Search results for: arabic text
932 Authorship Profiling of Unidentified Corpora in Saudi Social Media
Authors: Abdulaziz Fageeh
Abstract:
In the bustling digital landscape of Saudi Arabia, a chilling wave of cybercrime has swept across the nation. Among the most nefarious acts are financial blackmail schemes, perpetrated by anonymous actors lurking within the shadows of social media platforms. This chilling reality necessitates the utilization of forensic linguistic techniques to unravel the identities of these virtual villains. This research delves into the complex world of authorship profiling, investigating the effectiveness of various linguistic features in identifying the perpetrators of malicious messages within the Saudi social media environment. By meticulously analyzing patterns of language, vocabulary choice, and stylistic nuances, the study endeavors to uncover the hidden characteristics of the individuals responsible for these heinous acts. Through this linguistic detective work, the research aims to provide valuable insights to investigators and policymakers in the ongoing battle against cybercrime and to shed light on the evolution of malicious online behavior within the Saudi context.Keywords: authorship profiling, arabic linguistics, saudi social media, cybercrime, financial blackmail, linguistic features, forensic linguistics, online threats
Procedia PDF Downloads 16931 A Study on Vulnerability of Alahsa Governorate to Generate Urban Heat Islands
Authors: Ilham S. M. Elsayed
Abstract:
The purpose of this study is to investigate Alahsa Governorate status and its vulnerability to generate urban heat islands. Alahsa Governorate is a famous oasis in the Arabic Peninsula including several oil centers. Extensive literature review was done to collect previous relative data on the urban heat island of Alahsa Governorate. Data used for the purpose of this research were collected from authorized bodies who control weather station networks over Alahsa Governorate, Eastern Province, Saudi Arabia. Although, the number of weather station networks within the region is very limited and the analysis using GIS software and its techniques is difficult and limited, the data analyzed confirm an increase in temperature for more than 2 °C from 2004 to 2014. Such increase is considerable whenever human health and comfort are the concern. The increase of temperature within one decade confirms the availability of urban heat islands. The study concludes that, Alahsa Governorate is vulnerable to create urban heat islands and more attention should be drawn to strategic planning of the governorate that is developing with a high pace and considerable increasing levels of urbanization.Keywords: Alahsa Governorate, population density, Urban Heat Island, weather station
Procedia PDF Downloads 254930 Library Support for the Intellectually Disabled: Book Clubs and Universal Design
Authors: Matthew Conner, Leah Plocharczyk
Abstract:
This study examines the role of academic libraries in support of the intellectually disabled (ID) in post-secondary education. With the growing public awareness of the ID, there has been recognition of their need for post-secondary educational opportunities. This was an unforeseen result for a population that has been associated with elementary levels of education, yet the reasons are compelling. After aging out of the school system, the ID need and deserve educational and social support as much as anyone. Moreover, the commitment to diversity in higher education rings hollow if this group is excluded. Yet, challenges remain to integrating the ID into a college curriculum. This presentation focuses on the role of academic libraries. Neglecting this vital resource for the support of the ID is not to be thought of, yet the library’s contribution is not clear. Library collections presume reading ability and libraries already struggle to meet their traditional goals with the resources available. This presentation examines how academic libraries can support post-secondary ID. For context, the presentation first examines the state of post-secondary education for the ID with an analysis of data on the United States compiled by the ThinkCollege! Project. Geographic Information Systems (GIS) and statistical analysis will show regional and methodological trends in post-secondary support of the ID which currently lack any significant involvement by college libraries. Then, the presentation analyzes a case study of a book club at the Florida Atlantic University (FAU) libraries which has run for several years. Issues such as the selection of books, effective pedagogies, and evaluation procedures will be examined. The study has found that the instruction pedagogies used by libraries can be extended through concepts of Universal Learning Design (ULD) to effectively engage the ID. In particular, student-centered, participatory methodologies that accommodate different learning styles have proven to be especially useful. The choice of text is complex and determined not only by reading ability but familiarity of subject and features of the ID’s developmental trajectory. The selection of text is not only a necessity but also promises to give insight into the ID. Assessment remains a complex and unresolved subject, but the voluntary, sustained, and enthusiastic attendance of the ID is an undeniable indicator. The study finds that, through the traditional library vehicle of the book club, academic libraries can support ID students through training in both reading and socialization, two major goals of their post-secondary education.Keywords: academic libraries, intellectual disability, literacy, post-secondary education
Procedia PDF Downloads 164929 The Different Ways to Describe Regular Languages by Using Finite Automata and the Changing Algorithm Implementation
Authors: Abdulmajid Mukhtar Afat
Abstract:
This paper aims at introducing finite automata theory, the different ways to describe regular languages and create a program to implement the subset construction algorithms to convert nondeterministic finite automata (NFA) to deterministic finite automata (DFA). This program is written in c++ programming language. The program reads FA 5tuples from text file and then classifies it into either DFA or NFA. For DFA, the program will read the string w and decide whether it is acceptable or not. If accepted, the program will save the tracking path and point it out. On the other hand, when the automation is NFA, the program will change the Automation to DFA so that it is easy to track and it can decide whether the w exists in the regular language or not.Keywords: finite automata, subset construction, DFA, NFA
