Search results for: social network dynamics
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15582

Search results for: social network dynamics

11202 The Effect of Entertainment, Interactivity, and Authenticity Features of Tourism E-Commerce Live Streaming on Tourism Consumer’s Purchase Intention: The Mediating Role of Social Presence

Authors: Muhammad Munir, Moazzam, Attia Saddique, Muhammad Waheed

Abstract:

This study examines the complex interactions between entertainment, interaction, and authenticity aspects in the context of live streaming tourism e-commerce and how they affect tourists' intent to purchase. In the context of e-commerce live streaming, the goal of this study is to offer a thorough understanding of how these factors work together to influence consumers' intents to make purchases related to tourism. A sample of 250 respondents' information was gathered, and it was analyzed through Smart PLS 4. To ensure reliable measurement constructs, convergent and discriminant validity were evaluated. Discriminant validity was evaluated using the HTMT ratio approach, and the structural model was evaluated using structural equation modeling (SEM) with bootstrapping. Results showed that entertainment had a strong beneficial impact on social presence, highlighting the value of compelling content in raising users' sense of presence on live streaming platforms for tourism-related e-commerce. The lack of a direct relationship between Interactivity and Authenticity and Social Presence emphasizes the need for more research into certain characteristics of these dimensions that appeal to consumers in this situation.

Keywords: entertainment, interactivity, authenticity, tourism consumer’s purchase intention, social presence

Procedia PDF Downloads 52
11201 The Impact of Social Support on Anxiety and Depression under the Context of COVID-19 Pandemic: A Scoping Review and Meta-Analysis

Authors: Meng Wu, Atif Rahman, Eng Gee, Lim, Jeong Jin Yu, Rong Yan

Abstract:

Context: The COVID-19 pandemic has had a profound impact on mental health, with increased rates of anxiety and depression observed. Social support, a critical factor in mental well-being, has also undergone significant changes during the pandemic. This study aims to explore the relationship between social support, anxiety, and depression during COVID-19, taking into account various demographic and contextual factors. Research Aim: The main objective of this study is to conduct a comprehensive systematic review and meta-analysis to examine the impact of social support on anxiety and depression during the COVID-19 pandemic. The study aims to determine the consistency of these relationships across different age groups, occupations, regions, and research paradigms. Methodology: A scoping review and meta-analytic approach were employed in this study. A search was conducted across six databases from 2020 to 2022 to identify relevant studies. The selected studies were then subjected to random effects models, with pooled correlations (r and ρ) estimated. Homogeneity was assessed using Q and I² tests. Subgroup analyses were conducted to explore variations across different demographic and contextual factors. Findings: The meta-analysis of both cross-sectional and longitudinal studies revealed significant correlations between social support, anxiety, and depression during COVID-19. The pooled correlations (ρ) indicated a negative relationship between social support and anxiety (ρ = -0.30, 95% CI = [-0.333, -0.255]) as well as depression (ρ = -0.27, 95% CI = [-0.370, -0.281]). However, further investigation is required to validate these results across different age groups, occupations, and regions. Theoretical Importance: This study emphasizes the multifaceted role of social support in mental health during the COVID-19 pandemic. It highlights the need to reevaluate and expand our understanding of social support's impact on anxiety and depression. The findings contribute to the existing literature by shedding light on the associations and complexities involved in these relationships. Data Collection and Analysis Procedures: The data collection involved an extensive search across six databases to identify relevant studies. The selected studies were then subjected to rigorous analysis using random effects models and subgroup analyses. Pooled correlations were estimated, and homogeneity was assessed using Q and I² tests. Question Addressed: This study aimed to address the question of the impact of social support on anxiety and depression during the COVID-19 pandemic. It sought to determine the consistency of these relationships across different demographic and contextual factors. Conclusion: The findings of this study highlight the significant association between social support, anxiety, and depression during the COVID-19 pandemic. However, further research is needed to validate these findings across different age groups, occupations, and regions. The study emphasizes the need for a comprehensive understanding of social support's multifaceted role in mental health and the importance of considering various contextual and demographic factors in future investigations.

Keywords: social support, anxiety, depression, COVID-19, meta-analysis

Procedia PDF Downloads 48
11200 Exploring the Dose-Response Association of Lifestyle Behaviors and Mental Health among High School Students in the US: A Secondary Analysis of 2021 Adolescent Behaviors and Experiences Survey Data

Authors: Layla Haidar, Shari Esquenazi-Karonika

Abstract:

Introduction: Mental health includes one’s emotional, psychological, and interpersonal well-being; it ranges from “good” to “poor” on a continuum. At the individual-level, it affects how a person thinks, feels, and acts. Moreover, it determines how they cope with stress, relate to others, and interface with their surroundings. Research has yielded that mental health is directly related with short- and long-term physical health (including chronic disease), health risk behaviors, education-level, employment, and social relationships. As is the case with physical conditions like diabetes, heart disease, and cancer, mitigating the behavioral and genetic risks of debilitating mental health conditions like anxiety and depression can nurture a healthier quality of mental health throughout one’s life. In order to maximize the benefits of prevention, it is important to identify modifiable risks and develop protective habits earlier in life. Methods: The Adolescent Behaviors and Experiences Survey (ABES) dataset was used for this study. The ABES survey was administered to high school students (9th-12th grade) during January 2021- June 2021 by the Centers for Disease Control and Prevention (CDC). The data was analyzed to identify any associations between feelings of sadness, hopelessness, or increased suicidality among high school students with relation to their participation on one or more sports teams and their average daily consumed screen time. Data was analyzed using descriptive and multivariable analytic techniques. A multinomial logistic regression of each variable was conducted to examine if there was an association, while controlling for grade-level, sex, and race. Results: The findings from this study are insightful for administrators and policymakers who wish to address mounting concerns related to student mental health. The study revealed that compared to a student who participated on zero sports teams, students who participated in 1 or more sports teams showed a significantly increased risk of depression (p<0.05). Conversely, the rate of depression in students was significantly less in those who consumed 5 or more hours of screen time per day, compared to those who consumed less than 1 hour per day of screen time (p<0.05). Conclusion: These findings are informative and highlight the importance of understanding the nuances of student participation on sports teams (e.g., physical exertion, social dynamics of team, and the level of competitiveness within the sport). Likewise, the context of an individual’s screen time (e.g., social media, engaging in team-based video games, or watching television) can inform parental or school-based policies about screen time activity. Although physical activity has been proven to be important for emotional and physical well-being of youth, playing on multiple teams could have negative consequences on the emotional state of high school students potentially due to fatigue, overtraining, and injuries. Existing literature has highlighted the negative effects of screen time; however, further research needs to consider the type of screen-based consumption to better understand its effects on mental health.

