Search results for: false friends
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 737

Search results for: false friends

407 Precise Identification of Clustered Regularly Interspaced Short Palindromic Repeats-Induced Mutations via Hidden Markov Model-Based Sequence Alignment

Authors: Jingyuan Hu, Zhandong Liu

Abstract:

CRISPR genome editing technology has transformed molecular biology by accurately targeting and altering an organism’s DNA. Despite the state-of-art precision of CRISPR genome editing, the imprecise mutation outcome and off-target effects present considerable risk, potentially leading to unintended genetic changes. Targeted deep sequencing, combined with bioinformatics sequence alignment, can detect such unwanted mutations. Nevertheless, the classical method, Needleman-Wunsch (NW) algorithm may produce false alignment outcomes, resulting in inaccurate mutation identification. The key to precisely identifying CRISPR-induced mutations lies in determining optimal parameters for the sequence alignment algorithm. Hidden Markov models (HMM) are ideally suited for this task, offering flexibility across CRISPR systems by leveraging forward-backward algorithms for parameter estimation. In this study, we introduce CRISPR-HMM, a statistical software to precisely call CRISPR-induced mutations. We demonstrate that the software significantly improves precision in identifying CRISPR-induced mutations compared to NW-based alignment, thereby enhancing the overall understanding of the CRISPR gene-editing process.

Keywords: CRISPR, HMM, sequence alignment, gene editing

Procedia PDF Downloads 24
406 System for the Detecting of Fake Profiles on Online Social Networks Using Machine Learning and the Bio-Inspired Algorithms

Authors: Sekkal Nawel, Mahammed Nadir

Abstract:

The proliferation of online activities on Online Social Networks (OSNs) has captured significant user attention. However, this growth has been hindered by the emergence of fraudulent accounts that do not represent real individuals and violate privacy regulations within social network communities. Consequently, it is imperative to identify and remove these profiles to enhance the security of OSN users. In recent years, researchers have turned to machine learning (ML) to develop strategies and methods to tackle this issue. Numerous studies have been conducted in this field to compare various ML-based techniques. However, the existing literature still lacks a comprehensive examination, especially considering different OSN platforms. Additionally, the utilization of bio-inspired algorithms has been largely overlooked. Our study conducts an extensive comparison analysis of various fake profile detection techniques in online social networks. The results of our study indicate that supervised models, along with other machine learning techniques, as well as unsupervised models, are effective for detecting false profiles in social media. To achieve optimal results, we have incorporated six bio-inspired algorithms to enhance the performance of fake profile identification results.

Keywords: machine learning, bio-inspired algorithm, detection, fake profile, system, social network

Procedia PDF Downloads 43
405 Association Between Friendship Quality and Subjective Wellbeing Among Adolescents: A Systematic Review

Authors: Abdullah Alsarrani, Leandro Garcia, Ruth Hunter, Laura Dunne

Abstract:

Social integration with friends has an important role in shaping adolescents’ behavior and determining their well-being. Friendship features such as companionship, trust, closeness, intimacy, and conflicts all form the concept of friendship quality. The quality of friendship relationships can either enhance or impede mental development during adolescence. Therefore, this systematic review was conducted to understand the association between friendship quality and adolescents’ mental wellbeing. The evidence was synthesized from a search of five databases (Medline, Embase, ProQuest, Scopus, and PsycINFO). Thirty-two articles out of 18801 records were included in the review. The relationship between friendship quality and depression has been investigated extensively in the literature and negative (beneficial) associations were found in twelve studies out of sixteen. Poor peer relationship was linked to loneliness in eight studies out of nine. All five studies on life satisfaction and quality of peer connection found a positive association. In five studies, optimal peer relationship was found to be associated with happiness. A positive association between friendship quality and self-esteem in four out of five applicable studies. Friendship quality was found to be correlated with subjective well-being in all of three included studies focused on this area. The review demonstrates the paramount value of promoting healthy friendship to adolescents’ subjective well-being constructs. Interventions that aim to promote subjective wellbeing among adolescents should consider the development and maintenance of healthy friendships.

Keywords: adolescents, friendship quality, peer, wellbeing

Procedia PDF Downloads 83
404 Offline Signature Verification Using Minutiae and Curvature Orientation

Authors: Khaled Nagaty, Heba Nagaty, Gerard McKee

Abstract:

A signature is a behavioral biometric that is used for authenticating users in most financial and legal transactions. Signatures can be easily forged by skilled forgers. Therefore, it is essential to verify whether a signature is genuine or forged. The aim of any signature verification algorithm is to accommodate the differences between signatures of the same person and increase the ability to discriminate between signatures of different persons. This work presented in this paper proposes an automatic signature verification system to indicate whether a signature is genuine or not. The system comprises four phases: (1) The pre-processing phase in which image scaling, binarization, image rotation, dilation, thinning, and connecting ridge breaks are applied. (2) The feature extraction phase in which global and local features are extracted. The local features are minutiae points, curvature orientation, and curve plateau. The global features are signature area, signature aspect ratio, and Hu moments. (3) The post-processing phase, in which false minutiae are removed. (4) The classification phase in which features are enhanced before feeding it into the classifier. k-nearest neighbors and support vector machines are used. The classifier was trained on a benchmark dataset to compare the performance of the proposed offline signature verification system against the state-of-the-art. The accuracy of the proposed system is 92.3%.

