Search results for: information theory
13935 Proficient Estimation Procedure for a Rare Sensitive Attribute Using Poisson Distribution
Authors: S. Suman, G. N. Singh
Abstract:
The present manuscript addresses the estimation procedure of population parameter using Poisson probability distribution when characteristic under study possesses a rare sensitive attribute. The generalized form of unrelated randomized response model is suggested in order to acquire the truthful responses from respondents. The resultant estimators have been proposed for two situations when the information on an unrelated rare non-sensitive characteristic is known as well as unknown. The properties of the proposed estimators are derived, and the measure of confidentiality of respondent is also suggested for respondents. Empirical studies are carried out in the support of discussed theory.Keywords: Poisson distribution, randomized response model, rare sensitive attribute, non-sensitive attribute
Procedia PDF Downloads 26613934 A Correlational Study between Parentification and Memory Retention among Parentified Female Adolescents: A Neurocognitive Perspective on Parentification
Authors: Mary Dorothy Roxas, Jeian Mae Dungca, Reginald Agor, Beatriz Figueroa, Lennon Andre Patricio, Honey Joy Cabahug
Abstract:
Parentification occurs when children are expected to provide instrumental or emotional caregiving within the family. It was found that parentification has the latter effect on adolescents’ cognitive and emotional vulnerability. Attachment theory helps clarify the process of parentification as it involves the relationship between the child and the parent. Carandang theory of “taga-salo” helps explain parentification in the Philippines setting. The present study examined the potential risk of parentification on adolescent’s memory retention by hypothesizing that there is a correlation between the two. The research was conducted with 249 female adolescents ages 12-24, residing in Valenzuela City. Results indicated that there is a significant inverse correlation between parentification and memory retention.Keywords: memory retention, neurocognitive, parentification, stress
Procedia PDF Downloads 67813933 Modeling of Production Lines Systems with Layout Constraints
Authors: Sadegh Abebi
Abstract:
There are problems with estimating time of product process of products, especially when there is variable serving time, like control stage. These problems will cause overestimation of process time. Layout constraints, reworking constraints and inflexible product schedule in multi product lines, needs a precise planning to reduce volume in particular situation of line stock. In this article, by analyzing real queue systems with layout constraints and by using concepts and principles of Markov chain in queue theory, a hybrid model has been presented. This model can be a base to assess queue systems with probable parameters of service. Here by presenting a case study, the proposed model will be described. so, production lines of a home application manufacturer will be analyzed.Keywords: Queuing theory, Markov Chain, layout, line balance
Procedia PDF Downloads 62513932 The Effect of Culture and Managerial Practices on Organizational Leadership Towards Performance
Authors: Anyia Nduka, Aslan Bin Amad Senin, Ayu Azrin Bte Abdul Aziz
Abstract:
A management practice characterised by a value chain as its relatively flexible culture is replacing the old bureaucratic model of organisational practice that was built on dominance. Using a management practice fruition paradigm, the study delves into the implications of organisational culture and leadership. Developing a theory of leadership called the “cultural model” of organisational leadership by explaining how the shift from bureaucracy to management practises altered the roles and interactions of leaders. This model is well-grounded in leadership theory, considering the concept's adaptability to different leadership ideologies. In organisations where operational procedures and borders are not clearly defined, hierarchies are flattened, and work collaborations are sometimes based on contracts rather than employment. This cultural model of organizational leadership is intended to be a useful tool for predicting how effectively a leader will perform.Keywords: leadership, organizational culture, management practices, efficiency
Procedia PDF Downloads 8413931 A Desire to be ‘Recognizable and Reformed’: Natives’ Identity in Walcott’s “Dream on Monkey Mountain”
Authors: S. Khurram, N. Mubashar
Abstract:
The paper examines, through the lens of Postcolonial Theory, how natives resist and react in Derrek Walcott’s “Dream on Monkey Mountain”. It aims at how natives, for being ‘recognized and reformed’, mimic and adapt the white’s ways of living. It also focuses how Walcott expresses natives’ reaction when they cannot construct their identity. Moreover, the paper exploits the Homi. K Bhaba’s concept of Mimicry and Berry’s concepts of Hybridity to explain Caribbean native’s plight. Furthermore, it bring forth Walcott’s deep insight into the psychology of the Caribbean natives. He digs deep into the colonial discourse to reconstruct post-colonial identity and he, as a post-colonial writer, does so by deconstructing colonial ideology of racism by resisting against it.Keywords: postcolonial theory, mimicry, hybridity, reaction
Procedia PDF Downloads 18213930 The Effects of Three Leadership Styles on Individual Performance
Authors: Leilei Liang
