Search results for: location-based social network services
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15923

Search results for: location-based social network services

11153 Cross Attention Fusion for Dual-Stream Speech Emotion Recognition

Authors: Shaode Yu, Jiajian Meng, Bing Zhu, Hang Yu, Qiurui Sun

Abstract:

Speech emotion recognition (SER) is for recognizing human subjective emotions through audio data in-depth analysis. From speech audios, how to comprehensively extract emotional information and how to effectively fuse extracted features remain challenging. This paper presents a dual-stream SER framework that embraces both full training and transfer learning of different networks for thorough feature encoding. Besides, a plug-and-play cross-attention fusion (CAF) module is implemented for the valid integration of the dual-stream encoder output. The effectiveness of the proposed CAF module is compared to the other three fusion modules (feature summation, feature concatenation, and feature-wise linear modulation) on two databases (RAVDESS and IEMO-CAP) using different dual-stream encoders (full training network, DPCNN or TextRCNN; transfer learning network, HuBERT or Wav2Vec2). Experimental results suggest that the CAF module can effectively reconcile conflicts between features from different encoders and outperform the other three feature fusion modules on the SER task. In the future, the plug-and-play CAF module can be extended for multi-branch feature fusion, and the dual-stream SER framework can be widened for multi-stream data representation to improve the recognition performance and generalization capacity.

Keywords: speech emotion recognition, cross-attention fusion, dual-stream, pre-trained

Procedia PDF Downloads 57
11152 Classification of Potential Biomarkers in Breast Cancer Using Artificial Intelligence Algorithms and Anthropometric Datasets

Authors: Aref Aasi, Sahar Ebrahimi Bajgani, Erfan Aasi

Abstract:

Breast cancer (BC) continues to be the most frequent cancer in females and causes the highest number of cancer-related deaths in women worldwide. Inspired by recent advances in studying the relationship between different patient attributes and features and the disease, in this paper, we have tried to investigate the different classification methods for better diagnosis of BC in the early stages. In this regard, datasets from the University Hospital Centre of Coimbra were chosen, and different machine learning (ML)-based and neural network (NN) classifiers have been studied. For this purpose, we have selected favorable features among the nine provided attributes from the clinical dataset by using a random forest algorithm. This dataset consists of both healthy controls and BC patients, and it was noted that glucose, BMI, resistin, and age have the most importance, respectively. Moreover, we have analyzed these features with various ML-based classifier methods, including Decision Tree (DT), K-Nearest Neighbors (KNN), eXtreme Gradient Boosting (XGBoost), Logistic Regression (LR), Naive Bayes (NB), and Support Vector Machine (SVM) along with NN-based Multi-Layer Perceptron (MLP) classifier. The results revealed that among different techniques, the SVM and MLP classifiers have the most accuracy, with amounts of 96% and 92%, respectively. These results divulged that the adopted procedure could be used effectively for the classification of cancer cells, and also it encourages further experimental investigations with more collected data for other types of cancers.

Keywords: breast cancer, diagnosis, machine learning, biomarker classification, neural network

Procedia PDF Downloads 122
11151 Ideation, Plans, and Attempts for Suicide among Adolescents with Disability

Authors: Nyla Anjum, Humaira Bano

Abstract:

Disability, regardless of its type and nature limits one or two significant life activities. These limitations constitute risk factors for suicide. Rate and intensity of problem upsurges in critical age of adolescence. Researches in the field of mental health over look problem of suicide among persons with disability. Aim of the study was to investigate prevalence and risk factors for suicide among adolescents with disability. The study constitutes purposive sample of 106 elements of both gender with four major categories of disability: hearing impairment, physical impairment, visual impairment and intellectual disabilities. Face to face interview technique was opted for data collection. Other variable are: socio-economic status, social and family support, provision of services for persons with disability, education and employment opportunities. For data analysis independent sample t-test was applied to find out significant differences in gender and One Way Analysis of variance was run to find out differences among four types of disability. Major predictors of suicide were identified with multiple regression analysis. It is concluded that ideation, plans and attempts of suicide among adolescents with disability is a multifaceted and imperative concern in the area of mental health. Urgent research recommendations contains valid measurement of suicide rate and identification of more risk factors for suicide among persons with disability. Study will also guide towards prevention of this pressing problem and will bring message of happy and healthy life not only for persons with disability but also for their families. It will also help to reduce suicide rate in society.

Keywords: suicide, risk factors, adolescent, disability, mental health

Procedia PDF Downloads 370
11150 A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks

Authors: Naghmeh Moradpoor Sheykhkanloo

Abstract:

Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into a given SQL database by simply using a web browser. Losing data, disclosing confidential information or even changing the value of data are the severe damages that SQLI attack can cause on a given database. SQLI attack has also been rated as the number-one attack among top ten web application threats on Open Web Application Security Project (OWASP). OWASP is an open community dedicated to enabling organisations to consider, develop, obtain, function, and preserve applications that can be trusted. In this paper, we propose an effective pattern recognition neural network model for detection and classification of SQLI attacks. The proposed model is built from three main elements of: a Uniform Resource Locator (URL) generator in order to generate thousands of malicious and benign URLs, a URL classifier in order to: 1) classify each generated URL to either a benign URL or a malicious URL and 2) classify the malicious URLs into different SQLI attack categories, and an NN model in order to: 1) detect either a given URL is a malicious URL or a benign URL and 2) identify the type of SQLI attack for each malicious URL. The model is first trained and then evaluated by employing thousands of benign and malicious URLs. The results of the experiments are presented in order to demonstrate the effectiveness of the proposed approach.