Keywords: signature, ridge breaks, minutiae, orientation

Procedia PDF Downloads 124
403 A Web Application for Screening Dyslexia in Greek Students

Authors: Antonios Panagopoulos, Stamoulis Georgios

Abstract:

Dyslexia's diagnosis is made taking into account reading and writing skills and is carried out by qualified scientific staff. In addition, there are screening tests that are designed to give an indication of possible dyslexic difficulties. Their main advantage is that they create a pleasant environment for the user and reduce the stress that can lead to false results. An online application was created for the first time, as far as authors' knowledge, for screening Dyslexia in Greek high school students named «DyScreTe». Thus, a sample of 240 students between 16 and 18 years old in Greece was taken, of which 120 were diagnosed with dyslexia by an official authority in Greece, and 120 were typically developed. The main hypothesis that was examined is that students who were diagnosed with dyslexia by official authorities in Greece had significantly lower performance in the respective software tests. The results verified the hypothesis we made those children with dyslexia in each test had a lower performance com-pared to the type developed in successful responses, except for the intelligence test. After random sampling, it was shown that the new online application was a useful tool for screening dyslexia. However, computer evaluation cannot replace the diagnosis by a professional expert, but with the results of this application, the interdisciplinary team that deals with the differential diagnosis will create and evaluate, at a later time, the appropriate intervention program.

Keywords: dyslexia, screening tests, deficits, application

Procedia PDF Downloads 57
402 Interdisciplinary Integrated Physical Education Program Using a Philosophical Approach

Authors: Ellie Abdi, Susana Juniu

Abstract:

The purpose of this presentation is to describe an interdisciplinary teaching program that integrates physical education concepts using a philosophical approach. The presentation includes a review of: a) the philosophy of American education, b) the philosophy of sports and physical education, c) the interdisciplinary physical education program, d) professional development programs, (e) the Success of this physical education program, f) future of physical education. This unique interdisciplinary program has been implemented in an urban school physical education discipline in East Orange, New Jersey for over 10 years. During the program the students realize that the bodies go through different experiences. The body becomes a place where a child can recognize in an enjoyable way to express and perceive particular feelings or mental states. Children may distinguish themselves to have high abilities in the social or other domains but low abilities in the field of athletics. The goal of this program for the individuals is to discover new skills, develop and demonstrate age appropriate mastery level at different tasks, therefore the program consists of 9 to 12 sports, including many game. Each successful experience increases the awareness ability. Engaging in sports and physical activities are social movements involving groups of children in situations such as teams, friends, and recreational settings, which serve as a primary socializing agent for teaching interpersonal skills. As a result of this presentation the audience will reflect and explore how to structure a physical education program to integrate interdisciplinary subjects with philosophical concepts.

Keywords: interdisciplinary disciplines, philosophical concepts, physical education, interdisciplinary teaching program

Procedia PDF Downloads 469
401 The Effects of Mobile Phones in Mitigating Cultural Shock amongst Refugees: Case of South Africa

Authors: Sarah Vuningoma, Maria Rosa Lorini, Wallace Chigona

Abstract:

The potential of mobile phones is evident in their ability to address isolation and loneliness, support the improvement of interpersonal relations, and contribute to the facilitation of assimilation processes. Mobile phones can play a role in facilitating the integration of refugees into a new environment. This study aims to evaluate the impact of mobile phone use on helping refugees navigate the challenges posed by cultural differences in the host country. Semi-structured interviews were employed to collect data for the study, involving a sample size of 27 participants. Participants in the study were refugees based in South Africa, and thematic analysis was the chosen method for data analysis. The research highlights the numerous challenges faced by refugees in their host nation, including a lack of local cultural skills, the separation of family and friends from their countries of origin, hurdles in acquiring legal documentation, and the complexities of assimilating into the unfamiliar community. The use of mobile phones by refugees comes with several advantages, such as the advancement of language and cultural understanding, seamless integration into the host country, streamlined communication, and the exploration of diverse opportunities. Concurrently, mobile phones allow refugees in South Africa to manage the impact of culture shock.

Keywords: mobile phones, culture shock, refugees, South Africa

Procedia PDF Downloads 62
400 Application of Simulated Annealing to Threshold Optimization in Distributed OS-CFAR System

Authors: L. Abdou, O. Taibaoui, A. Moumen, A. Talib Ahmed

Abstract:

This paper proposes an application of the simulated annealing to optimize the detection threshold in an ordered statistics constant false alarm rate (OS-CFAR) system. Using conventional optimization methods, such as the conjugate gradient, can lead to a local optimum and lose the global optimum. Also for a system with a number of sensors that is greater than or equal to three, it is difficult or impossible to find this optimum; Hence, the need to use other methods, such as meta-heuristics. From a variety of meta-heuristic techniques, we can find the simulated annealing (SA) method, inspired from a process used in metallurgy. This technique is based on the selection of an initial solution and the generation of a near solution randomly, in order to improve the criterion to optimize. In this work, two parameters will be subject to such optimisation and which are the statistical order (k) and the scaling factor (T). Two fusion rules; “AND” and “OR” were considered in the case where the signals are independent from sensor to sensor. The results showed that the application of the proposed method to the problem of optimisation in a distributed system is efficiency to resolve such problems. The advantage of this method is that it allows to browse the entire solutions space and to avoid theoretically the stagnation of the optimization process in an area of local minimum.

