Search results for: entertainment computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1212

Search results for: entertainment computing

732 Exploring the Role of Humorous Dialogues in Advertisements of Pakistani Network Companies: Analysis of Discourses through Multi-Modal Critical Approach

Authors: Jane E. Alam Solangi

Abstract:

The contribution of the study is to explore the important part of humorous dialogues in cellular network advertisements. This promotes the message of valuable construction and promotion of network companies in Pakistan that employ different and broad techniques to give promotion to selling products. It merely instigates the consumers to buy it. The results of the study after analysis of its collected data gives a vision that advertisers of network advertisements use humorous dialogues as a significant device to the greater level. The source of entertainment in the advertisement is accompanied by the texts and humorous discourses to influence buying decisions of the consumers. Therefore, it tends to neutralize personal and social based values. The earlier contribution of scholars presented that the technical employment of humorous devices leads to the successful market of the relevant products. In order to analyze the humorous discourse devices, the approach of multi-modality of Fairclough (1989) is used. It is accompanied by the framework of Kress and van Leeuwen’s (1996). It analyzes the visual graph of the grammar. The overall findings in the study verified the role of humorous devices in the captivation of consumers’ decision to buy the product that interests them. Therefore, the role of humor acts as a breaker of the monotonous rhythm of advertisements.

Keywords: advertisements, devices, humorous, multi-modality, networks, Pakistan

Procedia PDF Downloads 79
731 Crowdfunding in Funding Lithuanian Movies

Authors: Irena Alperyte

Abstract:

Since the regaining of the Independence, the Lithuanian state has been confronting an increasingly dramatic challenge because of the lack of funding sources dedicated to the film industries. During the Soviet times, Lithuanian film was under a total supervision of the Soviet functioners. This means that the responsibility of the state to make movies was of a monopolist character. The filmmakers’ community of the newly independent state needed to learn how to develop their fundraising skills, co-production and marketing techniques. Currently, Lithuanian film is experiencing a new phase concerning its funding: it is exploring the possibilities of motivating the public to invest in entertainment via crowd funding and crowd sourcing techniques and making these activities an alternative way of funding films. The paper aims at the exploration of the existing film financing practices in Lithuania and abroad and provides recommendations on how to improve the alternative Lithuanian film financing strategy via employing new possibilities, such as crowd funding and other alternative marketing tools. Objectives: 1) To examine the theories on creative industries and possibilities for their application. 2) To analyze the current situation in the film industry Lithuania. 3) To analyze the statistical data on movie theater visitors in Lithuania. 4) To discuss alternative options for film financing system. 5) To look through the alternative funding strategies tailored for Lithuanian film industry. 6) To propose recommendations for alternative funding strategies in Lithuanian film fundraising.

Keywords: creative industries, film, funding, fun theory

Procedia PDF Downloads 322
730 Methods for Solving Identification Problems

Authors: Fadi Awawdeh

Abstract:

In this work, we highlight the key concepts in using semigroup theory as a methodology used to construct efficient formulas for solving inverse problems. The proposed method depends on some results concerning integral equations. The experimental results show the potential and limitations of the method and imply directions for future work.

Keywords: identification problems, semigroup theory, methods for inverse problems, scientific computing

Procedia PDF Downloads 456
729 Vibration Energy Harvesting from Aircraft Structure Using Piezoelectric Transduction

Authors: M. Saifudin Ahmed Atique, Santosh Paudyal, Caixia Yang

Abstract:

In an aircraft, a great portion of energy is wasted due to its inflight structural vibration. Structural components vibrate due to aeroelastic instabilities, gust perturbations and engine rotation at very high rpm. Energy losses due to mechanical vibration can be utilized by harvesting energy from aircraft structure as electrical energy. This harvested energy can be stored in battery panels built into aircraft fuselage and can be used to power inflight auxiliary accessories i.e., lighting and entertainment systems. Moreover, this power can be used for wireless Structural Health Monitoring System (SHM) for aircraft and as an excellent replacement of aircraft Ground Power Unit (GPU)/Auxiliary Power Unit (APU) during passenger onboard time to power aircraft cabin accessories to reduce aircraft ground operation cost significantly. In this paper, we propose the design of a noble aircraft wing in which Piezoelectric panels placed under the composite skin of aircraft wing will generate electrical charges from any inflight aerodynamics or mechanical vibration and store it into battery to power auxiliary inflight systems/accessories as per requirement. Experimental results show that a well-engineered piezoelectric energy harvester based aircraft wing can produce adequate energy to support in-flight lighting and auxiliary cabin accessories.

Keywords: vibration energy, aircraft wing, piezoelectric material, inflight accessories

Procedia PDF Downloads 132
728 Internet of Things, Edge and Cloud Computing in Rock Mechanical Investigation for Underground Surveys

Authors: Esmael Makarian, Ayub Elyasi, Fatemeh Saberi, Olusegun Stanley Tomomewo

Abstract:

