Search results for: relational messages
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 676

Search results for: relational messages

586 A Closed-Loop Design Model for Sustainable Manufacturing by Integrating Forward Design and Reverse Design

Authors: Yuan-Jye Tseng, Yi-Shiuan Chen

Abstract:

In this paper, a new concept of closed-loop design model is presented. The closed-loop design model is developed by integrating forward design and reverse design. Based on this new concept, a closed-loop design model for sustainable manufacturing by integrated evaluation of forward design, reverse design, and green manufacturing using a fuzzy analytic network process is developed. In the design stage of a product, with a given product requirement and objective, there can be different ways to design the detailed components and specifications. Therefore, there can be different design cases to achieve the same product requirement and objective. Thus, in the design evaluation stage, it is required to analyze and evaluate the different design cases. The purpose of this research is to develop a model for evaluating the design cases by integrated evaluation of forward design, reverse design, and green manufacturing models. A fuzzy analytic network process model is presented for integrated evaluation of the criteria in the three models. The comparison matrices for evaluating the criteria in the three groups are established. The total relational values among the three groups represent the total relational effects. In application, a super matrix can be created and the total relational values can be used to evaluate the design cases for decision-making to select the final design case. An example product is demonstrated in this presentation. It shows that the model is useful for integrated evaluation of forward design, reverse design, and green manufacturing to achieve a closed-loop design for sustainable manufacturing objective.

Keywords: design evaluation, forward design, reverse design, closed-loop design, supply chain management, closed-loop supply chain, fuzzy analytic network process

Procedia PDF Downloads 646
585 Parametric Optimization of Wire Electric Discharge Machining (WEDM) for Aluminium Metal Matrix Composites

Authors: G. Rajyalakhmi, C. Karthik, Gerson Desouza, Rimmie Duraisamy

Abstract:

In this present work, metal matrix composites with combination of aluminium with (Sic/Al2O3) were fabricated using stir casting technique. The objective of the present work is to optimize the process parameters of Wire Electric Discharge Machining (WEDM) composites. Pulse ON Time, Pulse OFF Time, wire feed and sensitivity are considered as input process parameters with responses Material Removal Rate (MRR), Surface Roughness (SR) for optimization of WEDM process. Taguchi L18 Orthogonal Array (OA) is used for experimentation. Grey Relational Analysis (GRA) is coupled with Taguchi technique for multiple process parameters optimization. ANOVA (Analysis of Variance) is used for finding the impact of process parameters individually. Finally confirmation experiments were carried out to validate the predicted results.

Keywords: parametric optimization, particulate reinforced metal matrix composites, Taguchi-grey relational analysis, WEDM

Procedia PDF Downloads 544
584 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement

Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al

Abstract:

Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.

Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security

Procedia PDF Downloads 103
583 A Tool to Represent People Approach to the Use of Pharmaceuticals and Related Criticality and Needs: A Territory Experience

Authors: Barbara Pittau, Piergiorgio Palla, Antonio Mastino

Abstract:

Communication is fundamental to health education. The proper use of medicinal products is a crucial aspect of the health of citizens that affects both safety and health care spending. Therefore, encouraging/promoting communication, concerning the importance of proper use of pharmaceuticals, has substantial implications in terms of individual health, health care, and health care system sustainability. In view of these considerations, in the context of two projects, one of which is still in progress, a relational database-backed web application named COLLABORAFARMACISOLA has been designed and developed as a tool to analyze and visualize how people approach the use of medicinal products, with the aim of improving and enhancing communication efficacy. The software application is being used to collect information (anonymously and voluntarily) from the citizens of Sardinia, an Italian region, regarding their knowledge, experiences, and opinions towards pharmaceuticals. This study that was conducted to date on thousand of interviewed people, has focused on different aspects such as: the treatment interruption and the "self-prescription” without medical consultation, the attention paid to reading the leaflets, the awareness of the economic value of the pharmaceuticals, the importance of avoiding the waste of medicinal products and the attitudes towards the use of generics. To this purpose, our software application provides a set of ad hoc parsing routines, to store information into the structure of a relational database and to process and visualize it through a set of interactive tools aimed to emphasize the findings and the insights obtained. The results of our preliminary analysis show the efficacy of the awareness plan and, at the same time, the criticality and the needs of the territory under examination. The ultimate goal of our study is to provide a contribution to the community by improving communication that can result in a benefit for public health in a context strictly connected to the reality of the territory.

