Publications | Humanities and Social Sciences
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1296

World Academy of Science, Engineering and Technology

[Humanities and Social Sciences]

Online ISSN : 1307-6892

36 Trustworthy in Virtual Organization

Authors: Abdolhamid Fetanat, Mehdi Naghian Feshaareki

Abstract:

In open settings, the participants in virtual organization are autonomous and there is no central authority to ensure the felicity of their interactions. When agents interact in such settings, each relies upon being able to model the trustworthiness of the agents with whom it interacts. Fundamentally, such models must consider the past behavior of the other parties in order to predict their future behavior. Further, it is sensible for the agents to share information via referrals to trustworthy agents. In this article, trust is a bet on the future contingent actions of others" and enumerates six major factors supporting it: (1) reputation, (2) performance, (3) appearance, (4) accountability, (5) precommitment, and (6) contextual facilitation.

Keywords: Trustworthy, trust, virtual organization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1326
35 The Epistemological Crisis in the Theory of Vittorio Guidano

Authors: Mauricio Otaíza Morales

Abstract:

This work shows a basic philosophical difficulty in the constructivist foundations of the cognitive posracionalist psychology of Vittorio Guidano. This is a difficulty caused by the problem of the existential crisis. It will be analyzed how Guidano-s suggestions about this problem depend on felt experience. Then it will appear how Guidano-s philosophy and psychotherapy must turn towards a phenomenological approach. Finally, some references are given about Eugen Gendlin-s philosophy which could be considered as a radical way to confront these questions.

Keywords: Cognitive posracionalist psychology of VittorioGuidano, Epistemological crisis, Existential crisis, Experience asdirectly felt.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2007
34 E-health in Rural Areas: Case of Developing Countries

Authors: Stella Ouma, M. E. Herselman

Abstract:

The Application of e-health solutions has brought superb advancements in the health care industry. E-health solutions have already been embraced in the industrialized countries. In an effort to catch up with the growth, the developing countries have strived to revolutionize the healthcare industry by use of Information technology in different ways. Based on a technology assessment carried out in Kenya – one of the developing countries – and using multiple case studies in Nyanza Province, this work focuses on an investigation on how five rural hospitals are adapting to the technology shift. The issues examined include the ICT infrastructure and e-health technologies in place, the knowledge of participants in terms of benefits gained through the use of ICT and the challenges posing barriers to the use of ICT technologies in these hospitals. The results reveal that the ICT infrastructure in place is inadequate for e-health implementations as a result to various challenges that exist. Consequently, suggestions on how to tackle the various challenges have been addressed in this paper.

Keywords: Challenges, e-health, healthcare, information communication technology, rural areas.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3549
33 Aggressive Driving in Young Motorists

Authors: Suneel M. Agerwala, Ashley Votta, Briana Hogan, John Yannocone, Steven Samuels, SheilaChiffriller

Abstract:

Road rage is an increasingly prevalent expression of aggression in our society. Its dangers are apparent and understanding its causes may shed light on preventative measures. This study involved a fifteen-minute survey administered to 147 undergraduate students at a North Eastern suburban university. The survey consisted of a demographics section, questions regarding financial investment in respondents- vehicles, experience driving, habits of driving, experiences witnessing role models driving, and an evaluation of road rage behavior using the Driving Vengeance Questionnaire. The study found no significant differences in driving aggression between respondents who were financially invested in their vehicle compared to those who were not, or between respondents who drove in heavy traffic hours compared to those who did not, suggesting internal factors correlate with aggressive driving habits. The study also found significant differences in driving aggression between males versus females, those with more points on their license versus fewer points, and those who witnessed parents driving aggressively very often versus rarely or never. Additional studies can investigate how witnessing parents driving aggressively is related to future driving behaviors.

Keywords: Aggression, college, driving, road rage.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1700
32 Swedish: Being or Becoming? Immigration, National Identity and the Democratic State

Authors: Hans Lödén

Abstract:

This article discusses superordinate national identity as a means for immigrants integration into democratic polities. It is suggested that a superordinate national identity perceived as inclusive, by immigrants and by the native population, would be conducive to such integration. Command of the dominant language of society is seen as most important of the inclusive criteria. Other such criteria are respect of the country's political institutions and feelings of belonging to the country where you live. The argument is supported by data, showing a majority in favour of inclusive criteria for 'Swedishness', from a recent study among 1000 secondary school students of 'Swedish' and non-'Swedish' backgrounds.

