Search results for: Shannon information theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14593

Search results for: Shannon information theory

10183 Vibration Control of a Functionally Graded Carbon Nanotube-Reinforced Composites Beam Resting on Elastic Foundation

Authors: Gholamhosein Khosravi, Mohammad Azadi, Hamidreza Ghezavati

Abstract:

In this paper, vibration of a nonlinear composite beam is analyzed and then an active controller is used to control the vibrations of the system. The beam is resting on a Winkler-Pasternak elastic foundation. The composite beam is reinforced by single walled carbon nanotubes. Using the rule of mixture, the material properties of functionally graded carbon nanotube-reinforced composites (FG-CNTRCs) are determined. The beam is cantilever and the free end of the beam is under follower force. Piezoelectric layers are attached to the both sides of the beam to control vibrations as sensors and actuators. The governing equations of the FG-CNTRC beam are derived based on Euler-Bernoulli beam theory Lagrange- Rayleigh-Ritz method. The simulation results are presented and the effects of some parameters on stability of the beam are analyzed.

Keywords: carbon nanotubes, vibration control, piezoelectric layers, elastic foundation

Procedia PDF Downloads 254
10182 All for One, or One for All: A Comparative Evaluation of the Role of Social Relations in Explaining Individual versus Group Participation in the Radicalization and Terrorism Process amongst Far-Right Actors in the United States

Authors: Jack Wippell

Abstract:

This paper explores the role of social relations in explaining far-right actors' decisions over whether to travel down the process of radicalization and terrorism alone or in a group. To this end, a joint comparative method of difference and agreement is applied to four case studies across key temporal points on the radicalization and terrorism pathway to generate a theory of why individuals decide to radicalize and/or act alone or within a group. While social relations are identified as playing some moderate role in explaining why certain individuals radicalize alone versus within a group, this paper argues they play a significant role in affecting decisions over whether to act alone versus in a group. These findings suggest new avenues of distinction and understanding of far-right actors' processes of radicalization and terrorism, in turn, offering potential new avenues for counter-terrorism policy and important areas for future research.

Keywords: far-right, lone-actor, terrorism, United States, radicalization

Procedia PDF Downloads 76
10181 Motivational Profiles of the Entrepreneurial Career in Spanish Businessmen

Authors: Magdalena Suárez-Ortega, M. Fe. Sánchez-García

Abstract:

This paper focuses on the analysis of the motivations that lead people to undertake and consolidate their business. It is addressed from the framework of planned behavior theory, which recognizes the importance of the social environment and cultural values, both in the decision to undertake business and in business consolidation. Similarly, it is also based on theories of career development, which emphasize the importance of career management competencies and their connections to other vital aspects of people, including their roles within their families and other personal activities. This connects directly with the impact of entrepreneurship on the career and the professional-personal project of each individual. This study is part of the project titled Career Design and Talent Management (Ministry of Economy and Competitiveness of Spain, State Plan 2013-2016 Excellence Ref. EDU2013-45704-P). The aim of the study is to identify and describe entrepreneurial competencies and motivational profiles in a sample of 248 Spanish entrepreneurs, considering the consolidated profile and the profile in transition (n = 248).In order to obtain the information, the Questionnaire of Motivation and conditioners of the entrepreneurial career (MCEC) has been applied. This consists of 67 items and includes four scales (E1-Conflicts in conciliation, E2-Satisfaction in the career path, E3-Motivations to undertake, E4-Guidance Needs). Cluster analysis (mixed method, combining k-means clustering with a hierarchical method) was carried out, characterizing the groups profiles according to the categorical variables (chi square, p = 0.05), and the quantitative variables (ANOVA). The results have allowed us to characterize three motivational profiles relevant to the motivation, the degree of conciliation between personal and professional life, and the degree of conflict in conciliation, levels of career satisfaction and orientation needs (in the entrepreneurial project and life-career). The first profile is formed by extrinsically motivated entrepreneurs, professionally satisfied and without conflict of vital roles. The second profile acts with intrinsic motivation and also associated with family models, and although it shows satisfaction with their professional career, it finds a high conflict in their family and professional life. The third is composed of entrepreneurs with high extrinsic motivation, professional dissatisfaction and at the same time, feel the conflict in their professional life by the effect of personal roles. Ultimately, the analysis has allowed us to line the kinds of entrepreneurs to different levels of motivation, satisfaction, needs and articulation in professional and personal life, showing characterizations associated with the use of time for leisure, and the care of the family. Associations related to gender, age, activity sector, environment (rural, urban, virtual), and the use of time for domestic tasks are not identified. The model obtained and its implications for the design of training actions and orientation to entrepreneurs is also discussed.