Keywords: communication, pharmaceuticals, public health, relational database, tool, web application

Procedia PDF Downloads 110
582 Evidence from the Ashanti Region in Ghana: A Correlation Between Principal Instructional Leadership and School Performance in Senior High Schools

Authors: Blessing Dwumah Manu, Dawn Wallin

Abstract:

This study aims to explore school principal instructional leadership capabilities (Robinson, 2010) that support school performance in senior high schools in Ghana’s Northern Region. It explores the ways in which leaders (a) use deep leadership content knowledge to (b) solve complex school-based problems while (c) building relational trust with staff, parents, and students as they engage in the following instructional leadership dimensions: establishing goals and expectations; resourcing strategically; ensuring quality teaching; leading teacher learning and development and ensuring an orderly and safe environment (Patuawa et al, 2013). The proposed research utilizes a constructivist approach to explore the experiences of 18 school representatives (including principals, deputy principals, department heads, teachers, parents, and students) through an interview method.

Keywords: instructional leadership, leadership content knowledge, solving complex problems, building relational trust and school performance

Procedia PDF Downloads 75
581 The Effects of Social Capital and Empowering Leadership on Team Cohesion

Authors: Y. R. Lai, J. C. Jehng, T. T. Chang

Abstract:

Team is a popular job design in the management settings. Because people on a team need to work together to complete a lot of tasks, the interaction between team members strongly influences team effectiveness. The study examines the effect of social capital and empowering leadership on team cohesion. There are three facets of social capital: structural facet, relational facet, and cognitive facet. Empowering leadership includes enhancing the meaningfulness of work, fostering participation in decision making, expressing confidence in high performance, and providing autonomy from bureaucratic constraints. Data were collected from 181 team members of 47 teams in the real estate agency industry. The results show that the relational social capital, enhancing the meaningfulness of work, and providing autonomy from bureaucratic constraints are positively related to two dimensions of team cohesion: sense of belonging and feelings of moral. Additionally, expressing confidence in high performance is negatively related to sense of belonging.

Keywords: social capital, empowering leadership, team cohesion, team effectiveness

Procedia PDF Downloads 386
580 Resocializing Corporate Mindfulness and Meditation: A Relational-Sociological Account of Mindfulness Course Curricula in the Workplace

Authors: Katie Temple

Abstract:

This paper investigates how corporate actors forge commensurability between Buddhist-based mindfulness techniques and day-to-day organizational life. In-depth interviews were conducted with mindfulness instructors certified through Google’s Search Inside Yourself Leadership Institute (SIYLI), an organization that designs corporate mindfulness program curricula based on their experiences guiding courses in Fortune 500 companies. Drawing from anti-essentialist sociology and interpretive data analysis, this paper describes instructors’ use of their standardized teacher guidebooks, a regulatory script all SIYLI-certified instructors must adhere to, and instructors’ reinterpretations of teaching protocols at the local level. Instructors mediate standardized rules through their embodied knowledge, perceived receptivity and effect of a given audience, and their political values. Instructors also resist standardizing practices by developing creative, under-the-radar tactics to deviate from the guidebook and assert their own spiritual autonomy. This research contributes to growing debates challenging critical and neoliberal accounts of capitalist abstraction.

Keywords: anti-essentialism, corporate culture, interpretive methods, mindfulness and meditation, relational sociology

Procedia PDF Downloads 58
579 A Memetic Algorithm Approach to Clustering in Mobile Wireless Sensor Networks

Authors: Masood Ahmad, Ataul Aziz Ikram, Ishtiaq Wahid

Abstract:

Wireless sensor network (WSN) is the interconnection of mobile wireless nodes with limited energy and memory. These networks can be deployed formany critical applications like military operations, rescue management, fire detection and so on. In flat routing structure, every node plays an equal role of sensor and router. The topology may change very frequently due to the mobile nature of nodes in WSNs. The topology maintenance may produce more overhead messages. To avoid topology maintenance overhead messages, an optimized cluster based mobile wireless sensor network using memetic algorithm is proposed in this paper. The nodes in this network are first divided into clusters. The cluster leaders then transmit data to that base station. The network is validated through extensive simulation study. The results show that the proposed technique has superior results compared to existing techniques.

Keywords: WSN, routing, cluster based, meme, memetic algorithm

Procedia PDF Downloads 447
578 Nurses' and Patients’ Perception about Care: A Comparative Study

Authors: Evangelia Kotrotsiou, Mairy Gouva, Theodosios Paralikas, Maria Fiaka, Styliani Kotrotsiou, Maria Malliarou

Abstract:

The purpose of this research is to investigate the way nurses perceive the care provided in comparison to the way patients perceive it, taking into account existing literature. As far as the sample of research is concerned, it has come from the population of nurses working in the General Hospital of Thessaloniki, St. Paul and the patients of its surgical clinic. In the present study, the sample consists of 100 nurses and 88 patients. The questionnaire used was the Caring Nurse-Patient Interactions Scale: 23-Item Version, created by Cossette et al. (2006). In the case of both patients and nurses, a high score was observed in relational care in the case of the frequency of nursing care in daily practice, as well as the satisfaction of providing nursing care. Overall, patients rated higher clinical care in the case of the frequency of nursing care in daily practice, as well as the satisfaction of the clinical care they were given. On the other hand, nurses rated higher comfort care in the case of the frequency of nursing care in everyday practice, as well as relational care in the area of the importance of nursing care in everyday practice.