Keywords: Democratic state, exclusion, immigration, inclusion, superordinate national identity, Sweden.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1614
31 The Effect of a Free -Trade Agreement upon Agricultural Imports

Authors: Andres G. Victorio, Montita Rungswang

Abstract:

A free-trade agreement is found to increase Thailand-s agricultural imports from New Zealand, despite the short span of time for which the agreement has been operational. The finding is described by autoregressive estimates that correct for possible unit roots in the data. The agreement-s effect upon imports is also estimated while considering an error-correction model of imports against gross domestic product.

Keywords: Agricultural imports, free trade, unit roots, cointegration, error correction.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1809
30 Human Capital and Capability Approach in European Lifelong Learning Development: A Case Study of Macedonia in the Balkan

Authors: E. Heikkilä

Abstract:

The paper discusses European Lifelong Learning policy in the European enlargement to the Balkan. The European Lifelong Learning policy with Human Capital approach is researched in the country case of Macedonia. The paper argues that Human Capital approach focusing on instrumental and economic importance of learning for employability and economic growth needs to be complemented with Capability Approach for intrinsic and noneconomic needs of learning among the ethnic minorities. The paper identifies two dimensions of importance – minority languages and civic education – that the Capability Approach may develop to guarantee equal opportunities to all to benefit from European educational and lifelong learning development and to build an inclusive and socially just democracy in Macedonia.

Keywords: Capability approach, European lifelong learning, human capital theory.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1801
29 The Relationship between Burnout, Negative Affectivity and Organizational Citizenship Behavior for Human Services Employees

Authors: Stephen B. Schepman, Michael A. Zarate

Abstract:

The purpose of this study was to explore the relationship between Burnout, Negative Affectivity, and Organizational Citizenship Behavior (OCB) for social service workers at two agencies serving homeless populations. Thirty two subjects completed surveys. Significant correlations between major variables and subscales were found.

Keywords: Burnout, negative affectivity, organizationalcitizenship.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2602
28 Sun, Salon, and Cosmetic Tanning: Predictors and Motives

Authors: Andrew Reilly, Nancy A. Rudd

Abstract:

The appearance management behavior of tanning by gay men is examined through the lens of Impression Formation. The study proposes that body image, self-esteem, and internalized homophobia are connected and affect the motives for engaging in sun, salon, and cosmetic tanning. Motives examined were: to look masculine, to look attractive to (potential) partners, to look attractive in general, to socialize, to meet a peer standard, and for personal satisfaction. Using regression analysis to examine data of 103 gay men who engage in at least one method of tanning, results reveal that components of body image and internalized homophobia–but not self-esteem–are linked to various motives and methods of tanning. These findings support and extend the literature of Impression Formation Theory and provide practitioners in the health and healthrelated fields new avenues to pursue when dealing with diseases related to tanning.

Keywords: Body image, gay men, tanning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1548
27 Factors Influencing Rote Learner's Intention to Use WBL: Developing Country Study

Authors: Watcharawalee Lertlum, Borworn Papasratorn

Abstract:

Previous researches found that conventional WBL is effective for meaningful learner, because rote learner learn by repeating without thinking or trying to understand. It is impossible to have full benefit from conventional WBL. Understanding of rote learner-s intention and what influences it becomes important. Poorly designed user interface will discourage rote learner-s cultivation and intention to use WBL. Thus, user interface design is an important factor especially when WBL is used as comprehensive replacement of conventional teaching. This research proposes the influencing factors that can enhance learner-s intention to use the system. The enhanced TAM is used for evaluating the proposed factors. The research result points out that factors influencing rote learner-s intention are Perceived Usefulness of Homepage Content Structure, Perceived User Friendly Interface, Perceived Hedonic Component, and Perceived (homepage) Visual Attractiveness.

Keywords: Web-Based learning, Electronic learning, Intentionto use, Rote learner, Influencing

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1584
26 Cluster Analysis for the Statistical Modeling of Aesthetic Judgment Data Related to Comics Artists

Authors: George E. Tsekouras, Evi Sampanikou

Abstract:

We compare three categorical data clustering algorithms with respect to the problem of classifying cultural data related to the aesthetic judgment of comics artists. Such a classification is very important in Comics Art theory since the determination of any classes of similarities in such kind of data will provide to art-historians very fruitful information of Comics Art-s evolution. To establish this, we use a categorical data set and we study it by employing three categorical data clustering algorithms. The performances of these algorithms are compared each other, while interpretations of the clustering results are also given.