Keywords: motivation, entrepreneurial career, guidance needs, life-work balance, job satisfaction, assessment

Procedia PDF Downloads 285
10180 Multimedia Container for Autonomous Car

Authors: Janusz Bobulski, Mariusz Kubanek

Abstract:

The main goal of the research is to develop a multimedia container structure containing three types of images: RGB, lidar and infrared, properly calibrated to each other. An additional goal is to develop program libraries for creating and saving this type of file and for restoring it. It will also be necessary to develop a method of data synchronization from lidar and RGB cameras as well as infrared. This type of file could be used in autonomous vehicles, which would certainly facilitate data processing by the intelligent autonomous vehicle management system. Autonomous cars are increasingly breaking into our consciousness. No one seems to have any doubts that self-driving cars are the future of motoring. Manufacturers promise that moving the first of them to showrooms is the prospect of the next few years. Many experts believe that creating a network of communicating autonomous cars will be able to completely eliminate accidents. However, to make this possible, it is necessary to develop effective methods of detection of objects around the moving vehicle. In bad weather conditions, this task is difficult on the basis of the RGB(red, green, blue) image. Therefore, in such situations, you should be supported by information from other sources, such as lidar or infrared cameras. The problem is the different data formats that individual types of devices return. In addition to these differences, there is a problem with the synchronization of these data and the formatting of this data. The goal of the project is to develop a file structure that could be containing a different type of data. This type of file is calling a multimedia container. A multimedia container is a container that contains many data streams, which allows you to store complete multimedia material in one file. Among the data streams located in such a container should be indicated streams of images, films, sounds, subtitles, as well as additional information, i.e., metadata. This type of file could be used in autonomous vehicles, which would certainly facilitate data processing by the intelligent autonomous vehicle management system. As shown by preliminary studies, the use of combining RGB and InfraRed images with Lidar data allows for easier data analysis. Thanks to this application, it will be possible to display the distance to the object in a color photo. Such information can be very useful for drivers and for systems in autonomous cars.

Keywords: an autonomous car, image processing, lidar, obstacle detection

Procedia PDF Downloads 209
10179 Human Action Retrieval System Using Features Weight Updating Based Relevance Feedback Approach

Authors: Munaf Rashid

Abstract:

For content-based human action retrieval systems, search accuracy is often inferior because of the following two reasons 1) global information pertaining to videos is totally ignored, only low level motion descriptors are considered as a significant feature to match the similarity between query and database videos, and 2) the semantic gap between the high level user concept and low level visual features. Hence, in this paper, we propose a method that will address these two issues and in doing so, this paper contributes in two ways. Firstly, we introduce a method that uses both global and local information in one framework for an action retrieval task. Secondly, to minimize the semantic gap, a user concept is involved by incorporating features weight updating (FWU) Relevance Feedback (RF) approach. We use statistical characteristics to dynamically update weights of the feature descriptors so that after every RF iteration feature space is modified accordingly. For testing and validation purpose two human action recognition datasets have been utilized, namely Weizmann and UCF. Results show that even with a number of visual challenges the proposed approach performs well.

Keywords: relevance feedback (RF), action retrieval, semantic gap, feature descriptor, codebook

Procedia PDF Downloads 453
10178 Active Flutter Suppression of Sports Aircraft Tailplane by Supplementary Control Surface

Authors: Aleš Kratochvíl, Svatomír Slavík

Abstract:

The paper presents an aircraft flutter suppression by active damping of supplementary control surface at trailing edge. The mathematical model of thin oscillation airfoil with control surface driven by pilot is developed. The supplementary control surface driven by control law is added. Active damping of flutter by several control law is present. The structural model of tailplane with an aerodynamic strip theory based on the airfoil model is developed by a finite element method. The optimization process of stiffens parameters is carried out to match the structural model with results from a ground vibration test of a small sport airplane. The implementation of supplementary control surface driven by control law is present. The active damping of tailplane model is shown.

Keywords: active damping, finite element method, flutter, tailplane model

Procedia PDF Downloads 278
10177 Role-Governed Categorization and Category Learning as a Result from Structural Alignment: The RoleMap Model

Authors: Yolina A. Petrova, Georgi I. Petkov

Abstract:

The paper presents a symbolic model for category learning and categorization (called RoleMap). Unlike the other models which implement learning in a separate working mode, role-governed category learning and categorization emerge in RoleMap while it does its usual reasoning. The model is based on several basic mechanisms known as reflecting the sub-processes of analogy-making. It steps on the assumption that in their everyday life people constantly compare what they experience and what they know. Various commonalities between the incoming information (current experience) and the stored one (long-term memory) emerge from those comparisons. Some of those commonalities are considered to be highly important, and they are transformed into concepts for further use. This process denotes the category learning. When there is missing knowledge in the incoming information (i.e. the perceived object is still not recognized), the model makes anticipations about what is missing, based on the similar episodes from its long-term memory. Various such anticipations may emerge for different reasons. However, with time only one of them wins and is transformed into a category member. This process denotes the act of categorization.

