Search results for: social media services
1845 Students’ Level of Knowledge Construction and Pattern of Social Interaction in an Online Forum
Authors: K. Durairaj, I. N. Umar
Abstract:
The asynchronous discussion forum is one of the most widely used activities in learning management system environment. Online forum allows participants to interact, construct knowledge, and can be used to complement face to face sessions in blended learning courses. However, to what extent do the students perceive the benefits or advantages of forum remain to be seen. Through content and social network analyses, instructors will be able to gauge the students’ engagement and knowledge construction level. Thus, this study aims to analyze the students’ level of knowledge construction and their participation level that occur through online discussion. It also attempts to investigate the relationship between the level of knowledge construction and their social interaction patterns. The sample involves 23 students undertaking a master course in one public university in Malaysia. The asynchronous discussion forum was conducted for three weeks as part of the course requirement. The finding indicates that the level of knowledge construction is quite low. Also, the density value of 0.11 indicating the overall communication among the participants in the forum is low. This study reveals that strong and significant correlations between SNA measures (in-degree centrality, out-degree centrality) and level of knowledge construction. Thus, allocating these active students in different group aids the interactive discussion takes place. Finally, based upon the findings, some recommendations to increase students’ level of knowledge construction and also for further research are proposed.
Keywords: Asynchronous Discussion Forums, Content Analysis, Knowledge Construction, Social Network Analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22111844 “FGM is with us Everyday“ Women and Girls Speak out about Female Genital Mutilation in the UK
Authors: Susana Oguntoye, Naana Otoo-Oyortey, Joanne Hemmings, Kate Norman, Eiman Hussein
Abstract:
There is inadequate information on the practice of female genital mutilation (FGM) in the UK, and there are often myths and perceptions within communities that influence the effectiveness of prevention programmes. This means it is difficult to address the trends and changes in the practice in the UK. To this end, FORWARD undertook novel and innovative research using the Participatory Ethnographic and Evaluative Research (PEER) method to explore the views of women from Eritrea, Sudan, Somalia and Ethiopia that live in London and Bristol (two UK cities). Women-s views, taken from PEER interviews, reflected reasons for continued practice of FGM: marriageability, the harnessing and control of female sexuality, and upholding traditions from their countries of origin. It was also clear that the main supporters of the practice were believed to be older women within families and communities. Women described the impact FGM was having on their lives as isolating. And although it was clearly considered a private and personal matter, they developed a real sense of connection with their peers within the research process. The women were overwhelmingly positive about combating the practice, although they believed it would probably take a while before it ends completely. They also made concrete recommendations on how to improve support services for women affected by FGM: Training for professionals (particularly in healthcare), increased engagement with, and outreach to, communities, culturally appropriate materials and information made available and accessible to communities, and more consequent implementation of legislation. Finally, the women asked for more empathy and understanding, particularly from health professionals. Rather than presenting FGM as a completely alien and inconceivable practice, it may help for those looking into these women-s lives and working with them to understand the social and economic context in which the practice takes place.Keywords: Female Genital Mutilation, FemaleCircumcision/Cutting, Participatory Research, PEER method.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24981843 Cross-cultural Analysis of the Strategy of Tolerance in the Republic of Kazakhstan
Authors: N. K. Satybaldina, A. G. Karabayeva, Z. N. Ismagambetova
Abstract:
The modern Kazakh society is characterized by strengthen cross-cultural communication, the emergence of new powerful subcultures, accelerated change in social systems and values. The socio-political reforms in all fields have changed the quality of social relationships and spiritual life.Cross-cultural approach involves the analysis of different types of behavior and communication, including the manifestation of the conflict, and the formation of marginal destructive stereotypes.
