Search results for: false belief
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 853

Search results for: false belief

523 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine

Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour

Abstract:

Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.

Keywords: decision tree, feature selection, intrusion detection system, support vector machine

Procedia PDF Downloads 265
522 Cultural Tourism, The Gateway to Socioeconomic Development in Nigeria: Case Study on Osun State Nigeria

Authors: Osinubi Olufemi Bankole

Abstract:

Cultural tourism is an industry committed to making a low impact on the environment, locale culture, festival, etc. while helping to generate income and employment opportunities for the locale. Tourists who promote cultural tourism are sensitive to the cultural belief and norms that are gradually going into extinction and the rich cultural resources that abound in Nigeria. The paper focus on culture been a unique way of life of particular people that differentiates them from their neighbors. It examined the socioeconomic roles of cultural tourism to the development of Nigeria using Osun state as case study. The data collected were analyzed using simple percentage method, result shows that 35 respondents representing 87.5% agreed that cultural tourism has a significant role to play in the socioeconomic development of Nigeria. The study concluded that cultural tourism is an important aspect of the nation’s economic sector that should be given adequate consideration for economic sustainability. The researcher recommended that various investment opportunities abound in the nation’s cultural resources if well developed and maintained.

Keywords: culture, development, industry, tourism

Procedia PDF Downloads 375
521 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection

Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim

Abstract:

As internet continues to expand its usage with an enormous number of applications, cyber-threats have significantly increased accordingly. Thus, accurate detection of malicious traffic in a timely manner is a critical concern in today’s Internet for security. One approach for intrusion detection is to use Machine Learning (ML) techniques. Several methods based on ML algorithms have been introduced over the past years, but they are largely limited in terms of detection accuracy and/or time and space complexity to run. In this work, we present a novel method for intrusion detection that incorporates a set of supervised learning algorithms. The proposed technique provides high accuracy and outperforms existing techniques that simply utilizes a single learning method. In addition, our technique relies on partial flow information (rather than full information) for detection, and thus, it is light-weight and desirable for online operations with the property of early identification. With the mid-Atlantic CCDC intrusion dataset publicly available, we show that our proposed technique yields a high degree of detection rate over 99% with a very low false alarm rate (0.4%).

Keywords: intrusion detection, supervised learning, traffic classification, computer networks

Procedia PDF Downloads 349
520 Crossroads of Care: Ethical Navigation in Faith-Based Counseling

Authors: Alexander Dolin

Abstract:

In the practice of Faith-based counseling, the clinician frequently faces multifaceted issues that come together when theological directives meet professional ethics to create a special set of dilemmas. The study narrates one working through the professional dilemmas of these Faith-based counselors, thereby looking into the tensions between the necessity of fidelity to faith and the requirements to follow the American Counseling Association Code of Ethics. Through a qualitative analysis of interviews with practitioners from various denominational backgrounds, the study has identified common ethical challenges and best practices that enable the integration of faith and ethics in practice. The findings provide insight into how faith-based counselors would reconcile a situation of conflict between religious belief and professional obligations but are striving to provide care that honors both their spiritual convictions and ethical responsibilities. This will add to existing discussions related to ethical decision-making in faith-based counseling by providing practical ways of dealing with these dilemmas in support of the counselor's professional integrity and spiritual mission.

Keywords: ethics, faith, common challenges, practical tools, counseling

Procedia PDF Downloads 28
519 The Evolving Changes of Religious Behavior: an Exploratory Study on Guanyin Worship of Contemporary Chinese Societies

Authors: Judith Sue Hwa Joo

Abstract:

Guanyin (Avalokiteśvara in Sanskrit), the Bodhisattva of Mercy and Compassion, is the most widely worshipped Buddhist Divinity in Chinese societies and is also believed by more than half of Asian populations across various countries. The most overwhelming reason for the popularity of Guanyin in Chinese societies is, according to the Lotus Sutra, that Guanyin would apperceive voices of those suffering from immense afflictions and troubles, and liberate them upon crying for his/her holy name with wholeheartedness. Its pervasive social influence has spanned more than two thousand years and is still deeply affecting the lives of most Chinese people. This study aimed to investigate whether Guanyin Worship has evolved and changed in modern Chinese societies across the Taiwan Strait. Taiwan and China, albeit having the same language and culture, have been territorially divided and governed by two different political regimes for over 70 years. It would be scientifically intriguing to unveil any substantial changes in religious behaviors in the context of Guanyin Worship. A comprehensive anonymous questionnaire survey in Chinese communities was conducted from October 2017 to May 2019 across various countries, mostly in China, Taiwan, and Hong Kong areas. Since the religious survey is officially prohibited in China, the study was difficult and could only be exercised by means of snowball sampling. Demographic data (age, sex, education, religious belief) were registered and Guanyin’s salvation functions under various confronting situations were investigated. Psychological dimensions of religious belief in Guanyin were probed in terms of the worship experience, the willingness of veneration, and egoistic or altruistic ideations. A literature review on documented functional attributes was carried out in parallel for comparison analyses with traditional roles. Effective 1123 out of 1139 samples were obtained. Statistical analysis revealed that Guanyin Worship is still commonly practiced and deeply rooted in the hearts of all Chinese people regardless of gender, age, education, and residential area, even though they may not enshrine Guanyin at home nowadays. The conventional roles of Guanyin Bodhisattva are still valid and best satisfy the real interests of lifestyles in modern times. When comparing the traditional Buddhist Sutra and the documented literature, the divine power of modern Guanyin has notably empowered to recover, protect and transform fetal and infant spirits due to the sexual liberation, increased abortion rate, gender awakening and enhanced female autonomy in the reproductive decision. However, the One-Child policy may have critically impacted the trajectory of Guanyin Worship so that people in China prevail over those in Taiwan praying for aborted lives or premature deaths. Furthermore, particularly in Hong Kong and Macao, Guanyin not only serves as the sea guardian for the fishermen but also additional services a new function as the God of Wealth. The divine powers and salvation functions of Guanyin are indeed evolving and expanding to comply with the modern psychosocial, cultural and societal needs. This study sheds light on the modernization process of the two-thousand-year-old Guanyin Worship of contemporary Chinese societies.

