Search results for: Shannon information theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14591

Search results for: Shannon information theory

10601 Identify Users Behavior from Mobile Web Access Logs Using Automated Log Analyzer

Authors: Bharat P. Modi, Jayesh M. Patel

Abstract:

Mobile Internet is acting as a major source of data. As the number of web pages continues to grow the Mobile web provides the data miners with just the right ingredients for extracting information. In order to cater to this growing need, a special term called Mobile Web mining was coined. Mobile Web mining makes use of data mining techniques and deciphers potentially useful information from web data. Web Usage mining deals with understanding the behavior of users by making use of Mobile Web Access Logs that are generated on the server while the user is accessing the website. A Web access log comprises of various entries like the name of the user, his IP address, a number of bytes transferred time-stamp etc. A variety of Log Analyzer tools exists which help in analyzing various things like users navigational pattern, the part of the website the users are mostly interested in etc. The present paper makes use of such log analyzer tool called Mobile Web Log Expert for ascertaining the behavior of users who access an astrology website. It also provides a comparative study between a few log analyzer tools available.

Keywords: mobile web access logs, web usage mining, web server, log analyzer

Procedia PDF Downloads 345
10600 Distorted Digital Mediated Communication: An Analysis of the Effect of Smartphone on Family Communication in Nigeria

Authors: Peter E. Egielewa

Abstract:

Communication through the smartphone connects people globally. However, since the last 10 years, there has been an increasing shift from the social engagement in the family to the digital mediated communication aided by the smartphone. The traditional family communication had largely been oral and relational, which the smartphone is now digitally mediating. The study employs mixed research method of quantitative and qualitative research design and deploys questionnaire to elicit responses from both parents and children of 50 purposively selected families from five villages in Southern Nigeria that are very active with smartphone use. Based on the Theory of Family Systems, preliminary findings show that the smartphone is becoming an addiction among Nigerian family members and has shifted the dynamics of family communication from relational to digital culture. The research concludes that smartphone use affects family communication negatively and recommends the moderation of smartphone use in the family and the search for alternative platforms for family communication that minimises smartphone addiction.

Keywords: digital, distorted communication, family, Nigeria, smartphone

Procedia PDF Downloads 119
10599 Efficacy of Knowledge Management Practices in Selected Public Libraries in the Province of Kwazulu-Natal, South Africa

Authors: Petros Dlamini, Bethiweli Malambo, Maggie Masenya

Abstract:

Knowledge management practices are very important in public libraries, especial in the era of the information society. The success of public libraries depends on the recognition and application of knowledge management practices. The study investigates the value and challenges of knowledge management practices in public libraries. Three research objectives informed the study: to identify knowledge management practices in public libraries, understand the value of knowledge management practices in public libraries, and determine the factors hampering knowledge management practices in public libraries. The study was informed by the interpretivism research paradigm, which is associated with qualitative studies. In that light, the study collected data from eight librarians and or library heads, who were purposively selected from public libraries. The study adopted a social anthropological approach, which thoroughly evaluated each participant's response. Data was collected from the respondents through telephonic semi-structured interviews and assessed accordingly. Furthermore, the study used the latest content concept for data interpretation. The chosen data analysis method allowed the study to achieve its main purpose with concrete and valid information. The study's findings showed that all six (100%) selected public libraries apply knowledge management practices. The findings of the study revealed that public libraries have knowledge sharing as the main knowledge management practice. It was noted that public libraries employ many practices, but each library employed its practices of choice depending on their knowledge management practices structure. The findings further showed that knowledge management practices in public libraries are employed through meetings, training, information sessions, and awareness, to mention a few. The findings revealed that knowledge management practices make the libraries usable. Furthermore, it has been asserted that knowledge management practices in public libraries meet users’ needs and expectations and equip them with skills. It was discovered that all participating public libraries from Umkhanyakude district municipality valued their knowledge management practices as the pillar and foundation of services. Noticeably, knowledge management practices improve users ‘standard of living and build an information society. The findings of the study showed that librarians should be responsible for the value of knowledge management practices as they are qualified personnel. The results also showed that 83.35% of public libraries had factors hampering knowledge management practices. The factors are not limited to shortage of funds, resources and space, and political interference. Several suggestions were made to improve knowledge management practices in public libraries. These suggestions include improving the library budget, increasing libraries’ building sizes, and conducting more staff training.

Keywords: knowledge management, knowledge management practices, storage, dissemination

Procedia PDF Downloads 71
10598 Probabilistic Approach to Contrast Theoretical Predictions from a Public Corruption Game Using Bayesian Networks

Authors: Jaime E. Fernandez, Pablo J. Valverde

Abstract:

This paper presents a methodological approach that aims to contrast/validate theoretical results from a corruption network game through probabilistic analysis of simulated microdata using Bayesian Networks (BNs). The research develops a public corruption model in a game theory framework. Theoretical results suggest a series of 'optimal settings' of model's exogenous parameters that boost the emergence of corruption. The paper contrasts these outcomes with probabilistic inference results based on BNs adjusted over simulated microdata. Principal findings indicate that probabilistic reasoning based on BNs significantly improves parameter specification and causal analysis in a public corruption game.