Keywords: nursing care, patient needs, patient satisfaction, care giving

Procedia PDF Downloads 358
577 Recommender System Based on Mining Graph Databases for Data-Intensive Applications

Authors: Mostafa Gamal, Hoda K. Mohamed, Islam El-Maddah, Ali Hamdi

Abstract:

In recent years, many digital documents on the web have been created due to the rapid growth of ’social applications’ communities or ’Data-intensive applications’. The evolution of online-based multimedia data poses new challenges in storing and querying large amounts of data for online recommender systems. Graph data models have been shown to be more efficient than relational data models for processing complex data. This paper will explain the key differences between graph and relational databases, their strengths and weaknesses, and why using graph databases is the best technology for building a realtime recommendation system. Also, The paper will discuss several similarity metrics algorithms that can be used to compute a similarity score of pairs of nodes based on their neighbourhoods or their properties. Finally, the paper will discover how NLP strategies offer the premise to improve the accuracy and coverage of realtime recommendations by extracting the information from the stored unstructured knowledge, which makes up the bulk of the world’s data to enrich the graph database with this information. As the size and number of data items are increasing rapidly, the proposed system should meet current and future needs.

Keywords: graph databases, NLP, recommendation systems, similarity metrics

Procedia PDF Downloads 73
576 The Perils of Flagging Pirates: How Gender, False Consensus and Normative Messages Influence Digital Piracy Intentions

Authors: Kate Whitman, Zahra Murad, Joe Cox, Adam Cox

Abstract:

This study investigates the influence of normative communications on digital piracy intentions. Although descriptive norms are thought to influence behavior, the study examines the potential bias in one's own behavior, leading to false consensus—a phenomenon perpetuating undesirable activities. The research tests the presence of false consensus and the effect of correcting normative predictions on changes in piracy intentions, examining gender differences. Results from a controlled experiment (N = 684) indicate that normative communications, reflecting the "real" norm based on government data (N=5000), increase (decrease) piracy intentions among men (women) underestimating their peers' behavior. Conversely, neither men nor women overestimating their peers' piracy show any notable change in intentions. Considering men consume more illegal content than women, suggesting they pose a higher risk, the study highlights the need for cautious use of normative communications. Therefore, policymakers should minimize the visibility of piracy behavior for effective digital piracy management.

Keywords: digital piracy, false consensus, normative interventions, persuasive messages

Procedia PDF Downloads 21
575 Analysis of Entrepreneurship in Industrial Cluster

Authors: Wen-Hsiang Lai

Abstract:

Except for the internal aspects of entrepreneurship (i.e. motivation, opportunity perspective and alertness), there are external aspects that affecting entrepreneurship (i.e. the industrial cluster). By comparing the machinery companies located inside and outside the industrial district, this study aims to explore the cluster effects on the entrepreneurship of companies in Taiwan machinery clusters (TMC). In this study, three factors affecting the entrepreneurship in TMC are conducted as “competition”, “embedded-ness” and “specialized knowledge”. The “competition” in the industrial cluster is defined as the competitive advantages that companies gain in form of demand effects and diversified strategies; the “embedded-ness” refers to the quality of company relations (relational embedded-ness) and ranges (structural embedded-ness) with the industry components (universities, customers and complementary) that affecting knowledge transfer and knowledge generations; the “specialized knowledge” shares the internal knowledge within industrial clusters. This study finds that when comparing to the companies which are outside the cluster, the industrial cluster has positive influence on the entrepreneurship. Additionally, the factor of “relational embedded-ness” has significant impact on the entrepreneurship and affects the adaptation ability of companies in TMC. Finally, the factor of “competition” reveals partial influence on the entrepreneurship.

Keywords: entrepreneurship, industrial cluster, industrial district, economies of agglomerations, Taiwan Machinery Cluster (TMC)

Procedia PDF Downloads 358
574 Maintaining User-Level Security in Short Message Service

Authors: T. Arudchelvam, W. W. E. N. Fernando

Abstract:

Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.

Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication

Procedia PDF Downloads 369
573 Streamlining .NET Data Access: Leveraging JSON for Data Operations in .NET

Authors: Tyler T. Procko, Steve Collins

Abstract:

New features in .NET (6 and above) permit streamlined access to information residing in JSON-capable relational databases, such as SQL Server (2016 and above). Traditional methods of data access now comparatively involve unnecessary steps which compromise system performance. This work posits that the established ORM (Object Relational Mapping) based methods of data access in applications and APIs result in common issues, e.g., object-relational impedance mismatch. Recent developments in C# and .NET Core combined with a framework of modern SQL Server coding conventions have allowed better technical solutions to the problem. As an amelioration, this work details the language features and coding conventions which enable this streamlined approach, resulting in an open-source .NET library implementation called Codeless Data Access (CODA). Canonical approaches rely on ad-hoc mapping code to perform type conversions between the client and back-end database; with CODA, no mapping code is needed, as JSON is freely mapped to SQL and vice versa. CODA streamlines API data access by improving on three aspects of immediate concern to web developers, database engineers and cybersecurity professionals: Simplicity, Speed and Security. Simplicity is engendered by cutting out the “middleman” steps, effectively making API data access a whitebox, whereas traditional methods are blackbox. Speed is improved because of the fewer translational steps taken, and security is improved as attack surfaces are minimized. An empirical evaluation of the speed of the CODA approach in comparison to ORM approaches ] is provided and demonstrates that the CODA approach is significantly faster. CODA presents substantial benefits for API developer workflows by simplifying data access, resulting in better speed and security and allowing developers to focus on productive development rather than being mired in data access code. Future considerations include a generalization of the CODA method and extension outside of the .NET ecosystem to other programming languages.

Keywords: API data access, database, JSON, .NET core, SQL server

Procedia PDF Downloads 42
572 Experiencing the Shattered: Managing Countertransference Experiences with Anorexia Patients in Psychotherapy

Authors: M. Card

Abstract:

Working with anorexia patients can be a challenging experience for mental and health care professionals. The reasons for not wanting to work with this patient population stems from the numerous concerns surrounding the patient’s health – physically and mentally. Many health care professionals reported having strong negative feelings, such as; anger, hopelessness and helplessness when working with anorexia patients. These feelings often impaired their judgement to treatment and affected how they related to the patient. This research focused on psychotherapists who preferred to work with anorexia patients; what countertransference feelings were evoked in them during sessions with patients and most importantly, how they managed the feelings. The research used interpretative phenomenological analysis (IPA) as the theoretical framework and data analysis method. Semi-structured interviews were used with ten experienced psychotherapists to obtain their countertransference experiences with anorexia patients and how they manage it. There were three main themes discovered; (1) the use of supervision, (2) their own personal therapy and finally (3) experience and evolution. The research unearthed that experienced psychotherapists also experienced strong countertransference feelings towards their patients; some positive and some negative. However, these feelings could actually be interpreted as co-transference with their anorexia patients. The psychotherapists were able to own their part in the evocative unconscious nature of a relational therapeutic space, where their personal issues may be entangled in their anorexia patient’s symptomatology.

Keywords: anorexia nervosa, countertransference, co-transference, psychotherapy, relational psychotherapy

Procedia PDF Downloads 127
571 Loving is Universal, Dating is not: Dating Experiences of International Students in Vancouver

Authors: Nel Jayson Santos

Abstract:

The growing number of international students in post-secondary institutions in Canada has positively contributed to the country’s economy and educational systems while also enriching cultural diversity in the classrooms. However, international students face social and relational challenges as they try to adapt to their host nation’s culture. One specific area of cultural adaptation among international students that has yet to be studied extensively is dating experiences and romantic relationships. Although numerous studies have been done regarding the relational challenges and dating experiences of American international students, only a few studies have focused on international students based in Canada. Hence, this study examines the dating preferences, dating challenges, and dating adaptations of international students based in Vancouver, Canada. Using a social constructivist approach, a semi-structured interview was conducted among fifteen heterosexual international college students. Inductive thematic analysis was then used to analyze the gathered data and identify common themes. Findings suggest that students’ (1) preferences were influenced by racial background and parental approval of dating partners; (2) students experienced language barriers and cultural differences; (3) students adapted through constant communication and being open-minded. Finally, the analysis intends to help counselors and psychologists in various colleges to help understand the issues of international students in terms of intimate and romantic relationships.