Keywords: Aesthetic judgment, comics artists, cluster analysis, categorical data.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1633
25 Marital Duration and Sexual Frequency among the Muslim and Santal Couples in Rural Bangladesh: A Cross-Cultural Perspective

Authors: Md. Emaj Uddin

Abstract:

Age and sex are biological terms that are socioculturally constructed for marriage and marital sexual behavior in every society. Marriage is a universal norm that makes legitimate sexual behavior between a man and a woman in marital life cycle to gain bio-social purposes. Cross-cultural studies reveal that marital sexual frequency as a part of marital sexual behavior not only varies within the couple-s life cycle, but also varies between and among couples in diverse cultures. The purpose of the study was to compare marital sexual frequency in association with age status and length of marital relationship between Muslim and Santal couples in rural Bangladesh. For this we assumed that (1) Santal culture compared to Muslim culture preferred earlier age at marriage for meeting marital sexual purposes in rural Bangladesh; (2) Marital duration among the Muslim couples was higher than that among the Santal couples; (3) Sexual frequency among the younger couples in both the ethnic communities was higher than the older couples; (4) Sexual frequency across the Muslim couples- marital life cycle was higher than that the Santal couples- marital life cycle. In so doing, 288 active couples (145 for Muslim and 143 for Santal) selected by cluster random sampling were interviewed with questionnaire method. The findings of Independent Samples T Test on age at marriage, current age, marital duration and sexual frequency independently reveal that there were significant differences in sexual frequency not only across the couples- life cycle but also vary between the Muslim and Santal couples in relation to marital duration. The results of Pearson-s Inter- Correlation Coefficients reveal that although age at marriage, current age and marital duration for husband and wife were significantly positive correlated with each other between the communities, there were significantly negative correlation between the age at marriage, current age, marital duration and sexual frequency among the selected couples between the communities.

Keywords: Bangladesh, Cross-Cultural Perspective, MaritalDuration, Muslim, Santal, Marital Sexual Frequency.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4159
24 Hybrid Intelligent Intrusion Detection System

Authors: Norbik Bashah, Idris Bharanidharan Shanmugam, Abdul Manan Ahmed

Abstract:

Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffective. Artificial Intelligence plays a driving role in security services. This paper proposes a dynamic model Intelligent Intrusion Detection System, based on specific AI approach for intrusion detection. The techniques that are being investigated includes neural networks and fuzzy logic with network profiling, that uses simple data mining techniques to process the network data. The proposed system is a hybrid system that combines anomaly, misuse and host based detection. Simple Fuzzy rules allow us to construct if-then rules that reflect common ways of describing security attacks. For host based intrusion detection we use neural-networks along with self organizing maps. Suspicious intrusions can be traced back to its original source path and any traffic from that particular source will be redirected back to them in future. Both network traffic and system audit data are used as inputs for both.

Keywords: Intrusion Detection, Network Security, Data mining, Fuzzy Logic.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2130
23 Utilizing Biological Models to Determine the Recruitment of the Irish Republican Army

Authors: Erika Ann Schaub, Christian J Darken

Abstract:

Sociological models (e.g., social network analysis, small-group dynamic and gang models) have historically been used to predict the behavior of terrorist groups. However, they may not be the most appropriate method for understanding the behavior of terrorist organizations because the models were not initially intended to incorporate violent behavior of its subjects. Rather, models that incorporate life and death competition between subjects, i.e., models utilized by scientists to examine the behavior of wildlife populations, may provide a more accurate analysis. This paper suggests the use of biological models to attain a more robust method for understanding the behavior of terrorist organizations as compared to traditional methods. This study also describes how a biological population model incorporating predator-prey behavior factors can predict terrorist organizational recruitment behavior for the purpose of understanding the factors that govern the growth and decline of terrorist organizations. The Lotka-Volterra, a biological model that is based on a predator-prey relationship, is applied to a highly suggestive case study, that of the Irish Republican Army. This case study illuminates how a biological model can be utilized to understand the actions of a terrorist organization.