Keywords: Bayesian networks, probabilistic reasoning, public corruption, theoretical games

Procedia PDF Downloads 192
10597 Identifying the Factors Influencing the Success of the Centers for Distance Knowledge Sharing in Iran

Authors: Abdolreza Noroozi Chakoli

Abstract:

This study aims to examine the impact of five effective factors on the success of the managers of distance knowledge sharing centers in Iran. To conduct it, 3 centers, including the National Library and Archives of Iran (NLAI), Scientific Information Database Center (SID), and Islamic World Science Citation Center (ISC), were selected to study the effect of five factors 'infrastructure of information technology', 'experienced staff', 'specialized staff', 'employee public relations' and 'the geographical location of the establishment' on the success of the centers. ANOVA test, Scheffe test, and Pearson's correlation test were used to analyze the data. The findings confirmed the effect of all 5 factors on the success of these centers. However, their effects are not the same on each factor. The results show each of these factors is not only individually but also together affect the success of centers for distance knowledge sharing. Moreover, it was demonstrated that there is a correlation between these factors. The results of this study show what factors determine the success of the centers and their efficiency in distance knowledge sharing in Iran.

Keywords: distance knowledge sharing centers, Iran’s knowledge centers, knowledge sharing centers, staff success

Procedia PDF Downloads 132
10596 Interaction Issues at Patan Stepwell in Western India

Authors: Shekhar Chatterjee

Abstract:

Architectural marvels of the Patan stepwell in Gujarat state in India were studied, to look into the cultural and design attributes in them. Direct observation, photography and interviewing the local people (especially senior citizens) were the methodology adopted. The aim was to look for clues into how culture and design affected architectural marvels of a building and convey that to the tourists. These interpretations from this building can offer many ideas to the contemporary design world in the form of design of modern day garments for various occasions, ornaments or accessory products for daily usage like bags, shoes and similar products. These monuments currently lack proper information system for guiding a tourist. Absence of any qualified tourist guides at the site compounds the problem further. This project investigates the feasibility of making the space more interactive for the tourist through proper digital information design and installations at places. Along with this, illumination and sound are also being used to narrate the history of these ancient monuments so that tourists get a flavor of the medieval past. Most importantly, all these digital interventions are low cost and done with easily available throw-away materials and can be replicated for other monuments as well.

Keywords: interaction, well, building, context

Procedia PDF Downloads 259
10595 Traditional Uses of Medicinal Plants in Albania: Historical and Theoretical Considerations

Authors: Ani Bajrami

Abstract:

The birth of traditional medicine is related to plant diversity in a region, and the knowledge regarding them has been used and culturally transmitted over generations by members of a certain society. In this context, Traditional Ecological Knowledge (TEK) concerning the use of plants for medicinal purposes had survival value and was adaptive for people living in different habitats around the world. Albanian flora has a high considerably number of medicinal plants, and they have been extensively used albeit expressed in folk medicinal knowledge and practices. Over the past decades, a number of ethnobotanical studies and extensive fieldwork has been conducted in Albania both by local and foreign scientists. In addition, ethnobotany is experiencing a theoretical and conceptual diversification. This article is a historical review of ethnobotanical studies conducted in Albania after the Second World War and provides theoretical considerations on how these studies should be conducted in the future.

Keywords: medicinal plants, traditional ecological knowledge, historical ethnobotany, theory, albania

Procedia PDF Downloads 157
10594 Urban Intensification and the Character of Urban Landscape: A Morphological Perspective

Authors: Xindong An, Kai Gu

Abstract:

Urban intensification is regarded as the prevalent strategy in many cities of the world to ease the pressures of urban sprawl and deliver sustainable development through increasing the density of built form and activities. However, within the context of intensive development, planning and design control measures that help to maintain and promote the character of existing residential environments have been slow to develop. This causes the possible loss of the character of an area that makes a place unique and distinctive. The purpose of this paper is to explore the way of identifying the character of an urban area for the planning of urban landscape in the implementation of intensification. By employing the theory of urban morphology, the concept of morphological region is used for the analysis and characterisation of the spatial structure of the urban landscape in terms of ground plans, building types, and building and land utilisation. The morphological mapping of the character of urban landscape is suggested, which lays a foundation for more sensitive planning of urban landscape changes.

Keywords: character areas, urban intensification, urban morphology, urban landscape

Procedia PDF Downloads 215
10593 Robust Diagnosability of PEMFC Based on Bond Graph LFT

Authors: Ould Bouamama, M. Bressel, D. Hissel, M. Hilairet

Abstract:

Fuel cell (FC) is one of the best alternatives of fossil energy. Recently, the research community of fuel cell has shown a considerable interest for diagnosis in view to ensure safety, security, and availability when faults occur in the process. The problematic for model based FC diagnosis consists in that the model is complex because of coupling of several kind of energies and the numerical values of parameters are not always known or are uncertain. The present paper deals with use of one tool: the Linear Fractional Transformation bond graph tool not only for uncertain modelling but also for monitorability (ability to detect and isolate faults) analysis and formal generation of robust fault indicators with respect to parameter uncertainties.The developed theory applied to a nonlinear FC system has proved its efficiency.

