Search results for: internet language
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5351

Search results for: internet language

1391 A Comparative Study of Mechanisms across Different Online Social Learning Types

Authors: Xinyu Wang

Abstract:

In the context of the rapid development of Internet technology and the increasing prevalence of online social media, this study investigates the impact of digital communication on social learning. Through three behavioral experiments, we explore both affective and cognitive social learning in online environments. Experiment 1 manipulates the content of experimental materials and two forms of feedback, emotional valence, sociability, and repetition, to verify whether individuals can achieve online emotional social learning through reinforcement using two social learning strategies. Results reveal that both social learning strategies can assist individuals in affective, social learning through reinforcement, with feedback-based learning strategies outperforming frequency-dependent strategies. Experiment 2 similarly manipulates the content of experimental materials and two forms of feedback to verify whether individuals can achieve online knowledge social learning through reinforcement using two social learning strategies. Results show that similar to online affective social learning, individuals adopt both social learning strategies to achieve cognitive social learning through reinforcement, with feedback-based learning strategies outperforming frequency-dependent strategies. Experiment 3 simultaneously observes online affective and cognitive social learning by manipulating the content of experimental materials and feedback at different levels of social pressure. Results indicate that online affective social learning exhibits different learning effects under different levels of social pressure, whereas online cognitive social learning remains unaffected by social pressure, demonstrating more stable learning effects. Additionally, to explore the sustained effects of online social learning and differences in duration among different types of online social learning, all three experiments incorporate two test time points. Results reveal significant differences in pre-post-test scores for online social learning in Experiments 2 and 3, whereas differences are less apparent in Experiment 1. To accurately measure the sustained effects of online social learning, the researchers conducted a mini-meta-analysis of all effect sizes of online social learning duration. Results indicate that although the overall effect size is small, the effect of online social learning weakens over time.

Keywords: online social learning, affective social learning, cognitive social learning, social learning strategies, social reinforcement, social pressure, duration

Procedia PDF Downloads 49
1390 ESRA: An End-to-End System for Re-identification and Anonymization of Swiss Court Decisions

Authors: Joel Niklaus, Matthias Sturmer

Abstract:

The publication of judicial proceedings is a cornerstone of many democracies. It enables the court system to be made accountable by ensuring that justice is made in accordance with the laws. Equally important is privacy, as a fundamental human right (Article 12 in the Declaration of Human Rights). Therefore, it is important that the parties (especially minors, victims, or witnesses) involved in these court decisions be anonymized securely. Today, the anonymization of court decisions in Switzerland is performed either manually or semi-automatically using primitive software. While much research has been conducted on anonymization for tabular data, the literature on anonymization for unstructured text documents is thin and virtually non-existent for court decisions. In 2019, it has been shown that manual anonymization is not secure enough. In 21 of 25 attempted Swiss federal court decisions related to pharmaceutical companies, pharmaceuticals, and legal parties involved could be manually re-identified. This was achieved by linking the decisions with external databases using regular expressions. An automated re-identification system serves as an automated test for the safety of existing anonymizations and thus promotes the right to privacy. Manual anonymization is very expensive (recurring annual costs of over CHF 20M in Switzerland alone, according to an estimation). Consequently, many Swiss courts only publish a fraction of their decisions. An automated anonymization system reduces these costs substantially, further leading to more capacity for publishing court decisions much more comprehensively. For the re-identification system, topic modeling with latent dirichlet allocation is used to cluster an amount of over 500K Swiss court decisions into meaningful related categories. A comprehensive knowledge base with publicly available data (such as social media, newspapers, government documents, geographical information systems, business registers, online address books, obituary portal, web archive, etc.) is constructed to serve as an information hub for re-identifications. For the actual re-identification, a general-purpose language model is fine-tuned on the respective part of the knowledge base for each category of court decisions separately. The input to the model is the court decision to be re-identified, and the output is a probability distribution over named entities constituting possible re-identifications. For the anonymization system, named entity recognition (NER) is used to recognize the tokens that need to be anonymized. Since the focus lies on Swiss court decisions in German, a corpus for Swiss legal texts will be built for training the NER model. The recognized named entities are replaced by the category determined by the NER model and an identifier to preserve context. This work is part of an ongoing research project conducted by an interdisciplinary research consortium. Both a legal analysis and the implementation of the proposed system design ESRA will be performed within the next three years. This study introduces the system design of ESRA, an end-to-end system for re-identification and anonymization of Swiss court decisions. Firstly, the re-identification system tests the safety of existing anonymizations and thus promotes privacy. Secondly, the anonymization system substantially reduces the costs of manual anonymization of court decisions and thus introduces a more comprehensive publication practice.

Keywords: artificial intelligence, courts, legal tech, named entity recognition, natural language processing, ·privacy, topic modeling

Procedia PDF Downloads 148
1389 Undergraduate Students’ Learning Experience and Practices in Multilingual Higher Education Institutions: The Case of the University of Luxembourg

Authors: Argyro Maria Skourmalla

Abstract:

The present paper draws on the example of the University of Luxembourg as a multilingual and international setting. The University of Luxembourg, which is located between France, Germany, and Belgium, has adopted a new multilingualism policy in 2020, establishing English, French, German, and Luxembourgish as the official languages of the Institution. With around 7.000 students, more than half of which are international students, the University is a meeting point for languages and cultures. This paper includes data from an online survey that with undergraduate students from different disciplines at the University of Luxembourg. Students shared their personal experience and opinions regarding language use in this higher education context, as well as practices they use in learning in this multilingual context. Findings show the role of technology in assisting students in different aspects of learning this multilingual context. At the same time, more needs to be done to avoid an exclusively monolingual paradigm in higher education. Findings also show that some languages remain ‘unseen’ in this context. Overall, even though linguistic diversity in this University is seen as an asset, a lot needs to be done towards the recognition of staff and students’ linguistic repertoires for inclusion and education equity.