Keywords: behavioral science, mental health, adolescents, prevention

Procedia PDF Downloads 93
11199 Simulation of Elastic Bodies through Discrete Element Method, Coupled with a Nested Overlapping Grid Fluid Flow Solver

Authors: Paolo Sassi, Jorge Freiria, Gabriel Usera

Abstract:

In this work, a finite volume fluid flow solver is coupled with a discrete element method module for the simulation of the dynamics of free and elastic bodies in interaction with the fluid and between themselves. The open source fluid flow solver, caffa3d.MBRi, includes the capability to work with nested overlapping grids in order to easily refine the grid in the region where the bodies are moving. To do so, it is necessary to implement a recognition function able to identify the specific mesh block in which the device is moving in. The set of overlapping finer grids might be displaced along with the set of bodies being simulated. The interaction between the bodies and the fluid is computed through a two-way coupling. The velocity field of the fluid is first interpolated to determine the drag force on each object. After solving the objects displacements, subject to the elastic bonding among them, the force is applied back onto the fluid through a Gaussian smoothing considering the cells near the position of each object. The fishnet is represented as lumped masses connected by elastic lines. The internal forces are derived from the elasticity of these lines, and the external forces are due to drag, gravity, buoyancy and the load acting on each element of the system. When solving the ordinary differential equations system, that represents the motion of the elastic and flexible bodies, it was found that the Runge Kutta solver of fourth order is the best tool in terms of performance, but requires a finer grid than the fluid solver to make the system converge, which demands greater computing power. The coupled solver is demonstrated by simulating the interaction between the fluid, an elastic fishnet and a set of free bodies being captured by the net as they are dragged by the fluid. The deformation of the net, as well as the wake produced in the fluid stream are well captured by the method, without requiring the fluid solver mesh to adapt for the evolving geometry. Application of the same strategy to the simulation of elastic structures subject to the action of wind is also possible with the method presented, and one such application is currently under development.

Keywords: computational fluid dynamics, discrete element method, fishnets, nested overlapping grids

Procedia PDF Downloads 404
11198 Modeling Driving Distraction Considering Psychological-Physical Constraints

Authors: Yixin Zhu, Lishengsa Yue, Jian Sun, Lanyue Tang

Abstract:

Modeling driving distraction in microscopic traffic simulation is crucial for enhancing simulation accuracy. Current driving distraction models are mainly derived from physical motion constraints under distracted states, in which distraction-related error terms are added to existing microscopic driver models. However, the model accuracy is not very satisfying, due to a lack of modeling the cognitive mechanism underlying the distraction. This study models driving distraction based on the Queueing Network Human Processor model (QN-MHP). This study utilizes the queuing structure of the model to perform task invocation and switching for distracted operation and control of the vehicle under driver distraction. Based on the assumption of the QN-MHP model about the cognitive sub-network, server F is a structural bottleneck. The latter information must wait for the previous information to leave server F before it can be processed in server F. Therefore, the waiting time for task switching needs to be calculated. Since the QN-MHP model has different information processing paths for auditory information and visual information, this study divides driving distraction into two types: auditory distraction and visual distraction. For visual distraction, both the visual distraction task and the driving task need to go through the visual perception sub-network, and the stimuli of the two are asynchronous, which is called stimulus on asynchrony (SOA), so when calculating the waiting time for switching tasks, it is necessary to consider it. In the case of auditory distraction, the auditory distraction task and the driving task do not need to compete for the server resources of the perceptual sub-network, and their stimuli can be synchronized without considering the time difference in receiving the stimuli. According to the Theory of Planned Behavior for drivers (TPB), this study uses risk entropy as the decision criterion for driver task switching. A logistic regression model is used with risk entropy as the independent variable to determine whether the driver performs a distraction task, to explain the relationship between perceived risk and distraction. Furthermore, to model a driver’s perception characteristics, a neurophysiological model of visual distraction tasks is incorporated into the QN-MHP, and executes the classical Intelligent Driver Model. The proposed driving distraction model integrates the psychological cognitive process of a driver with the physical motion characteristics, resulting in both high accuracy and interpretability. This paper uses 773 segments of distracted car-following in Shanghai Naturalistic Driving Study data (SH-NDS) to classify the patterns of distracted behavior on different road facilities and obtains three types of distraction patterns: numbness, delay, and aggressiveness. The model was calibrated and verified by simulation. The results indicate that the model can effectively simulate the distracted car-following behavior of different patterns on various roadway facilities, and its performance is better than the traditional IDM model with distraction-related error terms. The proposed model overcomes the limitations of physical-constraints-based models in replicating dangerous driving behaviors, and internal characteristics of an individual. Moreover, the model is demonstrated to effectively generate more dangerous distracted driving scenarios, which can be used to construct high-value automated driving test scenarios.