Keywords: higher education, international students, dating experiences, cultural adaptation

Procedia PDF Downloads 178
570 Mobile Communication Technologies, Romantic Attachment and Relationship Quality: An Exploration of Partner Attunement

Authors: Jodie Bradnam, Mark Edwards, Bruce Watt

Abstract:

Mobile technologies have emerged as tools to create and sustain social and romantic relationships. The integration of technologies in close relationships has been of particular research interest with findings supporting the positive role of mobile phones in nurturing feelings of closeness and connection. More recently, the use of text messaging to manage conflict has become a focus of research attention. Four hundred and eleven adults in committed romantic relationships completed a series of questionnaires measuring attachment orientation, relationship quality, texting frequencies, attitudes, and response expectations. Attachment orientation, relationship length, texting for connection and disconnection were significant predictors of relationship quality, specifically relationship intimacy. Text frequency varied as a function of attachment orientation, with high attachment anxiety associated with high texting frequencies and with low relationship quality. Sending text messages of love and support was related to higher intimacy and relationship satisfaction scores, while sending critical or impersonal texts was associated with significantly lower intimacy and relationship satisfaction scores. The use of texting to manage relational conflict was a stronger negative predictor of relationship satisfaction than was the use of texting to express love and affection. Consistent with research on face-to-face communication in couples, the expression of negative sentiments via text were related to lower relationship quality, and these negative sentiments had a stronger and more enduring impact on relationship quality than did the expression of positive sentiments. Attachment orientation, relationship length and relationship status emerged as variables of interest in understanding the use of mobile technologies in romantic relationships.

Keywords: attachment, destructive conflict, intimacy, mobile communication, relationship quality, relationship satisfaction, texting

Procedia PDF Downloads 356
569 A Generic Middleware to Instantly Sync Intensive Writes of Heterogeneous Massive Data via Internet

Authors: Haitao Yang, Zhenjiang Ruan, Fei Xu, Lanting Xia

Abstract:

Industry data centers often need to sync data changes reliably and instantly from a large-scale of heterogeneous autonomous relational databases accessed via the not-so-reliable Internet, for which a practical universal sync middle of low maintenance and operation costs is most wanted, but developing such a product and adapting it for various scenarios are a very sophisticated and continuous practice. The authors have been devising, applying, and optimizing a generic sync middleware system, named GSMS since 2006, holding the principles or advantages that the middleware must be SyncML-compliant and transparent to data application layer logic, need not refer to implementation details of databases synced, does not rely on host computer operating systems deployed, and its construction is light weighted and hence, of low cost. A series of ultimate experiments with GSMS sync performance were conducted for a persuasive example of a source relational database that underwent a broad range of write loads, say, from one thousand to one million intensive writes within a few minutes. The tests proved that GSMS has achieved an instant sync level of well below a fraction of millisecond per record sync, and GSMS’ smooth performances under ultimate write loads also showed it is feasible and competent.

Keywords: heterogeneous massive data, instantly sync intensive writes, Internet generic middleware design, optimization

Procedia PDF Downloads 96
568 Packet Fragmentation Caused by Encryption and Using It as a Security Method

Authors: Said Rabah Azzam, Andrew Graham

Abstract:

Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch.

Keywords: fragmentation, encryption, security, switch

Procedia PDF Downloads 299
567 The Ultimate Challenge of Teaching Nursing

Authors: Crin N. Marcean, Mihaela A. Alexandru, Eugenia S. Cristescu

Abstract:

By definition, nursing means caring. It is a profession within the health care sector focused on the care of individuals, families, and communities so they may attain, maintain or recover optimal health and quality of life. However, there is a subtle difference between the two: nursing is widely considered as an art and a science, wherein caring forms the theoretical framework of nursing. Nursing and caring are grounded in a relational understanding, unity, and connection between the professional nurse and the patient. Task-oriented approaches challenge nurses in keeping care in nursing. This challenge is on-going as professional nurses strive to maintain the concept, art, and act of caring as the moral centre of the nursing profession. Keeping the care in nursing involves the application of art and science through theoretical concepts, scientific research, conscious commitment to the art of caring as an identity of nursing, and purposeful efforts to include caring behaviours during each nurse-patient interaction. The competencies, abilities, as well as the psycho-motor, cognitive, and relational skills necessary for the nursing practice are conveyed and improved by the nursing teachers’ art of teaching. They must select and use the teaching methods which shape the personalities of the trainers or students, enabling them to provide individualized, personalized care in real-world context of health problems. They have the ultimate responsibility of shaping the future health care system by educating skilful nurses.