Keywords: Attitudes, Ethnic, Communication, Cross-cultural, Multiethnic, Multicultural, Society, Stereotype, Strategy, Tolerance
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15531842 Context Generation with Image Based Sensors: An Interdisciplinary Enquiry on Technical and Social Issues and their Implications for System Design
Authors: Julia Moehrmann, Gunter Heidemann, Oliver Siemoneit, Christoph Hubig, Uwe-Philipp Kaeppeler, Paul Levi
Abstract:
Image data holds a large amount of different context information. However, as of today, these resources remain largely untouched. It is thus the aim of this paper to present a basic technical framework which allows for a quick and easy exploitation of context information from image data especially by non-expert users. Furthermore, the proposed framework is discussed in detail concerning important social and ethical issues which demand special requirements in system design. Finally, a first sensor prototype is presented which meets the identified requirements. Additionally, necessary implications for the software and hardware design of the system are discussed, rendering a sensor system which could be regarded as a good, acceptable and justifiable technical and thereby enabling the extraction of context information from image data.Keywords: Context-aware computing, ethical and social issues, image recognition, requirements in system design.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16671841 Automated Ranking of Hints
Authors: Sylvia Encheva
Abstract:
The importance of hints in an intelligent tutoring system is well understood. The problems however related to their delivering are quite a few. In this paper we propose delivering of hints to be based on considering their usefulness. By this we mean that a hint is regarded as useful to a student if the student has succeeded to solve a problem after the hint was suggested to her/him. Methods from the theory of partial orderings are further applied facilitating an automated process of offering individualized advises on how to proceed in order to solve a particular problem.
Keywords: Decision support services, uncertainty management, partial orderings.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14911840 Visual Preferences of Elementary School Children with Autism Spectrum Disorder: An Experimental Study
Authors: Larissa Pliska, Isabel Neitzel, Michael Buschermöhle, Olga Kunina-Habenicht, Ute Ritterfeld
Abstract:
Visual preferences, which can be assessed using eye tracking technologies, are considered one of the defining hallmarks of autism spectrum disorder (ASD). Specifically, children with ASD show a decreased preference for social images rather than geometric images compared to typically developed (TD) children. Such differences are already prevalent at a very early age and indicate the severity of the disorder: toddlers with ASD who preferred geometric images when confronted with social and geometric images showed higher ASD symptom severity than toddlers with ASD who showed higher social attention. Furthermore, the complexity of social images (one child playing vs. two children playing together) as well as the mode of stimulus presentation (video or image), are not decisive for the marker. The average age of diagnosis for ASD in Germany is 6.5 years, and visual preference data on this age group are missing. In the present study, we therefore investigated whether visual preferences persist into school age. We examined the visual preferences of 16 boys aged 6 to 11 years with ASD and unimpaired cognition as well as TD children (1:1 matching based on children's age and the parent's level of education) within an experimental setting. Different stimulus presentation formats (images vs. videos) and different levels of stimulus complexity were included. Children with and without ASD received pairs of social and non-social images and video stimuli on a screen while eye movements (i.e., eye position and gaze direction) were recorded. For this specific use case, KIZMO GmbH developed a customized, native iOS app (KIZMO Face-Analyzer) for use on iPads. Neither the format of stimulus presentation nor the complexity of the social images had a significant effect on the visual preference of children with and without ASD in this study. Despite the tendency for a difference between the groups for the video stimuli, there were no significant differences. Overall, no statistical differences in visual preference occurred between boys with and without ASD, suggesting that gaze preference in these groups is similar at elementary school age. One limitation is that the children with ASD were already receiving ASD-specific intervention. The potential of a visual preference task as an indicator of ASD can be emphasized. The article discusses the clinical relevance of this marker in elementary school children.
Keywords: Autism spectrum disorder, eye tracking, hallmark, visual preference.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 281839 Assessment of Menus in a Selected Social Welfare Home with Regard to Nutritional Recommendations
Authors: E. Grochowska-Niedworok, K. Brukalo, B. Całyniuk, J. Piekorz, M. Kardas
Abstract:
The aim of the study was to assess diets of residents of nursing homes. Provided by social welfare home, 10 day menus were introduced into the computer program Diet 5 and analyzed in respect of protein, fats, carbohydrates, energy, vitamin D and calcium. The resulting mean values of 10-day menus were compared with the existing Nutrition Standards for Polish population. The analysis menus showed that the average amount of energy supplied from food is not sufficient. Carbohydrates in food supply are too high and represent 257% of normal. The average value of fats and proteins supplied with food is adequate 85.2 g/day and 75.2 g/day. The calcium content of the diet is 513.9 mg/day. The amount of vitamin D supplied in the age group 51-65 years is 2.3 µg/day. Dietary errors that have been shown are due to the lack of detailed nutritional guidelines for nursing homes, as well as state-owned care facilities in general.