Keywords: higher education, learning, linguistic diversity, multilingual practices

Procedia PDF Downloads 66
1388 Argument Representation in Non-Spatial Motion Bahasa Melayu Based Conceptual Structure Theory

Authors: Nurul Jamilah Binti Rosly

Abstract:

The typology of motion must be understood as a change from one location to another. But from a conceptual point of view, motion can also occur in non-spatial contexts associated with human and social factors. Therefore, from the conceptual point of view, the concept of non-spatial motion involves the movement of time, ownership, identity, state, and existence. Accordingly, this study will focus on the lexical as shared, accept, be, store, and exist as the study material. The data in this study were extracted from the Database of Languages and Literature Corpus Database, Malaysia, which was analyzed using semantics and syntax concepts using Conceptual Structure Theory - Ray Jackendoff (2002). Semantic representations are represented in the form of conceptual structures in argument functions that include functions [events], [situations], [objects], [paths] and [places]. The findings show that the mapping of these arguments comprises three main stages, namely mapping the argument structure, mapping the tree, and mapping the role of thematic items. Accordingly, this study will show the representation of non- spatial Malay language areas.

Keywords: arguments, concepts, constituencies, events, situations, thematics

Procedia PDF Downloads 130
1387 Neural Networks Models for Measuring Hotel Users Satisfaction

Authors: Asma Ameur, Dhafer Malouche

Abstract:

Nowadays, user comments on the Internet have an important impact on hotel bookings. This confirms that the e-reputation issue can influence the likelihood of customer loyalty to a hotel. In this way, e-reputation has become a real differentiator between hotels. For this reason, we have a unique opportunity in the opinion mining field to analyze the comments. In fact, this field provides the possibility of extracting information related to the polarity of user reviews. This sentimental study (Opinion Mining) represents a new line of research for analyzing the unstructured textual data. Knowing the score of e-reputation helps the hotelier to better manage his marketing strategy. The score we then obtain is translated into the image of hotels to differentiate between them. Therefore, this present research highlights the importance of hotel satisfaction ‘scoring. To calculate the satisfaction score, the sentimental analysis can be manipulated by several techniques of machine learning. In fact, this study treats the extracted textual data by using the Artificial Neural Networks Approach (ANNs). In this context, we adopt the aforementioned technique to extract information from the comments available in the ‘Trip Advisor’ website. This actual paper details the description and the modeling of the ANNs approach for the scoring of online hotel reviews. In summary, the validation of this used method provides a significant model for hotel sentiment analysis. So, it provides the possibility to determine precisely the polarity of the hotel users reviews. The empirical results show that the ANNs are an accurate approach for sentiment analysis. The obtained results show also that this proposed approach serves to the dimensionality reduction for textual data’ clustering. Thus, this study provides researchers with a useful exploration of this technique. Finally, we outline guidelines for future research in the hotel e-reputation field as comparing the ANNs with other technique.

Keywords: clustering, consumer behavior, data mining, e-reputation, machine learning, neural network, online hotel ‘reviews, opinion mining, scoring

Procedia PDF Downloads 137
1386 Forecasting Future Society to Explore Promising Security Technologies

Authors: Jeonghwan Jeon, Mintak Han, Youngjun Kim

Abstract:

Due to the rapid development of information and communication technology (ICT), a substantial transformation is currently happening in the society. As the range of intelligent technologies and services is continuously expanding, ‘things’ are becoming capable of communicating one another and even with people. However, such “Internet of Things” has the technical weakness so that a great amount of such information transferred in real-time may be widely exposed to the threat of security. User’s personal data are a typical example which is faced with a serious security threat. The threats of security will be diversified and arose more frequently because next generation of unfamiliar technology develops. Moreover, as the society is becoming increasingly complex, security vulnerability will be increased as well. In the existing literature, a considerable number of private and public reports that forecast future society have been published as a precedent step of the selection of future technology and the establishment of strategies for competitiveness. Although there are previous studies that forecast security technology, they have focused only on technical issues and overlooked the interrelationships between security technology and social factors are. Therefore, investigations of security threats in the future and security technology that is able to protect people from various threats are required. In response, this study aims to derive potential security threats associated with the development of technology and to explore the security technology that can protect against them. To do this, first of all, private and public reports that forecast future and online documents from technology-related communities are collected. By analyzing the data, future issues are extracted and categorized in terms of STEEP (Society, Technology, Economy, Environment, and Politics), as well as security. Second, the components of potential security threats are developed based on classified future issues. Then, points that the security threats may occur –for example, mobile payment system based on a finger scan technology– are identified. Lastly, alternatives that prevent potential security threats are proposed by matching security threats with points and investigating related security technologies from patent data. Proposed approach can identify the ICT-related latent security menaces and provide the guidelines in the ‘problem – alternative’ form by linking the threat point with security technologies.

