios used in the heuristic evaluation as a follow up study of the DSpace university repository.

Keywords: heuristic evaluation, institutional repositories, user experience, human computer interaction, user profiles, personas, task scenarios, heuristics

Procedia PDF Downloads 473
2546 A Mathematical Analysis of Behavioural Epidemiology: Drugs Users Transmission Dynamics Based on Level Education for Susceptible Population

Authors: Firman Riyudha, Endrik Mifta Shaiful

Abstract:

The spread of drug users is one kind of behavioral epidemiology that becomes a threat to every country in the world. This problem caused various crisis simultaneously, including financial or economic crisis, social, health, until human crisis. Most drug users are teenagers at school age. A new deterministic model would be constructed to determine the dynamics of the spread of drug users by considering level of education in a susceptible population. Based on the analytical model, two equilibria points were obtained; there were E₀ (zero user) and E₁ (endemic equilibrium). Existence of equilibrium and local stability of equilibria depended on the Basic Reproduction Ratio (R₀). This parameter was defined as the expected rate of secondary prevalence and primary prevalence in virgin population along spreading primary prevalence. The zero-victim equilibrium would be locally asymptotically stable if R₀ < 1 while if R₀ > 1 the endemic equilibrium would be locally asymptotically stable. The result showed that R₀ was proportional to the rate of interaction of each susceptible population based on educational level with the users' population. It is concluded that there was a need to be given a control in interaction, so that drug users population could be minimized. Numerical simulations were also provided to support analytical results.

Keywords: drugs users, level education, mathematical model, stability

Procedia PDF Downloads 450
2545 The Need for a Tool to Support Users of E-Science Infrastructures in a Virtual Laboratory Environment

Authors: Hashim Chunpir

Abstract:

Support processes play an important role to facilitate researchers (users) to accomplish their research activities with the help of cyber-infrastructure(s). However, the current user-support process in cyber-infrastructure needs a feasible tool to support users. This tool must enable the users of a cyber-infrastructure to communicate efficiently with the staffs of a cyber-infrastructure in order to get technical and scientific assistance, whilst saving resources at the same time. This research paper narrates the real story of employing various forms of tools to support the user and staff communication. In addition, this paper projects the lessons learned from an exploration of the help-desk tools in the current state of user support process in Earth System Grid Federation (ESGF) from support staffs’ perspective. ESGF is a climate cyber-infrastructure that facilitates Earth System Modeling (ESM) and is taken as a case study in this paper. Finally, this study proposes a need for a tool, a framework or a platform that not only improves the user support process to address support servicing needs of end-users of e-Science infrastructures but also eases the life of staffs in providing assistance to the users. With the help of such a tool; the collaboration between users and the staffs of cyber-infrastructures is made easier. Consequently, the research activities of the users of e-Science infrastructure will thrive as the scientific and technical support will be available to users. Finally, this results into painless and productive e-Research.

Keywords: e-Science User Services, e-Research in Earth Sciences, Information Technology Services Management (ITSM), user support process, service desk, management of support activities, help desk tools, application of social media

Procedia PDF Downloads 448