Search results for: user search behaviors
4692 Enhanced Planar Pattern Tracking for an Outdoor Augmented Reality System
Authors: L. Yu, W. K. Li, S. K. Ong, A. Y. C. Nee
Abstract:
In this paper, a scalable augmented reality framework for handheld devices is presented. The presented framework is enabled by using a server-client data communication structure, in which the search for tracking targets among a database of images is performed on the server-side while pixel-wise 3D tracking is performed on the client-side, which, in this case, is a handheld mobile device. Image search on the server-side adopts a residual-enhanced image descriptors representation that gives the framework a scalability property. The tracking algorithm on the client-side is based on a gravity-aligned feature descriptor which takes the advantage of a sensor-equipped mobile device and an optimized intensity-based image alignment approach that ensures the accuracy of 3D tracking. Automatic content streaming is achieved by using a key-frame selection algorithm, client working phase monitoring and standardized rules for content communication between the server and client. The recognition accuracy test performed on a standard dataset shows that the method adopted in the presented framework outperforms the Bag-of-Words (BoW) method that has been used in some of the previous systems. Experimental test conducted on a set of video sequences indicated the real-time performance of the tracking system with a frame rate at 15-30 frames per second. The presented framework is exposed to be functional in practical situations with a demonstration application on a campus walk-around.Keywords: augmented reality framework, server-client model, vision-based tracking, image search
Procedia PDF Downloads 2744691 User Expectations and Opinions Related to Campus Wayfinding and Signage Design: A Case Study of Kastamonu University
Authors: Güllü Yakar, Adnan Tepecik
Abstract:
A university campus resembles an independent city that is spread over a wide area. Campuses that incorporate thousands of new domestic and international users at the beginning of every academic period also host scientific, cultural and sportive events, in addition to embodying regular users such as students and staff. Wayfinding and signage systems are necessary for the regulation of vehicular traffic, and they enable users’ to navigate without losing time or feeling anxiety. While designing the system or testing the functionality of it, opinions of existing users or likely behaviors of typical user profiles (personas) provide designers with insight. The purpose of this study is to identify the wayfinding attitudes and expectations of Kastamonu University Kuzeykent Campus users. This study applies a mixed method in which a questionnaire, developed by the researcher, constitute the quantitative phase of the study. The survey was carried out with 850 participants who filled a questionnaire form which was tested in terms of construct validity by using Exploratory Factor Analysis. While interpreting the data obtained, Chi-Square, T- Test and ANOVA analyses were applied as well as descriptive analyses such as frequency (f) and percentage (%) values. The results of this survey, which was conducted during the absence of systematic wayfinding signs in the campus, reveals the participants expectations for insertion of floor plans and wayfinding signs to indoors, maps to outdoors, symbols and color codes to the existing signs and for the adequate arrangement of those for the use of visually impaired people. The fact that there is a direct proportional relation between the length of institution membership and wayfinding competency within campus, leads to the conclusion that especially the new comers are in need of wayfinding signs. In order to determine the effectiveness of campus-wide wayfinding system implemented after the survey and in order to identify the further expectations of users in this respect, a semi-structured interview form developed by the researcher and assessments of 20 participants are compiled. Subjected to content analysis, this data constitute the qualitative dimension of the study. Research results indicate that despite the presence of the signs, the participants experienced either inability or stress while finding their way, showed tendency to receive help from others and needed outdoor maps and signs, in addition to bigger-sized texts.Keywords: environmental graphic design, environmental perception, wayfinding and signage design, wayfinding system
Procedia PDF Downloads 2364690 Personas Help Understand Users’ Needs, Goals and Desires in an Online Institutional Repository
Authors: Maha ALjohani, James Blustein
Abstract:
Communicating users' needs, goals and problems help designers and developers overcome challenges faced by end users. Personas are used to represent end users’ needs. In our research, creating personas allowed the following questions to be answered: Who are the potential user groups? What do they want to achieve by using the service? What are the problems that users face? What should the service provide to them? To develop realistic personas, we conducted a focus group discussion with undergraduate and graduate students and also interviewed a university librarian. The personas were created to help evaluating the Institutional Repository that is based on the DSpace system. The profiles helped to communicate users' needs, abilities, tasks, and problems, and the task scenarios used in the heuristic evaluation were based on these personas. Four personas resulted of a focus group discussion with undergraduate and graduate students and from interviewing a university librarian. We then used these personas to create focused task-scenarios for a heuristic evaluation on the system interface to ensure that it met users' needs, goals, problems and desires. In this paper, we present the process that we used to create the personas that led to devise the task scenarios used in the heuristic evaluation as a follow up study of the DSpace university repository.Keywords: heuristic evaluation, institutional repositories, user experience, human computer interaction, user profiles, personas, task scenarios, heuristics
Procedia PDF Downloads 4984689 Health Belief Model on Smoking Behaviors Causing Lung Cancer: A Cross-Sectional Study in Thailand