Abstract:
Leadership is commonly classified as formal leadership and informal leadership, which ignores and neglects the effects of 3rd type leadership. The emergence of 3rd type of leadership is closely related to special relations. To figure out the mechanism and effects of 3rd type leadership as well as the impacts of formal leadership and informal leadership on employee performance, this study collects data from 350 participants through a survey and proposes three hypotheses respectively from the perspective of expectation theory. The analytical results provide strong evidence for two of the three hypotheses, which demonstrate the positive correlation between formal leadership and individual performance and the negative relationship between 3rd type leadership and individual performance. This study contributes to leadership literature by putting forward the concept of the 3rd type of leadership. In addition, the effects of formal leadership, informal leadership, and 3rd type leadership on individual performance are discussed respectively in this study.Keywords: formal leadership, informal leadership, 3rd leadership, individual performance, expectation theory
Procedia PDF Downloads 24213929 Perpetrators of Ableist Sexual Violence: Understanding Who They Are and Why They Target People with Intellectual Disabilities in Australia
Authors: Michael Rahme
Abstract:
Over the past decade, there is an overwhelming consensus spanning across academia, government commissions, and civil societies that concede that individuals with disabilities (IWDs), particularly those with intellectual differences, are a demographic most ‘vulnerable’ to experiences of sexual violence. From this global accord, numerous policies have sprouted in the protection of this ‘pregnable’ sector of society, primarily framed around liberal obligations of stewardship over the ‘defenceless.’ As such, these initiatives mainly target post-incident or victim-based factors of sexual violence, which is apparent in proposals for more inclusive sexual education and accessible contact lines for IWDs. Yet despite the necessity of these initiatives, sexual incidents among this demographic persist and, in nations such as Australia, continue to rise. Culture of Violence theory reveals that such discrepancies in theory and practice stem from societal structures that frame individuals as ‘vulnerable’, ‘impregnable’, or ‘defenceless’ because of their disability, thus propagating their own likelihood of abuse. These structures, as embodied by the Australian experience, allow these sexual violences to endure through cultural ideologies that place the IWDs ‘failures’ at fault while sidelining the institutions that permit this abuse. Such is representative of the initiatives of preventative organizations like People with Disabilities Australia, which have singularly strengthened victim protection networks, despite abuse continuing to rise dramatically among individuals with intellectual disabilities alone. Yet regardless of this rise, screenings of families and workers remain inadequate and practically untouched, a reflection of a tremendous societal warp in understanding surrounding the lived experiences of IWDs. This theory is also representative of broader literature, where the study of the perpetrators of disability rights, particularly sexual rights, is almost unapparent in a field that is already seldom studied. Therefore, placing power on the abuser via stripping that of the victims. As such, the Culture of Violence theory (CVT) sheds light on the institutions that allow these perpetrators to prosper. This paper, taking a CVT approach, aims to dissipate this discrepancy in the Australian experience by way of a qualitative analysis of all available court proceedings and tribunals between 2020-2022. Through an analysis of the perpetrator, their relation to the IWD, and the motives for their actions granted by court and tribunal transcripts and the psychological, and behavioural reports, among other material, that have been presented and consulted during these proceedings. All of which would be made available under the 1982 Freedom of Information Act. The findings from this study, through the incorporation of CVT, determine the institutions in which these abusers function and the ideologies which motivate such behaviour; while being conscious of the issue of re-traumatization and language barriers of the abusees. Henceforth, this study aims to be a potential policy guide on strengthening support institutions that provide IWDs with their basic rights. In turn, undermining sexual violence among individuals with intellectual disabilities at its roots.Keywords: criminal profiling, intellectual disabilities, prevention, sexual violence
Procedia PDF Downloads 9313928 Technological Affordances of a Mobile Fitness Application- A Role of Escapism and Social Outcome Expectation
Authors: Inje Cho
Abstract:
The leading health risks threatening the world today are associated with a modern lifestyle characterized by sedentary behavior, stress, anxiety, and an obesogenic food environment. To counter this alarming trend, the Centers for Disease Control and Prevention have proffered Physical Activity guidelines to bolster physical engagement. Concurrently, the burgeon of smartphones and mobile applications has witnessed a proliferation of fitness applications aimed at invigorating exercise adherence and real-time activity monitoring. Grounded in the Uses and gratification theory, this study delves into the technological affordances of mobile fitness applications, discerning the mediating influences of escapism and social outcome expectations on attitudes and exercise intention. The theory explains how individuals employ distinct communication mediums to satiate their exigencies and desires. Technological affordances manifest as attributes of emerging technologies that galvanize personal engagement in physical activities. Several features of mobile fitness applications include affordances for goal setting, virtual rewards, peer support, and exercise information. Escapism, denoting the inclination to disengage from normal routines, has emerged as a salient motivator for the consumption of new media. This study postulates that individual’s perceptions technological affordances within mobile fitness applications, can affect escapism and social outcome expectations, potentially influencing attitude, and behavior formation. Thus, the integrated model has been developed to empirically examine the interrelationships between technological affordances, escapism, social outcome expectations, and exercise intention. Structural Equation Modelling serves as the methodological tool, and a cohort of 400 Fitbit users shall be enlisted from the Prolific, data collection platform. A sequence of multivariate data analyses will scrutinize both the measurement and hypothesized structural models. By delving into the effects of mobile fitness applications, this study contributes to the growing of new media studies in sport management. Moreover, the novel integration of the uses and gratification theory, technological affordances, via the prism of escapism, illustrates the dynamics that underlies mobile fitness user’s attitudes and behavioral intentions. Therefore, the findings from this study contribute to theoretical understanding and provide pragmatic insights to developers and practitioners in optimizing the impact of mobile fitness applications.Keywords: technological affordances, uses and gratification, mobile fitness apps, escapism, physical activity
Procedia PDF Downloads 8013927 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis
Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim
Abstract:
As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.Keywords: private information, value, users, perceived risk, online information privacy, attributes
Procedia PDF Downloads 23913926 A Discovery of the Dual Sequential Pattern of Prime Numbers in P x P: Applications in a Formal Proof of the Twin-Prime Conjecture
Authors: Yingxu Wang
Abstract:
This work presents basic research on the recursive structures and dual sequential patterns of primes for the formal proof of the Twin-Prime Conjecture (TPC). A rigorous methodology of Twin-Prime Decomposition (TPD) is developed in MATLAB to inductively verify potential twins in the dual sequences of primes. The key finding of this basic study confirms that the dual sequences of twin primes are not only symmetric but also infinitive in the unique base 6 cycle, except a limited subset of potential pairs is eliminated by the lack of dual primality. Both theory and experiments have formally proven that the infinity of twin primes stated in TPC holds in the P x P space.Keywords: number theory, primes, twin-prime conjecture, dual primes (P x P), twin prime decomposition, formal proof, algorithm
Procedia PDF Downloads 6413925 Visuospatial Perspective Taking and Theory of Mind in a Clinical Approach: Development of a Task for Adults
Authors: Britt Erni, Aldara Vazquez Fernandez, Roland Maurer
Abstract:
Visuospatial perspective taking (VSPT) is a process that allows to integrate spatial information from different points of view, and to transform the mental images we have of the environment to properly orient our movements and anticipate the location of landmarks during navigation. VSPT is also related to egocentric perspective transformations (imagined rotations or translations of one's point of view) and to infer the visuospatial experiences of another person (e.g. if and how another person sees objects). This process is deeply related to a wide-ranging capacity called the theory of mind (ToM), an essential cognitive function that allows us to regulate our social behaviour by attributing mental representations to individuals in order to make behavioural predictions. VSPT is often considered in the literature as the starting point of the development of the theory of mind. VSPT and ToM include several levels of knowledge that have to be assessed by specific tasks. Unfortunately, the lack of tasks assessing these functions in clinical neuropsychology leads to underestimate, in brain-damaged patients, deficits of these functions which are essential, in everyday life, to regulate our social behaviour (ToM) and to navigate in known and unknown environments (VSPT). Therefore, this study aims to create and standardize a VSPT task in order to explore the cognitive requirements of VSPT and ToM, and to specify their relationship in healthy adults and thereafter in brain-damaged patients. Two versions of a computerized VSPT task were administered to healthy participants (M = 28.18, SD = 4.8 years). In both versions the environment was a 3D representation of 10 different geometric shapes placed on a circular base. Two sets of eight pictures were generated from this: of the environment with an avatar somewhere on its periphery (locations) and of what the avatar sees from that place (views). Two