Keywords: Biological Models, Lotka-Volterra Predator-Prey Model, Terrorist Organizational Behavior, Terrorist Recruitment.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1523
22 Economic Development, Environmental Conflicts and Citizen Participation in Latin America

Authors: Luis F. Beltrán Morales, Felipe García-Rodríguez, Daniel LLuch Cota, German Ponce Díaz, Victor Sevilla Unda

Abstract:

Environmental conflicts produced by economic development and natural resources exploitation, are discussed. Main causes of conflicts in developing countries were shown to arise from geographically external investments, inefficiency of the Environmental Impact Assessment (EIA), and the lack of communication between government and Non-Government Organizations (NGOs). Citizen participation can only intervene during late stages of the EIA, which is considered as one of the main shortcomings in satisfying demands of local people.

Keywords: Economic Development, Environmental Conflicts, Citizen Participation, NGOs.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1686
21 Home Network-Specific RBAC Model

Authors: Geon-Woo Kim, Do-Woo Kim, Jun-Ho Lee, Jin-Beon Hwang, Jong-Wook Han

Abstract:

As various mobile sensing technologies, remote control and ubiquitous infrastructure are developing and expectations on quality of life are increasing, a lot of researches and developments on home network technologies and services are actively on going, Until now, we have focused on how to provide users with high-level home network services, while not many researches on home network security for guaranteeing safety are progressing. So, in this paper, we propose an access control model specific to home network that provides various kinds of users with home network services up one-s characteristics and features, and protects home network systems from illegal/unnecessary accesses or intrusions.

Keywords: Home network security, RBAC, access control, authentication.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1729
20 Mobility Analysis of the Population of Rabat-Salé-Zemmour-Zaer

Authors: F. Ghaiti

Abstract:

In this paper, we present the 2006 survey study origin destination and price that we carried out during 2006 fall in the area in the Moroccan region of Rabat-Salé-Zemmour-Zaer. The survey concerns the people-s characteristics, their displacements behavior and the price that they will be able to pay for a tramway ticket. The main objective is to study a set of relative features to the households and to their displacement's habits and to their choices among public and privet transport modes. A comparison between this survey results and that of the 1996's is made. A pricing scheme is also given according to the tram capacity. (The Rabat-Salé tramway is under construction right now and it will be operational beginning 2010).

Keywords: Matrix O/D, Theory of pricing, Urban transport survey.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2640
19 Iterative Way to Acquire Information Technology for Defense and Aerospace

Authors: Ahmet Denker, Hakan Gürkan

Abstract:

Defense and Aerospace environment is continuously striving to keep up with increasingly sophisticated Information Technology (IT) in order to remain effective in today-s dynamic and unpredictable threat environment. This makes IT one of the largest and fastest growing expenses of Defense. Hundreds of millions of dollars spent a year on IT projects. But, too many of those millions are wasted on costly mistakes. Systems that do not work properly, new components that are not compatible with old ones, trendy new applications that do not really satisfy defense needs or lost through poorly managed contracts. This paper investigates and compiles the effective strategies that aim to end exasperation with low returns and high cost of Information Technology acquisition for defense; it tries to show how to maximize value while reducing time and expenditure.

Keywords: Iterative process, acquisition management, project management, software economics, requirement analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1397
18 Water Security in Rural Areas through Solar Energy in Baja California Sur, Mexico

Authors: Luis F. Beltrán-Morales, Dalia Bali Cohen, Enrique Troyo-Diéguez, Gerzaín Avilés Polanco, Victor Sevilla Unda

Abstract:

This study aims to assess the potential of solar energy technology for improving access to water and hence the livelihood strategies of rural communities in Baja California Sur, Mexico. It focuses on livestock ranches and photovoltaic water-pumptechnology as well as other water extraction methods. The methodology used are the Sustainable Livelihoods and the Appropriate Technology approaches. A household survey was applied in June of 2006 to 32 ranches in the municipality, of which 22 used PV pumps; and semi-structured interviews were conducted. Findings indicate that solar pumps have in fact helped people improve their quality of life by allowing them to pursue a different livelihood strategy and that improved access to water -not necessarily as more water but as less effort to extract and collect it- does not automatically imply overexploitation of the resource; consumption is based on basic needs as well as on storage and pumping capacity. Justification for such systems lies in the avoidance of logistical problems associated to fossil fuels, PV pumps proved to be the most beneficial when substituting gasoline or diesel equipment but of dubious advantage if intended to replace wind or gravity systems. Solar water pumping technology-s main obstacle to dissemination are high investment and repairs costs and it is therefore not suitable for all cases even when insolation rates and water availability are adequate. In cases where affordability is not an obstacle it has become an important asset that contributes –by means of reduced expenses, less effort and saved time- to the improvement of livestock, the main livelihood provider for these ranches.