Keywords: computational cognitive model, driving distraction, microscopic traffic simulation, psychological-physical constraints

Procedia PDF Downloads 71
11197 Developing Geriatric Oral Health Network is a Public Health Necessity for Older Adults

Authors: Maryam Tabrizi, Shahrzad Aarup

Abstract:

Objectives- Understanding the close association between oral health and overall health for older adults at the right time and right place, a person, focus treatment through Project ECHO telementoring. Methodology- Data from monthly ECHO telementoring sessions were provided for three years. Sessions including case presentations, overall health conditions, considering medications, organ functions limitations, including the level of cognition. Contributions- Providing the specialist level of providing care to all elderly regardless of their location and other health conditions and decreasing oral health inequity by increasing workforce via Project ECHO telementoring program worldwide. By 2030, the number of adults in the USA over the age of 65 will increase more than 60% (approx.46 million) and over 22 million (30%) of 74 million older Americans will need specialized geriatrician care. In 2025, a national shortage of medical geriatricians will be close to 27,000. Most individuals 65 and older do not receive oral health care due to lack of access, availability, or affordability. One of the main reasons is a significant shortage of Oral Health (OH) education and resources for the elderly, particularly in rural areas. Poor OH is a social stigma, a thread to quality and safety of overall health of the elderly with physical and cognitive decline. Poor OH conditions may be costly and sometimes life-threatening. Non-traumatic dental-related emergency department use in Texas alone was over $250 M in 2016. Most elderly over the age of 65 present with at least one or multiple chronic diseases such as arthritis, diabetes, heart diseases, and chronic obstructive pulmonary disease (COPD) are at higher risk to develop gum (periodontal) disease, yet they are less likely to get dental care. In addition, most older adults take both prescription and over-the-counter drugs; according to scientific studies, many of these medications cause dry mouth. Reduced saliva flow due to aging and medications may increase the risk of cavities and other oral conditions. Most dental schools have already increased geriatrics OH in their educational curriculums, but the aging population growth worldwide is faster than growing geriatrics dentists. However, without the use of advanced technology and creating a network between specialists and primary care providers, it is impossible to increase the workforce, provide equitable oral health to the elderly. Project ECHO is a guided practice model that revolutionizes health education and increases the workforce to provide best-practice specialty care and reduce health disparities. Training oral health providers for utilizing the Project ECHO model is a logical response to the shortage and increases oral health access to the elderly. Project ECHO trains general dentists & hygienists to provide specialty care services. This means more elderly can get the care they need, in the right place, at the right time, with better treatment outcomes and reduces costs.

Keywords: geriatric, oral health, project echo, chronic disease, oral health

Procedia PDF Downloads 159
11196 Enhancing Sustainability Awareness through Social Learning Experiences on Campuses

Authors: Rashika Sharma

Abstract:

The campuses at tertiary institutes can act as a social environment for peer to peer connections. However, socialization is not the only aspect that campuses provide. The campus can act as a learning environment that has often been termed as the campus curriculum. Many tertiary institutes have taken steps to make their campus a ‘green campus’ whereby initiatives have been taken to reduce their impact on the environment. However, as visible as these initiatives are, it is debatable whether these have any effect on students’ and their understanding of sustainable campus operations. Therefore, research was conducted to evaluate the effectiveness of sustainable campus operations in raising students’ awareness of sustainability. Students at two vocational institutes participated in this interpretive research with data collected through surveys and focus groups. The findings indicated that majority of vocational education students remained oblivious of sustainability initiatives on campuses.

Keywords: campus learning, education for sustainability, social learning, vocational education

Procedia PDF Downloads 268
11195 Disaster Adaptation Mechanism and Disaster Prevention Adaptation Planning Strategies for Industrial Parks in Response to Climate Change and Different Socio-Economic Disasters

Authors: Jen-Te Pai, Jao-Heng Liu, Shin-En Pai

Abstract:

The impact of climate change has intensified in recent years, causing Taiwan to face higher frequency and serious natural disasters. Therefore, it is imperative for industrial parks manufacturers to promote adaptation policies in response to climate change. On the other hand, with the rise of the international anti-terrorism situation, once a terrorist attack occurs, it will attract domestic and international media attention, especially the strategic and economic status of the science park. Thus, it is necessary to formulate adaptation and mitigation strategies under climate change and social economic disasters. After reviewed the literature about climate change, urban disaster prevention, vulnerability assessment, and risk communication, the study selected 62 industrial parks compiled by the Industrial Bureau of the Ministry of Economic Affairs of Taiwan as the research object. This study explored the vulnerability and disaster prevention and disaster relief functional assessment of these industrial parks facing of natural and socio-economic disasters. Furthermore, this study explored planned adaptation of industrial parks management section and autonomous adaptation of corporate institutions in the park. The conclusion of this study is that Taiwan industrial parks with a higher vulnerability to natural and socio-economic disasters should employ positive adaptive behaviours.

Keywords: adaptive behaviours, analytic network process, vulnerability, industrial parks

Procedia PDF Downloads 125
11194 Client Hacked Server

Authors: Bagul Abhijeet

Abstract:

Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.

Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring

Procedia PDF Downloads 240
11193 Network Based Speed Synchronization Control for Multi-Motor via Consensus Theory

Authors: Liqin Zhang, Liang Yan

Abstract:

This paper addresses the speed synchronization control problem for a network-based multi-motor system from the perspective of cluster consensus theory. Each motor is considered as a single agent connected through fixed and undirected network. This paper presents an improved control protocol from three aspects. First, for the purpose of improving both tracking and synchronization performance, this paper presents a distributed leader-following method. The improved control protocol takes the importance of each motor’s speed into consideration, and all motors are divided into different groups according to speed weights. Specifically, by using control parameters optimization, the synchronization error and tracking error can be regulated and decoupled to some extent. The simulation results demonstrate the effectiveness and superiority of the proposed strategy. In practical engineering, the simplified models are unrealistic, such as single-integrator and double-integrator. And previous algorithms require the acceleration information of the leader available to all followers if the leader has a varying velocity, which is also difficult to realize. Therefore, the method focuses on an observer-based variable structure algorithm for consensus tracking, which gets rid of the leader acceleration. The presented scheme optimizes synchronization performance, as well as provides satisfactory robustness. What’s more, the existing algorithms can obtain a stable synchronous system; however, the obtained stable system may encounter some disturbances that may destroy the synchronization. Focus on this challenging technological problem, a state-dependent-switching approach is introduced. In the presence of unmeasured angular speed and unknown failures, this paper investigates a distributed fault-tolerant consensus tracking algorithm for a group non-identical motors. The failures are modeled by nonlinear functions, and the sliding mode observer is designed to estimate the angular speed and nonlinear failures. The convergence and stability of the given multi-motor system are proved. Simulation results have shown that all followers asymptotically converge to a consistent state when one follower fails to follow the virtual leader during a large enough disturbance, which illustrates the good performance of synchronization control accuracy.

