Search results for: Information communication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13202

Search results for: Information communication

8582 MIMIC: A Multi Input Micro-Influencers Classifier

Authors: Simone Leonardi, Luca Ardito

Abstract:

Micro-influencers are effective elements in the marketing strategies of companies and institutions because of their capability to create an hyper-engaged audience around a specific topic of interest. In recent years, many scientific approaches and commercial tools have handled the task of detecting this type of social media users. These strategies adopt solutions ranging from rule based machine learning models to deep neural networks and graph analysis on text, images, and account information. This work compares the existing solutions and proposes an ensemble method to generalize them with different input data and social media platforms. The deployed solution combines deep learning models on unstructured data with statistical machine learning models on structured data. We retrieve both social media accounts information and multimedia posts on Twitter and Instagram. These data are mapped into feature vectors for an eXtreme Gradient Boosting (XGBoost) classifier. Sixty different topics have been analyzed to build a rule based gold standard dataset and to compare the performances of our approach against baseline classifiers. We prove the effectiveness of our work by comparing the accuracy, precision, recall, and f1 score of our model with different configurations and architectures. We obtained an accuracy of 0.91 with our best performing model.

Keywords: deep learning, gradient boosting, image processing, micro-influencers, NLP, social media

Procedia PDF Downloads 160
8581 Gender Cultural Scripts and Career Choices

Authors: Caroline Hoorn

Abstract:

Post-matriculants in disadvantaged communities such as Douglas encounter a number of career challenges. The transition to the democratic dispensation in 1994, coupled with the rapid changes in the information domain that are characteristic of post-industrial life, complicate the career development trajectories of disadvantaged youth. The career development stories and experiences of disadvantaged youth in provinces such as the Northern Cape have not been told, leading to their marginalisation. It is against this background that the study explored the gendered dimensions of career development narratives, experiences, and choices of post-matriculants in the Douglas community in the Northern Cape. Using a qualitative, narrative approach, the researcher elicited career development stories from 23 participants in Douglas using semi-structured interviews. Two main themes were highlighted through the narratives; (1) willingness to challenge the traditional male dominated career script (2) breaking gender barriers. The study showed that gender did not have any influence on the career choices of the post-matriculants. The perceptions around career choices and gender were being challenged partly by the urge to affirm equality and the constant reminder of the poverty-stricken conditions prevalent in the households. A preferred gender is not required to be attached to the fulfilment of outcomes in a knowledge-based economy. Thus, it is not an issue of gender or masculinity but knowledge and skills. Furthermore, the study revealed that the career choices being considered are still the traditionally stereotypical careers like nursing, teaching, and social work, which demonstrates a lack of information to a broader pool of career options to select from.

Keywords: career development, gender, narratives, post-matriculants

Procedia PDF Downloads 86
8580 Development of Visual Working Memory Precision: A Cross-Sectional Study of Simultaneously Delayed Responses Paradigm

Authors: Yao Fu, Xingli Zhang, Jiannong Shi

Abstract:

Visual working memory (VWM) capacity is the ability to maintain and manipulate short-term information which is not currently available. It is well known for its significance to form the basis of numerous cognitive abilities and its limitation in holding information. VWM span, the most popular measurable indicator, is found to reach the adult level (3-4 items) around 12-13 years’ old, while less is known about the precision development of the VWM capacity. By using simultaneously delayed responses paradigm, the present study investigates the development of VWM precision among 6-18-year-old children and young adults, besides its possible relationships with fluid intelligence and span. Results showed that precision and span both increased with age, and precision reached the maximum in 16-17 age-range. Moreover, when remembering 3 simultaneously presented items, the probability of remembering target item correlated with fluid intelligence and the probability of wrap errors (misbinding target and non-target items) correlated with age. When remembering more items, children had worse performance than adults due to their wrap errors. Compared to span, VWM precision was effective predictor of intelligence even after controlling for age. These results suggest that unlike VWM span, precision developed in a slow, yet longer fashion. Moreover, decreasing probability of wrap errors might be the main reason for the development of precision. Last, precision correlated more closely with intelligence than span in childhood and adolescence, which might be caused by the probability of remembering target item.

Keywords: fluid intelligence, precision, visual working memory, wrap errors

Procedia PDF Downloads 263
8579 Closed-Loop Supply Chain: A Study of Bullwhip Effect Using Simulation

Authors: Siddhartha Paul, Debabrata Das

Abstract:

Closed-loop supply chain (CLSC) management focuses on integrating forward and reverse flow of material as well as information to maximize value creation over the entire life-cycle of a product. Bullwhip effect in supply chain management refers to the phenomenon where a small variation in customers’ demand results in larger variation of orders at the upstream levels of supply chain. Since the quality and quantity of products returned to the collection centers (as a part of reverse logistics process) are uncertain, bullwhip effect is inevitable in CLSC. Therefore, in the present study, first, through an extensive literature survey, we identify all the important factors related to forward as well as reverse supply chain which causes bullwhip effect in CLSC. Second, we develop a system dynamics model to study the interrelationship among the factors and their effect on the performance of overall CLSC. Finally, the results of the simulation study suggest that demand forecasting, lead times, information sharing, inventory and work in progress adjustment rate, supply shortages, batch ordering, price variations, erratic human behavior, parameter correcting, delivery time delays, return rate of used products, manufacturing and remanufacturing capacity constraints are the important factors which have a significant influence on system’s performance, specifically on bullwhip effect in a CLSC.