Keywords: analogy-making, categorization, category learning, cognitive modeling, role-governed categories

Procedia PDF Downloads 130
10176 Affects Associations Analysis in Emergency Situations

Authors: Joanna Grzybowska, Magdalena Igras, Mariusz Ziółko

Abstract:

Association rule learning is an approach for discovering interesting relationships in large databases. The analysis of relations, invisible at first glance, is a source of new knowledge which can be subsequently used for prediction. We used this data mining technique (which is an automatic and objective method) to learn about interesting affects associations in a corpus of emergency phone calls. We also made an attempt to match revealed rules with their possible situational context. The corpus was collected and subjectively annotated by two researchers. Each of 3306 recordings contains information on emotion: (1) type (sadness, weariness, anxiety, surprise, stress, anger, frustration, calm, relief, compassion, contentment, amusement, joy) (2) valence (negative, neutral, or positive) (3) intensity (low, typical, alternating, high). Also, additional information, that is a clue to speaker’s emotional state, was annotated: speech rate (slow, normal, fast), characteristic vocabulary (filled pauses, repeated words) and conversation style (normal, chaotic). Exponentially many rules can be extracted from a set of items (an item is a previously annotated single information). To generate the rules in the form of an implication X → Y (where X and Y are frequent k-itemsets) the Apriori algorithm was used - it avoids performing needless computations. Then, two basic measures (Support and Confidence) and several additional symmetric and asymmetric objective measures (e.g. Laplace, Conviction, Interest Factor, Cosine, correlation coefficient) were calculated for each rule. Each applied interestingness measure revealed different rules - we selected some top rules for each measure. Owing to the specificity of the corpus (emergency situations), most of the strong rules contain only negative emotions. There are though strong rules including neutral or even positive emotions. Three examples of the strongest rules are: {sadness} → {anxiety}; {sadness, weariness, stress, frustration} → {anger}; {compassion} → {sadness}. Association rule learning revealed the strongest configurations of affects (as well as configurations of affects with affect-related information) in our emergency phone calls corpus. The acquired knowledge can be used for prediction to fulfill the emotional profile of a new caller. Furthermore, a rule-related possible context analysis may be a clue to the situation a caller is in.

Keywords: data mining, emergency phone calls, emotional profiles, rules

Procedia PDF Downloads 396
10175 Research on Routing Protocol in Ship Dynamic Positioning Based on WSN Clustering Data Fusion System

Authors: Zhou Mo, Dennis Chow

Abstract:

In the dynamic positioning system (DPS) for vessels, the reliable information transmission between each note basically relies on the wireless protocols. From the perspective of cluster-based routing pro-tocols for wireless sensor networks, the data fusion technology based on the sleep scheduling mechanism and remaining energy in network layer is proposed, which applies the sleep scheduling mechanism to the routing protocols, considering the remaining energy of node and location information when selecting cluster-head. The problem of uneven distribution of nodes in each cluster is solved by the Equilibrium. At the same time, Classified Forwarding Mechanism as well as Redelivery Policy strategy is adopted to avoid congestion in the transmission of huge amount of data, reduce the delay in data delivery and enhance the real-time response. In this paper, a simulation test is conducted to improve the routing protocols, which turns out to reduce the energy consumption of nodes and increase the efficiency of data delivery.

Keywords: DPS for vessel, wireless sensor network, data fusion, routing protocols

Procedia PDF Downloads 433
10174 Machine Learning in Momentum Strategies

Authors: Yi-Min Lan, Hung-Wen Cheng, Hsuan-Ling Chang, Jou-Ping Yu

Abstract:

The study applies machine learning models to construct momentum strategies and utilizes the information coefficient as an indicator for selecting stocks with strong and weak momentum characteristics. Through this approach, the study has built investment portfolios capable of generating superior returns and conducted a thorough analysis. Compared to existing research on momentum strategies, machine learning is incorporated to capture non-linear interactions. This approach enhances the conventional stock selection process, which is often impeded by difficulties associated with timeliness, accuracy, and efficiency due to market risk factors. The study finds that implementing bidirectional momentum strategies outperforms unidirectional ones, and momentum factors with longer observation periods exhibit stronger correlations with returns. Optimizing the number of stocks in the portfolio while staying within a certain threshold leads to the highest level of excess returns. The study presents a novel framework for momentum strategies that enhances and improves the operational aspects of asset management. By introducing innovative financial technology applications to traditional investment strategies, this paper can demonstrate significant effectiveness.

Keywords: information coefficient, machine learning, momentum, portfolio, return prediction

Procedia PDF Downloads 40
10173 Factors Influencing University Students' Online Disinhibition Behavior: The Moderating Effects of Deterrence and Social Identity

Authors: Wang, Kuei-Ing, Jou-Fan Shih

Abstract:

This study adopts deterrence theory as well as social identities as moderators, and explores their moderating affects on online toxic disinhibition. Survey and Experimental methodologies are applied to test the research model and four hypotheses are developed in this study. The controllability of identity positively influenced the behavior of toxic disinhibition both in experimental and control groups while the fluidity of the identity did not have significant influences on online disinhibition. Punishment certainty, punishment severity as well as social identity negatively moderated the relation between the controllability of the identity and the toxic disinhibition. The result of this study shows that internet users hide their real identities when they behave inappropriately on internet, but once they acknowledge that the inappropriate behavior will be found and punished severely, the inappropriate behavior then will be weakened.

