Search results for: popular%20music
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1479

Search results for: popular%20music

1389 Protest Poetry in South Africa: A Study of Oswald Mbuyiseni Mtshali’s Sounds of a Cowhide Drum

Authors: Ogbu Harry Omilonye

Abstract:

This paper examines protest as a literary mechanism against the unpopular political policy of the white minority regime in South Africa. It examines some of Mtshali’s poems as examples of protest poetry, showing how he deploys his artistic acumen in the popular struggle of the oppressed South Africans against the aberrations and obnoxious apartheid policy.

Keywords: protest poetry, poems, minority, oppression

Procedia PDF Downloads 516
1388 Breathing New Life into Old Media

Authors: Dennis Schmickle

Abstract:

Introductory statement: Augmented reality (AR) can be used to breathe life into traditional graphic design media, such as posters, book covers, and album art. AR superimposes a unique image/video on a user’s view of the real world, which makes it more immersive and realistic than traditional 2D media. This study developed a series of projects that utilize both traditional and AR media to teach the fundamental principles of graphic design. The results of this study suggest that AR can be an effective tool for teaching graphic design. Abstract: Traditional graphic design media, such as posters, book covers, and album art, could be considered to be “old media.” However, augmented reality (AR) can breathe life into these formats by making them more interactive and engaging for students and audiences alike. AR is a technology that superimposes a computer-generated image on a user’s view of the real world. This allows users to interact with digital content in a way that is more immersive and interactive than traditional 2D media. AR is becoming increasingly popular, as more and more people have access to smartphones and other devices that can support AR experiences. This study is comprised of a series of projects that utilize both traditional and AR media to teach the fundamental principles of graphic design. In these projects, students learn to create traditional design objects, such as posters, book covers, and album art. However, they are also required to create an animated version of their design and to use AR software to create an AR experience with which viewers can interact. The results of this study suggest that AR can be an effective and exciting tool for teaching graphic design. The students who participated in the study were able to learn the fundamental principles of graphic design, and they also developed the skills they need to create effective AR content. This study has implications for the future of graphic design education. As AR becomes more popular, it is likely that it will become an increasingly important tool for teaching graphic design.

Keywords: graphic design, augmented reality, print media, new media, AR, old media

Procedia PDF Downloads 40
1387 The Coverage of Women's Sport of Greek Sports Websites

Authors: Eleni Tsalkatidou

Abstract:

Despite the fact that women's sport has flourished in recent years, its media coverage remains low, as it is observed that every day men’s sports stories dominate the most popular sports websites and the same doesn’t apply to women. Many studies in the past have demonstrated that the participation of women in sport is greatly underrepresented in the media and even when it does get covered, the focus is often on femininity and attractiveness, not athleticism. This means that female athletes are often portrayed in a sexist manner and, in general, they are more deserving of media coverage as celebrities rather than because of their sporting achievements. Scholars have argued that sport is a place where sexism is cultivated, as gender roles are constructed and disputed based on social context. Although images and information about women athletes are now more than ever, thanks to Social Media where they also act as 'producers', sport is still considered as «masculine». There are many reasons why this happens, the most important of which are: a. It is considered that females don’t have the physical and athletic qualifications such as men and b. Women's sport is less commercial than men’s, so the interest is lower. Moreover, scholars have pointed out that men journalists/reporters don’t cover the women’s sport: it is more common for a woman to write about a women's sport or a female athlete. This has its roots in the conception that sport is synonymous with masculinity - which is defined as the opposite of femininity – and so if men deal with women’s sport, this will probably menace their association with masculinity. Given the above, this paper seeks to examine the amount of women’s sport coverage of five Greek popular sports websites (metrosport.gr, gazzeta.gr, sport24.gr, sdna.gr, sport-fm.gr). The posted articles from these Greek websites from January to June 2020 were selected for my content analysis, which will be used to categorize the themes in order that the following research questions could be answered: 1) Are there any articles that cover women's sports or that refer to female athletes?, 2) And if so, are they articles/reports or is it a reproduction of the press release?, 3) What kind of sports do they refer to (individual-team sport)?, 4) Are the articles signed? And if so, are they written by men or women?, 5) What textual practices are used to cover women's sport/female athletes?, 6) Based on the findings, could we argue that we have entered a new age of media coverage of women’s sport in Greece with a shift towards greater gender equality or not?

