Search results for: self-regulated learning theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10965

Search results for: self-regulated learning theory

4155 Drivers of Global Great Power Assertiveness: Russia and Its Involvement in the Global South

Authors: Elina Vroblevska, Toms Ratfelders

Abstract:

This paper examines the impact of international status-seeking aspirations on great power behavior within the international system. In particular, we seek to test the assumption advanced by the proponents of the Social Identity Theory (SIT) that the inability to achieve social mobilization through joining perceived higher-status social groups (of states) leads great powers to adopt the approach of social competition in which they aim to equal or outdo the dominant group in the area on which its claim to superior status rests. Since the dissolution of the Soviet Union, Russia has struggled to be accepted as a great power by the group of Western states that had created the dominant international system order, while the Soviet states were isolated. While the 1990s and the beginning of the 21st century can be characterized by striving to integrate into the existing order, the second decade has seen a rather sharp turn towards creating a new power center for Russia through the realization of ideas of multipolarity rivalry and uniqueness of the state itself. Increasingly, we have seen the Kremlin striving to collaborate and mobilize groups of states that fall outside of the categories of democracy, multiculturalism, and international order, the way that is perceived by the dominant group, which can be described as the West. Instead, Russia builds its own narrative where it creates an alternative understanding of these values, differentiating from the higher-status social group. The Global South, from a Russian perspective, is the group of states that can still be swayed to create an alternative power center in the international system - one where Russia can assert its status as a great power. This is based on a number of reasons, the most important being that the global north is already highly institutionalized in terms of economy (the EU) and defense (NATO), leaving no room for Russia but to integrate within the existing framework. Second, the difference in values and their interpretation - Russia has been adamant, for the last twenty years, on basing its moral code on traditional values like religion, the heterosexual family model, and moral superiority, which contradict the overall secularism of the Global North. And last, the striking difference in understanding of state governance models - with Russia becoming more autocratic over the course of the last 20 years, it has deliberately created distance between itself and democratic states, entering a “gray area” of alternative understanding of democracy which is more relatable to the global South countries. Using computational text analysis of the excerpts of Vladimir Putin’s speeches delivered from 2000-2022 regarding the areas that fall outside the immediate area of interest of Russia (the Global South), we identify 80 topics that relate to the particular component of the great power status - interest to use force globally. These topics are compared across four temporal frames that capture the periods of more and less permissible Western social boundaries. We find that there exists a negative association between such permissiveness and Putin’s emphasis on the “use of force” topics. This lends further support to the Social Identity Theory and contributes to broadening its applicability to explaining the questions related to great power assertiveness in areas outside of their primary focus regions.

Keywords: Russia, Global South, great power, identity

Procedia PDF Downloads 44
4154 Impulsive Synchronization of Periodically Forced Complex Duffing's Oscillators

Authors: Shaban Aly, Ali Al-Qahtani, Houari B. Khenous

Abstract:

Synchronization is an important phenomenon commonly observed in nature. A system of periodically forced complex Duffings oscillators was introduced and shown to display chaotic behavior and possess strange attractors. Such complex oscillators appear in many problems of physics and engineering, as, for example, nonlinear optics, deep-water wave theory, plasma physics and bimolecular dynamics. In this paper, we study the remarkable phenomenon of chaotic synchronization on these oscillator systems, using impulsive synchronization techniques. We derive analytical expressions for impulsive control functions and show that the dynamics of error evolution is globally stable, by constructing appropriate Lyapunov functions. This means that, for a relatively large set initial conditions, the differences between the drive and response systems vanish exponentially and synchronization is achieved. Numerical results are obtained to test the validity of the analytical expressions and illustrate the efficiency of these techniques for inducing chaos synchronization in our nonlinear oscillators.

Keywords: complex nonlinear oscillators, impulsive synchronization, chaotic systems, global exponential synchronization

Procedia PDF Downloads 432
4153 Robust Electrical Segmentation for Zone Coherency Delimitation Base on Multiplex Graph Community Detection

Authors: Noureddine Henka, Sami Tazi, Mohamad Assaad

Abstract:

The electrical grid is a highly intricate system designed to transfer electricity from production areas to consumption areas. The Transmission System Operator (TSO) is responsible for ensuring the efficient distribution of electricity and maintaining the grid's safety and quality. However, due to the increasing integration of intermittent renewable energy sources, there is a growing level of uncertainty, which requires a faster responsive approach. A potential solution involves the use of electrical segmentation, which involves creating coherence zones where electrical disturbances mainly remain within the zone. Indeed, by means of coherent electrical zones, it becomes possible to focus solely on the sub-zone, reducing the range of possibilities and aiding in managing uncertainty. It allows faster execution of operational processes and easier learning for supervised machine learning algorithms. Electrical segmentation can be applied to various applications, such as electrical control, minimizing electrical loss, and ensuring voltage stability. Since the electrical grid can be modeled as a graph, where the vertices represent electrical buses and the edges represent electrical lines, identifying coherent electrical zones can be seen as a clustering task on graphs, generally called community detection. Nevertheless, a critical criterion for the zones is their ability to remain resilient to the electrical evolution of the grid over time. This evolution is due to the constant changes in electricity generation and consumption, which are reflected in graph structure variations as well as line flow changes. One approach to creating a resilient segmentation is to design robust zones under various circumstances. This issue can be represented through a multiplex graph, where each layer represents a specific situation that may arise on the grid. Consequently, resilient segmentation can be achieved by conducting community detection on this multiplex graph. The multiplex graph is composed of multiple graphs, and all the layers share the same set of vertices. Our proposal involves a model that utilizes a unified representation to compute a flattening of all layers. This unified situation can be penalized to obtain (K) connected components representing the robust electrical segmentation clusters. We compare our robust segmentation to the segmentation based on a single reference situation. The robust segmentation proves its relevance by producing clusters with high intra-electrical perturbation and low variance of electrical perturbation. We saw through the experiences when robust electrical segmentation has a benefit and in which context.