Keywords: bond graph, fuel cell, fault detection and isolation (FDI), robust diagnosis, structural analysis

Procedia PDF Downloads 352
10592 Accelerating Mobile Innovation, Adoption, and Translational Science within a Large Research Enterprise and Healthcare System

Authors: Stephen Wheat

Abstract:

Institutional mobile application governance and distribution processes are essential to mobile app innovation. The absence of effective processes poses a significant barrier to the development and adoption of mobile apps for use within a research enterprise and also impedes the translational science of applying research apps in clinical and engineering settings. To accelerate mobile app innovation and adoption, Emory University and Emory Healthcare implemented a three-pronged strategy including. I) Mobile app review and distribution policies and processes. II) Mobile app management infrastructure and mobile app foundation components. III) A strategic sourcing strategy based on preferred mobile app development firms. The results have been an increase from five to 56 mobile apps in the pipeline over three years; increased engagement from technology transfer, legal counsel, compliance, and information security; articulation of a coordinated mobile app strategy; and allocation of more institutional resources toward specific mobile technology and mobile application goals.

Keywords: mobile app management, governance, distribution, information security

Procedia PDF Downloads 283
10591 Local Tax Map Software System Development

Authors: Smithinun Thairoongrojana

Abstract:

This research is a qualitative research with three main purposes: (1) to develop the local tax map software system to be linked to the main Local Tax Map System (LTAX3000) system; (2) to design and develop a program for tax data fieldwork on wireless devices and link it to LTAX3000 database of Surat Thani Municipality; (3) to develop the human resource responsible for the fieldwork to be able to use the program and maintain the system and also to be able to work with the dynamic of technologies. In-depth interviews with the two groups of samples, the board of Surat Thani Municipality and operation staff responsible for observing and taxing fieldworks were conducted. The result of this study demonstrates the new developed fieldworks system that can be used both stand-alone usage and networking usage. The fieldworks system to collect and store the variety of taxing information within Surat Thani Municipality will be explained. Then the fieldwork operation process development and the replacement of transferring and storing the information via the network communication.

Keywords: Local tax map, software system development, wireless devices, human resource

Procedia PDF Downloads 183
10590 Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Industry

Authors: Sofia Ahanj Sofia Ahanj, Mahsa Rahmani Mahsa Rahmani, Zahra Sadeghigol, Vida Nobakht Vida Nobakht

Abstract:

Providing security in the electricity industry, as one of the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both technical and managerial dimensions is discussed in the laboratory. There are various standards in the field of general ICT technical-security evaluation. The most important are ISO / IEC 15408, ISO / IEC 27001 and NIST SP 800-53. In the present paper, these standards are first examined. Then, the standards and reports in the industrial field have been reviewed and compared, and finally, based on the results and special considerations of information and communication technology equipment in the electricity industry, the appropriate methodology has been presented.

Keywords: security standards, ISO/IEC 15408, ISA/IEC 62443 series, NIST SP 800-53, NISTIR 7628

Procedia PDF Downloads 155
10589 Analysis and Quantification of Historical Drought for Basin Wide Drought Preparedness

Authors: Joo-Heon Lee, Ho-Won Jang, Hyung-Won Cho, Tae-Woong Kim

Abstract:

Drought is a recurrent climatic feature that occurs in virtually every climatic zone around the world. Korea experiences the drought almost every year at the regional scale mainly during in the winter and spring seasons. Moreover, extremely severe droughts at a national scale also occurred at a frequency of six to seven years. Various drought indices had developed as tools to quantitatively monitor different types of droughts and are utilized in the field of drought analysis. Since drought is closely related with climatological and topographic characteristics of the drought prone areas, the basins where droughts are frequently occurred need separate drought preparedness and contingency plans. In this study, an analysis using statistical methods was carried out for the historical droughts occurred in the five major river basins in Korea so that drought characteristics can be quantitatively investigated. It was also aimed to provide information with which differentiated and customized drought preparedness plans can be established based on the basin level analysis results. Conventional methods which quantifies drought execute an evaluation by applying a various drought indices. However, the evaluation results for same drought event are different according to different analysis technique. Especially, evaluation of drought event differs depend on how we view the severity or duration of drought in the evaluation process. Therefore, it was intended to draw a drought history for the most severely affected five major river basins of Korea by investigating a magnitude of drought that can simultaneously consider severity, duration, and the damaged areas by applying drought run theory with the use of SPI (Standardized Precipitation Index) that can efficiently quantifies meteorological drought. Further, quantitative analysis for the historical extreme drought at various viewpoints such as average severity, duration, and magnitude of drought was attempted. At the same time, it was intended to quantitatively analyze the historical drought events by estimating the return period by derived SDF (severity-duration-frequency) curve for the five major river basins through parametric regional drought frequency analysis. Analysis results showed that the extremely severe drought years were in the years of 1962, 1988, 1994, and 2014 in the Han River basin. While, the extreme droughts were occurred in 1982 and 1988 in the Nakdong river basin, 1994 in the Geumg basin, 1988 and 1994 in Youngsan river basin, 1988, 1994, 1995, and 2000 in the Seomjin river basin. While, the extremely severe drought years at national level in the Korean Peninsula were occurred in 1988 and 1994. The most damaged drought were in 1981~1982 and 1994~1995 which lasted for longer than two years. The return period of the most severe drought at each river basin was turned out to be at a frequency of 50~100 years.