Rock mechanical investigation is one of the most crucial activities in underground operations, especially in surveys related to hydrocarbon exploration and production, geothermal reservoirs, energy storage, mining, and geotechnics. There is a wide range of traditional methods for driving, collecting, and analyzing rock mechanics data. However, these approaches may not be suitable or work perfectly in some situations, such as fractured zones. Cutting-edge technologies have been provided to solve and optimize the mentioned issues. Internet of Things (IoT), Edge, and Cloud Computing technologies (ECt & CCt, respectively) are among the most widely used and new artificial intelligence methods employed for geomechanical studies. IoT devices act as sensors and cameras for real-time monitoring and mechanical-geological data collection of rocks, such as temperature, movement, pressure, or stress levels. Structural integrity, especially for cap rocks within hydrocarbon systems, and rock mass behavior assessment, to further activities such as enhanced oil recovery (EOR) and underground gas storage (UGS), or to improve safety risk management (SRM) and potential hazards identification (P.H.I), are other benefits from IoT technologies. EC techniques can process, aggregate, and analyze data immediately collected by IoT on a real-time scale, providing detailed insights into the behavior of rocks in various situations (e.g., stress, temperature, and pressure), establishing patterns quickly, and detecting trends. Therefore, this state-of-the-art and useful technology can adopt autonomous systems in rock mechanical surveys, such as drilling and production (in hydrocarbon wells) or excavation (in mining and geotechnics industries). Besides, ECt allows all rock-related operations to be controlled remotely and enables operators to apply changes or make adjustments. It must be mentioned that this feature is very important in environmental goals. More often than not, rock mechanical studies consist of different data, such as laboratory tests, field operations, and indirect information like seismic or well-logging data. CCt provides a useful platform for storing and managing a great deal of volume and different information, which can be very useful in fractured zones. Additionally, CCt supplies powerful tools for predicting, modeling, and simulating rock mechanical information, especially in fractured zones within vast areas. Also, it is a suitable source for sharing extensive information on rock mechanics, such as the direction and size of fractures in a large oil field or mine. The comprehensive review findings demonstrate that digital transformation through integrated IoT, Edge, and Cloud solutions is revolutionizing traditional rock mechanical investigation. These advanced technologies have empowered real-time monitoring, predictive analysis, and data-driven decision-making, culminating in noteworthy enhancements in safety, efficiency, and sustainability. Therefore, by employing IoT, CCt, and ECt, underground operations have experienced a significant boost, allowing for timely and informed actions using real-time data insights. The successful implementation of IoT, CCt, and ECt has led to optimized and safer operations, optimized processes, and environmentally conscious approaches in underground geological endeavors.

Keywords: rock mechanical studies, internet of things, edge computing, cloud computing, underground surveys, geological operations

Procedia PDF Downloads 36
727 Mental Health Representation in Video Games

Authors: Leonid Rybakovski

Abstract:

Contemporary media offer a variety of themes for the diverse tastes of their audiences. The Digital games medium was mostly perceived as an instrument of entertainment. But being a part of global trends while constantly pushing the boundaries of storytelling in virtual reality and standing on the edge of technology also brings huge responsibility for game designers around the globe. A very recent emerging topic over the last years was an individual's mental state. In recent years there has been a shift in mental problems representations in commercial game releases such as Hell blade: Senua's Sacrifice and Sea of Solitude. The aim of this study is to research the approach of mental illness representation in media and digital games over the years and to suggest alternatives for putting characters who suffer from mental illness at the forefront of the storyline. This study traces dominant representations of characters with mental illness in digital games, reflecting the major change of the game industry toward inclusiveness. At the same time, the research embraces a hybrid approach to the academic study of digital games and includes the development of a game that follows a post-traumatic young girl, forcing the users to live her life through her eyes. The game prototype was developed as part of the Mdes Game Design and Development program and consisted of academic research and game development practices.

Keywords: framing analysis, mental condition, up keying, game mechanics

Procedia PDF Downloads 151
726 ABET Accreditation Process for Engineering and Technology Programs: Detailed Process Flow from Criteria 1 to Criteria 8

Authors: Amit Kumar, Rajdeep Chakrabarty, Ganesh Gupta

Abstract:

This paper illustrates the detailed accreditation process of Accreditation Board of Engineering and Technology (ABET) for accrediting engineering and Technology programs. ABET is a non-governmental agency that accredits engineering and technology, applied and natural sciences, and computing sciences programs. ABET was founded on 10th May 1932 and was founded by Institute of Electrical and Electronics Engineering. International industries accept ABET accredited institutes having the highest standards in their academic programs. In this accreditation, there are eight criteria in general; criterion 1 describes the student outcome evaluations, criteria 2 measures the program's educational objectives, criteria 3 is the student outcome calculated from the marks obtained by students, criteria 4 establishes continuous improvement, criteria 5 focus on curriculum of the institute, criteria 6 is about faculties of this institute, criteria 7 measures the facilities provided by the institute and finally, criteria 8 focus on institutional support towards staff of the institute. In this paper, we focused on the calculative part of each criterion with equations and suitable examples, the files and documentation required for each criterion, and the total workflow of the process. The references and the values used to illustrate the calculations are all taken from the samples provided at ABET's official website. In the final section, we also discuss the criterion-wise score weightage followed by evaluation with timeframe and deadlines.

Keywords: Engineering Accreditation Committee, Computing Accreditation Committee, performance indicator, Program Educational Objective, ABET Criterion 1 to 7, IEEE, National Board of Accreditation, MOOCS, Board of Studies, stakeholders, course objective, program outcome, articulation, attainment, CO-PO mapping, CO-PO-SO mapping, PDCA cycle, degree certificates, course files, course catalogue

Procedia PDF Downloads 40
725 English Pronunciation Materials on TikTok

Authors: Sebastian Leal-Arenas

Abstract:

TikTok’s influence on contemporary society is undeniable. The impact of the mobile app transcends entertainment, as shown by the growing presence of specialized accounts dedicated to providing educational content, particularly as it pertains to language learning. However, the prevailing trend on the platform is vocabulary and grammar acquisition, neglecting a critical component: pronunciation. This study examines English pronunciation materials available on TikTok by taking a comprehensive approach that incorporates established assessment tools, such as the Learning Object Review Instrument and the Framework for Language Learning App Evaluation. Furthermore, novel evaluation categories are introduced to provide a more holistic assessment of these educational resources. 60 English pronunciation videos were part of the analysis. The findings reveal that these audio-visual materials present clear audio bolstered by high-quality video content and automatically generated closed captions. These three components enhance the comprehensibility of the input, making these concise videos valuable assets for language learners. Nevertheless, certain deficiencies are observed, such as the lack of emphasis on specific segments and their relationship with articulators. Improvements and refinements are discussed, as well as their potential utility within the language classroom. This study contributes to the ongoing investigation of multimedia materials used for language teaching and emphasizes the need to adapt pronunciation instruction methods to today’s technology.