Keywords: bullwhip effect, closed-loop supply chain, system dynamics, variance ratio

Procedia PDF Downloads 150
8578 Feature Based Unsupervised Intrusion Detection

Authors: Deeman Yousif Mahmood, Mohammed Abdullah Hussein

Abstract:

The goal of a network-based intrusion detection system is to classify activities of network traffics into two major categories: normal and attack (intrusive) activities. Nowadays, data mining and machine learning plays an important role in many sciences; including intrusion detection system (IDS) using both supervised and unsupervised techniques. However, one of the essential steps of data mining is feature selection that helps in improving the efficiency, performance and prediction rate of proposed approach. This paper applies unsupervised K-means clustering algorithm with information gain (IG) for feature selection and reduction to build a network intrusion detection system. For our experimental analysis, we have used the new NSL-KDD dataset, which is a modified dataset for KDDCup 1999 intrusion detection benchmark dataset. With a split of 60.0% for the training set and the remainder for the testing set, a 2 class classifications have been implemented (Normal, Attack). Weka framework which is a java based open source software consists of a collection of machine learning algorithms for data mining tasks has been used in the testing process. The experimental results show that the proposed approach is very accurate with low false positive rate and high true positive rate and it takes less learning time in comparison with using the full features of the dataset with the same algorithm.

Keywords: information gain (IG), intrusion detection system (IDS), k-means clustering, Weka

Procedia PDF Downloads 281
8577 The Influence of Teachers Anxiety-Reducing Strategies on Learners Foreign Language Anxiety

Authors: Fakieh Alrabai

Abstract:

This study investigated the effects on learner anxiety of anxiety-reducing strategies utilized by English as foreign language teachers in Saudi Arabia. The study was conducted in two stages. In the first stage, sources of foreign language anxiety for Saudi learners of English (N = 596) were identified using The Foreign Language Classroom Anxiety Scale (FLCAS). In the second stage, 465 learners who were divided almost equally into two groups (experimental vs. control) and 12 teachers were recruited. Anxiety-reducing strategies were implemented exclusively in the treatment group for approximately eight weeks. FLCAS was used to assess learners’ FL anxiety levels before and after treatment. Statistical analyses (e.g. ANOVA and ANCOVA) were used to evaluate the study findings. These findings revealed that the intervention led to significantly decreased levels of FL anxiety for learners in the experimental group compared with increased levels of anxiety for those in the control group.

Keywords: communication apprehension, EFL teaching/learning, fear of negative evaluation, foreign language anxiety

Procedia PDF Downloads 336
8576 Determinants of the Users Intention of Social-Local-Mobile Applications

Authors: Chia-Chen Chen, Mu-Yen Chen

Abstract:

In recent years, with the vigorous growth of hardware and software technologies of smart mobile devices coupling with the rapid increase of social network influence, mobile commerce also presents the commercial operation mode of the future mainstream. For the time being, SoLoMo has become one of the very popular commercial models, its full name and meaning mainly refer to that users can obtain three key service types through smart mobile devices (Mobile) and omnipresent network services, and then link to the social (Social) web site platform to obtain the information exchange, again collocating with position and situational awareness technology to get the service suitable for the location (Local), through anytime, anywhere and any personal use of different mobile devices to provide the service concept of seamless integration style, and more deriving infinite opportunities of the future. The study tries to explore the use intention of users with SoLoMo mobile application formula, proposing research model to integrate TAM, ISSM, IDT and network externality, and with questionnaires to collect data and analyze results to verify the hypothesis, results show that perceived ease-of-use (PEOU), perceived usefulness (PU), and network externality have significant impact on the use intention with SoLoMo mobile application formula, and the information quality, relative advantages and observability have impacts on the perceived usefulness, and further affecting the use intention.

Keywords: SoLoMo (social, local, and mobile), technology acceptance model, innovation diffusion theory, network externality

Procedia PDF Downloads 517
8575 Information Technology Approaches to Literature Text Analysis

Authors: Ayse Tarhan, Mustafa Ilkan, Mohammad Karimzadeh

Abstract:

Science was considered as part of philosophy in ancient Greece. By the nineteenth century, it was understood that philosophy was very inclusive and that social and human sciences such as literature, history, and psychology should be separated and perceived as an autonomous branch of science. The computer was also first seen as a tool of mathematical science. Over time, computer science has grown by encompassing every area in which technology exists, and its growth compelled the division of computer science into different disciplines, just as philosophy had been divided into different branches of science. Now there is almost no branch of science in which computers are not used. One of the newer autonomous disciplines of computer science is digital humanities, and one of the areas of digital humanities is literature. The material of literature is words, and thanks to the software tools created using computer programming languages, data that a literature researcher would need months to complete, can be achieved quickly and objectively. In this article, three different tools that literary researchers can use in their work will be introduced. These studies were created with the computer programming languages Python and R and brought to the world of literature. The purpose of introducing the aforementioned studies is to set an example for the development of special tools or programs on Ottoman language and literature in the future and to support such initiatives. The first example to be introduced is the Stylometry tool developed with the R language. The other is The Metrical Tool, which is used to measure data in poems and was developed with Python. The latest literature analysis tool in this article is Voyant Tools, which is a multifunctional and easy-to-use tool.

Keywords: DH, literature, information technologies, stylometry, the metrical tool, voyant tools

Procedia PDF Downloads 136
8574 Mastering the Paradox: Five Unexpected Qualities of Innovation Leaders

Authors: Murtuza Ali Lakhani, Michelle Marquard

Abstract:

Given the paradoxical nature of innovation, we propose that leaders of innovation-centered organizations need certain specific qualities focused on developing higher-order structures, fostering self-organization, and nurturing constructive dissonance and conciliation. Keeping in view the prolific literature on leadership and innovation, we carry out a quantitative study with data collected over a five-year period involving 31 leaders and 209 observers (direct reports, peers, and managers) from across five companies based in the United States. Rather than accepting, as some scholars and practitioners do, that leadership is all-encompassing, we argue that it is specific to a given context, e.g., innovation. We find that leadership is the locus of innovation and that leaders able to effectively lead the innovation agenda demonstrate five specific behaviors and characteristics, namely stewardship, communication, empowerment, creativity, and vision. We demonstrate that the alignment (or misalignment) between a leader’s “self view” and “other view” is a tell-tale sign of whether (or not) the leader’s organization will succeed at innovation. We propose a scale, iLeadership, and test it psychometrically for assessment of leaders and organizational units charged with innovation.