Authors: Dujrudee Chinwong, Chanida Prompantakorn, Ubonphan Chaichana, Surarong Chinwong
Abstract:
Objective: Understanding the university students’ perceptions on smoking caused lung cancer based on the Health Belief Model should help health care providers in assisting them to quit smoking. Thus, this study aimed to investigate the University students’ health belief in smoking behaviors caused lung cancer, which based on the Health Belief Model. Methods: Data were collected from voluntary participants using a self-administered questionnaire. Participants were students studying at a University in northern Thailand who were current smokers; they were selected using snowball sampling. Results: Of 361 students, 84% were males; 78% smoked not more than 10 cigarettes a day; 68% intended to quit smoking. Our findings, based on the health belief model, showed that 1) perceived susceptibility: participants strongly believed that if they did not stop smoking, they were at high risk of lung cancer (88%); 2) perceived severity: they strongly believed that they had a high chance of death from lung cancer if they continued smoking (84%); 3) perceived benefits: they strongly believed that quitting smoking could reduce the chance of developing lung cancer; 4) perceived barriers of quitting smoking: they strongly believed in the difficulty of quitting smoking because it needed a high effort and strong intention (69%); 5) perceived self-efficacy: however, they strongly believed that they can quit smoking right away if they had a strong intention to quit smoking (70%); 6) cues to action: they strongly believed in the support of parents (85%) and lovers (78%) in helping them to quit smoking. Further, they believed that limitation on smoking area in the University and smoking cessation services provided by the University can assist them to quit smoking. Conclusion: The Health Belief Model helps us to understand students’ smoking behaviors caused lung cancer. This could lead to designing a smoking cessation program to assist students to quit smoking.Keywords: health belief model, lung cancer, smoking, Thailand
Procedia PDF Downloads 2984688 Stop Texting While Learning: A Meta-Analysis of Social Networks Use and Academic Performances
Authors: Proud Arunrangsiwed, Sarinya Kongtieng
Abstract:
Teachers and university lecturers face an unsolved problem, which is students’ multitasking behaviors during class time, such as texting or playing a game. It is important to examine the most powerful predictor that can result in students’ educational performances. Meta-analysis was used to analyze the research articles, which were published with the keywords, multitasking, class performance, and texting. We selected 14 research articles published during 2008-2013 from online databases, and four articles met the predetermined inclusion criteria. Effect size of each pair of variables was used as the dependent variable. The findings revealed that the students’ expectancy and value on SNSs usages is the best significant predictor of their educational performances, followed by their motivation and ability in using SNSs, prior educational performances, usage behaviors of SNSs in class, and their personal characteristics, respectively. Future study should conduct a longitudinal design to better understand the effect of multitasking in the classroom.Keywords: meta-regression analysis, social networking sites, academic Performances, multitasking, motivation
Procedia PDF Downloads 2774687 Population Stereotype Production, User Factors, and Icon Design for Underserved Communities of Rural India
Authors: Avijit Sengupta, Klarissa Ting Ting Cheng, Maffee Peng-Hui Wan
Abstract:
This study investigates the influence of user factors and referent characteristics on representation types generated using the stereotype production method for designing icons. Sixty-eight participants of farming communities were asked to draw images based on sixteen feature referents. Significant statistical differences were found between the types of representations generated for contextual and context-independent referents. Strong correlations were observed between years of formal education and total number of abstract representations produced for both contextual and context-independent referents. However, representation characteristics were not influenced by other user factors such as participants’ experience with mobile phone and years of farming experience. A statistically significant tendency of making concrete representations was observed for both contextual and context-independent referents. These findings provide insights on community members’ involvement in icon design and suggest a consolidated icon design strategy based on population stereotype, particularly for under-served rural communities of India.Keywords: abstract representation, concrete representation, participatory design, population stereotype
Procedia PDF Downloads 3744686 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions
Authors: Behnam Zahednejad, Saeed Kosari
Abstract:
Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif
Procedia PDF Downloads 1004685 Physics’s Practical Based on Android as a Motivator in Learning Physics
Authors: Yuni Rochmawati, Luluk Il Mukarromah
Abstract:
Android is a mobile operating system (OS) based on the linux kerrnel and currently developed by google. With a user interface based on direct manipulation, Android is designed primarily for touchscreen mobile deviced such as smartphone and tablet computer, with specialized user interface for television (Android TV), cars (Android Auto), and wrist watches (Android Wear). Now, almost all peoples using smartphone. Smartphone seems to be a must-have object, because smartphone has many benefits. In addition, of course smartphone have many benefits for education, like resume of lesson that form of e-book. However, this article is not about resume of lesson. This article is about practical based on android, exactly for physics. Therefore, we will explain our idea about physics’s practical based on android and for output, we wish many students will be like to studying physics and always remember about physics’s phenomenon by physics’s practical based on android.Keywords: android, smartphone, physics, practical