Keywords: consensus control, distributed follow, fault-tolerant control, multi-motor system, speed synchronization

Procedia PDF Downloads 113
11192 Multi-Agent System Based Distributed Voltage Control in Distribution Systems

Authors: A. Arshad, M. Lehtonen. M. Humayun

Abstract:

With the increasing Distributed Generation (DG) penetration, distribution systems are advancing towards the smart grid technology for least latency in tackling voltage control problem in a distributed manner. This paper proposes a Multi-agent based distributed voltage level control. In this method a flat architecture of agents is used and agents involved in the whole controlling procedure are On Load Tap Changer Agent (OLTCA), Static VAR Compensator Agent (SVCA), and the agents associated with DGs and loads at their locations. The objectives of the proposed voltage control model are to minimize network losses and DG curtailments while maintaining voltage value within statutory limits as close as possible to the nominal. The total loss cost is the sum of network losses cost, DG curtailment costs, and voltage damage cost (which is based on penalty function implementation). The total cost is iteratively calculated for various stricter limits by plotting voltage damage cost and losses cost against varying voltage limit band. The method provides the optimal limits closer to nominal value with minimum total loss cost. In order to achieve the objective of voltage control, the whole network is divided into multiple control regions; downstream from the controlling device. The OLTCA behaves as a supervisory agent and performs all the optimizations. At first, a token is generated by OLTCA on each time step and it transfers from node to node until the node with voltage violation is detected. Upon detection of such a node, the token grants permission to Load Agent (LA) for initiation of possible remedial actions. LA will contact the respective controlling devices dependent on the vicinity of the violated node. If the violated node does not lie in the vicinity of the controller or the controlling capabilities of all the downstream control devices are at their limits then OLTC is considered as a last resort. For a realistic study, simulations are performed for a typical Finnish residential medium-voltage distribution system using Matlab ®. These simulations are executed for two cases; simple Distributed Voltage Control (DVC) and DVC with optimized loss cost (DVC + Penalty Function). A sensitivity analysis is performed based on DG penetration. The results indicate that costs of losses and DG curtailments are directly proportional to the DG penetration, while in case 2 there is a significant reduction in total loss. For lower DG penetration, losses are reduced more or less 50%, while for higher DG penetration, loss reduction is not very significant. Another observation is that the newer stricter limits calculated by cost optimization moves towards the statutory limits of ±10% of the nominal with the increasing DG penetration as for 25, 45 and 65% limits calculated are ±5, ±6.25 and 8.75% respectively. Observed results conclude that the novel voltage control algorithm proposed in case 1 is able to deal with the voltage control problem instantly but with higher losses. In contrast, case 2 make sure to reduce the network losses through proposed iterative method of loss cost optimization by OLTCA, slowly with time.

Keywords: distributed voltage control, distribution system, multi-agent systems, smart grids

Procedia PDF Downloads 296
11191 Reclaiming Corporate Social Responsibility: A Research Agenda for Socio-Industrial Interdependence

Authors: Leah Ritchie

Abstract:

By many accounts, the most recent economic recession and subsequent lack-luster recovery has demonstrated that corporate social responsibility is in a state of crisis. This crisis represents an opportunity for CSR scholars to play a role in restoring long-term economic growth and consumer confidence. In its current state however, CSR may not be in a position to facilitate positive change. In an attempt to remain relevant, the field has shifted toward a performance-based agenda that demonstrates in practical terms, how CSR can positively affect the financial and strategic performance of the firm. This paper argues that if CSR is to play a central role in helping to create a more equitable balance of power between industry and society, it must demonstrate the symbiotic nature of the relationship between these two entities, not just in terms of compartmentalized strategic and financial gain for the firm, but also toward maintaining a 'do no harm' imperative. Given the evidence that harm done to society is ultimately turned back on the firm, this is not simply a moralistic imperative. In order to affect change, CSR must also create an activist agenda to raise consciousness among the general citizenry toward mobilizing, uncovering, and repairing breeches in the implicit social contract between business and society.

Keywords: corporate social responsibility, multiple stakeholder view, economic recession, housing crisis

Procedia PDF Downloads 202
11190 Development of Fault Diagnosis Technology for Power System Based on Smart Meter

Authors: Chih-Chieh Yang, Chung-Neng Huang

Abstract:

In power system, how to improve the fault diagnosis technology of transmission line has always been the primary goal of power grid operators. In recent years, due to the rise of green energy, the addition of all kinds of distributed power also has an impact on the stability of the power system. Because the smart meters are with the function of data recording and bidirectional transmission, the adaptive Fuzzy Neural inference system, ANFIS, as well as the artificial intelligence that has the characteristics of learning and estimation in artificial intelligence. For transmission network, in order to avoid misjudgment of the fault type and location due to the input of these unstable power sources, combined with the above advantages of smart meter and ANFIS, a method for identifying fault types and location of faults is proposed in this study. In ANFIS training, the bus voltage and current information collected by smart meters can be trained through the ANFIS tool in MATLAB to generate fault codes to identify different types of faults and the location of faults. In addition, due to the uncertainty of distributed generation, a wind power system is added to the transmission network to verify the diagnosis correctness of the study. Simulation results show that the method proposed in this study can correctly identify the fault type and location of fault with more efficiency, and can deal with the interference caused by the addition of unstable power sources.