Keywords: seductive properties of internet, online disinhibition, punishment certainty, punishment severity, social identity

Procedia PDF Downloads 498
10172 Sexual Consent: Exploring the Perceptions of Heterosexual, Gay, and Bisexual Men

Authors: Shulamit Sternin, Raymond M. McKie, Carter Winberg, Robb N. Travers, Terry P. Humphreys, Elke D. Reissing

Abstract:

Issues surrounding sexual consent negotiation have become a major topic of societal concern. The majority of current research focuses on the complexities of sexual consent negotiations and the multitude of nuanced issues that surround the consent obtainment of heterosexual adults in post-secondary educational institutions. To date, the only study that has addressed sexual consent negotiation behaviour in same-sex relationships focused on the extent to which individuals used a variety of different verbal and nonverbal sexual consent behaviours to initiate or respond to sexual activity. The results were consistent with trends found within heterosexual individuals; thus, suggesting that the current understanding of sexual consent negotiation, which is grounded in heterosexual research, can serve as a strong foundation for further exploration of sexual consent negotiation within same-sex relationships populations. The current study quantitatively investigated the differences between heterosexual men and gay and bisexual men (GBM) in their understanding of sexual consent negotiation. Exploring how the perceptions of GBM differ from heterosexual males provides insight into some of the unique challenges faced by GBM. Data were collected from a sample of 252 heterosexual men and 314 GBM from Canada, the United States, and Western Europe. Participants responded to the question, 'do you think sexual consent and sex negotiation is different for heterosexual men compared to gay men? If so, how?' by completed an online survey. Responses were analysed following Braun & Clarke’s (2006) six phase thematic analysis guidelines. Inter-rater coding was validated using Cohen’s Kappa value and was calculated at (ϰ = 0.84), indicating a very strong level of agreement between raters. The final thematic structure yielded four major themes: understanding of sexual interaction, unique challenges, scripted role, and universal consent. Respondents spoke to their understanding of sexual interaction, believing GBM sexual consent negotiation to be faster and more immediate. This was linked to perceptions of emotional attachment and the idea that sexual interaction and emotional involvement were distinct and separate processes in GBM sexual consent negotiation, not believed to be the case in heterosexual interactions. Unique challenges such as different protection concerns, role declaration, and sexualization of spaces were understood to hold differing levels of consideration for heterosexual men and GBM. The perception of a clearly defined sexual script for GBM was suggested as a factor that may create ambiguity surrounding sexual consent negotiation, which in turn holds significant implications on unwanted sexual experiences for GBM. Broadening the scope of the current understanding of sexual consent negotiation by focusing on heterosexual and GBM population, the current study has revealed variations in perception of sexual consent negotiation between these two populations. These differences may be understood within the context of sexual scripting theory and masculinity gender role theory. We suggest that sexual consent negotiation is a health risk factor for GBM that has not yet been adequately understood and addressed. Awareness of the perceptions that surround the sexual consent negotiation of both GBM and heterosexual men holds implications on public knowledge, which in turn can better inform policy making, education, future research, and clinical treatment.

Keywords: sexual consent, negotiation, heterosexual men, GBM, sexual script

Procedia PDF Downloads 186
10171 HBTOnto: An Ontology Model for Analyzing Human Behavior Trajectories

Authors: Heba M. Wagih, Hoda M. O. Mokhtar

Abstract:

Social Network has recently played a significant role in both scientific and social communities. The growing adoption of social network applications has been a relevant source of information nowadays. Due to its popularity, several research trends are emerged to service the huge volume of users including, Location-Based Social Networks (LBSN), Recommendation Systems, Sentiment Analysis Applications, and many others. LBSNs applications are among the highly demanded applications that do not focus only on analyzing the spatiotemporal positions in a given raw trajectory but also on understanding the semantics behind the dynamics of the moving object. LBSNs are possible means of predicting human mobility based on users social ties as well as their spatial preferences. LBSNs rely on the efficient representation of users’ trajectories. Hence, traditional raw trajectory information is no longer convenient. In our research, we focus on studying human behavior trajectory which is the major pillar in location recommendation systems. In this paper, we propose an ontology design patterns with their underlying description logics to efficiently annotate human behavior trajectories.

Keywords: human behavior trajectory, location-based social network, ontology, social network

Procedia PDF Downloads 438
10170 Local Spectrum Feature Extraction for Face Recognition

Authors: Muhammad Imran Ahmad, Ruzelita Ngadiran, Mohd Nazrin Md Isa, Nor Ashidi Mat Isa, Mohd ZaizuIlyas, Raja Abdullah Raja Ahmad, Said Amirul Anwar Ab Hamid, Muzammil Jusoh

Abstract:

This paper presents two technique, local feature extraction using image spectrum and low frequency spectrum modelling using GMM to capture the underlying statistical information to improve the performance of face recognition system. Local spectrum features are extracted using overlap sub block window that are mapping on the face image. For each of this block, spatial domain is transformed to frequency domain using DFT. A low frequency coefficient is preserved by discarding high frequency coefficients by applying rectangular mask on the spectrum of the facial image. Low frequency information is non Gaussian in the feature space and by using combination of several Gaussian function that has different statistical properties, the best feature representation can be model using probability density function. The recognition process is performed using maximum likelihood value computed using pre-calculate GMM components. The method is tested using FERET data sets and is able to achieved 92% recognition rates.