Procedia PDF Downloads 427928 The Reflexive Interaction in Group Formal Practices: The Question of Criteria and Instruments for the Character-Skills Evaluation
Authors: Sara Nosari
Abstract:
In the research field on adult education, the learning development project followed different itineraries: recently it has promoted adult transformation by practices focused on the reflexive oriented interaction. This perspective, that connects life stories and life-based methods, characterizes a transformative space between formal and informal education. Within this framework, in the Nursing Degree Courses of Turin University, it has been discussed and realized a formal reflexive path on the care work professional identity through group practices. This path compared the future care professionals with possible experiences staged by texts used with the function of a pre-tests: these texts, setting up real or believable professional situations, had the task to start a reflection on the different 'elements' of care work professional life (relationship, educational character of relationship, relationship between different care roles; or even human identity, aims and ultimate aim of care, …). The learning transformative aspect of this kind of experience-test is that it is impossible to anticipate the process or the conclusion of reflexion because they depend on two main conditions: the personal sensitivity and the specific situation. The narrated experience is not a device, it does not include any tricks to understand the answering advance; the text is not aimed at deepening the knowledge, but at being an active and creative force which takes the group to compare with problematic figures. In fact, the experience-text does not have the purpose to explain but to problematize: it creates a space of suspension to live for questioning, for discussing, for researching, for deciding. It creates a space 'open' and 'in connection' where each one, in comparing with others, has the possibility to build his/her position. In this space, everyone has to possibility to expose his/her own argumentations and to be aware of the others emerged points of view, aiming to research and find the own personal position. However, to define his/her position, it is necessary to learn to exercise character skills (conscientiousness, motivation, creativity, critical thinking, …): if these not-cognitive skills have an undisputed evidence, less evident is how to value them. The paper will reflect on the epistemological limits and possibility to 'measure' character skills, suggesting some evaluation criteria.Keywords: transformative learning, educational role, formal/informal education, character-skills
Procedia PDF Downloads 195927 Using Genre Analysis to Teach Contract Negotiation Discourse Practices
Authors: Anthony Townley
Abstract:
Contract negotiation is fundamental to commercial law practice. For this study, genre and discourse analytical methodology was used to examine the legal negotiation of a Merger & Acquisition (M&A) deal undertaken by legal and business professionals in English across different jurisdictions in Europe. While some of the most delicate negotiations involved in this process were carried on face-to-face or over the telephone, these were generally progressed more systematically – and on the record – in the form of emails, email attachments, and as comments and amendments recorded in successive ‘marked-up’ versions of the contracts under negotiation. This large corpus of textual data was originally obtained by the author, in 2012, for the purpose of doctoral research. For this study, the analysis is particularly concerned with the use of emails and covering letters to exchange legal advice about the negotiations. These two genres help to stabilize and progress the negotiation process and account for negotiation activities. Swalesian analysis of functional Moves and Steps was able to identify structural similarities and differences between these text types and to identify certain salient discursive features within them. The analytical findings also indicate how particular linguistic strategies are more appropriately and more effectively associated with one legal genre rather than another. The concept of intertextuality is an important dimension of contract negotiation discourse and this study also examined how the discursive relationships between the different texts influence the way that texts are constructed. In terms of materials development, the research findings can contribute to more authentic English for Legal & Business Purposes pedagogies for students and novice lawyers and business professionals. The findings can first be used to design discursive maps that provide learners with a coherent account of the intertextual nature of the contract negotiation process. These discursive maps can then function as a framework in which to present detailed findings about the textual and structural features of the text types by applying the Swalesian genre analysis. Based on this acquired knowledge of the textual nature of contract negotiation, the authentic discourse materials can then be used to provide learners with practical opportunities to role-play negotiation activities and experience professional ways of thinking and using language in preparation for the written discourse challenges they will face in this important area of legal and business practice.Keywords: English for legal and business purposes, discourse analysis, genre analysis, intertextuality, pedagogical materials
Procedia PDF Downloads 150926 A Discourse Study of Multimodal Intertextuality in Egyptian Social Media Memes
Authors: Ola Hafez
Abstract:
This study examines the way selected Egyptian digitally mediated memes utilize intertextuality as a means of expression. It is motivated by the emerging digital socio-political humorous practice using various forms of political commentary in Egyptian social media. One of these forms involves the use of memes incorporating (often doctored) video frames taken from Egyptian plays, films and songs, and relocated in a different socio-political context, often with a caption that re-appropriates the frame for the purpose of critical commentary, thus juxtaposing the socio-political phenomena being addressed and the Egyptian artistic and cultural heritage. The paper presents a discourse study of a convenience sample of a recent social media campaign and carries out two levels of analysis. At the micro level, the study pinpoints the various modes of intertextuality employed, including verbal as well as visual intertextuality in the light of the work of social semiotics by Kress and van Leeuwen. At the macro level, the paper sheds light on the socio-political implications of such practice in the light of Political Discourse Analysis.Keywords: digitally mediated discourse, discourse analysis, Egyptian Arabic, intertextuality, memes, multimodality, political discourse analysis
Procedia PDF Downloads 218925 Scientific Interpretation of “Fertilizing Winds” Mentioned in Verse 15:22 of Al-Quran
Authors: Md. Mamunur Rashid
Abstract:
Allah (SWT) bestowed us with the Divine blessing, providing the wonderful source of water as stated in verse 15:22 of Al-Quran. Arabic “Ar-Riaaha Lawaaqiha (ٱلرِّيَـٰحَ لَوَٰقِحَ)” of this verse is translated as “fertilizing winds.” The “fertilizing winds” literally, refer the winds of having the roles: to fertilize something similar to the “zygotes” in humans and animals (formation of clouds in the sky in this case); to produce fertilizers for the plants, crops, etc.; and to pollinate the plants. In this paper, these roles of “fertilizing winds” have been validated by presenting the modern knowledge of science in this regard. Existing interpretations are mostly focused on the “formation of clouds in the sky” while few of them mention about the pollination of trees. However, production of fertilizers, in this regard, has not been considered by any translator or interpreter. It has been observed that the winds contain, the necessary components of forming the clouds; the necessary components of producing the fertilizers; and the necessary components to pollinate the plants. The Science of Meteorology gives us the clear understanding of the formation of clouds. Moreover, we know that the lightning bolts breaks the nitrogen molecules of winds and the water molecules of vapor to form fertilizers. Pollination is a common role of winds in plants fertilization. All the scientific phenomena presented here give us the better interpretations of “fertilizing winds.”Keywords: Al-Quran, fertilizing winds, meteorology, scientific
Procedia PDF Downloads 121924 RussiAnglicized© Slang and Translation: A Clockwork Orange Tick-Tock
Authors: Mahnaz Movahedi
Abstract:
Slang argot plays a fundamental role in Burgess’ teenage special sociolect in his novel A Clockwork Orange, offered a wide variety of instances to be analyzed. Consequently, translation of the notions and keeping the effect would be of great importance. Burgess named his interesting RussiAnglicized©-slang word as Nadsat, stands for –teen, mostly derived from Russian and Cockney rhyming. The paper discusses the lexical origin and Persian translation of his weird slang words illustrating a teenage-gang argot. The product depicts creativity but mistranslation that leads to the loss of slang meaning load and atmosphere in the target text.Keywords: argot, mistranslation, slang, sociolect
Procedia PDF Downloads 253923 The Orthodox Church's Heritage in Syria and the Journey of Syriac Music between Originality and Renewal
Authors: Marilyn Maksoud
Abstract:
This article discusses the heritage of the Orthodox Church, additionally it describes the origins, composition, and characteristics of the Orthodox Christian cultural identity in Syria and the liturgical traditions of the Church in the literature. Also, the eight tunes and their original use, the historical and anthropological importance of the most important Orthodox churches in Syria, were discussed. Finally, the role and works of the composer Nuri Iskandar in reviving Christian music were mentioned. "Cultural dialogue" methodology based on the recognition of equal cultures, practical and bibliographic sources of books and articles in many languages German, French, Arabic, and English, in addition to my practical experience in chanting the Syriac Aramaic language in some churches in Syria and Russia. This study concluded that the roots of the characteristics of Orthodox Christian culture in Syria go back to the original eight Syriac melodies. Additionally, The originality of Major and Minor scales were tracked as an extension of Syriac Christian melodies originated thousands of years ago in Syrian land.Keywords: church culture in Syria, Syriac orthodox music, Syriac orthodox church, Aramaic semitic language, Syriac, Syrian church melodies
Procedia PDF Downloads 188922 A Study of Predicting Judgments on Causes of Online Privacy Invasions: Based on U.S Judicial Cases
Authors: Minjung Park, Sangmi Chai, Myoung Jun Lee
Abstract:
Since there are growing concerns on online privacy, enterprises could involve various personal privacy infringements cases resulting legal causations. For companies that are involving online business, it is important for them to pay extra attentions to protect users’ privacy. If firms can aware consequences from possible online privacy invasion cases, they can more actively prevent future online privacy infringements. This study attempts to predict the probability of ruling types caused by various invasion cases under U.S Personal Privacy Act. More specifically, this research explores online privacy invasion cases which was sentenced guilty to identify types of criminal punishments such as penalty, imprisonment, probation as well as compensation in civil cases. Based on the 853 U.S judicial cases ranged from January, 2000 to May, 2016, which related on data privacy, this research examines the relationship between personal information infringements cases and adjudications. Upon analysis results of 41,724 words extracted from 853 regal cases, this study examined online users’ privacy invasion cases to predict the probability of conviction for a firm as an offender in both of criminal and civil law. This research specifically examines that a cause of privacy infringements and a judgment type, whether it leads a civil or criminal liability, from U.S court. This study applies network text analysis (NTA) for data analysis, which is regarded as a useful method to discover embedded social trends within texts. According to our research results, certain online privacy infringement cases