Keywords: drought magnitude, regional frequency analysis, SPI, SDF(severity-duration-frequency) curve

Procedia PDF Downloads 383
10588 Competitive Intelligence within the Maritime Security Intelligence

Authors: Dicky R. Munaf, Ayu Bulan Tisna

Abstract:

Competitive intelligence (business intelligence) is the process of observing the external environment which often conducted by many organizations to get the relevant information which will be used to create the organization policy, whereas, security intelligence is related to the function of the officers who have the duties to protect the country and its people from every criminal actions that might harm the national and individual security. Therefore, the intelligence dimension of maritime security is associated with all the intelligence activities including the subject and the object that connected to the maritime issues. The concept of intelligence business regarding the maritime security perspective is the efforts to protect the maritime security using the analysis of economic movements as the basic strategic plan. Clearly, a weak maritime security will cause high operational cost to all the economic activities which uses the sea as its media. Thus, it affects the competitiveness of a country compared to the other countries that are able to maintain the maritime law enforcement and secure their marine territory. So, the intelligence business within the security intelligence is important to conduct as the beginning process of the identification against the opponent strategy that might happen in the present or in the future. Thereby, the scenario of the potential impact of all the illegal maritime activities, as well as the strategy in preventing the opponent maneuver can be made.

Keywords: competitive intelligence, maritime security intelligence, intelligent systems, information technology

Procedia PDF Downloads 487
10587 Belonging without Believing: Life Narratives of Six Social Generations of Members of the Apostolic Society

Authors: Frederique A. Demeijer

Abstract:

This article addresses the religious beliefs of members of the Apostolic Society –a Dutch religious community wherein the oldest living members were raised with very different beliefs than those upheld today. Currently, the Apostolic Society is the largest liberal religious community of the Netherlands, consisting of roughly 15,000 members. It is characterized by its close-knit community life and the importance of its apostle: the spiritual leader who writes a weekly letter around which the Sunday morning service is centered. The society sees itself as ‘religious-humanistic’, inspired by its Judeo-Christian roots without being dogmatic. Only a century earlier, the beliefs of the religious community revolved more strongly around the Bible, the apostle is a link to Christ. Also, the community believed in the return of the Lord, resonating with the millenarian roots of community in 1830. Thus, the oldest living members have experienced fundamental changes in beliefs and rituals, yet remained members. This article reveals how members experience(d) their religious beliefs and feelings of belonging to the community, how these may or may not have changed over time, and what role the Apostolic Society played in their lives. The article presents a qualitative research approach based on two main pillars. First, life narrative interviews were conducted, to work inductively and allow different interview topics to emerge. Second, it uses generational theory, in three ways: 1) to select respondents; 2) to guide the interview methodology –by being sensitive to differences in socio-historical context and events experienced during formative years of interviewees of different social generations, and 3) to analyze and contextualize the qualitative interview data. The data were gathered from 27 respondents, belonging to six social generations. All interviews were recorded, transcribed, coded, and analyzed, using the Atlas.ti software program. First, the elder generations talk about growing up with the Apostolic Society being absolutely central in their daily and spiritual lives. They spent most of their time with fellow members and dedicated their free time to Apostolic activities. The central beliefs of the Apostolic Society were clear and strongly upheld, and they experienced strong belonging. Although they now see the set of central beliefs to be more individually interpretable and are relieved to not have to spend all that time to Apostolic activities anymore, they still regularly attend services and speak longingly of the past with its strong belief and belonging. Second, the younger generations speak of growing up in a non-dogmatic, religious-humanist set of beliefs, but still with a very strong belonging to the religious community. They now go irregularly to services, and talk about belonging, but not as strong as the elderly generations do. Third, across the generations, members spend more time outside of the Apostolic Society than within. The way they speak about their religious beliefs is fluid and differs as much within generations as between: for example, there is no central view on what God is. It seems the experience of members of the Apostolic Society across different generations can now be characterized as belonging without believing.

Keywords: generational theory, individual religious experiences, life narrative history interviews, qualitative research design

Procedia PDF Downloads 100
10586 Effect of Addition and Reduction of Sharia Index Constituents

Authors: Rosyidah, Permata Wulandari

Abstract:

We investigate the price effect of addition and deletions from the Indonesia Sharia Stock Index (ISSI) and Jakarta Islamic Index (JII). Using event study methodology, we measure abnormal returns for firms over the period June 2019 - to December 2021. Through the sample of 107 additions and 95 deletions, we find evidence to support the theory of Muslim country investment behavior. We find that additions to the Islamic index led to a significant positive stock market reaction and deletions to the Islamic index led to a negative stock market reaction on Jakarta Islamic Index (JII) and there is no significant reaction of addition and deletion on Indonesia Sharia Stock Index (ISSI).