types of questions were asked: a) identify the location from the view, and b) identify the view from the location. Twenty participants completed version 1 of the task and 20 completed the second version, where the views were offset by ±15° (i.e., clockwise or counterclockwise) and participants were asked to choose the closest location or the closest view. The preliminary findings revealed that version 1 is significantly easier than version 2 for accuracy (with ceiling scores for version 1). In version 2, participants responded significantly slower when they had to infer the avatar's view from the latter's location, probably because they spent more time visually exploring the different views (responses). Furthermore, men significantly performed better than women in version 1 but not in version 2. Most importantly, a sensitive task (version 2) has been created for which the participants do not seem to easily and automatically compute what someone is looking at yet which does not involve more heavily other cognitive functions. This study is further completed by including analysis on non-clinical participants with low and high degrees of schizotypy, different socio-educational status, and with a range of older adults to examine age-related and other differences in VSPT processing.Keywords: mental transformation, spatial cognition, theory of mind, visuospatial perspective taking
Procedia PDF Downloads 20313924 A Survey on Countermeasures of Cache-Timing Attack on AES Systems
Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush
Abstract:
Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure
Procedia PDF Downloads 29913923 Projective Lag Synchronization in Drive-Response Dynamical Networks via Hybrid Feedback Control
Authors: Mohd Salmi Md Noorani, Ghada Al-Mahbashi, Sakhinah Abu Bakar
Abstract:
This paper investigates projective lag synchronization (PLS) behavior in drive response dynamical networks (DRDNs) model with identical nodes. A hybrid feedback control method is designed to achieve the PLS with mismatch and without mismatch terms. The stability of the error dynamics is proven theoretically using the Lyapunov stability theory. Finally, analytical results show that the states of the dynamical network with non-delayed coupling can be asymptotically synchronized onto a desired scaling factor under the designed controller. Moreover, the numerical simulations results demonstrate the validity of the proposed method.Keywords: drive-response dynamical network, projective lag synchronization, hybrid feedback control, stability theory
Procedia PDF Downloads 39113922 Eco-Innovation: Perspectives from a Theoretical Approach and Policy Analysis
Authors: Natasha Hazarika, Xiaoling Zhang
Abstract:
Eco- innovations, unlike regular innovations, are not self-enforcing and are associated with the double externality problem. Therefore, it is emphasized that eco-innovations need government. intervention in the form of supportive policies on priority. Off late, factors like consumer demand, technological advancement as well as the competitiveness of the firms have been considered as equally important. However, the interaction among these driving forces has not been fully traced out. Also, the theory on eco-innovation is found to be at a nascent stage which does not resonate with its dynamics as it is traditionally studied under the neo- classical economics theory. Therefore, to begin with, insights for this research have been derived from the merits of ‘neo- classical economics’, ‘evolutionary approach’, and the ‘resource based view’ which revealed the issues pertaining to technological system lock- ins and firm- based capacities which usually remained undefined by the neo classical approach; it would be followed by determining how the policies (in the national level) and their instruments are designed in order to motivate firms to eco-innovate, by analyzing the innovation ‘friendliness’ of the policy style and the policy instruments as per the indicators provided in innovation literature by means of document review (content analysis) of the relevant policies introduced by the Chinese government. The significance of theoretical analysis lies in its ability to show why certain practices become dominant irrespective of gains or losses, and that of the policy analysis lies in its ability to demonstrate the credibility of govt.’s sticks, carrots and sermons for eco-innovation.Keywords: firm competency, eco-innovation, policy, theory
Procedia PDF Downloads 18113921 Toni Morrison as an African American Voice: A Marxist Analysis of Beloved
Authors: Irfan Mehmood
Abstract:
This paper examines the Marxist ideology in Toni Morrison's novel, Beloved. Toni Morrison writes about the society she inhabits and doesn't knowingly or emotionally leave. Marxism emphasizes the working class' dire economic status as well as the bourgeoisie as the dominant capitalist class. Using the Marxist literary theory promoted by Louis Althusser in his well-known book On the Reproduction of Capitalism, the chosen Toni Morrison piece is evaluated (1976). This essay explores how Morrison uses Marxist theory in her literary work to highlight the oppression of the Afro-American society and how the upper class ruled the lower class through the use of interpellation. In spite of hegemony and interpellation, certain major characters in this essay battle with the discriminatory ruling order.Keywords: Marxism, social class, Toni Morrison, African American literature.