Procedia PDF Downloads 2404684 Islamophobia, Years After 9/11: An Assessment of the American Media
Authors: Nasa'i Muhammad Gwadabe
Abstract:
This study seeks to find the extent to which the old Islamophobic prejudice was tilted towards a more negative direction in the United States following the 9/11 terrorist attacks. It is hypothesized that, the 9/11 attacks in the United States reshaped the old Islamophobic prejudice through the reinforcement of a strong social identity construction of Muslims as “out-group”. The “social identity” and “discourse representation” theories are used as framework for analysis. To test the hypothesis, two categories were created: the prejudice (out-group) and the tolerance (in-group) categories. The Prejudice (out-group) against Muslims category was coded to include six attributes: (Terrorist, Threat, Women's Rights violation, Undemocratic, Backward and Intolerant); while the tolerance (In-group) for Muslims category was also coded to include six attributes: (Peaceful, civilized, educated, partners trustworthy and honest). Data are generated from the archives of three American newspapers: The Los Angeles Times, New York Times and USA Today using specific search terms and specific date range; from 9/11/1996 to 9/11/2006, that is five years before and five years after the 9/11. An aggregate of 20595 articles were generated from the search of the three newspapers throughout the search periods. Conclusively, for both pre and post 9/11 periods, the articles generated under the category of prejudice (out-group) against Muslims revealed a higher frequency, against that of tolerance (in-group) for them, which is lesser. Finally, The comparison between the pre and post 9/11 periods showed that, the increased Prejudice (out-group) against Muslims was most influenced through libeling them as terrorist, which signaled a skyrocketed increase from pre to post 9/11.Keywords: in-group, Islam, Islamophobia, Muslims, out-group, prejudice, terrorism, the 9/11 and tolerance
Procedia PDF Downloads 3044683 Corporate Codes of Ethics and Earnings Discretion: International Evidence
Authors: Chu Chen, Giorgio Gotti, Tony Kang, Michael Wolfe
Abstract:
This study examines the role of codes of ethics in reducing the extent to which managers’ act opportunistically in reporting earnings. Corporate codes of ethics, by clarifying the boundaries of ethical corporate behaviors and making relevant social norms more salient, have the potential to deter managers from engaging in opportunistic financial reporting practices. In a sample of international companies, we find that the quality of corporate codes of ethics is associated with higher earnings quality, i.e., lower discretionary accruals. Our results are confirmed for a subsample of firms more likely to be engaging in opportunistic reporting behavior, i.e., firms that just meet or beat analysts’ forecasts. Further, codes of ethics play a greater role in reducing earnings management for firms in countries with weaker investor protection mechanisms. Our results suggest that corporate codes of ethics can be a viable alternative to country-level investor protection mechanisms in curbing aggressive reporting behaviors.Keywords: corporate ethics policy, code of ethics, business ethics, earnings discretion, accruals
Procedia PDF Downloads 2854682 Eating Disorders and Eating Behaviors in Morbid Obese Women with and without Type 2 Diabetes
Authors: Azadeh Mottaghi, Zeynab Shakeri
Abstract:
Background: Eating disorders (ED) are group of psychological disorders that significantly impair physical health and psychosocial function. EDconsists wide range of morbidity such as loss of eating control, binge eating disorder(BED), night eating syndrome (NES), and bulimia nervosa. Eating behavior is a wide range term that includes food choices, eating patterns, eating problems. In this study, current knowledge will be discussed aboutcomparison of eating disorders and eating behaviors in morbid obese women with and without type 2 diabetes. Methods: 231 womenwith morbid obesity were included in the study.Loss of eating control, Binge eating disorder and Bulimia nervosa, Night eating syndrome, and eating behaviors and psychosocial factorswere assessed. SPSS version 20 was used for statistical analysis. A p-value of <0.05 was considered significant. Results: There was a significant difference between women with and without diabetes in case of binge eating disorder (76.3% vs. 47.3%, p=0.001). Women with the least Interpersonal support evaluation list (ISEL) scores had a higher risk of eating disorders, and it is more common among diabetics (29.31% vs. 30.45%, p= 0.050). There was no significant difference between depression level and BDI score among women with or without diabetes. Although 38.5% (n=56) of women with diabetes and 50% (n=71) of women without diabetes had minimal depression. The logistic regression model has shown that women without diabetes had lower odds of exhibiting BED (OR=0.28, 95% CI 0.142-0.552).Women with and without diabetes with high school degree (OR=5.54, 95% CI 2.46-9.45, P= 0.0001 & OR=6.52, 95% CI 3.15-10.56, respectively) and moderate depression level (OR=2.03, 95% CI 0.98-3.95 & OR=3.12, 95% CI 2.12-4.56, P= 0.0001) had higher odds of BED. Conclusion: The result of the present study shows that the odds of BED was lower in non-diabetic women with morbid obesity. Women with morbid obesity who had high school degree and moderate depression level had more odds for BED.Keywords: eating disorders binge eating disorder, night eating syndrome, bulimia nervosa, morbid obesity
Procedia PDF Downloads 1344681 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 964680 Adolescent Health Risk Behaviors and the Mediating Effects of Family Dynamics and Socio-Demographic Factors
Authors: Rufina C. Abul, Dylan Kyle D. Apostol, Darius Rex G. Binuya, Alyanah Mae F. Cauilan, Darren A. Diaz, Angelica Jones A. Gallang, Charisse G. Kiwang, Alyanna Nicole G. Mactal, Nadine Beatrize V. Nerona, Janella Nicole R. Posadas, Charisse Purie C. Toledo
Abstract:
Background: Dramatic physical development, socioemotional adjustment, and cognitive changes highlight adolescent development. Adolescent brains are susceptible to emotional reactivity, making them likely to engage in risk-taking and impulsive behaviors. The family is crucial in laying the foundations of good health. Aims: This study determined the degree of family cohesion, quality of father-child and mother-child relationships, and degree of academic pressure across cultures, age groups, and sexual orientations. Further, it sought the prevalence of adolescent health concerns, including suicide risks, risk-taking behaviors, social media engagement, and self-care deviations. Finally, the correlations between health risk behaviors and the elements of family dynamics were unraveled. Methods: The descriptive-correlational design served as the blueprint for this study. Data were collected from 1095 adolescents aged 12-21 in two high schools and two universities in Baguio City using self-report questionnaires. Data was analyzed using Microsoft Excel Toolpak and IBM SPSS Statistics to identify significant differences and relationships among variables through descriptive statistics (frequency, %, means and figures) and inferential statistics (ANOVA and logistic regression). Results and Discussion: Adolescents generally have strong family cohesion (FC), high-quality father-child relationships (F-CR), very high-quality mother-child relationships(M-CR), and experience high academic pressure (AP). Cultural affiliation does not influence the 4 elements of family dynamics; the higher the age, the stronger the family cohesion; males score significantly higher on family cohesion and mother-child relationship while significantly lower in perceived academic pressure compared to their female and LGBT counterparts. Suicide risk is prevalent among 29-63% of the population, safety issues have the lowest prevalence for having an abusive relationship (8.22%) and the highest for encountering major family changes (53.52%). Substance use was highest for vaping (22.74%), sexual engagement occurs in 14.61% of the population, while 63% are engaged in social media for >5 hours/day. The self-care deviation is highest for weight concerns (63.39%), lack of visits to health care professionals (64.65%) and lack of exercise (49.94%). All 4 elements of family dynamic (FC, F-CR, M-CR and AP) are significantly associated with safety concerns, suicide risks and social media engagement, while M-CR significantly influences cigarette smoking, alcohol drinking, rugby use and engagement in sex. Conclusion and Recommendations: Strong family cohesion and quality parent-child interactions improve emotional and behavioral outcomes. Sexual orientation has a significant impact on academic pressure and social media use, demanding targeted treatments. The link between family dynamics and health-risk behaviors emphasizes the importance of promoting positive family relationships and encouraging safer behaviors, which are critical for increasing adolescents' well-being.Keywords: adolescent health, family cohesion, health risk behaviors, suicide risk
Procedia PDF Downloads 44679 Motion Estimator Architecture with Optimized Number of Processing Elements for High Efficiency Video Coding
Authors: Seongsoo Lee
Abstract:
Motion estimation occupies the heaviest computation in HEVC (high efficiency video coding). Many fast algorithms such as TZS (test zone search) have been proposed to reduce the computation. Still the huge computation of the motion estimation is a critical issue in the implementation of HEVC video codec. In this paper, motion estimator architecture with optimized number of PEs (processing element) is presented by exploiting early termination. It also reduces hardware size by exploiting parallel processing. The presented motion estimator architecture has 8 PEs, and it can efficiently perform TZS with very high utilization of PEs.Keywords: motion estimation, test zone search, high efficiency video coding, processing element, optimization
Procedia PDF Downloads 3624678 Transformational Leadership and Its Effect on Teacher Job Satisfaction
Authors: Shujie Liu
Abstract:
This study aimed to investigate the relationship between teachers’ perceived transformational leadership behaviors and their job satisfaction in China after controlling for teacher self-efficacy. Hierarchical regression analysis (HRA) technique was employed to examine factors’ contributions to teacher job satisfaction with a sample of Chinese high school teachers. The finding of this study provided evidence that teachers’ perceived transformational leadership behaviors accounted for a large percentage (44.9%) of the variance in Chinese teachers’ job satisfaction. Uniquely, school principals’ sense of power was a negative significant predictor of teacher job satisfaction, meaning that the more teachers perceived their principals’ sense of power, the lower of their job satisfaction. Furthermore, this study provided evidence that teacher self-efficacy significantly contributes to teacher job satisfaction. Specifically, teachers’ self-efficacy on student engagement was found to be a significant predictor of teacher job satisfaction. The conclusions were discussed in terms of Chinese cultures. The authors pointed out that how to make teachers involved in school policy making is a challenge for China and that more shared leadership is needed in Chinese schools.Keywords: Chinese teachers, teacher job satisfaction, teacher self-efficacy, transformational leadership
Procedia PDF Downloads 4944677 GA3C for Anomalous Radiation Source Detection
Authors: Chia-Yi Liu, Bo-Bin Xiao, Wen-Bin Lin, Hsiang-Ning Wu, Liang-Hsun Huang
Abstract:
In order to reduce the risk of radiation damage that personnel may suffer during operations in the radiation environment, the use of automated guided vehicles to assist or replace on-site personnel in the radiation environment has become a key technology and has become an important trend. In this paper, we demonstrate our proof of concept for autonomous self-learning radiation source searcher in an unknown environment without a map. The research uses GPU version of Asynchronous Advantage Actor-Critic network (GA3C) of deep reinforcement learning to search for radiation sources. The searcher network, based on GA3C architecture, has self-directed learned and improved how search the anomalous radiation source by training 1 million episodes under three simulation environments. In each episode of training, the radiation source position, the radiation source intensity, starting position, are all set randomly in one simulation environment. The input for searcher network is the fused data from a 2D laser scanner and a RGB-D camera as well as the value of the radiation detector. The output actions are the linear and angular velocities. The searcher network is trained in a simulation environment to accelerate the learning process. The well-performance searcher network is deployed to the real unmanned vehicle, Dashgo E2, which mounts LIDAR of YDLIDAR G4, RGB-D camera of Intel D455, and radiation detector made by Institute of Nuclear Energy Research. In the field experiment, the unmanned vehicle is enable to search out the radiation source of the 18.5MBq Na-22 by itself and avoid obstacles simultaneously without human interference.Keywords: deep reinforcement learning, GA3C, source searching, source detection
Procedia PDF Downloads 1134676 Factors Associated with Risky Sexual Behaviour in Adolescent Girls and Young Women in Cambodia: A Systematic Review
Authors: Farwa Rizvi, Joanne Williams, Humaira Maheen, Elizabeth Hoban
Abstract:
There is an increase in risky sexual behavior and unsafe sex in adolescent girls and young women aged 15 to 24 years in Cambodia, which negatively affects their reproductive health by increasing the risk of contracting sexually transmitted infections and unintended pregnancies. Risky sexual behavior includes ‘having sex at an early age, having multiple sexual partners, having sex while under the influence of alcohol or drugs, and unprotected sexual behaviors’. A systematic review of quantitative research conducted in Cambodia was undertaken, using the theoretical framework of the Social Ecological Model to identify the personal, social and cultural factors associated with risky sexual behavior and unsafe sex in young Cambodian women. PRISMA guidelines were used to search databases including Medline Complete, PsycINFO, CINAHL Complete, Academic Search Complete, Global Health, and Social Work Abstracts. Additional searches were conducted in Science Direct, Google Scholar and in the grey literature sources. A risk-of-bias tool developed explicitly for the systematic review of cross-sectional studies was used. Summary item on the overall risk of study bias after the inter-rater response showed that the risk-of-bias was high in two studies, moderate in one study and low in one study. The search strategy included a combination of subject terms and free text terms. The medical subject headings (MeSH) terms included were; contracept* or ‘birth control’ or ‘family planning’ or pregnan* or ‘safe sex’ or ‘protected intercourse’ or ‘unprotected intercourse’ or ‘protected sex’ or ‘unprotected sex’ or ‘risky sexual behaviour*’ or ‘abort*’ or ‘planned parenthood’ or ‘unplanned pregnancy’ AND ( barrier* or obstacle* or challenge* or knowledge or attitude* or factor* or determinant* or choic* or uptake or discontinu* or acceptance or satisfaction or ‘needs assessment’ or ‘non-use’ or ‘unmet need’ or ‘decision making’ ) AND Cambodia*. Initially, 300 studies were identified by using key words and finally, four quantitative studies were selected based on the inclusion criteria. The four studies were published between 2010 and 2016. The study participants ranged in age from 10-24 years, single or married, with 3 to 10 completed years of education. The mean age at sexual debut was reported to be 18 years. Using the perspective of the Social Ecological Model, risky sexual behavior was associated with individual-level factors including young age at sexual debut, low education, unsafe sex under the influence of alcohol and substance abuse, multiple sexual partners or transactional sex. Family level factors included living away from parents, orphan status and low levels of family support. Peer and partner level factors included peer delinquency and lack of condom use. Low socioeconomic status at the society level was also associated with risky sexual behaviour. There is scant research on sexual and reproductive health of adolescent girls and young women in Cambodia. Individual, family and social factors were significantly associated with risky sexual behaviour. More research is required to inform potential preventive strategies and policies that address young women’s sexual and reproductive health.Keywords: adolescents, high-risk sex, sexual activity, unplanned pregnancies
Procedia PDF Downloads 2444675 Factors Related with Self-Care Behaviors among Iranian Type 2 Diabetic Patients: An Application of Health Belief Model
Authors: Ali Soroush, Mehdi Mirzaei Alavijeh, Touraj Ahmadi Jouybari, Fazel Zinat-Motlagh, Abbas Aghaei, Mari Ataee
Abstract:
Diabetes is a disease with long cardiovascular, renal, ophthalmic and neural complications. It is prevalent all around the world including Iran, and its prevalence is increasing. The aim of this study was to determine the factors related to self-care behavior based on health belief model among sample of Iranian diabetic patients. This cross-sectional study was conducted among 301 type 2 diabetic patients in Gachsaran, Iran. Data collection was based on an interview and the data were analyzed by SPSS version 20 using ANOVA, t-tests, Pearson correlation, and linear regression statistical tests at 95% significant level. Linear regression analyses showed the health belief model variables accounted for 29% of the variation in self-care behavior; and perceived severity and perceived self-efficacy are more influential predictors on self-care behavior among diabetic patients.Keywords: diabetes, patients, self-care behaviors, health belief model
Procedia PDF Downloads 4674674 Make Up Flash: Web Application for the Improvement of Physical Appearance in Images Based on Recognition Methods
Authors: Stefania Arguelles Reyes, Octavio José Salcedo Parra, Alberto Acosta López
Abstract:
This paper presents a web application for the improvement of images through recognition. The web application is based on the analysis of picture-based recognition methods that allow an improvement on the physical appearance of people posting in social networks. The basis relies on the study of tools that can correct or improve some features of the face, with the help of a wide collection of user images taken as reference to build a facial profile. Automatic facial profiling can be achieved with a deeper study of the Object Detection Library. It was possible to improve the initial images with the help of MATLAB and its filtering functions. The user can have a direct interaction with the program and manually adjust his preferences.Keywords: Matlab, make up, recognition methods, web application
Procedia PDF Downloads 1434673 From User's Requirements to UML Class Diagram
Authors: Zeineb Ben Azzouz, Wahiba Ben Abdessalem Karaa
Abstract:
The automated extraction of UML class diagram from natural language requirements is a highly challenging task. Many approaches, frameworks and tools have been presented in this field. Nonetheless, the experiments of these tools have shown that there is no approach that can work best all the time. In this context, we propose a new accurate approach to facilitate the automatic mapping from textual requirements to UML class diagram. Our new approach integrates the best properties of statistical Natural Language Processing (NLP) techniques to reduce ambiguity when analysing natural language requirements text. In addition, our approach follows the best practices defined by conceptual modelling experts to determine some patterns indispensable for the extraction of basic elements and concepts of the class diagram. Once the relevant information of class diagram is captured, a XMI document is generated and imported with a CASE tool to build the corresponding UML class diagram.Keywords: class diagram, user’s requirements, XMI, software engineering
Procedia PDF Downloads 4704672 The Way We Express vs. What We Express
Authors: Brendan Mooney
Abstract:
We often do not consider the quality of the way we express ourselves as being fundamental to well-being. Society focuses predominantly on what we do, not the way we do it, to our great detriment. For example, those who have experienced domestic violence often comment that it was not what was said that hurt the most but the way it was said. In other words, the quality in the way the words were used communicated far more than the actual words themselves. This is an important area of focus for practitioners who may be inclined to emphasize who said what but not bring equal, if not more, focus to the quality of one’s expression. The aim of this study is to highlight how and why the way we express ourselves is more important than what we express, which includes words and all behaviors. Given we are a sensitive species it matters to pay attention to the communication that is not said. For example, we have the ability to recognize that a person is upset or angry by the way they walk into a room, even if they do not say anything or look at anyone. Our sensitivity allows us to detect even the slightest change in another’s emotional state, irrespective of what their exterior behaviors may be exhibiting. This study will focus on the importance of recognizing the quality in the way we express as being fundamental to wellbeing, as it allows us to easily and simply navigate life and relationships without needing to experience the usual pitfalls that otherwise prevail. This research utilizes clinical experience, client observations and client feedback, and several case studies were utilized to illustrate real-life examples of the above. This study is not so much a model of life but a way of life that confirms our deepest nature, that we are incredibly sensitive and far more so than we appreciate or utilize in everyday practical human life.Keywords: communication, integrity, quality, sensitivity, wellbeing
Procedia PDF Downloads 344671 Improving Similarity Search Using Clustered Data
Authors: Deokho Kim, Wonwoo Lee, Jaewoong Lee, Teresa Ng, Gun-Ill Lee, Jiwon Jeong
Abstract:
This paper presents a method for improving object search accuracy using a deep learning model. A major limitation to provide accurate similarity with deep learning is the requirement of huge amount of data for training pairwise similarity scores (metrics), which is impractical to collect. Thus, similarity scores are usually trained with a relatively small dataset, which comes from a different domain, causing limited accuracy on measuring similarity. For this reason, this paper proposes a deep learning model that can be trained with a significantly small amount of data, a clustered data which of each cluster contains a set of visually similar images. In order to measure similarity distance with the proposed method, visual features of two images are extracted from intermediate layers of a convolutional neural network with various pooling methods, and the network is trained with pairwise similarity scores which is defined zero for images in identical cluster. The proposed method outperforms the state-of-the-art object similarity scoring techniques on evaluation for finding exact items. The proposed method achieves 86.5% of accuracy compared to the accuracy of the state-of-the-art technique, which is 59.9%. That is, an exact item can be found among four retrieved images with an accuracy of 86.5%, and the rest can possibly be similar products more than the accuracy. Therefore, the proposed method can greatly reduce the amount of training data with an order of magnitude as well as providing a reliable similarity metric.Keywords: visual search, deep learning, convolutional neural network, machine learning
Procedia PDF Downloads 2144670 Object-Centric Process Mining Using Process Cubes
Authors: Anahita Farhang Ghahfarokhi, Alessandro Berti, Wil M.P. van der Aalst
Abstract:
Process mining provides ways to analyze business processes. Common process mining techniques consider the process as a whole. However, in real-life business processes, different behaviors exist that make the overall process too complex to interpret. Process comparison is a branch of process mining that isolates different behaviors of the process from each other by using process cubes. Process cubes organize event data using different dimensions. Each cell contains a set of events that can be used as an input to apply process mining techniques. Existing work on process cubes assume single case notions. However, in real processes, several case notions (e.g., order, item, package, etc.) are intertwined. Object-centric process mining is a new branch of process mining addressing multiple case notions in a process. To make a bridge between object-centric process mining and process comparison, we propose a process cube framework, which supports process cube operations such as slice and dice on object-centric event logs. To facilitate the comparison, the framework is integrated with several object-centric process discovery approaches.Keywords: multidimensional process mining, mMulti-perspective business processes, OLAP, process cubes, process discovery, process mining