Keywords: local features modelling, face recognition system, Gaussian mixture models, Feret

Procedia PDF Downloads 646
10169 Assessment of the Contribution of Geographic Information System Technology in Non Revenue Water: Case Study Dar Es Salaam Water and Sewerage Authority Kawe - Mzimuni Street

Authors: Victor Pesco Kassa

Abstract:

This research deals with the assessment of the contribution of GIS Technology in NRW. This research was conducted at Dar, Kawe Mzimuni Street. The data collection was obtained from existing source which is DAWASA HQ. The interpretation of the data was processed by using ArcGIS software. The data collected from the existing source reveals a good coverage of DAWASA’s water network at Mzimuni Street. Most of residents are connected to the DAWASA’s customer service. Also the collected data revealed that by using GIS DAWASA’s customer Geodatabase has been improved. Through GIS we can prepare customer location map purposely for site surveying also this map will be able to show different type of customer that are connected to DAWASA’s water service. This is a perfect contribution of the GIS Technology to address and manage the problem of NRW in DAWASA. Finally, the study recommends that the same study should be conducted in other DAWASA’s zones such as Temeke, Boko and Bagamoyo not only at Kawe Mzimuni Street. Through this study it is observed that ArcGIS software can offer powerful tools for managing and processing information geographically and in water and sanitation authorities such as DAWASA.

Keywords: DAWASA, NRW, Esri, EURA, ArcGIS

Procedia PDF Downloads 70
10168 Deepnic, A Method to Transform Each Variable into Image for Deep Learning

Authors: Nguyen J. M., Lucas G., Brunner M., Ruan S., Antonioli D.

Abstract:

Deep learning based on convolutional neural networks (CNN) is a very powerful technique for classifying information from an image. We propose a new method, DeepNic, to transform each variable of a tabular dataset into an image where each pixel represents a set of conditions that allow the variable to make an error-free prediction. The contrast of each pixel is proportional to its prediction performance and the color of each pixel corresponds to a sub-family of NICs. NICs are probabilities that depend on the number of inputs to each neuron and the range of coefficients of the inputs. Each variable can therefore be expressed as a function of a matrix of 2 vectors corresponding to an image whose pixels express predictive capabilities. Our objective is to transform each variable of tabular data into images into an image that can be analysed by CNNs, unlike other methods which use all the variables to construct an image. We analyse the NIC information of each variable and express it as a function of the number of neurons and the range of coefficients used. The predictive value and the category of the NIC are expressed by the contrast and the color of the pixel. We have developed a pipeline to implement this technology and have successfully applied it to genomic expressions on an Affymetrix chip.

Keywords: tabular data, deep learning, perfect trees, NICS

Procedia PDF Downloads 73
10167 Effective Width of Reinforced Concrete U-Shaped Walls Due to Shear Lag Effects

Authors: Ryan D. Hoult

Abstract:

The inherent assumption in the elementary theory of bending that plane sections remain plane is commonly used in the design of reinforced concrete members. However, in reality, a shear flow would develop in non-rectangular sections, where the longitudinal strains in between the web and flanges of the element would lag behind those at the boundary ends. This phenomenon, known as shear lag, can significantly reduce the expected moment capacity of non-rectangular reinforced concrete walls. This study focuses on shear lag effects in reinforced concrete U-shaped walls, which are commonly used as lateral load resisting elements in reinforced concrete buildings. An extensive number of finite element modelling analyses are conducted to estimate the vertical strain distributions across the web and flanges of a U-shaped wall with different axial load ratios and longitudinal reinforcement detailing. The results show that shear lag effects are prominent and sometimes significant in U-shaped walls, particularly for the wall sections perpendicular to the direction of loading.

Keywords: shear lag, walls, U-shaped, moment-curvature

Procedia PDF Downloads 188
10166 Ambient Notifications and the Interruption Effect

Authors: Trapond Hiransalee

Abstract:

The technology of mobile devices has changed our daily lives. Since smartphone have become a multi-functional device, many people spend unnecessary time on them, and could be interrupted by inappropriate notifications such as unimportant messages from social media. Notifications from smartphone could draw people’s attention and distract them from their priorities and current tasks. This research investigated that if the users were notified by their surroundings instead of smartphone, would it create less distraction and keep their focus on the present task. The experiment was a simulation of a lamp and door notification. Notifications related to work will be embedded in the lamp such as an email from a colleague. A notification that is useful when going outside such as weather information, traffic information, and schedule reminder will be embedded in the door. The experiment was conducted by sending notifications to the participant while he or she was working on a primary task and the working performance was measured. The results show that the lamp notification had fewer interruption effects than the smartphone. For the door notification, it was simulated in order to gain opinions and insights on ambient notifications from participants. Many participants agreed that the ambient notifications are useful and being informed by them could lessen the usage of their smartphone. The results and insights from this research could be used to guide the design process of ambient notifications.

