Search results for: public goods game
2838 In-Depth Investigations on the Sequences of Accidents of Powered Two Wheelers Based on Police Crash Reports of Medan, North Sumatera Province Indonesia, Using Decision Aiding Processes
Authors: Bangun F., Crevits B., Bellet T., Banet A., Boy G. A., Katili I.
Abstract:
This paper seeks the incoherencies in cognitive process during an accident of Powered Two Wheelers (PTW) by understanding the factual sequences of events and causal relations for each case of accident. The principle of this approach is undertaking in-depth investigations on case per case of PTW accidents based on elaborate data acquisitions on accident sites that officially stamped in Police Crash Report (PCRs) 2012 of Medan with criteria, involved at least one PTW and resulted in serious injury and fatalities. The analysis takes into account four modules: accident chronologies, perpetrator, and victims, injury surveillance, vehicles and road infrastructures, comprising of traffic facilities, road geometry, road alignments and weather. The proposal for improvement could have provided a favorable influence on the chain of functional processes and events leading to collision. Decision Aiding Processes (DAP) assists in structuring different entities at different decisional levels, as each of these entities has its own objectives and constraints. The entities (A) are classified into 6 groups of accidents: solo PTW accidents; PTW vs. PTW; PTW vs. pedestrian; PTW vs. motor-trishaw; and PTW vs. other vehicles and consecutive crashes. The entities are also distinguished into 4 decisional levels: level of road users and street systems; operational level (crash-attended police officers or CAPO and road engineers), tactical level (Regional Traffic Police, Department of Transportation, and Department of Public Work), and strategic level (Traffic Police Headquarters (TCPHI)), parliament, Ministry of Transportation and Ministry of Public Work). These classifications will lead to conceptualization of Problem Situations (P) and Problem Formulations (I) in DAP context. The DAP concerns the sequences process of the incidents until the time the accident occurs, which can be modelled in terms of five activities of procedural rationality: identification on initial human features (IHF), investigation on proponents attributes (PrAT), on Injury Surveillance (IS), on the interaction between IHF and PrAt and IS (intercorrelation), then unravel the sequences of incidents; filtering and disclosure, which include: what needs to activate, modify or change or remove, what is new and what is priority. These can relate to the activation or modification or new establishment of law. The PrAt encompasses the problems of environmental, road infrastructure, road and traffic facilities, and road geometry. The evaluation model (MP) is generated to bridge P and I since MP is produced by the intercorrelations among IHF, PrAT and IS extracted from the PCRs 2012 of Medan. There are 7 findings of incoherences: lack of knowledge and awareness on the traffic regulations and the risks of accidents, especially when riding between 0 < x < 10 km from house, riding between 22 p.m.–05.30 a.m.; lack of engagements on procurement of IHF Data by CAPO; lack of competency of CAPO on data procurement in accident-sites; no intercorrelation among IHF and PrAt and IS in the database systems of PCRs; lack of maintenance and supervision on the availabilities and the capacities of traffic facilities and road infrastructure; instrumental bias with wash-back impacts towards the TCPHI; technical robustness with wash-back impacts towards the CAPO and TCPHI.Keywords: decision aiding processes, evaluation model, PTW accidents, police crash reports
Procedia PDF Downloads 1592837 Relationship between Deliberate Practice of Dribbling and Self-Regulatory Behavior of Male Basketball Players
Authors: Daud Abdia, Aqsa Shamim, Farhan Tabassum
Abstract:
In order to achieve specific goals, basketball players have to use different skills to enhance their motivation, one such skill is deliberate practice. The aim of this study was to explore the relationship between deliberate practice of dribbling and self-regulatory behavior of male basketball players. For this purpose, a sample of 108 basketball players using stratified sampling was taken from public and private sector universities. Sample was divided into two groups that are experimental (n=54) and control group (n=54) using comparative experimental design. Experimental group was involved in the training of deliberate practice of dribbling for 5 weeks. Amounts of weekly practice activity and Self-Regulation of Learning Self-Report Scale (SRL-SRS) were used for self-regulatory behavior to collect data after the deliberate practice. The reliability of amounts of weekly practice activity was found to be 0.852, whereas SRL-SRS was found to be 0.890. The results of the study indicated a strong positive correlation between deliberate practice of dribbling and self-regulatory behavior (r=0.755, n=54, p=.000). Whereas, paired sample t-test; t(53)=1.37, p < 0.005 shows statistically significant improvement in the self-regulatory behavior after the training program of deliberate practice from 3.02 ± 0.64m to 3.21 ± 0.75m (p < 0.005). It was concluded that in order to enhance the self-regulatory behavior of basketball players we should work on the deliberate practice of the players.Keywords: self-regulatory behavior, deliberate practice, dribbling, basketball
Procedia PDF Downloads 1742836 Promoting Stem Education and a Cosmic Perspective by Using 21st Century Science of Learning
Authors: Rohan Roberts
Abstract:
The purpose of this project was to collaborate with a group of high-functioning, more-able students (aged 15-18) to promote STEM Education and a love for science by bringing a cosmic perspective into the classroom and high school environment. This was done using 21st century science of learning, a focus on the latest research on Neuroeducation, and modern pedagogical methods based on Howard Gardner's theory of Multiple Intelligences, Bill Lucas’ theory of New Smarts, and Sir Ken Robinson’s recommendations on encouraging creativity. The result was an increased sense of passion, excitement, and wonder about science in general, and about the marvels of space and the universe in particular. In addition to numerous unique and innovative science-based initiatives, clubs, workshops, and science trips, this project also saw a marked rise in student-teacher collaboration in science learning and in student engagement with the general public through the press, social media, and community-based initiatives. This paper also outlines the practical impact that bringing a cosmic perspective into the classroom has had on the lives, interests, and future career prospects of the students involved in this endeavour.Keywords: cosmic perspective, gifted and talented, neuro-education, STEM education
Procedia PDF Downloads 3352835 Analyzing the Perception of Students and Faculty Members on Social Media Use in Academic Activities: A Case Study of Beijing Normal University
Authors: Mcjerry A. Bekoe, Emile Uwamahoro
Abstract:
Social media has become the order of the day, in particular among the youth. It is widely used both formally and informally in the university communities with varied definitions both in the academic circles and in the public domain. In simple terms, it is a media upon which social interactions are carried. In this work social media denote mobile phones, and web-base applications use by students and institutions to construct, partake, and distribute both existing and new information in a digital setting through internet communication. The basic aim of conducting this study was to analyze the perception of students and faculty members Beijing Normal University on social media use in the academic setting and to contribute to the understanding of how university students use social media, the advantages and disadvantages of social media in education. The study was qualitative and employed open-ended interview questions developed to seek students’ perception of the effects of social media and administered based on purposive sampling. Document analysis was also done because of triangulation to ensure validity and reliability. The results show there are positive and negative impacts of social media use depending on how one uses it. Social media have the capability to become a priceless asset to aid their educational communication.Keywords: academics, high education, interactions, social media
Procedia PDF Downloads 3422834 Between Riots and Protests: A Structural Approach to Urban Environmental Uprisings in China
Authors: Zi Zhu
Abstract:
The last decade has witnessed increasing urban environmental uprisings in China, as thousands of citizens swarmed into streets to express their deep concerns about the environmental threat and public health through various collective actions. The prevalent western approaches to collective actions, which usually treat urban riots and social movements as distinct phenomenon, have plagued an adequate analysis of the urban environmental uprisings in China. The increasing urban environmental contention can neither be categorized into riots nor social movements, as they carry the features of both: at first sight, they are spontaneous, disorganized and disruptive with an absence of observable mobilization process; however, unlike riots in the west, these collective actions conveyed explicit demand in a mostly non-destructive way rather than a pure expression of frustration. This article proposes a different approach to urban environmental uprisings in China which concerns the diminishing boundaries between riots and social movements and points to the underlying structural causes to the unique forms of urban environmental contention. Taking the urban anti-PX protests as examples, this article analyzes the societal and political structural environment faced by the Chinese environmental protesters and its influence on the origin and development of their contention.Keywords: urban environmental uprisings, China, anti-PX protests, opportunity structure
Procedia PDF Downloads 2912833 The Impact of Urban Planning and French Reglementions on the Management of Algerian Environment
Authors: Sara Zatir, Kouide Brahimi, Amira Zatir
Abstract:
The planning and the environment have long evolved at the same two parallel tracks. But today, we can design a layout without addressing its environmental impact on the landscape. And the role of The documents of the regulatory planning is to control the urbanization of a common and its effects indirectly on the urban environment, but what about the urban landscape? Algeria is like many countries in the world leans primarily on developing sustainable economy, it was officially declared in the Maghreb countries, with the enactment of Law No. 01-20 of 12 December 2001 on the organization and sustainable development of the territory, one of the purposes of this law is the protection, mapping values and rational use of, natural resources, heritage and the natural preservation for future generations. However, Algeria initiatives have recently been undertaken but it still have some infancy which can be detected by the cavity between the delineation instruments,regulations and. In this context, we should note the important role of public authorities in the situation of the living and its future. The idea is to find a balance from the unbalanced conditions (between present and future generations, between economic needs, and the needs of environmental protection and cultural, between individual and collective interests) and to develop new strategies management laws and the urban landscape.Keywords: Algeria, sustainable, development urban landscapes, laws
Procedia PDF Downloads 4352832 Framework for Implementation of National Electrical Safety Grounding Standards for Communication Infrastructure
Authors: Atif Mahmood, Mohammad Inayatullah Khan Babar
Abstract:
Communication infrastructure has been installed, operated, and maintained all over the world according to defined electrical safety standards for separate or joint structures. These safety standards have been set for the safeguard of public, utility workers (employees and contractors), utility facilities, electrical communication equipment’s connected to the utility facilities and other facilities or premise adjacent to utility facilities. Different communication utilities in Pakistan use standards of different countries due to the absence of Common National Electrical Safety Standards of Pakistan. It is really important to devise a framework for implementation of a uniform standard for strict compliance. In this context, it is important to explore the compliance of safety standards for communication conductors and equipment for separate or joint structures for which NESC standards are taken as reference. Specific reference to grounding techniques including grounding AC/DC systems and its frames, leaving Fences, Messenger wires and special circuits used for the protection for lightning etc, ungrounded so recommendations are also given after in-depth analysis of current technical practices for the installation and maintenance of communication infrastructure.Keywords: utility facilities, grounding electrodes, special circuits, grounding conductor
Procedia PDF Downloads 3502831 Measuring the Full Impact of Culture: Social Indicators and Canadian Cultural Policy
Authors: Steven Wright
Abstract:
This paper argues that there is an opportunity for PCH to further expand its relevance within the Canadian policy context by taking advantage of the growing international trend of using social indicators for public policy evaluation. Within the mandate and vision of PCH, there is an incomplete understanding of the value that the arts and culture provide for Canadians, specifically with regard to four social indicators: community development, civic engagement, life satisfaction, and work-life balance. As will be shown, culture and the arts have a unique role to play in such quality of life indicators, and there is an opportunity for PCH to aid in the development of a comprehensive national framework that includes these indicators. This paper lays out approach to understanding how social indicators may be included in the Canadian context by first illustrating recent trends in policy evaluation on a national and international scale. From there, a theoretical analysis of the connection between cultural policy and social indicators is provided. The second half of the paper is dedicated to explaining the shortcomings of Canadian cultural policy evaluation in terms of its tendency to justify expenditures related to arts and cultural activities in purely economic terms, and surveying how other governments worldwide are leading the charge in this regard.Keywords: social indicators, evaluation, cultural policy, arts
Procedia PDF Downloads 2972830 How Addictive Are They: Effects of E-Cigarette Vapor on Intracranial Self-Stimulation Compared to Nicotine Alone
Authors: Annika Skansberg
Abstract:
Electronic cigarettes (e-cigarettes) use vapor to deliver nicotine, have recently become popular, especially amongst adolescents. Because of this, the FDA has decided to regulate e-cigarettes, and therefore would like to determine the abuse liability of the products compared to traditional nicotine products. This will allow them to determine the impact of regulating them on public health and shape the decisions they make when creating new laws. This study assessed the abuse liability of Aroma E-juice Dark Honey Tobacco compared to nicotine using an animal model. This e-liquid contains minor alkaloids that may increase abuse liability compared to nicotine alone. The abuse liability of nicotine alone and e-juice liquid were compared in rats using intracranial self-stimulation (ICSS) thresholds. E-liquid had less aversive effects at high nicotine doses in the ICSS model, suggesting that the minor alkaloids in the e-liquid allow users to use higher doses without experiencing the negative effects felt when using high doses of nicotine alone. This finding could mean that e-cigarettes have a higher abuse liability than nicotine alone, but more research is needed before this can be concluded. These findings are useful in observing the abuse liability of e-cigarettes and will help inform the FDA while regulating these products.Keywords: electronic cigarettes, intra-cranial self stimulation, abuse liability, anhedonia
Procedia PDF Downloads 3132829 Viability of Zoning Reform in Tackling Urban Inequality in Louisville
Authors: Mojeed A. Oladele
Abstract:
The original zoning system in Louisville promoted social segregation among groups and remained a tool for social exclusion that strengthened preexisting inequalities. The current residential zoning system in Louisville is predominantly single-family residential housing. Of the 75% of total land allocated for residential purposes, 55% comprises single-family housing, constituting one form of development and ruminant problems of social segregation within the city. The zoning reform initiative birthed the spatial improvement and development of additional middle housing as a more generic and inclusive housing form. The paper investigates the basis of zoning reform relative to the interconnectedness amongst the discursive objects of analysis and the extensiveness as a strategic tool of structural adjustment. Qualitative methodological assessment generated by collective planning professionals reflects the effectiveness of the new zoning design in strengthening the socio-spatial interactions within the city. The zoning reform is currently at the early stage of implementation and requires more professional/public inputs and constant iterative processes for a more promising urban planning outcome.Keywords: zoning reform, viability, urban inequality, housing affordability, Louisville
Procedia PDF Downloads 2122828 Research on the Evaluation and Delineation of Value Units of New Industrial Parks Based on Implementation-Orientation
Authors: Chengfang Wang, Zichao Wu, Jianying Zhou
Abstract:
At present, much attention is paid to the development of new industrial parks in the era of inventory planning. Generally speaking, there are two types of development models: incremental development models and stock development models. The former relies on key projects to build a value innovation park, and the latter relies on the iterative update of the park to build a value innovation park. Take the Baiyun Western Digital Park as an example, considering the growth model of value units, determine the evaluation target. Based on a GIS platform, comprehensive land-use status, regulatory detailed planning, land use planning, blue-green ecological base, rail transit system, road network system, industrial park distribution, public service facilities, and other factors are used to carry out the land use within the planning multi-factor superimposed comprehensive evaluation, constructing a value unit evaluation system, and delineating value units based on implementation orientation and combining two different development models. The research hopes to provide a reference for the planning and construction of new domestic industrial parks.Keywords: value units, GIS, multi-factor evaluation, implementation orientation
