Search results for: personal expenses
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 466

Search results for: personal expenses

136 “Blood Family“ Activity With Respect To Comprehensive Guidance School Program

Authors: Ali Eryılmaz

Abstract:

Children and adolescents developing in the worlds of today are facing a getting array of new and old challenges. School counselling is improving rapidly in contemporary education systems around the world. It can be said that counselling system in Turkey was newly borning. In this study, “Family of the Blood" activity is improved with respect to compherensive guidance school program. The sample included 22 adolescents who were high school students. The activity was carried out in 4 sessions, each of which lasted 45 minutes. In the first session, students- personal-social needs were determined. In the second session, in order to warm up, the students were asked three questions consisting of the constructional aspect. In the third session, the counselor and the teacher shared the results of students- responses obtained in the previous session. In the fourth session, the tables formed by students were presented in the classroom. In order to evaluate the activity, three questions were asked of the teacher and counselor. According to the results, the lesson aims of curriculum and counselling aims of curriculum were attained. In the light of literature, the results were discussed and some suggestions were made. It is taken into consideration that the activitiy was beneficial in many respects, similar studies should be carried out in the near future.

Keywords: Comprehensive guidance program, education, family

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1306
135 Protocol and Method for Preventing Attacks from the Web

Authors: Ryuya Uda

Abstract:

Nowadays, computer worms, viruses and Trojan horse become popular, and they are collectively called malware. Those malware just spoiled computers by deleting or rewriting important files a decade ago. However, recent malware seems to be born to earn money. Some of malware work for collecting personal information so that malicious people can find secret information such as password for online banking, evidence for a scandal or contact address which relates with the target. Moreover, relation between money and malware becomes more complex. Many kinds of malware bear bots to get springboards. Meanwhile, for ordinary internet users, countermeasures against malware come up against a blank wall. Pattern matching becomes too much waste of computer resources, since matching tools have to deal with a lot of patterns derived from subspecies. Virus making tools can automatically bear subspecies of malware. Moreover, metamorphic and polymorphic malware are no longer special. Recently there appears malware checking sites that check contents in place of users' PC. However, there appears a new type of malicious sites that avoids check by malware checking sites. In this paper, existing protocols and methods related with the web are reconsidered in terms of protection from current attacks, and new protocol and method are indicated for the purpose of security of the web.

Keywords: Information Security, Malware, Network Security, World Wide Web

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2056
134 Influence of Social Factors and Motives on Commitment of Sport Events Volunteers

Authors: Farideh Sharififar, Zahra Jamalian, Reza Nikbakhsh, Zahra Nobakht Ramezani

Abstract:

In sport, human resources management gives special attention to method of applying volunteers, their maintenance, and participation of volunteers with each other and management approaches for better operation of events celebrants. The recognition of volunteers- characteristics and motives is important to notice, because it makes the basis of their participation and commitment at sport environment. The motivation and commitment of 281 volunteers were assessed using the organizational commitment scale, motivation scale and personal characteristics questionnaire.The descriptive results showed that; 64% of volunteers were women with age average 21/24 years old. They were physical education student, single (71/9%), without occupation (53%) and with average of 5 years sport experience. Their most important motivation was career factor and the most important commitment factor was normative factor. The results of examining the hypothesized showed that; age, sport experience and education are effective in the amount of volunteers- commitment. And the motive factors such as career, material, purposive and protective factors also have the power to predict the amount of sports volunteers- commitment value. Therefore it is recommended to provide possible opportunities for volunteers and carrying out appropriate instructional courses by events executive managers.

Keywords: Sport Volunteers, Motivation, Organizational Commitment, Sport Event

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2777
133 Image Transmission in Low-Power Networks in Mobile Communications Channel

Authors: M. A. M. El-Bendary, H. Kazimian, A. E. Abo-El-azm, N. A. El-Fishawy, F. El-Samie, F. Shawki

Abstract:

This paper studies a vital issue in wireless communications, which is the transmission of images over Wireless Personal Area Networks (WPANs) through the Bluetooth network. It presents a simple method to improve the efficiency of error control code of old Bluetooth versions over mobile WPANs through Interleaved Error Control Code (IECC) technique. The encoded packets are interleaved by simple block interleaver. Also, the paper presents a chaotic interleaving scheme as a tool against bursts of errors which depends on the chaotic Baker map. Also, the paper proposes using the chaotic interleaver instead of traditional block interleaver with Forward Error Control (FEC) scheme. A comparison study between the proposed and standard techniques for image transmission over a correlated fading channel is presented. Simulation results reveal the superiority of the proposed chaotic interleaving scheme to other schemes. Also, the superiority of FEC with proposed chaotic interleaver to the conventional interleavers with enhancing the security level with chaotic interleaving packetby- packet basis.