Keywords: HCI, interaction, interaction design, usability testing

Procedia PDF Downloads 393
10165 Conceptualizing Creative Leadership and Collaborative School Culture

Authors: Zaidatol Akmaliah Lope Pihi, Suhaida Abd. Kadir, Keetanjaly Arivayagan

Abstract:

Lately in educational organization, voluminous studies accentuate the momentous of leadership in mobilizing creativity. Creativity skill is seen as one of the important skills required for the 21st century leadership, which is also known as the tool for creative leader’s mind in engaging and stimulating ideas to execute outcomes. Hence, leaders should create an opportunity by involving every employee and stakeholders in schools to contribute their ideas towards developing creative solutions to enhance school productivity. The focal point of this article is to offer a conceptual framework on creative leadership practices among school leaders towards collaborative school culture. Intensive reviews of literature will be used in the fields of creative leadership and school culture with the aim to nurture leaders into better leaders and encourage collaborative school culture. The framework contributes a new shed on the implication of creative leadership practices and collaborative school culture. It also will contribute a new theory development and offered suggestions for follow up research.

Keywords: 21st century leadership, creative leadership, collaborative, school culture

Procedia PDF Downloads 376
10164 Small Entrepreneurs as Creators of Chaos: Increasing Returns Requires Scaling

Authors: M. B. Neace, Xin GAo

Abstract:

Small entrepreneurs are ubiquitous. Regardless of location their success depends on several behavioral characteristics and several market conditions. In this concept paper, we extend this paradigm to include elements from the science of chaos. Our observations, research findings, literature search and intuition lead us to the proposition that all entrepreneurs seek increasing returns, as did the many small entrepreneurs we have interviewed over the years. There will be a few whose initial perturbations may create tsunami-like waves of increasing returns over time resulting in very large market consequences–the butterfly impact. When small entrepreneurs perturb the market-place and their initial efforts take root a series of phase-space transitions begin to occur. They sustain the stream of increasing returns by scaling up. Chaos theory contributes to our understanding of this phenomenon. Sustaining and nourishing increasing returns of small entrepreneurs as complex adaptive systems requires scaling. In this paper we focus on the most critical element of the small entrepreneur scaling process–the mindset of the owner-operator.

Keywords: entrepreneur, increasing returns, scaling, chaos

Procedia PDF Downloads 444
10163 Generalized Rough Sets Applied to Graphs Related to Urban Problems

Authors: Mihai Rebenciuc, Simona Mihaela Bibic

Abstract:

Branch of modern mathematics, graphs represent instruments for optimization and solving practical applications in various fields such as economic networks, engineering, network optimization, the geometry of social action, generally, complex systems including contemporary urban problems (path or transport efficiencies, biourbanism, & c.). In this paper is studied the interconnection of some urban network, which can lead to a simulation problem of a digraph through another digraph. The simulation is made univoc or more general multivoc. The concepts of fragment and atom are very useful in the study of connectivity in the digraph that is simulation - including an alternative evaluation of k- connectivity. Rough set approach in (bi)digraph which is proposed in premier in this paper contribute to improved significantly the evaluation of k-connectivity. This rough set approach is based on generalized rough sets - basic facts are presented in this paper.

Keywords: (bi)digraphs, rough set theory, systems of interacting agents, complex systems

Procedia PDF Downloads 230
10162 The Arabian Financial Framework in the Pre-Islamic Times: Do We Need a New Paradigm

Authors: Fahad Ahmed Qureshi

Abstract:

There were abundant renowned financial markets in Pre-Islamic Arabs. Most of those were patterned and settled during pre-particularized sunshine. Those markets were classified either as vernacular markets helping the neighboring clans, or habitual markets that people sojourned to from all articulations of the Arabian Peninsula, such as Okaz near Mecca. Some of those markets had leading significance due to their geographical positions, such as Prime market of Eden, because of their entanglement in international trade i.e. with the markets of Sub-Continent, Abyssinia, Persia and China. Other markets such as Market of Yamamah annex its gist from being situated on the caravan crossroads. Islamic worldview and Islamic epistemology base of Financial Market’s realistic theory, pragmatic model and operative approach is moderately constrained in terms of its growth. The existent situation only parasol the form of accommodative-modification and splendid-methodologies, which due to depleted and decorous endeavor in explaining Islamic financial market theoretically. This is the demand of time that particular studies should be conduct to magnify the devours in developing theoretical framework for Islamic Financial Market.

Keywords: Islam, financial market, history, research, product development

Procedia PDF Downloads 396
10161 Reading Knowledge Development and Its Phases with Generation Z

Authors: Onur Özdemir, M.Erhan ORHAN

Abstract:

Knowledge Development (KD) is just one of the important phases of Knowledge Management (KM). KD is the phase in which intelligence is used to see the big picture. In order to understand whether information is important or not, we have to use the intelligence cycle that includes four main steps: aiming, collecting data, processing and utilizing. KD also needs these steps. To make a precise decision, the decision maker has to be aware of his subordinates’ ideas. If the decision maker ignores the ideas of his subordinates or participants of the organization, it is not possible for him to get the target. KD is a way of using wisdom to accumulate the puzzle. If the decision maker does not bring together the puzzle pieces, he cannot get the big picture, and this shows its effects on the battlefield. In order to understand the battlefield, the decision maker has to use the intelligence cycle. To convert information to knowledge, KD is the main means for the intelligence cycle. On the other hand, the “Z Generation” born after the millennium are really the game changers. They have different attitudes from their elders. Their understanding of life is different - the definition of freedom and independence have different meanings to them than others. Decision makers have to consider these factors and rethink their decisions accordingly. This article tries to explain the relation between KD and Generation Z. KD is the main method of target managing. But if leaders neglect their people, the world will be seeing much more movements like the Arab Spring and other insurgencies.