Keywords: Buddhism, Guanyin, religious behavior, salvation function

Procedia PDF Downloads 114
518 Media, Myth and Hero: Sacred Political Narrative in Semiotic and Anthropological Analysis

Authors: Guilherme Oliveira

Abstract:

The assimilation of images and their potential symbolism into lived experiences is inherent. It is through this exercise of recognition via imagistic records that the questioning of the origins of a constant narrative stimulated by the media arises. The construction of the "Man" archetype and the reflections of active masculine imagery in the 21st century, when conveyed through media channels, could potentially have detrimental effects. Addressing this systematic behavioral chronology of virile cisgender, permeated imagistically through these means, involves exploring potential resolutions. Thus, an investigation process is initiated into the potential representation of the 'hero' in this media emulation through idols contextualized in the political sphere, with the purpose of elucidating the processes of simulation and emulation of narratives based on mythical, historical, and sacred accounts. In this process of sharing, the narratives contained in the imagistic structuring offered by information dissemination channels seek validation through a process of public acceptance. To achieve this consensus, a visual set adorned with mythological and sacred symbolisms adapted to the intended environment is promoted, thus utilizing sociocultural characteristics in favor of political marketing. Visual recognition, therefore, becomes a direct reflection of a cultural heritage acquired through lived human experience, stimulated by continuous representations throughout history. Echoes of imagery and narratives undergo a constant process of resignification of their concepts, sharpened by their premises, and adapted to the environment in which they seek to establish themselves. Political figures analyzed in this article employ the practice of taking possession of symbolisms, mythological stories, and heroisms and adapt their visual construction through a continuous praxis of emulation. Thus, they utilize iconic mythological narratives to gain credibility through belief. Utilizing iconic mythological narratives for credibility through belief, the idol becomes the very act of release of trauma, offering believers liberation from preconceived concepts and allowing for the attribution of new meanings. To dissolve this issue and highlight the subjectivities within the intention of the image, a linguistic, semiotic, and anthropological methodology is created. Linguistics uses expressions like 'Blaming the Image' to create a mechanism of expressive action in questioning why to blame a construction or visual composition and thus seek answers in the first act. Semiotics and anthropology develop an imagistic atlas of graphic analysis, seeking to make connections, comparisons, and relations between modern and sacred/mystical narratives, emphasizing the different subjective layers of embedded symbolism. Thus, it constitutes a performative act of disarming the image. It creates a disenchantment of the superficial gaze under the constant reproduction of visual content stimulated by virtual networks, enabling a discussion about the acceptance of caricatures characterized by past fables.

Keywords: image, heroic narrative, media heroism, virile politics, political, myth, sacred performance, visual mythmaking, characterization dynamics

Procedia PDF Downloads 50
517 Web-Based Intervention for Addressing Cigarette Smoking Prevention among College Students

Authors: Farzad Jalilian, Mehdi Mirzaei Alavijeh, Mohammad Ahmadpanah, Behzad Karami Matin, Abbas Aghaei, Ahmad Ali Eslami

Abstract:

Background: Smoking is introduced as one of the main risky factors to develop different types of diseases around the world, especially related to non-contagious diseases. The goal of the present study was assessment of the effectiveness of web based education program to prevent cigarette smoking among college students. Methods: In a randomized controlled trial, during 2014, 150 male college students in Isfahan and Kermanshah University of medical sciences were assigned to intervention group (receiving web based education program) and control groups. The study information was analyzed by SPSS software version 21 using cross-tabulation, t-test, repeated measures and GEE. Results: It was found significantly that average response for attitude towards cigarette smoking and sensation seeking after education reduced (P < 0.05). After intervention there was no significant difference between intervention and control group of cigarette smoking (P > 0.05). Conclusion: web based education have usefulness to reduce belief towards cigarette smoking.

Keywords: web-based intervention, smoking, students, Iran

Procedia PDF Downloads 484
516 Strabismus Detection Using Eye Alignment Stability

Authors: Anoop T. R., Otman Basir, Robert F. Hess, Ben Thompson

Abstract:

Strabismus refers to a misalignment of the eyes. Early detection and treatment of strabismus in childhood can prevent the development of permanent vision loss due to abnormal development of visual brain areas. Currently, many children with strabismus remain undiagnosed until school entry because current automated screening methods have limited success in the preschool age range. A method for strabismus detection using eye alignment stability (EAS) is proposed. This method starts with face detection, followed by facial landmark detection, eye region segmentation, eye gaze extraction, and eye alignment stability estimation. Binarization and morphological operations are performed for segmenting the pupil region from the eye. After finding the EAS, its absolute value is used to differentiate the strabismic eye from the non-strabismic eye. If the value of the eye alignment stability is greater than a particular threshold, then the eyes are misaligned, and if its value is less than the threshold, the eyes are aligned. The method was tested on 175 strabismic and non-strabismic images obtained from Kaggle and Google Photos. The strabismic eye is taken as a positive class, and the non-strabismic eye is taken as a negative class. The test produced a true positive rate of 100% and a false positive rate of 7.69%.