caused by online spamming and adware have a high possibility that firms are liable in the case. Our research results provide meaningful insights to academia as well as industry. First, our study is providing a new insight by applying Big Data analytics to legal cases so that it can predict the cause of invasions and legal consequences. Since there are few researches applying big data analytics in the domain of law, specifically in online privacy, this study suggests new area that future studies can explore. Secondly, this study reflects social influences, such as a development of privacy invasion technologies and changes of users’ level of awareness of online privacy on judicial cases analysis by adopting NTA method. Our research results indicate that firms need to improve technical and managerial systems to protect users’ online privacy to avoid negative legal consequences.Keywords: network text analysis, online privacy invasions, personal information infringements, predicting judgements
Procedia PDF Downloads 229921 Knowledge of Strategies to Teach Reading Components Among Teachers of Hard of Hearing Students
Authors: Khalid Alasim
Abstract:
This study investigated Saudi Arabian elementary school teachers’ knowledge of strategies to teach reading components to hard-of-hearing students. The study focused on four of the five reading components the National Reading Panel (NPR, 2000) identified: phonemic awareness; phonics; vocabulary, and reading comprehension, and explored the relationship between teachers’ demographic characteristics and their knowledge of the strategies as well. An explanatory sequential mixed methods design was used that included two phases. The quantitative phase examined the knowledge of these Arabic reading components among 89 elementary school teachers of hard-of-hearing students, and the qualitative phase consisted of interviews with 10 teachers. The results indicated that the teachers have a great deal of knowledge (above the mean score) of strategies to teach reading components. Specifically, teachers’ knowledge of strategies to teach the vocabulary component was the highest. The results also showed no significant association between teachers’ demographic characteristics and their knowledge of strategies to teach reading components. The qualitative analysis revealed two themes: 1) teachers’ lack of basic knowledge of strategies to teach reading components, and 2) the absence of in-service courses and training programs in reading for teachers.Keywords: knowledge, reading, components, hard-of-hearing, phonology, vocabulary
Procedia PDF Downloads 81920 A Method and System for Secure Authentication Using One Time QR Code
Authors: Divyans Mahansaria
Abstract:
User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.Keywords: authentication, QR code, cipher / decipher text, one time password, secret information
Procedia PDF Downloads 269919 The School Based Support Program: An Evaluation of a Comprehensive School Reform Initiative in the State of Qatar
Authors: Abdullah Abu-Tineh, Youmen Chaaban
Abstract:
This study examines the development of a professional development (PD) model for teacher growth and learning that is embedded into the school context. The School based Support Program (SBSP), designed for the Qatari context, targets the practices, knowledge and skills of both school leadership and teachers in an attempt to improve student learning outcomes. Key aspects of the model include the development of learning communities among teachers, strong leadership that supports school improvement activities, and the use of research-based PD to improve teacher practices and student achievement. This paper further presents findings from an evaluation of this PD program. Based on an adaptation of Guskey’s evaluation of PD models, 100 teachers at the participating schools were selected for classroom observations and 40 took part in in-depth interviews to examine changed classroom practices. The impact of the PD program on student learning was also examined. Teachers’ practices and their students’ achievement in English, Arabic, mathematics and science were measured at the beginning and at the end of the intervention.Keywords: initiative, professional development, school based support Program (SBSP), school reform
Procedia PDF Downloads 496918 Ideological Passing: A Study of Tawfiq Al-Hakim’s The River of Madness
Authors: Yasser Khamis Ragab Aman
Abstract:
Tawfiq Al-Hakim (1898-1987) celebrated the 1919 Revolution by writing The Return of The Spirit published in 1933, a novel which portrayed national awakening and illustrated the cult of a nationalist leader, such as Saad Zaghloul so much that it influenced Egypt’s first president Gamal Abdel Nasser. However, in 1974, and because of an excruciating sense of disappointment, Al-Hakim wrote The Return of Consciousness. Between losing and regaining consciousness, Al-Hakim wrote The River of Madness, a short play published in 1937. It portrays an old kingdom established in a distant place where there is a conflict between the King and his minister, who have not drunk from the river of madness, on the one hand, and the inhabitants of the kingdom who thought that the King and the minister have gone mad because they refused to drink from the river. (Each party doubted the sanity of the other). In fact, the King and the minister differ in their political stance from the rest of the people. By philosophical reasoning, the minister convinces the King that it is safer to go mad with the majority than to be treated as an unwanted minority. It is believed that in The River of Madness, Al-Hakim deftly portrays an example of ideological passing as an alternative solution that can save the country from the woes of the aftermath of revolution and civil war.Keywords: ideological passing, Al Hakim, The River of Madness, Arabic literature
Procedia PDF Downloads 140917 Speech Rhythm Variation in Languages and Dialects: F0, Natural and Inverted Speech
Authors: Imen Ben Abda
Abstract:
Languages have been classified into different rhythm classes. 'Stress-timed' languages are exemplified by English, 'syllable-timed' languages by French and 'mora-timed' languages by Japanese. However, to our best knowledge, acoustic studies have not been unanimous in strictly establishing which rhythm category a given language belongs to and failed to show empirical evidence for isochrony. Perception seems to be a good approach to categorize languages into different rhythm classes. This study, within the scope of experimental phonetics, includes an account of different perceptual experiments using cues from natural and inverted speech, as well as pitch extracted from speech data. It is an attempt to categorize speech rhythm over a large set of Arabic (Tunisian, Algerian, Lebanese and Moroccan) and English dialects (Welsh, Irish, Scottish and Texan) as well as other languages such as Chinese, Japanese, French, and German. Listeners managed to classify the different languages and dialects into different rhythm classes using suprasegmental cues mainly rhythm and pitch (F0). They also perceived rhythmic differences even among languages and dialects belonging to the same rhythm class. This may show that there are different subclasses within very broad rhythmic typologies.Keywords: F0, inverted speech, mora-timing, rhythm variation, stress-timing, syllable-timing
Procedia PDF Downloads 528916 Interactive Multiple Functions User Interface
Authors: Manjit Singh Sidhu, Waleed Maqableh, Jee Geak Ying
Abstract:
Tangible user interfaces (TUI) that employ markers in the augmented reality (AR) environment has hampered the interactivity between the user and the software application. This is because the user lacks focus on visualizing the contents due to the interaction mechanisms whereby multiple markers may need to be used to perform a particular function. In this research, we have designed a novel TUI user interface where multiple functions could be triggered similar to a natural keyboard thus allowing user to focus more on its digital contents such as 2D/3D, text input, animation and sound. Test results of the user interface with potential users and HCI experts revealed that the multiple functions user interface was new, preferred and appreciated more as opposed to marker based user interface.Keywords: multimedia, augmented reality, engineering, user interface, visualization
Procedia PDF Downloads 450915 Geotechnical Characterization of Landslide in Dounia Park, Algiers, Algeria
Authors: Mira Filali, Amar Nechnech
Abstract:
Most landslides in Algiers take place in Piacenzian marls of the Sahel (port in Arabic) and cause severe damage to properties and infrastructures. The aim of this paper is to describe the results of experimental as well as theoretical analysis of landslides. In order to understand the process which caused this slope instabilities, the results of geotechnical investigation carried out by the laboratory of construction (LNHC) laboratory in the area of Dounia park were analyzed, including particle size distribution, Atterberg limits, shear strength, odometer and pressuremeter tests. The study shows that the soils exhibited a high capacity to swelling according to index plasticity and clay content. Highs limit liquidity (LL) (53.45%) means that the soils are susceptible to landslides. The stability analysis carried out using finite element method, shows that the slope is stable (Fs > 1) in dry condition and in static state. Despite this results, the stable site could be described as only conditionally stable because slope failure can occur under combined effect of different factors. In fact the safety factor obtained by applying load when the phreatic surface is at ground, less than 1.5.Keywords: index properties, landslides, safety factor, slope stability
Procedia PDF Downloads 239914 Post-traumatic Checklist-5 (PCL-5) Psychometric Properties: Across Sectional Study Among Lebanese Population
Authors: Fadwa Alhalaiqa, Othman Alfuqaha, Anas H. Khalifeh, Mahmoud Alsaraireh, Rami Masa’Deh, Natija S Manaa
Abstract:
Background: Post-traumatic stress disorders (PTSD) usually occur after traumatic occurrences that exceed the range of common human experience. This study aimed to test the psychometric properties of PCL-5 checklist for the 20 PTSD symptoms from DSM-5 among Lebanese population and to identify the prevalence of PTSD. Methods: A cross sectional survey of PCL5 among 950 Lebanese using the online survey platform by Google form was conducted. Snowball recruitment was used to identify participants for the survey. STROBE guideline was used in reporting the current study. Results: Face content, construct, discriminant, and convergent validity had been accomplished of PCL-5. The reliability by Cronbach alpha, composite, and average variance extracted were set superior. We found also that more than half of the participants (55.6%) scored 33 or above, which is the cutoff score for a likely diagnosis of PTSD. Conclusion: The current study provides further support for the Arabic version PCL-5 validity and reliability among non-Western populations. This support using this tool in the screening of PTSD.Keywords: post traumatic stress disorder, psychometric properties, stress, adult population
Procedia PDF Downloads 102913 Metadiscourse in Chinese and Thai Request Emails: Analysis and Pedagogical Application
Authors: Chia-Ling Hsieh, Kankanit Potikit
Abstract:
Metadiscourse refers to linguistic resources employed by writers to organize text and interact with readers. While metadiscourse has received considerable attention within the field of discourse analysis, few studies have explored the use of metadiscourse in email, one of the most popular forms of computer-mediated communication. Furthermore, the diversity of cross-linguistic research required to uncover the influence of cultural factors on metadiscourse use is lacking. The present study compares metadiscourse markers employed in Chinese and Thai-language request emails with the purpose of discovering cross-cultural similarities and differences that are meaningful and applicable to foreign language teaching. The analysis is based on a corpus of 200 request emails: 100 composed in Chinese and 100 in Thai, with half of the emails from each language data set addressed to professors and the other half addressed to classmates. Adopting Hyland’s model as an analytical framework, two primary categories of metadiscourse are identified. Textual metadiscourse helps to create text coherence, while interpersonal metadiscourse functions to convey authorial stance. Results of the study make clear that both Chinese and Thai-language emails use significantly more interpersonal markers than textual markers, indicating that email, as a unique communicative medium, is characterized by high degrees of concision and interactivity. Users of both languages further