Keywords: distributed system, OS-CFAR system, independent sensors, simulating annealing

Procedia PDF Downloads 481
399 Energy Detection Based Sensing and Primary User Traffic Classification for Cognitive Radio

Authors: Urvee B. Trivedi, U. D. Dalal

Abstract:

As wireless communication services grow quickly; the seriousness of spectrum utilization has been on the rise gradually. An emerging technology, cognitive radio has come out to solve today’s spectrum scarcity problem. To support the spectrum reuse functionality, secondary users are required to sense the radio frequency environment, and once the primary users are found to be active, the secondary users are required to vacate the channel within a certain amount of time. Therefore, spectrum sensing is of significant importance. Once sensing is done, different prediction rules apply to classify the traffic pattern of primary user. Primary user follows two types of traffic patterns: periodic and stochastic ON-OFF patterns. A cognitive radio can learn the patterns in different channels over time. Two types of classification methods are discussed in this paper, by considering edge detection and by using autocorrelation function. Edge detection method has a high accuracy but it cannot tolerate sensing errors. Autocorrelation-based classification is applicable in the real environment as it can tolerate some amount of sensing errors.

Keywords: cognitive radio (CR), probability of detection (PD), probability of false alarm (PF), primary user (PU), secondary user (SU), fast Fourier transform (FFT), signal to noise ratio (SNR)

Procedia PDF Downloads 328
398 Information Needs of Cassava Processors on Small-Scale Cassava Processing in Oyo State, Nigeria

Authors: Rafiat Bolanle Fasasi-Hammed

Abstract:

Cassava is an important food crop in rural households of Nigeria. It has a high potential for product diversification, because it can be processed into various products forms for human consumption and can be made into chips for farm animals, and also starch and starch derivatives. However, cassava roots are highly perishable and contain potentially toxic cyanogenic glycosides which necessitate its processing. Therefore, this study was carried out to assess information needs of cassava processors on food safety practices in Oyo State, Nigeria. Simple random sampling technique was used in the selection of 110 respondents for this study. Descriptive statistics and chi-square were used to analyze the data collected. Results of this study showed that the mean age of the respondents was 39.4 years, majority (78.7%) of the respondents was married, 51.9% had secondary education; 45.8% of the respondents have spent more than 12 years in cassava processing. The mean income realized was ₦26,347.50/month from cassava processing. Information on cassava processing got to the respondents through friends, family and relations (73.6%) and fellow cassava processors (58.6%). Serious constraints identified were ineffective extension agents (93.9%), food safety regulatory agencies (88.1%) and inadequate processing and storage facilities (67.8%). Chi-square results showed that significant relationship existed between socio-economic characteristics of the respondents (χ2 = 29.80, df = 2,), knowledge level (χ2 = 9.26, df = 4), constraints (χ2 = 13.11, df = 2) and information needs at p < 0.05 level of significance. The study recommends that there should be regular training on improved cassava processing methods for the cassava processors in the study area.

Keywords: information, needs, cassava, Oyo State, processing

Procedia PDF Downloads 273
397 Application of Hyperbinomial Distribution in Developing a Modified p-Chart

Authors: Shourav Ahmed, M. Gulam Kibria, Kais Zaman

Abstract:

Control charts graphically verify variation in quality parameters. Attribute type control charts deal with quality parameters that can only hold two states, e.g., good or bad, yes or no, etc. At present, p-control chart is most commonly used to deal with attribute type data. In construction of p-control chart using binomial distribution, the value of proportion non-conforming must be known or estimated from limited sample information. As the probability distribution of fraction non-conforming (p) is considered in hyperbinomial distribution unlike a constant value in case of binomial distribution, it reduces the risk of false detection. In this study, a statistical control chart is proposed based on hyperbinomial distribution when prior estimate of proportion non-conforming is unavailable and is estimated from limited sample information. We developed the control limits of the proposed modified p-chart using the mean and variance of hyperbinomial distribution. The proposed modified p-chart can also utilize additional sample information when they are available. The study also validates the use of modified p-chart by comparing with the result obtained using cumulative distribution function of hyperbinomial distribution. The study clearly indicates that the use of hyperbinomial distribution in construction of p-control chart yields much accurate estimate of quality parameters than using binomial distribution.

Keywords: binomial distribution, control charts, cumulative distribution function, hyper binomial distribution

Procedia PDF Downloads 247
396 Cultural Adjustment Problems in Academic and Social Life Experienced by Indonesian Postgraduate Students Studying in London

Authors: Erizal Lugman

Abstract:

An increasing number of students from Indonesia study in universities in the UK. Because of the substantial cultural differences between the Western and Indonesian cultures, this study investigates the issues in academic and social life experienced by Indonesian postgraduate students, with a sample of 11 Indonesian postgraduate students (8 male, 3 female) studying in London during the cultural adjustment stage. This research made use of a semi-structured interview and was analyzed qualitatively using thematic content analysis to reveal key areas of concern in the academic setting, social life, and language-related issues. The findings confirm that the most challenging aspects experienced by the participants are the use of academic English in academic situations and the students’ lack of critical thinking. Nine out of 11 students agreed that they had problems with writing essays during the cultural adjustment stage. Because of the collectivist culture in Indonesia, making friends with locals was the most concerning issue in the participants’ sociocultural adjustment, followed by difficulty in finding places to pray, looking for Halal food and using the Western toilet system The findings suggest recommendations that the students must be more aware of the cultural differences between Indonesian and Western cultures, including in the academic setting and social life. Also, the lecturers should pay more attention to their speech in the British accent which is sometimes difficult to understand.