Keywords: art of nursing, health care, teacher-student relationship, teaching innovations

Procedia PDF Downloads 472
566 Agile Methodology for Modeling and Design of Data Warehouses -AM4DW-

Authors: Nieto Bernal Wilson, Carmona Suarez Edgar

Abstract:

The organizations have structured and unstructured information in different formats, sources, and systems. Part of these come from ERP under OLTP processing that support the information system, however these organizations in OLAP processing level, presented some deficiencies, part of this problematic lies in that does not exist interesting into extract knowledge from their data sources, as also the absence of operational capabilities to tackle with these kind of projects.  Data Warehouse and its applications are considered as non-proprietary tools, which are of great interest to business intelligence, since they are repositories basis for creating models or patterns (behavior of customers, suppliers, products, social networks and genomics) and facilitate corporate decision making and research. The following paper present a structured methodology, simple, inspired from the agile development models as Scrum, XP and AUP. Also the models object relational, spatial data models, and the base line of data modeling under UML and Big data, from this way sought to deliver an agile methodology for the developing of data warehouses, simple and of easy application. The methodology naturally take into account the application of process for the respectively information analysis, visualization and data mining, particularly for patterns generation and derived models from the objects facts structured.

Keywords: data warehouse, model data, big data, object fact, object relational fact, process developed data warehouse

Procedia PDF Downloads 381
565 Communication About Health and Fitness in Media and Its Hidden Message About Objectification

Authors: Emiko Suzuki

Abstract:

Although fitness is defined as the body’s ability to respond to the demand of physical activity without undue fatigue in health science, in media oftentimes physical activity is presented as means to an attractive body rather than a fit and healthy one. Of all types of media, Instagram is becoming an increasingly persuasive source of information and advice on health and fitness, where individuals conceptualize what health and fitness mean for them. However, this user-generated and unregulated platform can be problematic, as it can communicate misleading information about health and fitness and possibly leading individuals to psychological problems such as eating disorders. In fact, previous research has shown that some messages that were posted with a tag that related to inspire others to do fitness, in fact, encouraged distancing the self from the internal needs of the body. For this reason, this present study aims to explore how health and fitness are communicated on Instagram by analyzing images and texts. A content analysis of images that were labeled with particular hashtags was performed, followed by a thematic analysis of texts from the same set of images. The result shows an interesting insight about messages about how health and fitness are communicated from companies through media, then digested and further shared among communities on Instagram. The study explores how the use of visual focused way of communicating health and fitness can lead to the dehumanization of human bodies.

Keywords: Instagram, fitness, dehumanization, body image, embodiment

Procedia PDF Downloads 112
564 Analysis of Newspaper Advertisements of 2015 Presidential Election in Nigeria

Authors: Thanny Noeem Taiwo

Abstract:

The study is an attempt to gauge the way political parties advertised their candidates and parties during the 2015 presidential election. It examined the prominence given to political advertisement by newspapers and their patrons. It also looked at the campaign issues that the candidates emphasized in their campaign and also the appeals used in the advertisements. This research work is examined against the backdrop of the Framing Theory. The agenda setting and framing effects theories are media effects theories that explain how the media affects the people, events and situations in the society. Samples comprising of three daily newspapers were selected to represent the newspapers in the Nigeria. The Punch Newspaper, the Nation and the Vanguard will be used for population of this study. These newspapers were chosen because they are widely read national dailies and also because of its affiliation with some political parties. The study revealed that low prominence was given to political messages because most of the advertisements were in the inside pages of the newspapers. The media or the print medium could be a partner in a political setting as the fourth estate of the realm. While the press was trying hard to be professional, its operations were considerably inhibited by the political adventures of the patrons of the media. There is the need for strict professionalism to the ethics of journalism in the commercialization of political messages that would eventually rub off positively on the way the media is perceived.

Keywords: aAdvertisement, election, framing, newspaper

Procedia PDF Downloads 291
563 Training AI to Be Empathetic and Determining the Psychotype of a Person During a Conversation with a Chatbot

Authors: Aliya Grig, Konstantin Sokolov, Igor Shatalin

Abstract:

The report describes the methodology for collecting data and building an ML model for determining the personality psychotype using profiling and personality traits methods based on several short messages of a user communicating on an arbitrary topic with a chitchat bot. In the course of the experiments, the minimum amount of text was revealed to confidently determine aspects of personality. Model accuracy - 85%. Users' language of communication is English. AI for a personalized communication with a user based on his mood, personality, and current emotional state. Features investigated during the research: personalized communication; providing empathy; adaptation to a user; predictive analytics. In the report, we describe the processes that captures both structured and unstructured data pertaining to a user in large quantities and diverse forms. This data is then effectively processed through ML tools to construct a knowledge graph and draw inferences regarding users of text messages in a comprehensive manner. Specifically, the system analyzes users' behavioral patterns and predicts future scenarios based on this analysis. As a result of the experiments, we provide for further research on training AI models to be empathetic, creating personalized communication for a user