deploy similar patterns in writing emails to recipients of different social statuses. Compared with emails addressed to classmates, emails addressed to professors are notably longer and include more transition and engagement markers. Nevertheless, cultural factors do play a role. Emails composed in Thai, for example, include more textual markers than those in Chinese, as Thai favors formal expressions and detailed explanations, while in contrast, emails composed in Chinese employ more interpersonal markers than those in Thai, since Chinese tends to emphasize recipient involvement and attitudinal warmth. These findings thereby demonstrate the combined effects of email as a communicative medium, social status, and cultural values on metadiscourse usage. The study concludes by applying these findings to pedagogical suggestions for teaching email writing to Chinese and Thai language learners based on similarities and differences in metadiscourse strategy between the two languages.Keywords: discourse analysis, email, metadiscourse, writing instruction
Procedia PDF Downloads 128912 A Survey on Early Screen Exposure during Infancy and Autism
Authors: I. Mahmood
Abstract:
This survey was conducted to explore the hypothesis that excessive screen exposure combined with a subsequent decrease in parent-child interaction during infancy might be associated with autism. The main questions being asked are: Were children with autism exposed to long hours of screen time during the first 2 years of life? And what was the reason(s) for exposure at such an early age? Other variables were also addressed in this survey. An Arabic questionnaire was administered online (June 2019) via a Facebook page, relatively well-known in Arab countries. 1725 parents of children diagnosed with autism participated in this survey. Results show that 80.9% of children surveyed who were diagnosed with autism had been exposed to screens for long periods of time during the first 2 years of life. It can be inferred from the results of this survey that over-exposure to screens disrupt the parent-child interaction which is shown to be associated with ASD. The results of this survey highlight the harmful effects of screen exposure during infancy and the importance of parent-child interaction during the critical period of brain development. This paper attempts to further explore the connection between parent-child interaction and ASD, as well as serve as a call for further research and investigation of the relation between screens and parent-child interactions during infancy and Autism.Keywords: attachment disorder, autism, screen exposure, virtual autism
Procedia PDF Downloads 128911 Towards an Adversary-Aware ML-Based Detector of Spam on Twitter Hashtags
Authors: Niddal Imam, Vassilios G. Vassilakis
Abstract:
After analysing messages posted by health-related spam campaigns in Twitter Arabic hashtags, we found that these campaigns use unique hijacked accounts (we call them adversarial hijacked accounts) as adversarial examples to fool deployed ML-based spam detectors. Existing ML-based models build a behaviour profile for each user to detect hijacked accounts. This approach is not applicable for detecting spam in Twitter hashtags since they are computationally expensive. Hence, we propose an adversary-aware ML-based detector, which includes a newly designed feature (avg posts) to improve the detection of spam tweets posted by the adversarial hijacked accounts at a tweet-level in trending hashtags. The proposed detector was designed considering three key points: robustness, adaptability, and interpretability. The new feature leverages the account’s temporal patterns (i.e., account age and number of posts). It is faster to compute compared to features discussed in the literature and improves the accuracy of detecting the identified hijacked accounts by 73%.Keywords: Twitter spam detection, adversarial examples, evasion attack, adversarial concept drift, account hijacking, trending hashtag
Procedia PDF Downloads 81910 The Capacity of Mel Frequency Cepstral Coefficients for Speech Recognition
Authors: Fawaz S. Al-Anzi, Dia AbuZeina
Abstract:
Speech recognition is of an important contribution in promoting new technologies in human computer interaction. Today, there is a growing need to employ speech technology in daily life and business activities. However, speech recognition is a challenging task that requires different stages before obtaining the desired output. Among automatic speech recognition (ASR) components is the feature extraction process, which parameterizes the speech signal to produce the corresponding feature vectors. Feature extraction process aims at approximating the linguistic content that is conveyed by the input speech signal. In speech processing field, there are several methods to extract speech features, however, Mel Frequency Cepstral Coefficients (MFCC) is the popular technique. It has been long observed that the MFCC is dominantly used in the well-known recognizers such as the Carnegie Mellon University (CMU) Sphinx and the Markov Model Toolkit (HTK). Hence, this paper focuses on the MFCC method as the standard choice to identify the different speech segments in order to obtain the language phonemes for further training and decoding steps. Due to MFCC good performance, the previous studies show that the MFCC dominates the Arabic ASR research. In this paper, we demonstrate MFCC as well as the intermediate steps that are performed to get these coefficients using the HTK toolkit.Keywords: speech recognition, acoustic features, mel frequency, cepstral coefficients
Procedia PDF Downloads 260909 The Language of Hip-Hop and Rap in Tunisia: Symbol of Cultural Change in Post-Arab Spring Tunisia
Authors: Zouhir Gabsi
Abstract:
The Arab Spring has had noticeable effects on Tunisia in socio-economic, political, and cultural terms. Few have predicted that the music of hip-hop and rap could engage with the socio-political situation in Tunisia, especially after the downfall of Ben Ali’s regime. Having survived as underground music since the year 2000, the genre of hip-hop and rap remains an aberration from the folkloric tradition. By adhering to the socio-economic reality of the Tunisian street, rappers attempt to claim authenticity mainly in both thematic and language uses, and by usurping the power of ‘space’ from the regime’s control. With the songs’ fast-paced rhythms, catchy phrases, puns, vulgarisms, and linguistic innovations using metaphors, hip-hop, and rap have struck a chord with Tunisia’s youth. Tunisia’s new social reality has allowed Tunisian rappers to express dissent and voice people’s despair over the socio-economic and political situation. This paper argues that rap artists use language as a vehicle to claim the authenticity of their message. It also explores how the performative nature of the language of hip-hop and rap interacts with the Tunisian culture and argues the power of music in the context of political and socio-economic grievances in post-Arab Spring Tunisia.Keywords: Arab Spring, hip-hop, eevolution, Tunisia, Tunisian Arabic