Procedia PDF Downloads 1902827 Pollution by Iron of the Quaternary Drinking Water and its Effect on Human Health
Authors: Raafat A. Mandour
Abstract:
Background; Water may be regarded as polluted if it contains substances that render it unsafe for public use. The surface, subsoil waters and the shallow water-bearing geologic formation are more subjected to pollution due to its closeness to the human daily work. Aim of the work; determine the distribution of iron level in drinking water and its relation to iron level in blood patients suffering from liver diseases. Materials and Methods; For the present study, a total number of (71) drinking water samples (surface, wells and tap) have been collected and Blood samples were carried out on (71) selected inhabitants who attended in different hospitals, from different localities and suffering from liver diseases. Serum iron level in these patients was estimated by using IRON-B kit, Biocon company (Germany) and the 1, 10-phenanthroline method. Results; The water samples analyzed for iron are found suitable for drinking except two samples at Mit-Ghamr district showing values higher than the permissible limit of Egyptian Ministry of Health (EMH) and World Health Organization (WHO).The comparison between iron concentrations in drinking water and human blood samples shows a positive relationship. Conclusion; groundwater samples from the polluted areas should have special attention for treatment.Keywords: water samples, blood samples, EMH, WHO
Procedia PDF Downloads 4692826 An Analysis of Illocutioary Act in Martin Luther King Jr.'s Propaganda Speech Entitled 'I Have a Dream'
Authors: Mahgfirah Firdaus Soberatta
Abstract:
Language cannot be separated from human life. Humans use language to convey ideas, thoughts, and feelings. We can use words for different things for example like asserted, advising, promise, give opinions, hopes, etc. Propaganda is an attempt which seeks to obtain stable behavior to adopt everyone to his everyday life. It also controls the thoughts and attitudes of individuals in social settings permanent. In this research, the writer will discuss about the speech act in a propaganda speech delivered by Martin Luther King Jr. in Washington at Lincoln Memorial on August 28, 1963. 'I Have a Dream' is a public speech delivered by American civil rights activist MLK, he calls from an end to racism in USA. In this research, the writer uses Searle theory to analyze the types of illocutionary speech act that used by Martin Luther King Jr. in his propaganda speech. In this research, the writer uses a qualitative method described in descriptive, because the research wants to describe and explain the types of illocutionary speech acts used by Martin Luther King Jr. in his propaganda speech. The findings indicate that there are five types of speech acts in Martin Luther King Jr. speech. MLK also used direct speech and indirect speech in his propaganda speech. However, direct speech is the dominant speech act that MLK used in his propaganda speech. It is hoped that this research is useful for the readers to enrich their knowledge in a particular field of pragmatic speech acts.Keywords: speech act, propaganda, Martin Luther King Jr., speech
Procedia PDF Downloads 4432825 Networking the Biggest Challenge in Hybrid Cloud Deployment
Authors: Aishwarya Shekhar, Devesh Kumar Srivastava
Abstract:
Cloud computing has emerged as a promising direction for cost efficient and reliable service delivery across data communication networks. The dynamic location of service facilities and the virtualization of hardware and software elements are stressing the communication networks and protocols, especially when data centres are interconnected through the internet. Although the computing aspects of cloud technologies have been largely investigated, lower attention has been devoted to the networking services without involving IT operating overhead. Cloud computing has enabled elastic and transparent access to infrastructure services without involving IT operating overhead. Virtualization has been a key enabler for cloud computing. While resource virtualization and service abstraction have been widely investigated, networking in cloud remains a difficult puzzle. Even though network has significant role in facilitating hybrid cloud scenarios, it hasn't received much attention in research community until recently. We propose Network as a Service (NaaS), which forms the basis of unifying public and private clouds. In this paper, we identify various challenges in adoption of hybrid cloud. We discuss the design and implementation of a cloud platform.Keywords: cloud computing, networking, infrastructure, hybrid cloud, open stack, naas
Procedia PDF Downloads 4282824 A Tool to Provide Advanced Secure Exchange of Electronic Documents through Europe
Authors: Jesus Carretero, Mario Vasile, Javier Garcia-Blas, Felix Garcia-Carballeira
Abstract:
Supporting cross-border secure and reliable exchange of data and documents and to promote data interoperability is critical for Europe to enhance sector (like eFinance, eJustice and eHealth). This work presents the status and results of the European Project MADE, a Research Project funded by Connecting Europe facility Programme, to provide secure e-invoicing and e-document exchange systems among Europe countries in compliance with the eIDAS Regulation (Regulation EU 910/2014 on electronic identification and trust services). The main goal of MADE is to develop six new AS4 Access Points and SMP in Europe to provide secure document exchanges using the eDelivery DSI (Digital Service Infrastructure) amongst both private and public entities. Moreover, the project demonstrates the feasibility and interest of the solution provided by providing several months of interoperability among the providers of the six partners in different EU countries. To achieve those goals, we have followed a methodology setting first a common background for requirements in the partner countries and the European regulations. Then, the partners have implemented access points in each country, including their service metadata publisher (SMP), to allow the access to their clients to the pan-European network. Finally, we have setup interoperability tests with the other access points of the consortium. The tests will include the use of each entity production-ready Information Systems that process the data to confirm all steps of the data exchange. For the access points, we have chosen AS4 instead of other existing alternatives because it supports multiple payloads, native web services, pulling facilities, lightweight client implementations, modern crypto algorithms, and more authentication types, like username-password and X.509 authentication and SAML authentication. The main contribution of MADE project is to open the path for European companies to use eDelivery services with cross-border exchange of electronic documents following PEPPOL (Pan-European Public Procurement Online) based on the e-SENS AS4 Profile. It also includes the development/integration of new components, integration of new and existing logging and traceability solutions and maintenance tool support for PKI. Moreover, we have found that most companies are still not ready to support those profiles. Thus further efforts will be needed to promote this technology into the companies. The consortium includes the following 9 partners. From them, 2 are research institutions: University Carlos III of Madrid (Coordinator), and Universidad Politecnica de Valencia. The other 7 (EDICOM, BIZbrains, Officient, Aksesspunkt Norge, eConnect, LMT group, Unimaze) are private entities specialized in secure delivery of electronic documents and information integration brokerage in their respective countries. To achieve cross-border operativity, they will include AS4 and SMP services in their platforms according to the EU Core Service Platform. Made project is instrumental to test the feasibility of cross-border documents eDelivery in Europe. If successful, not only einvoices, but many other types of documents will be securely exchanged through Europe. It will be the base to extend the network to the whole Europe. This project has been funded under the Connecting Europe Facility Agreement number: INEA/CEF/ICT/A2016/1278042. Action No: 2016-EU-IA-0063.Keywords: security, e-delivery, e-invoicing, e-delivery, e-document exchange, trust
Procedia PDF Downloads 2672823 An Intelligent Traffic Management System Based on the WiFi and Bluetooth Sensing
Authors: Hamed Hossein Afshari, Shahrzad Jalali, Amir Hossein Ghods, Bijan Raahemi
Abstract:
This paper introduces an automated clustering solution that applies to WiFi/Bluetooth sensing data and is later used for traffic management applications. The paper initially summarizes a number of clustering approaches and thereafter shows their performance for noise removal. In this context, clustering is used to recognize WiFi and Bluetooth MAC addresses that belong to passengers traveling by a public urban transit bus. The main objective is to build an intelligent system that automatically filters out MAC addresses that belong to persons located outside the bus for different routes in the city of Ottawa. The proposed intelligent system alleviates the need for defining restrictive thresholds that however reduces the accuracy as well as the range of applicability of the solution for different routes. This paper moreover discusses the performance benefits of the presented clustering approaches in terms of the accuracy, time and space complexity, and the ease of use. Note that results of clustering can further be used for the purpose of the origin-destination estimation of individual passengers, predicting the traffic load, and intelligent management of urban bus schedules.Keywords: WiFi-Bluetooth sensing, cluster analysis, artificial intelligence, traffic management
Procedia PDF Downloads 2422822 Ensemble Methods in Machine Learning: An Algorithmic Approach to Derive Distinctive Behaviors of Criminal Activity Applied to the Poaching Domain
Authors: Zachary Blanks, Solomon Sonya
Abstract:
Poaching presents a serious threat to endangered animal species, environment conservations, and human life. Additionally, some poaching activity has even been linked to supplying funds to support terrorist networks elsewhere around the world. Consequently, agencies dedicated to protecting wildlife habitats have a near intractable task of adequately patrolling an entire area (spanning several thousand kilometers) given limited resources, funds, and personnel at their disposal. Thus, agencies need predictive tools that are both high-performing and easily implementable by the user to help in learning how the significant features (e.g. animal population densities, topography, behavior patterns of the criminals within the area, etc) interact with each other in hopes of abating poaching. This research develops a classification model using machine learning algorithms to aid in forecasting future attacks that is both easy to train and performs well when compared to other models. In this research, we demonstrate how data imputation methods (specifically predictive mean matching, gradient boosting, and random forest multiple imputation) can be applied to analyze data and create significant predictions across a varied data set. Specifically, we apply these methods to improve the accuracy of adopted prediction models (Logistic Regression, Support Vector Machine, etc). Finally, we assess the performance of the model and the accuracy of our data imputation methods by learning on a real-world data set constituting four years of imputed data and testing on one year of non-imputed data. This paper provides three main contributions. First, we extend work done by the Teamcore and CREATE (Center for Risk and Economic Analysis of Terrorism Events) research group at the University of Southern California (USC) working in