Keywords: Coverage, Greek websites, Sport, Women

Procedia PDF Downloads 111
1386 Visitor's Perception toward Boating in Silver River, Florida

Authors: Hoda Manafian, Stephen Holland

Abstract:

Silver Springs are one of Florida's first tourist attractions. They are one of the largest artesian spring formations in the world, producing nearly 550 million gallons of crystal-clear water daily that is one of the most popular sites for water-based leisure activities. As part of managing the use of a state park, the state is interested in establishing a baseline count of number of boating users to compare this to the quality of the natural resources and environment in the park. Understanding the status of the environmental resources and also the human recreational experience is the main objective of the project. Two main goals of current study are 1) to identify the distribution of different types of watercrafts (kayak, canoe, motor boat, Jet Ski, paddleboard and pontoon). 2) To document the level of real crowdedness in the river during different seasons, months, and hours of each day based on the reliable information gained from camera versus self-reported method by tourists themselves in the past studies (the innovative achievement of this study). In line with these objectives, on-site surveys and also boat counting using a time-lapse camera at the Riverside launch was done during 12 months of 2015. 700 on-site surveys were conducted at three watercraft boat ramp sites (Rays Wayside, Riverside launch area, Ft. King Waterway) of recreational users. We used Virtualdub and ImageJ software for counting boats for meeting the first and second goals, since this two software can report even the hour of presence of watercraft in the water in addition to the number of users and the type of watercraft. The most crowded hours were between 9-11AM from February to May and kayak was the most popular watercraft. The findings of this research can make a good foundation for better management in this state park in future.

Keywords: eco-tourism, Florida state, visitors' perception, water-based recreation

Procedia PDF Downloads 222
1385 Interpretations of Disaster: A Comparative Study on Disaster Film Cycles

Authors: Chi-Ying Yu

Abstract:

In real life, the occurrence of disasters is always dreadful and heartbreaking, yet paradoxically, disaster film is a genre that has been popular at periodic intervals in motion picture history. This study attempts to compare the disaster film cycles of the 1970s, 1990s, and the early 21st century. Two research questions are addressed: First, how this genre has responded to the existing conditions of society in different periods in terms of the disaster proposition? Second, how this genre reflects a certain eternal substance of the human mind in light of its lasting appeal? Through cinematic textual analysis and literature review, this study finds that the emergence of disaster films in the 1970s reflected the turmoil in international relations and domestic politics situation in contemporary American society, and cinema screens showed such disaster stories as shipwrecks, air accidents, and skyscraper blazes due to human negligence. The 1990s saw the fervor of millennial apocalypse legends, and the awakening of environmental consciousness, which, together with the rapid advances in digital technology, once again gave rise to a frenzy of disaster films, with natural disasters and threats from aliens as the major themes of disasters. Since the beginning of the 21st century, the 911 Incident and natural disasters around the world have generated a consciousness of imminent crisis. Cinematic images simulated actual disasters, while aesthetic techniques focused on creating a kind of ‘empathetic’ experience in their exploration of the essence of the disaster experience. At the same time, post-apocalypse films that focus on post-disaster reconstruction have become an even more popular theme. Taking the approach of Jungian/post-Jungian film study, this study also reviews and interprets the commonly exhibited subliminal feelings in the disaster films of the three different periods. The imagination of disaster seems to serve as an underlying state of the human mind.

Keywords: disaster film, Jungian/post-Jungian film studies, stimulation, sublime

Procedia PDF Downloads 233
1384 Black Masculinity, Media Stereotyping And Its Influence on Policing in the United States: A Functionalist Perspective

Authors: Jack Santiago Monell

Abstract:

In America, misrepresentations of black males have been perpetuated throughout the history of popular culture. Because of these narratives, varying communities have developed biases and stereotypes about what black male masculinity represents and more importantly, how they respond to them. The researcher explored the perspectives of police officers in the following states, Maryland, Pennsylvania, and North Carolina. Because of the nature of police and community relations, and national attention to high profile cases, having officers provide context into how black males are viewed from their lens, was critical while expanding on the theoretical explanations to describe attitudes towards police confrontations. As one of the objectives was to identify specific themes relevant to why police officers may view African American males differently, hence, responding more aggressively, this proved to be the most beneficial method of initial analysis to identify themes. The following nodes (appearance, acting suspicious/ troublesome behavior, upbringing about black males, excessive force) were identified to analyze the transcripts to discern associations. The data was analyzed through NVivo 11, and several themes resulted to elaborate on the data received. In analyzing the data, four themes were identified: appearance, acting suspicious/ troublesome behavior, upbringing about black males, and excessive force. The data conveyed that continuous stereotypes about African American men will ultimately result in excessive use of force or pervasive shootings, albeit the men are armed or unarmed. African American males are consistently targeted because of their racial makeup and appearance over any other probable circumstances. As long as racial bias and stereotypical practices continue in policing, African American males will endlessly be unjustly targeted and at times, the victims of violent encounters with police officers in the United States.

Keywords: African American males, police perceptions, masculinity, popular culture

Procedia PDF Downloads 84
1383 The Reasons behind Individuals to Join Terrorist Organizations: Recruitment from Outside

Authors: Murat Sözen

Abstract:

Today terrorism is gaining momentum again. Parallel to this, it hurts more than before because it has victims from not only its own locations but also remote places. As victims are from outside, militants are likewise from own location and outside. What made these individuals join the terrorist organizations and how these organizations recruit militants are still unanswered. The purpose of this work is to find reasons of joining and power of recruiting. In addition, the role of most popular tool of recruiting, ‘social media’ will be examined.

Keywords: recruitment, social media, recruitment, militants

Procedia PDF Downloads 317
1382 Preliminary Composite Overwrapped Pressure Vessel Design for Hydrogen Storage Using Netting Analysis and American Society of Mechanical Engineers Section X

Authors: Natasha Botha, Gary Corderely, Helen M. Inglis

Abstract:

With the move to cleaner energy applications the transport industry is working towards on-board hydrogen, or compressed natural gas-fuelled vehicles. A popular method for storage is to use composite overwrapped pressure vessels (COPV) because of their high strength to weight ratios. The proper design of these COPVs are according to international standards; this study aims to provide a preliminary design for a 350 Bar Type IV COPV (i.e. a polymer liner with a composite overwrap). Netting analysis, a popular analytical approach, is used as a first step to generate an initial design concept for the composite winding. This design is further improved upon by following the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel standards, Section X: Fibre-reinforced composite pressure vessels. A design program based on these two approaches is developed using Python. A numerical model of a burst test simulation is developed based on the two approaches and compared. The results indicate that the netting analysis provides a good preliminary design, while the ASME-based design is more robust and accurate as it includes a better approximation of the material behaviour. Netting analysis is an easy method to follow when considering an initial concept design for the composite winding when not all the material characteristics are known. Once these characteristics have been fully defined with experimental testing, an ASME-based design should always be followed to ensure that all designs conform to international standards and practices. Future work entails more detailed numerical testing of the design for improvement, this will include the boss design. Once finalised prototype manufacturing and experimental testing will be conducted, and the results used to improve on the COPV design.

Keywords: composite overwrapped pressure vessel, netting analysis, design, American Society of Mechanical Engineers section x, fiber-reinforced, hydrogen storage

Procedia PDF Downloads 195
1381 The Common Location and the Intensity of Surface Electrical Stimulation on the Thorax and Abdomen Areas: A Systematic Review

Authors: Vu Hoang Thu Huong

Abstract:

Background: Surface electrical stimulation (SES) is a popular non-invasive approach that offers a wide range of treatments for many diseases of physical therapy. It involves applying electrical stimulation to the skin via surface electrodes to stimulate nerve fibers. SES was regularly used to treat the back and upper or lower extremities, but it was rarely used to treat the chest and abdomen. SES on the thorax and abdomen should be administered with more attention because crucial organs are under those areas (i.e., heart, lungs, liver, etc.). In these areas, safety precautions are suggested, and some SES applications might even be a contraindication. The fact that physical therapists have less experience with SES in these situations can also be attributed to these. Although a few earlier studies applied it to these settings and discovered hopeful results, none of them highlight the relationship between the intensity of SES and its depth of impact for safety considerations. Objective: To assure feasibility when using SES in these areas, the purpose of this study is to summarize the common location and intensity of those areas that have been conducted in previous studies. Method: A thorough systematic review was conducted to determine the common surface electrode position for the thorax and abdomen areas. The studies with the randomized controlled design were systematically searched using inclusion and exclusion criteria through nine electronic databases, including Pubmed, Scopus, etc., between 1975 and Dec 2021. Results: Thirty-three studies with over 1800 participants and 4 types of SES (TENS, IFC, NMES, and FES) with various categories of department hospitals were found. Following an anterior, lateral, and posterior observation, the particular SES positions found that it concentrated on 6 regions (the thoracic, abdomen, upper lateral, lower lateral, upper back, and lower back regions), and its intensity for each region was also summarized. Conclusion: This systematic review figured out the popular locations of SES in the thorax and abdominal areas as well as a summarized maximum of intensity that was found in previous studies with outstanding outcomes.

Keywords: surface electrical stimulation, electrical stimulation, thoracic, abdomen, abdominal.

Procedia PDF Downloads 57
1380 Cloud Computing Architecture Based on SOA

Authors: Negin Mohammadrezaee Larki

Abstract:

Cloud Computing is a popular solution that has been used in recent years to cooperate and collaborate among distributed applications over networks. Moving successfully into cloud computing requires an architecture that will support the new cloud capabilities. Many business leaders and analysts agree that moving to cloud requires having a solid, service-oriented architecture to provide the infrastructure needed for successful cloud implementation.

Keywords: Service Oriented Architecture (SOA), Service Oriented Cloud Computing Architecture (SOCCA), cloud computing, cloud computing architecture

Procedia PDF Downloads 349
1379 Renegotiating the Filipino Bakla Culture: A Semiotic Analysis of Drag Performance in Eat Bulaga’s Kalye Serye

Authors: Ruepert Jiel Cao

Abstract:

This study explores the renegotiation of bakla culture in Philippine media in the context of Kalye Serye segment of the popular Filipino noontime variety show Eat Bulaga. Although the term “bakla” is usually translated to “gay” or “homosexual male” in English, they do not mean the same. The western notion of a gay refers to a male person attracted to another male person but still retains the masculine physical attributes. However, the bakla embodies loudness, femininity, and transvestitism. Hence, a bakla is a gay man aspiring to be a woman by assuming feminine actions and appearance, a definition much closer to a transgender. The Philippine media usually employs the bakla culture in comedy programs. The bakla nowadays is usually associated with the people of lower economic strata and carries a pathological connotation. The Filipino television program Eat Bulaga, which has been airing for more than 36 years, is fond of using bakla in comedy. However, the recently launched segment entitled Kalye Serye (literally “Street [Television] Series”), while still employing drag performance to incorporate bakla culture in comedy, renegotiates the bakla culture by deviating from the stereotypical notion of bakla. In this study, this researcher asks: (1) How does Kalye Serye renegotiate the Filipino concept of bakla in terms of economic aspirations and social norms? (2) How does Kalye Serye reappropriate the bakla culture to fit non-comedic performances? The study examines 15 purposively selected Kalye Serye episodes. Seven were selected from the Thursday episodes, seven from Saturday episodes, and the Lenten special episode. These were selected to cover as many characters and different character roles as possible. Data was constructed by identifying and coding the roles, physical appearance and gestures, and key dialogs of the characters. A total of six female characters played by three different male actors were examined. Semiotic analysis using semiotics of Roland Barthes was performed to produce a reading of the characters. Findings show that through physical appearance, the characters associate bakla with the economic affluence through the use of expensive-looking clothes, jewelries, cars, and elaborate gestures. This represents a new economic but old western aspiration of the bakla. In terms of social norms, the characters try to revive the traditional concepts of femininity, courtship, and respect, values which are touted to be lost in the current generation of Filipinos. This is quite ironic because while there is a seemingly tolerant attitude towards all forms of queerness, the bakla is considered immoral and yet, the bakla is used to teach about morality and values. Finally, the characters break the traditional association of the bakla with slapstick comedy and their roles are reappropriated to suit dramatic roles. By refraining from portraying the bakla in ridiculous manner (physically and in terms of roles), the bakla lends itself well in the performance of dramatic roles and their ridiculous and pathological associations removed. Future research may include other Filipino or Asian portrayals of queerness to get a better understanding of how queerness is incorporated in contemporary popular culture.

