Search results for: secondary users
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5406

Search results for: secondary users

5256 Is There a Group of "Digital Natives" at Secondary Schools?

Authors: L. Janská, J. Kubrický

Abstract:

The article describes a research focused on the influence of the information and communication technology (ICT) on the pupils' learning. The investigation deals with the influences that distinguish between the group of pupils influenced by ICT and the group of pupils not influenced by ICT. The group influenced by ICT should evince a different approach in number of areas (in managing of two and more activities at once, in a quick orientation and searching for information on the Internet, in an ability to quickly and effectively assess the data sources, in the assessment of attitudes and opinions of the other users of the network, in critical thinking, in the preference to work in teams, in the sharing of information and personal data via the virtual social networking, in insisting on the immediate reaction on their every action etc.).

Keywords: ICT influence, digital natives, pupil´s learning

Procedia PDF Downloads 264
5255 A New Protocol Ensuring Users' Privacy in Pervasive Environment

Authors: Mohammed Nadir Djedid, Abdallah Chouarfia

Abstract:

Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.

Keywords: pervasive systems, identification, authentication, privacy

Procedia PDF Downloads 446
5254 Influence of Information Technology on Financial Management Practices in Secondary School: For National Transormation in Zone C Senatorional District of Benue State

Authors: Eru Ihie Joel

Abstract:

This study was carried out to investigate the influence of information technology on financial management practice in secondary schools for transformation. In Zone C Senatorial District of Benue state. The study answered four research questions and tested four hypotheses. Related literature was reviewed to show the gap to be filled in the study. The population was 196 respondents made up of principals and finance clerks of secondary schools. The descriptive survey was adopted for the study. A structured 20 item questionnaire (IITFMPSQ) was constructed and used to collect date for the study. Data obtained were analyzed using descriptive and inferential statistic. Mean and standard deviation were used to analyze the research question while the chi- square (x2) test of goodness of fit was used to test the hypothesis. The major findings revealed that the use of computer system significantly influences budgeting in secondary schools in zone senatorial district of Benue State for transformation. It was also established that the use of internet facilities influences the funding of secondary schools for transformation in the zone. Based on the findings of the study, it was recommended among other things that administrators and teachers in schools should be trained to make effective use of the computer in budgeting so as to facilitate delegations, control, evaluation, accountability for transformation. It was further suggested that the study be replicated on the effective use of information communication teaching (ITC) in teaching and learning in secondary school for transformation.

Keywords: influence, finance, management, technology

Procedia PDF Downloads 321
5253 The Design of Smart Tactile Textiles for Therapeutic Applications

Authors: Karen Hong

Abstract:

Smart tactile textiles are a series of textile-based products that incorporates smart embedded technology to be utilized as tactile therapeutic applications for 2 main groups of target users. The first group of users will be children with sensory processing disorder who are suffering from tactile sensory dysfunction. Children with tactile sensory issues may have difficulty tolerating the sensations generated from the touch of certain textures on the fabrics. A series of smart tactile textiles, collectively known as ‘Tactile Toys’ are developed as tactile therapy play objects, exposing children to different types of touch sensations within textiles, enabling them to enjoy tactile experiences together with interactive play which will help them to overcome fear of certain touch sensations. The second group of users will be the elderly or geriatric patients who are suffering from deteriorating sense of touch. One of the common consequences of aging is suffering from deteriorating sense of touch and a decline in motoric function. With the focus in stimulating the sense of touch for this particular group of end users, another series of smart tactile textiles, collectively known as ‘Tactile Aids’ are developed also as tactile therapy. This range of products can help to maintain touch sensitivity and at the same time allowing the elderly to enjoy interactive play to practice their hand-eye coordination and enhancing their motor skills. These smart tactile textile products are being designed and tested out by the end users and have proofed their efficacy as tactile therapy enabling the users to lead a better quality of life.

Keywords: smart textiles, embedded technology, tactile therapy, tactile aids, tactile toys

Procedia PDF Downloads 151
5252 Analyzing Behaviour of the Utilization of the Online News Clipping Database: Experience in Suan Sunandha Rajabhat University

Authors: Siriporn Poolsuwan, Kanyarat Bussaban

Abstract:

This research aims to investigate and analyze user’s behaviour towards the utilization of the online news clipping database at Suan Sunandha Rajabhat University, Thailand. Data is gathered from 214 lecturers and 380 undergraduate students by using questionnaires. Findings show that most users knew the online news clipping service from their friends, library’s website and their teachers. The users learned how to use it by themselves and others learned by training of SSRU library. Most users used the online news clipping database one time per month at home and always used the service for general knowledge, up-to-date academic knowledge and assignment reference. Moreover, the results of using the online news clipping service problems include the users themselves, service management, service device- computer and tools – and the network, service provider, and publicity. This research would be benefit for librarians and teachers for planning and designing library services in their works and organization.