conjunction with the Department of Homeland Security to apply game theory and machine learning algorithms to develop more efficient ways of reducing poaching. This research introduces ensemble methods (Random Forests and Stochastic Gradient Boosting) and applies it to real-world poaching data gathered from the Ugandan rain forest park rangers. Next, we consider the effect of data imputation on both the performance of various algorithms and the general accuracy of the method itself when applied to a dependent variable where a large number of observations are missing. Third, we provide an alternate approach to predict the probability of observing poaching both by season and by month. The results from this research are very promising. We conclude that by using Stochastic Gradient Boosting to predict observations for non-commercial poaching by season, we are able to produce statistically equivalent results while being orders of magnitude faster in computation time and complexity. Additionally, when predicting potential poaching incidents by individual month vice entire seasons, boosting techniques produce a mean area under the curve increase of approximately 3% relative to previous prediction schedules by entire seasons.Keywords: ensemble methods, imputation, machine learning, random forests, statistical analysis, stochastic gradient boosting, wildlife protection
Procedia PDF Downloads 2942821 A Corpus-Assisted Discourse Analysis of Adjectival Collocation of the Word 'Education' in the American Context
Authors: Ngan Nguyen
Abstract:
The study analyses adjectives collocating with the word ‘education’ in the American language of the Corpus of Global Web-based English using a combination of corpus linguistic and discourse analytical methods to examine not only language patterns but also social political ideologies around the topic. Significant conclusions are deduced: (1) there are a large number of adjectival collocates of the word education which have been identified and classified into four categories representing four different aspects of education: level, quality, forms and types of education; (2) education, as in combination with three first categories, carries the meaning as the act and process of teaching and learning while with the last category having the meaning of a particular kind of teaching or training; (3) higher education is the topic that gains most concerns from the American public; (4) five most significant ideologies are discovered from the corpus: higher education associates with financial affairs, higher education is an industry, monetary policy of the government on higher education, people require greater accessibility to higher education and people value higher education. The study contributes to the field of developing meanings of words through corpus analysis and the field of discourse analysis.Keywords: adjectival collocation, American context, corpus linguistics, discourse analysis, education
Procedia PDF Downloads 3472820 Neighborhood Graph-Optimized Preserving Discriminant Analysis for Image Feature Extraction
Authors: Xiaoheng Tan, Xianfang Li, Tan Guo, Yuchuan Liu, Zhijun Yang, Hongye Li, Kai Fu, Yufang Wu, Heling Gong
Abstract:
The image data collected in reality often have high dimensions, and it contains noise and redundant information. Therefore, it is necessary to extract the compact feature expression of the original perceived image. In this process, effective use of prior knowledge such as data structure distribution and sample label is the key to enhance image feature discrimination and robustness. Based on the above considerations, this paper proposes a local preserving discriminant feature learning model based on graph optimization. The model has the following characteristics: (1) Locality preserving constraint can effectively excavate and preserve the local structural relationship between data. (2) The flexibility of graph learning can be improved by constructing a new local geometric structure graph using label information and the nearest neighbor threshold. (3) The L₂,₁ norm is used to redefine LDA, and the diagonal matrix is introduced as the scale factor of LDA, and the samples are selected, which improves the robustness of feature learning. The validity and robustness of the proposed algorithm are verified by experiments in two public image datasets.Keywords: feature extraction, graph optimization local preserving projection, linear discriminant analysis, L₂, ₁ norm
Procedia PDF Downloads 1522819 Maternal Deprivation as Predictor of Academic Performance and Psychosocial Adjustment of Primary School Pupils in Abeokuta Metropolis
Authors: Abayomi Olatoke Adejobi
Abstract:
The study investigated maternal deprivation as predictor of academic performance and psychosocial adjustment of primary school pupils in Abeokuta metropolis. Three null hypotheses were formulated to guide the study. Two hundred public primary school pupils were randomly selected as subjects for the study. The instruments used for data collection were Index of Family Relations (IFR) by Hudson, modified version of Psychosocial Adjustment Scale (PAS) by O’ bailey and Academic records of the pupils from Cumulative Records Folder (CRF). The data collected were statistically treated and the three hypotheses were tested using t-test and Pearson Product Moment Correlation Confident statistical methods at 0.05 alpha level. The results of the analysis showed that there is a significant difference in the academic performance of children who suffered maternal deprivation and those who did not (t – 5.61; df = 198; P < 0.05). Also, there was a significant relationship between psychosocial adjustment of children and maternal deprivation (r = 0.37, df = 10; P < 0.05), while there was no significant difference in academic performance of boys and girls who suffered maternal deprivation (t = 0.32; df = 109; P > 0.05). Based on the results some recommendations were made.Keywords: maternal deprivation, psychosocial adjustment, academic performance, primary school pupils
Procedia PDF Downloads 4652818 Evaluating the Location of Effective Product Advertising on Facebook Ads
Authors: Aulia F. Hadining, Atya Nur Aisha, Dimas Kurninatoro Aji
Abstract:
Utilization of social media as a marketing tool is growing rapidly, including for SMEs. Social media allows the user to give product evaluation and recommendations to the public. In addition, the social media facilitate word-of-mouth marketing communication. One of the social media that can be used is Facebook, with Facebook Ads. This study aimed to evaluate the location of Facebook Ads, to obtain an appropriate advertising design. There are three alternatives location consist of desktop, right-hand column and mobile. The effectiveness and efficiency of advertising will be measured based on advertising metrics such as reach, click, Cost per Click (CUC) and Unique Click-Through-Rate (UCTR). Facebook's Ads Manager was used for seven days, targeted by age (18-24), location (Bandung), language (Indonesia) and keywords. The result was 13,999 total reach, as well as 342 clicks. Based on the results of comparison using ANOVA, there was a significant difference for each placement location based on advertising metrics. Mobile location was chosen to be successful ads, because it produces the lowest CUC, amounting to Rp 691,- per click and 14% UCTR. Results of this study showed Facebook Ads was useful and cost-effective media to promote the product of SME, because it could be view by many people in the same time.Keywords: marketing communication, social media, Facebook Ads, mobile location
Procedia PDF Downloads 3552817 Assessing the Current State of Wheelchair Accessibility in Shopping Centers and Stores in Saudi Arabia
Authors: Majed M. Mustafa, Abdulrahman A. Altassan
Abstract:
In recent years, ensuring accessibility for all individuals, particularly those with mobility impairments, has gained significant attention in Saudi Arabia. This research aims to evaluate wheelchair accessibility in shopping centers, malls, and stores across the kingdom, highlighting its critical role in promoting inclusivity and equal access. The study will focus on the availability and quality of ramps, automatic doors, lifts, accessible restrooms, and overall ease of navigation for wheelchair users. Utilizing a mixed-methods approach, the research will employ site assessments, user surveys, and interviews with facility managers to gather comprehensive data. Preliminary findings indicate that while some facilities have made strides in accessibility, there are still numerous areas requiring improvement. The study will provide targeted recommendations to enhance accessibility, ensuring that all users can navigate shopping environments with ease and dignity. Conclusively, this research underscores the need for continuous efforts and policy enhancements to achieve universal design standards in public spaces within Saudi Arabia.Keywords: automatic doors, equal access, ramp quality, wheelchair accessibility
Procedia PDF Downloads 382816 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count
Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney
Abstract:
Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python
Procedia PDF Downloads 1442815 Disparate Use of Chemical and Physical Restraints in the Emergency Department by Race/Ethnicity
Authors: Etta Conteh, Tracy Macintosh
Abstract:
Introduction: Restraints are often used in the Emergency Department when it is necessary for a patient to be restrained in order to decrease their agitation and better treat them. Chemical and physical restraints may be used on these patients at the discretion of the medical provider. Racism and injustice are rampant within our country, and medicine and healthcare are not spared. While racism and racial bias in medicine and healthcare have been studied, information on the differences in the use of restraints by race are scarce. Objective: The objective of this study is to determine if African Americans and Hispanic-American patients are restrained at higher rates compared to their White counterparts. Methods: This study will be carried out through a retrospective analysis utilizing the Hospital Corporation of America (HCA) national Emergency Department (ED) and inpatient database with patient visits from 2016-2019. All patient visits, with patients aged 18 years or older, will be reviewed, looking specifically for the race and the use and type of restraints. Other factors, such a pre-existing psychiatric condition, will be used for sub-analysis. Rationale: The outcome of this project will demonstrate the absence or presence of a racial disparity in the use of restraints in the Emergency Department. These results can be used as a foundation for improving racial equity in healthcare treatment.Keywords: emergency medicine, public health, racism, restraint use
Procedia PDF Downloads 2792814 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems
Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana
Abstract:
The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.Keywords: mitigations, risk, transport, security, vulnerabilities
Procedia PDF Downloads 1662813 Implementation of Building Information Modeling in Turkish Government Sector Projects
Authors: Mohammad Lemar Zalmai, Mustafa Nabi Kocakaya, Cemil Akcay, Ekrem Manisali
Abstract:
In recent years, the Building Information Modeling (BIM) approach has been developed expeditiously. As people see the benefits of this approach, it has begun to be used widely in construction projects and some countries made it mandatory to get more benefits from it. To promote the implementation of BIM in construction projects, it will be helpful to get some relevant information from surveys and interviews. The purpose of this study is to research the current adoption and implementation of BIM in public projects in Turkey. This study specified the challenges of BIM implementation in Turkey and proposed some solutions to overcome them. In this context, the challenges for BIM implementation and the factors that affect the BIM usage are determined based on previous academic researches and expert opinions by conducting interviews and questionnaire surveys. Several methods are used to process information in order to obtain weights of different factors to make BIM widespread in Turkey. This study concluded interviews' and questionnaire surveys' outcomes and proposed some suggestions to promote the implementation of BIM in Turkey. We believe research findings will be a good reference for boosting BIM implementation in Turkey.Keywords: building information modelling, BIM implementations, Turkish construction industry, Turkish government sector projects