Keywords: Solar Pumps, Water Security, Livestock Ranches, Sustainable Livelihoods.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1573
17 Study on Diversified Developments Improving Environmental Values-In Case of University Campus -

Authors: Kuriko Iwai, Michihiro Kita

Abstract:

This study aims to clarify constructions which enable to improve socio-cultural values of environments and also to obtain new knowledge on selecting development plans. CVM is adopted as a method of evaluation. As a case of the research, university campus (CP; the following) is selected on account of its various environments, institutions and many users. Investigations were conducted from 4 points of view, total value and utility value of whole CP environments, values of each environment existing in CP or development plan assumed in CP. Furthermore, respondents- attributes were also investigated. In consequence, the following is obtained. 1) Almost all of total value of CP is composed of utility value of direct use. 2) Each of environment and development plans whose value is the highest is clarified. 3) Moreover, development plan to improve environmental value the most is specified.

Keywords: CVM, Development Plans, University Campus, Improvement of Environments Value.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1227
16 On Internet Access Technology Specification Model

Authors: Samson Okwakol Ariko, Venansius Baryamureeba

Abstract:

Internet Access Technologies (IAT) provide a means through which Internet can be accessed. The choice of a suitable Internet technology is increasingly becoming an important issue to ISP clients. Currently, the choice of IAT is based on discretion and intuition of the concerned managers and the reliance on ISPs. In this paper we propose a model and designs algorithms that are used in the Internet access technology specification. In the proposed model, three ranking approaches are introduced; concurrent ranking, stepwise ranking and weighted ranking. The model ranks the IAT based on distance measures computed in ascending order while the global ranking system assigns weights to each IAT according to the position held in each ranking technique, determines the total weight of a particular IAT and ranks them in descending order. The final output is an objective ranking of IAT in descending order.

Keywords: Internet Access Technology (IAT).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1448
15 An Approach for Reducing the Computational Complexity of LAMSTAR Intrusion Detection System using Principal Component Analysis

Authors: V. Venkatachalam, S. Selvan

Abstract:

The security of computer networks plays a strategic role in modern computer systems. Intrusion Detection Systems (IDS) act as the 'second line of defense' placed inside a protected network, looking for known or potential threats in network traffic and/or audit data recorded by hosts. We developed an Intrusion Detection System using LAMSTAR neural network to learn patterns of normal and intrusive activities, to classify observed system activities and compared the performance of LAMSTAR IDS with other classification techniques using 5 classes of KDDCup99 data. LAMSAR IDS gives better performance at the cost of high Computational complexity, Training time and Testing time, when compared to other classification techniques (Binary Tree classifier, RBF classifier, Gaussian Mixture classifier). we further reduced the Computational Complexity of LAMSTAR IDS by reducing the dimension of the data using principal component analysis which in turn reduces the training and testing time with almost the same performance.

Keywords: Binary Tree Classifier, Gaussian Mixture, IntrusionDetection System, LAMSTAR, Radial Basis Function.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1746
14 Agent-Based Offline Electronic Voting

Authors: Mehmet Tahir Sandıkkaya, Bülent Örencik

Abstract:

Many electronic voting systems, classified mainly as homomorphic cryptography based, mix-net based and blind signature based, appear after the eighties when zero knowledge proofs were introduced. The common ground for all these three systems is that none of them works without real time cryptologic calculations that should be held on a server. As far as known, the agent-based approach has not been used in a secure electronic voting system. In this study, an agent-based electronic voting schema, which does not contain real time calculations on the server side, is proposed. Conventional cryptologic methods are used in the proposed schema and some of the requirements of an electronic voting system are constructed within the schema. The schema seems quite secure if the used cryptologic methods and agents are secure. In this paper, proposed schema will be explained and compared with already known electronic voting systems.

Keywords: Electronic voting, E-voting, Mobile softwareagents, Offline electronic voting.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1537
13 Information/Knowledge Society and Europe

Authors: A. Ziya Aktaş

Abstract:

During the last decade some long lasting changes and developments are shaping the global society. The world is entering a new society which is already named as information or knowledge society. In the paper, information/knowledge society is elaborated first. Starting in the year 2000, European Union has initiated some special projects such as eEurope and eEurope+ and activities such as Bologna Process and Socrates/Erasmus Program . The paper will review these activites in relation with information or knowledge society . Before paper ends with a conclusion, some views relevant to the topic are also presented.