Keywords: online database, user behavior, news clipping, library services

Procedia PDF Downloads 284
5251 Travel Behavior Simulation of Bike-Sharing System Users in Kaoshiung City

Authors: Hong-Yi Lin, Feng-Tyan Lin

Abstract:

In a Bike-sharing system (BSS), users can easily rent bikes from any station in the city for mid-range or short-range trips. BSS can also be integrated with other types of transport system, especially Green Transportation system, such as rail transport, bus etc. Since BSS records time and place of each pickup and return, the operational data can reflect more authentic and dynamic state of user behaviors. Furthermore, land uses around docking stations are highly associated with origins and destinations for the BSS users. As urban researchers, what concerns us more is to take BSS into consideration during the urban planning process and enhance the quality of urban life. This research focuses on the simulation of travel behavior of BSS users in Kaohsiung. First, rules of users’ behavior were derived by analyzing operational data and land use patterns nearby docking stations. Then, integrating with Monte Carlo method, these rules were embedded into a travel behavior simulation model, which was implemented by NetLogo, an agent-based modeling tool. The simulation model allows us to foresee the rent-return behaviour of BSS in order to choose potential locations of the docking stations. Also, it can provide insights and recommendations about planning and policies for the future BSS.

Keywords: agent-based model, bike-sharing system, BSS operational data, simulation

Procedia PDF Downloads 281
5250 Towards a Conscious Design in AI by Overcoming Dark Patterns

Authors: Ayse Arslan

Abstract:

One of the important elements underpinning a conscious design is the degree of toxicity in communication. This study explores the mechanisms and strategies for identifying toxic content by avoiding dark patterns. Given the breadth of hate and harassment attacks, this study explores a threat model and taxonomy to assist in reasoning about strategies for detection, prevention, mitigation, and recovery. In addition to identifying some relevant techniques such as nudges, automatic detection, or human-ranking, the study suggests the use of major metrics such as the overhead and friction of solutions on platforms and users or balancing false positives (e.g., incorrectly penalizing legitimate users) against false negatives (e.g., users exposed to hate and harassment) to maintain a conscious design towards fairness.

Keywords: AI, ML, algorithms, policy, system design

Procedia PDF Downloads 95
5249 Consolidated Predictive Model of the Natural History of Breast Cancer Considering Primary Tumor and Secondary Distant Metastases Growth

Authors: Ella Tyuryumina, Alexey Neznanov

Abstract:

This study is an attempt to obtain reliable data on the natural history of breast cancer growth. We analyze the opportunities for using classical mathematical models (exponential and logistic tumor growth models, Gompertz and von Bertalanffy tumor growth models) to try to describe growth of the primary tumor and the secondary distant metastases of human breast cancer. The research aim is to improve predicting accuracy of breast cancer progression using an original mathematical model referred to CoMPaS and corresponding software. We are interested in: 1) modelling the whole natural history of the primary tumor and the secondary distant metastases; 2) developing adequate and precise CoMPaS which reflects relations between the primary tumor and the secondary distant metastases; 3) analyzing the CoMPaS scope of application; 4) implementing the model as a software tool. The foundation of the CoMPaS is the exponential tumor growth model, which is described by determinate nonlinear and linear equations. The CoMPaS corresponds to TNM classification. It allows to calculate different growth periods of the primary tumor and the secondary distant metastases: 1) ‘non-visible period’ for the primary tumor; 2) ‘non-visible period’ for the secondary distant metastases; 3) ‘visible period’ for the secondary distant metastases. The CoMPaS is validated on clinical data of 10-years and 15-years survival depending on the tumor stage and diameter of the primary tumor. The new predictive tool: 1) is a solid foundation to develop future studies of breast cancer growth models; 2) does not require any expensive diagnostic tests; 3) is the first predictor which makes forecast using only current patient data, the others are based on the additional statistical data. The CoMPaS model and predictive software: a) fit to clinical trials data; b) detect different growth periods of the primary tumor and the secondary distant metastases; c) make forecast of the period of the secondary distant metastases appearance; d) have higher average prediction accuracy than the other tools; e) can improve forecasts on survival of breast cancer and facilitate optimization of diagnostic tests. The following are calculated by CoMPaS: the number of doublings for ‘non-visible’ and ‘visible’ growth period of the secondary distant metastases; tumor volume doubling time (days) for ‘non-visible’ and ‘visible’ growth period of the secondary distant metastases. The CoMPaS enables, for the first time, to predict ‘whole natural history’ of the primary tumor and the secondary distant metastases growth on each stage (pT1, pT2, pT3, pT4) relying only on the primary tumor sizes. Summarizing: a) CoMPaS describes correctly the primary tumor growth of IA, IIA, IIB, IIIB (T1-4N0M0) stages without metastases in lymph nodes (N0); b) facilitates the understanding of the appearance period and inception of the secondary distant metastases.