Keywords: Mobile Bluetooth terminals, WPANs, Jackes' model, Interleaving technique, chaotic interleaver

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1900
132 Using the Semantic Web in Ubiquitous and Mobile Computing: the Morfeo Experience

Authors: José M. Cantera, Miguel Jiménez, Genoveva López, Javier Soriano

Abstract:

With the advent of emerging personal computing paradigms such as ubiquitous and mobile computing, Web contents are becoming accessible from a wide range of mobile devices. Since these devices do not have the same rendering capabilities, Web contents need to be adapted for transparent access from a variety of client agents. Such content adaptation results in better rendering and faster delivery to the client device. Nevertheless, Web content adaptation sets new challenges for semantic markup. This paper presents an advanced components platform, called MorfeoSMC, enabling the development of mobility applications and services according to a channel model based on Services Oriented Architecture (SOA) principles. It then goes on to describe the potential for integration with the Semantic Web through a novel framework of external semantic annotation of mobile Web contents. The role of semantic annotation in this framework is to describe the contents of individual documents themselves, assuring the preservation of the semantics during the process of adapting content rendering, as well as to exploit these semantic annotations in a novel user profile-aware content adaptation process. Semantic Web content adaptation is a way of adding value to and facilitates repurposing of Web contents (enhanced browsing, Web Services location and access, etc).

Keywords: Semantic web, ubiquitous and mobile computing, web content transcoding, semantic markup, mobile computing middleware and services.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1580
131 Self-Perceived Employability of Students of International Relations of University of Warmia and Mazury in Poland

Authors: Marzena Świgoń

Abstract:

Nowadays, graduates should be prepared for serious challenges in the internal and external labor market. The notion that a degree is a “passport to employment” has been relegated to the past. In the last few years a phenomenon in the form of the increasing unemployment of highly educated young people in EU countries, including Poland has been observed. Empirical studies were conducted among Polish students in the scope of the so-called self-perceived employability review. In this study, a special scale was used which consisted of 19 statements regarding five components: student’s perception of university; field of study; self-belief; state of the external labor market; and, personal knowledge management. The respondent group consisted of final-year master’s students of International Relations at the University of Warmia and Mazury in Olsztyn, Poland. The findings of the empirical studies were compiled using statistical methods: descriptive statistics and inferential statistics. In general, in light of the conducted studies, the self-perceived employability of the Polish students was not high. Limitations of the studies were discussed, as well as the implications for future research in the scope of the students’ employability.

Keywords: Self-perceived employability, students of international relations, university education.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1418
130 Comparison of Nutritional and Chemical Parameters of Soymilk and Cow milk

Authors: Bahareh Hajirostamloo

Abstract:

Cow milk, is a product of the mammary gland and soymilk is a beverage made from soybeans; it is the liquid that remains after soybeans are soaked. In this research effort, we compared nutritional parameters of this two kind milk such as total fat, fiber, protein, minerals (Ca, Fe and P), fatty acids, carbohydrate, lactose, water, total solids, ash, pH, acidity and calories content in one cup (245 g). Results showed soymilk contains 4.67 grams of fat, 0.52 of fatty acids, 3.18 of fiber, 6.73 of protein, 4.43 of carbohydrate, 0.00 of lactose, 228.51 of water, 10.40 of total solids and 0.66 of ash, also 9.80 milligrams of Ca, 1.42 of Fe, and 120.05 of P, 79 Kcal of calories, pH=6.74 and acidity was 0.24%. Cow milk contains 8.15 grams of fat, 5.07 of fatty acids, 0.00 of fiber, 8.02 of protein, 11.37 of carbohydrate, ´Çá4.27 of lactose, 214.69 of water, 12.90 of total solids, 1.75 of ash, 290.36 milligrams of Ca, 0.12 of Fe, and 226.92 of P, 150 Kcal of calories, pH=6.90 and acidity was 0.21% . Soy milk is one of plant-based complete proteins and cow milk is a rich source of nutrients as well. Cow milk is containing near twice as much fat as and ten times more fatty acids do soymilk. Cow milk contains greater amounts of mineral (except Fe) it contain more than three hundred times the amount of Ca and nearly twice the amount of P as does soymilk but soymilk contains more Fe (ten time more) than does cow milk. Cow milk and soy milk contain nearly identical amounts of protein and water and fiber is a big plus, dairy has none. Although what we choose to drink is really a mater of personal preference and our health objectives but looking at the comparison, soy looks like healthier choices.