Keywords: bakla, drag performance, popular culture, queer representation

Procedia PDF Downloads 260
1378 Cross Site Scripting (XSS) Attack and Automatic Detection Technology Research

Authors: Tao Feng, Wei-Wei Zhang, Chang-Ming Ding

Abstract:

Cross-site scripting (XSS) is one of the most popular WEB Attacking methods at present, and also one of the most risky web attacks. Because of the population of JavaScript, the scene of the cross site scripting attack is also gradually expanded. However, since the web application developers tend to only focus on functional testing and lack the awareness of the XSS, which has made the on-line web projects exist many XSS vulnerabilities. In this paper, different various techniques of XSS attack are analyzed, and a method automatically to detect it is proposed. It is easy to check the results of vulnerability detection when running it as a plug-in.

Keywords: XSS, no target attack platform, automatic detection,XSS detection

Procedia PDF Downloads 373
1377 Effects of Surface Topography on Roughness of Glazed Ceramic Substrates

Authors: R. Sarjahani, M. Sheikhattar, S. Javadpour, B. Hashemi

Abstract:

Glazes and their surface characterization is an important subject for ceramic industries. Fabrication of a super smooth surface resistant to stains is a big improvement for those industries. In this investigation, surface topography of popular glazes such as Zircon and Titania based opaque glazes, calcium based matte glaze and transparent glaze has been analyzed by Marsurf M300, SEM, EDS and XRD. Results shows that surface roughness of glazes seriously depends on surface crystallinity, crystal size and shapes.

Keywords: crystallinity, glaze, surface roughness, topography

Procedia PDF Downloads 531
1376 The Relationship between Adolescent Self Well Being and Cyber Bully/Victim Being

Authors: Nesrin Demir, Betül Demirbağ

Abstract:

In recent years, the type and content of bullying in schools changes together with technological development. Many studies attribute bullying movement to virtual platform to the widespread use of social media and internet. The main goal of this research is to determine if there is a correlation between subjective well-being as a popular conception of Positive Psychology and being cyber bully/victim. For this purpose, 287 students from various public high schools in Malatya have reached. As assessment tool, Cyber Bully/Victim Scale and Self Well Being Scale for Adolescents were used. Results were discussed in the relevant literature.

Keywords: cyber bully, cyber victim, school counseling, subjective well-being

Procedia PDF Downloads 388
1375 Bring Your Own Devices (BOYD): Risks and Mitigation Strategies

Authors: Mohammed Ketel

Abstract:

This paper discusses the security issues related to Bring Your Own Devices (BYOD) programs, an increasingly popular choice for small and big businesses alike, and explores the benefits, risks, the available controls and solutions to mitigate the inherent security concerns with mobile devices, in general, and BYOD programs specifically. The paper also discusses the approaches that organizations can apply to mitigate the risks, which may include policies, diverse technologies, education, and training.

Keywords: BYOD, security, policies, standards, controls, education

Procedia PDF Downloads 260
1374 Communication through Technology: SMS Taking Most of the Time Impacting the Standard English

Authors: Nazia Sulemna, Sadia Gul

Abstract:

With the invade of mobile phones text messaging has become a popular medium of communication. Its users are multiplying with every passing day. Its use is not only limites to informal but to formal communication as well. Students are the advent users of mobile phones and of SMS as well. The present study manifests the fact that students are practicing SMS for a number of reasons and a good amount of time is spent upon it which is resulting in typographical features, graphones and rebus writing. Data was collected through questionnaires and came to the conclusion that its effect is obvious in the L2 users and in exam as well.