Keywords: Assessment of diet, essential nutrients, social welfare home, nutrition.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11381838 Is the use of Social Networking Sites Correlated with Internet Addiction? Facebook Use among Taiwanese College Students
Authors: Sen-Chi Yu, Wei-Hsin Hsu, Min-Ning Yu, Hao-Yi Hsu
Abstract:
The aim of this study was to investigate the correlation between Facebook involvement and internet addiction. We sampled 577 university students in Taiwan and administered a survey of Facebook usage, Facebook involvement scale (FIS), and internet addiction scale. The FIS comprises three factors (salience, emotional support, and amusement). Results showed that the Facebook involvement scale had good reliability and validity. The correlation between Facebook involvement and internet addiction was measured at .395. This means that a higher degree of Facebook involvement indicates a greater degree of psychological dependency on the internet, and a greater propensity towards social withdrawal and other negative psychological consequences associated with internet addiction. Besides, the correlations between three factors of FIS (salience, emotional support, and amusement) and internet addiction ranged from .313-372, indicating that these neither of these factors (salience, emotional support, and amusement) is more effective than the others in predicting internet dependency.Keywords: Social networking sites, Facebook, Facebook Involvement, Internet Addiction
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24871837 Detecting Geographically Dispersed Overlay Communities Using Community Networks
Authors: Madhushi Bandara, Dharshana Kasthurirathna, Danaja Maldeniya, Mahendra Piraveenan
Abstract:
Community detection is an extremely useful technique in understanding the structure and function of a social network. Louvain algorithm, which is based on Newman-Girman modularity optimization technique, is extensively used as a computationally efficient method extract the communities in social networks. It has been suggested that the nodes that are in close geographical proximity have a higher tendency of forming communities. Variants of the Newman-Girman modularity measure such as dist-modularity try to normalize the effect of geographical proximity to extract geographically dispersed communities, at the expense of losing the information about the geographically proximate communities. In this work, we propose a method to extract geographically dispersed communities while preserving the information about the geographically proximate communities, by analyzing the ‘community network’, where the centroids of communities would be considered as network nodes. We suggest that the inter-community link strengths, which are normalized over the community sizes, may be used to identify and extract the ‘overlay communities’. The overlay communities would have relatively higher link strengths, despite being relatively apart in their spatial distribution. We apply this method to the Gowalla online social network, which contains the geographical signatures of its users, and identify the overlay communities within it.Keywords: Social networks, community detection, modularity optimization, geographically dispersed communities.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12981836 Social Relation between the Malays and Chinese Communities from a Civilizational Perspectives
Authors: Wan Norhasniah Wan Husin, Mohd Ridhuan Tee Abdullah
Abstract:
Towards the end of 19th century, the discovery of tin and the growing importance of rubber, had led Malaya to once again become the centre of attraction to western colonization, which later on caused the region to be influxed by cheap labour from China and India. One of the factors which attracted the alien communities was the characteristics of social relation offered by the Malays. If one analyzes the history of social relation of the Malays either among themselves or their relation with alien communities, it is apparent that the community places high regards to values such as tolerant, cooperative, respectful and helpful with each other. In fact, all these values are deeply rooted in the value of 'budi'. With the arrival of Islam, the value of 'budi' had been well assimilated with Islamic values thus giving birth to the value of 'budi-Islam'. Through 'budi- Islam', the Malay conducted their dealings with British as well the other communities during the time of peace or conflict. This value is well nurtured due to the geographical circumstances like the fertile, naturally rich land and bountiful marine life. Besides, a set of Malay customs known as 'adat' custom contributed in enhancing the values of budi.Keywords: Adat System, budi and Islam, Chinese community, Malay community