Keywords: innovation, leadership, innovation leadership, knowledge creation

Procedia PDF Downloads 458
8573 A Study in the Formation of a Term: Sahaba

Authors: Abdul Rahman Chamseddine

Abstract:

The Companions of the Prophet Muhammad, the Sahaba, are regarded as the first link between him and later believers who did not know him or learn from him directly. This makes the Sahaba a link in the chain between God and the ummah (community). Apart from their role in spreading the Prophet’s teachings, they came to be regarded as role models, representing the Islamic ideal of life as prescribed by the Prophet himself. According to Hadith, the Prophet had promised some Sahaba unqualified admission to paradise. It is commonly agreed that the Sahaba have the following attributes in common: God is well pleased with them; they will surely go to paradise; they are perfectly trustworthy; and they are the authorities from whom Muslims can learn all matters related to their religion. No other generation of Muslims has received the attention received by the Companions of the Prophet. In spite of the importance of the Sahaba in Islam, we still know comparatively little about them. There are at least two reasons for this. First, there is the overall scarcity of information surviving from the early period. At the death of the Prophet, it is said, there were more than 100,000 Companions. As we shall see, this is a complex issue, involving the definition of the term Sahaba. However, only few Companions of the Prophet are known to us. Ibn Hajar al-‘Asqalani, who wrote in the fifteenth century A.D., was only able to collect facts about 11,000 of them (including those whose status as Sahaba was disputed). Ibn Sa‘d, Ibn ‘Abd al-Barr and Ibn al-Athir, all of whom lived earlier than Ibn Hajar, included in their respective works fewer lives of Sahaba than he did. If we consider Ibn Hajar’s Isaba as the most complete biographical account of the Sahaba that remains available, we have information, presumably, on approximately one tenth of them. The remaining nine tenths are apparently lost from the historical record. Second, discussion of the Sahaba tends to focus on those considered the most important among them such as ‘Uthman, ‘Ali and Mu‘awiya, while others, who together number in the thousands, are less well-known. This paper will try to study the origins of the term Sahaba that became exclusive to the Companions of the Prophet and not a synonym of the word companions in general.

Keywords: companions, Hadith, Islamic history, Muhammad, Sahaba, transmission

Procedia PDF Downloads 404
8572 Recent Advances in Pulse Width Modulation Techniques and Multilevel Inverters

Authors: Satish Kumar Peddapelli

Abstract:

This paper presents advances in pulse width modulation techniques which refers to a method of carrying information on train of pulses and the information be encoded in the width of pulses. Pulse Width Modulation is used to control the inverter output voltage. This is done by exercising the control within the inverter itself by adjusting the ON and OFF periods of inverter. By fixing the DC input voltage we get AC output voltage. In variable speed AC motors the AC output voltage from a constant DC voltage is obtained by using inverter. Recent developments in power electronics and semiconductor technology have lead improvements in power electronic systems. Hence, different circuit configurations namely multilevel inverters have become popular and considerable interest by researcher are given on them. A fast Space-Vector Pulse Width Modulation (SVPWM) method for five-level inverter is also discussed. In this method, the space vector diagram of the five-level inverter is decomposed into six space vector diagrams of three-level inverters. In turn, each of these six space vector diagrams of three-level inverter is decomposed into six space vector diagrams of two-level inverters. After decomposition, all the remaining necessary procedures for the three-level SVPWM are done like conventional two-level inverter. The proposed method reduces the algorithm complexity and the execution time. It can be applied to the multilevel inverters above the five-level also. The experimental setup for three-level diode-clamped inverter is developed using TMS320LF2407 DSP controller and the experimental results are analysed.

Keywords: five-level inverter, space vector pulse wide modulation, diode clamped inverter, electrical engineering

Procedia PDF Downloads 376
8571 Safety Considerations of Furanics for Sustainable Applications in Advanced Biorefineries

Authors: Anitha Muralidhara, Victor Engelen, Christophe Len, Pascal Pandard, Guy Marlair

Abstract:

Production of bio-based chemicals and materials from lignocellulosic biomass is gaining tremendous importance in advanced bio-refineries while aiming towards progressive replacement of petroleum based chemicals in transportation fuels and commodity polymers. One such attempt has resulted in the production of key furan derivatives (FD) such as furfural, HMF, MMF etc., via acid catalyzed dehydration (ACD) of C6 and C5 sugars, which are further converted into key chemicals or intermediates (such as Furandicarboxylic acid, Furfuryl alcohol etc.,). In subsequent processes, many high potential FD are produced, that can be converted into high added value polymers or high energy density biofuels. During ACD, an unavoidable polyfuranic byproduct is generated which is called humins. The family of FD is very large with varying chemical structures and diverse physicochemical properties. Accordingly, the associated risk profiles may largely vary. Hazardous Material (Haz-mat) classification systems such as GHS (CLP in the EU) and the UN TDG Model Regulations for transport of dangerous goods are one of the preliminary requirements for all chemicals for their appropriate classification, labelling, packaging, safe storage, and transportation. Considering the growing application routes of FD, it becomes important to notice the limited access to safety related information (safety data sheets available only for famous compounds such as HMF, furfural etc.,) in these internationally recognized haz-mat classification systems. However, these classifications do not necessarily provide information about the extent of risk involved when the chemical is used in any specific application. Factors such as thermal stability, speed of combustion, chemical incompatibilities, etc., can equally influence the safety profile of a compound, that are clearly out of the scope of any haz-mat classification system. Irrespective of the bio-based origin, FD has so far received inconsistent remarks concerning their toxicity profiles. With such inconsistencies, there is a fear that, a large family of FD may also follow extreme judgmental scenarios like ionic liquids, by ranking some compounds as extremely thermally stable, non-flammable, etc., Unless clarified, these messages could lead to misleading judgements while ranking the chemical based on its hazard rating. Safety is a key aspect in any sustainable biorefinery operation/facility, which is often underscored or neglected. To fill up these existing data gaps and to address ambiguities and discrepancies, the current study focuses on giving preliminary insights on safety assessment of FD and their potential targeted by-products. With the available information in the literature and obtained experimental results, physicochemical safety, environmental safety as well as (a scenario based) fire safety profiles of key FD, as well as side streams such as humins and levulinic acid, will be considered. With this, the study focuses on defining patterns and trends that gives coherent safety related information for existing and newly synthesized FD in the market for better functionality and sustainable applications.