Keywords: neural networks, pattern recognition, SQL injection attacks, SQL injection attack classification, SQL injection attack detection

Procedia PDF Downloads 451
11149 Corporate Social Responsibility in the Libyan Commercial Banks: Reality and Issues

Authors: Khalid Alshaikh

Abstract:

Corporate Social Responsibility (CSR) in Libya has recently gained momentum, especially with the rise of the social issues ensued by the recent war. CSR is a new organisational culture designing its features and route within the Libyan financial institutions. Now, both the public and private banks invest in this construct trusting that its powers are capable of improving the economic, social and environmental problems the conflict has created. On the other hand, the Libyan commercial banks recognise the benefits of utilising CSR to entice investors and ensure their continuations in the national and international markets. Nevertheless, as a new concept, CSR necessitates an in-depth exploration and analysis to help its transition from the margins of religion to the mainstream of society and businesses. This can assist in constructing its activities to bring about change nation-wide. Therefore, this paper intends to explore the current definitions attached to this term through tracing back its historical beginnings. Then, it investigates its trends both in the public and private banks to identify where its sustainable development materialises. Lastly, it seeks to understand the key challenges that obscure its success in the Libyan environment. The research methodology used both public and private banks as case study and qualitative research to interview ten Board of Directors (BoDs) and eleven Chief Executive Managers (CEOs) to discover how CSR is defined and the core CSR activities practiced by the Libyan Commercial Banks (LCBs) and the key constraints that CSR faces and make it unsuccessful. The findings suggest that CSR is still influenced by the power of religion. Nevertheless, the Islamic perspective is more consistent with the social contract concept of CSR. The LCBs do not solely focus on the economic side of maximizing profits, but also concentrate on its morality. The issue is that CSR activities are not enough to achieve good charity publicly and needs strategies to address major social issues. Moreover, shareholders do not support CSR activities. Their argument is that the only social responsibility of businesses is to maximize profits, while the government should deal with the existing social issues. Finally, although the LCBs endeavour to embed CSR in their organisational culture, it is still important that different stakeholders need to do much more to entrench this construct through their core functions. The Central bank of Libya needs also to boost its standing to be more influential and ensure that the right discussions about CSR happen with the right stakeholders involved.

Keywords: corporate social responsibility, private banks, public banks, stakeholders

Procedia PDF Downloads 168
11148 Elucidation of Dynamics of Murine Double Minute 2 Shed Light on the Anti-cancer Drug Development

Authors: Nigar Kantarci Carsibasi

Abstract:

Coarse-grained elastic network models, namely Gaussian network model (GNM) and Anisotropic network model (ANM), are utilized in order to investigate the fluctuation dynamics of Murine Double Minute 2 (MDM2), which is the native inhibitor of p53. Conformational dynamics of MDM2 are elucidated in unbound, p53 bound, and non-peptide small molecule inhibitor bound forms. With this, it is aimed to gain insights about the alterations brought to global dynamics of MDM2 by native peptide inhibitor p53, and two small molecule inhibitors (HDM201 and NVP-CGM097) that are undergoing clinical stages in cancer studies. MDM2 undergoes significant conformational changes upon inhibitor binding, carrying pieces of evidence of induced-fit mechanism. Small molecule inhibitors examined in this work exhibit similar fluctuation dynamics and characteristic mode shapes with p53 when complexed with MDM2, which would shed light on the design of novel small molecule inhibitors for cancer therapy. The results showed that residues Phe 19, Trp 23, Leu 26 reside in the minima of slowest modes of p53, pointing to the accepted three-finger binding model. Pro 27 displays the most significant hinge present in p53 and comes out to be another functionally important residue. Three distinct regions are identified in MDM2, for which significant conformational changes are observed upon binding. Regions I (residues 50-77) and III (residues 90-105) correspond to the binding interface of MDM2, including (α2, L2, and α4), which are stabilized during complex formation. Region II (residues 77-90) exhibits a large amplitude motion, being highly flexible, both in the absence and presence of p53 or other inhibitors. MDM2 exhibits a scattered profile in the fastest modes of motion, while binding of p53 and inhibitors puts restraints on MDM2 domains, clearly distinguishing the kinetically hot regions. Mode shape analysis revealed that the α4 domain controls the size of the cleft by keeping the cleft narrow in unbound MDM2; and open in the bound states for proper penetration and binding of p53 and inhibitors, which points to the induced-fit mechanism of p53 binding. P53 interacts with α2 and α4 in a synchronized manner. Collective modes are shifted upon inhibitor binding, i.e., second mode characteristic motion in MDM2-p53 complex is observed in the first mode of apo MDM2; however, apo and bound MDM2 exhibits similar features in the softest modes pointing to pre-existing modes facilitating the ligand binding. Although much higher amplitude motions are attained in the presence of non-peptide small molecule inhibitor molecules as compared to p53, they demonstrate close similarity. Hence, NVP-CGM097 and HDM201 succeed in mimicking the p53 behavior well. Elucidating how drug candidates alter the MDM2 global and conformational dynamics would shed light on the rational design of novel anticancer drugs.