Procedia PDF Downloads 153908 Lexico-Semantic and Contextual Analysis of the Concept of Joy in Modern English Fiction
Authors: Zarine Avetisyan
Abstract:
Concepts are part and parcel of everyday text and talk. Their ubiquity predetermines the topicality of the given research which aims at the semantic decomposition of concepts in general and the concept of joy in particular, as well as the study of lexico-semantic variants as means of realization of a certain concept in different “semantic settings”, namely in a certain context. To achieve the stated aim, the given research departs from the methods of componential and contextual analysis, studying lexico-semantic variants /LSVs/ of the concept of joy and the semantic signs embedded in those LSVs, such as the semantic sign of intensity, supporting emotions, etc. in the context of Modern English fiction.Keywords: concept, context, lexico-semantic variant, semantic sign
Procedia PDF Downloads 354907 The Effects of Culture and Language on Social Impression Formation from Voice Pleasantness: A Study with French and Iranian People
Authors: L. Bruckert, A. Mansourzadeh
Abstract:
The voice has a major influence on interpersonal communication in everyday life via the perception of pleasantness. The evolutionary perspective postulates that the mechanisms underlying the pleasantness judgments are universal adaptations that have evolved in the service of choosing a mate (through the process of sexual selection). From this point of view, the favorite voices would be those with more marked sexually dimorphic characteristics; for example, in men with lower voice pitch, pitch is the main criterion. On the other hand, one can postulate that the mechanisms involved are gradually established since childhood through exposure to the environment, and thus the prosodic elements could take precedence in everyday life communication as it conveys information about the speaker's attitude (willingness to communicate, interest toward the interlocutors). Our study focuses on voice pleasantness and its relationship with social impression formation, exploring both the spectral aspects (pitch, timbre) and the prosodic ones. In our study, we recorded the voices through two vocal corpus (five vowels and a reading text) of 25 French males speaking French and 25 Iranian males speaking Farsi. French listeners (40 male/40 female) listened to the French voices and made a judgment either on the voice's pleasantness or on the speaker (judgment about his intelligence, honesty, sociability). The regression analyses from our acoustic measures showed that the prosodic elements (for example, the intonation and the speech rate) are the most important criteria concerning pleasantness, whatever the corpus or the listener's gender. Moreover, the correlation analyses showed that the speakers with the voices judged as the most pleasant are considered the most intelligent, sociable, and honest. The voices in Farsi have been judged by 80 other French listeners (40 male/40 female), and we found the same effect of intonation concerning the judgment of pleasantness with the corpus «vowel» whereas with the corpus «text» the pitch is more important than the prosody. It may suggest that voice perception contains some elements invariant across culture/language, whereas others are influenced by the cultural/linguistic background of the listener. Shortly in the future, Iranian people will be asked to listen either to the French voices for half of them or to the Farsi voices for the other half and produce the same judgments as the French listeners. This experimental design could potentially make it possible to distinguish what is linked to culture and what is linked to language in the case of differences in voice perception.Keywords: cross-cultural psychology, impression formation, pleasantness, voice perception
Procedia PDF Downloads 70906 The Quantum Theory of Music and Human Languages
Authors: Mballa Abanda Luc Aurelien Serge, Henda Gnakate Biba, Kuate Guemo Romaric, Akono Rufine Nicole, Zabotom Yaya Fadel Biba, Petfiang Sidonie, Bella Suzane Jenifer
Abstract:
The main hypotheses proposed around the definition of the syllable and of music, of the common origin of music and language, should lead the reader to reflect on the cross-cutting questions raised by the debate on the notion of universals in linguistics and musicology. These are objects of controversy, and there lies its interest: the debate raises questions that are at the heart of theories on language. It is an inventive, original, and innovative research thesis. A contribution to the theoretical, musicological, ethno musicological, and linguistic conceptualization of languages, giving rise to the practice of interlocution between the social and cognitive sciences, the activities of artistic creation, and the question of modeling in the human sciences: mathematics, computer science, translation automation, and artificial intelligence. When you apply this theory to any text of a folksong of a world-tone language, you do not only piece together the exact melody, rhythm, and harmonies of that song as if you knew it in advance but also the exact speaking of this language. The author believes that the issue of the disappearance of tonal languages and their preservation has been structurally resolved, as well as one of the greatest cultural equations related to the composition and creation of tonal, polytonal, and random music. The experimentation confirming the theorization, I designed a semi-digital, semi-analog application that translates the tonal languages of Africa (about 2,100 languages) into blues, jazz, world music, polyphonic music, tonal and anatonal music, and deterministic and random music). To test this application, I use music reading and writing software that allows me to collect the data extracted from my mother tongue, which is already modeled in the musical staves saved in the ethnographic (semiotic) dictionary for automatic translation ( volume 2 of the book). The translation is done (from writing to writing, from writing to speech, and from writing to music). Mode of operation: you type a text on your computer, a structured song (chorus-verse), and you command the machine a melody of blues, jazz, and world music or variety, etc. The software runs, giving you the option to choose harmonies, and then you select your melody.Keywords: language, music, sciences, quantum entenglement