Keywords: AI, empathetic, chatbot, AI models

Procedia PDF Downloads 60
562 Effecting the Unaffected Through the Effervescent Disk Theory, a Different Perspective of Media Effective Theories

Authors: Tarik Elaujali

Abstract:

This study examines a new media effective theory was developed by the author, it is called ‘The Effervescent Disk Theory’ (EDT). The theory main goal is to affect the unaffected audience who are either not exposing to a particular message or do not show interest in it. EDT suggest melting down messages that means to be affected within the media materials which are selected willingly by the audience themselves. A certain set of procedures to test EDT hypotheses were taken and illustrated in this study. A sample of 342 respondents (males & females) was collected from Tripoli University in Libya during the academic year 2013-2014. The designated sample is representing students who were failing to pass the English module for beginners’. This study aims to change the students’ negative notion about the importance of learning English, and to put their new idea into action. The theory seeks to affect audience cognition, emotions, and behaviors. EDT was applied in the present study alongside the media dependency theory. EDT hypotheses were confirmed, study results denoted that 73.6 percentage of the students responded positively and passed their English exam for beginners after being exposed selectively to their favorite TV program that contains a dissolved messages about the importance and vitality of learning English language.

Keywords: effervescent disk theory, selective exposure, media dependency, Libyan students

Procedia PDF Downloads 219
561 Communicating Meaning through Translanguaging: The Case of Multilingual Interactions of Algerians on Facebook

Authors: F. Abdelhamid

Abstract:

Algeria is a multilingual speech community where individuals constantly mix between codes in spoken discourse. Code is used as a cover term to refer to the existing languages and language varieties which include, among others, the mother tongue of the majority Algerian Arabic, the official language Modern Standard Arabic and the foreign languages French and English. The present study explores whether Algerians mix between these codes in online communication as well. Facebook is the selected platform from which data is collected because it is the preferred social media site for most Algerians and it is the most used one. Adopting the notion of translanguaging, this study attempts explaining how users of Facebook use multilingual messages to communicate meaning. Accordingly, multilingual interactions are not approached from a pejorative perspective but rather as a creative linguistic behavior that multilingual utilize to achieve intended meanings. The study is intended as a contribution to the research on multilingualism online because although an extensive literature has investigated multilingualism in spoken discourse, limited research investigated it in the online one. Its aim is two-fold. First, it aims at ensuring that the selected platform for analysis, namely Facebook, could be a source for multilingual data to enable the qualitative analysis. This is done by measuring frequency rates of multilingual instances. Second, when enough multilingual instances are encountered, it aims at describing and interpreting some selected ones. 120 posts and 16335 comments were collected from two Facebook pages. Analysis revealed that third of the collected data are multilingual messages. Users of Facebook mixed between the four mentioned codes in writing their messages. The most frequent cases are mixing between Algerian Arabic and French and between Algerian Arabic and Modern Standard Arabic. A focused qualitative analysis followed where some examples are interpreted and explained. It seems that Algerians mix between codes when communicating online despite the fact that it is a conscious type of communication. This suggests that such behavior is not a random and corrupted way of communicating but rather an intentional and natural one.

Keywords: Algerian speech community, computer mediated communication, languages in contact, multilingualism, translanguaging

Procedia PDF Downloads 102
560 Ideological Stance in Political Discourse: A Transitivity Analysis of Nawaz Sharif's Address at 71st UN Assembly

Authors: A. Nawaz

Abstract:

The present study uses Halliday’s transitivity model to analyze and interpret ideological stance in PM Nawaz Sharif’s political discourse. His famous speech at the 71st UN assembly was analyzed qualitatively using clausal analysis approach to investigate the communicative functions of the linguistic choices made in the address. The study discovers that among the six process types under the transitivity model, material, relational and mental processes appear most frequently in the speech, making up almost 86% of the whole. Verbal processes rank 4th, whereas existential and behavioral are the least occurring processes covering only 2 and 1 percent respectively. The dominant use of material processes suggests that Nawaz Sharif and his government are the main actors working on several concrete projects to produce a sense of developmental progression and continuity. Using relational and mental processes the PM, along with establishing proximity with masses and especially Kashmiri, gives guarantees and promises. The linguistic analysis concludes Kashmir dispute as being the central theme of the address, since it covers more than half of the discourse. The address calls for a strong action instead of formal assurances and wishful thoughts. The study establishes that language structures can yield certain connotations and ideologies which are not overt for readers. This is in affirmation to the supposition that language form performs a communicative function and is not merely fortuitous.