Keywords: community detection, electrical segmentation, multiplex graph, power grid

Procedia PDF Downloads 60
4152 Influence of Recombination of Free and Trapped Charge Carriers on the Efficiency of Conventional and Inverted Organic Solar Cells

Authors: Hooman Mehdizadeh Rad, Jai Singh

Abstract:

Organic solar cells (OSCs) have been actively investigated in the last two decades due to their several merits such as simple fabrication process, low-cost manufacturing, and lightweight. In this paper, using the optical transfer matrix method (OTMM) and solving the drift-diffusion equations processes of recombination are studied in inverted and conventional bulk heterojunction (BHJ) OSCs. Two types of recombination processes are investigated: 1) recombination of free charge carriers using the Langevin theory and 2) of trapped charge carriers in the tail states with exponential energy distribution. These recombination processes are incorporated in simulating the current- voltage characteristics of both conventional and inverted BHJ OSCs. The results of this simulation produces a higher power conversion efficiency in the inverted structure in comparison with conventional structure, which agrees well with the experimental results.

Keywords: conventional organic solar cells, exponential tail state recombination, inverted organic solar cells, Langevin recombination

Procedia PDF Downloads 173
4151 Behavioral Finance: Anomalies at Real Markets, Weekday Effect

Authors: Vera Jancurova

Abstract:

The financial theory is dominated by the believe that weekday effect has disappeared from current markets. The purpose of this article is to study anomalies, especially weekday effect, at real markets that disrupt the efficiency of financial markets. The research is based on the analyses of historical daily exchange rates of significant world indices to determine the presence of weekday effects on financial markets. The methodology used for the study is based on the analyzes of daily averages of particular indexes for different time periods. Average daily gains were analyzed for their whole time interval and then for particular five and ten years periods with the aim to detect the presence on current financial markets. The results confirm the presence of weekday effect at the most significant indices - for example: Nasdaq, S & P 500, FTSE 100 and the Hang Seng. It was confirmed that in the last ten years, the weekend effect disappeared from financial markets. However in last year’s the indicators show that weekday effect is coming back. The study shows that weekday effect has to be taken into consideration on financial markets, especially in the past years.

Keywords: indices, anomalies, behavioral finance, weekday effect

Procedia PDF Downloads 326
4150 Representation of Woman in Vagina Monologue: A Study of Feminism

Authors: Epata Puji Astuti

Abstract:

The Vagina Monologue is a play written by Eve Ensler, which is premiered at Off-Broadway, New York, in 1996. This play is quite different from the other play since it talks about the issue of t men's oppression toward women, and it is performed in monologue. The vagina becomes the main symbol of being discussed in the play. What did men do to women's vagina and how women view and treat her vagina reflects men's attitude toward women. Ensler had interviewed 200 women from various backgrounds to get their stories about the vagina. Ensler also has her own story about vagina. For the researcher, it is interesting to analyze how Ensler represented women in the symbol of vagina. What happened toward vagina reflected the reality about what happened toward women. How Ensler voices the issues of women, such as love, birth, rape, sex work, sexual harassment, etc. are interesting to be analyzed. This research tries to reveal how women are represented in the play. To understand about the representation of women, the researcher uses feminism theory. Textual analysis method is used to find out how women struggle for her own life and speak up for herself. Based on the analysis, it can be concluded that Ensler depicted vagina is not as dirty thing, vagina is a noble thing and men should honor it as they honor women. It reflected that women show their power and resistance toward men's oppression.

Keywords: feminism, vagina, women, violence

Procedia PDF Downloads 128
4149 Numerical Modeling Analysis for the Double-Layered Asphalt Pavement Structure Behavior with Interface Bonding

Authors: Minh Tu Le, Quang Huy Nguyen, Mai Lan Nguyen

Abstract:

Bonding characteristics between pavement layers have an important influence on responses of pavement structures. This paper deals with analytical solution for the stresses, strains, and deflections of double-layered asphalt pavement structure. This solution is based on the homogeneous half-space of layered theory developed by Burmister (1943). The partial interaction between the layers is taken into account by considering an interface bonding behavior which is obtained by push-out shear test. Numerical applications considering three cases of bonding (unbonded, partially bonded, and fully bonded overlays) are carried out to the influence of the interface bonding on the structural behavior of asphalt pavement under static loading. Further, it was observed that numerical results indicate that the horizontal shear reaction modulus at the interface (Ks) will significantly affect pavement structure behavior.