Keywords: abnormal return, abnormal volume, event study, index changes, sharia index

Procedia PDF Downloads 116
10585 Brake Force Distribution in Passenger Cars

Authors: Boukhris Lahouari, Bouchetara Mostefa

Abstract:

The active safety of a vehicle is mainly influenced by the properties of the installed braking system. With the increase in road traffic density and travel speeds, increasingly stringent requirements are placed on the vehicle's behaviour during braking. The achievable decelerations are limited by the physical aspect characterized by the coefficient of friction between the tires and the ground. As a result, it follows that an optimized distribution of braking forces becomes necessary for a better use of friction coefficients. This objective could only be achieved if sufficient knowledge is available on the theory of vehicle dynamics during braking and on current standards for the approval of braking systems. These will facilitate the development of a braking force calculation algorithm that will enable an optimized distribution of braking forces to be achieved. Operating safety is conditioned by the requirements of efficiency, progressiveness, regularity or fidelity of a braking system without obviously neglecting the recommendations imposed by the legislator.

Keywords: brake force distribution, distribution diagram, friction coefficient, brake by wire

Procedia PDF Downloads 65
10584 Point-of-Interest Recommender Systems for Location-Based Social Network Services

Authors: Hoyeon Park, Yunhwan Keon, Kyoung-Jae Kim

Abstract:

Location Based Social Network services (LBSNs) is a new term that combines location based service and social network service (SNS). Unlike traditional SNS, LBSNs emphasizes empirical elements in the user's actual physical location. Point-of-Interest (POI) is the most important factor to implement LBSNs recommendation system. POI information is the most popular spot in the area. In this study, we would like to recommend POI to users in a specific area through recommendation system using collaborative filtering. The process is as follows: first, we will use different data sets based on Seoul and New York to find interesting results on human behavior. Secondly, based on the location-based activity information obtained from the personalized LBSNs, we have devised a new rating that defines the user's preference for the area. Finally, we have developed an automated rating algorithm from massive raw data using distributed systems to reduce advertising costs of LBSNs.

Keywords: location-based social network services, point-of-interest, recommender systems, business analytics

Procedia PDF Downloads 217
10583 DocPro: A Framework for Processing Semantic and Layout Information in Business Documents

Authors: Ming-Jen Huang, Chun-Fang Huang, Chiching Wei

Abstract:

With the recent advance of the deep neural network, we observe new applications of NLP (natural language processing) and CV (computer vision) powered by deep neural networks for processing business documents. However, creating a real-world document processing system needs to integrate several NLP and CV tasks, rather than treating them separately. There is a need to have a unified approach for processing documents containing textual and graphical elements with rich formats, diverse layout arrangement, and distinct semantics. In this paper, a framework that fulfills this unified approach is presented. The framework includes a representation model definition for holding the information generated by various tasks and specifications defining the coordination between these tasks. The framework is a blueprint for building a system that can process documents with rich formats, styles, and multiple types of elements. The flexible and lightweight design of the framework can help build a system for diverse business scenarios, such as contract monitoring and reviewing.

Keywords: document processing, framework, formal definition, machine learning

Procedia PDF Downloads 198
10582 Story of Per-: The Radial Network of One Lithuanian Prefix

Authors: Samanta Kietytė

Abstract:

The object of this study is the verbal derivatives stemming from the Lithuanian prefix per-. The prefix under examination can be classified as prepositional, having descended from the preposition per, thereby sharing the same prototypical meaning – denoting movement OVER. These frequently co-occur within sentences (1). The aim of this paper is to conduct a semantic analysis of the prefix per- and to propose a possible radial network of its meanings. In essence, the aim is to identify the interrelationships existing between its meanings. 1) Jis peršoko per tvorą/ 3SG.NOM.M jump.PST.3 over fence.ACC.SG. /ʻHe jumped over the fenceʼ. The foundation of this work lies in the methodological and theoretical framework of cognitive linguistics. The prototypical meaning of prefixes consistently embodies spatial dimensions that can be described through image schemas. This entails the identification of the trajectory, the landmark, and the relation between them in the situation described by the prefixed verb. The meanings of linguistic units are not perceived as arbitrary, but rather, they are interconnected through semantic motivation. According to this perspective, a singular meaning within linguistic units is considered as prototypical, while additional meanings are descended (not necessarily directly) from it. For example, one of the per- meanings TRANSFER (2) is derived from the prototypical meaning OVER. 2) Prašau persiųsti vadovo laišką man./ Ask.PRS.1 forward.INF manager.GEN.SG email.ACC.SG 1.SG.DAT/ ʻPlease forward the manager‘s email to meʼ. Certain semantic relations are explained by the conceptual metaphor and metonymy theory. For instances, when prefixed verb has a meaning WIN (3) it is related to the prototypical meaning. In this case, the prefixed verb describes situations of winning in various ways. In the prototypical meaning, the trajector moves higher than the landmark, and winning is metaphorically perceived as being higher. 3) Sūnus peraugo tėvą./ Son.NOM.SG outgrow.PST.3 father.ACC.SG/ ʻThe son has outgrown the fatherʼ. The data utilized for this study was collected from the 2014 grammatically annotated text "Lithuanian Web (LithuanianWaC v2)", consisting of 63,645,700 words. Given that the corpus is grammatically lemmatized, the list of the 793 items was obtained using the wordlist function and specifying that verbs starting with per were searched. The list included not only prefixed verbs but also other verbs whose roots have the same letter sequences as prefixes. Also, words with misspellings, without diacritical marks, and words listed for lemmatization errors were rejected, and a total of 475 derivatives were left for further analysis. The semantic analysis revealed that there are 12 distinct meanings of the prefix per-. The spatial meanings were extracted by determining what a trajector is, what a landmark is, and what the relation between them is. The connection between non-spatial meanings and spatial ones occurs through semantic motivation established by identifying elements that correspond to the trajector and landmark. The analysis reveals that there are no strict boundaries among these meanings, instead showing a continuum that encompasses a central core and a peripheral association with their internal structure, i.e., some derivatives are more prototypical of a particular meaning than others.