Keywords: pronunciation, segments, teaching materials, technology

Procedia PDF Downloads 54
724 Assessing the Attitude and Belief towards Online Advertisement in Pakistan and China Mainland

Authors: Prih Bukhari

Abstract:

The purpose of the proposed paper is to determine if the perception of online advertisement formed due to attitude and belief vary among two different countries or not. Specifically, it seeks to find out how people from China and Pakistan perceive online advertisement. Public attitude and belief towards advertising have been a focus of attention to explore a path to a better strategy of advertising. The ‘belief’ factor was analyzed through 4 items, i.e., product information, entertainment, and increase in economy’ whereas, the ‘attitude’ factor was analyzed thorough questions based on 4 items, i.e. ‘overall, I consider online advertising a good thing’; 'overall, I like online advertising’; ‘'I consider online advertising very essential’; and 'I would describe my overall attitude toward online advertising very favorably’. As such, it provides theoretical basis to explain similarities and differences of beliefs and attitude towards advertising across the two countries. Given its mixed method approach, both quantitative and qualitative method is used to carry out research. A questionnaire-based survey and focus group interviews were conducted. The sample size was of 500 participants. For analysis survey copies were then collected from which 497 were received whereas focus group interviews were collected from both nations. The findings showed that the belief factor among both countries had no significant relation with the perception of online advertisement. However, the attitude had a significant relation with the perception about online advertisement. Also it was observed that despite of different backgrounds, perception about online advertisement based on beliefs and attitude were found largely to be similar. Implications and future studies are provided.

Keywords: attitude, belief, online advertisement, perception

Procedia PDF Downloads 124
723 Being Your Own First Responder: A Training to Identify and Respond to Mental Health

Authors: Joe Voshall, Leigha Shoup

Abstract:

In 2022, the Ohio Peace Officer Training Council and the Attorney General required officers to complete a minimum of 24 hours of continued professional training for the year. Much of the training was based on Mental Health or similarly related topics. This includes Officer Wellness and Officer Mental Health. It is becoming clearer that the stigma of Officer / First Responder Mental Health is a topic that is becoming more prevalently faced. To assist officers and first responders in facing mental health issues, we are developing new training. This training will aid in recognizing mental health-related issues in officers/first responders and citizens, as well as further using the same information to better respond and interact with one another and the public. In general, society has many varying views of mental health, much of which is largely over-sensationalized by television, movies, and other forms of entertainment. There has also been a stigma in law enforcement / first responders related to mental health and being weak as a result of on-the-job-related trauma-induced struggles. It is our hope this new training will assist officers and first responders in not only positively facing and addressing their mental health but using their own experience and education to recognize signs and symptoms of mental health within individuals in the community. Further, we hope that through this recognition, officers and first responders can use their experiences and more in-depth understanding to better interact within the field and with the public. Through recognition and better understanding of mental health issues and more positive interaction with the public, additional achievements are likely to result. This includes in the removal of bias and stigma for everyone.

Keywords: law enforcement, mental health, officer related mental health, trauma

Procedia PDF Downloads 124
722 Using SMS Mobile Technology to Assess the Mastery of Subject Content Knowledge of Science and Mathematics Teachers of Secondary Schools in Tanzania

Authors: Joel S. Mtebe, Aron Kondoro, Mussa M. Kissaka, Elia Kibga

Abstract:

Sub-Saharan Africa is described as the second fastest growing mobile phone penetration in the world more than in the United States or the European Union. Mobile phones have been used to provide a lot of opportunities to improve people’s lives in the region such as in banking, marketing, entertainment, and paying various bills such as water, TV, and electricity. However, the potential of using mobile phones to enhance teaching and learning has not been explored. This study presents an experience of developing and delivering SMS quizzes questions that were used to assess mastery of the subject content knowledge of science and mathematics secondary school teachers in Tanzania. The SMS quizzes were used as a follow up support mechanism to 500 teachers who participated in a project to upgrade subject content knowledge of science and mathematics subjects. Quizzes of 10-15 questions were sent to teachers each week for 8 weeks and the results were analyzed using SPSS. The results showed that chemistry and biology had better performance compared to mathematics and physics. Teachers reported some challenges that led to poor performance, invalid answers, and non-responses and they are presented. This research has several practical implications for those who are implementing or planning to use mobile phones for teaching and learning especially in rural secondary schools in sub-Saharan Africa.

Keywords: mobile learning, elearning, educational technolgies, SMS, secondary education, assessment

Procedia PDF Downloads 258
721 The Power of Social Media Influencers: A Study of Public Perception of Credibility Among Kuwaitis

Authors: Fatima Alsalem

Abstract:

Objectives: This study aims to explore the perceived credibility of social media influencers and their effect on purchase intention. In addition, the study aims to investigate the relationship between satisfaction with content promoted via social media and its relation to purchasing intention. Methodology: This study uses an exploratory and quantitative methodology. It was implemented through a cross-sectional survey that asked respondents to identify the time they spend using social media, satisfaction with influencers’ content, types of influencers they prefer, motivations to use social media, purchase intention of products promoted by influencers, as well as three credibility dimensions. Sample: the sample included 1184 Kuwaiti nationals, of which 50.4% (N=593) were males and 49.6% (N=584) were females. Results: The analysis of the data indicated that comedy and entertainment influencers are the most preferred type of influencers, while fashion influencers “fashionistas” are the least preferred. Based on the results of the regression analysis, the perceived credibility of influencers and satisfaction with their content is positively related to higher purchase intention. While all dimensions of credibility are positively related to higher purchase intention, attractiveness is the strongest predictor. Conclusion: The significant value of this study is the examination of the perceived credibility of influencers and the type of influencer social media users prefer to follow. The current research proves that the attractiveness of influencers is the highest dimension of their perceived credibility, which was prevalent in the findings.