Keywords: analytical solution, interface bonding, shear test keyword, double-layered asphalt, shear reaction modulus

Procedia PDF Downloads 216
4148 Novel Aspects of Merger Control Pertaining to Nascent Acquisition: An Analytical Legal Research

Authors: Bhargavi G. Iyer, Ojaswi Bhagat

Abstract:

It is often noted that the value of a novel idea lies in its successful implementation. However, successful implementation requires the nurturing and encouragement of innovation. Nascent competitors are a true representation of innovation in any given industry. A nascent competitor is an entity whose prospective innovation poses a future threat to an incumbent dominant competitor. While a nascent competitor benefits in several ways, it is also exposed significantly and is at greater risk of facing the brunt of exclusionary practises and abusive conduct by dominant incumbent competitors in the industry. This research paper aims to explore the risks and threats faced by nascent competitors and analyse the benefits they accrue as well as the advantages they proffer to the economy; through an analytical, critical study. In such competitive market environments, a rise of the acquisitions of nascent competitors by the incumbent dominants is observed. Therefore, this paper will examine the dynamics of nascent acquisition. Further, this paper hopes to specifically delve into the role of antitrust bodies in regulating nascent acquisition. This paper also aspires to deal with the question how to distinguish harmful from harmless acquisitions in order to facilitate ideal enforcement practice. This paper proposes mechanisms of scrutiny in order to ensure healthy market practises and efficient merger control in the context of nascent acquisitions. Taking into account the scope and nature of the topic, as well as the resources available and accessible, a combination of the methods of doctrinal research and analytical research were employed, utilising secondary sources in order to assess and analyse the subject of research. While legally evaluating the Killer Acquisition theory and the Nascent Potential Acquisition theory, this paper seeks to critically survey the precedents and instances of nascent acquisitions. In addition to affording a compendious account of the legislative framework and regulatory mechanisms in the United States, the United Kingdom, and the European Union; it hopes to suggest an internationally practicable legal foundation for domestic legislation and enforcement to adopt. This paper hopes to appreciate the complexities and uncertainties with respect to nascent acquisitions and attempts to suggest viable and plausible policy measures in antitrust law. It additionally attempts to examine the effects of such nascent acquisitions upon the consumer and the market economy. This paper weighs the argument of shifting the evidentiary burden on to the merging parties in order to improve merger control and regulation and expounds on its discovery of the strengths and weaknesses of the approach. It is posited that an effective combination of factual, legal, and economic analysis of both the acquired and acquiring companies possesses the potential to improve ex post and ex ante merger review outcomes involving nascent companies; thus, preventing anti-competitive practises. This paper concludes with an analysis of the possibility and feasibility of industry-specific identification of anti-competitive nascent acquisitions and implementation of measures accordingly.

Keywords: acquisition, antitrust law, exclusionary practises merger control, nascent competitor

Procedia PDF Downloads 147
4147 Compensatory Neuro-Fuzzy Inference (CNFI) Controller for Bilateral Teleoperation

Authors: R. Mellah, R. Toumi

Abstract:

This paper presents a new adaptive neuro-fuzzy controller equipped with compensatory fuzzy control (CNFI) in order to not only adjusts membership functions but also to optimize the adaptive reasoning by using a compensatory learning algorithm. The proposed control structure includes both CNFI controllers for which one is used to control in force the master robot and the second one for controlling in position the slave robot. The experimental results obtained, show a fairly high accuracy in terms of position and force tracking under free space motion and hard contact motion, what highlights the effectiveness of the proposed controllers.

Keywords: compensatory fuzzy, neuro-fuzzy, control adaptive, teleoperation

Procedia PDF Downloads 313
4146 Foreign Language Classroom Anxiety: An International Student's Perspective on Indonesian Language Learning

Authors: Ukhtie Nantika Mena, Ahmad Juntika Nurihsan, Ilfiandra

Abstract:

This study aims to explore perspective on Foreign Language Classroom Anxiety (FLCA) of an international student. Descriptive narrative is used to discover written and spoken responses from the student. An online survey was employed as a secondary data to identify the level of FLCA among six UPI international students. A student with the highest score volunteered to be interviewed. Several symptoms were found; lack of concentration, excessive worry, fear, unwanted thoughts, and sweating. The results showed that difficulties to understand lecturers' correction, presentation, and fear of getting left behind are three major causes of his anxiety.

Keywords: foreign language classroom anxiety, FLCA, international students, language anxiety

Procedia PDF Downloads 127
4145 Enacting Educational Technology Affordances as Mechanisms Responsible for Gaining Epistemological Access: A Case of Underprivileged Students at Higher Institutions in Northern Nigeria

Authors: Bukhari Badamasi, Chidi G. Ononiwu

Abstract:

Globally, educational technology (EdTech) has become a known catalyst for gaining access to education, job creation, and national development of a nation. Howbeit, it is common understanding that higher institutions continue to deploy digital technologies, to help provide access to education, but in most case, it is somehow institutional access not epistemological access especially in sub Saharan African higher institutions. Some scholars, however, lament the fact that studies on educational technology affordances are mostly fragmented because they focus on specific theme or sub aspect of access (i.e., institutional access). Thus, drawing from the Archer Morphogenetic approach, and Gibson Affordance theory, and applying critical realist based Danermark model for explanatory research, the study seeks to conduct a realist case study on underprivileged students in Higher institutions on how they gain epistemological access by enacting educational technology (EdTech) affordances.