Keywords: breast cancer, exponential growth model, mathematical model, metastases in lymph nodes, primary tumor, survival

Procedia PDF Downloads 322
5248 A Study of Mental Health of Higher Secondary School Going Children in Rural Area

Authors: Tanmay L. Joshi

Abstract:

The Mental health allows children and young people to develop the resilience to cope with whatever life throws at them and grow into well-rounded, healthy adults. In urban area, many health professionals are working for the well being for younger population. There is so much of potential in rural area. However, the rural population is somehow neglected. Apart from lack of availability of basic needs like transport, electricity, telecommunication etc; the Psychological health is also overlooked in such area. There are no mental health professionals like Psychologists, counselors etc. So the researcher tries to throw some light on the mental health of Higher Secondary School going children in rural area. The current research tries to study the Mental Health (Confidence, Sociability and Neurotic Tendency) of Higher Secondary School going children. Researchers have used the tool Vyaktitva Shodhika (a personality inventory) by Dr. U. Khire (JPIP,Pune). The Sample size is 45 (N= 40, 24 boys/21 girls). The present study may provide a good support to inculcate emotional-management programs for higher secondary school going children in rural areas.

Keywords: mental health, neurotic tendency, rural area, school going children

Procedia PDF Downloads 561
5247 Experiences of Trainee Teachers: A Survey on Expectations and Realities in Special Secondary Schools in Kenya

Authors: Mary Cheptanui Sambu

Abstract:

Teaching practice is an integral component of students who are training to be teachers, as it provides them with an opportunity to gain experience in an actual teaching and learning environment. This study explored the experiences of trainee teachers from a local university in Kenya, undergoing a three-month teaching practice in Special Secondary schools in the country. The main aim of the study was to understand the trainees’ experiences, their expectations, and the realities encountered during the teaching practice period. The study focused on special secondary schools for learners with hearing impairment. A descriptive survey design was employed and a sample size of forty-four respondents from special secondary schools for learners with hearing impairment was purposively selected. A questionnaire was administered to the respondents and the data obtained analysed using the Statistical Package for the Social Sciences (SPSS). Preliminary analysis shows that challenges facing special secondary schools include inadequate teaching and learning facilities and resources, low academic performance among learners with hearing impairment, an overloaded curriculum and inadequate number of teachers for the learners. The study findings suggest that the Kenyan government should invest more in the education of special needs children, particularly focusing on increasing the number of trained teachers. In addition, the education curriculum offered in special secondary schools should be tailored towards the needs and interest of learners. These research findings will be useful to policymakers and curriculum developers, and will provide information that can be used to enhance the education of learners with hearing impairment; this will lead to improved academic performance, consequently resulting in better transitions and the realization of Vision 2030.

Keywords: hearing impairment, special secondary schools, trainee, teaching practice

Procedia PDF Downloads 137
5246 Engine with Dual Helical Crankshaft System Operating at an Overdrive Gear Ratio

Authors: Anierudh Vishwanathan

Abstract:

This paper suggests a new design of the crankshaft system that would help to use a low revving engine for applications requiring the use of a high revving engine operating at the same power by converting the extra or unnecessary torque obtained from a low revving engine into angular velocity of the crankshaft of the engine hence, improve the fuel economy of the vehicle because of the fact that low revving engines run more effectively on lean air fuel mixtures accompanied with less wear and tear of the engine due to lesser rubbing of the piston rings with the cylinder walls. If the crankshaft with the proposed design is used in a low revving engine, then it will give the same torque and speed as that given by a high revving engine operating at the same power but the new engine will give better fuel economy. Hence the new engine will give the benefits of a low revving engine as well as a high revving engine. The proposed crankshaft design will be achieved by changing the design of the crankweb in such a way that it functions both as a counterweight as well as a helical gear that can transfer power to the secondary gear shaft which will be incorporated in the crankshaft system. The crankshaft and the secondary gear shaft will be operating at an overdrive ratio. The crankshaft will now be a two shaft system instead of a single shaft system. The newly designed crankshaft will be mounted on the bearings instead of being connected to the flywheel of the engine. This newly designed crankshaft will transmit power to the secondary shaft which will rotate the flywheel and then the rotary motion will be transmitted to the transmission system as usual. In this design, the concept of power transmission will be incorporated in the crankshaft system. In the paper, the crankshaft and the secondary shafts have been designed in such a way that at any instant of time only half the number of crankwebs will be meshed with the secondary shaft. For example, during one revolution of the crankshaft, if for the first half of revolution; first, second, seventh and eighth crankwebs are meshing with the secondary shaft then for the next half revolution, third, fourth, fifth and sixth crankwebs will mesh with the secondary shaft. This paper also analyses the proposed crankshaft design for safety against fatigue failure. Finite element analysis of the crankshaft has been done and the resultant stresses have been calculated.