Keywords: cancer, drug design, elastic network model, MDM2

Procedia PDF Downloads 117
11147 Tornado Disaster Impacts and Management: Learning from the 2016 Tornado Catastrophe in Jiangsu Province, China

Authors: Huicong Jia, Donghua Pan

Abstract:

As a key component of disaster reduction management, disaster emergency relief and reconstruction is an important process. Based on disaster system theory, this study analyzed the Jiangsu tornado from the formation mechanism of disasters, through to the economic losses, loss of life, and social infrastructure losses along the tornado disaster chain. The study then assessed the emergency relief and reconstruction efforts, based on an analytic hierarchy process method. The results were as follows: (1) An unstable weather system was the root cause of the tornado. The potentially hazardous local environment, acting in concert with the terrain and the river network, was able to gather energy from the unstable atmosphere. The wind belt passed through a densely populated district, with vulnerable infrastructure and other hazard-prone elements, which led to an accumulative disaster situation and the triggering of a catastrophe. (2) The tornado was accompanied by a hailstorm, which is an important triggering factor for a tornado catastrophe chain reaction. (3) The evaluation index (EI) of the emergency relief and reconstruction effect for the ‘‘6.23’’ tornado disaster in Yancheng was 91.5. Compared to other relief work in areas affected by disasters of the same magnitude, there was a more successful response than has previously been experienced. The results provide new insights for studies of disaster systems and the recovery measures in response to tornado catastrophe in China.

Keywords: China, disaster system, emergency relief, tornado catastrophe

Procedia PDF Downloads 255
11146 Using Log Files to Improve Work Efficiency

Authors: Salman Hussam

Abstract:

As a monitoring system to manage employees' time and employers' business, this system (logger) will monitor the employees at work and will announce them if they spend too much time on social media (even if they are using proxy it will catch them). In this way, people will spend less time at work and more time with family.

Keywords: clients, employees, employers, family, monitoring, systems, social media, time

Procedia PDF Downloads 479
11145 Campaigns of Youth Empowerment and Unemployment In Development Discourses: In the Case of Ethiopia

Authors: Fentie, Belay, Mulat

Abstract:

In today’s high decrement figure of the global economy, nations are facing many economic, social and political challenges; universally, there is high distress of food and other survival insecurity. Further, as a result of conflict, natural disasters, and leadership influences, youths are existentially less empowered and unemployed, especially in developing countries. With this situation to handle well challenges, it’s important to search, investigate and deliberate about youth, unemployment, empowerment and possible management fashions, as youths have the potential to carry and fight such battles. The method adopted is a qualitative analysis of secondary data sources in youth empowerment, unemployment and development as an inclusive framework. Youth unemployment is a major development headache for most African countries. In Ethiopia, following weak youth empowerment, youth unemployment has increased from time to time, and quality education and organization linkage matter as an important constraint. As a management challenge, although accessibility of quality education for Ethiopian youths is an important constraint, the country's youths are fortified deceptively and harassed in a vicious political challenge in their struggle to fetch social and economic changes in the country. Further, thousands of youths are inactivated, criminalized and lost their lives and this makes youths hopeless anger in their lives and pushes them further to be exposed for addictions, prostitution, violence, and illegitimate migrations. This youth challenge wasn’t only destined for African countries; rather, indeed, it was a global burden and headed as a global agenda. As a resolution, the construction of a healthy education system can create independent youths who acquire success and accelerate development. Developing countries should ensue development in the cultivation of empowerment tools through long and short-term education, implementing policy in action, diminishing wide-ranging gaps of (religion, ethnicity & region), and take high youth population as an opportunity and empower them. Further managing and empowering youths to be involved in decision-making, giving political weight and building a network of organizations to easily access job opportunities are important suggestions to save youths in work, for both increasing their income and the country's food security balance.

Keywords: development, Ethiopia, management, unemployment, youth empowerment

Procedia PDF Downloads 44
11144 An Integrated Planning Framework for Sustainable Tourism: Case Study of Tunisia

Authors: S. Halioui, I. Arikan, M. Schmidt

Abstract:

Tourism sector in Tunisia faces several problems that range from economic challenges to environmental degradation and social instability. These problems have been intensified because of the increased competition in the tourism market, the political instability, financial crises, and recently terrorism problems have aggravated the situation. As a consequence, a new framework that promotes sustainable tourism in the country and increases its competitiveness is urgently needed. Planning for sustainable tourism sector requires the integration of complex interactions between economic, social and environmental aspects. Sustainable tourism principles can be implemented with the help of Strategic Environmental Assessment (SEA) process, which ensures the full integration of economic, social and environmental considerations while planning for the tourism sector in Tunisia. Results of the paper have broad implications for policy makers and tourism professionals.

Keywords: sustainable tourism, strategic environmental assessment, tourism planning, policy

Procedia PDF Downloads 478
11143 Saudi Women Facing Challenges in a Mixed-Gender Work Environment

Authors: A. Aldawsari

Abstract:

The complex issue of women working in a mixed-gender work environment has its roots in social and cultural factors. This research was done to identify and explore the social and cultural challenges Saudi women face in a mixed-gender work environment in Saudi Arabia. Over the years, Saudi women in mixed-gender work environments in Saudi Arabia have been of interest in various research areas, especially within the context of a hospital work environment. This research, which involves a female researcher interacting one-on-one with Saudi women, will address this issue as well as the effect of the 2030 Vision in Saudi Arabia, and it will aim to include several new fields of work environments for women in Saudi Arabia. The aim of this research is to examine the perceptions of Saudi women who work in a mixed gender environment regarding the general empowerment of women in these settings. The objective of this research is to explore the cultural and social challenges that influence Saudi women's rights to work in a mixed-gender environment in Saudi Arabia. The significance of this research lies in the fact that there is an urgency to resolve issue of female employment in Saudi Arabia, where Saudi women still suffer from inequality in employment opportunity. Although the Saudi government is seeking to empower women by integrating them into a mixed-gender work environment, which is a key goal and prominent social change advocated for in the 2030 Vision, this same goal is one of the main challenges in the face of achieving female empowerment. The methodology section focuses on appropriate methods that can be used to study the effect of social and cultural challenges on the employment of women. It then determines the conditions and limitations of the research by applying a qualitative research approach to the investigation and analysing the data collected from the interviews. A statistical analysis tool, such as NVivo, will be used for the qualitative analysis of the interviews. The study found that the factor most responsible for creating social and cultural challenges is family—whether close family or distant family—more so than tribe or community.

Keywords: women, work, mixed-gender, environment

Procedia PDF Downloads 121
11142 Dynamic Fault Diagnosis for Semi-Batch Reactor Under Closed-Loop Control via Independent RBFNN

Authors: Abdelkarim M. Ertiame, D. W. Yu, D. L. Yu, J. B. Gomm

Abstract:

In this paper, a new robust fault detection and isolation (FDI) scheme is developed to monitor a multivariable nonlinear chemical process called the Chylla-Haase polymerization reactor when it is under the cascade PI control. The scheme employs a radial basis function neural network (RBFNN) in an independent mode to model the process dynamics and using the weighted sum-squared prediction error as the residual. The recursive orthogonal Least Squares algorithm (ROLS) is employed to train the model to overcome the training difficulty of the independent mode of the network. Then, another RBFNN is used as a fault classifier to isolate faults from different features involved in the residual vector. The several actuator and sensor faults are simulated in a nonlinear simulation of the reactor in Simulink. The scheme is used to detect and isolate the faults on-line. The simulation results show the effectiveness of the scheme even the process is subjected to disturbances and uncertainties including significant changes in the monomer feed rate, fouling factor, impurity factor, ambient temperature and measurement noise. The simulation results are presented to illustrate the effectiveness and robustness of the proposed method.

Keywords: Robust fault detection, cascade control, independent RBF model, RBF neural networks, Chylla-Haase reactor, FDI under closed-loop control

Procedia PDF Downloads 487
11141 Crop Classification using Unmanned Aerial Vehicle Images

Authors: Iqra Yaseen

Abstract:

One of the well-known areas of computer science and engineering, image processing in the context of computer vision has been essential to automation. In remote sensing, medical science, and many other fields, it has made it easier to uncover previously undiscovered facts. Grading of diverse items is now possible because of neural network algorithms, categorization, and digital image processing. Its use in the classification of agricultural products, particularly in the grading of seeds or grains and their cultivars, is widely recognized. A grading and sorting system enables the preservation of time, consistency, and uniformity. Global population growth has led to an increase in demand for food staples, biofuel, and other agricultural products. To meet this demand, available resources must be used and managed more effectively. Image processing is rapidly growing in the field of agriculture. Many applications have been developed using this approach for crop identification and classification, land and disease detection and for measuring other parameters of crop. Vegetation localization is the base of performing these task. Vegetation helps to identify the area where the crop is present. The productivity of the agriculture industry can be increased via image processing that is based upon Unmanned Aerial Vehicle photography and satellite. In this paper we use the machine learning techniques like Convolutional Neural Network, deep learning, image processing, classification, You Only Live Once to UAV imaging dataset to divide the crop into distinct groups and choose the best way to use it.

Keywords: image processing, UAV, YOLO, CNN, deep learning, classification

Procedia PDF Downloads 93
11140 Retrospective Statistical Study on the Evolution of Brucellosis during the Last Decade (2011-2021) in Medea, Algeria

Authors: Mammar Khames, Mustapha Oumouna

Abstract:

Brucellosis is one of the most common zoonoses in the world. It represents a serious threat to human health; the existence of brucellosis in Algeria dates back to the beginning of the 19th century. Its transmission to humans is through coccobacilli of the genus Brucella following direct contact with contaminated animals or indirectly through the consumption of their unpasteurized dairy products. The present investigation covers a retrospective study on human brucellosis in the district of Medea over a period from 2011 to 2021 at the level of two public health establishments. In the first place, it is at the level of the Directorate of Public Health and in the infectious department level at Medea Hospital, and at the level of the directorate of agricultural services in the third place. The results showed that during these eleven years of study, 795 cases were collected from the department of health and population, and 141 cases were collected from the infectious department of the district of Medea. A total of 56 cases of bovine brucellosis were obtained from the directorate of agricultural services of the district of Medea. Human brucellosis affects all age groups with different percentages, but the rate has been higher in the 20-44 age group, with a predominance of men. However, the geographic distribution map of the cases shows that the western part of the district was the most affected. A cohort of 141 cases was hospitalized at the infectious service level of Medea Hospital. They were 89 men and 52 women. The most common age reached is [20-44] years. The majority were of rural origin. Two serological reactions were performed for diagnosis: the buffered antigen test and Wright's serodiagnosis. Bovine brucellosis affects all age groups with different percentages, but the rate was higher in the 2-to-4-year age group, with a predominance of females. From these data, we conclude that brucellosis has a strong spread in the region studied.