Keywords: affordance, epistemological access, educational technology, underprivileged students

Procedia PDF Downloads 69
4144 Affects Associations Analysis in Emergency Situations

Authors: Joanna Grzybowska, Magdalena Igras, Mariusz Ziółko

Abstract:

Association rule learning is an approach for discovering interesting relationships in large databases. The analysis of relations, invisible at first glance, is a source of new knowledge which can be subsequently used for prediction. We used this data mining technique (which is an automatic and objective method) to learn about interesting affects associations in a corpus of emergency phone calls. We also made an attempt to match revealed rules with their possible situational context. The corpus was collected and subjectively annotated by two researchers. Each of 3306 recordings contains information on emotion: (1) type (sadness, weariness, anxiety, surprise, stress, anger, frustration, calm, relief, compassion, contentment, amusement, joy) (2) valence (negative, neutral, or positive) (3) intensity (low, typical, alternating, high). Also, additional information, that is a clue to speaker’s emotional state, was annotated: speech rate (slow, normal, fast), characteristic vocabulary (filled pauses, repeated words) and conversation style (normal, chaotic). Exponentially many rules can be extracted from a set of items (an item is a previously annotated single information). To generate the rules in the form of an implication X → Y (where X and Y are frequent k-itemsets) the Apriori algorithm was used - it avoids performing needless computations. Then, two basic measures (Support and Confidence) and several additional symmetric and asymmetric objective measures (e.g. Laplace, Conviction, Interest Factor, Cosine, correlation coefficient) were calculated for each rule. Each applied interestingness measure revealed different rules - we selected some top rules for each measure. Owing to the specificity of the corpus (emergency situations), most of the strong rules contain only negative emotions. There are though strong rules including neutral or even positive emotions. Three examples of the strongest rules are: {sadness} → {anxiety}; {sadness, weariness, stress, frustration} → {anger}; {compassion} → {sadness}. Association rule learning revealed the strongest configurations of affects (as well as configurations of affects with affect-related information) in our emergency phone calls corpus. The acquired knowledge can be used for prediction to fulfill the emotional profile of a new caller. Furthermore, a rule-related possible context analysis may be a clue to the situation a caller is in.

Keywords: data mining, emergency phone calls, emotional profiles, rules

Procedia PDF Downloads 397
4143 Perceived Ease-of-Use and Intention to Use E-Government Services in Ghana: The Moderating Role of Perceived Usefulness

Authors: Isaac Kofi Mensah

Abstract:

Public sector organizations, ministries, departments and local government agencies are adopting e-government as a means to provide efficient and quality service delivery to citizens. The purpose of this research paper is to examine the extent to which perceived usefulness (PU) of e-government services moderates between perceived ease-of-use (PEOU) of e-government services and intention to use (IU) e-government services in Ghana. A structured research questionnaire instrument was developed and administered to 700 potential respondents in Ghana, of which 693 responded, representing 99% of the questionnaires distributed. The Technology Acceptance Model (TAM) was used as the theoretical framework for the study. The Statistical Package for Social Science (SPSS) was used to capture and analyze the data. The results indicate that even though predictors such as PU and PEOU are main determiners of citizens’ intention to adopt and use e-government services in Ghana, it failed to show that PEOU and IU e-government services in Ghana is significantly moderated by the PU of e-government services. The implication of this finding on theory and practice is further discussed.

Keywords: e-government services, intention to use, moderating role, perceived ease of use, perceived usefulness, Ghana, technology acceptance model

Procedia PDF Downloads 395
4142 Mecano-Reliability Approach Applied to a Water Storage Tank Placed on Ground

Authors: Amar Aliche, Hocine Hammoum, Karima Bouzelha, Arezki Ben Abderrahmane

Abstract:

Traditionally, the dimensioning of storage tanks is conducted with a deterministic approach based on partial coefficients of safety. These coefficients are applied to take into account the uncertainties related to hazards on properties of materials used and applied loads. However, the use of these safety factors in the design process does not assure an optimal and reliable solution and can sometimes lead to a lack of robustness of the structure. The reliability theory based on a probabilistic formulation of constructions safety can respond in an adapted manner. It allows constructing a modelling in which uncertain data are represented by random variables, and therefore allows a better appreciation of safety margins with confidence indicators. The work presented in this paper consists of a mecano-reliability analysis of a concrete storage tank placed on ground. The classical method of Monte Carlo simulation is used to evaluate the failure probability of concrete tank by considering the seismic acceleration as random variable.

Keywords: reliability approach, storage tanks, monte carlo simulation, seismic acceleration

Procedia PDF Downloads 295
4141 Teaching Speaking Skills to Adult English Language Learners through ALM

Authors: Wichuda Kunnu, Aungkana Sukwises

Abstract:

Audio-lingual method (ALM) is a teaching approach that is claimed that ineffective for teaching second/foreign languages. Because some linguists and second/foreign language teachers believe that ALM is a rote learning style. However, this study is done on a belief that ALM will be able to solve Thais’ English speaking problem. This paper aims to report the findings on teaching English speaking to adult learners with an “adapted ALM”, one distinction of which is to use Thai as the medium language of instruction. The participants are consisted of 9 adult learners. They were allowed to speak English more freely using both the materials presented in the class and their background knowledge of English. At the end of the course, they spoke English more fluently, more confidently, to the extent that they applied what they learnt both in and outside the class.

Keywords: teaching English, audio lingual method, cognitive science, psychology

Procedia PDF Downloads 400
4140 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.