Keywords: text messaging, technology, exams, formal writing

Procedia PDF Downloads 710
1373 Detecting Covid-19 Fake News Using Deep Learning Technique

Authors: AnjalI A. Prasad

Abstract:

Nowadays, social media played an important role in spreading misinformation or fake news. This study analyzes the fake news related to the COVID-19 pandemic spread in social media. This paper aims at evaluating and comparing different approaches that are used to mitigate this issue, including popular deep learning approaches, such as CNN, RNN, LSTM, and BERT algorithm for classification. To evaluate models’ performance, we used accuracy, precision, recall, and F1-score as the evaluation metrics. And finally, compare which algorithm shows better result among the four algorithms.

Keywords: BERT, CNN, LSTM, RNN

Procedia PDF Downloads 175
1372 How to Use E-Learning to Increase Job Satisfaction in Large Commercial Bank in Bangkok

Authors: Teerada Apibunyopas, Nithinant Thammakoranonta

Abstract:

Many organizations bring e-Learning to use as a tool in their training and human development department. It is getting more popular because it is easy to access to get knowledge all the time and also it provides a rich content, which can develop the employees skill efficiently. This study focused on the factors that affect using e-Learning efficiently, so it will make job satisfaction increased. The questionnaires were sent to employees in large commercial banks, which use e-Learning located in Bangkok, the results from multiple linear regression analysis showed that employee’s characteristics, characteristics of e-Learning, learning and growth have influence on job satisfaction.

Keywords: e-Learning, job satisfaction, learning and growth, Bangkok

Procedia PDF Downloads 466
1371 Fabrication of Silicon Solar Cells Using All Sputtering Process

Authors: Ching-Hua Li, Sheng-Hui Chen

Abstract:

Sputtering is a popular technique with many advantages for thin film deposition. To fabricate a hydrogenated silicon thin film using sputtering process for solar cell applications, the ion bombardment during sputtering will generate microstructures (voids and columnar structures) to form silicon dihydride bodings as defects. The properties of heterojunction silicon solar cells were studied by using boron grains and silicon-boron targets. Finally, an 11.7% efficiency of solar cell was achieved by using all sputtering process.

Keywords: solar cell, sputtering process, pvd, alloy target

Procedia PDF Downloads 534
1370 A Mathematical Equation to Calculate Stock Price of Different Growth Model

Authors: Weiping Liu

Abstract:

This paper presents an equation to calculate stock prices of different growth model. This equation is mathematically derived by using discounted cash flow method. It has the advantages of being very easy to use and very accurate. It can still be used even when the first stage is lengthy. This equation is more generalized because it can be used for all the three popular stock price models. It can be programmed into financial calculator or electronic spreadsheets. In addition, it can be extended to a multistage model. It is more versatile and efficient than the traditional methods.

Keywords: stock price, multistage model, different growth model, discounted cash flow method

Procedia PDF Downloads 364
1369 Technique for Online Condition Monitoring of Surge Arresters

Authors: Anil S. Khopkar, Kartik S. Pandya

Abstract:

Overvoltage in power systems is a phenomenon that cannot be avoided. However, it can be controlled to a certain extent. Power system equipment is to be protected against overvoltage to avoid system failure. Metal Oxide Surge Arresters (MOSA) are connected to the system for the protection of the power system against overvoltages. The MOSA will behave as an insulator under normal working conditions, where it offers a conductive path under voltage conditions. MOSA consists of zinc oxide elements (ZnO Blocks), which have non-linear V-I characteristics. ZnO blocks are connected in series and fitted in ceramic or polymer housing. This degrades due to the aging effect under continuous operation. Degradation of zinc oxide elements increases the leakage current flowing from the surge arresters. This Increased leakage current results in the increased temperature of the surge arrester, which further decreases the resistance of zinc oxide elements. As a result, leakage current increases, which again increases the temperature of a MOSA. This creates thermal runaway conditions for MOSA. Once it reaches the thermal runaway condition, it cannot return to normal working conditions. This condition is a primary cause of premature failure of surge arresters, as MOSA constitutes a core protective device for electrical power systems against transients. It contributes significantly to the reliable operation of the power system network. Hence, the condition monitoring of surge arresters should be done at periodic intervals. Online and Offline condition monitoring techniques are available for surge arresters. Offline condition monitoring techniques are not very popular as they require removing surge arresters from the system, which requires system shutdown. Hence, online condition monitoring techniques are very popular. This paper presents the evaluation technique for the surge arrester condition based on the leakage current analysis. Maximum amplitude of total leakage current (IT), Maximum amplitude of fundamental resistive leakage current (IR) and maximum amplitude of third harmonic resistive leakage current (I3rd) have been analyzed as indicators for surge arrester condition monitoring.