Keywords: strabismus, face detection, facial landmarks, eye segmentation, eye gaze, binarization

Procedia PDF Downloads 76
515 Analyze Needs for Training on Academic Procrastination Behavior on Students in Indonesia

Authors: Iman Dwi Almunandar, Nellawaty A. Tewu, Anshari Al Ghaniyy

Abstract:

The emergence of academic procrastination behavior among students in Indonesian, especially the students of Faculty of Psychology at YARSI University becomes a habit to be underestimated, so often interfere with the effectiveness of learning process. The lecturers at the Faculty of Psychology YARSI University have very often warned students to be able to do and collect assignments accordance to predetermined deadline. However, they are still violated it. According to researchers, this problem needs to do a proper training for the solution to minimize academic procrastination behavior on students. In this study, researchers conducted analyze needs for deciding whether need the training or not. Number of sample is 30 respondents which being choose with a simple random sampling. Measurement of academic procrastination behavior is using the theory by McCloskey (2011), there are six dimensions: Psychological Belief about Abilities, Distractions, Social Factor of Procrastination, Time Management, Personal Initiative, Laziness. Methods of analyze needs are using Questioner, Interview, Observations, Focus Group Discussion (FGD), Intelligence Tests. The result of analyze needs shows that psychology students generation of 2015 at the Faculty of Psychology YARSI University need for training on Time Management.

Keywords: procrastination, psychology, analyze needs, behavior

Procedia PDF Downloads 381
514 Contribution of Traditional Beliefs, Poverty and Bad Weather Conditions to Social Economic Status and Welfare of Rural Setting: A Case Study for Zingwangwa, Blantyre

Authors: Bright Msukwa

Abstract:

Background: Malawi suffered economic instability, bad weather and massive flooding in the year 2015. A massive flood in the country, mainly in the southern region lead to damage of agriculture products. As a result, one of the heavily affected was Zingwangwa, Blantyre. Methods: We interviewed a selected number of houses residing in donor constructed temporal shelters and those still residing close to the floods prone areas in Zingwangwa, Blantyre. Results: About 67% of the population insisted that they resided on the land, which was prone to the floods as it belonged to their ancestors and their staying was part of preserving ancestral values. The remaining 23% of the population demonstrated economic challenges due to floods that contributed to the damage of their food crops, property and houses. Conclusion: Beliefs can negatively affect economic life improvement if mindsets are not changed among people in the rural area. Recommendation: Improving natural resource management, climate and disaster resilience.

Keywords: economic, belief, walfare, poverty

Procedia PDF Downloads 199
513 Investigation of Diseases and Enemies of Bees of Breeding Apis mellifera intermissa (Buttel-Reepen, 1906)

Authors: S. Zenia, L. Bitta, O. Bouhamam, H. Brines, M. Boudriaa, F. Haddadj, F. Marniche, A. Milla, H. Saadi, A. Smai

Abstract:

The bee Apis mellifera intermissa is a major social insect, in addition to its honey production, it is a pillar of our biodiversity. Several living organisms can come into contact with it: bacteria, viruses, protozoa, fungi, mites, and insects. In Algeria, many beekeepers have reported unusual mortality of local bees, loss of foragers and significant losses of their livestock. Despite the presence of a varied honey-bearing flora and a favourable Mediterranean climate, honey production remains low. This phenomenon can be attributed to the excess winter mortality, but also to the increasing difficulties that beekeepers face in maintaining healthy bee colonies, particularly bee diseases and their transmission facilitated by trade and beekeeping practices. Our survey is based on a questionnaire composed of several parts. The results obtained show that the disease that most affects bees according to beekeepers is varroa mite with 93% followed by fungi with 26%. The most replied enemy of bees is the false ringworm with 73%, followed by the bee-eater with 63%. Our goal is to determine the causes of this low production in two areas: Bejaia and Tizi-Ouzou.

Keywords: diseases, Apis mellifera L., varroa, European foulbrood

Procedia PDF Downloads 161
512 A Critical Evaluation of Building Information Modelling in New Zealand: Deepening Our Understanding of the Benefits and Drawbacks

Authors: Garry Miller, Thomas Alexander, Cameron Lee

Abstract:

There is belief that Building Information Modelling (BIM) will improve performance of the New Zealand (NZ) Architecture, Engineering and Construction (AEC) sector, however, widespread use of BIM is yet to be seen. Previous research indicates there are many issues affecting the uptake of BIM in NZ; nevertheless the underlying benefits, drawbacks, and barriers preventing more widespread uptake are not fully understood. This investigation aimed to understand these factors more clearly and make suggestions on how to improve the uptake of BIM in NZ. Semi-structured interviews were conducted with a range of industry professionals to gather a qualitative understanding. Findings indicated the ability to incorporate better information into a BIM model could drive many benefits. However scepticism and lack of positive incentives in NZ are affecting its widespread use. This concluded that there is a need for the government to produce a number of BIM case studies and develop a set of BIM standards to resolve payment issues surrounding BIM use. This study provides useful information for those interested in BIM and members of government interested in improving the performance of the construction industry. This study may also be of interest to small, developed countries such as NZ where the level of BIM maturity is relatively low.