Keywords: attacker, defender, game theory, information

Procedia PDF Downloads 452
4139 Using Neural Networks for Click Prediction of Sponsored Search

Authors: Afroze Ibrahim Baqapuri, Ilya Trofimov

Abstract:

Sponsored search is a multi-billion dollar industry and makes up a major source of revenue for search engines (SE). Click-through-rate (CTR) estimation plays a crucial role for ads selection, and greatly affects the SE revenue, advertiser traffic and user experience. We propose a novel architecture of solving CTR prediction problem by combining artificial neural networks (ANN) with decision trees. First, we compare ANN with respect to other popular machine learning models being used for this task. Then we go on to combine ANN with MatrixNet (proprietary implementation of boosted trees) and evaluate the performance of the system as a whole. The results show that our approach provides a significant improvement over existing models.

Keywords: neural networks, sponsored search, web advertisement, click prediction, click-through rate

Procedia PDF Downloads 560
4138 Psychological Variables Predicting Academic Achievement in Argentinian Students: Scales Development and Recent Findings

Authors: Fernandez liporace, Mercedes Uriel Fabiana

Abstract:

Academic achievement in high school and college students is currently a matter of concern. National and international assessments show high schoolers as low achievers, and local statistics indicate alarming dropout percentages in this educational level. Even so, 80% of those students intend attending higher education. On the other hand, applications to Public National Universities are free and non-selective by examination procedures. Though initial registrations are massive (307.894 students), only 50% of freshmen pass their first year classes, and 23% achieves a degree. Low performances use to be a common problem. Hence, freshmen adaptation, their adjustment, dropout and low academic achievement arise as topics of agenda. Besides, the hinge between high school and college must be examined in depth, in order to get an integrated and successful path from one educational stratum to the other. Psychology aims at developing two main research lines to analyse the situation. One regarding psychometric scales, designing and/or adapting tests, examining their technical properties and their theoretical validity (e.g., academic motivation, learning strategies, learning styles, coping, perceived social support, parenting styles and parental consistency, paradoxical personality as correlated to creative skills, psychopathological symptomatology). The second research line emphasizes relationships within the variables measured by the former scales, facing the formulation and testing of predictive models of academic achievement, establishing differences by sex, age, educational level (high school vs college), and career. Pursuing these goals, several studies were carried out in recent years, reporting findings and producing assessment technology useful to detect students academically at risk as well as good achievers. Multiple samples were analysed totalizing more than 3500 participants (2500 from college and 1000 from high school), including descriptive, correlational, group differences and explicative designs. A brief on the most relevant results is presented. Providing information to design specific interventions according to every learner’s features and his/her educational environment comes up as a mid-term accomplishment. Furthermore, that information might be helpful to adapt curricula by career, as well as for implementing special didactic strategies differentiated by sex and personal characteristics.

Keywords: academic achievement, higher education, high school, psychological assessment

Procedia PDF Downloads 354
4137 Digital Musical Organology: The Audio Games: The Question of “A-Musicological” Interfaces

Authors: Hervé Zénouda

Abstract:

This article seeks to shed light on an emerging creative field: "Audio games," at the crossroads between video games and computer music. Indeed, many applications, which propose entertaining audio-visual experiences with the objective of musical creation, are available today for different supports (game consoles, computers, cell phones). The originality of this field is the use of the gameplay of video games applied to music composition. Thus, composing music using interfaces but also cognitive logics that we qualify as "a-musicological" seem to us particularly interesting from the perspective of musical digital organology. This field raises questions about the representation of sound and musical structures and develops new instrumental gestures and strategies of musical composition. We will try in this article to define the characteristics of this field by highlighting some historical milestones (abstract cinema, game theory in music, actions, and graphic scores) as well as the novelties brought by digital technologies.

Keywords: audio-games, video games, computer generated music, gameplay, interactivity, synesthesia, sound interfaces, relationships image/sound, audiovisual music

Procedia PDF Downloads 99
4136 Efficient Hydrogen Separation through Pd-Pt Membrane

Authors: Lawan Muhammad Adam, Abduljabar Hilal Alsayoud

Abstract:

One of the most promising techniques to produce pure hydrogen is through a palladium-based membrane (Pd-membrane). Density functional theory (DFT) is employed in this work to examine how the physical and chemical adsorption properties of hydrogen on the surface of Pd-Pt can be mutated in the presence of contaminating gases, CH₄, CO, and CO₂. The main target is to survey the energy topology related to hydrogen adsorption while adjusting the stages of freedom in both the structure and composition. The adsorption sites, crystal plane of the slab, and relative orientation of the adsorbed molecules on its surface, as well as various arrangements of adsorbed species, have been considered in this study. The dependency of hydrogen adsorption on surface coverage is studied. The study demonstrated the physical adsorption energies of the molecules on the surface concerning the different coverages of hydrogen atoms. The most stable combinations of the adsorption sites (Top, Hollow, and Bridge) with various orientations of gaseous molecules on the Pd-Pt surface were identified according to their calculated energies. When the binding of contaminating gaseous species to the Pd-Pt surface and their impact on the physical adsorption energies of the H₂ are examined, it is observed that the most poisonous gas relative to all other gases modifies the energetics of the adsorption process of hydrogen on the surface.