Keywords: low revving, high revving, secondary shaft, partial meshing

Procedia PDF Downloads 247
5245 Generalization of Blom Key Predistribution Scheme

Authors: Abbas Cheraghi

Abstract:

A key predistribution scheme provides one method to distribute secret ahead of time. Blom’s scheme is a symmetric threshold key exchange protocol in cryptography. The scheme was proposed by the Swedish cryptographer Rolf Blom. In this kind of scheme, trusted authority gives each user a secret key and a public identifier, which enables any two users to create independently a shared key for communicating between each other. However, if an attacker can compromise the keys of at least Known numbers of users, he can break the scheme and reconstruct every shared key. In this paper generalized Blom’s Scheme by multivariate Lagrange interpolation formula. This scheme is a form of threshold secret sharing scheme. In this new scheme, the amount of information transmitted by the trusted authority is independent of the numbers of users. In addition, this scheme is unconditionally secure against any individual user.

Keywords: key predistribution, blom’s scheme, secret sharing, unconditional secure

Procedia PDF Downloads 391
5244 Whether Buffer Zone Community Forests’ Benefits Are Distributed Fairly to Low-Income Users: Reflection From the Buffer Zone Community Forests in Bardia National Park, Nepal

Authors: Keshav Raj Acharya, Thakur Silwal, Neelam C. Poudyal

Abstract:

Buffer zones, the peripheral areas around the national parks and wildlife reserves, are available for the purpose of benefitting the local inhabitants by providing forest products for subsistence needs of basic forest products outside the protected areas. The forest area within the buffer zone has been managed as a buffer zone community forest (BZCF) for the last 25 years after the approval of the buffer zone management regulation 1996. With a case study of select BZCF in Bardia National Park, this study aims to analyze whether the benefit provided by BZCF is equally available to poor users among other socioeconomic classes of the users. The findings are based on the analysis of cross-sectional data involving household surveys (n=305) and key informants’ interviews (n=10) as well as office records available at different 5 buffer zone community forest user groups offices. Results indicate that despite the provisions of subsidized rates for poor; poor households were more deprived due to higher forest products price particularly, the timber price in buffer zone. Evidence also indicate that due to the increased forest coverage, the incidence of wildlife damage has also increased and impacted the poor more due to lack of land ownership as well as limited alternatives. Clear community forest management guidelines with equitable benefit sharing and compensatory mechanisms to the users of poor socioeconomic class have been identified as a solution to increase the benefit to poor users in BZCFUGs.

Keywords: crop depredation, forest products, users, wellbeing ranking

Procedia PDF Downloads 19
5243 Privacy Label: An Alternative Approach to Present Privacy Policies from Online Services to the User

Authors: Diego Roberto Goncalves De Pontes, Sergio Donizetti Zorzo

Abstract:

Studies show that most users do not read privacy policies from the online services they use. Some authors claim that one of the main causes of this is that policies are long and usually hard to understand, which make users lose interest in reading them. In this scenario, users may agree with terms without knowing what kind of data is being collected and why. Given that, we aimed to develop a model that would present the privacy policies contents in an easy and graphical way for the user to understand. We call it the Privacy Label. Using information recovery techniques, we propose an architecture that is able to extract information about what kind of data is being collected and to what end in the policies and show it to the user in an automated way. To assess our model, we calculated the precision, recall and f-measure metrics on the information extracted by our technique. The results for each metric were 68.53%, 85.61% e 76,13%, respectively, making it possible for the final user to understand which data was being collected without reading the whole policy. Also, our proposal can facilitate the notice-and-choice by presenting privacy policy information in an alternative way for online users.

Keywords: privacy, policies, user behavior, computer human interaction

Procedia PDF Downloads 280
5242 Secondary Science Teachers' Views about Purposes of Practical Works in School Science

Authors: Kew-Cheol Shim, Sung-Hwan Moon, Ji-Hyon Kil, Kyoungho Kim

Abstract:

The purpose of this paper was to examine views of secondary school science teachers about purposes to use practical works in school science. The instrument to survey consisted eighteen items, which were categorized into four components as follows: ‘Scientific inquiry’, ‘Scientific knowledge’, ‘Science-related attitude’, and ‘STS (science-technology-society)’. Subjects were 152 secondary school science teachers (male 70 and female 82; middle school 50 and high school 102), who are teaching in 42 schools of 8 provinces. On the survey, science teachers were asked to answer on 5-point Lickert scale (from 1 to 5) how they thought of using practical works on purposes with domains of science objectives in school. They had positive views about using practical works for improving scientific inquiry process skills, science-related attitudes, and perceptions about STS literacy, and acquiring scientific knowledge. They would have the most willingness of using practical works for ‘Scientific Inquiry’ among domains of science objectives in school.