Keywords: BIM, New Zealand, AEC sector, building information modelling

Procedia PDF Downloads 518
511 Factors That Promote Bystander Intervention in Cases of Sexual Violence

Authors: Avigail Moor

Abstract:

Sexual violence against women occurs at alarmingly high rates, which have remained steady irrespective of the increased societal awareness of this problem, affecting an upward of 20% of women. It appears that all the public discourse on this topic, including research, prevention programs, and public campaigns have not made a noticeable dent in this prevalence. This calls for new course of action. Raising awareness regarding the preventive role of bystanders might be it. To that end, the present study sought to establish what promotes bystander intervention and what hinders it. Three hundred and twenty-four men and women, ranging in age from 20-40, participated in this study, completing self-report questionnaires on the topics under investigation. Results indicated that the proclivity to intervene as a bystander is impacted by various factors. The most consequential among them is gender, with twice as many women as men, 70% vs 38% respectively, being positively inclined to take action in such cases. Other significant factors included belief in rape myths and having empathy towards perpetrators, which reduced the likelihood of bystander intervention. Holding the attitude that it is possible to freely consent to sex while intoxicated had a similar impact. The discussion addresses various preventive implications.

Keywords: bystander intervention, sexual assault, rape prevention, rape myths

Procedia PDF Downloads 128
510 'Wandering Uterus': An Analogy of Perception of Women in Hippocratic Corpus and Post-Modern Times

Authors: Ankita Sharma

Abstract:

The study proposes to review the perception of women in the Classical Age (500-336 BC) when Greek Philosophy was in bloom. It was observed that women had very few rights and were still under the control of men. One of the possible reasons for this exclusion was woman’s biology that had a huge influence on her being seen as inferior to men. The text ‘Hippocratic Corpus’ focuses on the biological construct of the female body in classical Greek science that perpetuated the idea of women as second-class citizens and were considered inherently weaker than men. The research highlights the significance of the text that was used to encourage women of that time to get married and produce children and how till today the perception remains the same. The Greek belief of need for confinement and control of 'wandering uterus' has led to superior understanding of men. The pivotal emphasis of this research is to women and their bodies that are depicted in a misogynistic way which paved the way for Hippocratic writers to influence the society’s attitude towards women in their writings. It is intended to draw attention to the prevailing cultural assumptions and preconceived notions about female anatomy that had a pervasive influence in the following centuries with its roots being in ancient science.

Keywords: classical Greek theory, women, wandering womb, modern ideology

Procedia PDF Downloads 194
509 Low Density Parity Check Codes

Authors: Kassoul Ilyes

Abstract:

The field of error correcting codes has been revolutionized by the introduction of iteratively decoded codes. Among these, LDPC codes are now a preferred solution thanks to their remarkable performance and low complexity. The binary version of LDPC codes showed even better performance, although it’s decoding introduced greater complexity. This thesis studies the performance of binary LDPC codes using simplified weighted decisions. Information is transported between a transmitter and a receiver by digital transmission systems, either by propagating over a radio channel or also by using a transmission medium such as the transmission line. The purpose of the transmission system is then to carry the information from the transmitter to the receiver as reliably as possible. These codes have not generated enough interest within the coding theory community. This forgetfulness will last until the introduction of Turbo-codes and the iterative principle. Then it was proposed to adopt Pearl's Belief Propagation (BP) algorithm for decoding these codes. Subsequently, Luby introduced irregular LDPC codes characterized by a parity check matrix. And finally, we study simplifications on binary LDPC codes. Thus, we propose a method to make the exact calculation of the APP simpler. This method leads to simplifying the implementation of the system.

Keywords: LDPC, parity check matrix, 5G, BER, SNR

Procedia PDF Downloads 153
508 The Gap between Elite Catholic Education and Inclusive Education

Authors: Viktorija Voidogaitė

Abstract:

Catholic education is based on the belief that every human being is created in the image and likeness of God. It is also influenced by the idea that the Kingdom of Heaven belongs to the humble and vulnerable. These principles emphasize the importance of serving the most vulnerable members of the Church community and promoting inclusivity without discrimination. This perspective emphasizes the need to protect the weakest members with compassion. However, realizing such an ideal in practice proves challenging, as the shortcomings and errors prevalent in any society often stem from the actions of Christians within that society. The evolution of these connections is observed throughout the historical development of Catholic education. In some European countries, Catholic education has become elitist, with limited room for inclusivity. This creates a conspicuous gap between the principles of the Evangelical community and elite Catholic schools and gymnasiums. Some schools appear to be most inclined to educate only those students who best align with their profile, leaving those needing assistance on the margins. As we advance into the third decade of the 21st century, there emerges a fundamental consideration: whether individuals who can assist the underprivileged and the infirm are being emphasized. Yet, it remains an open question whether these individuals will also possess the willingness and capability to construct a community or society that is inclusive and accessible to all.