Keywords: furanics, humins, safety, thermal and fire hazard, toxicity

Procedia PDF Downloads 154
8570 Warfield Spying Robot Using LoRa

Authors: Madhavi T., Sireesha Sakhamuri, Hema Sri A., Harika K.

Abstract:

Today as technological advancements are taking place, these advancements are being used by the armed forces to reduce the risk of their losses and to defeat their enemies. The development of sophisticated technology relies mostly on the use of high- tech weapons or machinery. Robotics is one of the hot spheres of the modern age in which nations concentrate on the state of war and peace for military purposes. They have been in use for demining and rescue operations for some time now but are being propelled by using them for combat and spy missions. This project focuses on creating a LoRa-based spying robot with a wireless IP camera attached to it that can rising the human target. This robot transmits the signal via an IP camera to the base station. One of this project’s major applications can be analyzed using a PC that can be used to control the robot’s movement. The robot sends the signal through the LoRa transceiver at the base station to the LoRa transceiver mounted on the robot. With this function, the, robot can relay videos in real- time along with anti-collision capabilities and the enemies in the war zone cannot recognize them. More importantly, this project focuses on increasing communication using LoRa.

Keywords: lora, IP cam, metal detector, laser shoot

Procedia PDF Downloads 89
8569 Impact of Ethnic and Religious Identity on Coping Behavior in Young Adults: Cross-Cultural Research

Authors: Yuliya Kovalenko

Abstract:

Given the social nature of people, it is interesting to explore strategies of responding to psycho-traumatic situations in individuals of different ethnic and religious identity. This would allow to substantially expand the idea of human behavior in general, and coping behavior, in particular. This paper investigated the weighted impact of ethnic and religious identities on the patterns of coping behavior. This cross-cultural research empirically revealed intergroup differences in coping strategies and behavior in the samples of young students and teachers of different ethnic identities (Egyptians N=216 and Ukrainians N=109) and different religious identities (Egyptian Muslims N=147 and Christians, including Egyptian Christians N=68 and Ukrainian Christians N = 109). The empirical data were obtained using the questionnaires SACS and COPE. Statistical analysis and interpretation of the results were performed with IBM SPSS-23.0. It was found that, compared to the religious identity, the ethnic identity of the subjects appeared more predictive of coping behavior. It was shown that the constant exchange of information and the unity of biological and social contributed to a more homogeneous picture in the society where Christians and Muslims were integrated into a single cultural space. It was concluded that depending on their ethnic identity, individuals would form a specific hierarchy of coping strategies resulting in a specific pattern of coping with certain stressors. The Egyptian subjects revealed the following pattern of coping with various kinds of academic stress: 'seeking social support', 'problem solving', 'adapting', 'seeking information'. The coping pattern demonstrated by the Ukrainian subjects could be presented as 'seeking information', 'adapting', 'seeking social support', 'problem solving'. There was a tendency in the group of Egyptians to engage in more collectivist coping strategies (with the predominant coping strategy 'religious coping'), in contrast to the Ukrainians who displayed more individualistic coping strategies (with 'planning' and 'active coping' as the mostly used coping strategies). At the same time, it was obvious that Ukrainians should not be unambiguously attributed to the individualistic coping behavior due to their reliance on 'seeking social support' and 'social contact'. The final conclusion was also drawn from the peculiarities of developing religious identity, including religiosity, in Egyptians (formal religious education of both Muslims and Christians) and Ukrainians (more spontaneous process): Egyptians seem to learn to resort to the religious coping, which could be an indication that, in principle, it is possible and necessary to train individuals in desirable coping behavior.

Keywords: coping behavior, cross-cultural research, ethnic and religious identity, hierarchical pattern of coping

Procedia PDF Downloads 148
8568 Automated Prepaid Billing Subscription System

Authors: Adekunle K. O, Adeniyi A. E, Kolawole E

Abstract:

One of the most dramatic trends in the communications market in recent years has been the growth of prepaid services. Today, prepaid no longer constitutes the low-revenue, basic-service segment. It is driven by a high margin, value-add service customers who view it as a convenient way of retaining control over their usage and communication spending while expecting high service levels. To service providers, prepaid services offer the advantage of reducing bad accounts while allowing them to predict usage and plan network resources. Yet, the real-time demands of prepaid services require a scalable, real-time platform to manage customers through their entire life cycle. It delivers integrated real-time rating, voucher management, recharge management, customer care and service provisioning for the generation of new prepaid services. It carries high scalability that can handle millions of prepaid customers in real-time through their entire life cycle.