Keywords: future society, information and communication technology, security technology, technology forecasting

Procedia PDF Downloads 469
1385 Conditions Required for New Sector Emergence: Results from a Systematic Literature Review

Authors: Laurie Prange-Martin, Romeo Turcan, Norman Fraser

Abstract:

The aim of this study is to identify the conditions required and describe the process of emergence for a new economic sector created from new or established businesses. A systematic literature review of English-language studies published from 1983 to 2016 was conducted using the following databases: ABI/INFORM Complete; Business Source Premiere; Google Scholar; Scopus; and Web of Science. The two main terms of business sector and emergence were used in the systematic literature search, along with another seventeen synonyms for each these main terms. From the search results, 65 publications met the requirements of an empirical study discussing and reporting the conditions of new sector emergence. A meta-analysis of the literature examined suggest that there are six favourable conditions and five key individuals or groups required for new sector emergence. In addition, the results from the meta-analysis showed that there are eighteen theories used in the literature to explain the phenomenon of new sector emergence, which can be grouped in three study disciplines. With such diversity in theoretical frameworks used in the 65 empirical studies, the authors of this paper propose the development of a new theory of sector emergence.

Keywords: economic geography, new sector emergence, economic diversification, regional economies

Procedia PDF Downloads 271
1384 Impact of the Non-Energy Sectors Diversification on the Energy Dependency Mitigation: Visualization by the “IntelSymb” Software Application

Authors: Ilaha Rzayeva, Emin Alasgarov, Orkhan Karim-Zada

Abstract:

This study attempts to consider the linkage between management and computer sciences in order to develop the software named “IntelSymb” as a demo application to prove data analysis of non-energy* fields’ diversification, which will positively influence on energy dependency mitigation of countries. Afterward, we analyzed 18 years of economic fields of development (5 sectors) of 13 countries by identifying which patterns mostly prevailed and which can be dominant in the near future. To make our analysis solid and plausible, as a future work, we suggest developing a gateway or interface, which will be connected to all available on-line data bases (WB, UN, OECD, U.S. EIA) for countries’ analysis by fields. Sample data consists of energy (TPES and energy import indicators) and non-energy industries’ (Main Science and Technology Indicator, Internet user index, and Sales and Production indicators) statistics from 13 OECD countries over 18 years (1995-2012). Our results show that the diversification of non-energy industries can have a positive effect on energy sector dependency (energy consumption and import dependence on crude oil) deceleration. These results can provide empirical and practical support for energy and non-energy industries diversification’ policies, such as the promoting of Information and Communication Technologies (ICTs), services and innovative technologies efficiency and management, in other OECD and non-OECD member states with similar energy utilization patterns and policies. Industries, including the ICT sector, generate around 4 percent of total GHG, but this is much higher — around 14 percent — if indirect energy use is included. The ICT sector itself (excluding the broadcasting sector) contributes approximately 2 percent of global GHG emissions, at just under 1 gigatonne of carbon dioxide equivalent (GtCO2eq). Ergo, this can be a good example and lesson for countries which are dependent and independent on energy, and mainly emerging oil-based economies, as well as to motivate non-energy industries diversification in order to be ready to energy crisis and to be able to face any economic crisis as well.

Keywords: energy policy, energy diversification, “IntelSymb” software, renewable energy

Procedia PDF Downloads 224
1383 Research on the Effectiveness of Online Guided Case Teaching in Problem-Based Learning: A Preschool Special Education Course

Authors: Chen-Ya Juan

Abstract:

Problem-Based Learning uses vague questions to guide student thinking and enhance their self-learning and collaboration. Most teachers implement PBL in a physical classroom, where teachers can monitor and evaluate students’ learning progress and guide them to search resources for answers. However, the prevalence of the Covid-19 in the world had changed from physical teaching to distance teaching. This instruction used many cases and applied Problem-Based Learning combined on the distance teaching via the internet for college students. This study involved an experimental group with PBL and a control group without PBL. The teacher divided all students in PBL class into eight groups, and 7~8 students in each group. The teacher assigned different cases for each group of the PBL class. Three stages of instruction were developed, including background knowledge of Learning, case analysis, and solving problems for each case. This study used a quantitative research method, a two-sample t-test, to find a significant difference in groups with PBL and without PBL. Findings indicated that PBL incased the average score of special education knowledge. The average score was improved by 20.46% in the PBL group and 15.4% without PBL. Results didn’t show significant differences (0.589>0.05) in special education professional knowledge. However, the feedback of the PBL students implied learning more about the application, problem-solving skills, and critical thinking. PBL students were more likely to apply professional knowledge on the actual case, find questions, resources, and answers. Most of them understood the importance of collaboration, working as a team, and communicating with other team members. The suggestions of this study included that (a) different web-based teaching instruments influenced student’s Learning; (b) it is difficult to monitor online PBL progress; (c) online PBL should be implemented flexible and multi-oriented; (d) although PBL did not show a significant difference on the group with PBL and without PBL, it did increase student’s problem-solving skills and critical thinking.

Keywords: problem-based learning, college students, distance learning, case analysis, problem-solving

Procedia PDF Downloads 130
1382 Hong Kong Chinese-Speaking Adolescents Diagnosed with Dyslexia: What Is and Is Not Improved?