Keywords: inclusion, Catholic education, inclusive education, becoming

Procedia PDF Downloads 65
507 Impact of Social Media Usage and Psychological Absenteeism at Workplace on Job Performance

Authors: Quaid Farooq, Zainab Mujtaba

Abstract:

The main aim of this paper was to conduct a research regarding social media usage, psychological absenteeism and job performance at workplace in Pakistan. This research examined the effects of social media usage and psychological absenteeism at workplace on job performance of employees. It was a popular belief that social media usage and psychological absenteeism at workplace have a negative relation with job performance. However, to date there was no study to support this argument, and this compelled us to choose this topic and find out the results. Secondly, this research also found effect of social media usage on psychological absenteeism. Despite the theoretical appeal of these variables and significance in today’s workplace environment, no previous study has investigated the relationship between them in detail. Data was collected from a sample (N = 100 paired responses) of employees and supervisors from different organizations in Pakistan. Study results indicate that performance is negatively related to psychological absenteeism, and such individuals were rated as exhibiting low performance level by their supervisors. However, it had no significant relationship with social media. Moreover, psychological absenteeism was positively related to social media. Individuals, who used more social media at workplace, were more psychologically absent at work according to our results.

Keywords: employee, job performance, psychological absenteeism, social media

Procedia PDF Downloads 389
506 Machine Learning Invariants to Detect Anomalies in Secure Water Treatment

Authors: Jonathan Heng, Yoong Cheah Huei

Abstract:

A strategic model that does not trigger any false alarms to detect anomalies in Secure Water Treatment (SWaT) test bed is presented. This model uses machine learning invariants formulated from streamlining the general form of Auto-Regressive models with eXogenous input. A creative generalized CUSUM algorithm to integrate the invariants and the detection strategy technique is successfully developed and tested in the SWaT Programmable Logic Controllers (PLCs). Three steps to fine-tune parameters, b and τ in the generalized algorithm are stated and an example used to demonstrate the tuning process is discussed. This approach can swiftly and effectively detect various scopes of cyber-attacks such as multiple points single stage and multiple points multiple stages in SWaT. This technique can be applied in water treatment plants and other cyber physical systems like power and gas plants too.

Keywords: machine learning invariants, generalized CUSUM algorithm with invariants and detection strategy, scope of cyber attacks, strategic model, tuning parameters

Procedia PDF Downloads 181
505 The Impact of Spirituality on the Voluntary Simplicity Lifestyle Tendency: An Explanatory Study on Turkish Consumers

Authors: Esna B. Buğday, Niray Tunçel

Abstract:

Spirituality has a motivational influence on consumers' psychological states, lifestyles, and behavioral intentions. Spirituality refers to the feeling that there is a divine power greater than ourselves and a connection among oneself, others, nature, and the sacred. In addition, spirituality concerns the human soul and spirit against the material and physical world and consists of three dimensions: self-discovery, relationships, and belief in a higher power. Of them, self-discovery is to explore the meaning and the purpose of life. Relationships refer to the awareness of the connection between human beings and nature as well as respect for them. In addition, higher power represents the transcendent aspect of spirituality, which means to believe in a holy power that creates all the systems in the universe. Furthermore, a voluntary simplicity lifestyle is (1) to adopt a simple lifestyle by minimizing the attachment to and the consumption of material things and possessions, (2) to have an ecological awareness respecting all living creatures, and (3) to express the desire for exploring and developing the inner life. Voluntary simplicity is a multi-dimensional construct that consists of a desire for a voluntarily simple life (e.g., avoiding excessive consumption), cautious attitudes in shopping (e.g., not buying unnecessary products), acceptance of self-sufficiency (e.g., being self-sufficient individual), and rejection of highly developed functions of products (e.g., preference for simple functioned products). One of the main reasons for living simply is to sustain a spiritual life, as voluntary simplicity provides the space for achieving psychological and spiritual growth, cultivating self-reliance since voluntary simplifier frees themselves from the overwhelming externals and takes control of their daily lives. From this point of view, it is expected that people with a strong sense of spirituality will be likely to adopt a simple lifestyle. In this respect, the study aims to examine the impact of spirituality on consumers' voluntary simple lifestyle tendencies. As consumers' consumption attitudes and behaviors depend on their lifestyles, exploring the factors that lead them to embrace voluntary simplicity significantly predicts their purchase behavior. In this respect, this study presents empirical research based on a data set collected from 478 Turkish consumers through an online survey. First, exploratory factor analysis is applied to the data to reveal the dimensions of spirituality and voluntary simplicity scales. Second, confirmatory factor analysis is conducted to assess the measurement model. Last, the hypotheses are analyzed using partial least square structural equation modeling (PLS-SEM). The results confirm that spirituality's self-discovery and relationships dimensions positively impact both cautious attitudes in shopping and acceptance of self-sufficiency dimensions of voluntary simplicity. In contrast, belief in a higher power does not significantly influence consumers' voluntary simplicity tendencies. Even though there has been theoretical support drawing a positive relationship between spirituality and voluntary simplicity, to the best of the authors' knowledge, this has not been empirically tested in the literature before. Hence, this study contributes to the current knowledge by analyzing the direct influence of spirituality on consumers' voluntary simplicity tendencies. Additionally, analyzing this impact on the consumers of an emerging market is another contribution to the literature.