Keywords: prepaid billing, voucher management, customers, automated, security

Procedia PDF Downloads 95
8567 Design and Test a Robust Bearing-Only Target Motion Analysis Algorithm Based on Modified Gain Extended Kalman Filter

Authors: Mohammad Tarek Al Muallim, Ozhan Duzenli, Ceyhun Ilguy

Abstract:

Passive sonar is a method for detecting acoustic signals in the ocean. It detects the acoustic signals emanating from external sources. With passive sonar, we can determine the bearing of the target only, no information about the range of the target. Target Motion Analysis (TMA) is a process to estimate the position and speed of a target using passive sonar information. Since bearing is the only available information, the TMA technique called Bearing-only TMA. Many TMA techniques have been developed. However, until now, there is not a very effective method that could be used to always track an unknown target and extract its moving trace. In this work, a design of effective Bearing-only TMA Algorithm is done. The measured bearing angles are very noisy. Moreover, for multi-beam sonar, the measurements is quantized due to the sonar beam width. To deal with this, modified gain extended Kalman filter algorithm is used. The algorithm is fine-tuned, and many modules are added to improve the performance. A special validation gate module is used to insure stability of the algorithm. Many indicators of the performance and confidence level measurement are designed and tested. A new method to detect if the target is maneuvering is proposed. Moreover, a reactive optimal observer maneuver based on bearing measurements is proposed, which insure converging to the right solution all of the times. To test the performance of the proposed TMA algorithm a simulation is done with a MATLAB program. The simulator program tries to model a discrete scenario for an observer and a target. The simulator takes into consideration all the practical aspects of the problem such as a smooth transition in the speed, a circular turn of the ship, noisy measurements, and a quantized bearing measurement come for multi-beam sonar. The tests are done for a lot of given test scenarios. For all the tests, full tracking is achieved within 10 minutes with very little error. The range estimation error was less than 5%, speed error less than 5% and heading error less than 2 degree. For the online performance estimator, it is mostly aligned with the real performance. The range estimation confidence level gives a value equal to 90% when the range error less than 10%. The experiments show that the proposed TMA algorithm is very robust and has low estimation error. However, the converging time of the algorithm is needed to be improved.

Keywords: target motion analysis, Kalman filter, passive sonar, bearing-only tracking

Procedia PDF Downloads 381
8566 In-door Localization Algorithm and Appropriate Implementation Using Wireless Sensor Networks

Authors: Adeniran K. Ademuwagun, Alastair Allen

Abstract:

The relationship dependence between RSS and distance in an enclosed environment is an important consideration because it is a factor that can influence the reliability of any localization algorithm founded on RSS. Several algorithms effectively reduce the variance of RSS to improve localization or accuracy performance. Our proposed algorithm essentially avoids this pitfall and consequently, its high adaptability in the face of erratic radio signal. Using 3 anchors in close proximity of each other, we are able to establish that RSS can be used as reliable indicator for localization with an acceptable degree of accuracy. Inherent in this concept, is the ability for each prospective anchor to validate (guarantee) the position or the proximity of the other 2 anchors involved in the localization and vice versa. This procedure ensures that the uncertainties of radio signals due to multipath effects in enclosed environments are minimized. A major driver of this idea is the implicit topological relationship among sensors due to raw radio signal strength. The algorithm is an area based algorithm; however, it does not trade accuracy for precision (i.e the size of the returned area).

Keywords: anchor nodes, centroid algorithm, communication graph, radio signal strength

Procedia PDF Downloads 491
8565 Cyber Victimization: School Experience of Malaysian Cyberbullied Teenagers

Authors: Shireen Simon

Abstract:

Cyberbullying among schoolchildren and teenagers became a hot issue discussed by Malaysian society. Cyberbullying is a new age of bullying because it uses the modern digital technology intentionally to hurt and degrade someone in the cyber world. Cyberbullying is a problem affecting many teenagers as they embrace online communication and interaction whereby virtual world with no borders. By adopting a qualitative approach, this study has captured 8 cyberbullied victims’ school experience. Even years after leaving school, these 8 cyberbullied victims remember how it feels to be bullied in the cyber world. The principal investigator also tries to identify the possibility factors that contribute to cyberbullying among these 8 victims. The result shows that these victims were bullied differently in cyber world. This study not just primarily focuses on cyberbullying issues among schoolchildren and teenagers; it also addresses the motives and causes of cyberbullying. Lastly, this article will be served as guidance for school teachers, parents and teenagers to prepare to tackle cyberbullying together. Cyberbullying is no laughing matter in our community, and it is time to spread the seeds of peace inspires others to do the same.

Keywords: cyberbullying, cyber victimization, internet, school experience, teenagers

Procedia PDF Downloads 274
8564 Mobile Learning in Developing Countries: A Synthesis of the Past to Define the Future

Authors: Harriet Koshie Lamptey, Richard Boateng

Abstract:

Mobile learning (m-learning) is a novel approach to knowledge acquisition and dissemination and is gaining global attention. Steady progress in wireless technologies and the portability of communication devices continue to broaden the scope and use of mobiles. With the convergence of Web functionality onto mobile platforms and the affordability and availability of mobile technology, m-learning has the potential of being the next prevalent channel of education in both formal and informal settings. There is substantive literature on developed countries but the state in developing countries (DCs) however appears vague. This paper is a synthesis of extant literature on mobile learning in DCs. The research interest is based on the fact that in DCs, mobile communication and internet connectivity are popular. However, its use in education is under explored. There are some reviews on the state, conceptualizations, trends and teacher education, but to the authors’ knowledge, no study has focused on mobile learning adoption and integration issues. This study examines issues and gaps associated with its adoption and integration in DCs higher education institutions. A qualitative build-up of literature was conducted using articles pooled from electronic databases (Google Scholar and ERIC). To enable criteria for inclusion and incorporate diverse study perspectives, search terms used were m-learning, DCs, higher education institutions, challenges, benefits, impact, gaps and issues. The synthesis revealed that though mobile technology has diffused globally, its pedagogical pursuit in DCs remains quite low. The absence of a mobile Web and the difficulty of resource conversion into mobile format due to lack of funding and technical competence is a stumbling block. Again, the lack of established design and implementation rules to guide the development of m-learning platforms in DCs is a hindrance. The absence of access restrictions on devices poses security threats to institutional systems. Negative perceptions that devices are taking over faculty roles lead to resistance in some situations. Resistance to change can be a hindrance to the acceptance and success of new systems. Lack of interest for m-learning is also attributed to lower technological literacy levels of the underprivileged masses. Scholarly works on m-learning in DCs is yet to mature. Most technological innovations are handed down from developed countries, and this constantly creates a lag for DCs. Lack of theoretical grounding was also identified which reduces the objectivity of study reports. The socio-cultural terrain of DCs results in societies with different views and needs that have been identified as a hindrance to research. Institutional commitment decisions, adequate funding for the necessary infrastructural development as well as multiple stakeholder participation is important for project success. Evidence suggests that while adoption decisions are readily made, successful integration of the concept for its full benefits to be realized is often neglected. Recommendations to findings were made to provide possible remedies to identified issues.