Procedia PDF Downloads 2534669 Dancing with Perfectionism and Emotional Inhibition on the Ground of Disordered Eating Behaviors: Investigating Emotion Regulation Difficulties as Mediating Factor
Authors: Merve Denizci Nazligul
Abstract:
Dancers seem to have much higher risk levels for the development of eating disorders, compared to non-dancing counterparts. In a remarkably competitive nature of dance environment, perfectionism and emotion regulation difficulties become inevitable risk factors. Moreover, early maladaptive schemas are associated with various eating disorders. In the current study, it was aimed to investigate the mediating role of difficulties with emotion regulation on the relationship between perfectionism and disordered eating behaviors, as well as on the relationship between early maladaptive schemas and disordered eating behaviors. A total of 70 volunteer dancers (n = 47 women, n = 23 men) were recruited in the study (M age = 25.91, SD = 8.9, range 19–63) from the university teams or private clubs in Turkey. The sample included various types of dancers (n = 26 ballets or ballerinas, n =32 Latin, n = 10 tango, n = 2 hiphop). The mean dancing hour per week was 11.09 (SD = 7.09) within a range of 1-30 hours. The participants filled a questionnaire set including demographic information form, Dutch Eating Behavior Questionnaire, Multidimensional Perfectionism Scale, three subscales (Emotional Inhibition, Unrelenting Standards-Hypercriticalness, Approval Seeking-Recognition Seeking) from Young Schema Questionnaire-Short Form-3 and Difficulties in Emotion Regulation Scale. The mediation hypotheses were tested using the PROCESS macro in SPSS. The findings revealed that emotion regulation difficulties significantly mediated the relationship between three distinct subtypes of perfectionism and emotional eating. The results of the Sobel test suggested that there were significant indirect effects of self-oriented perfectionism (b = .06, 95% CI = .0084, .1739), other-oriented perfectionism (b = .15, 95% CI = .0136, .4185), and socially prescribed perfectionism (b = .09, 95% CI = .0104, .2344) on emotional eating through difficulties with emotion regulation. Moreover, emotion regulation difficulties significantly mediated the relationship between emotional inhibition and emotional eating (F(1,68) = 4.67, R2 = .06, p < .05). These results seem to provide some evidence that perfectionism might become a risk factor for disordered eating behaviors when dancers are not able to regulate their emotions. Further, gaining an understanding of how inhibition of emotions leads to inverse effects on eating behavior may be important to develop intervention strategies to manage their disordered eating patterns in risk groups. The present study may also support the importance of using unified protocols for transdiagnostic approaches which focus on identifying, accepting, prompting to express maladaptive emotions and appraisals.Keywords: dancers, disordered eating, emotion regulation difficulties, perfectionism
Procedia PDF Downloads 1444668 Study of Human Position in Architecture with Contextual Approach
Authors: E. Zarei, M. Bazaei, A. seifi, A. Keshavarzi
Abstract:
Contextuallism has been always the main component of urban science. It not only has great direct and indirect impact on behaviors, events and interactions, but also is one of the basic factors of an urban values and identity. Nowadays there might be some deficiencies in the cities. In the theories of environment designing, humanistic orientations with the focus on culture and cultural variables would enable us to transfer information. To communicate with the context in which human lives, he needs some common memories, understandable symbols and daily activities in that context. The configuration of a place can impact on human’s behaviors. The goal of this research is to review 7 projects in different parts of the world with various usages and some factors such as ‘sense of place’, ‘sense of belonging’ and ‘social and cultural relations’ will be discussed in these projects. The method used for research in this project is descriptive- analytic. Library information and Internet are the main sources of gathering information and the method of reasoning used in this project is inductive. The consequence of this research will be some data in the form of tables that has been extracted from mentioned projects.Keywords: contextuallism with humanistic approach, sense of place, sense of belonging, social and cultural relations
Procedia PDF Downloads 3954667 The Visualizer for Real-Time Analysis of Internet Trends
Authors: Radek Malinský, Ivan Jelínek
Abstract:
The current web has become a modern encyclopedia, where people share their thoughts and ideas on various topics around them. Such kind of encyclopedia is very useful for other people who are looking for answers to their questions. However, with the growing popularity of social networking and blogging and ever expanding network services, there has also been a growing diversity of technologies along with different structure of individual websites. It is, therefore, difficult to directly find a relevant answer for a common Internet user. This paper presents a web application for the real-time end-to-end analysis of selected Internet trends; where the trend can be whatever the people post online. The application integrates fully configurable tools for data collection and analysis using selected webometric algorithms, and for its chronological visualization to user. It can be assumed that the application facilitates the users to evaluate the quality of various products that are mentioned online.Keywords: Trend, visualizer, web analysis, web 2.0.