Keywords: academic adjustment, cultural adjustment, indonesian culture, intercultural communication

Procedia PDF Downloads 112
395 The Political Economy of Human Trafficking and Human Insecurity in Asia: The Case of Japan, Thailand and India

Authors: Mohammed Bashir Uddin

Abstract:

Human trafficking remains as a persistent problem in many parts of the world. It is considered by many countries as an issue of a threat to national security. Border enforcement to prevent trafficking has been the main incentive, which eventually causes human insecurity for vulnerable people, especially for women. This research argues that focus needs to be placed on the political economy of trafficking, hence on the supply and demand sides of trafficking from a broader socio-economic perspective. Trafficking is a global phenomenon with its contemporary origins in the international capitalist market system. This research investigates particularly the supply-demand nexus on the backdrop of globalization and its impact on human security. It argues that the nexus varies across the countries, particularly the demand side. While prostitution has been the sole focus of the demand side in all countries in Asia, the paper argues that organ trade, bonded labor, cheap and exploitable labor through false recruitment (male trafficking) and adoption are some of the rising demands that explore new trends of trafficking, which could be better explained through international political economy (IPE). Following a qualitative research method, the paper argues that although demands vary in destination countries, they are the byproducts of IPE which have different socio-economic impacts both on trafficked individuals and the states.

Keywords: globalization, human security, human trafficking, political economy

Procedia PDF Downloads 446
394 Trend and Cuses of Decline in Trifoliate Yam (Dioscorea dumentorum) Production in Enugu State, Nigeria: Implication for Food Security and Biodiversity Conservation

Authors: J. C. Iwuchukwu, K. C. Okwor

Abstract:

In recent time and in the study area, yam farmers are moving into less laborious and more economical crops and very few yam farmers are growing trifoliate yam. In yam markets, little or no bitter yam is displayed or sold. The work was therefore designed to ascertain trend and causes of decline in trifoliate yam production in Enugu state. Three agricultural zones, six blocks, eighteen circles and one hundred and eight trifoliate yam farmers that were purposively selected constituted sample for the study. An interview schedule was used to collect data while percentage, mean score and standard deviation were used for data analysis. Findings of the study revealed that the respondents had no extension contact, Majority (90.7%) sourced information on trifoliate yam from neighbours/friends/relatives and produced mainly for consumption (67.6%) during rainy season (70.4%). Trifoliate yam was produced manually(71.3%) and organically (58.3%) in a mixture of other crops (87%) using indigenous/local varieties (73.1%). Mean size of land allocated to trifoliate yam production was relatively steady, mean cost of input and income were increasing while output was decreasing within the years under consideration (before 2001 to 2014). Poor/lack of finance(M=1.8) and drudgery associated with trifoliate yam product(M=1.72) were some of the causes of decline in trifoliate yam production in the area. The study recommended that more research and public enlightenment campaigns on the importance of trifoliate yam should be carried out to encourage and consolidate farmers and the masses effort in production and consumption of the crop so that it will not go extinct and then contribute to food security.

Keywords: causes, decline, trend, trifoliate yam

Procedia PDF Downloads 380
393 When and How Do Individuals Transition from Regular Drug Use to Injection Drug Use in Uganda? Findings from a Rapid Assessment

Authors: Stanely Nsubuga

Abstract:

Background In Uganda, injection drug use is a growing but less studied problem. Preventing the transition to injection drug use may help prevent blood-borne viral transmission, but little is known about when and how people transition to injection drug use. A greater understanding of this transition process may aid in the country’s efforts to prevent the continued growth of injection drug use, HIV, and hepatitis C Virus (HCV) infection among people who inject drugs (PWID). Methods Using a rapid situation assessment framework, we conducted semi-structured interviews among 125 PWID (102 males and 23 females)—recruited through outreach and snow-ball sampling. Participants were interviewed about their experiences on when and how they transitioned into injection drug use and these issues were also discussed in 12 focus groups held with the participants. Results All the study participants started their drug use career with non-injecting forms including chewing, smoking, and sniffing before transitioning to injecting. Transitioning was generally described as a peer-driven and socially learnt behavior. The participants’ social networks and accessibility to injectable drugs on the market and among close friends influenced the time lag between first regular drug use and first injecting—which took an average of 4.5 years. By the age of 24, at least 81.6% (95.7% for females and 78.4% for males) had transitioned into injecting. Over 84.8% shared injecting equipment during their first injection, 47.2% started injecting because a close friend was already injecting, 26.4% desired to achieve a greater “high” (26.4%) which could reflect drug-tolerance, and 12% out of curiosity.