Keywords: secondary school, science teacher, practical work, scientific inquiry, scientific knowledge, scientific attitude, STS

Procedia PDF Downloads 451
5241 Integration of Technology in Business Education: Emerging Voices from Business Education Classrooms in Nigeria Secondary Schools

Authors: Clinton Chidiebere Anyanwu

Abstract:

Secondary education is a vital part of a virtuous circle of economic growth within the context of a globalised knowledge economy. The teaching of Business Education entails teaching learners the essentials, rudiments, assumptions, and methods of business. Hence, it was deemed necessary for the study to investigate technology integration in Business Education. Drawing from the theoretical frameworks of technological pedagogical content knowledge (TPACK), and unified theory of acceptance and use of technology (UTAUT), the study observes teachers’ level of technology use in Business Education classrooms. Using a mixed-methods sequential explanatory design, probability, and purposive sampling, the majority of participants were found to be not integrating technology to an acceptable level and a small percentage was. After an analysis of constructs from UTAUT, some of this could be attributed to the lack of facilitating conditions in the teaching and learning of Business Education. The implication of the study findings is that poor investment in technology integration in secondary schools in Nigeria affects pedagogical implementations and effective teaching and learning of Business Education subjects. The study concludes that if facilitating conditions and professional development are considered to address the shortfalls in terms of TPACK, technology integration will become a reality in secondary schools in Nigeria.

Keywords: business education, secondary education, technology integration, TPACK, UTAUT

Procedia PDF Downloads 179
5240 Error Probability of Multi-User Detection Techniques

Authors: Komal Babbar

Abstract:

Multiuser Detection is the intelligent estimation/demodulation of transmitted bits in the presence of Multiple Access Interference. The authors have presented the Bit-error rate (BER) achieved by linear multi-user detectors: Matched filter (which treats the MAI as AWGN), Decorrelating and MMSE. In this work, authors investigate the bit error probability analysis for Matched filter, decorrelating, and MMSE. This problem arises in several practical CDMA applications where the receiver may not have full knowledge of the number of active users and their signature sequences. In particular, the behavior of MAI at the output of the Multi-user detectors (MUD) is examined under various asymptotic conditions including large signal to noise ratio; large near-far ratios; and a large number of users. In the last section Authors also shows Matlab Simulation results for Multiuser detection techniques i.e., Matched filter, Decorrelating, MMSE for 2 users and 10 users.

Keywords: code division multiple access, decorrelating, matched filter, minimum mean square detection (MMSE) detection, multiple access interference (MAI), multiuser detection (MUD)

Procedia PDF Downloads 495
5239 Awareness of Child Rights as a Determinant of Effective Student Personnel Services in Public Secondary Schools in Southwestern Nigeria

Authors: Ademola Ibukunolu Atanda, Gbenga Nathaniel Adeola

Abstract:

The study examined awareness of child rights as a determinant of effective student personnel services in public secondary schools in Southwestern Nigeria. It was survey research. The sample comprised 433 teachers, 137 school administrators, and 968 students who were drawn by simple random sampling techniques. The respondents were given copies of questionnaires tagged “school administrator/teacher’s awareness of child’s rights and student personnel services elements inventory.” Key Informant Interview (KII) was also employed. The data were analysed using frequency count, percentages, weighted average, grand mean, standard deviation, and Pearson Product Moment Correlation, while KII was qualitatively analysed. The findings of the study revealed that public secondary school administrator awareness of child rights was at a moderate level, but the awareness of child rights was low among the teachers. The study equally revealed that student personnel services are moderately provided in public secondary schools in Southwestern Nigeria, but security remains a major challenge. It was also found that there was a significant relationship between awareness of child rights and effective student personnel services. It was therefore recommended, based on the findings, that attention should be given to heightening awareness of child rights among public secondary school administrators and teachers for effective student personnel services. Copies of the Child Right Act 2003 should also be made available in all public secondary schools in Southwestern Nigeria, as the study revealed that the documents were not available.