Keywords: ANFIS, fault diagnosis, power system, smart meter

Procedia PDF Downloads 126
11189 EFL Saudi Students' Use of Vocabulary via Twitter

Authors: A. Alshabeb

Abstract:

Vocabulary is one of the elements that links the four skills of reading, writing, speaking, and listening and is very critical in learning a foreign language. This study aims to determine how Saudi Arabian EFL students learn English vocabulary via Twitter. The study adopts a mixed sequential research design in collecting and analysing data. The results of the study provide several recommendations for vocabulary learning. Moreover, the study can help teachers to consider the possibilities of using Twitter further, and perhaps to develop new approaches to vocabulary teaching and to support students in their use of social media.

Keywords: social media, twitter, vocabulary, web 2

Procedia PDF Downloads 406
11188 Women's Menstrual Experience in India: A Psycho-Social Approach

Authors: Bhavna Rajagopal, Mrinmoyi Kulkarni

Abstract:

Today women experience more menstrual cycles than their ancestors did a hundred years ago, owing to early puberty, fewer pregnancies and dietary changes. Much of the research in menstruation is located in the medical domain with a focus on physical symptoms. The research in psychology is largely concerned with premenstrual syndrome (PMS), whereas the focus in sociology is on social and cultural practices relating to menstruation. Research that simultaneously studies the physical, psychological, social and cultural aspects is lacking. Therefore, in this study, an attempt has been made to identify socio-cultural, psychological and physical factors that interact to influence a woman’s experience of menstruation in the urban setting. The study included seven unmarried women in the age group of 24-30 and data was obtained through a focus group discussion. The transcript of the focus group discussion was thematically analysed. Two major themes relating to the self and social experience of menstruation emerged. Themes relating to the self included menarcheal experiences, self-perception, mood and management of menstrual hygiene and symptoms while themes relating to social experience included the construction of menstruation by family and peers, and cultural factors. Attitudes towards the menstrual cycle appeared to be primarily influenced by severity of symptoms and the resulting disruption to daily life. Outcomes of this study have indicated that future research needs to study menstruation and its impact on women’s wellbeing by adopting a socio-ecological approach and by collecting data using the whole cycle approach across a woman’s reproductive years.

Keywords: India, menstrual cycle, psychosocial approach, wellbeing

Procedia PDF Downloads 124
11187 Water Body Detection and Estimation from Landsat Satellite Images Using Deep Learning

Authors: M. Devaki, K. B. Jayanthi

Abstract:

The identification of water bodies from satellite images has recently received a great deal of attention. Different methods have been developed to distinguish water bodies from various satellite images that vary in terms of time and space. Urban water identification issues body manifests in numerous applications with a great deal of certainty. There has been a sharp rise in the usage of satellite images to map natural resources, including urban water bodies and forests, during the past several years. This is because water and forest resources depend on each other so heavily that ongoing monitoring of both is essential to their sustainable management. The relevant elements from satellite pictures have been chosen using a variety of techniques, including machine learning. Then, a convolution neural network (CNN) architecture is created that can identify a superpixel as either one of two classes, one that includes water or doesn't from input data in a complex metropolitan scene. The deep learning technique, CNN, has advanced tremendously in a variety of visual-related tasks. CNN can improve classification performance by reducing the spectral-spatial regularities of the input data and extracting deep features hierarchically from raw pictures. Calculate the water body using the satellite image's resolution. Experimental results demonstrate that the suggested method outperformed conventional approaches in terms of water extraction accuracy from remote-sensing images, with an average overall accuracy of 97%.

Keywords: water body, Deep learning, satellite images, convolution neural network

Procedia PDF Downloads 77
11186 Multidimensional Sports Spectators Segmentation and Social Media Marketing

Authors: B. Schmid, C. Kexel, E. Djafarova

Abstract:

Understanding consumers is elementary for practitioners in marketing. Consumers of sports events, the sports spectators, are a particularly complex consumer crowd. In order to identify and define their profiles different segmentation approaches can be found in literature, one of them being multidimensional segmentation. Multidimensional segmentation models correspond to the broad range of attitudes, behaviours, motivations and beliefs of sports spectators, other than earlier models. Moreover, in sports there are some well-researched disciplines (e.g. football or North American sports) where consumer profiles and marketing strategies are elaborate and others where no research at all can be found. For example, there is almost no research on athletics spectators. This paper explores the current state of research on sports spectators segmentation. An in-depth literature review provides the framework for a spectators segmentation in athletics. On this basis, additional potential consumer groups and implications for social media marketing will be explored. The findings are the basis for further research.

Keywords: multidimensional segmentation, social media, sports marketing, sports spectators segmentation

Procedia PDF Downloads 290
11185 Mainstreaming Environmentally-Friendly Household Management Practice through Indonesian Women Social Gathering

Authors: Erinetta P. Anjani, Karina Mariz, Rifqi K. Fathianto

Abstract:

While Islam teaches its’ followers to be mindful of God’s creation, including the environment, Indonesia as one of the world’s largest Muslim country, is now also world’s second-largest plastic waste contributor. The problem of waste is a complicated matter in Indonesia and is worsening because many landfills are now on verge of overcapacity. The causes of this problem are at least due to two things. First is Indonesia’s bad waste management. Second, people’s low of eco-literacy, as can be seen in massive use of non-degradable materials, low rate of waste separation, low rate of recycling and up cycling, whereas households are the largest source of waste in Indonesia. Mostly dealing with patriarchal culture, women in Indonesia play big and important role in their households, from family matter to household management (including waste management), to economic matter. Uniquely, the majority of Muslim women in Indonesia are engaged in -arisan- women social gathering or in -majelis ta’lim- women community in Islamic prayer, which serves as a social mechanism. As many NGOs are working on tackling environmental issues by raising awareness in order for the people to adapt a more environmentally-friendly household management practices, the problem of waste in Indonesia is meeting a bright light. Using qualitative data and descriptive analysis, the following is a proposal for a program intended to spread eco-literacy for waste management to women in Indonesia through their social gathering in order for them to gain awareness and start implementing eco-actions in their households. We attempt Waste4Change, a social company which provides environmentally-friendly waste management services, to reach women with modules that consist of environmental education, trainings, and workshops. We will then monitor and counsel the women to make sure if the lesson is going to be fully applied in their houses. The program will take place nearby University of Indonesia, Depok, West Java.