Keywords: influencers, social media, mass media, credibility

Procedia PDF Downloads 199
720 Research and Implementation of Cross-domain Data Sharing System in Net-centric Environment

Authors: Xiaoqing Wang, Jianjian Zong, Li Li, Yanxing Zheng, Jinrong Tong, Mao Zhan

Abstract:

With the rapid development of network and communication technology, a great deal of data has been generated in different domains of a network. These data show a trend of increasing scale and more complex structure. Therefore, an effective and flexible cross-domain data-sharing system is needed. The Cross-domain Data Sharing System(CDSS) in a net-centric environment is composed of three sub-systems. The data distribution sub-system provides data exchange service through publish-subscribe technology that supports asynchronism and multi-to-multi communication, which adapts to the needs of the dynamic and large-scale distributed computing environment. The access control sub-system adopts Attribute-Based Access Control(ABAC) technology to uniformly model various data attributes such as subject, object, permission and environment, which effectively monitors the activities of users accessing resources and ensures that legitimate users get effective access control rights within a legal time. The cross-domain access security negotiation subsystem automatically determines the access rights between different security domains in the process of interactive disclosure of digital certificates and access control policies through trust policy management and negotiation algorithms, which provides an effective means for cross-domain trust relationship establishment and access control in a distributed environment. The CDSS’s asynchronous,multi-to-multi and loosely-coupled communication features can adapt well to data exchange and sharing in dynamic, distributed and large-scale network environments. Next, we will give CDSS new features to support the mobile computing environment.

Keywords: data sharing, cross-domain, data exchange, publish-subscribe

Procedia PDF Downloads 103
719 Pipat Ensemble and Music for Ligkey in Amphur Muaeng, Chachoengsao Province

Authors: Prasan Briboonnanggoul

Abstract:

The major objective of this research study was to explore some aspects of the performance culture of musical folk drama called Ligkey. This study was undertaken in an effect to focus on the specific functions of orchestra which accompanied Ligkey on Thai musical instruments in Chachoengsao Province. The process of study and exploration consisted of questionnaire, interview, a tape recording of an interview and photographs of performances which all of them were analyzed for the finding. The information obtained from the study indicated that Ligkey still received stable attention from people despite lesser performances affected by economics crisis. Almost all of the performances were organized and supported by both the public sector and the private sector. Based on the summary and finding of this study, a) there were ten Ligkey ensemble and ten orchestra which were Mon orchestra, not the precedent and the predecessor known as Thai orchestra; b) a variety of functions performed by musicians must harmonize discipline, punctuality, patience, no negligence, proficiency in performance; c) folklore melodies known as Plengnapad were performed as usual, but folklore melodies and songs known as Plangsongchan got lesser and got a tendency towards extinction because of the plot which corresponded with a market-driven entertainment. Therefore, a purpose-built schema of the preservation of Thai folklore songs was that they should have been recognized by both the performers and the audiences and patronized by the public sector via the government media to publicize the value of popular art form.

Keywords: Pipat Ensemble, Ligkey, Amphur Muaeng, Chachoengsao Province

Procedia PDF Downloads 307
718 Enhancing Scalability in Ethereum Network Analysis: Methods and Techniques

Authors: Stefan K. Behfar

Abstract:

The rapid growth of the Ethereum network has brought forth the urgent need for scalable analysis methods to handle the increasing volume of blockchain data. In this research, we propose efficient methodologies for making Ethereum network analysis scalable. Our approach leverages a combination of graph-based data representation, probabilistic sampling, and parallel processing techniques to achieve unprecedented scalability while preserving critical network insights. Data Representation: We develop a graph-based data representation that captures the underlying structure of the Ethereum network. Each block transaction is represented as a node in the graph, while the edges signify temporal relationships. This representation ensures efficient querying and traversal of the blockchain data. Probabilistic Sampling: To cope with the vastness of the Ethereum blockchain, we introduce a probabilistic sampling technique. This method strategically selects a representative subset of transactions and blocks, allowing for concise yet statistically significant analysis. The sampling approach maintains the integrity of the network properties while significantly reducing the computational burden. Graph Convolutional Networks (GCNs): We incorporate GCNs to process the graph-based data representation efficiently. The GCN architecture enables the extraction of complex spatial and temporal patterns from the sampled data. This combination of graph representation and GCNs facilitates parallel processing and scalable analysis. Distributed Computing: To further enhance scalability, we adopt distributed computing frameworks such as Apache Hadoop and Apache Spark. By distributing computation across multiple nodes, we achieve a significant reduction in processing time and enhanced memory utilization. Our methodology harnesses the power of parallelism, making it well-suited for large-scale Ethereum network analysis. Evaluation and Results: We extensively evaluate our methodology on real-world Ethereum datasets covering diverse time periods and transaction volumes. The results demonstrate its superior scalability, outperforming traditional analysis methods. Our approach successfully handles the ever-growing Ethereum data, empowering researchers and developers with actionable insights from the blockchain. Case Studies: We apply our methodology to real-world Ethereum use cases, including detecting transaction patterns, analyzing smart contract interactions, and predicting network congestion. The results showcase the accuracy and efficiency of our approach, emphasizing its practical applicability in real-world scenarios. Security and Robustness: To ensure the reliability of our methodology, we conduct thorough security and robustness evaluations. Our approach demonstrates high resilience against adversarial attacks and perturbations, reaffirming its suitability for security-critical blockchain applications. Conclusion: By integrating graph-based data representation, GCNs, probabilistic sampling, and distributed computing, we achieve network scalability without compromising analytical precision. This approach addresses the pressing challenges posed by the expanding Ethereum network, opening new avenues for research and enabling real-time insights into decentralized ecosystems. Our work contributes to the development of scalable blockchain analytics, laying the foundation for sustainable growth and advancement in the domain of blockchain research and application.