Keywords: Soymilk, cow milk, nutritional, comparison.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7275
129 Incidence of Gastrointestinal Parasites among Workers in Major Abattoirs in Port Harcourt, Rivers State, Nigeria

Authors: L. B. Gboeloh, K. Elele

Abstract:

Gastrointestinal parasitic infections are common health problems in sub-Saharan Africa. A cross- sectional study was carried out to determine the prevalence of gastrointestinal parasites among workers in major abattoirs in Port Harcourt, Nigeria. These abattoirs are located in Trans-Amadi, Rumuodumaya, Mile III and Easter-by-Pass. Formol-ether concentration technique was used to isolate the ova and cysts from faecal samples. Out of 201 workers (herdsmen, butchers, and cleaners) investigated for the presence of these parasites, 89 (44.2%) were infected with one or more parasites. The prevalence of the parasites among herdsmen and cleaners was significantly (P<0.05) higher. However, there was no significant (P>0.05) difference in the prevalence of gastrointestinal parasites in relation to age. Parasites identified included Ascaris lumbricoide (33.3%), tapeworm (4.97%), Entamoeba histolytica (5.47%), hookworms (13.9%), Trichuris trichiura (9.95%), Gardia lamblia (3.48%), and Schistosoma mansoni (1.9%). The frequency of A. lumbricoide was significantly (P<0.05) higher than other parasites. Many workers (65.2%) had single infection than double (23.6%) and triple infection (11.2%). Sanitary improvements, increased level of personal hygiene, routine surveillance by public health practitioners and veterinary experts as well as hygienic operation using modern technologies to process meat at these abattoirs will go a long way to control occupational gastrointestinal parasites among workers.

Keywords: Abattoirs, Gastrointestinal parasites, Port Harcourt, Workers.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2248
128 Design and Implementation of Medium Access Control Based Routing on Real Wireless Sensor Networks Testbed

Authors: Smriti Agarwal, Ashish Payal, B. V. R. Reddy

Abstract:

IEEE 802.15.4 is a Low Rate Wireless Personal Area Networks (LR-WPAN) standard combined with ZigBee, which is going to enable new applications in Wireless Sensor Networks (WSNs) and Internet of Things (IoT) domain. In recent years, it has become a popular standard for WSNs. Wireless communication among sensor motes, enabled by IEEE 802.15.4 standard, is extensively replacing the existing wired technology in a wide range of monitoring and control applications. Researchers have proposed a routing framework and mechanism that interacts with the IEEE 802.15.4 standard using software platform. In this paper, we have designed and implemented MAC based routing (MBR) based on IEEE 802.15.4 standard using a hardware platform “SENSEnuts”. The experimental results include data through light and temperature sensors obtained from communication between PAN coordinator and source node through coordinator, MAC address of some modules used in the experimental setup, topology of the network created for simulation and the remaining battery power of the source node. Our experimental effort on a WSN Testbed has helped us in bridging the gap between theoretical and practical aspect of implementing IEEE 802.15.4 for WSNs applications.

Keywords: IEEE 802.15.4, routing, wireless sensor networks, ZigBee.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1539
127 Design Guidelines for an Enhanced Interaction Experience in the Domain of Smartphone-Based Applications for Sport and Fitness

Authors: Paolo Pilloni, Fabrizio Mulas, Salvatore Carta

Abstract:

Nowadays, several research studies point up that an active lifestyle is essential for physical and mental health benefits. Mobile phones have greatly influenced people’s habits and attitudes also in the way they exercise. Our research work is mainly focused on investigating how to exploit mobile technologies to favour people’s exertion experience. To this end, we developed an exertion framework users can exploit through a real world mobile application, called EverywhereSport Run (EWRun), designed to act as a virtual personal trainer to support runners during their trainings. In this work, inspired by both previous findings in the field of interaction design for people with visual impairments, feedback gathered from real users of our framework, and positive results obtained from two experimentations, we present some new interaction facilities we designed to enhance the interaction experience during a training. The positive obtained results helped us to derive some interaction design recommendations we believe will be a valid support for designers of future mobile systems conceived to be used in circumstances where there are limited possibilities of interaction.

Keywords: Human Computer Interaction, Interaction Design Guidelines, Persuasive Mobile Technologies for Sport and Health.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1905
126 Assessing Pre-Service Teachers' Computer PhobiaLevels in terms of Gender and Experience, Turkish Sample

Authors: Ö.F. Ursavas, H. Karal

Abstract:

In this study it is aimed to determine the level of preservice teachers- computer phobia. Whether or not computer phobia meaningfully varies statistically according to gender and computer experience has been tested in the study. The study was performed on 430 pre-service teachers at the Education Faculty in Rize/Turkey. Data in the study were collected through the Computer Phobia Scale consisting of the “Personal Knowledge Questionnaire", “Computer Anxiety Rating Scale", and “Computer Thought Survey". In this study, data were analyzed with statistical processes such as t test, and correlation analysis. According to results of statistical analyses, computer phobia of male pre-service teachers does not statistically vary depending on their gender. Although male preservice teachers have higher computer anxiety scores, they have lower computer thought scores. It was also observed that there is a negative and intensive relation between computer experience and computer anxiety. Meanwhile it was found out that pre-service teachers using computer regularly indicated lower computer anxiety. Obtained results were tried to be discussed in terms of the number of computer classes in the Education Faculty curriculum, hours of computer class and the computer availability of student teachers.