Keywords: developing countries, higher education institutions, mobile learning, literature review

Procedia PDF Downloads 216
8563 The Design of the Multi-Agent Classification System (MACS)

Authors: Mohamed R. Mhereeg

Abstract:

The paper discusses the design of a .NET Windows Service based agent system called MACS (Multi-Agent Classification System). MACS is a system aims to accurately classify spread-sheet developers competency over a network. It is designed to automatically and autonomously monitor spread-sheet users and gather their development activities based on the utilization of the software Multi-Agent Technology (MAS). This is accomplished in such a way that makes management capable to efficiently allow for precise tailor training activities for future spread-sheet development. The monitoring agents of MACS are intended to be distributed over the WWW in order to satisfy the monitoring and classification of the multiple developer aspect. The Prometheus methodology is used for the design of the agents of MACS. Prometheus has been used to undertake this phase of the system design because it is developed specifically for specifying and designing agent-oriented systems. Additionally, Prometheus specifies also the communication needed between the agents in order to coordinate to achieve their delegated tasks.

Keywords: classification, design, MACS, MAS, prometheus

Procedia PDF Downloads 383
8562 A Comprehensive Evaluation of Supervised Machine Learning for the Phase Identification Problem

Authors: Brandon Foggo, Nanpeng Yu

Abstract:

Power distribution circuits undergo frequent network topology changes that are often left undocumented. As a result, the documentation of a circuit’s connectivity becomes inaccurate with time. The lack of reliable circuit connectivity information is one of the biggest obstacles to model, monitor, and control modern distribution systems. To enhance the reliability and efficiency of electric power distribution systems, the circuit’s connectivity information must be updated periodically. This paper focuses on one critical component of a distribution circuit’s topology - the secondary transformer to phase association. This topology component describes the set of phase lines that feed power to a given secondary transformer (and therefore a given group of power consumers). Finding the documentation of this component is call Phase Identification, and is typically performed with physical measurements. These measurements can take time lengths on the order of several months, but with supervised learning, the time length can be reduced significantly. This paper compares several such methods applied to Phase Identification for a large range of real distribution circuits, describes a method of training data selection, describes preprocessing steps unique to the Phase Identification problem, and ultimately describes a method which obtains high accuracy (> 96% in most cases, > 92% in the worst case) using only 5% of the measurements typically used for Phase Identification.

Keywords: distribution network, machine learning, network topology, phase identification, smart grid

Procedia PDF Downloads 284
8561 Ultrasonic Investigation as Tool for Study of Molecular Interaction of 2-Hydroxy Substituted Pyrimidine Derivative at Different Concentrations

Authors: Shradha S. Binani, P. S. Bodke, R. V. Joat

Abstract:

Recent decades have witnessed an exponential growth in the field of acoustical parameters and ultrasound on solid, liquid and gases. Ultrasonic propagation parameters yield valuable information regarding the behavior of liquid systems because intra and intermolecular association, dipolar interaction, complex formation and related structural changes affecting the compressibility of the system which in turn produces variations in the ultrasonic velocity. The acoustic and thermo dynamical parameters obtained in ultrasonic study show that ion-solvation is accompanied by the destruction or enhancement of the solvent structure. In the present paper the ultrasonic velocity (v), density (ρ), viscosity(η) have been measured for the pharmacological important compound 2-hydroxy substituted phenyl pyrimidine derivative (2-hydroxy-4-(4’-methoxy phenyl)-6-(2’-hydroxy-4’-methyl-5’-chlorophenyl)pyrimidine) in ethanol as a solvent by using different concentration at constant room temperature. These experimental data have been used to estimate physical parameter like adiabatic compressibility, intermolecular free length, relaxation time, free volume, specific acoustic impedance, relative association, Wada’s constant, Rao’s constant etc. The above parameters provide information in understanding the structural and molecular interaction between solute-solvent in the drug solution with respect to change in concentration.

Keywords: acoustical parameters, ultrasonic velocity, density, viscosity, 2-hydroxy substituted phenyl pyrimidine derivative

Procedia PDF Downloads 452
8560 A Supervised Learning Data Mining Approach for Object Recognition and Classification in High Resolution Satellite Data

Authors: Mais Nijim, Rama Devi Chennuboyina, Waseem Al Aqqad

Abstract:

Advances in spatial and spectral resolution of satellite images have led to tremendous growth in large image databases. The data we acquire through satellites, radars and sensors consists of important geographical information that can be used for remote sensing applications such as region planning, disaster management. Spatial data classification and object recognition are important tasks for many applications. However, classifying objects and identifying them manually from images is a difficult task. Object recognition is often considered as a classification problem, this task can be performed using machine-learning techniques. Despite of many machine-learning algorithms, the classification is done using supervised classifiers such as Support Vector Machines (SVM) as the area of interest is known. We proposed a classification method, which considers neighboring pixels in a region for feature extraction and it evaluates classifications precisely according to neighboring classes for semantic interpretation of region of interest (ROI). A dataset has been created for training and testing purpose; we generated the attributes by considering pixel intensity values and mean values of reflectance. We demonstrated the benefits of using knowledge discovery and data-mining techniques, which can be on image data for accurate information extraction and classification from high spatial resolution remote sensing imagery.