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22351835 Production of Apricot Vinegar Using an Isolated Acetobacter Strain from Iranian Apricot
Authors: Keivan Beheshti Maal, Rasoul Shafiei, Noushin Kabiri
Abstract:
Vinegar or sour wine is a product of alcoholic and subsequent acetous fermentation of sugary precursors derived from several fruits or starchy substrates. This delicious food additive and supplement contains not less than 4 grams of acetic acid in 100 cubic centimeters at 20°C. Among the large number of bacteria that are able to produce acetic acid, only few genera are used in vinegar industry most significant of which are Acetobacter and Gluconobacter. In this research we isolated and identified an Acetobacter strain from Iranian apricot, a very delicious and sensitive summer fruit to decay, we gathered from fruit's stores in Isfahan, Iran. The main culture media we used were Carr, GYC, Frateur and an industrial medium for vinegar production. We isolated this strain using a novel miniature fermentor we made at Pars Yeema Biotechnologists Co., Isfahan Science and Technology Town (ISTT), Isfahan, Iran. The microscopic examinations of isolated strain from Iranian apricot showed gram negative rods to cocobacilli. Their catalase reaction was positive and oxidase reaction was negative and could ferment ethanol to acetic acid. Also it showed an acceptable growth in 5%, 7% and 9% ethanol concentrations at 30°C using modified Carr media after 24, 48 and 96 hours incubation respectively. According to its tolerance against high concentrations of ethanol after four days incubation and its high acetic acid production, 8.53%, after 144 hours, this strain could be considered as a suitable industrial strain for a production of a new type of vinegar, apricot vinegar, with a new and delicious taste. In conclusion this is the first report of isolation and identification of an Acetobacter strain from Iranian apricot with a very good tolerance against high ethanol concentrations as well as high acetic acid productivity in an acceptable incubation period of time industrially. This strain could be used in vinegar industry to convert apricot spoilage to a beneficiary product and mentioned characteristics have made it as an amenable strain in food and agricultural biotechnology.Keywords: Acetic Acid Bacteria, Acetobacter, Fermentation, Food and Agricultural Biotechnology, Iranian Apricot, Vinegar.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 39641834 Strategy of Zakat Utilization for Productive Economic and Social Activity: A Case Study at Lembaga Amil Zakat, Infaq and Shodaqoh Yayasan Badan Wakaf Universitas Islam Indonesia
Authors: Krisnanda, Naili Qiyadatul Ulya
Abstract:
Utilization of zakat for productive economic and social activities can be considered an appropriate way to optimize the efficiency and major benefits within these community funds. As we know, not least among the Muslims who desperately need help from zakat funds to improve the livelihoods of their standard of living. In this case, optimizing the utilization of zakat funds can help the community, especially Muslims, to improve and prosper in their lives. Optimizing zakat funds for this purpose can not only motivate people to help others for the welfare and empowerment of the people but can also foster social solidarity between religious communities. The establishment of the nature of social solidarity will reduce the impact of poverty and even eradicate poverty. This study was conducted to determine how the strategy of zakat utilization is through the program of Zakat Galang Berdikari by the Zakat, Infaq, and Shodaqoh Institute of Waqf Board Foundation of Universitas Islam Indonesia (LAZIS YBW UII), what are successful indicators of LAZIS YBW UII in empowering zakat, how to manage zakat at LAZIS YBW UII through the program of Zakat Galang Berdikari to determine the extent of zakat utilization in productive economic activities and to help people less able to start an independent business in Yogyakarta. This study used a qualitative approach and the type of empirical research. This study used primary and secondary data by interviewing stakeholders according to the criteria, carrying out field observations and documentation which were then analyzed carefully and presented in a descriptive form. The result of this research is that the utilization of zakat funds in the Zakat Galang Berdikari program by LAZIS YBW UII is the right strategy to optimize zakat for productive economic and social activities in Yogyakarta.