Procedia PDF Downloads 13113920 Discrete Sliding Modes Regulator with Exponential Holder for Non-Linear Systems
Authors: G. Obregon-Pulido , G. C. Solis-Perales, J. A. Meda-Campaña
Abstract:
In this paper, we present a sliding mode controller in discrete time. The design of the controller is based on the theory of regulation for nonlinear systems. In the problem of disturbance rejection and/or output tracking, it is known that in discrete time, a controller that uses the zero-order holder only guarantees tracking at the sampling instances but not between instances. It is shown that using the so-called exponential holder, it is possible to guarantee asymptotic zero output tracking error, also between the sampling instant. For stabilizing the problem of close loop system we introduce the sliding mode approach relaxing the requirements of the existence of a linear stabilizing control law.Keywords: regulation theory, sliding modes, discrete controller, ripple-free tracking
Procedia PDF Downloads 5513919 Unpacking Tourist Experience: A Case Study of Chinese Tourists Visiting the UK
Authors: Guanhao Tong, Li Li, Ben David
Abstract:
This study aims to provide an explanatory account of how the leisure tourist experience emerges from tourists and their surroundings through a critical realist lens. This was achieved by applying Archer’s realist social theory as the underlying theoretical ground to unpack the interplays between the external (tourism system or structure) and the internal (tourists or agency). This theory argues that social phenomena can be analyzed in three domains - structure, agency, and culture (SAC), and along three phases – structure conditioning, sociocultural interactions, and structure elaboration. From the realist perspective, the world is an open system; events and discourses are irreducible to present individuals and collectivities. Therefore, identifying the processes or mechanisms is key to help researchers understand how social reality is brought about. Based on the contextual nature of the tourist experience, the research focuses on Chinese tourists (from mainland China) to London as a destination and British culture conveyed through the concept of the destination image. This study uses an intensive approach based on Archer’s M/M approach to discover the mechanisms/processes of the emergence of the tourist experience. Individual interviews were conducted to reveal the underlying causes of lived experiences of the tourists. Secondary data was also collected to understand how British destinations are portrayed to Chinese tourists.Keywords: Chinese tourists, destination image, M/M approach, realist social theory, social mechanisms, tourist experience
Procedia PDF Downloads 7213918 The Complementary Explanations of Institutional and Feminist Perspectives for Female Social Enterprise in Pakistan
Authors: Mohammad Sohail Yunis, Hina Hashim, Alistair R. Anderson
Abstract:
Entrepreneurship is gendered with masculine qualities, yet social enterprise epitomizes caring a feminine quality. However enterprising practices may have little to do with gender. Consequently, the purpose of this paper is to examine practices using two very different explanatory theories, feminist and institutional theory, to establish the role played by gender. This study is situated in KP, the poor but traditional north of Pakistan. Utilising on an interpretive qualitative research approach, this research collected data through in-depth interviews with ten women social entrepreneurs of KP, Pakistan and analyzed using thematic analysis. Empirically, this paper identifies and describes on a number of interesting themes that relate to the women entrepreneurship such as 'women empowerment, patriarchal culture, role of culture and societal norms, religious extremism and terrorism, forced entrepreneurs, change creators, institutional corruption, and security issues'. In addition, female social enterprise in KP is set in a patriarchal, masculine culture, but the practices negotiate institutional obstacles to bring benefits to the disenfranchised. Finally, this research claims to present an original insight into female social entrepreneurship in a developing country context and provide fresh theoretical and empirical perspectives to advance knowledge and scholarship.Keywords: female social entrepreneurship, institutional theory, feminist theory, developing countries
Procedia PDF Downloads 21913917 The Potential Benefits of Multimedia Information Representation in Enhancing Students’ Critical Thinking and History Reasoning
Authors: Ang Ling Weay, Mona Masood
Abstract:
This paper discusses the potential benefits of an interactive multimedia information representation in enhancing students’ critical thinking aligned with history reasoning in learning history between Secondary School students in Malaysia. Two modes of multimedia information representation implemented which are chronological and thematic information representation. A qualitative study of an unstructured interview was conducted among two history teachers, one history education lecturer, two i-think expert and program trainers and five form 4 secondary school students. The interview was to elicit their opinions on the implementation of thinking maps and interactive multimedia information representation in history learning. The key elements of interactive multimedia (e.g. multiple media, user control, interactivity, and use of timelines and concept maps) were then considered to improve the learning process. Findings of the preliminary investigation reveal that the interactive multimedia information representations have the potential benefits to be implemented as instructional resource in enhancing students’ higher order thinking skills (HOTs). This paper concludes by giving suggestions for future work.Keywords: multimedia information representation, critical thinking, history reasoning, chronological and thematic information representation
Procedia PDF Downloads 35013916 Music Education for Blacks (Africans) in Apartheid and Post-Apartheid South Africa
Authors: Bernett Nkwayi Mulungo
Abstract:
There are vast community music projects in South African townships, and their courses range from music theory aural practical individual and ensemble lessons on orchestral instruments and recorders – these instruments being primarily “Western”. Despite this relative success – indeed one of the few in the realm of arts in post-apartheid South Africa – what remains troubling is the dominance of western thought (as music theory) and modes of teaching music that maintain the idea of music study as alien in black communities. This identified problem speaks to a significant theme, namely: Arts education for community development, which is my area of interest. Primarily for, it is a timely platform to firmly entrench appreciation, understanding, and, most undoubtedly, the value(s) of the arts to the youth. Drawing on one’s experience as a lecturer in (and graduate from) a South African tertiary institution and as a teacher in a community project, this research will interrogate the content of some of the program(s): from the theoretical material taught in music theory classes to the practical repertoire taught and/or performed. The focal point of this research is on how this content informs or speaks to its intended “beneficiaries” – the African youth. Through these and other considerations, the paper aims to sketch the potentially radical consequences that transformed music education at community and earlier levels will have for higher education music studies in South Africa.Keywords: decolonization, Africanization, indigenous knowledge, community engagement
Procedia PDF Downloads 8013915 Information Retrieval from Internet Using Hand Gestures
Authors: Aniket S. Joshi, Aditya R. Mane, Arjun Tukaram
Abstract:
In the 21st century, in the era of e-world, people are continuously getting updated by daily information such as weather conditions, news, stock exchange market updates, new projects, cricket updates, sports and other such applications. In the busy situation, they want this information on the little use of keyboard, time. Today in order to get such information user have to repeat same mouse and keyboard actions which includes time and inconvenience. In India due to rural background many people are not much familiar about the use of computer and internet also. Also in small clinics, small offices, and hotels and in the airport there should be a system which retrieves daily information with the minimum use of keyboard and mouse actions. We plan to design application based project that can easily retrieve information with minimum use of keyboard and mouse actions and make our task more convenient and easier. This can be possible with an image processing application which takes real time hand gestures which will get matched by system and retrieve information. Once selected the functions with hand gestures, the system will report action information to user. In this project we use real time hand gesture movements to select required option which is stored on the screen in the form of RSS Feeds. Gesture will select the required option and the information will be popped and we got the information. A real time hand gesture makes the application handier and easier to use.Keywords: hand detection, hand tracking, hand gesture recognition, HSV color model, Blob detection
Procedia PDF Downloads 29013914 Information on Financial Statements for Loan Decision-Making of Commercial Banks in Vietnam
Authors: Mai Hoang Minh
Abstract:
Financial statements (FS) are tools which provide information to users for making business decisions. This article is going to present the survey which clarifies the role of financial statement to Commercial Banks’ loan decisions in Vietnam. Moreover, this also discusses about financial statement’s quality currently, thereby making suggestions for enterprises to enhance the usefulness of accounting information in borrowing activities.Keywords: usefulness of financial statement, accounting information quality, loan decisions