Keywords: student personnel, child right, administrator awareness, practice of child right

Procedia PDF Downloads 112
5238 'Light up for All': Building Knowledge on Universal Design through Direct User Contact in Design Workshops

Authors: E. Ielegems, J. Herssens, J. Vanrie

Abstract:

Designers require knowledge and data about a diversity of users throughout the design process to create inclusive design solutions which are usable, understandable and desirable by everyone. Besides understanding users’ needs and expectations, the ways in which users perceive and experience the built environment contain valuable knowledge for architects. Since users’ perceptions and experiences are mainly tacit by nature, they are much more difficult to express in words and therefore more difficult to externalise. Nevertheless, literature confirms the importance of articulating embodied knowledge from users throughout the design process. Hence, more insight is needed into the ways architects can build knowledge on Universal Design through direct user contact. In a project called ‘light up for all’ architecture students are asked to design a light switch and socket, elegant, usable and understandable to the greatest extent possible by everyone. Two workshops with user/experts are organised in the first stages of the design process in which students could gain insight into users’ experiences through direct contact. Three data collection techniques are used to analyse the teams’ design processes. First, students were asked to keep a design diary, reporting design activities, personal experiences, and thoughts about users throughout the design process. Second, one of the authors observed workshops taking field notes. Finally, focus groups are conducted with the design teams after the design process was finished. By means of analysing collected qualitative data, we first identify different design aspects that make the teams’ proposals more inclusive than standard design solutions. For this paper, we specifically focus on aspects that externalise embodied user knowledge from users’ experiences. Subsequently, we look at designers’ approaches to learn about these specific aspects throughout the design process. Results show that in some situations, designers perceive contradicting knowledge between observations and verbal conversations, which shows the value of direct user contact. Additionally, findings give indications on values and limitations of working with selected prototypes as ‘boundary objects’ when externalising users’ experiences. These insights may help researchers to better understand designers’ process of eliciting embodied user knowledge. This way, research can offer more effective support to architects, which may result in better incorporating users’ experiences so that the built environment gradually can become more inclusive for all.

Keywords: universal design, architecture, design process, embodied user knowledge

Procedia PDF Downloads 113
5237 Managing and Leading through African Philosophies at Secondary Schools in South Africa: A Case Study of King Cetshwayo District

Authors: Alan Bhekisisa Buthelezi

Abstract:

The aim of this paper is to explore African management and leadership philosophies at secondary schools in post-apartheid South Africa. The research was conducted in the King Cetshwayo district of KwaZulu-Natal province in South Africa. Apart from the literature on participative management, the paper reports on a research in which an empirical investigation based on a quantitative research paradigm was used to collect data from secondary school principals. The literature findings revealed that secondary school principals need to rethink their management and leadership philosophies in the twenty-first century. The findings of this research further reveal that ubuntu (humanness) and lekgotla (Sesotho term for “an African participatory approach to decision-making”) should be embedded in the art of school management and leadership in the South African context. The paper concludes with the submission that ongoing capacity-building workshops should be fast-tracked on matters pertaining to management and leadership.

Keywords: distributed leadership, team leadership, decentralization of power, transformational leadership

Procedia PDF Downloads 41
5236 A Proposed Plan for the Viral Marketing of Sporting Products and Services to Social Media Users in the Arab World

Authors: Ahmed F. Abdel Qader

Abstract:

Viral marketing has resulted in a lot of excitement recently as a novel technology in the field of marketing. The need of porting institutions to attract new customers for sporting products and services has increased, especially as many international and Arab clubs rely on them for most of their funding. These organizations, especially clubs, have outlets for selling their products and services; therefore, they are in need for new approaches that are related to modern communication and innovative distribution methods that can depend on the present audience in conveying e-ads to other users in light of the increase in social media users in the Arab world. This study aims at developing a marketing plan for sporting products and services through viral marketing of social media users. The researcher used the descriptive method. The sample consisted of 1991 social media users in 13 Arab countries. The questionnaire consisted of five themes and 42 items. Allan Dib 'one-page marketing plan' was used to develop the sporting products and services marketing plan. The study found that participants reported watching e-ads of sporting products and services that appeared during browsing social media pages; Facebook was the most used means for receiving ads about sporting products and services; sharing the product’s ad depends on the availability of incentives; purchasing sporting products and services takes place after a recommendation by a relative or a friend; and their evaluation of sporting products and services depends on the experiences of other people. The study recommends that the proposed plan should be used in marketing sporting products and services.