Keywords: Computer phobia, computer anxiety, computer thought, pre-service teachers.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2191
125 Implementation of A Photo-Curable 3D Additive Manufacturing Technology with Coloring Gray Capability by Using Piezo Ink-Jet

Authors: Ming-Jong Tsai, Y. L. Cheng, Y. L. Kuo, S. Y. Hsiao, J .W. Chen, P. H. Liu, D. H. Chen

Abstract:

The 3D printing is a combination of digital technology, material science, intelligent manufacturing and control of opto-mechatronics systems. It is called the third industrial revolution from the view of the Economist Journal. A color 3D printing machine may provide the necessary support for high value-added industrial and commercial design, architectural design, personal boutique, and 3D artist’s creation. The main goal of this paper is to develop photo-curable color 3D manufacturing technology and system implementation. The key technologies include (1) Photo-curable color 3D additive manufacturing processes development and materials research (2) Piezo type ink-jet head control and Opto-mechatronics integration technique of the photo-curable color 3D laminated manufacturing system. The proposed system is integrated with single Piezo type ink-jet head with two individual channels for two primary UV light curable color resins which can provide for future colorful 3D printing solutions. The main research results are 16 grey levels and grey resolution of 75 dpi. 

Keywords: 3d printing, additive manufacturing, color, photo-curable, Piezo type ink-jet, UV Resin.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2102
124 Triangular Geometric Feature for Offline Signature Verification

Authors: Zuraidasahana Zulkarnain, Mohd Shafry Mohd Rahim, Nor Anita Fairos Ismail, Mohd Azhar M. Arsad

Abstract:

Handwritten signature is accepted widely as a biometric characteristic for personal authentication. The use of appropriate features plays an important role in determining accuracy of signature verification; therefore, this paper presents a feature based on the geometrical concept. To achieve the aim, triangle attributes are exploited to design a new feature since the triangle possesses orientation, angle and transformation that would improve accuracy. The proposed feature uses triangulation geometric set comprising of sides, angles and perimeter of a triangle which is derived from the center of gravity of a signature image. For classification purpose, Euclidean classifier along with Voting-based classifier is used to verify the tendency of forgery signature. This classification process is experimented using triangular geometric feature and selected global features. Based on an experiment that was validated using Grupo de Senales 960 (GPDS-960) signature database, the proposed triangular geometric feature achieves a lower Average Error Rates (AER) value with a percentage of 34% as compared to 43% of the selected global feature. As a conclusion, the proposed triangular geometric feature proves to be a more reliable feature for accurate signature verification.

Keywords: biometrics, euclidean classifier, feature extraction, offline signature verification, VOTING-based classifier

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1921
123 Key Issues in Transfer Stage of BOT Project: Experience from China

Authors: Wang Liguang, Zhang Xueqing

Abstract:

The build-operate-transfer (BOT) project delivery system has provided effective routes to mobilize private sector funds, innovative technologies, management skills and operational efficiencies for public infrastructure development and have been widely used in China during the last 20 years. Many BOT projects in China will be smoothly transferred to the government soon and the transfer stage, which is considered as the last stage, must be studied carefully and handled well to achieve the overall success of BOT projects. There will be many issues faced by both the public sector and private sector in the transfer stage of BOT projects, including project post-assessment, technology and documents transfer, personal training and staff transition, etc. and sometimes additional legislation is needed for future operation and management of facilities. However, most previous studies focused on the bidding, financing, and building and operation stages instead of transfer stage. This research identifies nine key issues in the transfer stage of BOT projects through a comprehensive study on three cases in China, and the expert interview and expert discussion meetings are held to validate the key issues and give detail analysis. A proposed framework of transfer management is prepared based on the experiences derived and lessons drawn from the case studies and expert interview and discussions, which is expected to improve the transfer management of BOT projects in practice.

Keywords: BOT project, key issues, transfer management transfer stage.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 999
122 Sex Education: A Need for Students with Disabilities in India

Authors: Gaurav

Abstract:

Sexuality remains a personal or a private matter of discussion in the Indian society and generally discussed among the same age group or gender. Complete absence of the sex education has caused serious implications for the students with disabilities in Indian society. There are widespread perceptions that student with disabilities are ‘asexual’, ‘unattractive’ and therefore cannot be considered sexually desirable. Such perceptions continue to reinforce the other perceptions that student with disabilities are somehow incapable of being in an intimate relationship in the life and therefore they do not need any learning related to the sex education. We need to understand that if a student has a disability, it does not mean that student have no emotional feelings, hormones and sexual desires like any other student without disability. Sexuality is an integral part of every human life and should not be seen as matter of shame and guilt. Unfortunately, the concept of the sex education is misunderstood in itself. Instead of realizing the crucial importance of sex education for the students with disabilities or non-disabilities, it is often considered mainly as an education about ‘how to have sexual intercourse’. One needs to understand that it is not just about sexual conduct but also about the gender and sexual identity, self-esteem, self protection and acceptance of self. This research paper examined issues and debates around the sex education, particularly in context of the students with disabilities in India and focuses on how students with disabilities themselves see the need of sex (health) education. To understand their perceptions, descriptive survey method was used. It was found that most of the students among respondent were comfortable and felt it as a strong need for such orientation during their schooling. The paper emphasizes that sex education is a need of the time and further a necessity. Hence it is important for our education system to implement it for the complete well being of the students with disabilities.