Keywords: Zakat utilization, zakat funds, productive economic, LAZIS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4101833 Assessing Mobile Robotic Telepresence Based On Measures of Social Telepresence
Authors: A. Bagherzadhalimi, E. Di Maria
Abstract:
The feedbacks obtained regarding the sense of presence from pilot users operating a Mobile Robotic presence (MRP) system to visit a simulated museum are reported in this paper. The aim is to investigate how much the perception of system’s usefulness and ease of use is affected by operators’ sense of social telepresence (presence) in the remote location. Therefore, scenarios of visiting a museum are simulated and the user operators are supposed to perform some regular tasks inside the remote environment including interaction with local users, navigation and visiting the artworks. Participants were divided into two groups, those who had previous experience of operation and interaction with a MRP system and those who never had experience. Based on the results, both groups provided different feedbacks. Moreover, there was a significant association between user’s sense of presence and their perception of system usefulness and ease of use.
Keywords: Mobile Robotic Telepresence, Museum, Social Telepresence, Usability test.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17081832 Analysis of Equal cost Adaptive Routing Algorithms using Connection-Oriented and Connectionless Protocols
Authors: ER. Yashpaul Singh, A. Swarup
Abstract:
This research paper evaluates and compares the performance of equal cost adaptive multi-path routing algorithms taking the transport protocols TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) using network simulator ns2 and concludes which one is better.Keywords: Multi-path routing algorithm, Datagram, Virtual Circuit, Throughput, Network services.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14991831 Implementing High Performance VPN Router using Cavium-s CN2560 Security Processor
Authors: Sang Su Lee, Sang Woo Lee, Yong Sung Jeon, Ki Young Kim
Abstract:
IPsec protocol[1] is a set of security extensions developed by the IETF and it provides privacy and authentication services at the IP layer by using modern cryptography. In this paper, we describe both of H/W and S/W architectures of our router system, SRS-10. The system is designed to support high performance routing and IPsec VPN. Especially, we used Cavium-s CN2560 processor to implement IPsec processing in inline-mode.Keywords: IP, router, VPN, IPsec.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20341830 A Decade of Creating an Alternative Banking System in Tanzania: The Current State of Affairs of Islamic Banks
Authors: Pradeep Kulshrestha, Maulana Ayoub Ali
Abstract:
The concept of financial inclusion has been tabled in the whole world where practitioners, academicians, policy makers and economists are working hard to look for the best possible opportunities in order to enable the whole society to be in the banking cycle. The Islamic banking system is considered to be one of the said opportunities. Countries like the United Kingdom, United States of America, Malaysia, Saudi Arabia, the whole of the United Arab Emirates and many African countries have accommodated the aspect of Islamic banking in the conventional banking system as one of the financial inclusion strategies. This paper tries to analyse the current state of affairs of the Islamic Banking system in Tanzania in order to understand the improvement of the provision of Islamic banking products and services in the said country. The paper discusses the historical background of the banking system in Tanzania, the level of penetration of banking products and services and the coming of the Islamic banking system in the country. Furthermore, the paper discusses banking regulatory bodies, legal instruments governing banking operations as well as number of legal challenges facing Islamic banking operations in the country. Following a critical literature review, the paper discovered that there is no legal instrument which talks about the introduction and provision of Islamic banking system in Tanzania. Furthermore, the Islamic banking system was considered as a banking product which is absolutely incorrect because Islamic banking is considered to be as a banking system of its own. In addition to that, it has been discovered that lack of a proper regulatory system and legal instruments to harmonize the conventional and Islamic banking systems has resulted in the closure of one Islamic window in the country, which in the end affects the credibility of the newly introduced banking system. In its conclusive remarks, the paper suggests that Tanzania should work on all legal challenges affecting the smooth operations of the Islamic banking system. This can be in a way of adopting various Islamic banking legal models which are used in countries like Malaysia and others, or a borrowing legal harmonization process which has been adopted by the UK, Uganda, Nigeria and Kenya.