Keywords: People who Use Drugs, transition, injection drug use, Uganda

Procedia PDF Downloads 102
392 Optimality of Shapley Value Mechanism under Sybil Strategies

Authors: Bruno Mazorra Roig

Abstract:

In the realm of cost-sharing mechanisms, the vulnerability to Sybil strategies, where agents can create fake identities to manipulate outcomes, has not yet been studied. In this paper, we delve into the intricacies of different cost-sharing mechanisms proposed in the literature, highlighting its non-Sybil-resistance nature. Furthermore, we prove that under mild conditions, a Sybil-proof cost-sharing mechanism for public excludable goods is at least (n/2 + 1)−approximate. This finding reveals an exponential increase in the worst-case social cost in environments where agents are restricted from using Sybil strategies. We introduce the concept of Sybil Welfare Invariant mechanisms, where a mechanism maintains its worst-case welfare under Sybil strategies for every set of prior beliefs with full support even when the mechanism is not Sybil-proof. Finally, we prove that the Shapley value mechanism for public excludable goods holds this property and so deduce that the worst-case social cost of this mechanism is the nth harmonic number Hn under the equilibrium of the game with Sybil strategies, matching the worst-case social cost bound for cost-sharing mechanisms. This finding carries important implications for decentralized autonomous organizations (DAOs), indicating that they are capable of funding public excludable goods efficiently, even when the total number of agents is unknown.

Keywords: game theory, mechanism design, cost sharing, false-name proofness

Procedia PDF Downloads 34
391 Global Voltage Harmonic Index for Measuring Harmonic Situation of Power Grids: A Focus on Power Transformers

Authors: Alireza Zabihi, Saeed Peyghami, Hossein Mokhtari

Abstract:

With the increasing deployment of renewable power plants, such as solar and wind, it is crucial to measure the harmonic situation of the grid. This paper proposes a global voltage harmonic index to measure the harmonic situation of the power grid with a focus on power transformers. The power electronics systems used to connect these plants to the network can introduce harmonics, leading to increased losses, reduced efficiency, false operation of protective relays, and equipment damage due to harmonic intensifications. The proposed index considers the losses caused by harmonics in power transformers which are of great importance and value to the network, providing a comprehensive measure of the harmonic situation of the grid. The effectiveness of the proposed index is evaluated on a real-world distribution network, and the results demonstrate its ability to identify the harmonic situation of the network, particularly in relation to power transformers. The proposed index provides a comprehensive measure of the harmonic situation of the grid, taking into account the losses caused by harmonics in power transformers. The proposed index has the potential to support power companies in optimizing their power systems and to guide researchers in developing effective mitigation strategies for harmonics in the power grid.

Keywords: global voltage harmonic index, harmonics, power grid, power quality, power transformers, renewable energy

Procedia PDF Downloads 95
390 Bilingual Identities of Kuwaiti Students at Universities with EMI

Authors: Marta Tryzna, Shahd Al Shammari

Abstract:

Though Modern Standard Arabic (MSA) is the only official language in GCC states, including Kuwait, and traditionally the preferred vehicle for literacy in the Arab countries, recent studies in Qatar and the UAE observe a growing role of English, particularly in literacy and knowledge transmission contexts. The present study examines the attitudes to Arabic and English and the use of both languages in literacy-related domains based on a sample of bilingual Arabic-English undergraduates (N=522) at a private university with EMI in Kuwait. The results indicate that Arabic (Kuwaiti dialect) is associated with familial interactions, Arabic-English bilingualism predominates in interactions with classmates, friends, on social media and at work, while English is prevalent in literacy-related contexts such as reading books, magazines, or online material, domains traditionally associated with MSA. Attitudes towards Arabic and English are equally positive according to the majority of the respondents, who report being comfortable expressing themselves and projecting their identity in both languages. No statistically significant differences were found comparing the importance of Arabic and English in the sample. Future trends were identified based on high agreement on the importance of speaking English with children and low agreement on speaking only Arabic at home. The study corroborates recently observed trends in the GCC favoring bilingualism across personal, academic and professional domains, with English becoming the preferred language of literacy among young bilingual Kuwaitis.

Keywords: bilingual, English, Arabic, EMI, identity

Procedia PDF Downloads 122
389 'Freud and Jung: Dissenting Friends'; An Analysis of the Foundations of the Psychoanalytical Theory in Theirs Letters

Authors: Laurence Doremus

Abstract:

Freud as the builder of psychoanalysis as a discipline had created the science with Carl Gustav Jung (1875-1961), a psychiatry specialist from Zurich who was very important in the Freudian theory. The knowledge about the foundation of psychoanalysis is often focused on the influence of the works from Breuer or Charcot in the Freudian praxis, at least at the beginning of his career, and Jung's influence is often under-estimated. The paper focuses on the importance of the Jungian contributions in Freud's theories at the beginning of the creation of the discipline in the 1910s. We often meet Jungian schools on the first hand and Freudian schools, on the other hand in the academic field, but the Freudian field has to admit the importance of the Jungian theories in Freudian science. And also, the dialectical energy which appears in the letters exchanged between both of the fathers of psychoanalysis is important to understand the foundations of Freud Theory. That's why the paper will analyze in detail the correspondence between them in an epistemological and historical approach. Effectively the letters were translated and published (in French but also in English and other languages) lately in history and are still not well knew by the researchers in the psychoanalytical field. We well explain how Freud was helped by Jung despite his desire to build the theory. We analyze how the second topic named 'unconscious, preconscious, and conscious', is the result of the first topic that Jung built with Freud. The paper is a contribution to the knowledge we should have about the intense friendship between the two protagonists.