Keywords: remote sensing, object recognition, classification, data mining, waterbody identification, feature extraction

Procedia PDF Downloads 323
8559 Web Page Design Optimisation Based on Segment Analytics

Authors: Varsha V. Rohini, P. R. Shreya, B. Renukadevi

Abstract:

In the web analytics the information delivery and the web usage is optimized and the analysis of data is done. The analytics is the measurement, collection and analysis of webpage data. Page statistics and user metrics are the important factor in most of the web analytics tool. This is the limitation of the existing tools. It does not provide design inputs for the optimization of information. This paper aims at providing an extension for the scope of web analytics to provide analysis and statistics of each segment of a webpage. The number of click count is calculated and the concentration of links in a web page is obtained. Its user metrics are used to help in proper design of the displayed content in a webpage by Vision Based Page Segmentation (VIPS) algorithm. When the algorithm is applied on the web page it divides the entire web page into the visual block tree. The visual block tree generated will further divide the web page into visual blocks or segments which help us to understand the usage of each segment in a page and its content. The dynamic web pages and deep web pages are used to extend the scope of web page segment analytics. Space optimization concept is used with the help of the output obtained from the Vision Based Page Segmentation (VIPS) algorithm. This technique provides us the visibility of the user interaction with the WebPages and helps us to place the important links in the appropriate segments of the webpage and effectively manage space in a page and the concentration of links.

Keywords: analytics, design optimization, visual block trees, vision based technology

Procedia PDF Downloads 257
8558 The Development of a School-Based Wellbeing Programme to Enhance the Social Functioning of Learners in Middle Childhood

Authors: Soretha Beets, Izanette Van Schalkwyk, Doret K. Kirsten

Abstract:

Children in middle childhood are exposed to various risks, for example, risks associated with poverty and/or dysfunctional families, that may threaten their social functioning. The aim of this study was to develop and design a programme that can be presented to children in middle childhood in order to enhance their social functioning towards better wellbeing. The skills and competencies needed to be included in the programme were identified by means of a literature review and 4 focus groups with educators from 4 sub-areas in a certain district in the North-West Province of South Africa. The programme consists of 8 sessions, presented in a certain order. The sessions cover the following aspects: self-esteem and gratitude, self-regulation and goal-setting, values and relationships, communication and listening, conflict management, emotional competence, and resilient coping. These aspects may benefit children in the middle child’s wellbeing and live on the short-term and may also hold long-term benefits.

Keywords: middle childhood, programme development, social functioning, wellbeing

Procedia PDF Downloads 150
8557 An Empirical Study of Barriers to Total Quality Management Implementation in Construction Industries

Authors: Dhafer Alqahtani

Abstract:

Total quality management (TQM) has become a widely accepted approach in the modern industry over recent years. There is a general consensus that by adopting TQM, the overall effectiveness and performance of an industry can be improved. It is also proved that as long as TQM is adopted fully and practiced effectively in the industry, potential benefits of TQM will be delivered. But despite the benefits of TQM as articulated by many quality gurus and academicians, these benefits are not achieved in practice. Many service industries have found it difficult to implement TQM successfully. This paper, therefore, explores the barriers to TQM’s successful implementation in construction firms. The aim is to identify and rank the barriers to successful TQM implementation in order to make them know and get a better understanding by the managers and practitioners of the Construction Industries. The research methodology adopted in this study was an extensive literature review on barriers to TQM implementation followed by a survey of selected construction firms using the self-administered instrument. The results also showed that only lack of effective communication and lack of top management support were not significantly associated with the level of implementation of TQM.

Keywords: total quality management, construction firms, barriers, successful implementation

Procedia PDF Downloads 77
8556 Domestic and Foreign Terrorism: Evaluation of the Breeding Ground

Authors: T. K. Hung

Abstract:

Terrorism acts have occurred across both developed and developing states, with well-identified motivation and causes. For many years, terrorism eradication has become a major topic yet only passive actions were taken in response to acts. The linkage between the location of terrorism occurrence and breeding ground is not well-documented, resulting in the passive approach used in counter-terrorism nowadays. The evaluation investigates all post-9/11 terrorism affairs considering their state capacity, safety, ease of border access control, religion diversity, and technology access, to measure the level of breeding ground of the states. Those "weak" states with poor border access control, resources capacity and domestic safety are the best breeding ground for terrorists. Although many attacks were caused by religious motivation, religion diversity does not predict the breeding ground. States with censored technology access, particular computer-mediated communication, predict on the terrorism breeding ground, moderated by the level of breeding ground of neighboring states.

Keywords: counter-terrorism, lethality, security, terrorism

Procedia PDF Downloads 324
8555 Hominin Niche in the Times of Climate Change

Authors: Emilia Hunt, Sally C. Reynolds, Fiona Coward, Fabio Parracho Silva, Philip Hopley

Abstract:

Ecological niche modeling is widely used in conservation studies, but application to the extinct hominin species is a relatively new approach. Being able to understand what ecological niches were occupied by respective hominin species provides a new perspective into influences on evolutionary processes. Niche separation or overlap can tell us more about specific requirements of the species within the given timeframe. Many of the ancestral species lived through enormous climate changes: glacial and interglacial periods, changes in rainfall, leading to desertification or flooding of regions and displayed impressive levels of adaptation necessary for their survival. This paper reviews niche modeling methodologies and their application to hominin studies. Traditional conservation methods might not be directly applicable to extinct species and are not comparable to hominins. Hominin niche also includes aspects of technologies, use of fire and extended communication, which are not traditionally used in building conservation models. Future perspectives on how to improve niche modeling for extinct hominin species will be discussed.