Keywords: knowledge development, knowledge management, generation Z, intelligence cycle

Procedia PDF Downloads 501
10160 Behavioral Analysis of Anomalies in Intertemporal Choices Through the Concept of Impatience and Customized Strategies for Four Behavioral Investor Profiles With an Application of the Analytic Hierarchy Process: A Case Study

Authors: Roberta Martino, Viviana Ventre

Abstract:

The Discounted Utility Model is the essential reference for calculating the utility of intertemporal prospects. According to this model, the value assigned to an outcome is the smaller the greater the distance between the moment in which the choice is made and the instant in which the outcome is perceived. This diminution determines the intertemporal preferences of the individual, the psychological significance of which is encapsulated in the discount rate. The classic model provides a discount rate of linear or exponential nature, necessary for temporally consistent preferences. Empirical evidence, however, has proven that individuals apply discount rates with a hyperbolic nature generating the phenomenon of intemporal inconsistency. What this means is that individuals have difficulty managing their money and future. Behavioral finance, which analyzes the investor's attitude through cognitive psychology, has made it possible to understand that beyond individual financial competence, there are factors that condition choices because they alter the decision-making process: behavioral bias. Since such cognitive biases are inevitable, to improve the quality of choices, research has focused on a personalized approach to strategies that combines behavioral finance with personality theory. From the considerations, it emerges the need to find a procedure to construct the personalized strategies that consider the personal characteristics of the client, such as age or gender, and his personality. The work is developed in three parts. The first part discusses and investigates the weight of the degree of impatience and impatience decrease in the anomalies of the discounted utility model. Specifically, the degree of decrease in impatience quantifies the impact that emotional factors generated by haste and financial market agitation have on decision making. The second part considers the relationship between decision making and personality theory. Specifically, four behavioral categories associated with four categories of behavioral investors are considered. This association allows us to interpret intertemporal choice as a combination of bias and temperament. The third part of the paper presents a method for constructing personalized strategies using Analytic Hierarchy Process. Briefly: the first level of the analytic hierarchy process considers the goal of the strategic plan; the second level considers the four temperaments; the third level compares the temperaments with the anomalies of the discounted utility model; and the fourth level contains the different possible alternatives to be selected. The weights of the hierarchy between level 2 and level 3 are constructed considering the degrees of decrease in impatience derived for each temperament with an experimental phase. The results obtained confirm the relationship between temperaments and anomalies through the degree of decrease in impatience and highlight that the actual impact of emotions in decision making. Moreover, it proposes an original and useful way to improve financial advice. Inclusion of additional levels in the Analytic Hierarchy Process can further improve strategic personalization.

Keywords: analytic hierarchy process, behavioral finance anomalies, intertemporal choice, personalized strategies

Procedia PDF Downloads 80
10159 Prediction Study of the Structural, Elastic and Electronic Properties of the Parent and Martensitic Phases of Nonferrous Ti, Zr, and Hf Pure Metals

Authors: Tayeb Chihi, Messaoud Fatmi

Abstract:

We present calculations of the structural, elastic and electronic properties of nonferrous Ti, Zr, and Hf pure metals in both parent and martensite phases in bcc and hcp structures respectively. They are based on the generalized gradient approximation (GGA) within the density functional theory (DFT). The shear modulus, Young's modulus and Poisson's ratio for Ti, Zr, and Hf metals have were calculated and compared with the corresponding experimental values. Using elastic constants obtained from calculations GGA, the bulk modulus along the crystallographic axes of single crystals was calculated. This is in good agreement with experiment for Ti and Zr, whereas the hcp structure for Hf is a prediction. At zero temperature and zero pressure, the bcc crystal structure is found to be mechanically unstable for Ti, Zr, and Hf. In our calculations the hcp structures is correctly found to be stable at the equilibrium volume. In the electronic density of states (DOS), the smaller n(EF) is, the more stable the compound is. Therefore, in agreement with the results obtained from the total energy minimum.

Keywords: Ti, Zr, Hf, pure metals, transformation, energy

Procedia PDF Downloads 337
10158 Management Competency in Logistical Function: The Skills That Will Master a Logistical Manager

Authors: Fatima Ibnchahid

Abstract:

Competence approach is considered, since the early 80's as one of the major development of HR policies. Many approaches to manage the professional skills were declined. Some processes are mature whereas the others have been abandoned. Competence can be defined as the set of knowledge (theoretical and practical), know-how (experience) and life skills (personality traits) mobilized by a person in the company. The skills must master a logistics manager are divided into two main categories: depending on whether technical skills, or managerial skills and human. The firsts are broken down into skills on logistical techniques and on general skills in business, seconds in social skills (self with others) and personal (with oneself). Logisticians are faced with new challenges and new constraints that are revolutionizing the way to treat the physical movement of goods and operations related to information flows that trigger, they control and guide the physical movements of these major changes, we can mention the development of information technology and communication, the emergence of strong environmental and security constraints. These changes have important effects on the skills needs of the members of the logistical function and sensitive development for training requested by logistical managers to perform better in their job changes. In this article, we will address two main points, first, a brief overview of the management skills and secondly answer the question asked in the title of the article to know what are the skills that will master a logistical manager.