Keywords: Islamic banking, Islamic Windows, regulations, banks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9131829 Users’ Information Disclosure Determinants in Social Networking Sites: A Systematic Literature Review
Authors: Wajdan Al Malwi, Karen Renaud, Lewis Mackenzie
Abstract:
The privacy paradox describes a phenomenon whereby there is no connection between stated privacy concerns and privacy behaviours. We need to understand the underlying reasons for this paradox if we are to help users to preserve their privacy more effectively. In particular, the Social Networking System (SNS) domain offers a rich area of investigation due to the risks of unwise information disclosure decisions. Our study thus aims to untangle the complicated nature and underlying mechanisms of online privacy-related decisions in SNSs. In this paper, we report on the findings of a Systematic Literature Review (SLR) that revealed a number of factors that are likely to influence online privacy decisions. Our deductive analysis approach was informed by Communicative Privacy Management (CPM) theory. We uncovered a lack of clarity around privacy attitudes and their link to behaviours, which makes it challenging to design privacy-protecting SNS platforms and to craft legislation to ensure that users’ privacy is preserved.Keywords: Privacy paradox, self-disclosure, privacy attitude, privacy behaviour, social networking sites.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6191828 Balance of Rural and Urban Structures
Authors: Ehrenstorfer Barbara, Peherstorfer Tanja, Nový Jan
Abstract:
Urbanization and regionalization are two different approaches when it comes to economical structures and development, infrastructure and mobility, quality of life and living, education, social cohesion and many other topics. At first glance, the structures associated with urbanization and regionalization seems to be contradicting. This paper discusses possibilities of transfer and cooperation between rural and urban structures. An empirical investigation contributed to reveal scenarios of supposable forms of exchange and cooperation of remote rural areas and big cities.Keywords: Learning Regions, Quality of Life and Living, Regional and Rural Development, Social Innovation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17381827 Communicating a Mega Sporting Event in a Social Network Environment
Authors: Charmaine du Plessis
Abstract:
Arguments on a popular microblogging site were analysed by means of a methodological approach to business rhetoric focusing on the logos communication technique. The focus of the analysis was the 100 day countdown to the 2011 Rugby World Cup as advanced by the organisers. Big sporting events provide an attractive medium for sport event marketers in that they have become important strategic communication tools directed at sport consumers. Sport event marketing is understood in the sense of using a microblogging site as a communication tool whose purpose it is to disseminate a company-s marketing messages by involving the target audience in experiential activities. Sport creates a universal language in that it excites and increases the spread of information by word of mouth and other means. The findings highlight the limitations of a microblogging site in terms of marketing messages which can assist in better practices. This study can also serve as a heuristic tool for other researchers analysing sports marketing messages in social network environments.
Keywords: communication technique, microblogging, rhetoric, social networking, sport event marketing
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21091826 An Economic Analysis of Phu Kradueng National Park
Authors: Chutarat Boontho
Abstract:
The purposes of this study were as follows to evaluate the economic value of Phu Kradueng National Park by the travel cost method (TCM) and the contingent valuation method (CVM) and to estimate the demand for traveling and the willingness to pay. The data for this study were collected by conducting two large scale surveys on users and non-users. A total of 1,016 users and 1,034 non-users were interviewed. The data were analyzed using multiple linear regression analysis, logistic regression model and the consumer surplus (CS) was the integral of demand function for trips. The survey found, were as follows: 1)Using the travel cost method which provides an estimate of direct benefits to park users, we found that visitors- total willingness to pay per visit was 2,284.57 bath, of which 958.29 bath was travel cost, 1,129.82 bath was expenditure for accommodation, food, and services, and 166.66 bath was consumer surplus or the visitors -net gain or satisfaction from the visit (the integral of demand function for trips). 2) Thai visitors to Phu Kradueng National Park were further willing to pay an average of 646.84 bath per head per year to ensure the continued existence of Phu Kradueng National Park and to preserve their option to use it in the future. 3) Thai non-visitors, on the other hand, are willing to pay an average of 212.61 bath per head per year for the option and existence value provided by the Park. 4) The total economic value of Phu Kradueng National Park to Thai visitors and non-visitors taken together stands today at 9,249.55 million bath per year. 5) The users- average willingness to pay for access to Phu Kradueng National Park rises from 40 bath to 84.66 bath per head per trip for improved services such as road improvement, increased cleanliness, and upgraded information. This paper was needed to investigate of the potential market demand for bio prospecting in Phu Kradueng national Park and to investigate how a larger share of the economic benefits of tourism could be distributed income to the local residents.Keywords: Contingent Valuation Method, Travel Cost Method, Consumer surplus.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17891825 HPM Solution of Momentum Equation for Darcy-Brinkman Model in a Parallel Plates Channel Subjected to Lorentz Force
Authors: Asghar Shirazpour, Seyed Moein Rassoulinejad Mousavi, Hamid Reza Seyf
Abstract:
In this paper an analytical solution is presented for fully developed flow in a parallel plates channel under the action of Lorentz force, by use of Homotopy Perturbation Method (HPM). The analytical results are compared with exact solution and an excellent agreement has been observed between them for both Couette and Poiseuille flows. Moreover, the effects of key parameters have been studied on the dimensionless velocity profile.