Keywords: Bologna Process, Erasmus/Socrates Program, information/knowledge society , Lisbon objectives.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1500
12 Demographic Progression in the Zlin Region

Authors: Z. Charvat

Abstract:

This paper considers the Zlin region in terms of the demographic conditions of the region - in particular the residential structure and the educational background of the inhabitants. The paper also considers migration of the population within the Zlin region. Migration is of importance in terms of conservation of the working potential of the region.

Keywords: Demographic structure, migration, inhabitants, residential structure, age structure, learning structure, Zlin region.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1400
11 Wireless Sensor Networks:A Survey on Ultra-Low Power-Aware Design

Authors: Itziar Marín, Eduardo Arceredillo, Aitzol Zuloaga, Jagoba Arias

Abstract:

Distributed wireless sensor network consist on several scattered nodes in a knowledge area. Those sensors have as its only power supplies a pair of batteries that must let them live up to five years without substitution. That-s why it is necessary to develop some power aware algorithms that could save battery lifetime as much as possible. In this is document, a review of power aware design for sensor nodes is presented. As example of implementations, some resources and task management, communication, topology control and routing protocols are named.

Keywords: Low Power Design, Power Awareness, RemoteSensing, Wireless Sensor Networks (WSN).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2183
10 The Multimedia Interactive Theatre by Virtual Means Regarding Computational Intelligence in Space Design as HCI and Samples from Turkey

Authors: Pelin Yildiz

Abstract:

The aim of this study is to emphasize the opportunities in space design under the aspect of HCI as performance areas. HCI is a multidisciplinary approach that could be identified in many different areas. The aesthetical reflections of HCI by virtual reality in space design are the high-tech solutions of the new innovations as computational facilities by artistic features. The method of this paper is to identify the subject in 3 main parts. In the first part a general approach and definition of interactivity on the basis of space design; in the second part the concept of multimedia interactive theater by some chosen samples from the world and interactive design aspects; in the third part the samples from Turkey will be identified by stage designing principles. In the results it could be declared that the multimedia database is the virtual approach of theatre stage designing regarding interactive means by computational facilities according to aesthetical aspects. HCI is mostly identified in theatre stages as computational intelligence under the affect of interactivity.

Keywords: Computational intelligence, interactive space, multimedia theatre, virtual reality.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2687
9 A Support System to Consult Remote another Doctor on Assessment and/or Medical Treatment Plan when a Doctor has a Patient not in His/Her Major

Authors: T. Gotoh, T. Takayama, M. Ishiki, T. Ikeda

Abstract:

Recently, majors of doctors are divided into terribly lots of detailed areas. However, it is actually not a rare case that a doctor has a patient who is not in his/her major. He/She must judge an assessment and make a medical treatment plan for this patient. According to our investigation, conventional approaches such as image diagnosis cooperation are insufficient. This paper proposes an 'Assessment / Medical Treatment Plan Consulting System'. We have implemented a pilot system based on our proposition. Its effectiveness is clarified by an evaluation.

Keywords: Application, computational intelligence and telecommunications, medicine, intelligent systems.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1727
8 Evaluation of Degree and the Effect of Order in the Family on Violence against Children A Survey among Guidance School Students in Gilanegharb City in Iran

Authors: Javadi Alimohammad, Javadi Maryam, Feizi Fereidoon

Abstract:

A review of the literature found that Domestic violence and child maltreatment co-occur in many families, the purpose of this study attempts to emphasize the factors relating to intra-family relationships (order point of view) on violence against the children, For this purpose a survey technique on the sample size amounted 200 students of governmental guidance schools of city of Gilanegharb in country of Iran were considered. For measurement of violence against the children (VAC) the CTS scaled has been used .The results showed that children have experienced the violence more than once during the last year. degree of order in family is high. Explanation result indicated that the order variables in family including collective thinking, empathy, communal co-circumstance have significant effects on VAC.

Keywords: Violence, domestic violence, violence against children, order, guidance school, family, children.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1291
7 Biometrics Authorize Me!

Authors: João Nóbrega Brites Moita

Abstract:

Can biometrics do what everyone is expecting it will? And more importantly, should it be doing it? Biometrics is the buzzword “on the mouth" of everyone, who are trying to use this technology in a variety of applications. But all this “hype" about biometrics can be dangerous without a careful evaluation of the real needs of each application. In this paper I-ll try to focus on the dangers of using the right technology at the right time in the wrong place.

Keywords: Authentication, Authorization, Biometrics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1377