Procedia PDF Downloads 1392812 Alternative Funding Strategies for Tertiary Education in Nigeria: Quest for Improved Quality of Teaching and Learning
Authors: Temitayo Olaitan
Abstract:
There is a growing concern about the quality of Nigerian tertiary education. This paper maintains that quality in tertiary education relates to the development of intellectual independence, which sharpens the minds of the individual and helps transform the society economically, socially and politically. However, the paper underscores underfunding as a critical challenge to the quality of teaching and learning in tertiary education. To this end, this paper emphasizes the role of internally generated revenue (IGR) and other alternative funding strategies (public-private partnership) as inevitable for quality tertiary education. This paper hinges on stakeholders approach as a means of ensuring quality teaching and learning in tertiary education. This paper recommends that school managers should seek professional and more efficient ways of developing their revenue generating systems. It also recommends that institutions should restructure to accommodate an alternative funding strategy such as private/corporate sponsorship to ensure that sustainable initiatives are created. The paper concludes that Nigerian government should come up with a policy on how private sectors should support in improving the quality of tertiary education through active participation in funding and physical facilities development in Nigerian higher institutions of learning.Keywords: alternative funding, budgetary allocation, quality education, tertiary education
Procedia PDF Downloads 4622811 Microeconomic Consequences of the Housing Market Deformation in the Selected Region of the Czech Republic
Authors: Hana Janáčková
Abstract:
Housing can be sorted as basic needs of households. Purchase of acceptable ownership housing is important investments for most them. For rental housing households must consider the part of rent expenditure paid in the total household income. For this reason, financial considerations of households in this area depend on the government innervations (public administration) in housing - on housing policy. Market system of housing allocation, whether ownership or tenancy, is based on the fact that housing is a scarce good. The allocation of housing is based on demand and supply. The market system of housing can sometimes have a negative impact on some households, the market is unable to satisfy certain groups of the population that are not able or willing to accept market price. For these reasons, there is a more or less regulation of the market. Regulation is both on the demand and supply side, and the state determines the rules of behaviour for all economic entities of the housing market. This article submits results of analysis of selected regulatory interference of the state in the housing market and assesses their implications deforming the market in the selected region of the Czech Republic. The first part describes tools of supports and the second part discusses deformations and analyses their consequences on the demand side of housing market and on supply side.Keywords: housing, housing market, microeconomic consequences, deformation
Procedia PDF Downloads 4012810 Factors Motivating Experienced Secondary Teachers to Remain in the Teaching Profession
Authors: Joselito Castro Gutierrez, Herbert Orteza, Jervie Boligon, Kenneth Esteves, Edrick Kevin Ferrer, Mark Kevin Torres, Patrick Vergara
Abstract:
Teaching is a noble profession that involves an effective imparting of holistic learning. Consequently, it requires a driving force called motivation. This research aims to determine the motivating factors, problems encountered, solutions made by experienced secondary school teachers to remain in the teaching profession. A mixed unstructured/structured questionnaire was used for gathering data among public secondary school teachers. The researchers have arrived to a conclusion that the dominant motivating factors of teachers to stay in the profession are altruism, extrinsic factors, and self-efficacy. Meanwhile, the prevalent problems these experienced secondary teachers experienced are mutual dilemma, work overload, and personal issues. Teachers have varied methods on solving the problem which are: a) Direct Solution; b) Indirect Solution; and c) Pseudo-Solutions. Lastly, the factors, problems, and solutions, have influential effects on how long a teacher would sustain in teaching which would manifest as positive, negative and neutral effects.Keywords: motivation, common problems of teachers, strategies in solving problems, teaching profession
Procedia PDF Downloads 4462809 Brief Guide to Cloud-Based AI Prototyping: Key Insights from Selected Case Studies Using Google Cloud Platform
Authors: Kamellia Reshadi, Pranav Ragji, Theodoros Soldatos
Abstract:
Recent advancements in cloud computing and storage, along with rapid progress in artificial intelligence (AI), have transformed approaches to developing efficient, scalable applications. However, integrating AI with cloud computing poses challenges as these fields are often disjointed, and many advancements remain difficult to access, obscured in complex documentation or scattered across research reports. For this reason, we share experiences from prototype projects combining these technologies. Specifically, we focus on Google Cloud Platform (GCP) functionalities and describe vision and speech activities applied to labeling, subtitling, and urban traffic flow tasks. We describe challenges, pricing, architecture, and other key features, considering the goal of real-time performance. We hope our demonstrations provide not only essential guidelines for using these functionalities but also enable more similar approaches.Keywords: artificial intelligence, cloud computing, real-time applications, case studies, knowledge management, research and development, text labeling, video annotation, urban traffic analysis, public safety, prototyping, Google Cloud Platform
Procedia PDF Downloads 23