Keywords: viral marketing, sporting products, social media, Arab world

Procedia PDF Downloads 143
5235 Assessing Secondary School Curricula in the light of Developing Quality of Life Standards of High School Students

Authors: Othman Ali Alghtani, Yahya Abdul-Ekhalq Ali, Abdullah Abdul-Ekhalq Ali, Ahmed Al Sadiq Abdul Majeed, Najwa Attian Al-Mohammadi, Obead Mozel Alharbi, Sabri Mohamed Ismail, Omar Ibrahim Asiri

Abstract:

This study assessed the curricula of secondary schools given requirements to enhance the quality of life of students. The components of quality of life were described to build a list of standards and indicators. A questionnaire assessing the dimensions of mental (cognitive and emotional), physical, digital, and social health, and environmental awareness was prepared. A descriptive-analytical approach was used on a sample of 258 teachers and educational supervisors in Tabuk. The results indicated shortcomings in the secondary school curricula regarding developing standards and indicators of components of quality of life. Results also indicated that secondary school curricula incorporated few practices to improve student’s quality of life. No significant differences were found regarding the core subject, job, gender, and years of experience.

Keywords: assessing curricula, teacher practices, quality of life, teaching practices

Procedia PDF Downloads 222
5234 Practical Problems as Tools for the Development of Secondary School Students’ Motivation to Learn Mathematics

Authors: M. Rodionov, Z. Dedovets

Abstract:

This article discusses plausible reasoning use for solution to practical problems. Such reasoning is the major driver of motivation and implementation of mathematical, scientific and educational research activity. A general, practical problem solving algorithm is presented which includes an analysis of specific problem content to build, solve and interpret the underlying mathematical model. The author explores the role of practical problems such as the stimulation of students' interest, the development of their world outlook and their orientation in the modern world at the different stages of learning mathematics in secondary school. Particular attention is paid to the characteristics of those problems which were systematized and presented in the conclusions.

Keywords: mathematics, motivation, secondary school, student, practical problem

Procedia PDF Downloads 273
5233 Accessibility of Youth-Friendly Sexual and Reproductive Health Services to Secondary School Adolescents in Southern Cross River, Nigeria

Authors: Rosemary I. Eneji, Stephen Adi Odey, Edem Carole, Eucharia Nwagbara

Abstract:

Sexual and reproductive health behaviors are the main causes of death, disability, and disease among adolescents in Nigeria. In this study, we determined the accessibility of youth-friendly sexual and reproductive health services to secondary school adolescents in southern Cross River state, Nigeria. Nineteen randomly selected public secondary schools across the seven local government areas in the zone were used. The respondents were four hundred senior secondary (classes SSI - SS3) students aged 15-19 years, comprising 63.7% females and 36.3% males. A 50-item structured questionnaire was used for the study. There was a strong influence of age and sex of adolescents, income and occupation of parents, knowledge and awareness of adolescents, and tradition on the accessibility and use of youth-friendly sexual and reproductive health services (YFSRHS) to the adolescents. The attitude of health workers towards accessibility was of little effect. Overall, youth-friendly sexual and reproductive health services were not easily accessible to adolescents in the study area. Thus, there is need to enforce adolescent reproductive health policies in the area. Training and use of trained caregivers and peer educators to attend to adolescents and the inclusion of adolescent reproductive health as a subject in the curriculum are strongly recommended.

Keywords: youth, reproductive health, cross river state, secondary schools, Nigeria

Procedia PDF Downloads 30
5232 Second Representation of Modules over Commutative Rings

Authors: Jawad Abuhlail, Hamza Hroub

Abstract:

Let R be a commutative ring. Representation theory studies the representation of R-modules as (possibly finite) sums of special types of R-submodules. Here we are interested in a class of R-modules between the class of semisimple R-modules and the class of R-modules that can be written as (possibly finite) sums of secondary R-submodules (we know that every simple R-submodule is secondary). We investigate R-modules which can be written as (possibly finite) sums of second R-submodules (we call those modules second representable). Moreover, we investigate the class of (main) second attached prime ideals related to a module with such representation. We provide sufficient conditions for an R-module M to get a (minimal) second representation. We also found the collection of second attached prime ideals for some types of second representable R-modules, in particular within the class of injective R-modules. As we know that every simple R-submodule is second and every second R-submodule is secondary, we can see the importance of the second representable R-module.

Keywords: lifting modules, second attached prime ideals, second representations, secondary representations, semisimple modules, second submodules

Procedia PDF Downloads 157
5231 Utilizing Topic Modelling for Assessing Mhealth App’s Risks to Users’ Health before and during the COVID-19 Pandemic

Authors: Pedro Augusto Da Silva E Souza Miranda, Niloofar Jalali, Shweta Mistry

Abstract:

BACKGROUND: Software developers utilize automated solutions to scrape users’ reviews to extract meaningful knowledge to identify problems (e.g., bugs, compatibility issues) and possible enhancements (e.g., users’ requests) to their solutions. However, most of these solutions do not consider the health risk aspects to users. Recent works have shed light on the importance of including health risk considerations in the development cycle of mHealth apps to prevent harm to its users. PROBLEM: The COVID-19 Pandemic in Canada (and World) is currently forcing physical distancing upon the general population. This new lifestyle made the usage of mHealth applications more essential than ever, with a projected market forecast of 332 billion dollars by 2025. However, this new insurgency in mHealth usage comes with possible risks to users’ health due to mHealth apps problems (e.g., wrong insulin dosage indication due to a UI error). OBJECTIVE: These works aim to raise awareness amongst mHealth developers of the importance of considering risks to users’ health within their development lifecycle. Moreover, this work also aims to help mHealth developers with a Proof-of-Concept (POC) solution to understand, process, and identify possible health risks to users of mHealth apps based on users’ reviews. METHODS: We conducted a mixed-method study design. We developed a crawler to mine the negative reviews from two samples of mHealth apps (my fitness, medisafe) from the Google Play store users. For each mHealth app, we performed the following steps: • The reviews are divided into two groups, before starting the COVID-19 (reviews’ submission date before 15 Feb 2019) and during the COVID-19 (reviews’ submission date starts from 16 Feb 2019 till Dec 2020). For each period, the Latent Dirichlet Allocation (LDA) topic model was used to identify the different clusters of reviews based on similar topics of review The topics before and during COVID-19 are compared, and the significant difference in frequency and severity of similar topics are identified. RESULTS: We successfully scraped, filtered, processed, and identified health-related topics in both qualitative and quantitative approaches. The results demonstrated the similarity between topics before and during the COVID-19.

Keywords: natural language processing (NLP), topic modeling, mHealth, COVID-19, software engineering, telemedicine, health risks

Procedia PDF Downloads 104
5230 Performance Analysis and Comparison of Various 1-D and 2-D Prime Codes for OCDMA Systems

Authors: Gurjit Kaur, Shashank Johri, Arpit Mehrotra

Abstract:

In this paper we have analyzed and compared the performance of various coding schemes. The basic ID prime sequence codes are unique in only dimension i.e. time slots whereas 2D coding techniques are not unique by their time slots but with their wavelengths also. In this research we have evaluated and compared the performance of 1D and 2D coding techniques constructed using prime sequence coding pattern for OCDMA system on a single platform. Results shows that 1D Extended Prime Code (EPC) can support more number of active users compared to other codes but at the expense of larger code length which further increases the complexity of the code. Modified Prime Code (MPC) supports lesser number of active users at λc=2 but it has a lesser code length as compared to 1D prime code. Analysis shows that 2D prime code supports lesser number of active users than 1D codes but they are having large code family and are the most secure codes compared to other codes. The performance of all these codes is analyzed on basis of number of active users supported at a Bit Error Rate (BER) of 10-9.

Keywords: CDMA, OCDMA, BER, OOC, PC, EPC, MPC, 2-D PC/PC, λc, λa

Procedia PDF Downloads 479
5229 Awareness, Use and Searching Behavior of 'Virtua' Online Public Access Catalog Users

Authors: Saira Soroya, Khalid Mahmood

Abstract:

Library catalogs open the door to the library collection. OPAC (Online Public Access Catalog) are one of the services offered by automated libraries. The present study aims to explore user’s awareness, the level of use and their searching behavior of OPAC with a purpose to give suggestions and ways to improve user-friendly features of library OPAC. The population consisted of OPAC users of Lahore University of Management Sciences (LUMS). Convenient sampling technique was carried out. Total sample size was 100 OPAC users. Quantitative research design, based on survey method used to carry out the study. The data collection instrument was adopted. Data was analyzed using SPSS. Results revealed that a considerable number of users were not aware of OPAC i.e. (30%); however, those who were aware were using basic features of the OPAC. It was found that lack of knowledge was considered the frequent reason for not using all features of OPAC. In this regard, it is strongly recommended that compulsory information literacy programme should be established.

Keywords: catalog, OPAC, library automation, usability study, university library

Procedia PDF Downloads 307
5228 Investigating Gender Differences in M-Learning Gameplay Adoption

Authors: Chih-Ping Chen

Abstract:

Despite the increasing popularity of and interest in mobile games, there has been little research that evaluates gender differences in users’ actual preferences for mobile game content, and the factors that influence entertainment and mobile-learning habits. To fill this void, this study examines different gender users’ experience of mobile English learning game adoption in order to identify the areas of development in Taiwan, using Uses and Gratification Theory, Expectation Confirmation Theory and experiential value. The integration of these theories forms the basis of an extended research concept. Users’ responses to questions about cognitive perceptions, confirmation, gratifications and continuous use were collected and analyzed with various factors derived from the theories.

Keywords: expectation confirmation theory, experiential value, gender difference, mobile game, uses and gratification

Procedia PDF Downloads 300
5227 General Awareness of Teenagers in Information Security

Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek

Abstract:

The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.

Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system

Procedia PDF Downloads 359