Keywords: DFT, Pd-Pt-membrane, H₂, CO, CO₂

Procedia PDF Downloads 57
4135 V0 Physics at LHCb. RIVET Analysis Module for Z Boson Decay to Di-Electron

Authors: A. E. Dumitriu

Abstract:

The LHCb experiment is situated at one of the four points around CERN’s Large Hadron Collider, being a single-arm forward spectrometer covering 10 mrad to 300 (250) mrad in the bending (non-bending) plane, designed primarily to study particles containing b and c quarks. Each one of LHCb’s sub-detectors specializes in measuring a different characteristic of the particles produced by colliding protons, its significant detection characteristics including a high precision tracking system and 2 ring-imaging Cherenkov detectors for particle identification. The major two topics that I am currently concerned in are: the RIVET project (Robust Independent Validation of Experiment and Theory) which is an efficient and portable tool kit of C++ class library useful for validation and tuning of Monte Carlo (MC) event generator models by providing a large collection of standard experimental analyses useful for High Energy Physics MC generator development, validation, tuning and regression testing and V0 analysis for 2013 LHCb NoBias type data (trigger on bunch + bunch crossing) at √s=2.76 TeV.

Keywords: LHCb physics, RIVET plug-in, RIVET, CERN

Procedia PDF Downloads 407
4134 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application

Authors: Senthuran Manoharan, Rathesan Sivagananalingam

Abstract:

One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.

Keywords: authentication, adaptive authentication, machine learning, security

Procedia PDF Downloads 226
4133 Determinants of Mobile Payment Adoption among Retailers in Ghana

Authors: Ibrahim Masud, Yusheng Kong, Adam Diyawu Rahman

Abstract:

Mobile payment variously referred to as mobile money, mobile money transfer, and mobile wallet refers to payment services operated under financial regulation and performed from or via a mobile device. Mobile payment systems have come to augment and to some extent try to replace the conventional payment methods like cash, cheque, or credit cards. This study examines mobile payment adoption factors among retailers in Ghana. A conceptual framework was adopted from the extant literature using the Technology Acceptance Model and the Theory of Reasoned action as the theoretical bases. Data for the study was obtained from a sample of 240 respondents through a structured questionnaire. The PLS-SEM was used to analyze the data through SPSS v.22 and SmartPLS v.3. The findings indicate that factors such as perceived usefulness, perceived ease of use, perceived security, competitive pressure and facilitating conditions are the main determinants of mobile payment adoption among retailers in Ghana. The study contributes to the literature on mobile payment adoption from developing country context.

Keywords: mobile payment, retailers, structural equation modeling, technology acceptance model

Procedia PDF Downloads 159
4132 More Than Financial Wealth: An Empirical Study on the Impact of Family Involvement on the Dimensions of Exit Success

Authors: Tim Vollmer, Andrea Greven, Malte Brettel

Abstract:

Family firms represent the predominant business structure worldwide, accounting for 90 percent of all operational businesses. These firms are essential to society and the economy. In the past decade, family firm exits increased by 72%; and in the next five years, 95,000 German family firms will be sold, acquired, or liquidated. For family firms, socioemotional wealth represents the frame of reference and value to preserve when making decisions. Family firm exits threaten the socioemotional wealth, as in extreme scenarios, economic logic may take over. So, a dilemma arises: Maintaining socioemotional wealth versus pursuing financial wealth. Family firm researchers agree that family involvement leads to specific goals, behaviors, and outcomes. For instance, the desire to protect socioemotional wealth when selling the firm and the focus on particular exit success dimensions, depending on the family's role inside the firm. However, despite the regularity of family firm exits, there is little research on the effect of family involvement on the family firm CEOs' perceived exit performance. We investigate the family firm CEOs' perceived exit performance, which we call exit success. Considering the deficiencies in the literature, we identify two research gaps. First, it remains unclear how family involvement affects the dimensions of exit success. Hence, we provide evidence of which success dimensions matter most depending on the family's involvement and how to differentiate successful from unsuccessful exits. Second, prior work has analyzed family involvement in the socioemotional wealth context but found contradictory findings. This work considers, for example, the family generation in control and identifies the tipping point of economic objectives becoming preferable over socioemotional wealth-related goals. This paper theorizes and empirically investigates, through the lens of socioemotional wealth and conflict theory, how socioemotional wealth mediates the relationship between family involvement and family firms' exit success. We analyze family firms' exit success dimensions of personal financial benefits, personal reputation, employee benefits, and firm mission persistence. Family involvement considers the family firms' heterogeneity in ownership, management, and generation. We use a quantitative approach in the form of an online survey by drawing on 116 responses from former family firm CEOs'. This study highlights that socioemotional wealth mediates the relationship between the dimensions of family involvement and exit success. The greater socioemotional wealth, the greater the family firm CEOs focus on the pro-organizational exit success dimensions of employee benefits and firm mission persistence. In contrast, the self-regarding dimension of personal financial benefits is significantly negatively affected. An important finding is that later generations and the number of family managers involved significantly negatively affect the two pro-organizational dimensions of exit success. Family ownership does not show any significant effect. Our work widens implications for research, theory, and practice by contributing in two meaningful ways. First, our results offer insights to differentiate successful from unsuccessful family firm exits and provide evidence of which success dimensions matter and which to focus on, most dependent on the family's role inside the firm. Second, our article advances research and empirical understanding of family firms and socioemotional wealth by clarifying contradictory findings.