Keywords: metal oxide surge arrester (MOSA), over voltage, total leakage current, resistive leakage current

Procedia PDF Downloads 25
1368 Cryptocurrency-Based Mobile Payments with Near-Field Communication-Enabled Devices

Authors: Marko Niinimaki

Abstract:

Cryptocurrencies are getting increasingly popular, but very few of them can be conveniently used in daily mobile phone purchases. To solve this problem, we demonstrate how to build a functional prototype of a mobile cryptocurrency-based e-commerce application the communicates with Near-Field Communication (NFC) tags. Using the system, users are able to purchase physical items with an NFC tag that contains an e-commerce URL. The payment is done simply by touching the tag with a mobile device and accepting the payment. Our method is constructive: we describe the design and technologies used in the implementation and evaluate the security and performance of the solution. Our main finding is that the analysis and measurements show that our solution is feasible for e-commerce.

Keywords: cryptocurrency, e-commerce, NFC, mobile devices

Procedia PDF Downloads 149
1367 Review in Role of Geotextile on Soil Improvement

Authors: Sandra Ghavam Shirazi, Mohsen Ramezan Shirazi, Mohammadreza Golhashem

Abstract:

Nowadays by development of construction in modern world new techniques are introduced to civil engineering. As for geotechnical problems and demands of soil improvement, engineers are searching for decisive methods to ensure the safety of projects. As a popular material Geotextiles are used in almost every aspect of civil engineering. There is a vast variety of geotextiles and each kind has their own unique characteristics therefor to select the proper geotextile for a specific project their properties must be carefully examined. This review gathers and evaluates different parameters of geotextiles that are used in geotechnical field.

Keywords: geotextile, soft soils, fabric, stabilization, fiber

Procedia PDF Downloads 374
1366 Winning Consumers and Influencing Them Using Social Media: A Cross Generational Impact Case Study

Authors: J. Garfield, B. O'Hare, V. Bell

Abstract:

The use of social media is continuing to grow and is now widely used for product and service advertising. This research investigated the social media usage across all age ranges in the United Kingdom to determine the impact on purchasing habits. A questionnaire was distributed to people of different ages and with different experiences of social media usage. The results showed that Facebook continues to be the most popular social media network. Respondents in the younger age group were more likely to be influenced by brand marketing and advertising, but the study concluded that celebrity endorsements had little or no influence.

Keywords: social media advertising, social networking sites, electronic word of mouth, celebrity endorsements

Procedia PDF Downloads 104
1365 Internet as a Marketing Tool for Tourism Promotion

Authors: Emeka Okonkwo

Abstract:

The Information Technology (IT) has prevailed over all functions of strategic and operational management. The Internet (a product of information technology) has increasingly become a popular medium for marketing. This paper examines the potentials of Internet for tourism marketing. To achieve this, the paper x-rays the characteristics of tourism marketing and examines the application of the Internet in tourism marketing. It is argued that the use of Internet for tourism marketing will not only reach a broad audience and reduce the cost of transaction (by conventional methods used by travel agents in times past), but, will also alleviate the problems of identification, authentication and confirmation of travels/package tours by tourists as well as promotion of tourism industry.

Keywords: internet, marketing, tourism, tourism management

Procedia PDF Downloads 390
1364 Different Methods of Fe3O4 Nano Particles Synthesis

Authors: Arezoo Hakimi, Afshin Farahbakhsh

Abstract:

Herein, we comparison synthesized Fe3O4 using, hydrothermal method, Mechanochemical processes and solvent thermal method. The Hydrothermal Technique has been the most popular one, gathering interest from scientists and technologists of different disciplines, particularly in the last fifteen years. In the hydrothermal method Fe3O4 microspheres, in which many nearly monodisperse spherical particles with diameters of about 400nm, in the mechanochemical method regular morphology indicates that the particles are well crystallized and in the solvent thermal method Fe3O4 nanoparticles have good properties of uniform size and good dispersion.