Keywords: Carl Gustav Jung, correspondence, Freud's letters, psychoanalytic theory

Procedia PDF Downloads 124
388 Female Entrepreneurship in Egypt: Barriers and Challenges in the Aftermath of the Arab Spring

Authors: Kate Ebere Maduforo

Abstract:

Examining the constraints faced by female entrepreneurs is an important subject which most literature on female entrepreneurship is centered on. However, the majority of the existing literature has focused on studying female entrepreneurs in developed societies. Recently, a sense of urgency that has emerged in trying to understand the challenges and motivations of female entrepreneurs in developing countries. The arousal of such interest has been attributed to women entrepreneurs in developing countries being identified as catalysts of economic development at a national level and champions of poverty eradication at the domestic level. This paper, therefore, examines the peculiar constraints faced by women-owned businesses in the mist of political chaos and instability. In this case, the issues experienced by female entrepreneurs in Egypt during the aftermath of the Arab Spring is the focus. Using the logit and probit regression models, data from the World Bank Middle East North Africa Enterprise Survey (MENA ES) are analyzed. The results identified that female entrepreneurs still lack business funding through financial institutions, but get significant funding assistance from family, friends, and money lenders. In addition, women-owned businesses promote and hire mostly women. Female entrepreneurs showed a preference for an impartial judicial system as a contributor to business growth.

Keywords: female entrepreneurship, development, Middle East, developing countries

Procedia PDF Downloads 97
387 The Socio-Religious, Economic, and Cultural Impacts of Aso-Ebi on South-East Nigeria

Authors: Nwaoga, Theresa Chinyere

Abstract:

The paper examines the impacts of Aso-Ebi, a Yoruba term for ‘uniform’ on the people of south-east Nigeria. Aso-Ebi is used to denote uniform wear which is typical of the people of south-west Nigeria. In the 1980s and 1990s, uniform wears were used only by immediate family members of a deceased person. This is for easy identification by visitors—to know those who are related to the deceased person. Aso-Ebi is now part of a culture that has existed in Nigeria from the Yoruba and transcended to other parts of Nigeria, precisely south-east Nigeria. The buying of Aso-Ebi and attending the occasions in the attire is the only way of showing solidarity and support to the celebrant. Aso-Ebi has led to creating a sense of belonging, opening of doors for marriage by those single, and fundraising. As part of the findings, it was discovered that Aso-Ebi has led to an increase in marital infidelity and divorce, robbery, prostitution, depression, and an increase in enmity between friends in south-east Nigeria. Data was generated through oral interviews, focus group discussion and participant observation. Secondary data were obtained from journals, textbooks, the internet and periodicals. The phenomenological method of research was used as the methodology. This method allows for an objective report and analysis of the research problem. Aso-Ebi has come to stay in Igbo culture, so there should be a proper re-orientation on the uses of Aso-Ebi during occasions like burial in Igbo land. The campaign can start from the church by discouraging people from using Aso-Ebi during burials and wedding ceremonies.

Keywords: Asho Ebi, uniformed women, burial ceremonies, August meetings

Procedia PDF Downloads 112
386 Relations between Psychological Adjustment and Perceived Parental, Teacher and Best Friend Acceptance among Bangladeshi Adolescents

Authors: Tariqul Islam, Shaheen Mollah

Abstract:

The study's main objective is to assess the relationship between psychological adjustment and parental acceptance-rejection, teacher acceptance-rejection, and best friend acceptance-rejection among secondary school students. This study was conducted on a sample of 300 (6th through 10th-grade students) recruited from over ten schools in Dhaka. While the schools were selected purposively, the respondents within each school were selected conveniently. The collected data were analyzed using Pearson product-moment correlation, hierarchical regression, and simultaneous regression analysis. The results showed that psychological adjustment is positively correlated with paternal, maternal, teacher, and best friend acceptance. The paternal acceptance was significantly connected with maternal acceptance. The teacher and best friend acceptance are correlated substantially with paternal and maternal acceptance. The hierarchical multiple regressions indicated that maternal, paternal, teacher, and best friend acceptance-rejection contributed significantly to students' psychological adjustment. The results revealed substantial independent contributions of maternal, paternal, teacher, and best friend acceptance on the students' psychological adjustment. The simultaneous regression analysis indicates that the maternal and best friend acceptances (but not paternal acceptance) were significant predictors of psychological adjustments. It showed that 41.7% variability in psychological adjustment could be explained by paternal, maternal, and best friend acceptance. The findings of the present study are exciting. They may contribute to developing insight in parents and best friends for behaving properly with their offspring and friend, respectively, for better psychological adjustment.