Keywords: word-formation, cognitive semantics, metaphor, radial networks, prototype theory, prefix

Procedia PDF Downloads 60
10581 Me and My Selfie: Identity Building Through Self Representation in Social Media

Authors: Revytia Tanera

Abstract:

This research is a pilot study to examine the rise of selfie trend in dealing with individual self representation and identity building in social media. The symbolic interactionism theory is used as the concept of the desired self image, and Cooley’s looking glass-self concept is used to analyze the mechanical reflection of ourselves; how do people perform their “digital self” in social media. In-depth interviews were conducted in the study with a non-random sample who owns a smartphone with a front camera feature and are active in social media. This research is trying to find out whether the selfie trend brings any influence on identity building on each individual. Through analysis of interview results, it can be concluded that people take selfie photos in order to express themselves and to boost their confidence. This study suggests a follow up and more in depth analysis on identity and self representation from various age groups.

Keywords: self representation, selfie, social media, symbolic interaction, looking glass-self

Procedia PDF Downloads 285
10580 Psychometric Examination of the QUEST-25: An Online Assessment of Intellectual Curiosity and Scientific Epistemology

Authors: Matthew J. Zagumny

Abstract:

The current study reports an examination of the QUEST-25 (Q-Assessment of Undergraduate Epistemology and Scientific Thinking) online version for assessing the dispositional attitudes toward scientific thinking and intellectual curiosity among undergraduate students. The QUEST-25 consists of scientific thinking (SIQ-25) and intellectual curiosity (ICIQ-25), which were correlated in hypothesized directions with the Religious Commitment Inventory, Curiosity and Exploration Inventory, Belief in Science scale, and measures of academic self-efficacy. Additionally, concurrent validity was established by the resulting significant differences between those identifying the centrality of religious belief in their lives and those who do not self-identify as being guided daily by religious beliefs. This study demonstrates the utility of the QUEST-25 for research, evaluation, and theory development.

Keywords: guided-inquiry learning, intellectual curiosity, psychometric assessment, scientific thinking

Procedia PDF Downloads 247
10579 Co-Creation of an Entrepreneurship Living Learning Community: A Case Study of Interprofessional Collaboration

Authors: Palak Sadhwani, Susie Pryor

Abstract:

This paper investigates interprofessional collaboration (IPC) in the context of entrepreneurship education. Collaboration has been found to enhance problem solving, leverage expertise, improve resource allocation, and create organizational efficiencies. However, research suggests that successful collaboration is hampered by individual and organizational characteristics. IPC occurs when two or more professionals work together to solve a problem or achieve a common objective. The necessity for this form of collaboration is particularly prevalent in cross-disciplinary fields. In this study, we utilize social exchange theory (SET) to examine IPC in the context of an entrepreneurship living learning community (LLC) at a large university in the Western United States. Specifically, we explore these research questions: How are rules or norms established that govern the collaboration process? How are resources valued and distributed? How are relationships developed and managed among and between parties? LLCs are defined as groups of students who live together in on-campus housing and share similar academic or special interests. In 2007, the Association of American Colleges and Universities named living communities a high impact practice (HIP) because of their capacity to enhance and give coherence to undergraduate education. The entrepreneurship LLC in this study was designed to offer first year college students the opportunity to live and learn with like-minded students from diverse backgrounds. While the university offers other LLC environments, the target residents for this LLC are less easily identified and are less apparently homogenous than residents of other LLCs on campus (e.g., Black Scholars, LatinX, Women in Science and Education), creating unique challenges. The LLC is a collaboration between the university’s College of Business & Public Administration and the Department of Housing and Residential Education (DHRE). Both parties are contributing staff, technology, living and learning spaces, and other student resources. This paper reports the results an ethnographic case study which chronicles the start-up challenges associated with the co-creation of the LLC. SET provides a general framework for examining how resources are valued and exchanged. In this study, SET offers insights into the processes through which parties negotiate tensions resulting from approaching this shared project from very different perspectives and cultures in a novel project environment. These tensions occur due to a variety of factors, including team formation and management, allocation of resources, and differing output expectations. The results are useful to both scholars and practitioners of entrepreneurship education and organizational management. They suggest probably points of conflict and potential paths towards reconciliation.