Keywords: Ethereum, scalable network, GCN, probabilistic sampling, distributed computing

Procedia PDF Downloads 44
717 Use Cloud-Based Watson Deep Learning Platform to Train Models Faster and More Accurate

Authors: Susan Diamond

Abstract:

Machine Learning workloads have traditionally been run in high-performance computing (HPC) environments, where users log in to dedicated machines and utilize the attached GPUs to run training jobs on huge datasets. Training of large neural network models is very resource intensive, and even after exploiting parallelism and accelerators such as GPUs, a single training job can still take days. Consequently, the cost of hardware is a barrier to entry. Even when upfront cost is not a concern, the lead time to set up such an HPC environment takes months from acquiring hardware to set up the hardware with the right set of firmware, software installed and configured. Furthermore, scalability is hard to achieve in a rigid traditional lab environment. Therefore, it is slow to react to the dynamic change in the artificial intelligent industry. Watson Deep Learning as a service, a cloud-based deep learning platform that mitigates the long lead time and high upfront investment in hardware. It enables robust and scalable sharing of resources among the teams in an organization. It is designed for on-demand cloud environments. Providing a similar user experience in a multi-tenant cloud environment comes with its own unique challenges regarding fault tolerance, performance, and security. Watson Deep Learning as a service tackles these challenges and present a deep learning stack for the cloud environments in a secure, scalable and fault-tolerant manner. It supports a wide range of deep-learning frameworks such as Tensorflow, PyTorch, Caffe, Torch, Theano, and MXNet etc. These frameworks reduce the effort and skillset required to design, train, and use deep learning models. Deep Learning as a service is used at IBM by AI researchers in areas including machine translation, computer vision, and healthcare. 

Keywords: deep learning, machine learning, cognitive computing, model training

Procedia PDF Downloads 187
716 Chinese Undergraduates’ Trust in And Usage of Machine Translation: A Survey

Authors: Bi Zhao

Abstract:

Neural network technology has greatly improved the output of machine translation in terms of both fluency and accuracy, which greatly increases its appeal for young users. The present exploratory study aims to find out how the Chinese undergraduates perceive and use machine translation in their daily life. A survey is conducted to collect data from 100 undergraduate students from multiple Chinese universities and with varied academic backgrounds, including arts, business, science, engineering, and medicine. The survey questions inquire about their use (including frequency, scenarios, purposes, and preferences) of and attitudes (including trust, quality assessment, justifications, and ethics) toward machine translation. Interviews and tasks of evaluating machine translation output are also employed in combination with the survey on a sample of selected respondents. The results indicate that Chinese undergraduate students use machine translation on a daily basis for a wide range of purposes in academic, communicative, and entertainment scenarios. Most of them have preferred machine translation tools, but the availability of machine translation tools within a certain scenario, such as the embedded machine translation tool on the webpage, is also the determining factor in their choice. The results also reveal that despite the reportedly limited trust in the accuracy of machine translation output, most students lack the ability to critically analyze and evaluate such output. Furthermore, the evidence is revealed of the inadequate awareness of ethical responsibility as machine translation users among Chinese undergraduate students.

Keywords: Chinese undergraduates, machine translation, trust, usage

Procedia PDF Downloads 107
715 Understanding Student Engagement through Sentiment Analytics of Response Times to Electronically Shared Feedback

Authors: Yaxin Bi, Peter Nicholl

Abstract:

The rapid advancement of Information and communication technologies (ICT) is extremely influencing every aspect of Higher Education. It has transformed traditional teaching, learning, assessment and feedback into a new era of Digital Education. This also introduces many challenges in capturing and understanding student engagement with their studies in Higher Education. The School of Computing at Ulster University has developed a Feedback And Notification (FAN) Online tool that has been used to send students links to personalized feedback on their submitted assessments and record students’ frequency of review of the shared feedback as well as the speed of collection. The feedback that the students initially receive is via a personal email directing them through to the feedback via a URL link that maps to the feedback created by the academic marker. This feedback is typically a Word or PDF report including comments and the final mark for the work submitted approximately three weeks before. When the student clicks on the link, the student’s personal feedback is viewable in the browser and they can view the contents. The FAN tool provides the academic marker with a report that includes when and how often a student viewed the feedback via the link. This paper presents an investigation into student engagement through analyzing the interaction timestamps and frequency of review by the student. We have proposed an approach to modeling interaction timestamps and use sentiment classification techniques to analyze the data collected over the last five years for a set of modules. The data studied is across a number of final years and second-year modules in the School of Computing. The paper presents the details of quantitative analysis methods and describes further their interactions with the feedback overtime on each module studied. We have projected the students into different groups of engagement based on sentiment analysis results and then provide a suggestion of early targeted intervention for the set of students seen to be under-performing via our proposed model.

Keywords: feedback, engagement, interaction modelling, sentiment analysis

Procedia PDF Downloads 76
714 Optimal Design of Linear Generator to Recharge the Smartphone Battery

Authors: Jin Ho Kim, Yujeong Shin, Seong-Jin Cho, Dong-Jin Kim, U-Syn Ha

Abstract:

Due to the development of the information industry and technologies, cellular phones have must not only function to communicate, but also have functions such as the Internet, e-banking, entertainment, etc. These phones are called smartphones. The performance of smartphones has improved, because of the various functions of smartphones, and the capacity of the battery has been increased gradually. Recently, linear generators have been embedded in smartphones in order to recharge the smartphone's battery. In this study, optimization is performed and an array change of permanent magnets is examined in order to increase efficiency. We propose an optimal design using design of experiments (DOE) to maximize the generated induced voltage. The thickness of the poleshoe and permanent magnet (PM), the height of the poleshoe and PM, and the thickness of the coil are determined to be design variables. We made 25 sampling points using an orthogonal array according to four design variables. We performed electromagnetic finite element analysis to predict the generated induced voltage using the commercial electromagnetic analysis software ANSYS Maxwell. Then, we made an approximate model using the Kriging algorithm, and derived optimal values of the design variables using an evolutionary algorithm. The commercial optimization software PIAnO (Process Integration, Automation, and Optimization) was used with these algorithms. The result of the optimization shows that the generated induced voltage is improved.