Keywords: eco-literacy, environmental education, household waste management, Muslim women social gathering, Waste4Change

Procedia PDF Downloads 137
11184 Final Costs of Civil Claims

Authors: Behnam Habibi Dargah

Abstract:

The economics of cost-benefit theory seeks to monitor claims and determine their final price. The cost of litigation is important because it is a measure of the efficiency of the justice system. From an economic point of view, the cost of litigation is considered to be the point of equilibrium of litigation, whereby litigation is regarded as a high-risk investment and is initiated when the costs are less than the probable and expected benefits. Costs are economically separated into private and social costs. Private cost includes material (direct and indirect) and spiritual costs. The social costs of litigation are also subsidized-centric due to the public and governmental nature of litigation and cover both types of bureaucratic bureaucracy and the costs of judicial misconduct. Macroeconomic policy in the economics of justice is the reverse engineering of controlling the social costs of litigation by employing selective litigation and working on the judicial culture to achieve rationality in the monopoly system. Procedures for controlling and managing court costs are also circumscribed to economic patterns in the field. Rational cost allocation model and cost transfer model. The rational allocation model deals with cost-tolerance systems, and the transfer model also considers three models of transferability, including legal, judicial and contractual transferability, which will be described and explored in the present article in a comparative manner.

Keywords: cost of litigation, economics of litigation, private cost, social cost, cost of litigation

Procedia PDF Downloads 115
11183 Understanding the Manifestation of Psychosocial Difficulties in Children with Developmental Language Disorder, with a Focus on Anxiety and Social Frustration

Authors: Annabel Burnley, Michelle St. Clair, Charlotte Dack, Yvonne Wren

Abstract:

Children with Developmental Language Disorder (DLD) are well documented to experience social and emotional difficulties. Despite this, there is little consensus as to how these difficulties manifest, without which the ability to develop prevention initiatives is limited. An online survey was completed by 107 parents of either child with DLD (‘DLD sample’; n=57), or typically developing children (‘typical sample’; n=50), all aged 6-12 years old. Psychosocial symptom measures were used, alongside 11 psychosocial statements generated from previous qualitative work. Qualitative interviews were then held to understand the manifestation of key difficulties in more depth (n=4). The DLD sample scored significantly higher on all psychosocial statements than the typical sample. Experiencing anxiety (80.7%), requiring routine and sameness (75.4%) and struggling to regulate their emotions (75.4%) were the most common difficulties for a majority of children with DLD. For this DLD sample, family communication and coping styles were found not to contribute to the manifestation of these difficulties. Two separate mediation models were run to understand the role of other psychosocial difficulties in the manifestation of (1) anxiety and (2) social frustration. ‘Intolerance of uncertainty was found to strongly mediate the relationship between DLD diagnosis and symptoms of anxiety. Emotion regulation was found to moderately mediate the relationship between DLD diagnosis and social frustration. Parents appear to cope well with their children’s complex psychosocial needs, but further external intervention is needed. Intervention focussing on intolerance of uncertainty and emotion dysregulation may help the management of anxiety and social frustration. Further research is needed to understand the children’s routined behaviors.

Keywords: psychosocial difficulties, developmental language disorder, specific language impairment, parent, anxiety

Procedia PDF Downloads 99
11182 Using Geospatial Analysis to Reconstruct the Thunderstorm Climatology for the Washington DC Metropolitan Region

Authors: Mace Bentley, Zhuojun Duan, Tobias Gerken, Dudley Bonsal, Henry Way, Endre Szakal, Mia Pham, Hunter Donaldson, Chelsea Lang, Hayden Abbott, Leah Wilcynzski

Abstract:

Air pollution has the potential to modify the lifespan and intensity of thunderstorms and the properties of lightning. Using data mining and geovisualization, we investigate how background climate and weather conditions shape variability in urban air pollution and how this, in turn, shapes thunderstorms as measured by the intensity, distribution, and frequency of cloud-to-ground lightning. A spatiotemporal analysis was conducted in order to identify thunderstorms using high-resolution lightning detection network data. Over seven million lightning flashes were used to identify more than 196,000 thunderstorms that occurred between 2006 - 2020 in the Washington, DC Metropolitan Region. Each lightning flash in the dataset was grouped into thunderstorm events by means of a temporal and spatial clustering algorithm. Once the thunderstorm event database was constructed, hourly wind direction, wind speed, and atmospheric thermodynamic data were added to the initiation and dissipation times and locations for the 196,000 identified thunderstorms. Hourly aerosol and air quality data for the thunderstorm initiation times and locations were also incorporated into the dataset. Developing thunderstorm climatologies using a lightning tracking algorithm and lightning detection network data was found to be useful for visualizing the spatial and temporal distribution of urban augmented thunderstorms in the region.

Keywords: lightning, urbanization, thunderstorms, climatology

Procedia PDF Downloads 60
11181 Corporate Social Responsibility the New Route to Competitive Advantage: An Applied Study on Telecommunication Sector in Egypt

Authors: Rania Sherif Abd El-Azim

Abstract:

The role of corporate social responsibility (CSR) in business has evolved and led to an era where industry leaders can no longer overlook the importance of being participative corporate citizens. This is not only because of the media’s skeptical attitude toward whether or not companies’ CSR efforts are sincere but also due to key stakeholders’ ability to hold companies to a higher standard than ever before as companies can gain competitive advantage through CSR. These programs result in addressing global challenges, such as climate, and poverty, or simply improving employee retention, so it has become increasingly clear that CSR is not just the new trend for companies but a necessary tool that organizations must integrate into their overall business strategies to build a stronger reputation as well as to also increase credibility among their key audience and enhance customers’ willingness to repurchase, pay premium price and enhancing positive word of mouth. According to the literature review, the link between CSR and competitive advantage at the firm level has long been an important topic for both CSR researchers and practitioners. Thus CSR can play an important role in enhancing the firm's competitive advantage, which seems an attractive area to investigate specially in Egypt. So, this paper will investigate the role of corporate social responsibility in enhancing the firm competitive advantage.