Keywords: exit success, family firm exit, perceived exit performance, socioemotional wealth

Procedia PDF Downloads 61
4131 Towards Safety-Oriented System Design: Preventing Operator Errors by Scenario-Based Models

Authors: Avi Harel

Abstract:

Most accidents are commonly attributed in hindsight to human errors, yet most methodologies for safety focus on technical issues. According to the Black Swan theory, this paradox is due to insufficient data about the ways systems fail. The article presents a study of the sources of errors, and proposes a methodology for utility-oriented design, comprising methods for coping with each of the sources identified. Accident analysis indicates that errors typically result from difficulties of operating in exceptional conditions. Therefore, following STAMP, the focus should be on preventing exceptions. Exception analysis indicates that typically they involve an improper account of the operational scenario, due to deficiencies in the system integration. The methodology proposes a model, which is a formal definition of the system operation, as well as principles and guidelines for safety-oriented system integration. The article calls to develop and integrate tools for recording and analysis of the system activity during the operation, required to implement validate the model.

Keywords: accidents, complexity, errors, exceptions, interaction, modeling, resilience, risks

Procedia PDF Downloads 187
4130 Data Mining in Healthcare for Predictive Analytics

Authors: Ruzanna Muradyan

Abstract:

Medical data mining is a crucial field in contemporary healthcare that offers cutting-edge tactics with enormous potential to transform patient care. This abstract examines how sophisticated data mining techniques could transform the healthcare industry, with a special focus on how they might improve patient outcomes. Healthcare data repositories have dynamically evolved, producing a rich tapestry of different, multi-dimensional information that includes genetic profiles, lifestyle markers, electronic health records, and more. By utilizing data mining techniques inside this vast library, a variety of prospects for precision medicine, predictive analytics, and insight production become visible. Predictive modeling for illness prediction, risk stratification, and therapy efficacy evaluations are important points of focus. Healthcare providers may use this abundance of data to tailor treatment plans, identify high-risk patient populations, and forecast disease trajectories by applying machine learning algorithms and predictive analytics. Better patient outcomes, more efficient use of resources, and early treatments are made possible by this proactive strategy. Furthermore, data mining techniques act as catalysts to reveal complex relationships between apparently unrelated data pieces, providing enhanced insights into the cause of disease, genetic susceptibilities, and environmental factors. Healthcare practitioners can get practical insights that guide disease prevention, customized patient counseling, and focused therapies by analyzing these associations. The abstract explores the problems and ethical issues that come with using data mining techniques in the healthcare industry. In order to properly use these approaches, it is essential to find a balance between data privacy, security issues, and the interpretability of complex models. Finally, this abstract demonstrates the revolutionary power of modern data mining methodologies in transforming the healthcare sector. Healthcare practitioners and researchers can uncover unique insights, enhance clinical decision-making, and ultimately elevate patient care to unprecedented levels of precision and efficacy by employing cutting-edge methodologies.

Keywords: data mining, healthcare, patient care, predictive analytics, precision medicine, electronic health records, machine learning, predictive modeling, disease prognosis, risk stratification, treatment efficacy, genetic profiles, precision health

Procedia PDF Downloads 41
4129 DH-Students Promoting Underage Asylum Seekers' Oral Health in Finland

Authors: Eeva Wallenius-Nareneva, Tuula Toivanen-Labiad

Abstract:

Background: Oral health promotion event was organised for forty Afghanistan, Iraqi and Bangladeshi underage asylum seekers in Finland. The invitation to arrange this coaching occasion was accepted in the Degree Programme in Oral Hygiene in Metropolia. The personnel in the reception center found the need to improve oral health among the youngsters. The purpose was to strengthen the health literacy of the boys in their oral self-care and to reduce dental fears. The Finnish studies, especially the terminology of oral health was integrated to coaching with the help of interpreters. Cooperative learning was applied. Methods: Oral health was interactively discussed in four study group sessions: 1. The importance of healthy eating habits; - Good and bad diets, - Regular meals, - Acid attack o Xylitol. 2. Oral diseases − connection to general health; - Aetiology of gingivitis, periodontitis and caries, - Harmfulness of smoking 3. Tools and techniques for oral self-care; - Brushing and inter dental cleaning. 4. Sharing earlier dental care experiences; - Cultural differences, - Dental fear, - Regular check-ups. Results: During coaching deficiencies appeared in brushing and inter dental cleaning techniques. Some boys were used to wash their mouth with salt justifying it by salt’s antiseptic properties. Many brushed their teeth by vertical movements. The boys took feedback positively when a demonstration with model jaws revealed the inefficiency of the technique. The advantages of fluoride tooth paste were advised. Dental care procedures were new and frightening for many boys. Finnish dental care system was clarified. The safety and indolence of the treatments and informed consent were highlighted. Video presentations and the dialog lowered substantially the threshold to visit dental clinic. The occasion gave the students means for meeting patients from different cultural and language backgrounds. The information hidden behind the oral health problems of the asylum seekers was valuable. Conclusions: Learning dental care practices used in different cultures is essential for dental professionals. The project was a good start towards multicultural oral health care. More experiences are needed before graduation. Health education themes should be held simple regardless of the target group. The heterogeneity of the group does not pose a problem. Open discussion with questions leading to the theme works well in clarifying the target group’s knowledge level. Sharing own experiences strengthens the sense of equality among the participants and encourages them to express own opinions. Motivational interview method turned out to be successful. In the future coaching occasions must confirm active participation of everyone. This could be realized by dividing the participants to even smaller groups. The different languages impose challenges but they can be solved by using more interpreters. Their presence ensures that everyone understands the issues properly although the use of plain and sign languages are helpful. In further development, it would be crucial to arrange a rehearsal occasion to the same participants in two/three months’ time. This would strengthen the adaption of self-care practices and give the youngsters opportunity to pose more open questions. The students would gain valuable feedback regarding the effectiveness of their work.