Keywords: smartphone, linear generator, design of experiment, approximate model, optimal design

Procedia PDF Downloads 327
713 Increasing Employee Productivity and Work Well-Being by Employing Affective Decision Support and a Knowledge-Based System

Authors: Loreta Kaklauskiene, Arturas Kaklauskas

Abstract:

This employee productivity and work well-being effective system aims to maximise the work performance of personnel and boost well-being in offices. Affective computing, decision support, and knowledge-based systems were used in our research. The basis of this effective system is our European Patent application (No: EP 4 020 134 A1) and two Lithuanian patents (LT 6841, LT 6866). Our study examines ways to support efficient employee productivity and well-being by employing mass-customised, personalised office environment. Efficient employee performance and well-being are managed by changing mass-customised office environment factors such as air pollution levels, humidity, temperature, data, information, knowledge, activities, lighting colours and intensity, scents, media, games, videos, music, and vibrations. These aspects of management generate a customised, adaptive environment for users taking into account their emotional, affective, and physiological (MAP) states measured and fed into the system. This research aims to develop an innovative method and system which would analyse, customise and manage a personalised office environment according to a specific user’s MAP states in a cohesive manner. Various values of work spaces (e.g., employee utilitarian, hedonic, perceived values) are also established throughout this process, based on the measurements that describe MAP states and other aspects related to the office environment. The main contribution of our research is the development of a real-time mass-customised office environment to boost employee performance and well-being. Acknowledgment: This work was supported by Project No. 2020-1-LT01-KA203-078100 “Minimizing the influence of coronavirus in a built environment” (MICROBE) from the European Union’s Erasmus + program.

Keywords: effective decision support and a knowledge-based system, human resource management, employee productivity and work well-being, affective computing

Procedia PDF Downloads 73
712 Learning English from Movies: An Exploratory Study

Authors: Yasamiyan Alolaywi

Abstract:

The sources of second language acquisition vary and depend on a learner’s preferences and choices; however, undoubtedly, the most effective methods provide authentic language input. This current study explores the effectiveness of watching movies as a means of English language acquisition. It explores university students’ views on the impact of this method in improving English language skills. The participants in this study were 74 students (25 males and 49 females) from the Department of English Language and Translation at Qassim University, Saudi Arabia. Data for this research were collected from questionnaires and individual interviews with several selected students. The findings of this study showed that many students watch movies frequently and for various purposes, the most important of which is entertainment. The students also admitted that movies help them acquire a great deal of vocabulary and develop their listening and writing skills. Also, the participants believed that exposure to a target language by native speakers helps enhance language fluency and proficiency. The students learn not only linguistic aspects from films but also other aspects, such as culture, lifestyle, and ways of thinking, in addition to learning other languages such as Spanish. In light of these results, some recommendations are proposed, such as verifying the feasibility of integrating media into a foreign language classroom. While this study covers aspects of the relationship between watching movies and English language acquisition, knowledge gaps remain that need to be filled by further research, such as on incorporating media into the educational process and how movie subtitles can improve learners’ language skills.

Keywords: language acquisition, English movies, EFL learners, perceptions

Procedia PDF Downloads 79
711 Theatre, Tea-Time and Harpsichords: Women’s Entertainment and Sensibility in Eighteenth-Century England

Authors: Ayako Otomo

Abstract:

This paper will examines the rise of a feminine orientation regarding arts and culture associated with the notion of Sensibility during the early part of the English long eighteenth century. As is widely known, the prosperous modernisation that occurred in this period was a significant factor in the nation taking a leading role in the emergent Enlightenment via the social, political and scientific advancement of Britain. As a result, this prompted the relaxing of the strictures of class and gender hierarchies in line with the new consumerism and cosmopolitanism of the nation. Accordingly, there was a significant increase of female involvement in artistic and cultural consumption. This can be understood in terms of the notion of Sensibility, associating it further with the fields of physiology, psychology and aesthetics, indebted in their turn to British Empiricism. This paper first traces the background of how women were recognisably involved in artistic and cultural circulation within an historical perspective that is articulated by the notion of Sensibility. Then, the discussion turns to the confluence of the issues of female association, creativity and the feminisation of the aesthetic of the arts and culture employing an interdisciplinary perspective. Arts and culture can also classified by public and private social spheres and gender according to Jürgen Habermas. The relationship between women and the theatre became a public issue. Music-making such as playing the harpsichord, reading, and conversation within the ritualistic teatime space dominated many of the artistic and cultural activities within the domestic private sphere.

Keywords: theatre, arts, sensibility, 18th century England

Procedia PDF Downloads 340
710 Performance Comparison of Resource Allocation without Feedback in Wireless Body Area Networks by Various Pseudo Orthogonal Sequences

Authors: Ojin Kwon, Yong-Jin Yoon, Liu Xin, Zhang Hongbao

Abstract:

Wireless Body Area Network (WBAN) is a short-range wireless communication around human body for various applications such as wearable devices, entertainment, military, and especially medical devices. WBAN attracts the attention of continuous health monitoring system including diagnostic procedure, early detection of abnormal conditions, and prevention of emergency situations. Compared to cellular network, WBAN system is more difficult to control inter- and inner-cell interference due to the limited power, limited calculation capability, mobility of patient, and non-cooperation among WBANs. In this paper, we compare the performance of resource allocation scheme based on several Pseudo Orthogonal Codewords (POCs) to mitigate inter-WBAN interference. Previously, the POCs are widely exploited for a protocol sequence and optical orthogonal code. Each POCs have different properties of auto- and cross-correlation and spectral efficiency according to its construction of POCs. To identify different WBANs, several different pseudo orthogonal patterns based on POCs exploits for resource allocation of WBANs. By simulating these pseudo orthogonal resource allocations of WBANs on MATLAB, we obtain the performance of WBANs according to different POCs and can analyze and evaluate the suitability of POCs for the resource allocation in the WBANs system.