Authors: Kevin Kien Hoa Chung

Abstract:

The present study was to investigate cognitive-linguistic skills that might distinguish the improved dyslexics from the non-improved dyslexics. Twenty-eight improved dyslexics and 28 non-improved dyslexics were selected from a pool of 254 students diagnosed as dyslexics in Grade 1 to 2. These students were administered measures: morphological skills, visual-orthographic skills, rapid naming skills, working memory, reading comprehension, writing, word reading, word dictation, and one-minute word reading. Findings showed that the improved dyslexics performed better than the non-improved dyslexics in visual-orthographic skills, word reading, one-minute reading, writing, and reading comprehension. Furthermore, the improved dyslexics showed fewer cognitive-linguistic deficits compared with the non-improved dyslexics. Among the 4 cognitive-linguistic measures, morphological skills and visual-orthographic skills showed the greatest power in discriminating the improved and non-improved dyslexics. Results underscore the importance of cognitive-linguistic skills underlying the manifestations of the improved and non-improved dyslexia in Chinese adolescents.

Keywords: adolescents, chinese language, improved dyslexics, non-improved dyslexics

Procedia PDF Downloads 391
1381 A Board of Comparative Study of Central Secondary Education (CBSE) and Board of Secondry Education Madhya Pradesh BHOPAL (BSEMPB) Hindi Text Books of Class-VI

Authors: Shri Krishna Mishra, Badri Yadav

Abstract:

Proficient persons should be involved in formulation of the structure of the textbooks so that the topics selected in the Hindi textbooks for Class VII should contribute towards linguistic and literary development of the child and the language of the textbook matches the comprehension level of the student.The topics of tile textbooks should provide good illustrations and suitable exercises. Topics of variety of taste can be included in the textbook to satisfy the inquisitive children. There could be abstracts/hints at the beginning of each lesson. Meanings for difficult words must be given at the end of each topic for convenience of the parents and children as most of them find it difficult and time consuming to use Hindi dictionary. Exercises should be relevant covering the whole topic and the difficulty level should match the maturity level of the students in respect of CBSE Board. The stitching and binding of CBSE prescribed books may be improved to increase durability.

Keywords: comparative study of CBSE and BSEMPB, Central Secondary Education, Board of Secondry Education, BHOPAL

Procedia PDF Downloads 397
1380 The Language of Fliptop among Filipino Youth: A Discourse Analysis

Authors: Bong Borero Lumabao

Abstract:

This qualitative research is a study on the lines of Fliptop talks performed by the Fliptop rappers employing Finnegan’s (2008) discourse analysis. This paper aimed to analyze the phonological, morphological, and semantic features of the fliptop talk, to explore the structures in the lines of Fliptop among Filipino youth, and to uncover the various insights that can be gained from it. The corpora of the study included all the 20 Fliptop Videos downloaded from the Youtube Channel of Fliptop. Results revealed that Fliptop contains phonological features such as assonance, consonance, deletion, lengthening, and rhyming. Morphological features include acronym, affixation, blending, borrowing, code-mixing and switching, compounding, conversion or functional shifts, and dysphemism. Semantics presented the lexical category, meaning, and words used in the fliptop talks. Structure of Fliptop revolves on the personal attack (physical attributes), attack on the bars (rapping skills), extension: family members and friends, antithesis, profane words, figurative languages, sexual undertones, anime characters, homosexuality, and famous celebrities involvement.

Keywords: discourse analysis, fliptop talks, filipino youth, fliptop videos, Philippines

Procedia PDF Downloads 245
1379 Rural School English Teacher Motivational Practice on Facilitating Student Motivation

Authors: Hsiao-Wen Hsu

Abstract:

It is generally believed that the teacher’s use of motivational strategies can enhance student motivation, especially in a place like Taiwan where teacher usually dominates student EFL learning. However, only little empirical studies support this claim. This study examined the connection between teachers’ use of motivational teaching practice and observed student motivated behavior in rural junior high schools in Taiwan. The use of motivational strategies by 12 teachers in five recognized rural junior high schools was investigated observed using a classroom observation instrument, the Motivation Orientation of Language Teaching. Meanwhile, post-lesson teacher evaluations accomplished by both the researcher and the teacher were functioning as part of the measure of teacher motivational practice. The data collected through observation scheme follows the real-time coding principle to examine observable teacher motivational practice and learner motivated behaviors. The results support the previous research findings that teachers’ use of motivational strategies is associated with the student motivated behaviors as well as the students’ level of motivation regarding English learning.

Keywords: English learning, motivational strategies, student motivation, teacher motivational practices

Procedia PDF Downloads 409
1378 Hindrances to Effective Delivery of Infrastructural Development Projects in Nigeria’s Built Environment

Authors: Salisu Gidado Dalibi, Sadiq Gumi Abubakar, JingChun Feng

Abstract:

Nigeria’s population is about 190 million and is on the increase annually making it the seventh most populated nation in the world and first in Africa. This population growth comes with its prospects, needs, and challenges especially on the existing and future infrastructure. Infrastructure refers to structures, systems, and facilities serving the economy of a country, city, town, businesses, industries, etc. These include roads, railways lines, bridges, tunnels, ports, stadiums, dams and water projects, power generation plants and distribution grids, information, and communication technology (ICT), etc. The Nigerian government embarked on several infrastructural development projects (IDPs) to address the deficit as the present infrastructure cannot cater to the needs nor sustain the country. However, delivering such IDPs have not been smooth; comes with challenges from within and outside the project; frequent delays and abandonment. Thus, affecting all the stakeholders involved. Hence, the aim of this paper is to identify and assess the factors that are hindering the effective delivery of IDPs in Nigeria’s built environment with the view to offer more insight into such factors, and ways to address them. The methodology adopted in this study involves the use of secondary sources of data from several materials (official publications, journals, newspapers, internet, etc.) were reviewed within the IDPs field by laying more emphasis on Nigeria’s cases. The hindrance factors in this regard were identified which forms the backbone of the questionnaire. A pilot survey was used to test its suitability; after which it was randomly administered to various project professionals in Nigeria’s construction industry using a 5-point Likert scale format to ascertain the impact of these hindrances. Cronbach’s Alpha reliability test, mean item score computations, relative importance indices, T-test, Chi-Square statistics were used for data analyses. The results outline the impact of various internal, external and project related factors that are hindering IDPs within Nigeria’s built environment.

Keywords: built environment, development, factors, hindrances, infrastructure, Nigeria, project

Procedia PDF Downloads 180
1377 A Greedy Alignment Algorithm Supporting Medication Reconciliation

Authors: David Tresner-Kirsch

Abstract:

Reconciling patient medication lists from multiple sources is a critical task supporting the safe delivery of patient care. Manual reconciliation is a time-consuming and error-prone process, and recently attempts have been made to develop efficiency- and safety-oriented automated support for professionals performing the task. An important capability of any such support system is automated alignment – finding which medications from a list correspond to which medications from a different source, regardless of misspellings, naming differences (e.g. brand name vs. generic), or changes in treatment (e.g. switching a patient from one antidepressant class to another). This work describes a new algorithmic solution to this alignment task, using a greedy matching approach based on string similarity, edit distances, concept extraction and normalization, and synonym search derived from the RxNorm nomenclature. The accuracy of this algorithm was evaluated against a gold-standard corpus of 681 medication records; this evaluation found that the algorithm predicted alignments with 99% precision and 91% recall. This performance is sufficient to support decision support applications for medication reconciliation.

Keywords: clinical decision support, medication reconciliation, natural language processing, RxNorm

Procedia PDF Downloads 287
1376 The Interrelations between Niemeyer’s Works and the Concept of Typology: A Computer Based Analysis of Form and Structure

Authors: Aline M. C. Santoro, João C. Pantoja, Eduardo P. Rossetti

Abstract:

While the aim of the modernist movement was to deny known typology, the creation of a new formal language also gave it new meaning, which was now related to Form. This is specifically true in the modern capital of Brazil, where Niemeyer sought to demonstrate the manner in which the new materials available, such as reinforced concrete, were able to produce innovative forms. With this study, we aim to demonstrate the relationship between Niemeyer’s forms and the topological typology known as tessellation, through the presentation of two case studies, the Monument to Caxias and the Saint George Orthodox Church. At a first glance, our purpose is to present the definition of Form, especially with relationship to the works of Niemeyer, seeking to identify in them the concepts presented by Moussavi. Afterwards, we will use a computer-based approach to study and model the forms of two of his buildings with the McNeel Rhinoceros program, where, with the aid of diagrams and renderings, we will be able to clearly and legibly represent their organic forms and further understand their structural systems. When we recognise the concept of typology as a starting point for structural form, it can be concluded that the case studies presented here are encompassed by the typology presented by Moussavi since they derive from his basic structural systems.

Keywords: form, Niemeyer, structure, typology, topology

Procedia PDF Downloads 199
1375 Machine Learning-Based Workflow for the Analysis of Project Portfolio

Authors: Jean Marie Tshimula, Atsushi Togashi

Abstract:

We develop a data-science approach for providing an interactive visualization and predictive models to find insights into the projects' historical data in order for stakeholders understand some unseen opportunities in the African market that might escape them behind the online project portfolio of the African Development Bank. This machine learning-based web application identifies the market trend of the fastest growing economies across the continent as well skyrocketing sectors which have a significant impact on the future of business in Africa. Owing to this, the approach is tailored to predict where the investment needs are the most required. Moreover, we create a corpus that includes the descriptions of over more than 1,200 projects that approximately cover 14 sectors designed for some of 53 African countries. Then, we sift out this large amount of semi-structured data for extracting tiny details susceptible to contain some directions to follow. In the light of the foregoing, we have applied the combination of Latent Dirichlet Allocation and Random Forests at the level of the analysis module of our methodology to highlight the most relevant topics that investors may focus on for investing in Africa.

Keywords: machine learning, topic modeling, natural language processing, big data

Procedia PDF Downloads 168
1374 From Industry 4.0 to Agriculture 4.0: A Framework to Manage Product Data in Agri-Food Supply Chain for Voluntary Traceability

Authors: Angelo Corallo, Maria Elena Latino, Marta Menegoli

Abstract:

Agri-food value chain involves various stakeholders with different roles. All of them abide by national and international rules and leverage marketing strategies to advance their products. Food products and related processing phases carry with it a big mole of data that are often not used to inform final customer. Some data, if fittingly identified and used, can enhance the single company, and/or the all supply chain creates a math between marketing techniques and voluntary traceability strategies. Moreover, as of late, the world has seen buying-models’ modification: customer is careful on wellbeing and food quality. Food citizenship and food democracy was born, leveraging on transparency, sustainability and food information needs. Internet of Things (IoT) and Analytics, some of the innovative technologies of Industry 4.0, have a significant impact on market and will act as a main thrust towards a genuine ‘4.0 change’ for agriculture. But, realizing a traceability system is not simple because of the complexity of agri-food supply chain, a lot of actors involved, different business models, environmental variations impacting products and/or processes, and extraordinary climate changes. In order to give support to the company involved in a traceability path, starting from business model analysis and related business process a Framework to Manage Product Data in Agri-Food Supply Chain for Voluntary Traceability was conceived. Studying each process task and leveraging on modeling techniques lead to individuate information held by different actors during agri-food supply chain. IoT technologies for data collection and Analytics techniques for data processing supply information useful to increase the efficiency intra-company and competitiveness in the market. The whole information recovered can be shown through IT solutions and mobile application to made accessible to the company, the entire supply chain and the consumer with the view to guaranteeing transparency and quality.

Keywords: agriculture 4.0, agri-food suppy chain, industry 4.0, voluntary traceability

Procedia PDF Downloads 147
1373 Introduction of an Approach of Complex Virtual Devices to Achieve Device Interoperability in Smart Building Systems

Authors: Thomas Meier

Abstract:

One of the major challenges for sustainable smart building systems is to support device interoperability, i.e. connecting sensor or actuator devices from different vendors, and present their functionality to the external applications. Furthermore, smart building systems are supposed to connect with devices that are not available yet, i.e. devices that become available on the market sometime later. It is of vital importance that a sustainable smart building platform provides an appropriate external interface that can be leveraged by external applications and smart services. An external platform interface must be stable and independent of specific devices and should support flexible and scalable usage scenarios. A typical approach applied in smart home systems is based on a generic device interface used within the smart building platform. Device functions, even of rather complex devices, are mapped to that generic base type interface by means of specific device drivers. Our new approach, presented in this work, extends that approach by using the smart building system’s rule engine to create complex virtual devices that can represent the most diverse properties of real devices. We examined and evaluated both approaches by means of a practical case study using a smart building system that we have developed. We show that the solution we present allows the highest degree of flexibility without affecting external application interface stability and scalability. In contrast to other systems our approach supports complex virtual device configuration on application layer (e.g. by administration users) instead of device configuration at platform layer (e.g. platform operators). Based on our work, we can show that our approach supports almost arbitrarily flexible use case scenarios without affecting the external application interface stability. However, the cost of this approach is additional appropriate configuration overhead and additional resource consumption at the IoT platform level that must be considered by platform operators. We conclude that the concept of complex virtual devices presented in this work can be applied to improve the usability and device interoperability of sustainable intelligent building systems significantly.

Keywords: Internet of Things, smart building, device interoperability, device integration, smart home

Procedia PDF Downloads 272
1372 Testing the Impact of Formal Interpreting Training on Working Memory Capacity: Evidence from Turkish-English Student-Interpreters

Authors: Elena Antonova Unlu, Cigdem Sagin Simsek

Abstract:

The research presents two studies examining the impact of formal interpreting training (FIT) on Working Memory Capacity (WMC) of student-interpreters. In Study 1, the storage and processing capacities of the working memory (WM) of last-year student-interpreters were compared with those of last-year Foreign Language Education (FLE) students. In Study 2, the impact of FIT on the WMC of student-interpreters was examined via comparing their results on WM tasks at the beginning and the end of their FIT. In both studies, Digit Span Task (DST) and Reading Span Task (RST) were utilized for testing storage and processing capacities of WM. The results of Study 1 revealed that the last-year student-interpreters outperformed the control groups on the RST but not on the DST. The findings of Study 2 were consistent with Study 1 showing that after FIT, the student-interpreters performed better on the RST but not on the DST. Our findings can be considered as evidence supporting the view that FIT has a beneficial effect not only on the interpreting skills of student-interpreters but also on the central executive and processing capacity of their WM.

Keywords: working memory capacity, formal interpreting training, student-interpreters, cross-sectional and longitudinal data

Procedia PDF Downloads 206
1371 Indigenous Childhood: Upbringing and Schooling in Two Indigenous Communities from Argentina (Qom and Mbyá)

Authors: Ana Carolina Hecht, Noelia Enriz, Mariana Garcia Palacios

Abstract:

The South American anthropology has been recently focused to research with children in different contexts. In our researches with children from indigenous communities in the lowlands and highlands of South America (Qom and Mbyá), we especially considered social categories that define the different ways of being a boy and a girl. In this way, we built an approach to disrupt monolithic models of childhood. The aim of this paper is to tackle the first stage of life, demarcated from their nominal references and from the upbringing and formative experiences in which children participate. So, we will focus on the network of social relations in the period of childhood, making especial focus on language develops, religion, schooling and games. The crossing of our different thematic interests allows us to consider the complexity of knowledge and skills that come into play during the development of children. Methodologically, this text is based on an ethnographic approach, with frequent visits and periods of cohabitation, for more than a decade with Mbyá and Qom people, who lives within indigenous communities in the provinces of Chaco, Buenos Aires and Misiones, in Argentina. We made participant observation and interviews with children and their families, with the objective to include children's voices in our researches about the whole community.