Keywords: corporate social responsibility, competitive advantage, corporate reputation, customers' willingness to repurchase, willingness to pay premium price, positive word of mouth

Procedia PDF Downloads 307
11180 A Study of the Establishment of the Evaluation Index System for Tourist Attraction Disaster Resilience

Authors: Chung-Hung Tsai, Ya-Ping Li

Abstract:

Tourism industry is highly depended on the natural environment and climate. Compared to other industries, it is more susceptible to environment and climate. Taiwan belongs to a sea island country and located in the subtropical monsoon zone. The events of climate variability, frequency of typhoons and rainfalls raged are caused regularly serious disaster. In traditional disaster assessment, it usually focuses on the disaster damage and risk assessment, which is short of the features from different industries to understand the impact of the restoring force in post-disaster resilience and the main factors that constitute resilience. The object of this study is based on disaster recovery experience of tourism area and to understand the main factors affecting the tourist area of disaster resilience. The combinations of literature review and interviews with experts are prepared an early indicator system of the disaster resilience. Then, it is screened through a Fuzzy Delphi Method and Analytic Network Process for weight analysis. Finally, this study will establish the tourism disaster resilience evaluation index system considering the Taiwan's tourism industry characteristics. We hope that be able to enhance disaster resilience after tourist areas and increases the sustainability of industrial development. It is expected to provide government departments the tourism industry as the future owner of the assets in extreme climates responses.

Keywords: resilience, Fuzzy Delphi Method, Analytic Network Process, industrial development

Procedia PDF Downloads 387
11179 The Implementation of Corporate Social Responsibility to Contribute the Isolated District and the Drop behind District to Overcome the Poverty, Study Cases: PT. Kaltim Prima Coal (KPC) Sanggata, East Borneo, Indonesia

Authors: Sri Suryaningsum

Abstract:

The achievement ‘Best Practice Model’ holds by the government on behalf of the success implementation corporate social responsibility program that held on PT. Kaltim Prima Coal which had operation located in the isolated district in Sanggata, it could be the reference for the other companies to improve the social welfare in surrounding area, especially for the companies that have operated in the isolated area in Indonesia. The rule of Kaltim Prima Coal as the catalyst in the development progress to push up the independence of district especially for the district which has located in surrounding mining operation from village level to the regency level, those programs had written in the 7 field program in Corporate Social Responsibility, it was doing by stakeholders. The stakeholders are village government, sub-district government, Regency and citizen. One of the best programs that implement at PT. Kaltim Prima Coal is Regarding Resettlement that was completed based on Asian Development Bank Resettlement Best Practice and International Financial Corporation Resettlement Action Plan. This program contributed on the resettlement residences to develop the isolated and the neglected district.

Keywords: CSR, isolated, neglected, poverty, mining industry

Procedia PDF Downloads 237
11178 A Framework for Chinese Domain-Specific Distant Supervised Named Entity Recognition

Authors: Qin Long, Li Xiaoge

Abstract:

The Knowledge Graphs have now become a new form of knowledge representation. However, there is no consensus in regard to a plausible and definition of entities and relationships in the domain-specific knowledge graph. Further, in conjunction with several limitations and deficiencies, various domain-specific entities and relationships recognition approaches are far from perfect. Specifically, named entity recognition in Chinese domain is a critical task for the natural language process applications. However, a bottleneck problem with Chinese named entity recognition in new domains is the lack of annotated data. To address this challenge, a domain distant supervised named entity recognition framework is proposed. The framework is divided into two stages: first, the distant supervised corpus is generated based on the entity linking model of graph attention neural network; secondly, the generated corpus is trained as the input of the distant supervised named entity recognition model to train to obtain named entities. The link model is verified in the ccks2019 entity link corpus, and the F1 value is 2% higher than that of the benchmark method. The re-pre-trained BERT language model is added to the benchmark method, and the results show that it is more suitable for distant supervised named entity recognition tasks. Finally, it is applied in the computer field, and the results show that this framework can obtain domain named entities.

Keywords: distant named entity recognition, entity linking, knowledge graph, graph attention neural network

Procedia PDF Downloads 81
11177 ISIS and Social Media

Authors: Neda Jebellie

Abstract:

New information and communication technologies (ICT) not only has revolutionized the world of communication but has also strongly impacted the state of international terrorism. Using the potential of social media, the new wave of terrorism easily can recruit new jihadi members, spread their violent ideology and garner financial support. IS (Islamic State) as the most dangerous terrorist group has already conquered a great deal of social media space and has deployed sophisticated web-based strategies to promote its extremist doctrine. In this respect the vastly popular social media are the perfect tools for IS to establish its virtual Caliphate (e-caliphate) and e-Ommah (e-citizen).Using social media to release violent videos of beheading journalists, burning their hostages alive and mass killing of prisoners are IS strategies to terrorize and subjugate its enemies. Several Twitter and Facebook accounts which are IS affiliations have targeted young generation of Muslims all around the world. In fact IS terrorists use modern resources of communication not only to share information and conduct operations but also justify their violent acts. The strict Wahhabi doctrine of ISIS is based on a fundamental interpretation of Islam in which religious war against non Muslims (Jihad) and killing infidels (Qatal) have been praised and recommended. Via social media IS disseminates its propaganda to inspire sympathizers across the globe. Combating this new wave of terrorism which is exploiting new communication technologies is the most significant challenge for authorities. Before the rise of internet and social media governments had to control only mosques and religious gathering such as Friday sermons(Jamaah Pray) to prevent spreading extremism among Muslims community in their country. ICT and new communication technologies have heighten the challenge of dealing with Islamic radicalism and have amplified its threat .According to the official reports even some of the governments such as UK have created a special force of Facebook warriors to engage in unconventional warfare in digital age. In compare with other terrorist groups, IS has effectively grasped social media potential. Their horrifying released videos on YouTube easily got viral and were re-twitted and shared by thousands of social media users. While some of the social media such as Twitter and Facebook have shut down many accounts alleged to IS but new ones create immediately so only blocking their websites and suspending their accounts cannot solve the problem as terrorists recreate new accounts. To combat cyber terrorism focusing on disseminating counter narrative strategies can be a solution. Creating websites and providing online materials to propagate peaceful and moderate interpretation of Islam can provide a cogent alternative to extremist views.