Keywords: skills, competence, management, logistical function

Procedia PDF Downloads 261
10157 Responsibility Attitude and Interpretation in Obsessive-Compulsive Disorder

Authors: Ryotaro Ishikawa

Abstract:

Obsessive-Compulsive Disorder (OCD) is a common, chronic and long-lasting disorder in which a person has uncontrollable, reoccurring thoughts (obsessions) and behaviors (compulsions) that he or she feels the urge to repeat over and over. Inflated responsibility attitude and interpretation are central beliefs in a cognitive model of OCD. This study aimed to develop a Japanese version of the Responsibility Attitude Scale (RAS-J) and Responsibility Interpretation Questionnaire (RIQ-J). 98 participants (OCD group = 37; anxiety control group = 24; healthy control group = 37) completed the RAS-J, RIQ-J and other measures to assess the validity of the RAS-J and RIQ-J. As a result of analysis, both scales had adequate concurrent validity, demonstrated by significant correlations with other measures of OCD, anxiety, and depression. Group comparison data using ANOVA with Bonferroni method indicated that RAS-J and RIQ-J scores for the OCD group not only differed from the nonclinical group, but also from the clinically anxious comparison group. In conclusion, this study indicated that the developed RAS-J and RIQ-J effectively measure responsibility attitude and responsibility interpretation in the Japanese population.

Keywords: obsessive-compulsive disorder, responsibility, cognitive theory, anxiety disorder

Procedia PDF Downloads 264
10156 Oath Taking-An Approach to Combating Criminality: Challenges and Implication to the Victim Centered Approach in Human Trafficking

Authors: Faith G. Ehiemua, Chandra E. Ulinfun

Abstract:

This work presents two approaches that use competing models to combat criminality in human trafficking. It argues that oath-taking is an approach used to combat and repress crime by natives of African descent. Therefore, certain value choices reflected explicitly or implicitly in its habitual functioning are features of crime control, a model of the criminal process used to repress and prevent crime. By pitting the approaches against each other, the work examines the utility of the purpose of each approach with the aim of assessing moral worthiness. The approaches adopted are descriptive, normative, and theoretical. The findings reveal that oath-taking is effective in human trafficking mainly because Africans believe that the African traditional system is efficient. However, the utilitarian ethical theory applied to the use of oath-taking in human trafficking shows oath-taking as protecting the interest of human traffickers against the general good of society.

Keywords: human rights, human trafficking, oath taking, utilitarianism, victim-centered approach

Procedia PDF Downloads 184
10155 Social Media Mining with R. Twitter Analyses

Authors: Diana Codat

Abstract:

Tweets' analysis is part of text mining. Each document is a written text. It's possible to apply the usual text search techniques, in particular by switching to the bag-of-words representation. But the tweets induce peculiarities. Some may enrich the analysis. Thus, their length is calibrated (at least as far as public messages are concerned), special characters make it possible to identify authors (@) and themes (#), the tweet and retweet mechanisms make it possible to follow the diffusion of the information. Conversely, other characteristics may disrupt the analyzes. Because space is limited, authors often use abbreviations, emoticons to express feelings, and they do not pay much attention to spelling. All this creates noise that can complicate the task. The tweets carry a lot of potentially interesting information. Their exploitation is one of the main axes of the analysis of the social networks. We show how to access Twitter-related messages. We will initiate a study of the properties of the tweets, and we will follow up on the exploitation of the content of the messages. We will work under R with the package 'twitteR'. The study of tweets is a strong focus of analysis of social networks because Twitter has become an important vector of communication. This example shows that it is easy to initiate an analysis from data extracted directly online. The data preparation phase is of great importance.

Keywords: data mining, language R, social networks, Twitter

Procedia PDF Downloads 162
10154 The Effects of Self-Efficacy on Life Satisfaction

Authors: Gao ya

Abstract:

This present study aims to find the relationship between self-efficacy and life satisfaction and the effects of self-efficacy on life satisfaction among Chinese people whose age is from 27-32, born between 1990 and 1995. People who were born between 1990 and 1995 are worthy to receive more attention now because the 90s was always received a lot of focus and labeled negatively as soon as they were born. And a large number of researches study people in individualism society more. So we chose the specific population whose age is from 27 to 32 live in a collectivist society. Demographic information was collected, including age, gender, education level, marital status, income level, number of children. We used the general self-efficacy scale(GSC) and the satisfaction with Life Scale(SLS) to collect data. A total of 350 questionnaires were distributed in and collected from mainland China, then 261 valid questionnaires were returned in the end, making a response rate of 74.57 percent. Some statistics techniques were used, like regression, correlation, ANOVA, T-test and general linear model, to measure variables. The findings were that self-efficacy positively related to life satisfaction. And self-efficacy influences life satisfaction significantly. At the same time, the relationship between demographic information and life satisfaction was analyzed.

Keywords: marital status, life satisfaction, number of children, self-efficacy, income level

Procedia PDF Downloads 109