Procedia PDF Downloads 78905 Analysis of Scholarly Communication Patterns in Korean Studies
Authors: Erin Hea-Jin Kim
Abstract:
This study aims to investigate scholarly communication patterns in Korean studies, which focuses on all aspects of Korea, including history, culture, literature, politics, society, economics, religion, and so on. It is called ‘national study or home study’ as the subject of the study is itself, whereas it is called ‘area study’ as the subject of the study is others, i.e., outside of Korea. Understanding of the structure of scholarly communication in Korean studies is important since the motivations, procedures, results, or outcomes of individual studies may be affected by the cooperative relationships that appear in the communication structure. To this end, we collected 1,798 articles with the (author or index) keyword ‘Korean’ published in 2018 from the Scopus database and extracted the institution and country of the authors using a text mining technique. A total of 96 countries, including South Korea, was identified. Then we constructed a co-authorship network based on the countries identified. The indicators of social network analysis (SNA), co-occurrences, and cluster analysis were used to measure the activity and connectivity of participation in collaboration in Korean studies. As a result, the highest frequency of collaboration appears in the following order: S. Korea with the United States (603), S. Korea with Japan (146), S. Korea with China (131), S. Korea with the United Kingdom (83), and China with the United States (65). This means that the most active participants are S. Korea as well as the USA. The highest rank in the role of mediator measured by betweenness centrality appears in the following order: United States (0.165), United Kingdom (0.045), China (0.043), Japan (0.037), Australia (0.026), and South Africa (0.023). These results show that these countries contribute to connecting in Korean studies. We found two major communities among the co-authorship network. Asian countries and America belong to the same community, and the United Kingdom and European countries belong to the other community. Korean studies have a long history, and the study has emerged since Japanese colonization. However, Korean studies have never been investigated by digital content analysis. The contributions of this study are an analysis of co-authorship in Korean studies with a global perspective based on digital content, which has not attempted so far to our knowledge, and to suggest ideas on how to analyze the humanities disciplines such as history, literature, or Korean studies by text mining. The limitation of this study is that the scholarly data we collected did not cover all domestic journals because we only gathered scholarly data from Scopus. There are thousands of domestic journals not indexed in Scopus that we can consider in terms of national studies, but are not possible to collect.Keywords: co-authorship network, Korean studies, Koreanology, scholarly communication
Procedia PDF Downloads 161904 The Applicability of Western Environmental Criminology Theories to the Arabic Context
Authors: Nawaf Alotaibi, Andy Evans, Alison Heppenstall, Nick Malleson
Abstract:
Throughout the last two decades, motor vehicle theft (MVT) has accounted for the largest proportion of property crime incidents in Saudi Arabia (SA). However, to date, few studies have investigated SA’s MVT problem. Those that have are primarily focused on the characteristics of car thieves, and most have overlooked any spatial-temporal distribution of MVT incidents and the characteristics of victims. This paper represents the first step in understanding this problem by reviewing the existing MVT studies contextualised within the theoretical frameworks developed in environmental criminology theories – originating in the West – and exploring to what extent they are relevant to the SA context. To achieve this, the paper has identified a range of key features in SA that are different from typical Western contexts, that could limit the appropriateness and capability of applying existing environmental criminology theories. Furthermore, despite these Western studies reviewed so far having introduced a number of explanatory variables for MVT rates, a range of significant elements are apparently absent in the current literature and this requires further analysis. For example, almost no attempts have been made to quantify the associations between the locations of vehicle theft, recovery of stolen vehicles, joyriding and traffic volume.Keywords: environmental criminology theories, motor vehicle theft, Saudi Arabia, spatial analysis
Procedia PDF Downloads 299903 The Folk Influences in the Melody of Romanian and Serbian Church Music
Authors: Eudjen Cinc
Abstract:
Common Byzantine origins of church music of Serbs and Romanians are certainly not the only reason for great similarities between the ways of singing of the two nations, especially in the region of Banat. If it was so, the differences between the interpretation of church music in this part of Orthodox religion and the one specific for other parts where Serbs or Romanians live could not be explained. What is it that connects church signing of two nations in this peaceful part of Europe to such an extent that it could be considered a comprehensive corpus, different from other 'Serbian' or 'Romanian' regions? This is the main issue dealt with in the text according to examples and comparative processing of material. The main aim of the paper is representation of the new and interesting, while its value lies in its potential to encourage the reader or a future researcher to investigate and search further.Keywords: folk influences, melody, melodic models, ethnomusicology
Procedia PDF Downloads 254