Keywords: case study, ethnography, interprofessional collaboration, social exchange theory

Procedia PDF Downloads 127
10578 Robust Medical Image Watermarking Using Frequency Domain and Least Significant Bits Algorithms

Authors: Volkan Kaya, Ersin Elbasi

Abstract:

Watermarking and stenography are getting importance recently because of copyright protection and authentication. In watermarking we embed stamp, logo, noise or image to multimedia elements such as image, video, audio, animation and text. There are several works have been done in watermarking for different purposes. In this research work, we used watermarking techniques to embed patient information into the medical magnetic resonance (MR) images. There are two methods have been used; frequency domain (Digital Wavelet Transform-DWT, Digital Cosine Transform-DCT, and Digital Fourier Transform-DFT) and spatial domain (Least Significant Bits-LSB) domain. Experimental results show that embedding in frequency domains resist against one type of attacks, and embedding in spatial domain is resist against another group of attacks. Peak Signal Noise Ratio (PSNR) and Similarity Ratio (SR) values are two measurement values for testing. These two values give very promising result for information hiding in medical MR images.

Keywords: watermarking, medical image, frequency domain, least significant bits, security

Procedia PDF Downloads 276
10577 Predictors of Post-marketing Regulatory Actions Concerning Hepatotoxicity

Authors: Salwa M. Almomen, Mona A. Almaghrabi, Saja M. Alhabardi, Adel A. Alrwisan

Abstract:

Background: Hepatotoxicity is a major reason for medication withdrawal from the markets. Unfortunately, serious adverse hepatic effects can occur after marketing with limited indicators during clinical development. Therefore, finding possible predictors for hepatotoxicity might guide the monitoring program of various stakeholders. Methods: We examined the clinical review documents for drugs approved in the US from 2011 to 2016 to evaluate their hepatic safety profile. Predictors: we assessed whether these medications meet Hy’s Law with hepatotoxicity grade ≥ 3, labeled hepatic adverse effects at approval, or accelerated approval status. Outcome: post-marketing regulatory action related to hepatotoxicity, including product withdrawal or updates to warning, precaution, or adverse effects sections. Statistical analysis: drugs were included in the analysis from the time of approval until the end of 2019 or the first post-marketing regulatory action related to hepatotoxicity, whichever occurred first. The hazard ratio (HR) was estimated using Cox-regression analysis. Results: We included 192 medications in the study. We classified 48 drugs as having grade ≥ 3 hepatotoxicities, 43 had accelerated approval status, and 74 had labeled information about hepatotoxicity prior to marketing. The adjusted HRs for post-marketing regulatory action for products with grade ≥ 3 hepatotoxicity was 0.61 (95% confidence interval [CI], 0.17-2.23), 0.92 (95%CI, 0.29-2.93) for a drug approved via accelerated approval program, and was 0.91 (95%CI, 0.33-2.56) for drugs with labeled hepatotoxicity information at approval time. Conclusion: This study does not provide conclusive evidence on the association between post-marketing regulatory action and grade ≥ 3 hepatotoxicity, accelerated approval status, or availability of labeled information at approval due to sampling size and channeling bias.

Keywords: accelerated approvals, hepatic adverse effects, drug-induced liver injury, hepatotoxicity predictors, post-marketing withdrawal

Procedia PDF Downloads 141
10576 The Rise in Popularity of Online Islamic Fashion In Indonesia: An Economic, Political, and Socio-Anthropological Perspective

Authors: Cazadira Fediva Tamzil, Agung Sulthonaulia Utama

Abstract:

The rise in popularity of Indonesian Islamic fashion displayed and sold through social networking sites, especially Instagram, might seem at first glance like a commonplace and localized phenomenon. However, when analyzed critically, it actually reveals the relations between the global and local Indonesian economy, as well as a deep socio-anthropological dimension relating to religion, culture, class, work, identity. Conducted using a qualitative methodology, data collection technique of literature review, and observation of various social networking sites, this research finds four things that lead to the aforementioned conclusion. First, the rise of online Islamic fashion retailers was triggered by the shift in the structure of global and national Indonesian economy as well as the free access of information made possible by democratization in Indonesia and worldwide advances in terms of technology. All of those factors combined together gave birth to a large amount of middle-class Indonesians with high consumer culture and entrepreneurial flair. Second, online Islamic fashion retailers are the new cultural trendsetters in society. All these show how Indonesians are becoming increasingly pious, no longer only adhere to Western conception of luxury and that many are increasingly exploiting Islam commercial and status-acquiring purposes. Third, the online Islamic fashion retailers actually reveal a shift in the conception of ‘work’ – social media has made work no longer only confined to the toiling activities inside factories, but instead something that can be done from any location only through posting online words or pictures that can increase a fashion product’s capital value. Without realizing it, many celebrities and online retailers who promote Islamic fashion through social media on a daily basis are now also ‘semi-free immaterial labors’ – a slight reconceptualization to Tiziana Terranova’s concept of ‘free labor’ and Maurizio Lazzarato’s ‘immaterial labor’, which basically refer to people who create economic value and thus help out capitals from producing immaterial things with only little compensation in return. Fourth, this research also shows that the diversity of Islamic fashion styles being sold on Instagram reflects the polarized identity of Islam in Indonesia. In stark contrast with the theory which states that globalization always leads to the strengthening and unification of identity, this research shows how polarized the Islamic identity in Indonesia really is – even in the face of globalization.