Keywords: Lorentz Force, Porous Media, Homotopy Perturbation method
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21921824 Western Architecture in Grand Palace, Under Thai Social and Cultural Conditions in the Early Reign of King Chulalongkorn
Authors: Somchai Seviset, Lin Jian Qun
Abstract:
Chakri Maha Prasart Throne Hall is the important Audience hall in Grand Palace, Bangkok, Thailand which was established in the early reign of King Chulalongkorn (King Rama V) in 1882. The Throne was designed with the distinguished architecture by significant blending of Western and Thai Traditional styles under the Thai Social changing in Colony Era and Thai traditional culture. The western style was represented of modernization and civilization as the other European countries. In the other hand, Thai traditional architecture style with national emblem or Royal emblem was shown the status and power of Thai King as the Thai believes and culture.Keywords: Chakri Maha Prasart Throne hall, Western Architecture, Thai grand palace, Thai social and cultural conditions, The early reign of King Chulalongkorn era.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 31931823 Using Technology with a New Model of Management Development by Simulation of Neural Network and its Application on Intelligent Schools
Authors: Ahmad Ghayoumi, Mehdi Ghayoumi
Abstract:
Intelligent schools are those which use IT devices and technologies as media software, hardware and networks to improve learning process. On the other hand management improvement is best described as the process from which managers learn and improve their skills not only to benefit themselves but also their employing organizations Here, we present a model Management improvement System that has been applied on some schools and have made strict improvement.Keywords: Intelligent school, Management development system, Learning station, Teaching station
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10951822 Information Security Risk in Financial Institutions
Authors: James A. Nelson
Abstract:
The history of technology and banking is examined as it relates to risk and technological determinism. It is proposed that the services that banks offer are determined by technology and that banks must adopt new technologies to be competitive. The adoption of technologies paradoxically forces the adoption of other new technologies to protect the bank from the increased risk of technology. This cycle will lead to bank examiners and regulators to focus on human behavior, not on the ever changing technology.Keywords: Banking, information security, risk, technologicaldeterminism.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16841821 Approximate Solution of Some Mixed Boundary Value Problems of the Generalized Theory of Couple-Stress Thermo-Elasticity
Authors: M. Chumburidze, D. Lekveishvili
Abstract:
We have considered the harmonic oscillations and general dynamic (pseudo oscillations) systems of theory generalized Green-Lindsay of couple-stress thermo-elasticity for isotropic, homogeneous elastic media. Approximate solution of some mixed boundary value problems for finite domain, bounded by the some closed surface are constructed.