Keywords: Disabilities, identity, sexuality, sex education.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 739
121 The Cost of Innovation in Software Development Projects

Authors: Mihai Liviu Despa

Abstract:

The paper tackles the topic of determining the cost of innovation in software development projects. Innovation can be achieved either in a planned or unplanned manner. The paper approaches the scenarios were innovation is planned for. As a starting point an innovative software development project is analyzed. The project is depicted step by step as it was implemented, from inception to delivery. Costs that are proprietary to innovation in software development are isolated based on the author’s personal experience in managing the above mentioned project. Innovation costs components identified by the author are then validated using open discussions with software development professionals and projects managers on LinkedIn groups. In order to receive relevant feedback only groups that focus on software development and innovation management are targeted. Additional innovation cost components suggested by software development professionals and projects managers are also considered. Based on the identified cost components an indicator is built. The indicator is meant to formalize the process of determining the cost of innovation in a software development project. The indicator aggregates all the innovation cost components that are identified in the research process. The process of calculating each cost component is also described. Conclusions are formulated and new related research topics are submitted for debate.

Keywords: Innovation cost, IT project management, software development.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2021
120 Pure Scalar Equilibria for Normal-Form Games

Authors: H. W. Corley

Abstract:

A scalar equilibrium (SE) is an alternative type of equilibrium in pure strategies for an n-person normal-form game G. It is defined using optimization techniques to obtain a pure strategy for each player of G by maximizing an appropriate utility function over the acceptable joint actions. The players’ actions are determined by the choice of the utility function. Such a utility function could be agreed upon by the players or chosen by an arbitrator. An SE is an equilibrium since no players of G can increase the value of this utility function by changing their strategies. SEs are formally defined, and examples are given. In a greedy SE, the goal is to assign actions to the players giving them the largest individual payoffs jointly possible. In a weighted SE, each player is assigned weights modeling the degree to which he helps every player, including himself, achieve as large a payoff as jointly possible. In a compromise SE, each player wants a fair payoff for a reasonable interpretation of fairness. In a parity SE, the players want their payoffs to be as nearly equal as jointly possible. Finally, a satisficing SE achieves a personal target payoff value for each player. The vector payoffs associated with each of these SEs are shown to be Pareto optimal among all such acceptable vectors, as well as computationally tractable.

Keywords: Compromise equilibrium, greedy equilibrium, normal-form game, parity equilibrium, pure strategies, satisficing equilibrium, scalar equilibria, utility function, weighted equilibrium.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 160
119 AHP and Extent Fuzzy AHP Approach for Prioritization of Performance Measurement Attributes

Authors: Remica Aggarwal, Sanjeet Singh

Abstract:

The decision to recruit manpower in an organization requires clear identification of the criteria (attributes) that distinguish successful from unsuccessful performance. The choice of appropriate attributes or criteria in different levels of hierarchy in an organization is a multi-criteria decision problem and therefore multi-criteria decision making (MCDM) techniques can be used for prioritization of such attributes. Analytic Hierarchy Process (AHP) is one such technique that is widely used for deciding among the complex criteria structure in different levels. In real applications, conventional AHP still cannot reflect the human thinking style as precise data concerning human attributes are quite hard to be extracted. Fuzzy logic offers a systematic base in dealing with situations, which are ambiguous or not well defined. This study aims at defining a methodology to improve the quality of prioritization of an employee-s performance measurement attributes under fuzziness. To do so, a methodology based on the Extent Fuzzy Analytic Hierarchy Process is proposed. Within the model, four main attributes such as Subject knowledge and achievements, Research aptitude, Personal qualities and strengths and Management skills with their subattributes are defined. The two approaches conventional AHP approach and the Extent Fuzzy Analytic Hierarchy Process approach have been compared on the same hierarchy structure and criteria set.

Keywords: AHP, Extent analysis method, Fuzzy AHP, Prioritization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4834
118 Investigating the Individual Difference Antecedents of Perceived Enjoyment in the Acceptance of Blogging

Authors: Yi-Shun Wang, Hsin-Hui Lin, Yi-Wen Liao

Abstract:

With the proliferation of Weblogs (blogs) use in educational contexts, gaining a better understanding of why students are willing to utilize blog systems has become an important topic for practitioners and academics. While perceived enjoyment has been found to have a significant influence on behavioral intentions to use blogs or hedonic systems, few studies have investigated the antecedents of perceived enjoyment in the acceptance of blogging. The main purpose of the present study is to explore the individual difference antecedents of perceived enjoyment and examine how they influence behavioral intention to blog through the mediation of perceived enjoyment. Based on the previous literature, the Big Five personality traits (i.e., extraversion, agreeableness, conscientiousness, neuroticism, and openness to experience), as well as computer self-efficacy and personal innovation in information technology (PIIT), are hypothesized as potential antecedents of perceived enjoyment in the acceptance of blogging. Data collected from 358 respondents in Taiwan are tested against the research model using the structural equation modeling approach. The results indicate that extraversion, agreeableness, conscientiousness, and PIIT have a significant influence on perceived enjoyment, which in turn significantly influences the behavioral intention to blog. These findings lead to several important implications for future research.