Procedia PDF Downloads 27913913 Structural, Electronic and Optical Properties of LiₓNa1-ₓH for Hydrogen Storage
Authors: B. Bahloul
Abstract:
This study investigates the structural, electronic, and optical properties of LiH and NaH compounds, as well as their ternary mixed crystals LiₓNa1-ₓH, adopting a face-centered cubic structure with space group Fm-3m (number 225). The structural and electronic characteristics are examined using density functional theory (DFT), while empirical methods, specifically the modified Moss relation, are employed for analyzing optical properties. The exchange-correlation potential is determined through the generalized gradient approximation (PBEsol-GGA) within the density functional theory (DFT) framework, utilizing the projected augmented wave pseudopotentials (PAW) approach. The Quantum Espresso code is employed for conducting these calculations. The calculated lattice parameters at equilibrium volume and the bulk modulus for x=0 and x=1 exhibit good agreement with existing literature data. Additionally, the LiₓNa1-ₓH alloys are identified as having a direct band gap.Keywords: DFT, structural, electronic, optical properties
Procedia PDF Downloads 7113912 Indecisiveness in 'The Road Not Taken' by Robert Frost: An Expressive Critical Analysis
Authors: Kurt S. Candilas
Abstract:
This expressive critical study is an effort to bring in light new interpretation of Robert Frost poem 'The Road Not Taken' as a reflection of his indecisiveness in life. Specifically, it aims at examining Frost’s inner being, emphasizing his own self and experiences in the poem or text. The study employs the qualitative research design which made use of discourse analysis using the critical theory of expressivism as the main guide. In acquiring the data of the study, the art of historiography is used such as autobiographical and/or biographical notes, sources documents, and web information. In executing the methods involved in this study, it is observed that the poem shows a naturalist implicatures, expressing Frost’s strong feelings and emotions being devoid of free will and a narrow bit of confusions and ambiguities with his indecisions in life.Keywords: The Road Not Taken, expressivism, indecisiveness, naturalist implicatures
Procedia PDF Downloads 34313911 Simultaneous Relationship among Strategic Corporate Social Responsibility, Corporate Governance, and Firm Performance: Evidence from Indonesia
Authors: Ayu Diar Sari, Sidharta Utama
Abstract:
The main objective of this study is to examine the empirical association among strategic corporate social responsibility (Strategic CSR), corporate governance (CG), and firm performance by investigating their causal effects. In order to get the comprehensive result, this study uses CSR variables which consist of Strategic CSR, Non-Strategic CSR and CSR as a whole. Exerting the two stage least square (2SLS) method, the result showed that CG mechanism positively influences CSR, Non-Strategic CSR, and firm performance (both ROA and PBV). CSR and Non-Strategic CSR positively influence ROA. Meanwhile CSR, Strategic and Non-Strategic CSR positively influence PBV. Firm’s Strategic CSR engagement plays a significantly positive role in enhancing PBV. The results supported the social impact hypothesis, agency theory, and conflict resolution theory.Keywords: corporate financial performance, corporate governance, corporate social responsibility, strategic corporate social responsibility
Procedia PDF Downloads 30113910 Electro-Hydrodynamic Analysis of Low-Pressure DC Glow Discharge by Lattice Boltzmann Method
Authors: Ji-Hyok Kim, Il-Gyong Paek, Yong-Jun Kim
Abstract:
We propose a numerical model based on drift-diffusion theory and lattice Boltzmann method (LBM) to analyze the electro-hydrodynamic behavior in low-pressure direct current (DC) glow discharge plasmas. We apply the drift-diffusion theory for 4-species and employ the standard lattice Boltzmann model (SLBM) for the electron, the finite difference-lattice Boltzmann model (FD-LBM) for heavy particles, and the finite difference model (FDM) for the electric potential, respectively. Our results are compared with those of other methods, and emphasize the necessity of a two-dimensional analysis for glow discharge.Keywords: glow discharge, lattice Boltzmann method, numerical analysis, plasma simulation, electro-hydrodynamic
Procedia PDF Downloads 12013909 Predictive Analysis of Personnel Relationship in Graph Database
Authors: Kay Thi Yar, Khin Mar Lar Tun
Abstract:
Nowadays, social networks are so popular and widely used in all over the world. In addition, searching personal information of each person and searching connection between them (peoples’ relation in real world) becomes interesting issue in our society. In this paper, we propose a framework with three portions for exploring peoples’ relations from their connected information. The first portion focuses on the Graph database structure to store the connected data of peoples’ information. The second one proposes the graph database searching algorithm, the Modified-SoS-ACO (Sense of Smell-Ant Colony Optimization). The last portion proposes the Deductive Reasoning Algorithm to define two persons’ relationship. This study reveals the proper storage structure for connected information, graph searching algorithm and deductive reasoning algorithm to predict and analyze the personnel relationship from peoples’ relation in their connected information.Keywords: personnel information, graph storage structure, graph searching algorithm, deductive reasoning algorithm