Keywords: adjustment, parenting, rejection, acceptance

Procedia PDF Downloads 122
385 Drop-Out Rate in Leocadio Alejo Entienza High School for SY 2013-2014: Its Causes and Interventions

Authors: Raquel Balon Quintana

Abstract:

This study aims to help the Students-At-Risk of Dropping Out to finish their studies in their grade/year level category for this school year by finding out students’ behavior in and out the school, community involvement in the learning process and the causes or reasons behind drop-out rate that affect the performance level of the school. This study also looked for the intervention measures to reduce the drop-out rate of the school. The Normative Survey Method of research was used to achieve its purpose and objective of conducting interview with students and their parents, subject teachers, classmates and friends; undertaking observation and monitoring to find out the whereabouts of SARDO’s on and off classes hours; using questionnaires; and conducting home visitation to be able to link the community involvement into dropping-out of student. Results of the study revealed that out of 32 Students-At-Risk of Dropping Out, 50% were over age for high school (16 years old to 21 years old) while the other 50% came from the regular high school students. These 16 students came from the 41 students who dropped-out from their classes last school year. All Students-At-Risk of Dropping-Out are single and seventy-eight percent of them are male. Top five (5) among the factors that affect their school performance were peer pressure, self-drive, malnutrition, family problem/support and truancy. The five (5) least factors that affect their schooling were problems within their community, school-administration factor, harassment, teacher factor and distance from the school.

Keywords: students-at-risk of dropping-out, drop-out rate, Leocadio Alejo Entienza High School, Philippines

Procedia PDF Downloads 534
384 Probability-Based Damage Detection of Structures Using Kriging Surrogates and Enhanced Ideal Gas Molecular Movement Algorithm

Authors: M. R. Ghasemi, R. Ghiasi, H. Varaee

Abstract:

Surrogate model has received increasing attention for use in detecting damage of structures based on vibration modal parameters. However, uncertainties existing in the measured vibration data may lead to false or unreliable output result from such model. In this study, an efficient approach based on Monte Carlo simulation is proposed to take into account the effect of uncertainties in developing a surrogate model. The probability of damage existence (PDE) is calculated based on the probability density function of the existence of undamaged and damaged states. The kriging technique allows one to genuinely quantify the surrogate error, therefore it is chosen as metamodeling technique. Enhanced version of ideal gas molecular movement (EIGMM) algorithm is used as main algorithm for model updating. The developed approach is applied to detect simulated damage in numerical models of 72-bar space truss and 120-bar dome truss. The simulation results show the proposed method can perform well in probability-based damage detection of structures with less computational effort compared to direct finite element model.

Keywords: probability-based damage detection (PBDD), Kriging, surrogate modeling, uncertainty quantification, artificial intelligence, enhanced ideal gas molecular movement (EIGMM)

Procedia PDF Downloads 215
383 Verification of Simulated Accumulated Precipitation

Authors: Nato Kutaladze, George Mikuchadze, Giorgi Sokhadze

Abstract:

Precipitation forecasts are one of the most demanding applications in numerical weather prediction (NWP). Georgia, as the whole Caucasian region, is characterized by very complex topography. The country territory is prone to flash floods and mudflows, quantitative precipitation estimation (QPE) and quantitative precipitation forecast (QPF) at any leading time are very important for Georgia. In this study, advanced research weather forecasting model’s skill in QPF is investigated over Georgia’s territory. We have analyzed several convection parameterization and microphysical scheme combinations for different rainy episodes and heavy rainy phenomena. We estimate errors and biases in accumulated 6 h precipitation using different spatial resolution during model performance verification for 12-hour and 24-hour lead time against corresponding rain gouge observations and satellite data. Various statistical parameters have been calculated for the 8-month comparison period, and some skills of model simulation have been evaluated. Our focus is on the formation and organization of convective precipitation systems in a low-mountain region. Several problems in connection with QPF have been identified for mountain regions, which include the overestimation and underestimation of precipitation on the windward and lee side of the mountains, respectively, and a phase error in the diurnal cycle of precipitation leading to the onset of convective precipitation in model forecasts several hours too early.

Keywords: extremal dependence index, false alarm, numerical weather prediction, quantitative precipitation forecasting

Procedia PDF Downloads 124
382 Authenticity of Ecuadorian Commercial Honeys

Authors: Elisabetta Schievano, Valentina Zuccato, Claudia Finotello, Patricia Vit

Abstract:

Control of honey frauds is needed in Ecuador to protect bee keepers and consumers because simple syrups and new syrups with eucalyptus are sold as genuine honeys. Authenticity of Ecuadorian commercial honeys was tested with a vortex emulsion consisting on one volume of honey:water (1:1) dilution, and two volumes of diethyl ether. This method allows a separation of phases in one minute to discriminate genuine honeys that form three phase and fake honeys that form two phases; 34 of the 42 honeys analyzed from five provinces of Ecuador were genuine. This was confirmed with 1H NMR spectra of honey dilutions in deuterated water with an enhanced aminoacid region with signals for proline, phenylalanine and tyrosine. Classic quality indicators were also tested with this method (sugars, HMF), indicators of fermentation (ethanol, acetic acid), and residues of citric acid used in the syrup manufacture. One of the honeys gave a false positive for genuine, being an admixture of genuine honey with added syrup, evident for the high sucrose. Sensory analysis was the final confirmation to recognize the honey groups studied here, namely honey produced in combs by Apis mellifera, fake honey, and honey produced in cerumen pots by Geotrigona, Melipona, and Scaptotrigona. This is a valuable contribution to protect honey consumers, and to develop the beekeeping industry in Ecuador.