Keywords: Individual difference, Big Five personality traits, perceived enjoyment, blogging

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2076
117 Privacy in New Mobile Payment Protocol

Authors: Tan Soo Fun, Leau Yu Beng, Rozaini Roslan, Habeeb Saleh Habeeb

Abstract:

The increasing development of wireless networks and the widespread popularity of handheld devices such as Personal Digital Assistants (PDAs), mobile phones and wireless tablets represents an incredible opportunity to enable mobile devices as a universal payment method, involving daily financial transactions. Unfortunately, some issues hampering the widespread acceptance of mobile payment such as accountability properties, privacy protection, limitation of wireless network and mobile device. Recently, many public-key cryptography based mobile payment protocol have been proposed. However, limited capabilities of mobile devices and wireless networks make these protocols are unsuitable for mobile network. Moreover, these protocols were designed to preserve traditional flow of payment data, which is vulnerable to attack and increase the user-s risk. In this paper, we propose a private mobile payment protocol which based on client centric model and by employing symmetric key operations. The proposed mobile payment protocol not only minimizes the computational operations and communication passes between the engaging parties, but also achieves a completely privacy protection for the payer. The future work will concentrate on improving the verification solution to support mobile user authentication and authorization for mobile payment transactions.

Keywords: Mobile Network Operator, Mobile payment protocol, Privacy, Symmetric key.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2095
116 Exploring the Narrative Communication: Representing Visual Information from Digital Travel Stories

Authors: Rocío Abascal-Mena, Erick López-Ornelas

Abstract:

We present the results of a case study aiming to assess the reflection of the tourism community in the Web and its usability to propose new ways to communicate visually. The wealth of information contained in the Web and the clear facilities to communicate personals points of view makes of the social web a new space of exploration. In this way, social web allow the sharing of information between communities with similar interests. However, the tourism community remains unexplored as is the case of the information covered in travel stories. Along the Web, we find multiples sites allowing the users to communicate their experiences and personal points of view of a particular place of the world. This cultural heritage is found in multiple documents, usually very little supplemented with photos, so they are difficult to explore due to the lack of visual information. This paper explores the possibility of analyzing travel stories to display them visually on maps and generate new knowledge such as patterns of travel routes. This way, travel narratives published in electronic formats can be very important especially to the tourism community because of the great amount of knowledge that can be extracted. Our approach is based on the use of a Geoparsing Web Service to extract geographic coordinates from travel narratives in order to draw the geo-positions and link the documents into a map image.

Keywords: Social web, tourism community, visual communication, travel stories, geo references.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1606
115 Criminal Law Instruments to Counter Corporate Crimes in Poland

Authors: Dorota Habrat

Abstract:

The aim of study was to analyze the functioning the new model of criminal corporate responsibility in Poland. The need to introduce into the Polish legal system liability of corporate (collective entities) has resulted, among others, from the Polish Republic's international commitments, in particular related to membership in the European Union. The study showed that responsibility of collective entities under the Act has a criminal nature. The main question concerns the ability of the collective entity to be brought to guilt under criminal law sense. Polish criminal law knows only the responsibility of individual persons. So far, guilt as a personal feature of action, based on the ability of the offender to feel in his psyche, could be considered only in relation to the individual person, while the said Act destroyed this conviction. Guilt of collective entity must be proven under at least one of the three possible forms: the guilt in the selection or supervision and so called organizational guilt. In addition, research in article has resolved the issue how the principle of proportionality in relation to criminal measures in response of collective entities should be considered. It should be remembered that the legal subjectivity of collective entities, including their rights and freedoms, is an emanation of the rights and freedoms of individual persons which create collective entities and through these entities implement their rights and freedoms. The whole study was proved that the adopted Act largely reflects the international legal regulations but also contains the unknown and original legislative solutions.

Keywords: Criminal corporate responsibility, Polish criminal law.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1529
114 Vehicle Risk Evaluation in Low Speed Accidents: Consequences for Relevant Test Scenarios

Authors: Philip Feig, Klaus Gschwendtner, Julian Schatz, Frank Diermeyer

Abstract:

Projects of accident research analysis are mostly focused on accidents involving personal damage. Property damage only has a high frequency of occurrence combined with high economic impact. This paper describes main influencing parameters for the extent of damage and presents a repair cost model. For a prospective evaluation method of the monetary effect of advanced driver assistance systems (ADAS), it is necessary to be aware of and quantify all influencing parameters. Furthermore, this method allows the evaluation of vehicle concepts in combination with an ADAS at an early point in time of the product development process. In combination with a property damage database and the introduced repair cost model relevant test scenarios for specific vehicle configurations and their individual property damage risk may be determined. Currently, equipment rates of ADAS are low and a purchase incentive for customers would be beneficial. The next ADAS generation will prevent property damage to a large extent or at least reduce damage severity. Both effects may be a purchasing incentive for the customer and furthermore contribute to increased traffic safety.