Keywords: human brucellosis, serology, Medea, Algeria

Procedia PDF Downloads 52
11139 Time, Uncertainty, and Technological Innovation

Authors: Xavier Everaert

Abstract:

Ever since the publication of “The Problem of Social” cost, Coasean insights on externalities, transaction costs, and the reciprocal nature of harms, have been widely debated. What has been largely neglected however, is the role of technological innovation in the mitigation of negative externalities or transaction costs. Incorporating future uncertainty about negligence standards or expected restitution costs and the profit opportunities these uncertainties reveal to entrepreneurs, allow us to frame problems regarding social costs within the reality of rapid technological evolution.

Keywords: environmental law and economics, entrepreneurship, commons, pollution, wildlife

Procedia PDF Downloads 405
11138 Ontologies for Social Media Digital Evidence

Authors: Edlira Kalemi, Sule Yildirim-Yayilgan

Abstract:

Online Social Networks (OSNs) are nowadays being used widely and intensively for crime investigation and prevention activities. As they provide a lot of information they are used by the law enforcement and intelligence. An extensive review on existing solutions and models for collecting intelligence from this source of information and making use of it for solving crimes has been presented in this article. The main focus is on smart solutions and models where ontologies have been used as the main approach for representing criminal domain knowledge. A framework for a prototype ontology named SC-Ont will be described. This defines terms of the criminal domain ontology and the relations between them. The terms and the relations are extracted during both this review and the discussions carried out with domain experts. The development of SC-Ont is still ongoing work, where in this paper, we report mainly on the motivation for using smart ontology models and the possible benefits of using them for solving crimes.

Keywords: criminal digital evidence, social media, ontologies, reasoning

Procedia PDF Downloads 378
11137 Promoters' Perspectives on the Impact of Development Projects: Do They Suffer from Any Forms of Social Injustice?

Authors: Ola Hosny

Abstract:

This paper illustrates promoters’ role in any development project and factors affecting their performance. The paper starts by giving an overview of the Egyptian context and the born of non-formal education. This is then followed by answers to the following questions; who are promoters, why build promoters’ skills, do promoters suffer from any forms of social injustice, what is meant by leadership’s skills, why build promoters’ leadership skills in specific, and finally what is the desired final destination. Given the fact that promoters are the actual implementers on ground of any project, this paper pinpoints the extent to which promoters' capacities should be developed to institutionalize projects' values into the community, transfer knowledge, and be able to act as pillars of change to sustain the maximum achievements from any intervention, illustrating the role of education for sustainable development. The paper wraps-up by a conclusion that reflects the main findings.

Keywords: social justice, women's empowerment, gender equity, young rural women, promoters

Procedia PDF Downloads 349
11136 Bacteriological Characterization of Drinking Water Distribution Network Biofilms by Gene Sequencing Using Different Pipe Materials

Authors: M. Zafar, S. Rasheed, Imran Hashmi

Abstract:

Very little is concerned about the bacterial contamination in drinking water biofilm which provide a potential source for bacteria to grow and increase rapidly. So as to understand the microbial density in DWDs, a three-month study was carried out. The aim of this study was to examine biofilm in three different pipe materials including PVC, PPR and GI. A set of all these pipe materials was installed in DWDs at nine different locations and assessed on monthly basis. Drinking water quality was evaluated by different parameters and characterization of biofilm. Among various parameters are Temperature, pH, turbidity, TDS, electrical conductivity, BOD, COD, total phosphates, total nitrates, total organic carbon (TOC) free chlorine and total chlorine, coliforms and spread plate counts (SPC) according to standard methods. Predominant species were Bacillus thuringiensis, Pseudomonas fluorescens , Staphylococcus haemolyticus, Bacillus safensis and significant increase in bacterial population was observed in PVC pipes while least in cement pipes. The quantity of DWDs bacteria was directly depended on biofilm bacteria and its increase was correlated with growth and detachment of bacteria from biofilms. Pipe material also affected the microbial community in drinking water distribution network biofilm while Similarity in bacterial species was observed between systems due to same disinfectant dose, time period and plumbing pipes.

Keywords: biofilm, DWDs, pipe material, bacterial population

Procedia PDF Downloads 337
11135 Corporate Social Responsibility in an Experimental Market

Authors: Nikolaos Georgantzis, Efi Vasileiou

Abstract:

We present results from experimental price-setting oligopolies in which green firms undertake different levels of energy-saving investments motivated by public subsidies and demand-side advantages. We find that consumers reveal higher willingness to pay for greener sellers’ products. This observation in conjunction to the fact that greener sellers set higher prices is compatible with the use and interpretation of energy-saving behaviour as a differentiation strategy. However, sellers do not exploit the resulting advantage through sufficiently high price-cost margins, because they seem trapped into “run to stay still” competition. Regarding the use of public subsidies to energy-saving sellers we uncover an undesirable crowding-out effect of consumers’ intrinsic tendency to support green manufacturers. Namely, consumers may be less willing to support a green seller whose energy-saving strategy entails a direct financial benefit. Finally, we disentangle two alternative motivations for consumer’s attractions to pro-social firms; first, the self-interested recognition of the firm’s contribution to the public and private welfare and, second, the need to compensate a firm for the cost entailed in each pro-social action. Our results show the prevalence of the former over the latter.