Keywords: wireless body area network, body sensor network, resource allocation without feedback, interference mitigation, pseudo orthogonal pattern

Procedia PDF Downloads 324
709 Bilateral Thalamic Hypodense Lesions in Computing Tomography

Authors: Angelis P. Barlampas

Abstract:

Purpose of Learning Objective: This case depicts the need for cooperation between the emergency department and the radiologist to achieve the best diagnostic result for the patient. The clinical picture must correlate well with the radiology report and when it does not, this is not necessarily someone’s fault. Careful interpretation and good knowledge of the limitations, advantages and disadvantages of each imaging procedure are essential for the final diagnostic goal. Methods or Background: A patient was brought to the emergency department by their relatives. He was suddenly confused and his mental status was altered. He hadn't any history of mental illness and was otherwise healthy. A computing tomography scan without contrast was done, but it was unremarkable. Because of high clinical suspicion of probable neurologic disease, he was admitted to the hospital. Results or Findings: Another T was done after 48 hours. It showed a hypodense region in both thalamic areas. Taking into account that the first CT was normal, but the initial clinical picture of the patient was alerting of something wrong, the repetitive CT exam is highly suggestive of a probable diagnosis of bilateral thalamic infractions. Differential diagnosis: Primary bilateral thalamic glioma, Wernicke encephalopathy, osmotic myelinolysis, Fabry disease, Wilson disease, Leigh disease, West Nile encephalitis, Greutzfeldt Jacob disease, top of the basilar syndrome, deep venous thrombosis, mild to moderate cerebral hypotension, posterior reversible encephalopathy syndrome, Neurofibromatosis type 1. Conclusion: As is the case of limitations for any imaging procedure, the same applies to CT. The acute ischemic attack can not depict on CT. A period of 24 to 48 hours has to elapse before any abnormality can be seen. So, despite the fact that there are no obvious findings of an ischemic episode, like paresis or imiparesis, one must be careful not to attribute the patient’s clinical signs to other conditions, such as toxic effects, metabolic disorders, psychiatric symptoms, etc. Further investigation with MRI or at least a repeated CT must be done.

Keywords: CNS, CT, thalamus, emergency department

Procedia PDF Downloads 88
708 The Effects of Smoking Prevention Intervention on Smoking Knowledge, Attitudes and Anti-Smoking Self-Efficiency among Adolescent Students

Authors: Yi-Ying Lin, Su-Guo, Chia-Hao, Ming-Szu Hong

Abstract:

Objectives: Smoking is a common addictive behavior in teenagers. Long-term smoking is hazardous to health, causes family and social expenditure, and is an important topic that should not be overlooked by academia or the government. The aims of this study are to examine the effectiveness of these courses in terms of teenagers’ knowledge and attitudes towards the hazards of smoking and the effectiveness of their self-efficacy in rejecting smoking. Methods: This study adopted a pre-test post-test design and selected 7th, 8th, 10th, and 11th graders from two junior high schools. Total of 1073 valid questionnaires were collected. The self-completed questionnaire included background information, smoking status of relatives staying with the subject, attitudes of parents towards child smoking, knowledge and attitudes towards smoking, and anti-smoking self-efficacy. Results and clinical applications: Subjects in the experimental group underwent course interventions, which are 'smoking prevention courses,' in the semester. After course intervention, it was found that the intervention showed significant efficacy in terms of knowledge and self-efficacy in rejecting smoking in senior high school students but no efficacy in junior high school. We recommend that this course can be used in normal senior high schools. With regards to junior high schools, smoking prevention courses should be designed to be gamified, or combined with activities with both anti-smoking messages and entertainment at the same time, so that knowledge, attitudes, and self-efficacy can be subconsciously cultivated.

Keywords: adolescent students, smoking knowledge, attitudes, anti-smoking self-efficiency, smoking prevention intervention

Procedia PDF Downloads 102
707 Folk Dance in Asterio Festivals in Ethiopia: Exploration of Performance, Variants, Symbols, and Therapeutic Role

Authors: Meseret Berhanie Menkir

Abstract:

The present study explores folk dance, one of the folklore texts, its symbols, and its therapeutic role. As a case, the study concentrates on Astrio-Mariam and Merkorios Bera, celebrated on January 30 and February 3 at Deresgie-Mariam Church in Ethiopia. By taking a qualitative stance, the study analyses the meaning of folk dance, explains its role, and describes its types. The data gathered through observation, interview, and focus group discussion techniques are documented in field notes, audio, and video. The data obtained is analyzed using structural-functionalism, psychoanalysis, and semiotics. Accordingly, community members of all ages (mainly the Ethiopian Orthodox Tewahedo Church followers) participate in the performance. While the folk dance is a type of small group dance and group dance, the group has no feature of using men and women performing together. The folk dance's role is a form of healing and spiritual fulfilment besides entertainment. The folk dance also has sword dance characteristics; the study confirmed this feature in content and form. Moreover, the folk dance characterized by frequent shoulder and hand movements Wancha likleka (Horn-mug spin), Doro metet (Chicken drink), and sword dance depict wealth, heroism, and warfare. The instruments used in the performances are also alive, with religious symbols reaching from the drum, incense, and cross to the suffering of Jesus Christ from Hanna to Qeyafa, and references to the 12 Apostles.