Keywords: Fe3O4 nanoparticles, hydrothermal method, mechanochemical processes, solvent thermal method

Procedia PDF Downloads 320
1363 A Method of the Semantic on Image Auto-Annotation

Authors: Lin Huo, Xianwei Liu, Jingxiong Zhou

Abstract:

Recently, due to the existence of semantic gap between image visual features and human concepts, the semantic of image auto-annotation has become an important topic. Firstly, by extract low-level visual features of the image, and the corresponding Hash method, mapping the feature into the corresponding Hash coding, eventually, transformed that into a group of binary string and store it, image auto-annotation by search is a popular method, we can use it to design and implement a method of image semantic auto-annotation. Finally, Through the test based on the Corel image set, and the results show that, this method is effective.

Keywords: image auto-annotation, color correlograms, Hash code, image retrieval

Procedia PDF Downloads 459
1362 POP Music and Tai Chi – Movement and Stillness Intertwined in The Contemporary World

Authors: Patricia Portugal Marques de Carvalho Lourenço

Abstract:

Pop Music embodies both the music that is popular with the audiences and the one that is widespread amongst the general public associated with a state of mind and rhythm. Tai Chi epitomises Yin and Yang, two interconnected opposite states of being. Undivided, they are one, a neutral state of consciousness that does not swing to either pole. It remains constant and even minded. Sound flows and vibrations cause movement, a physical response to the tempo. When an excessive movement is reached leads to stillness therefore, extreme Yang leads to Yin. Pop Music and Tai Chi are comparable to state of inner being versus a state of outer being, emotional control versus emotional expression, stillness, and movement; opposites that are independent of one another yet interdependent concepts in motion.

Keywords: Pop music, C-Pop, Tai Chi, Ba Gua, communication, entertainment education

Procedia PDF Downloads 199
1361 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe

Authors: Ejd Garba, Okike Benjamin

Abstract:

Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.

Keywords: arithmetic, cyber space, modulo-2, information security

Procedia PDF Downloads 280
1360 Impact of Sensory Marketing on Consumer Consumption Behaviour in the Hotel Spa Industry

Authors: Li (Claudia) Chen

Abstract:

With the rapid development of the global economy, the growing prevalence of customer health consciousness has arisen over the last decade. Consumers are considered more healthy lifestyles and wellness routines in their daily life, and likewise, they are inclined to invest disposable incomes in enhancing their health and wellness, beauty, and social identity. Nowadays, visiting spas has become a popular activity; particularly, millennials are increasingly prone to visiting spas. It has now become one of the major places for relaxation, rejuvenation, revitalization, and enjoyment by providing various types of spa services such as hotel and resort spas, destination spas, mineral, and thermal spring spas, medical spas, and so forth. The hotel and resort spa has been becoming increasingly popular among other spas, which is the largest number of spas and revenue over the last five years, and has now surpassed day/salon spas as the industry revenue leader. In the hotel and resort spa industry, sensory experience plays a vital role in the customer journey, and it encompasses all aspects of the sense that can affect the overall experience. Consumers use senses-sight, sound, touch, smell, and taste to gather the information that contributes to the establishment of an experience, and all senses interacting together form the foundation of sensory experiences. Sensory marketing as a marketing strategy engages consumers' senses and affects their behaviour, yet consumers are often unaware of the way senses interact with their day-to-day experiences. Indeed, it is important to understand consumer sensory experience in terms of how it influences consumer consumption behaviour. The aim of this paper is to evaluate the sensory experiences of consumers and the ways that sensory experiences shape consumer behaviour in the hotel and resort spa industry. This paper consists of in-depth interviews, focus groups, and participant-observation methods to collect data from different stakeholders. The findings reveal that multisensory experiences play vital roles in consumer spa experiences and are highly influential in consumer perception, cognition, and behaviour. Moreover, the findings also demonstrate that sensory stimuli bring positive or negative effects on consumer experience in the hotel spa industry. Ultimately, the findings also offer additional insight to managers on sensory marketing strategy to stimulate brand experience that can establish customer loyalty.

Keywords: sensory marketing, senses, consumer behaviour, multi-sensory marketing, hotel and resorts spa industry, qualitative research

Procedia PDF Downloads 50