Keywords: corporate social responsibility, energy savings, public good, experiments, vertical differentiation, altruism

Procedia PDF Downloads 240
11134 Analysis of Turkish Government Cultural Portal for Supporting Gastronomy Tourism

Authors: Hilmi Rafet Yüncü

Abstract:

Today Internet has very important role to promote products and services all over the world. Companies and destinations in tourism industry use Internet to sell and to promote their core products to directly potential tourists. Internet technologies have redefined the relationships between tourists, tourism companies, and travel agents. The new relationship allows for accessing and tapping tourism information and services. Internet technologies ensure new opportunities to available for the tourism industry, including travel accommodation, and tourist destination organizations. Websites are important devices to the marketing of a destination. Most people make a research about the destination before arriving via internet. Governments have a considerable role in the process of marketing tourism destinations. Governments make policies and regulations; furthermore, they help to market destinations to potential tourists. Governments have a comprehensive overview of the sector to see changes in tourism market and design better policies, programs and marketing plans. At the same time, governments support developing of alternative tourism in the country with regulations and marketing tools. The aim of this study is to analyse of an Internet website of governmental tourism portal in Turkey to determine effectiveness about gastronomy tourism. The Turkish government has established a culture portal for foreign and local tourists. The Portal provides local and general information about tourism attractions of cities and Turkey. There are 81 official cities in Turkey and all these cities are conducted to analyse to determine how effective marketing is done by Turkish Government in the manner of gastronomy tourism. A content analysis will be conducted to Internet website of the portal with food content, recipes and gastronomic feature of cities.

Keywords: culture portal, gastronomy tourism, government, Turkey

Procedia PDF Downloads 331
11133 Tinder, Image Merchandise and Desire: The Configuration of Social Ties in Today's Neoliberalism

Authors: Daniel Alvarado Valencia

Abstract:

Nowadays, the market offers us solutions for everything, creating the idea of an immediate availability of anything we could desire, and the Internet is the mean through which to obtain all this. The proposal of this conference is that this logic puts the subjects in a situation of self-exploitation, and considers the psyche as a productive force by configuring affection and desire from a neoliberal value perspective. It uses Tinder, starting from ethnographical data from Mexico City users, as an example for this. Tinder is an application created to get dates, have sexual encounters and find a partner. It works from the creation and management of a digital profile. It is an example of how futuristic and lonely the current era can be since we got used to interact with other people through screens and images. However, at the same time, it provides solutions to loneliness, since technology transgresses, invades and alters social practices in different ways. Tinder fits into this contemporary context, it is a concrete example of the processes of technification in which social bonds develop through certain devices offered by neoliberalism, through consumption, and where the search of love and courtship are possible through images and their consumption.

Keywords: desire, image, merchandise, neoliberalism

Procedia PDF Downloads 107
11132 Prediction of Music Track Popularity: A Machine Learning Approach

Authors: Syed Atif Hassan, Luv Mehta, Syed Asif Hassan

Abstract:

Hit song science is a field of investigation wherein machine learning techniques are applied to music tracks in order to extract such features from audio signals which can capture information that could explain the popularity of respective tracks. Record companies invest huge amounts of money into recruiting fresh talents and churning out new music each year. Gaining insight into the basis of why a song becomes popular will result in tremendous benefits for the music industry. This paper aims to extract basic musical and more advanced, acoustic features from songs while also taking into account external factors that play a role in making a particular song popular. We use a dataset derived from popular Spotify playlists divided by genre. We use ten genres (blues, classical, country, disco, hip-hop, jazz, metal, pop, reggae, rock), chosen on the basis of clear to ambiguous delineation in the typical sound of their genres. We feed these features into three different classifiers, namely, SVM with RBF kernel, a deep neural network, and a recurring neural network, to build separate predictive models and choosing the best performing model at the end. Predicting song popularity is particularly important for the music industry as it would allow record companies to produce better content for the masses resulting in a more competitive market.

Keywords: classifier, machine learning, music tracks, popularity, prediction

Procedia PDF Downloads 642
11131 Characterising Performative Technological Innovation: Developing a Strategic Framework That Incorporates the Social Mechanisms That Promote Change within a Technological Environment

Authors: Joan Edwards, J. Lawlor

Abstract:

Technological innovation is frequently defined in terms of bringing a new invention to market through a relatively straightforward process of diffusion. In reality, this process is complex and non-linear in nature, and includes social and cognitive factors that influence the development of an emerging technology and its related market or environment. As recent studies contend technological trajectory is part of technological paradigms, which arise from the expectations and desires of industry agents and results in co-evolution, it may be realised that social factors play a major role in the development of a technology. It is conjectured that collective social behaviour is fuelled by individual motivations and expectations, which inform the possibilities and uses for a new technology. The individual outlook highlights the issues present at the micro-level of developing a technology. Accordingly, this may be zoomed out to realise how these embedded social structures, influence activities and expectations at a macro level and can ultimately strategically shape the development and use of a technology. These social factors rely on communication to foster the innovation process. As innovation may be defined as the implementation of inventions, technological change results from the complex interactions and feedback occurring within an extended environment. The framework presented in this paper, recognises that social mechanisms provide the basis for an iterative dialogue between an innovator, a new technology, and an environment - within which social and cognitive ‘identity-shaping’ elements of the innovation process occur. Identity-shaping characteristics indicate that an emerging technology has a performative nature that transforms, alters, and ultimately configures the environment to which it joins. This identity–shaping quality is termed as ‘performative’. This paper examines how technologies evolve within a socio-technological sphere and how 'performativity' facilitates the process. A framework is proposed that incorporates the performative elements which are identified as feedback, iteration, routine, expectations, and motivations. Additionally, the concept of affordances is employed to determine how the role of the innovator and technology change over time - constituting a more conducive environment for successful innovation.