Keywords: hominin niche, climate change, evolution, adaptation, ecological niche modelling

Procedia PDF Downloads 174
8554 Volume Estimation of Trees: An Exploratory Study on Pterocarpus erinaceus Logging Operations within Forest Transition and Savannah Ecological Zones of Ghana

Authors: Albert Kwabena Osei Konadu

Abstract:

Pterocarpus erinaceus, also known as Rosewood, is tropical wood, endemic in forest savannah transition zones within the middle and northern portion of Ghana. Its economic viability has made it increasingly popular and in high demand, leading to widespread conservation concerns. Ghana’s forest resource management regime for these ecozones is mainly on conservation and very little on resource utilization. Consequently, commercial logging management standards are at teething stage and not fully developed, leading to a deficiency in the monitoring of logging operations and quantification of harvested trees volumes. Tree information form (TIF); a volume estimation and tracking regime, has proven to be an effective, sustainable management tool for regulating timber resource extraction in the high forest zones of the country. This work aims to generate TIF that can track and capture requisite parameters to accurately estimate the volume of harvested rosewood within forest savannah transition zones. Tree information forms were created on three scenarios of individual billets, stacked billets and conveying vessel basis. These TIFs were field-tested to deduce the most viable option for the tracking and estimation of harvested volumes of rosewood using the smallian and cubic volume estimation formula. Overall, four districts were covered with individual billets, stacked billets and conveying vessel scenarios registering mean volumes of 25.83m3,45.08m3 and 32.6m3, respectively. These adduced volumes were validated by benchmarking to assigned volumes of the Forestry Commission of Ghana and known standard volumes of conveying vessels. The results did indicate an underestimation of extracted volumes under the quotas regime, a situation that could lead to unintended overexploitation of the species. The research revealed conveying vessels route is the most viable volume estimation and tracking regime for the sustainable management of the Pterocarpous erinaceus species as it provided a more practical volume estimate and data extraction protocol.

Keywords: convention on international trade in endangered species, cubic volume formula, forest transition savannah zones, pterocarpus erinaceus, smallian’s volume formula, tree information form

Procedia PDF Downloads 74
8553 Modern Technology-Based Methods in Neurorehabilitation for Social Competence Deficit in Children with Acquired Brain Injury

Authors: M. Saard, A. Kolk, K. Sepp, L. Pertens, L. Reinart, C. Kööp

Abstract:

Introduction: Social competence is often impaired in children with acquired brain injury (ABI), but evidence-based rehabilitation for social skills has remained undeveloped. Modern technology-based methods create effective and safe learning environments for pediatric social skills remediation. The aim of the study was to implement our structured model of neuro rehab for socio-cognitive deficit using multitouch-multiuser tabletop (MMT) computer-based platforms and virtual reality (VR) technology. Methods: 40 children aged 8-13 years (yrs) have participated in the pilot study: 30 with ABI -epilepsy, traumatic brain injury and/or tic disorder- and 10 healthy age-matched controls. From the patients, 12 have completed the training (M = 11.10 yrs, SD = 1.543) and 20 are still in training or in the waiting-list group (M = 10.69 yrs, SD = 1.704). All children performed the first individual and paired assessments. For patients, second evaluations were performed after the intervention period. Two interactive applications were implemented into rehabilitation design: Snowflake software on MMT tabletop and NoProblem on DiamondTouch Table (DTT), which allowed paired training (2 children at once). Also, in individual training sessions, HTC Vive VR device was used with VR metaphors of difficult social situations to treat social anxiety and train social skills. Results: At baseline (B) evaluations, patients had higher deficits in executive functions on the BRIEF parents’ questionnaire (M = 117, SD = 23.594) compared to healthy controls (M = 22, SD = 18.385). The most impaired components of social competence were emotion recognition, Theory of Mind skills (ToM), cooperation, verbal/non-verbal communication, and pragmatics (Friendship Observation Scale scores only 25-50% out of 100% for patients). In Sentence Completion Task and Spence Anxiety Scale, the patients reported a lack of friends, behavioral problems, bullying in school, and social anxiety. Outcome evaluations: Snowflake on MMT improved executive and cooperation skills and DTT developed communication skills, metacognitive skills, and coping. VR, video modelling and role-plays improved social attention, emotional attitude, gestural behaviors, and decreased social anxiety. NEPSY-II showed improvement in Affect Recognition [B = 7, SD = 5.01 vs outcome (O) = 10, SD = 5.85], Verbal ToM (B = 8, SD = 3.06 vs O = 10, SD = 4.08), Contextual ToM (B = 8, SD = 3.15 vs O = 11, SD = 2.87). ToM Stories test showed an improved understanding of Intentional Lying (B = 7, SD = 2.20 vs O = 10, SD = 0.50), and Sarcasm (B=6, SD = 2.20 vs O = 7, SD = 2.50). Conclusion: Neurorehabilitation based on the Structured Model of Neurorehab for Socio-Cognitive Deficit in children with ABI were effective in social skills remediation. The model helps to understand theoretical connections between components of social competence and modern interactive computerized platforms. We encourage therapists to implement these next-generation devices into the rehabilitation process as MMT and VR interfaces are motivating for children, thus ensuring good compliance. Improving children’s social skills is important for their and their families’ quality of life and social capital.

Keywords: acquired brain injury, children, social skills deficit, technology-based neurorehabilitation

Procedia PDF Downloads 107