Keywords: Hallidian perspective on language, implicit meanings, Nawaz Sharif, political ideologies, political speeches, transitivity, UN Assembly

Procedia PDF Downloads 183
559 Entrepreneurship and Innovation: The Essence of Sustainable, Smart and Inclusive Economies

Authors: Isabel Martins, Orlando Pereira, Ana Martins

Abstract:

This study aims to highlight that, in changing environments, organisations need to adapt their behaviours to the demands of the new economic reality. The main purpose of this study focuses on the relationship between entrepreneurship, innovation with learning as the mediating factor. It is within this entrepreneurial spirit that literature reveals a concern with the current economic perspective towards knowledge and considers it as both the production factor par excellence and a source of entrepreneurial capacity and innovation. Entrepreneurship is a mind-set focused on identifying opportunities of economic value and translates these into the pursuit of business opportunities through innovation. It connects art and science and is a way of life, as opposed to a simple mode of business creation and profiteering. This perspective underlines the need to develop the global individual for the globalised world, the strategic key to economic and social development. The objective of this study is to explore the notion that relational capital which is established between the entrepreneur and all the other economic role players both inside and outside the organization, is indeed determinant in developing the entrepreneurial capacity. However, this depends on the organizational culture of innovation. In this context, entrepreneurship is an ‘entrepreneurial capital’ inherent in the organization that is not limited to skills needed for work. This study is a critique of extant literature review which will be also be supported by primary data collection gathered to study graduates’ perceptions towards their entrepreneurial capital. Limitations are centered on both the design and of the sample of this study. This study is of added value for both scholars and organisations in the current innovation economy.

Keywords: entrepreneurship, innovation, learning, relational capital

Procedia PDF Downloads 196
558 The Analysis of the Effect of Brand Image on Creating Brand Loyalty with the Structural Equation Model: A Research Study on the Sports Equipment Brand Users

Authors: Murat Erdoğdu, Murat Koçyiğit

Abstract:

Brand image and brand loyalty are among the most important relational marketing elements for brand owners to be able to set up long – term relationships with their customers and to maintain these relationships. Brand owners improve their brand images with the positive perceptions remaining in the consumers’ minds. In addition, they try to find the customers that are both emotionally and behaviourally faithful to themselves in order to set up long – term relationships. Therefore, the aim of this study is to analyse the effects of the brand image that has a very important role among relational marketing elements on the brand loyalty in terms of the variables such as the perceived value, the trust in brand and the brand satisfaction. In this context, a conceptual model was created to determine the effect of the brand image on the brand loyalty thanks to the Structural Equation Model (SEM). According to this aim and this model, the study was carried out in the scope of the data collected through the questionnaires in Konya with the method of convenience sampling. The results of the research showed that the brand image has positive significant effects on the perceived value and the trust in brand and that the trust in brand has positive significant effects on the brand satisfaction, and that the brand satisfaction has positive significant effects on the brand loyalty. Thus, the hypotheses that the brand image has direct effects on the perceived value and the trust in brand and that the trust in brand has direct effects on the brand satisfaction and that the brand satisfaction has direct effects on the brand loyalty were supported. In addition, the findings about whether the perceived value has a significant effect on the brand satisfaction were also acquired.

Keywords: brand image, brand loyalty, perceived value, satisfaction, trust

Procedia PDF Downloads 415
557 Implementing Online Applications to Allow Marketing Personnel to Share Their Experiences

Authors: Ishak Kamal Baskhayroun

Abstract:

This study examines consumer attitudes toward mobile marketing, especially toward SMS marketing. Unlike similar studies, this study does not focus on the young, but includes consumers who are in the 18-70 age range to the field research. According to the results, it has been concluded that most participants think SMS marketing is disturbing. Most important problems with SMS marketing are about getting subscribed to message lists without the permission of the receiver; the high number of messages sent; and the irrelevancy of the message content. The emergence of sponsorship as a new marketing communication tool and a source of competitive advantage in the marketplace has changed the entire marketing communication process. Sponsorship has overtaken other marketing communication tools in terms of growth and expenditure. This paper seeks to evaluate the role of sponsorship in marketing communication tools. The study recommends that proper measures be taken before the company embarks into sponsorship programs. This is necessary because investment in sponsorship does not always guarantee sustainable competitive advantage in the marketplace.Mobile phones are one of the direct marketing tools that can be used to reach today’s hard to reach consumers. Mobile phones are very personal devices and they are always carried with the consumer, where ever they go. This creates an opportunity for marketers to create personalized marketing communications messages and send them on the right time and place.

Keywords: employee organizational performance, internal marketing, internal customer, direct marketing, mobile phones mobile marketing, sms advertising, marketing sponsorship, marketing communication theories, marketing communication tools corporate responsibility

Procedia PDF Downloads 18