Keywords: affordances, framework, performativity, strategic innovation

Procedia PDF Downloads 198
11130 Air Quality Forecast Based on Principal Component Analysis-Genetic Algorithm and Back Propagation Model

Authors: Bin Mu, Site Li, Shijin Yuan

Abstract:

Under the circumstance of environment deterioration, people are increasingly concerned about the quality of the environment, especially air quality. As a result, it is of great value to give accurate and timely forecast of AQI (air quality index). In order to simplify influencing factors of air quality in a city, and forecast the city’s AQI tomorrow, this study used MATLAB software and adopted the method of constructing a mathematic model of PCA-GABP to provide a solution. To be specific, this study firstly made principal component analysis (PCA) of influencing factors of AQI tomorrow including aspects of weather, industry waste gas and IAQI data today. Then, we used the back propagation neural network model (BP), which is optimized by genetic algorithm (GA), to give forecast of AQI tomorrow. In order to verify validity and accuracy of PCA-GABP model’s forecast capability. The study uses two statistical indices to evaluate AQI forecast results (normalized mean square error and fractional bias). Eventually, this study reduces mean square error by optimizing individual gene structure in genetic algorithm and adjusting the parameters of back propagation model. To conclude, the performance of the model to forecast AQI is comparatively convincing and the model is expected to take positive effect in AQI forecast in the future.

Keywords: AQI forecast, principal component analysis, genetic algorithm, back propagation neural network model

Procedia PDF Downloads 211
11129 Corruption in the Financial Services Industry: Is Regulation the Panacea?

Authors: Maria Krambia-Kapardis, Elisavet Charalambous

Abstract:

Corruption has given rise to extensive discussion due to its notorious consequences. It undermines democracy, brings in inequalities and imbalances and weakens governance. With the recent financial turmoil pinpointing that corruption has played a vital part, lessons have to be learned and actions have to be taken. Regulation can be the means for doing so as it advances transparency and accountability, leaving no space for corruption to flourish. Much depends though on the culture of a state and how determined it is to mark the end of corruption.

Keywords: banking regulation, corruption, culture, European Union

Procedia PDF Downloads 503
11128 Scope of Virtualization

Authors: Pavneet Kaur, Palak Sharma

Abstract:

Virtualization is a term that basically describe creation of virtual version of something like operating system, network, etc. Virtualization is a technology which is in use from 1970, but with new developments and inventions, it is now useful in education, software development etc. This paper will describe basic introduction of virtualization, along with its various categories. It will also describe use of virtualization in software engineering, its various benefits and shortcomings.

Keywords: virtualization, hardware, software, os

Procedia PDF Downloads 359
11127 Determination of the Knowledge Level of Healthcare Professional's Working at the Emergency Services in Turkey about Their Approaches to Common Forensic Cases

Authors: E. Tuğba Topçu, Ebru E. Kazan, Erhan Büken

Abstract:

Emergency nurses are the first health care professional to generally observe the patients, communicate patients’ family or relatives, touch the properties of patients and contact to laboratory sample of patients. Also, they are the encounter incidents related crime, people who engage in violence or suspicious injuries frequently. So, documentation of patients’ condition came to the hospital and conservation of evidence are important in the inquiry of forensic medicine. The aim of the study was to determine the knowledge level of healthcare professional working at the emergency services regarding their approaches to common forensic cases. The study was comprised of 404 healthcare professional working (nurse, emergency medicine technician, health officer) at the emergency services of 6 state hospitals, 6 training and 6 research hospitals and 3 university hospitals in Ankara. Data was collected using questionnaire form which was developed by researches in the direction of literature. Questionnaire form is comprised of two sections. The first section includes 17 questions related demographic information about health care professional and 4 questions related Turkish laws. The second section includes 43 questions to the determination of knowledge level of health care professional’s working in the emergency department, about approaches to frequently encountered forensic cases. For the data evaluation of the study; Mann Whitney U test, Bonferroni correction Kruskal Wallis H test and Chi Square tests have been used. According to study, it’s said that there is no forensic medicine expert in the foundation by 73.4% of health care professionals. Two third (66%) of participants’ in emergency department reported daily average 7 or above forensic cases applied to the emergency department and 52.1% of participants did not evaluate incidents came to the emergency department as a forensic case. Most of the participants informed 'duty of preservation of evidence' is health care professionals duty related forensic cases. In result, we determinated that knowledge level of health care professional working in the emergency department, about approaches to frequently encountered forensic cases, is not the expected level. Because we found that most of them haven't received education about forensic nursing.Postgraduates participants, educated health professional about forensic nursing, staff who applied to sources about forensic nursing and staff who evaluated emergency department cases as forensic cases have significantly higher level of knowledge. Moreover, it’s found that forensic cases diagnosis score is the highest in health officer and university graduated. Health care professional’s deficiency in knowledge about forensic cases can cause defects in operation of the forensic process because of mistakes in collecting and conserving of evidence. It is obvious that training about the approach to forensic nursing should be arranged.