Keywords: Property damage analysis, effectiveness, ADAS, damage risk, accident research, accident scenarios.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1349
113 Mediation in Turkish Health Law for Healthcare Disputes

Authors: V. Durmus, M. Uydaci

Abstract:

In order to prevent overburdened courts, rising costs of litigation, and lengthy trial resolutions, the Law on Mediation for Civil Disputes was enacted, which was aimed at defining the procedure and guiding principles for dispute resolutions under Civil Law, in 2012. This “Mediation Code” also applies for civil healthcare disputes in Turkey. Aside from mediation, reconciliation, governed by Articles 253-255 of Criminal Procedure Law, has emerged as an alternative way to resolve criminal medical disputes, but the difference between mediation and conciliation is mostly procedural. This article deals with mediation in Turkish health law and aspect of medical malpractice mediation in Turkey. In addition, this study examines the issue of mediation in health law from both a legal and normative point of view, including codes of mediation which regulate both the structural and professional practice of mediation providers. As a result, although there is not official record about success rate of medical malpractice litigations and malpractice mediation in Turkey, it is widely accepted that the success rate for medical malpractice cases is relatively low compared to other personal injury cases even if it is generally considered that medical malpractice case filings have gradually increased recently. According to the Justice Ministry’s Department of Mediation in Turkey, 719 civil disputes have referred to mediators since 2013 (when the first mediation law came into force) with a 98% success rate.

Keywords: Malpractice mediation, medical disputes, reconciliation, health litigation, Turkish Health Law.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1429
112 Toward Delegated Democracy: Vote by Yourself, or Trust Your Network

Authors: Hiroshi Yamakawa, Michiko Yoshida, Motohiro Tsuchiya

Abstract:

The recent development of Information and Communication Technology (ICT) enables new ways of "democratic" decision-making such as a page-ranking system, which estimates the importance of a web page based on indirect trust on that page shared by diverse group of unorganized individuals. These kinds of "democracy" have not been acclaimed yet in the world of real politics. On the other hand, a large amount of data about personal relations including trust, norms of reciprocity, and networks of civic engagement has been accumulated in a computer-readable form by computer systems (e.g., social networking systems). We can use these relations as a new type of social capital to construct a new democratic decision-making system based on a delegation network. In this paper, we propose an effective decision-making support system, which is based on empowering someone's vote whom you trust. For this purpose, we propose two new techniques: the first is for estimating entire vote distribution from a small number of votes, and the second is for estimating active voter choice to promote voting using a delegation network. We show that these techniques could increase the voting ratio and credibility of the whole decision by agent-based simulations.

Keywords: Delegation, network centrality, social network, voting ratio.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1738
111 Educational Experiences in Engineering in the COVID-19 Era and Their Comparative Analysis: Spain, March-June 2020

Authors: Borja Bordel, Ramón Alcarria, Marina Pérez

Abstract:

In March 2020, in Spain, a sanitary and unexpected crisis caused by COVID-19 was declared. All of a sudden, all degrees, classes and evaluation tests and projects had to be transformed into online activities. However, the chaotic situation generated by a complex operation like that, executed without any well-established procedure, led to very different experiences and, finally, results. In this paper, we are describing three experiences in two different Universities in Madrid. On the one hand, the Technical University of Madrid, a public university with little experience in online education was considered. On the other hand, Alfonso X el Sabio University, a private university with more than five years of experience in online teaching was involved. All analyzed subjects were related to computer engineering. Professors and students answered a survey and personal interviews were also carried out. Besides, the professors’ workload and the students’ academic results were also compared. From the comparative analysis of all these experiences, we are extracting the most successful strategies, methodologies, and activities. The recommendations in this paper will be useful for courses during the next months when the sanitary situation is still affecting an educational organization. While, at the same time, they will be considered as input for the upcoming digitalization process of higher education.