Procedia PDF Downloads 45013908 An Approach for Pattern Recognition and Prediction of Information Diffusion Model on Twitter
Authors: Amartya Hatua, Trung Nguyen, Andrew Sung
Abstract:
In this paper, we study the information diffusion process on Twitter as a multivariate time series problem. Our model concerns three measures (volume, network influence, and sentiment of tweets) based on 10 features, and we collected 27 million tweets to build our information diffusion time series dataset for analysis. Then, different time series clustering techniques with Dynamic Time Warping (DTW) distance were used to identify different patterns of information diffusion. Finally, we built the information diffusion prediction models for new hashtags which comprise two phrases: The first phrase is recognizing the pattern using k-NN with DTW distance; the second phrase is building the forecasting model using the traditional Autoregressive Integrated Moving Average (ARIMA) model and the non-linear recurrent neural network of Long Short-Term Memory (LSTM). Preliminary results of performance evaluation between different forecasting models show that LSTM with clustering information notably outperforms other models. Therefore, our approach can be applied in real-world applications to analyze and predict the information diffusion characteristics of selected topics or memes (hashtags) in Twitter.Keywords: ARIMA, DTW, information diffusion, LSTM, RNN, time series clustering, time series forecasting, Twitter
Procedia PDF Downloads 39113907 The Relevance of Corporate Governance Disclosure in Spanish Public Universities
Authors: Yolanda Ramirez, Angel Tejada, Agustin Baidez
Abstract:
There is currently a growing interest in the improvement of university governance and the disclosure of information on corporate governance processes as an essential part of the transparency and accountability of universities. This paper aims to know the importance given by Spanish university stakeholders to the disclosure of information about structure and mechanism of corporate governance. So as to meet this objective we propose a model for disclosing information on the main aspects of university governance in Spanish universities. This model will be validated using a questionnaire sent to members of the Social Councils of public universities in Spain. Our results show that Spanish university stakeholders attach great importance to the disclosure of specific information on aspects of corporate governance, which would result in improved transparency and accountability. According to the results of this study it may be concluded that the university stakeholders feel that it is relevant to publish information on corporate governance in the university accounting information model.Keywords: corporate governance, transparency, accountability, universities, Spain
Procedia PDF Downloads 31113906 Pragmatic Strategies of Selected Online Articles on the Buhari/Jubril Dilemma
Authors: Oluwaseun Amusa
Abstract:
The online space has continued to be a platform for not only private and mundane discussions but also a tribune for voicing critical political and national opinions. Nigerians and the international community have employed the online media, as well as other media platforms to articulate their thoughts on the claims which favour possibilities of the demise of the incumbent president of Nigeria, President Muhammadu Buhari, after a prolonged illness in year 2007 and the ploy of a Jubril of Sudan clone in his place. This study thus examines the pragmatic strategies employed in the online articles on the national dilemma caused by the Buhari/Jubril claims and refutals, in response to the lacuna in the literature on such analytical investigations on the subject. Two online articles titled, 'Buhari: The real, the fake and the dead' and 'Taking the Buhari/Jubril story seriously', authored by two Nigerian writers, Tunde Odesola and Abimbola Adelakun, respectively and retrieved online from 360nobs.com and Nairaland blogs, on December 3, 2018, and December 7, 2018, respectively, served as data for the study. The data were analysed using the Stance Theory and the Pragmatic Act Theory. Findings showed that the writers employed stance acts, rhetorical questions, metaphors, histo-political allusions, name-calling, and derogatives, in achieving the pragmeme of disabusing. This results in a pragmatic reconstruction of readers' views on the issue.Keywords: Buhari/Jubril claims, online articles, pragmatic strategies, stance theory
Procedia PDF Downloads 147