Keywords: cooperative learning, interactive methods, motivational interviewing, oral health promotion, underage asylum seekers

Procedia PDF Downloads 276
4128 Manipulation of the Public Sphere to Win Cultural Hegemony: The Process by Which Islamic State Uses the Principles of the Overton Window to Engineer Extremism

Authors: A. Brigitte Coles

Abstract:

In order to be successful in a campaign against terror and maintain a favorable world order, we must recognize the effects of priming, framing, and agenda setting on the public sphere, and address how terrorist organizations are able to manipulate language and symbols to shift public opinion and increase recruitment success. Because of their unprecedented activity in the region and foreign recruitment success, this study specifically addresses how the Islamic State (IS/ISIS/ISIL) manipulates the public sphere to amplify support and increase western recruitment. By following a grounded theory methodology and coding triangulated data from IS propaganda, a model for the process of terrorist recruitment has emerged, concerning both environments and personalities susceptible to recruitment, and the steps by which an extremist can be created. This has resulted in the ability to reverse engineer a method by which counter recruitment operations can be facilitated in an effort to lessen the vulnerability of areas and individuals, as well as create dissent among current extremists.

Keywords: countering violent extremism, counter-terrorism, recruitment, overton window

Procedia PDF Downloads 325
4127 Sinhala Sign Language to Grammatically Correct Sentences using NLP

Authors: Anjalika Fernando, Banuka Athuraliya

Abstract:

This paper presents a comprehensive approach for converting Sinhala Sign Language (SSL) into grammatically correct sentences using Natural Language Processing (NLP) techniques in real-time. While previous studies have explored various aspects of SSL translation, the research gap lies in the absence of grammar checking for SSL. This work aims to bridge this gap by proposing a two-stage methodology that leverages deep learning models to detect signs and translate them into coherent sentences, ensuring grammatical accuracy. The first stage of the approach involves the utilization of a Long Short-Term Memory (LSTM) deep learning model to recognize and interpret SSL signs. By training the LSTM model on a dataset of SSL gestures, it learns to accurately classify and translate these signs into textual representations. The LSTM model achieves a commendable accuracy rate of 94%, demonstrating its effectiveness in accurately recognizing and translating SSL gestures. Building upon the successful recognition and translation of SSL signs, the second stage of the methodology focuses on improving the grammatical correctness of the translated sentences. The project employs a Neural Machine Translation (NMT) architecture, consisting of an encoder and decoder with LSTM components, to enhance the syntactical structure of the generated sentences. By training the NMT model on a parallel corpus of Sinhala wrong sentences and their corresponding grammatically correct translations, it learns to generate coherent and grammatically accurate sentences. The NMT model achieves an impressive accuracy rate of 98%, affirming its capability to produce linguistically sound translations. The proposed approach offers significant contributions to the field of SSL translation and grammar correction. Addressing the critical issue of grammar checking, it enhances the usability and reliability of SSL translation systems, facilitating effective communication between hearing-impaired and non-sign language users. Furthermore, the integration of deep learning techniques, such as LSTM and NMT, ensures the accuracy and robustness of the translation process. This research holds great potential for practical applications, including educational platforms, accessibility tools, and communication aids for the hearing-impaired. Furthermore, it lays the foundation for future advancements in SSL translation systems, fostering inclusive and equal opportunities for the deaf community. Future work includes expanding the existing datasets to further improve the accuracy and generalization of the SSL translation system. Additionally, the development of a dedicated mobile application would enhance the accessibility and convenience of SSL translation on handheld devices. Furthermore, efforts will be made to enhance the current application for educational purposes, enabling individuals to learn and practice SSL more effectively. Another area of future exploration involves enabling two-way communication, allowing seamless interaction between sign-language users and non-sign-language users.In conclusion, this paper presents a novel approach for converting Sinhala Sign Language gestures into grammatically correct sentences using NLP techniques in real time. The two-stage methodology, comprising an LSTM model for sign detection and translation and an NMT model for grammar correction, achieves high accuracy rates of 94% and 98%, respectively. By addressing the lack of grammar checking in existing SSL translation research, this work contributes significantly to the development of more accurate and reliable SSL translation systems, thereby fostering effective communication and inclusivity for the hearing-impaired community

Keywords: Sinhala sign language, sign Language, NLP, LSTM, NMT

Procedia PDF Downloads 84
4126 Influence of Transportation Mode to the Deterioration Rate: Case Study of Food Transport by Ship

Authors: Danijela Tuljak-Suban, Valter Suban

Abstract:

Food as perishable goods represents a specific and sensitive part in the supply chain theory, since changing of its physical or chemical characteristics considerably influences the approach to stock management. The most delicate phase of this process is transportation, where it becomes difficult to ensure stability conditions that limit the deterioration, since the value of the deterioration rate could be easily influenced by the transportation mode. Fuzzy definition of variables allows taking into account these variations. Furthermore an appropriate choice of the defuzzification method permits to adapt results, as much as possible, to real conditions. In the article will be applied the those methods to the relationship between the deterioration rate of perishable goods and transportation by ship, with the aim: (a) to minimize the total costs function, defined as the sum of the ordering cost, holding cost, disposing cost and transportation costs, and (b) to improve supply chain sustainability by reducing the environmental impact and waste disposal costs.

Keywords: perishable goods, fuzzy reasoning, transport by ship, supply chain sustainability

Procedia PDF Downloads 534