Keywords: The couple-stress thermo-elasticity, boundary value problems.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20301820 An Agent-based Model for Analyzing Interaction of Two Stable Social Networks
Authors: Masatora Daito, Hisashi Kojima
Abstract:
In this research, the authors analyze network stability using agent-based simulation. Firstly, the authors focus on analyzing large networks (eight agents) by connecting different two stable small social networks (A small stable network is consisted on four agents.). Secondly, the authors analyze the network (eight agents) shape which is added one agent to a stable network (seven agents). Thirdly, the authors analyze interpersonal comparison of utility. The “star-network "was not found on the result of interaction among stable two small networks. On the other hand, “decentralized network" was formed from several combination. In case of added one agent to a stable network (seven agents), if the value of “c"(maintenance cost of per a link) was larger, the number of patterns of stable network was also larger. In this case, the authors identified the characteristics of a large stable network. The authors discovered the cases of decreasing personal utility under condition increasing total utility.Keywords: Social Network, Symmetric Situation, Network Stability, Agent-Based Modeling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15331819 Radio Regulation Development and Radio Spectrum Analysis of Earth Station in Motion Service
Authors: Fei Peng, Jun Yuan, Chen Fan, Fan Jiang, Qian Sun, Yudi Liu
Abstract:
Although Earth Station in Motion (ESIM) services are widely used and there is a huge market demand around the world, International Telecommunication Union (ITU) does not have unified conclusion for the use of ESIM yet. ESIM are Mobile Satellite Services (MSS) due to its mobile-based attributes, while multiple administrations want to use ESIM in Fixed Satellite Service (FSS). However, Radio Regulations (RR) have strict distinction between MSS and FSS. In this case, ITU has been very controversial because this kind of application will violate the RR Article and the conflict will bring risks to the global deployment. Thus, this paper illustrates the development of rules, regulations, standards concerning ESIM and the radio spectrum usage of ESIM in different regions around the world. Firstly, the basic rules, standard and definition of ITU’s Radiocommunication Sector (ITU-R) is introduced. Secondly, the World Radiocommunication Conference (WRC) agenda item on radio spectrum allocation for ESIM, e.g. in C/Ku/Ka band, is introduced and multi-view on the radio spectrum allocation is elaborated, especially on 19.7-20.2 GHz & 29.5-30.0 GHz. Then, some ITU-R Recommendations and Reports are analyzed on the specific technique to enable these ESIM to communicate with Geostationary Earth Orbit Satellite (GSO) space stations in the FSS without causing interference at levels in excess of that caused by conventional FSS earth stations. Meanwhile, the opposite opinion on not allocating EISM service in FSS frequency band is also elaborated. Finally, based on the ESIM’s future application, the ITU-R standards development trend is forecasted. In conclusion, using radio spectrum resource in an equitable, rational and efficient manner is the basic guideline of ITU. Although it is not a good approach to obstruct the revise of RR when there is a large demand for radio spectrum resource in satellite industry, still the propulsion and global demand of the whole industry may face difficulties on the unclear application in modify rules of RR.
Keywords: Earth Station in motion, ITU standards, radio regulations, radio spectrum, satellite communication.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11681818 Developing of Intelligent Schools with a New Model of Strategic Management System
Authors: Ahmad Ghayoumi, Mehdi Ghayoumi
Abstract:
Intelligent schools are those which use IT devices and technologies as media software, hardware and networks to improve learning process. On the other hand Strategic management is a field that deals with the major intended and emergent initiatives taken by general managers on behalf of owners, involving utilization of resources, to enhance the performance of firms in their external environments. Here, we present a model Strategic Management System that has been applied on some schools and have made strict improvement.Keywords: Intelligent school, Strategic management system, Learning station, Teaching station
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14001817 Cyber Aggression / Cyber Bullying and the Dark Triad: Effect on Workplace Behavior / Performance
Authors: Anishya Obhrai Madan
Abstract:
In an increasingly connected world, where speed of communication attempts to match the speed of thought and thus intentions; conflict gets actioned faster using media like the internet and telecommunication technology. This has led to a new form of aggression: “cyber bullying”. The present paper attempts to integrate existing theory on bullying, and the dark triad personality traits in a work environment and extrapolate it to the cyber context.
Keywords: Conflict at Work, Cyber bullying, Dark Triad of Personality, Toxic Employee.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 44501816 Enhancing the e-Government Functionality using Knowledge Management
Authors: Mohammad Al Rawajbeh, Ahmad Haboush
Abstract:
The primary aim of the e-government applications is the fast citizen service and the accomplishment of governmental functions. This paper discusses the knowledge management for egovernment development in the needs and role. The paper focused on analyzing the advantages of using knowledge management by using the existing IT technologies to maximize the government functions efficiency. The proposed new approach of providing government services is based on using Knowledge management as a part of e-government system.Keywords: E-government, knowledge management, e-service, etools, governmental functions.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1862