Keywords: folk dance, festival, ritual, symbol, therapeutic

Procedia PDF Downloads 31
706 Off-Line Text-Independent Arabic Writer Identification Using Optimum Codebooks

Authors: Ahmed Abdullah Ahmed

Abstract:

The task of recognizing the writer of a handwritten text has been an attractive research problem in the document analysis and recognition community with applications in handwriting forensics, paleography, document examination and handwriting recognition. This research presents an automatic method for writer recognition from digitized images of unconstrained writings. Although a great effort has been made by previous studies to come out with various methods, their performances, especially in terms of accuracy, are fallen short, and room for improvements is still wide open. The proposed technique employs optimal codebook based writer characterization where each writing sample is represented by a set of features computed from two codebooks, beginning and ending. Unlike most of the classical codebook based approaches which segment the writing into graphemes, this study is based on fragmenting a particular area of writing which are beginning and ending strokes. The proposed method starting with contour detection to extract significant information from the handwriting and the curve fragmentation is then employed to categorize the handwriting into Beginning and Ending zones into small fragments. The similar fragments of beginning strokes are grouped together to create Beginning cluster, and similarly, the ending strokes are grouped to create the ending cluster. These two clusters lead to the development of two codebooks (beginning and ending) by choosing the center of every similar fragments group. Writings under study are then represented by computing the probability of occurrence of codebook patterns. The probability distribution is used to characterize each writer. Two writings are then compared by computing distances between their respective probability distribution. The evaluations carried out on ICFHR standard dataset of 206 writers using Beginning and Ending codebooks separately. Finally, the Ending codebook achieved the highest identification rate of 98.23%, which is the best result so far on ICFHR dataset.

Keywords: off-line text-independent writer identification, feature extraction, codebook, fragments

Procedia PDF Downloads 488
705 How Social Capital Mediates the Relationships between Interpersonal Interaction and Health: Location-Based Augmented Reality Games

Authors: Chechen Liao, Pui-Lai To, Yi-Hui Wang

Abstract:

Recently location-based augmented reality games (LBS+AR) have become increasingly popular as a major form of entertainment. Location-based augmented reality games have provided a lot of opportunities for face-to-face interaction among players. Prior studies also indicate that the social side of location-based augmented reality games are one of the major reasons for players to engage in the games. However, the impact of the usage of location-based augmented reality games has not been well explored. The study examines how interpersonal interaction affects social capital and health through playing location-based augmented reality games. The study also investigates how social capital mediates the relationships between interpersonal interaction and health. The study uses survey method to collect data. Six-hundred forty-seven questionnaires are collected. Structural equation modeling is used to investigate the relationships among variables. The causal relationships between variables in the research model are tested. The results of the study indicated that four interpersonal attraction attributes, including ability, proximity, similarity, and familiarity, are identified by ways of factor analysis. Interpersonal attraction is important for location-based augmented reality game-players to develop bonding and bridging social capital. Bonding and bridging social capital have a positive impact on the mental and social health of game-players. The results of the study provide academic and practical implications for future growth of location-based augmented reality games.

Keywords: health, interpersonal interaction, location-based augmented reality games, social capital

Procedia PDF Downloads 234
704 War and the Battle of Lebanese Television over Gender

Authors: Natalie M. Khazaal

Abstract:

The effects of the civil war on Lebanese women have been challenging to conceptualize. For some, war is a liberating and empowering force for women, while for others it is one that subjugates women and disempowers them in new ways. Scholars have explored the impact on the Lebanese civil war (1975-1990) on women in the fields of labor history, political activism and literary production. In all these arenas, women’s role and visibility were contested and negotiated in diverse ways. But probably the most visible arena where this contestation took place was television. Dramatized entertainment series were crucial sites where fictional women battled out the gender question, and which reflected and participated in the negotiations of gender politics. Even more stunningly, actual television stations became part of this battle through the plots and portrayals of women that they created. The state-backed Tele-Liban (TL) peddled patriarchal articulations of gender that directly competed with the edgy vision of liberated, independent women on the pirate Lebanese Broadcasting Corporation (LBC). This presentation explores how LBC used gender to distinguish its brand against the retrograde TL programing. Television series are an important medium for creating, testing and reenacting gender politics. They are even more consequential in another way. They are the sites where a dramatic shift in the relationship between Arab television and Arab publics—from benign neglect of public concerns towards engagement with audiences—took place for the first time. As this shift is at the heart of why Arab media was seen as a participant in the Arab uprisings, it is important to explore the roots of the shift in the dramas and comedy series of the mid-1980s Lebanese television. This presentation argues that television battles over gender were consequential and need serious consideration as sites of unexpected meaning.

Keywords: gender, Lebanon, television, war, women

Procedia PDF Downloads 607
703 Lab Support: A Computer Laboratory Class Management Support System

Authors: Eugenia P. Ramirez, Kevin Matthe Caramancion, Mia Eleazar

Abstract:

Getting the attention of students is a constant challenge to the instructors/lecturers. Although in the computer laboratories some networking and entertainment websites are blocked, yet, these websites have unlimited ways of attracting students to get into it. Thus, when an instructor gives a specific set of instructions, some students may not be able to follow sequentially the steps that are given. The instructor has to physically go to the specific remote terminal and show the student the details. Sometimes, during an examination in laboratory set-up, a proctor may prefer to give detailed and text-written instructions rather than verbal instructions. Even the mere calling of a specific student at any time will distract the whole class especially when activities are being performed. What is needed is : An application software that is able to lock the student's monitor and at the same time display the instructor’s screen; a software that is powerful enough to process in its side alone and manipulate a specific user’s terminal in terms of free configuration that is, without restrictions at the server level is a required functionality for a modern and optimal server structure; a software that is able to send text messages to students, per terminal or in group will be a solution. These features are found in LabSupport. This paper outlines the LabSupport application software framework to efficiently manage computer laboratory sessions and will include different modules: screen viewer, demonstration mode, monitor locking system, text messaging, and class management. This paper's ultimate aim is to provide a system that increases instructor productivity.

Keywords: application software, broadcast messaging, class management, locking system

Procedia PDF Downloads 414