Keywords: spirituality, voluntary simplicity, self-sufficiency, conscious shopping, Turkish consumers

Procedia PDF Downloads 153
504 Sustainability as an Effective Tool for a Place Branding an Application on El Gouna City, Egypt

Authors: Sherine El Sakka

Abstract:

Most developing countries consider sustainability is a luxury, but El Gouna city at hurghada, Egypt, thought differently and uses sustainability as a tool for branding the place. Branding a place is new approach towards sustainable cities development (SCD); sustainability(S) requires multi-dimensional indicators to show the relationship between economic, social, environmental and cultural aspects. Sustainable development (SD) according to Brundland commission defined as" meeting the needs of current generations without negative impact on the needs of future generation’, branding a place (BP) integrate economic, social, environmental and cultural aspects into the city. In order for a city to be a good brand it must possess distinctive characteristics that can be identified, these include city appearance, people’s experience, people’s belief as well as what the city stands for. The study has found that place branding is a way to promote sustainable initiative; place branding has the potential to shape as a leading tool for the concurrence of more sustainable cities in developing countries, sustainability and green development should turn main priorities to developing countries.

Keywords: sustainable cities development (SCD), sustainability(S), sustainable development (SD), branding a place (BP)

Procedia PDF Downloads 345
503 A Dynamic Ensemble Learning Approach for Online Anomaly Detection in Alibaba Datacenters

Authors: Wanyi Zhu, Xia Ming, Huafeng Wang, Junda Chen, Lu Liu, Jiangwei Jiang, Guohua Liu

Abstract:

Anomaly detection is a first and imperative step needed to respond to unexpected problems and to assure high performance and security in large data center management. This paper presents an online anomaly detection system through an innovative approach of ensemble machine learning and adaptive differentiation algorithms, and applies them to performance data collected from a continuous monitoring system for multi-tier web applications running in Alibaba data centers. We evaluate the effectiveness and efficiency of this algorithm with production traffic data and compare with the traditional anomaly detection approaches such as a static threshold and other deviation-based detection techniques. The experiment results show that our algorithm correctly identifies the unexpected performance variances of any running application, with an acceptable false positive rate. This proposed approach has already been deployed in real-time production environments to enhance the efficiency and stability in daily data center operations.

Keywords: Alibaba data centers, anomaly detection, big data computation, dynamic ensemble learning

Procedia PDF Downloads 200
502 Flood Monitoring in the Vietnamese Mekong Delta Using Sentinel-1 SAR with Global Flood Mapper

Authors: Ahmed S. Afifi, Ahmed Magdy

Abstract:

Satellite monitoring is an essential tool to study, understand, and map large-scale environmental changes that affect humans, climate, and biodiversity. The Sentinel-1 Synthetic Aperture Radar (SAR) instrument provides a high collection of data in all-weather, short revisit time, and high spatial resolution that can be used effectively in flood management. Floods occur when an overflow of water submerges dry land that requires to be distinguished from flooded areas. In this study, we use global flood mapper (GFM), a new google earth engine application that allows users to quickly map floods using Sentinel-1 SAR. The GFM enables the users to adjust manually the flood map parameters, e.g., the threshold for Z-value for VV and VH bands and the elevation and slope mask threshold. The composite R:G:B image results by coupling the bands of Sentinel-1 (VH:VV:VH) reduces false classification to a large extent compared to using one separate band (e.g., VH polarization band). The flood mapping algorithm in the GFM and the Otsu thresholding are compared with Sentinel-2 optical data. And the results show that the GFM algorithm can overcome the misclassification of a flooded area in An Giang, Vietnam.

Keywords: SAR backscattering, Sentinel-1, flood mapping, disaster

Procedia PDF Downloads 105
501 The Dilemma of Giving Mathematics Homework from the Perspective of Pre-Service Elementary Teachers

Authors: Myla Zenaida Cabrillas-Torio, Von Anthony G. Torio

Abstract:

Homework is defined as an additional task that a student does outside of the school. This added activity is in recognition of the necessity to spend additional time for subjects such as Mathematics. The dilemma comes in the form of the advantages and disadvantages that can be derived from homework. Studies have revealed varying effects to students on academic and non-academic areas. Teachers are at the forefront of the decision towards the giving or not of homework. Pre-service teachers at the elementary level represent the future leaders of the educational system and should be acquainted and involved at the onset of the dilemma. The main objective of this study is to determine the perspective of pre-service elementary teachers towards homework. The anatomy of their belief can be key towards addressing the issue via teacher training. Salient results revealed that the subjects favor the giving homework on the following grounds: it helps add knowledge and confidence. Those who do not favor homework find it as an additional burden. Difficulties in complying with homework are usually associated with lack of references and performance of other household chores. Students usually spend late nights to comply with homework and are unable to perform at the best of their potentials.

Keywords: attitude, homework, pre-service teachers, mathematics education, Philippines

Procedia PDF Downloads 501
500 Fluorometric Aptasensor: Evaluation of Stability and Comparison to Standard Enzyme-Linked Immunosorbent Assay

Authors: J. Carlos Kuri, Varun Vij, Raymond J. Turner, Orly Yadid-Pecht

Abstract:

Celiac disease (CD) is an immune system disorder that is triggered by ingesting gluten. As a gluten-free (GF) diet has become a concern of many people for health reasons, a gold standard had to be nominated. Enzyme-linked immunosorbent assay (ELISA) has taken the seat of this role. However, multiple limitations were discovered, and with that, the desire for an alternative method now exists. Nucleic acid-based aptamers have become of great interest due to their selectivity, specificity, simplicity, and rapid-testing advantages. However, fluorescence-based aptasensors have been tagged as unstable, but lifespan details are rarely stated. In this work, the lifespan stability of a fluorescence-based aptasensor is shown over an 8-week-long study displaying the accuracy of the sensor and false negatives. This study follows 22 different samples, including GF and gluten-rich (GR) and soy sauce products, off-the-shelf products, and reference material from laboratories, giving a total of 836 tests. The analysis shows an accuracy of correctly classifying GF and GR products of 96.30% and 100%, respectively when the protocol is augmented with molecular sieves. The overall accuracy remains around 94% within the first four weeks and then decays to 63%.