Keywords: chidhood, indigenous people, schooling, upbringing

Procedia PDF Downloads 341
1370 Reading Out of Curiosity: Making Undergraduates Competent in English

Authors: Ruwan Gunawardane

Abstract:

Second language teaching and learning is a complex process in which various factors are identified as having a negative impact on the competency in English among undergraduates of Sri Lanka. One such issue is the lack of intrinsic motivation among them to learn English despite the fact that they all know the importance of English. This study attempted to ascertain how the intrinsic motivation of undergraduates to learn English can be improved through reading out of curiosity. Humans are curious by nature, and cognitive psychology says that curiosity facilitates learning, memory, and motivation. The researcher carried out this study during the closure of universities due to the outbreak of the coronavirus through ‘Online Reading Café’, an online reading programme introduced by himself. He invited 1166 students of the Faculty of Science, University of Ruhuna, to read 50 articles taken from CNN and the BBC and posted at least two to three articles on the LMS of the faculty almost every day over a period of 23 days. The themes of the articles were based on the universe, exploration of planets, scientific experiments, evolution, etc., and the students were encouraged to collect as many words, phrases, and sentence structures as possible while reading and to form meaningful sentences using them. The data obtained through the students’ feedback was qualitatively analyzed. It was found that these undergraduates were interested in reading something out of curiosity, due to which intrinsic motivation is enhanced, and it facilitates competence in L2.

Keywords: English, competence, reading, curiosity

Procedia PDF Downloads 138
1369 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud

Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal

Abstract:

Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.

Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid

Procedia PDF Downloads 320
1368 Opportunities and Challenges of Digital Diplomacy in the Public Diplomacy of the Islamic Republic of Iran

Authors: Somayeh Pashaee

Abstract:

The ever-increasing growth of the Internet and the development of information and communication technology have prompted the politicians of different countries to use virtual networks as an efficient tool for their foreign policy. The communication of governments and countries, even in the farthest places from each other, through electronic networks, has caused vast changes in the way of statecraft and governance. Importantly, in the meantime, diplomacy, which is always based on information and communication, has been affected by the new prevailing conditions and new technologies more than other areas and has faced greater changes. The emergence of virtual space and the formation of new communication tools in the field of public diplomacy has led to the redefinition of the framework of diplomacy and politics in the international arena and the appearance of a new aspect of diplomacy called digital diplomacy. Digital diplomacy is in the concept of changing relations from a face-to-face and traditional way to a non-face-to-face and new way, and its purpose is to solve foreign policy issues using virtual space. Digital diplomacy, by affecting diplomatic procedures and its change, explains the role of technology in the visualization and implementation of diplomacy in different ways. The purpose of this paper is to investigate the position of digital diplomacy in the public diplomacy of the Islamic Republic of Iran. The paper tries to answer these two questions in a descriptive-analytical way, considering the progress of communication and the role of virtual space in the service of diplomacy, what is the approach of the Islamic Republic of Iran towards digital diplomacy and the use of a new way of establishing foreign relations in public diplomacy? What capacities and damages are facing the country after the use of this type of new diplomacy? In this paper, various theoretical concepts in the field of public diplomacy and modern diplomacy, including Geoff Berridge, Charles Kegley, Hans Tuch and Ronald Peter Barston, as well as the theoretical framework of Marcus Holmes on digital diplomacy, will be used as a conceptual basis to support the analysis. As a result, in order to better achieve the political goals of the country, especially in foreign policy, the approach of the Islamic Republic of Iran to public diplomacy with a focus on digital diplomacy should be strengthened and revised. Today, only emphasizing on advancing diplomacy through traditional methods may weaken Iran's position in the public opinion level from other countries.

Keywords: digital diplomacy, public diplomacy, islamic republic of Iran, foreign policy, opportunities and challenges

Procedia PDF Downloads 118
1367 Use of Oral Communication Strategies: A Study of Bangladeshi EFL Learners at the Graduate Level

Authors: Afroza Akhter Tina

Abstract:

This paper reports on an investigation into the use of specific types of oral communication strategies, namely ‘topic avoidance’, ‘message abandonment’, ‘code-switching’, ‘paraphrasing’, ‘restructuring’, and ‘stalling’ by Bangladeshi EFL learners at the graduate level. It chiefly considers the frequency of using these strategies as well as the students and teachers attitudes toward such uses. The participants of this study are 66 EFL students and 12 EFL teachers of Jahangirnagar University. Data was collected through questionnaire, oral interview, and classroom observation form. The findings reveal that the EFL students tried to employ all the strategies to various extents due to the language difficulties they encountered in their oral English performance. Among them, the mostly used strategy was ‘stalling’ or the use of fillers, followed by ‘code-switching’. The least used strategies were ‘topic avoidance’, ‘restructuring’, and ‘paraphrasing’. The findings indicate that the use of such strategies was related to the contexts of situation and data-elicitation tasks. It also reveals that the students were not formally trained to use the strategies though the majority of the teachers and students acknowledge them as helpful in communication. Finally the study suggests that an awareness of the nature and functions of these strategies can contribute to the overall improvement of the learners’ communicative competence in spoken English.