Keywords: global economy, Indonesian online Islamic fashion, political relations, socio-anthropology

Procedia PDF Downloads 333
10575 Financial Instruments Disclosure: A Review of the Literature

Authors: Y. Tahat, T. Dunne, S. Fifield, D. Power

Abstract:

Information about a firm’s usage of Financial Instruments (FIs) plays a very important role in determining its financial position and performance. Yet accounting standard-setters have encountered problems when deciding on the FI-related disclosures which firms must make. The primary objective of this paper is to review the extant literature on FI disclosure. This objective is achieved by surveying the literature on: the corporate usage of FIs; the different accounting standards adopted concerning FIs; and empirical studies on FI disclosure. This review concludes that the current research on FI disclosure has generated a number of useful insights. In particular, the paper reports that: FIs are a very important risk management mechanism in ensuring that companies have the cash available to make value-enhancing investments, however, without a clear set of risk management objectives, using such instruments can be dangerous; accounting standards concerning FIs have resulted in enhanced transparency about the usage of these instruments; and FI-related information is a key input into investors’ decision-making processes. Finally, the paper provides a number of suggestions for future research in the area.

Keywords: financial instruments, financial reporting, accounting standards, value relevance, corporate disclosure

Procedia PDF Downloads 396
10574 Educating Children with the Child-Friendly Smartphone Operation System

Authors: Wildan Maulana Wildan, Siti Annisa Rahmayani Icha

Abstract:

Nowadays advances in information technology are needed by all the inhabitants of the earth for the sake of ease all their work, but it is worth to introduced the technological advances in the world of children. Before the technology is growing rapidly, children busy with various of traditional games and have high socialization. Moreover, after it presence, almost all of children spend more their time for playing gadget, It can affect the education of children and will change the character and personality children. However, children also can not be separated with the technology. Because the technology insight knowledge of children will be more extensive. Because the world can not be separated with advances in technology as well as with children, there should be developed a smartphone operating system that is child-friendly. The operating system is able to filter contents that do not deserve children, even in this system there is a reminder of a time study, prayer time and play time for children and there are interactive contents that will help the development of education and children's character. Children need technology, and there are some ways to introduce it to children. We must look at the characteristics of children in different environments. Thus advances in technology can be beneficial to the world children and their parents, and educators do not have to worry about advances in technology. We should be able to take advantage of advances in technology best possible.

Keywords: information technology, smartphone operating system, education, character

Procedia PDF Downloads 494
10573 A Meso Macro Model Prediction of Laminated Composite Damage Elastic Behaviour

Authors: A. Hocine, A. Ghouaoula, S. M. Medjdoub, M. Cherifi

Abstract:

The present paper proposed a meso–macro model describing the mechanical behaviour composite laminates of staking sequence [+θ/-θ]s under tensil loading. The behaviour of a layer is ex-pressed through elasticity coupled to damage. The elastic strain is due to the elasticity of the layer and can be modeled by using the classical laminate theory, and the laminate is considered as an orthotropic material. This means that no coupling effect between strain and curvature is considered. In the present work, the damage is associated to cracking of the matrix and parallel to the fibers and it being taken into account by the changes in the stiffness of the layers. The anisotropic damage is completely described by a single scalar variable and its evolution law is specified from the principle of maximum dissipation. The stress/strain relationship is investigated in plane stress loading.

Keywords: damage, behavior modeling, meso-macro model, composite laminate, membrane loading

Procedia PDF Downloads 463
10572 Black Bodies Matter: The Contemporary Manifestation of Saartjie Baartman

Authors: Rokeshia Renné Ashley

Abstract:

The purpose of this study is to understand the perception of historical figure Saartjie 'Sara/Sarah' Baartman from a cross cultural perspective of black women in the United States and black women in South Africa. Semi-structured interviews (n = 30) uncover that many women in both countries did not have an accurate representation, recollection, or have been exposed to the story of Baartman. Nonetheless, those who were familiar with Baartman’s story, those participants compared her to modern examples of black women who are showcased in a contemporary familiarity. The women are described by participants as women who reveal their bodies in a sexualized manner and have the curves that are similar to Baartman’s historic figure. This comparison emphasized a connection to popular images of black women who represent the curvaceous ideal. Findings contribute to social comparison theory by providing a lens for examining black women’s body image.

Keywords: black women, body modification, media, South Africa

Procedia PDF Downloads 300