Keywords: educational experience, online education, higher education digitalization, COVID, Spain

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 405
110 Understanding Factor Influence in Mask-Wearing Intention Onboard Airplanes during COVID-19: Attitude as a Mediator

Authors: Jing Yu Pan, Dahai Liu

Abstract:

Airlines in the US have taken protective measures to battle the COVID-19 pandemic, with a mask mandate being the most important one, especially in the aircraft cabin. As the airline industry is recovering from the pandemic, mask-wearing will eventually become a personal choice during a flight. Nevertheless, COVID-19 will continue to create uncertainty for a long time into the future, making it necessary to understand the attitude and voluntary use of masks by air travelers on airplanes even after masks are no longer mandatory. This study aimed to understand the relationship between demographic characteristics and mask-wearing intention in the US. For age, gender, income, educational, and ethnicity groups, this study examined three factors – subjective norms, risk avoidance, and information seeking and their influence on the mask-wearing intention onboard airplanes during COVID-19, and whether or not attitude toward masks was an important mediator. The results show that all demographic factors except gender could help to explain the group variations in factor impact and the mediating effect in mask-wearing intentions. In particular, Asian travelers had mask-wearing intentions that were not affected by attitude either directly or indirectly. These findings provide useful implications to enhance the health safety of air travelers, especially in the US where opposing views toward mask-wearing still widely exist.

Keywords: COVID-19, passenger demographics, aircraft cabin, mask-wearing intention, attitude as mediator.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 409
109 Closing the Achievement Gap Within Reading and Mathematics Classrooms by Fostering Hispanic Students- Educational Resilience

Authors: Hersh C. Waxman, Yolanda N. Padrón, Jee-Young Shin, Héctor H. Rivera

Abstract:

While many studies have conducted the achievement gap between groups of students in school districts, few studies have utilized resilience research to investigate achievement gaps within classrooms. This paper aims to summarize and discuss some recent studies Waxman, Padr├│n, and their colleagues conducted, in which they examined learning environment differences between resilient and nonresilient students in reading and mathematics classrooms. The classes consist of predominantly Hispanic elementary school students from low-income families. These studies all incorporated learning environment questionnaires and systematic observation methods. Significant differences were found between resilient and nonresilient students on their classroom learning environments and classroom behaviors. The observation results indicate that the amount and quality of teacher and student academic interaction are two of the most influential variables that promote student outcomes. This paper concludes by suggesting the following teacher practices to promote resiliency in schools: (a) using feedback from classroom observation and learning environment measures, (b) employing explicit teaching practices; and (c) understanding students on a social and personal level.

Keywords: achievement gap, classroom learning environments, educational resilience, systematic classroom observation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1942
108 Ideological Tendencies of the Teachers about the Causes of Vandalism in Schools and Solution Proposals

Authors: Sevgi Birsel Nemlioğlu, Hasan Atak

Abstract:

Aggression is a behavior that cannot be approved by the society. Vandalism which is aggression towards objects is an action that tends to damage public or personal property. The behaviors that are described as vandalism can often be observed in the schools as well. According to Zwier and Vaughan (1) previous research about the reasons of and precautionary measures for vandalism in schools can be grouped in three tendency categories: conservative, liberal and radical. In this context, the main aim of this study is to discover which ideological tendency of the reasons of school vandalism is adopted by the teachers and what are their physical, environmental, school system and societal solutions for vandalism. A total of 200 teachers participated in this study, and the mean age was 34.20 years (SD = 6.54). The sample was made up of 109 females and 91 males. For the analysis of the data, SPSS 15.00, frequency, percentage, and t-test were used. The research showed that the teachers have tendencies in the order of conservative, liberal and radical for the reasons of vandalism. The research also showed that the teachers do not have any tendency for eliminating vandalism physically and general solutions on the level of society; on the other hand they mostly adopt a conservative tendency in terms of precautions against vandalism in the school system. Second most, they adopt the liberal tendency in terms of precautions against vandalism in the school system. . It is observed that the findings of this study are comparable to the existing literature on the subject. Future studies should be conducted with multiple variants and bigger sampling.

Keywords: Vandalism, School, Vandal, Turkey, Teacher, Tendency.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1901
107 110 MW Geothermal Power Plant Multiple Simulator, Using Wireless Technology

Authors: Guillermo Romero-Jiménez, Luis A. Jiménez-Fraustro, Mayolo Salinas-Camacho, Heriberto Avalos-Valenzuela

Abstract:

A geothermal power plant multiple simulator for operators training is presented. The simulator is designed to be installed in a wireless local area network and has a capacity to train one to six operators simultaneously, each one with an independent simulation session. The sessions must be supervised only by one instructor. The main parts of this multiple simulator are: instructor and operator-s stations. On the instructor station, the instructor controls the simulation sessions, establishes training exercises and supervises each power plant operator in individual way. This station is hosted in a Main Personal Computer (NS) and its main functions are: to set initial conditions, snapshots, malfunctions or faults, monitoring trends, and process and soft-panel diagrams. On the other hand the operators carry out their actions over the power plant simulated on the operator-s stations; each one is also hosted in a PC. The main software of instructor and operator-s stations are executed on the same NS and displayed in PCs through graphical Interactive Process Diagrams (IDP). The geothermal multiple simulator has been installed in the Geothermal Simulation Training Center (GSTC) of the Comisi├│n Federal de Electricidad, (Federal Commission of Electricity, CFE), Mexico, and is being utilized as a part of the training courses for geothermal power plant operators.

Keywords: Geothermal power plant, multiple simulator, training operator.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2017