Keywords: communicative strategies, competency, attitude, frequency

Procedia PDF Downloads 410
1366 Harnessing Artificial Intelligence and Machine Learning for Advanced Fraud Detection and Prevention

Authors: Avinash Malladhi

Abstract:

Forensic accounting is a specialized field that involves the application of accounting principles, investigative skills, and legal knowledge to detect and prevent fraud. With the rise of big data and technological advancements, artificial intelligence (AI) and machine learning (ML) algorithms have emerged as powerful tools for forensic accountants to enhance their fraud detection capabilities. In this paper, we review and analyze various AI/ML algorithms that are commonly used in forensic accounting, including supervised and unsupervised learning, deep learning, natural language processing Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), Support Vector Machines (SVMs), Decision Trees, and Random Forests. We discuss their underlying principles, strengths, and limitations and provide empirical evidence from existing research studies demonstrating their effectiveness in detecting financial fraud. We also highlight potential ethical considerations and challenges associated with using AI/ML in forensic accounting. Furthermore, we highlight the benefits of these technologies in improving fraud detection and prevention in forensic accounting.

Keywords: AI, machine learning, forensic accounting & fraud detection, anti money laundering, Benford's law, fraud triangle theory

Procedia PDF Downloads 94
1365 Authorship Profiling of Unidentified Corpora in Saudi Social Media

Authors: Abdulaziz Fageeh

Abstract:

In the bustling digital landscape of Saudi Arabia, a chilling wave of cybercrime has swept across the nation. Among the most nefarious acts are financial blackmail schemes, perpetrated by anonymous actors lurking within the shadows of social media platforms. This chilling reality necessitates the utilization of forensic linguistic techniques to unravel the identities of these virtual villains. This research delves into the complex world of authorship profiling, investigating the effectiveness of various linguistic features in identifying the perpetrators of malicious messages within the Saudi social media environment. By meticulously analyzing patterns of language, vocabulary choice, and stylistic nuances, the study endeavors to uncover the hidden characteristics of the individuals responsible for these heinous acts. Through this linguistic detective work, the research aims to provide valuable insights to investigators and policymakers in the ongoing battle against cybercrime and to shed light on the evolution of malicious online behavior within the Saudi context.

Keywords: authorship profiling, arabic linguistics, saudi social media, cybercrime, financial blackmail, linguistic features, forensic linguistics, online threats

Procedia PDF Downloads 16
1364 English Learning Speech Assistant Speak Application in Artificial Intelligence

Authors: Albatool Al Abdulwahid, Bayan Shakally, Mariam Mohamed, Wed Almokri

Abstract:

Artificial intelligence has infiltrated every part of our life and every field we can think of. With technical developments, artificial intelligence applications are becoming more prevalent. We chose ELSA speak because it is a magnificent example of Artificial intelligent applications, ELSA speak is a smartphone application that is free to download on both IOS and Android smartphones. ELSA speak utilizes artificial intelligence to help non-native English speakers pronounce words and phrases similar to a native speaker, as well as enhance their English skills. It employs speech-recognition technology that aids the application to excel the pronunciation of its users. This remarkable feature distinguishes ELSA from other voice recognition algorithms and increase the efficiency of the application. This study focused on evaluating ELSA speak application, by testing the degree of effectiveness based on survey questions. The results of the questionnaire were variable. The generality of the participants strongly agreed that ELSA has helped them enhance their pronunciation skills. However, a few participants were unconfident about the application’s ability to assist them in their learning journey.

Keywords: ELSA speak application, artificial intelligence, speech-recognition technology, language learning, english pronunciation

Procedia PDF Downloads 106
1363 Evaluating the Administrative Buildings from the Perspective of Democratic Architecture

Authors: Tajuddin Mohamad Rasdi, Chung Ming Zhe, Nurul Anida Mohamad

Abstract:

This research paper aims to examine the lack of the idea of democracy and its concept among Malaysia’s citizens. In fact, all civil servants, whether federal or state departments, are the machinery of citizens. The objective of this research is to evaluate the administrative buildings in Selangor from the perspective of democratic architecture. The methodology used in this research is by reviewing and evaluating the selected administrative building, Majlis Bandaraya Petaling Jaya, as a case study, and the interview was conducted. The data collection was recorded based on a few criteria of the following architectural characteristic and management principles (public square, town hall, meeting rooms, convenient parking space, humanitarian spaces, public spaces) and architectural design elements (scale and massing, ornament, elevational language, accessibility, and spatial hierarchy). The analysis result shows that the administrative building elements which show the idea of democracy are not reflected well in some of the criteria that restrict the public, but those setbacks could be improved.

Keywords: democratic architecture, case study, design elements, administrative buildings

Procedia PDF Downloads 121
1362 Developing Rice Disease Analysis System on Mobile via iOS Operating System

Authors: Rujijan Vichivanives, Kittiya Poonsilp, Canasanan Wanavijit

Abstract:

This research aims to create mobile tools to analyze rice disease quickly and easily. The principle of object-oriented software engineering and objective-C language were used for software development methodology and the principle of decision tree technique was used for analysis method. Application users can select the features of rice disease or the color appears on the rice leaves for recognition analysis results on iOS mobile screen. After completing the software development, unit testing and integrating testing method were used to check for program validity. In addition, three plant experts and forty farmers have been assessed for usability and benefit of this system. The overall of users’ satisfaction was found in a good level, 57%. The plant experts give a comment on the addition of various disease symptoms in the database for more precise results of the analysis. For further research, it is suggested that image processing system should be developed as a tool that allows users search and analyze for rice diseases more convenient with great accuracy.

Keywords: rice disease, data analysis system, mobile application, iOS operating system

Procedia PDF Downloads 289