Keywords: aptasensor, PEG, rGO, FAM, RM, ELISA

Procedia PDF Downloads 124
499 Metamorphic Computer Virus Classification Using Hidden Markov Model

Authors: Babak Bashari Rad

Abstract:

A metamorphic computer virus uses different code transformation techniques to mutate its body in duplicated instances. Characteristics and function of new instances are mostly similar to their parents, but they cannot be easily detected by the majority of antivirus in market, as they depend on string signature-based detection techniques. The purpose of this research is to propose a Hidden Markov Model for classification of metamorphic viruses in executable files. In the proposed solution, portable executable files are inspected to extract the instructions opcodes needed for the examination of code. A Hidden Markov Model trained on portable executable files is employed to classify the metamorphic viruses of the same family. The proposed model is able to generate and recognize common statistical features of mutated code. The model has been evaluated by examining the model on a test data set. The performance of the model has been practically tested and evaluated based on False Positive Rate, Detection Rate and Overall Accuracy. The result showed an acceptable performance with high average of 99.7% Detection Rate.

Keywords: malware classification, computer virus classification, metamorphic virus, metamorphic malware, Hidden Markov Model

Procedia PDF Downloads 315
498 Case Study Analysis for Driver's Company in the Transport Sector with the Help of Data Mining

Authors: Diana Katherine Gonzalez Galindo, David Rolando Suarez Mora

Abstract:

With this study, we used data mining as a new alternative of the solution to evaluate the comments of the customers in order to find a pattern that helps us to determine some behaviors to reduce the deactivation of the partners of the LEVEL app. In one of the greatest business created in the last times, the partners are being affected due to an internal process that compensates the customer for a bad experience, but these comments could be false towards the driver, that’s why we made an investigation to collect information to restructure this process, many partners have been disassociated due to this internal process and many of them refuse the comments given by the customer. The main methodology used in this case study is the observation, we recollect information in real time what gave us the opportunity to see the most common issues to get the most accurate solution. With this new process helped by data mining, we could get a prediction based on the behaviors of the customer and some basic data recollected such as the age, the gender, and others; this could help us in future to improve another process. This investigation gives more opportunities to the partner to keep his account active even if the customer writes a message through the app. The term is trying to avoid a recession of drivers in the future offering improving in the processes, at the same time we are in search of stablishing a strategy which benefits both the app’s managers and the associated driver.

Keywords: agent, driver, deactivation, rider

Procedia PDF Downloads 280
497 Scientific Perspectives on Autism Over Time

Authors: Gian Marco Di Feo

Abstract:

Purpose: The study was conducted to examine changes in the beliefs and contents of articles on autism since the mid-twentieth century. Characteristics analyzed were the mentioning of pharmaceutical drugs, country, and institution of the first author, methodologies used, journal, and the year of publication. Methods: All articles (N=566) analyzed were published between January 1st, 1943 and December 31st, 2021. Inter rater reliability was assessed and there was a 94.4 percent agreement amongst raters. All articles were analyzed through both PubMed and PsycInfo. Results: A one way chi square indicated that there was a significant number of articles expressing mixed beliefs on the cause of autism. Scientific perspectives on the cause of autism have changed significantly over time. Particularly, the belief of empiricism (environmental factors) has decreased significantly, while both mixed beliefs and nativism have increased remarkably. Additionally, the mentioning of pharmaceutical drugs is involved with the beliefs on the cause of autism. Conclusion: Articles in the twenty first century are most likely to express both nativist and empiricist viewpoints on the cause of autism. Articles that express mixed beliefs are most likely to mention drugs in their study. The results impact scientific self-understanding on autism and beliefs in high-income countries, and advance scientific understanding globally.

Keywords: autism, beliefs, nativism, empiricism, nature, nurture

Procedia PDF Downloads 72
496 Optimizing Machine Learning Algorithms for Defect Characterization and Elimination in Liquids Manufacturing

Authors: Tolulope Aremu

Abstract:

The key process steps to produce liquid detergent products will introduce potential defects, such as formulation, mixing, filling, and packaging, which might compromise product quality, consumer safety, and operational efficiency. Real-time identification and characterization of such defects are of prime importance for maintaining high standards and reducing waste and costs. Usually, defect detection is performed by human inspection or rule-based systems, which is very time-consuming, inconsistent, and error-prone. The present study overcomes these limitations in dealing with optimization in defect characterization within the process for making liquid detergents using Machine Learning algorithms. Performance testing of various machine learning models was carried out: Support Vector Machine, Decision Trees, Random Forest, and Convolutional Neural Network on defect detection and classification of those defects like wrong viscosity, color deviations, improper filling of a bottle, packaging anomalies. These algorithms have significantly benefited from a variety of optimization techniques, including hyperparameter tuning and ensemble learning, in order to greatly improve detection accuracy while minimizing false positives. Equipped with a rich dataset of defect types and production parameters consisting of more than 100,000 samples, our study further includes information from real-time sensor data, imaging technologies, and historic production records. The results are that optimized machine learning models significantly improve defect detection compared to traditional methods. Take, for instance, the CNNs, which run at 98% and 96% accuracy in detecting packaging anomaly detection and bottle filling inconsistency, respectively, by fine-tuning the model with real-time imaging data, through which there was a reduction in false positives of about 30%. The optimized SVM model on detecting formulation defects gave 94% in viscosity variation detection and color variation. These values of performance metrics correspond to a giant leap in defect detection accuracy compared to the usual 80% level achieved up to now by rule-based systems. Moreover, this optimization with models can hasten defect characterization, allowing for detection time to be below 15 seconds from an average of 3 minutes using manual inspections with real-time processing of data. With this, the reduction in time will be combined with a 25% reduction in production downtime because of proactive defect identification, which can save millions annually in recall and rework costs. Integrating real-time machine learning-driven monitoring drives predictive maintenance and corrective measures for a 20% improvement in overall production efficiency. Therefore, the optimization of machine learning algorithms in defect characterization optimum scalability and efficiency for liquid detergent companies gives improved operational performance to higher levels of product quality. In general, this method could be conducted in several industries within the Fast moving consumer Goods industry, which would lead to an improved quality control process.

Keywords: liquid detergent manufacturing, defect detection, machine learning, support vector machines, convolutional neural networks, defect characterization, predictive maintenance, quality control, fast-moving consumer goods

Procedia PDF Downloads 18
495 The Vanishing Treasure: An Anthropological Study on Changing Social Relationships, Values, Belief System and Language Pattern of the Limbus in Kalimpong Sub-Division of the Darjeeling District in West Bengal, India

Authors: Biva Samadder, Samita Manna

Abstract:

India is a melting pot of races, tribes, castes and communities. The population of India can be roughly branched into the huge majority of “Civilized” Indians of the Plains and the minority of Tribal population of the hill area and the forest who constituting almost 16 percent of total population of India. The Kirat community composed of four ethnic tribes: Limbu, Lepcha, Dhimal, and Rai. These Kirat people were found to be rich in indigenous knowledge, skill and practices especially for the use on medicinal plants and livelihood purposes. The “Mundhum" is the oral scripture or the “Bible of the Limbus” which serves as the canon of the codes of the Limbu socialization, their moral values and the very orientation of their lifestyle. From birth till death the Limbus are disciplined in the life with full of religious rituals, traditions and culture governed by community norms with a rich legacy of indigenous knowledge and traditional practices. The present study has been conducted using both secondary as well as primary data by applying social methodology consisting of the social survey, questionnaire, interviews and observations in the Kalimpong Block-I of Darjeeling District of west Bengal of India, which is a heterogeneous zone in terms of its ethnic composition and where the Limbus are pre-dominantly concentrated. Due to their close contact with other caste and communities Limbus are now adjusted with the changing situation by borrowing some cultural traits from the other communities and changes that have taken place in their cultural practices, religious beliefs, economic aspects, languages and in social roles and relationships which is bringing the change in their material culture. Limbu language is placed in the Tibeto- Burman Language category. But due to the political and cultural domination of educationally sound and numerically dominant Bengali race, the different communities in this area forced to come under the one umbrella of the Nepali or Gorkhali nation (nation-people). Their respective identities had to be submerged in order to constitute as a strong force to resist Nepali domination and ensure their common survival. As Nepali is a lingua-franca of the area knowing and speaking Nepali language helps them in procuring economic and occupational facilities. Ironically, present day younger generation does not feel comfortable speaking in their own Limbu tongue. The traditional knowledge about medicinal plants, healing, and health culture is found to be wear away due to the lack of interest of young generation. Not only poverty, along with exclusion due to policies they are in the phase of extinction, but their capabilities are ignored and not documented and preserved especially in the case of Limbus who having a great cultural heritage of an oral tradition. Attempts have been made to discuss the persistence and changes in socioeconomic pattern of life in relation to the social structure, material culture, cultural practices, social relationships, indigenous technology, ethos and their values and belief system.

Keywords: changing social relationship, cultural transition, identity, indigenous knowledge, language

Procedia PDF Downloads 172
494 Combating Islamophobia in Australia: An Analysis of Six Legal and Holistic Strategies to Help Address Discrimination towards Muslims

Authors: F. Zamani Ashni, P. Gerber

Abstract:

In today's religious and political climate, Muslims find themselves the focus of much attention, often in the form of discrimination and vilification. There is a widely held belief that Islam and terrorism are inextricably intertwined. An anti-Muslim narrative has been shaping policy around the world for some time now. This study, which focuses on the experience of Muslims in Australia, provides guidance on legislative and other steps that can be taken by Australia to help address Islamophobia. This study provides a doctrinal analysis of the state, territory, and federal anti-discrimination laws in Australia. Using principles of statutory interpretation along aside an analysis of relevant jurisprudence, this study concludes that Australian anti-discrimination laws are ill-equipped to address modern-day Islamophobia. The study also finds that laws alone are insufficient to combat Islamophobia, and a more holistic approach is required. Six strategies are identified, which can, in combination, help to successfully respond to Islamophobia. In addition to legislative initiatives, combating Islamophobia requires Australia to promote inclusive human rights education, fair media coverage, strong leadership, integration of the Islamic community, and comprehensive documentation of anti-Muslim attacks.

Keywords: Australia, discrimination, Islamophobia, Muslim

Procedia PDF Downloads 133