Keywords: IS-islamic state, cyber terrorism, social media, terrorism, information, communication technologies

Procedia PDF Downloads 476
11176 English Pashto Contact: Morphological Adaptation of Bilingual Compound Words in Pashto

Authors: Imran Ullah Imran

Abstract:

Language contact is a familiar concept in the present global world. Across the globe, languages get mixed up at different levels. Borrowing, code-switching are some of the means through which languages interact. This study examines Pashto-English contact at word and syllable levels. By recording the speech of 30 Pashto native speakers, selected via 'social network' sampling, the study located a number of Pashto-English compound words, which is a unique contact of its kind. In data analysis, tokens were categorized on the basis of their pattern and morphological structure. The study shows that Pashto-English Bilingual Compound words (BCWs) are very prevalent in the Pashto language. The study also found that the BCWs in Pashto are completely productive and have their own meanings. It also shows that the dominant pattern of hybrid words in Pashto is the conjugation of an independent English root word followed by a Pashto inflectional morpheme, which contributes to the core semantic content of the construction. The BCWs construction shows that how both the languages are closer to each other. Pashto-English contact results into bilingual compound and hybrid words, which forms a considerable number of tokens in the present-day spoken Pashto. On the basis of these findings, the study assumes that the same phenomenon may increase with the passage of time that would, in turn, result in the formation of more bilingual compound or hybrid words.

Keywords: code-mixing, bilingual compound words, pashto-english contact, hybrid words, inflectional lexical morpheme

Procedia PDF Downloads 235
11175 Strategies by a Teaching Assistant to Support the Classroom Talk of a Child with Communication and Interaction Difficulties in Italy: A Case for Promoting Social Scaffolding Training

Authors: Lorenzo Ciletti, Ed Baines, Matt Somerville

Abstract:

Internationally, supporting staff with limited training (Teaching Assistants (TA)) has played a critical role in the education of children with special educational needs and/or disabilities (SEND). Researchers have notably illustrated that TAs support the children’s classroom tasks while teachers manage the whole class. Rarely have researchers investigated the TAs’ support for children’s participation in whole-class or peer-group talk, despite this type of “social support” playing a significant role in children’s whole-class integration and engagement with the classroom curriculum and learning. Social support seems particularly crucial for a large proportion of children with SEND, namely those with communication and interaction difficulties (e.g., autism spectrum conditions and speech impairments). This study explored TA practice and, particularly, TA social support in a rarely examined context (Italy). The Italian case was also selected as it provides TAs, known nationally as “support teachers,” with the most comprehensive training worldwide, thus potentially echoing (effective) nuanced practice internationally. Twelve hours of video recordings of a single TA and a child with communication and interaction difficulties (CID) were made. Video data was converted into frequencies of TA multidimensional support strategies, including TA social support and pedagogical assistance. TA-pupil talk oriented to children’s participation in classroom talk was also analysed into thematic patterns. These multi-method analyses were informed by social scaffolding principles: in particular, the extent to which the TA designs instruction contingently to the child’s communication and interaction difficulties and how their social support fosters the child’s highest responsibility in dealing with whole-class or peer-group talk by supplying the least help. The findings showed that the TA rarely supported the group or whole class participation of the child with CID. When doing so, the TA seemed to highly control the content and the timing of the child’s contributions to the classroom talk by a) interrupting the teacher’s whole class or group conversation to start an interaction between themselves and the child and b) reassuring the child about the correctness of their talk in private conversations and prompting them to raise their hand and intervene in the whole-class talk or c) stopping the child from contributing to the whole-class or peer-group talk when incorrect. The findings are interpreted in terms of their theoretical relation to scaffolding. They have significant implications for promoting social scaffolding in TA training in Italy and elsewhere.

Keywords: children with communication and interaction difficulties, children with special educational needs and/or disabilities, social scaffolding, teaching assistants, teaching practice, whole-class talk participation

Procedia PDF Downloads 79
11174 Preprocessing and Fusion of Multiple Representation of Finger Vein patterns using Conventional and Machine Learning techniques

Authors: Tomas Trainys, Algimantas Venckauskas

Abstract:

Application of biometric features to the cryptography for human identification and authentication is widely studied and promising area of the development of high-reliability cryptosystems. Biometric cryptosystems typically are designed for patterns recognition, which allows biometric data acquisition from an individual, extracts feature sets, compares the feature set against the set stored in the vault and gives a result of the comparison. Preprocessing and fusion of biometric data are the most important phases in generating a feature vector for key generation or authentication. Fusion of biometric features is critical for achieving a higher level of security and prevents from possible spoofing attacks. The paper focuses on the tasks of initial processing and fusion of multiple representations of finger vein modality patterns. These tasks are solved by applying conventional image preprocessing methods and machine learning techniques, Convolutional Neural Network (SVM) method for image segmentation and feature extraction. An article presents a method for generating sets of biometric features from a finger vein network using several instances of the same modality. Extracted features sets were fused at the feature level. The proposed method was tested and compared with the performance and accuracy results of other authors.

Keywords: bio-cryptography, biometrics, cryptographic key generation, data fusion, information security, SVM, pattern recognition, finger vein method.

Procedia PDF Downloads 135
11173 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 83