Keywords: fake, genuine, honey, 1H NMR, Ecuador

Procedia PDF Downloads 366
381 Field-Programmable Gate Array Based Tester for Protective Relay

Authors: H. Bentarzi, A. Zitouni

Abstract:

The reliability of the power grid depends on the successful operation of thousands of protective relays. The failure of one relay to operate as intended may lead the entire power grid to blackout. In fact, major power system failures during transient disturbances may be caused by unnecessary protective relay tripping rather than by the failure of a relay to operate. Adequate relay testing provides a first defense against false trips of the relay and hence improves power grid stability and prevents catastrophic bulk power system failures. The goal of this research project is to design and enhance the relay tester using a technology such as Field Programmable Gate Array (FPGA) card NI 7851. A PC based tester framework has been developed using Simulink power system model for generating signals under different conditions (faults or transient disturbances) and LabVIEW for developing the graphical user interface and configuring the FPGA. Besides, the interface system has been developed for outputting and amplifying the signals without distortion. These signals should be like the generated ones by the real power system and large enough for testing the relay’s functionality. The signals generated that have been displayed on the scope are satisfactory. Furthermore, the proposed testing system can be used for improving the performance of protective relay.

Keywords: amplifier class D, field-programmable gate array (FPGA), protective relay, tester

Procedia PDF Downloads 190
380 Experiences of Students with SLD at University: A Case Study

Authors: Lorna Martha Dreyer

Abstract:

Consistent with the changing paradigm on the rights of people with disabilities and in pursuit of social justice, there is internationally an increase in students with disabilities enrolling at Higher Education Institutions (HEIs). This trend challenges HEI’s to transform and attain Education for All (EFA) as a global imperative. However, while physical and sensory disabilities are observable, students with specific learning disabilities (SLD) do not present with any visible indications and are often referred to as “hidden” or “invisible” disabilities. This qualitative case study aimed to illuminate the experiences of students with SLDs at a South African university. The research was, therefore, guided by Vygotsky’s social-cultural theory (SCT). This research was conducted within a basic qualitative research methodology embedded in an interpretive paradigm. Data was collected through an online background survey and semi-structured interviews. Thematic qualitative content analysis was used to analyse the collected data systematically. From a social justice perspective, the major findings suggest that there are several factors that impede equal education for students with SLDs at university. Most participants in this small-scale study experienced a lack of acknowledgment and support from lecturers. They reported valuing the support of family and friends more than that of lecturers. It is concluded that lecturers need to be reflective of their pedagogical practices if authentic inclusion is to be realised.

Keywords: higher education, inclusive education, pedagogy, social-cultural theory, specific learning disabilities

Procedia PDF Downloads 122
379 Decision Making to Study Abroad among Indonesian Student Migrants in Europe: The Role of Communication Technology

Authors: Inayah Hidayati

Abstract:

Innovation in communication technology has opened up opportunities for student to migrate and study abroad. The increasing number of Indonesian students migrating to study abroad suggests the importance of understanding the reason underline their movements. Objective: This research aims to explain the migration decision-making process of Indonesian student migrants in Europe. In detail, this research will consider the innovation in communication technology in the migration decision-making process of students who emigrated from Indonesia and how they use that in the context of the migration decision-making process. Methods: The data collected included qualitative data from in-depth interviews. An interview guide was formulated to facilitate the in-depth interviews and generate a better understanding of migration behavior. Expectation: 1). Innovation in communication technology help Indonesian student migrants on migration decision making process. 2). Student migrants use communication technology platforms for searching information about destination area. Result: Student migrant in Europe use their communication technology platforms to gain information before they choose that country for study. They use WhatsApp and LINE to making contact with their friends and colleagues in the destination country. WhatsApp and LINE group help Indonesian student to get information about school and daily life.

Keywords: international migration, student, decision making process, communication technology platforms

Procedia PDF Downloads 223
378 Phishing Detection: Comparison between Uniform Resource Locator and Content-Based Detection

Authors: Nuur Ezaini Akmar Ismail, Norbazilah Rahim, Norul Huda Md Rasdi, Maslina Daud

Abstract:

A web application is the most targeted by the attacker because the web application is accessible by the end users. It has become more advantageous to the attacker since not all the end users aware of what kind of sensitive data already leaked by them through the Internet especially via social network in shake on ‘sharing’. The attacker can use this information such as personal details, a favourite of artists, a favourite of actors or actress, music, politics, and medical records to customize phishing attack thus trick the user to click on malware-laced attachments. The Phishing attack is one of the most popular attacks for social engineering technique against web applications. There are several methods to detect phishing websites such as Blacklist/Whitelist based detection, heuristic-based, and visual similarity-based detection. This paper illustrated a comparison between the heuristic-based technique using features of a uniform resource locator (URL) and visual similarity-based detection techniques that compares the content of a suspected phishing page with the legitimate one in order to detect new phishing sites based on the paper reviewed from the past few years. The comparison focuses on three indicators which are false positive and negative, accuracy of the method, and time consumed to detect phishing website.

Keywords: heuristic-based technique, phishing detection, social engineering and visual similarity-based technique

Procedia PDF Downloads 156