Procedia PDF Downloads 2614666 The Impact of Social Emotional Learning and Conflict Resolution Skills
Authors: Paula Smith
Abstract:
During adolescence, many students engage in maladaptive behaviors that may reflect a lack of knowledge in social-emotional skills. Oftentimes these behaviors lead to conflicts and school-related disciplinary actions. Therefore, conflict resolution skills are vital for academic and social success. Conflict resolution is one component of a social-emotional learning (SEL) pedagogy that can effectively reduce discipline referrals and build students' social-emotional capacity. This action research study utilized a researcher-developed virtual SEL curriculum to provide instruction to eight adolescent students in an urban school in New York City with the goal of fostering their emotional intelligence (EI), reducing aggressive behaviors, and supporting instruction beyond the core academic content areas. Adolescent development, EI, and SEL frameworks were used to formulate this curriculum. Using a qualitative approach, this study inquired into how effectively participants responded to SEL instruction offered in virtual, Zoom-based workshops. Data included recorded workshop sessions, researcher field notes, and Zoom transcripts. Descriptive analysis involved manual coding/re-coding of transcripts to understand participants’ lived experience with conflict and the ideas presented in the workshops. Findings highlighted several themes and cultural norms that provided insight into adolescents' lived experiences and helped explain their past ideas about conflict. Findings also revealed participants' perspectives about the importance of SEL skills. This study illustrates one example of how evidence-based SEL programs might offer adolescents an opportunity to share their lived experiences. Programs such as this also address both individual and group needs, enabling practitioners to help students develop practical conflict resolution skills.Keywords: social, emotional, learning, conflict, resolution
Procedia PDF Downloads 144665 Improved Artificial Bee Colony Algorithm for Non-Convex Economic Power Dispatch Problem
Authors: Badr M. Alshammari, T. Guesmi
Abstract:
This study presents a modified version of the artificial bee colony (ABC) algorithm by including a local search technique for solving the non-convex economic power dispatch problem. The local search step is incorporated at the end of each iteration. Total system losses, valve-point loading effects and prohibited operating zones have been incorporated in the problem formulation. Thus, the problem becomes highly nonlinear and with discontinuous objective function. The proposed technique is validated using an IEEE benchmark system with ten thermal units. Simulation results demonstrate that the proposed optimization algorithm has better convergence characteristics in comparison with the original ABC algorithm.Keywords: economic power dispatch, artificial bee colony, valve-point loading effects, prohibited operating zones
Procedia PDF Downloads 2554664 Gender Differences in Risk Aversion Behavior: Case Study of Saudi Arabia and Jordan
Authors: Razan Salem
Abstract:
Men and women have different approaches towards investing, both in terms of strategies and risk attitudes. This study aims to focus mainly on investigating the financial risk behaviors of Arab women investors and to examine the financial risk tolerance levels of Arab women relative to Arab men investors. Using survey data on 547 Arab men and women investors, the results of Wilcoxon Signed-Rank (One-Sample) test Mann-Whitney U test reveal that Arab women are risk-averse investors and have lower financial risk tolerance levels relative to Arab men. Such findings can be explained by the fact of women's nature and lower investment literacy levels. Further, the current political uncertainty in the Arab region may be considered as another explanation of Arab women’s risk aversion behavior. The study's findings support the existing literature by validating the stereotype of “women are more risk-averse than men” in the Arab region. Overall, when it comes to investment and financial behaviors, women around the world behave similarly.Keywords: Arab region, culture, financial risk behavior, gender differences, women investors
Procedia PDF Downloads 1634663 Design of an Ensemble Learning Behavior Anomaly Detection Framework
Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia
Abstract:
Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing
Procedia PDF Downloads 127