Keywords: emergency nurses, forensic case, forensic nursing, level of knowledge

Procedia PDF Downloads 281
11126 Communication Tools Used in Teaching and Their Effects: An Empirical Study on the T. C. Selcuk University Samples

Authors: Sedat Simsek, Tugay Arat

Abstract:

Today's communication concept, which has a great revolution with the printing press which has been found by Gutenberg, has no boundary thanks to advanced communication devices and the internet. It is possible to take advantage in many areas, such as from medicine to social sciences or from mathematics to education, from the computers that was first produced for the purpose of military services. The use of these developing technologies in the field of education has created a great vision changes in both training and having education. Materials, which can be considered as basic communication resources and used in traditional education has begun to lose its significance, and some technologies have begun to replace them such as internet, computers, smart boards, projection devices and mobile phone. On the other hand, the programs and applications used in these technologies have also been developed. University students use virtual books instead of the traditional printed book, use cell phones instead of note books, use the internet and virtual databases instead of the library to research. They even submit their homework with interactive methods rather than printed materials. The traditional education system, these technologies, which increase productivity, have brought a new dimension to education. The aim of this study is to determine the influence of technologies in the learning process of students and to find whether is there any similarities and differences that arise from the their faculty that they have been educated and and their learning process. In addition to this, it is aimed to determine the level of ICT usage of students studying at the university level. In this context, the advantages and conveniences of the technology used by students are also scrutinized. In this study, we used surveys to collect data. The data were analyzed by using SPSS 16 statistical program with the appropriate testing.

Keywords: education, communication technologies, role of technology, teaching

Procedia PDF Downloads 292
11125 Maintenance Work Order Management Tool (Desktop & Mobile Solution)

Authors: Haitham Al Rawahi

Abstract:

Oman Electricity Transmission Company (OETC) has implemented Computerized Maintenance Management System (CMMS), which is based on Oracle enterprise asset management model e-AM. This was implemented with cooperation of Nama Shared Services (NSS). CMMS is mainly used to create maintenance work orders with a preconfigured workflow of defined maintenance schedules/plans, required resources, and materials, obtaining shutdown approvals, completing maintenance activities, and closing the work orders. Furthermore, CMMS is also configured with asset failure classifications, asset hierarchy, asset maintenance activities, integration with spare inventories, etc. Since the year 2017, site engineer is working on CMMS by filling-in manually all related maintenance and inspection records on paper forms and then scanning and attaching it in CMMS for further analysis. Site engineer will finalize all paper works at site and then goes back to office to scan and attach it to work order in CMMS. This creates sub tasks for site engineer and makes it very difficult and lengthy process. Also, there is a significant risk for missing or deleted important fields on the paper due to usage of pen to fill the paper. In addition to that, site engineer may take time and days working outside of the office. therefore, OETC has decided to digitize these inspection and maintenance forms in one platform in CMMS, and it can be opened with both functionalities online and offline. The ArcGIS product formats or web-enabled solutions which has ability to access from mobile and desktop devices via arc map modules will be used too. The purpose of interlinking is to setup for maintenance and inspection forms to work orders in e-AM, which the site engineer has daily interactions with. This ArcGIS environment or tool is designed to link with e-AM, so when site engineer opens this application from the site and a window will take him through same ArcGIS. This window opens the maintenance forms and shows the required fields to fill-in and save the work through his mobile application. After saving his work with the availability of network (Off/In) line, notification will trigger to his line manager to review and take further actions (approve/reject/request more information). In this function, the user can see the assigned work orders to his departments as well as chart of all work orders with status. The approver has ability to see the statistics of all work.

Keywords: e-AM, GIS, CMMS, integration

Procedia PDF Downloads 80
11124 Accessibility of Social Justice through Social Security in Indian Organisations: Analysis Based on Workforce

Authors: Neelima Rashmi Lakra

Abstract:

India was among one of the highly developed economy up to 1850 due to its cottage industries. During the end of the 18th century, modern industrial enterprises began with the first cotton mill in Bombay, the jute mill near Calcutta and the coal mine in Raniganj. This was counted as the real beginning of industry in 1854 in India. Prior to this period people concentrated only to agriculture, menial service or handicraft, and the introduction of industries exposed them to the disciplines of factory which was very tedious for them. With increasing number of factories been setup adding on to mining and introduction of railway, World War Period (1914-19), Second World War Period (1939-45) and the Great Depression (1929-33) there were visible change in the nature of work for the people, which resulted in outburst of strike for various reasons in these factories. Here, with India’s independence there was emergence of public sector industries and labour legislations were introduced. Meanwhile, trade unions came to notice to the rescue of the oppressed but failed to continue till long. Soon after, with the New Economic Policy organisations came across to face challenges to perform their best, where social justice for the workmen was in question. On these backdrops, studies were found discussing the central human capabilities which could be addressed through Social Security schemes. Therefore, this study was taken up to look at the reforms and legislations mainly meant for the welfare of the labour. This paper will contribute to the large number of Indian population who are serving in public sectors in India since the introduction of industries and will complement the issue of social justice through social security measures among this huge crowd serving the nation. The objectives of the study include; to find out what labour Legislations have already been existing in India, the role of Trade Union Movement, to look at the effects of New Economic Policy on these reforms and its effects and measures taken for the workforce employed in the public sectors and finally, if these measures fulfil the social justice aspects for the larger society on whole. The methodology followed collection of data from books, journal articles, reports, company reports and manuals focusing mainly on Indian studies and the data was analysed following content analysis method. The findings showed the measures taken for Social Security, but there were also reflections of very few particular additions or amendments to these Acts and provisions with the onset of New Liberalisation Policy. Therefore, the study concluded examining the social justice aspects in the context of a developing economy and discussing the recommendations.

Keywords: public sectors, social justice, social security schemes, trade union movement

Procedia PDF Downloads 438