Search results for: information theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14596

Search results for: information theory

13726 Music Education for Blacks (Africans) in Apartheid and Post-Apartheid South Africa

Authors: Bernett Nkwayi Mulungo

Abstract:

There are vast community music projects in South African townships, and their courses range from music theory aural practical individual and ensemble lessons on orchestral instruments and recorders – these instruments being primarily “Western”. Despite this relative success – indeed one of the few in the realm of arts in post-apartheid South Africa – what remains troubling is the dominance of western thought (as music theory) and modes of teaching music that maintain the idea of music study as alien in black communities. This identified problem speaks to a significant theme, namely: Arts education for community development, which is my area of interest. Primarily for, it is a timely platform to firmly entrench appreciation, understanding, and, most undoubtedly, the value(s) of the arts to the youth. Drawing on one’s experience as a lecturer in (and graduate from) a South African tertiary institution and as a teacher in a community project, this research will interrogate the content of some of the program(s): from the theoretical material taught in music theory classes to the practical repertoire taught and/or performed. The focal point of this research is on how this content informs or speaks to its intended “beneficiaries” – the African youth. Through these and other considerations, the paper aims to sketch the potentially radical consequences that transformed music education at community and earlier levels will have for higher education music studies in South Africa.

Keywords: decolonization, Africanization, indigenous knowledge, community engagement

Procedia PDF Downloads 73
13725 Aligning Cultural Practices through Information Exchange: A Taxonomy in Global Manufacturing Industry

Authors: Hung Nguyen

Abstract:

With the rise of global supply chain network, the choice of supply chain orientation is critical. The alignment between cultural similarity and supply chain information exchange could help identify appropriate supply chain orientations, which would differentiate the stronger competitors and performers from the weaker ones. Through developing a taxonomy, this study examined whether the choices of action programs and manufacturing performance differ depending on the levels of attainment cultural similarity and information exchange. This study employed statistical tests on a large-scale dataset consisting of 680 manufacturing plants from various cultures and industries. Firms need to align cultural practices with the level of information exchange in order to achieve good overall business performance. There appeared to be consistent three major orientations: the Proactive, the Initiative and the Reactive. Firms are experiencing higher payoffs from various improvements are the ones successful alignment in both information exchange and cultural similarity The findings provide step-by-step decision making for supply chain information exchange and offer guidance especially for global supply chain managers. In including both cultural similarity and information exchange, this paper adds greater comprehensiveness and richness to the supply chain literature.

Keywords: culture, information exchange, supply chain orientation, similarity

Procedia PDF Downloads 350
13724 Structural, Electronic and Optical Properties of LiₓNa1-ₓH for Hydrogen Storage

Authors: B. Bahloul

Abstract:

This study investigates the structural, electronic, and optical properties of LiH and NaH compounds, as well as their ternary mixed crystals LiₓNa1-ₓH, adopting a face-centered cubic structure with space group Fm-3m (number 225). The structural and electronic characteristics are examined using density functional theory (DFT), while empirical methods, specifically the modified Moss relation, are employed for analyzing optical properties. The exchange-correlation potential is determined through the generalized gradient approximation (PBEsol-GGA) within the density functional theory (DFT) framework, utilizing the projected augmented wave pseudopotentials (PAW) approach. The Quantum Espresso code is employed for conducting these calculations. The calculated lattice parameters at equilibrium volume and the bulk modulus for x=0 and x=1 exhibit good agreement with existing literature data. Additionally, the LiₓNa1-ₓH alloys are identified as having a direct band gap.

Keywords: DFT, structural, electronic, optical properties

Procedia PDF Downloads 60
13723 Simultaneous Relationship among Strategic Corporate Social Responsibility, Corporate Governance, and Firm Performance: Evidence from Indonesia

Authors: Ayu Diar Sari, Sidharta Utama

Abstract:

The main objective of this study is to examine the empirical association among strategic corporate social responsibility (Strategic CSR), corporate governance (CG), and firm performance by investigating their causal effects. In order to get the comprehensive result, this study uses CSR variables which consist of Strategic CSR, Non-Strategic CSR and CSR as a whole. Exerting the two stage least square (2SLS) method, the result showed that CG mechanism positively influences CSR, Non-Strategic CSR, and firm performance (both ROA and PBV). CSR and Non-Strategic CSR positively influence ROA. Meanwhile CSR, Strategic and Non-Strategic CSR positively influence PBV. Firm’s Strategic CSR engagement plays a significantly positive role in enhancing PBV. The results supported the social impact hypothesis, agency theory, and conflict resolution theory.

Keywords: corporate financial performance, corporate governance, corporate social responsibility, strategic corporate social responsibility

Procedia PDF Downloads 295
13722 Electro-Hydrodynamic Analysis of Low-Pressure DC Glow Discharge by Lattice Boltzmann Method

Authors: Ji-Hyok Kim, Il-Gyong Paek, Yong-Jun Kim

Abstract:

We propose a numerical model based on drift-diffusion theory and lattice Boltzmann method (LBM) to analyze the electro-hydrodynamic behavior in low-pressure direct current (DC) glow discharge plasmas. We apply the drift-diffusion theory for 4-species and employ the standard lattice Boltzmann model (SLBM) for the electron, the finite difference-lattice Boltzmann model (FD-LBM) for heavy particles, and the finite difference model (FDM) for the electric potential, respectively. Our results are compared with those of other methods, and emphasize the necessity of a two-dimensional analysis for glow discharge.

Keywords: glow discharge, lattice Boltzmann method, numerical analysis, plasma simulation, electro-hydrodynamic

Procedia PDF Downloads 100
13721 Realization of Autonomous Guidance Service by Integrating Information from NFC and MEMS

Authors: Dawei Cai

Abstract:

In this paper, we present an autonomous guidance service by combining the position information from NFC and the orientation information from a 6 axis acceleration and terrestrial magnetism sensor. We developed an algorithm to calculate the device orientation based on the data from acceleration and terrestrial magnetism sensor. If visitors want to know some explanation about an exhibit in front of him, what he has to do is just lift up his mobile device. The identification program will automatically identify the status based on the information from NFC and MEMS, and start playing explanation content for him. This service may be convenient for old people or disables or children.

Keywords: NFC, ubiquitous computing, guide sysem, MEMS

Procedia PDF Downloads 402
13720 Pragmatic Strategies of Selected Online Articles on the Buhari/Jubril Dilemma

Authors: Oluwaseun Amusa

Abstract:

The online space has continued to be a platform for not only private and mundane discussions but also a tribune for voicing critical political and national opinions. Nigerians and the international community have employed the online media, as well as other media platforms to articulate their thoughts on the claims which favour possibilities of the demise of the incumbent president of Nigeria, President Muhammadu Buhari, after a prolonged illness in year 2007 and the ploy of a Jubril of Sudan clone in his place. This study thus examines the pragmatic strategies employed in the online articles on the national dilemma caused by the Buhari/Jubril claims and refutals, in response to the lacuna in the literature on such analytical investigations on the subject. Two online articles titled, 'Buhari: The real, the fake and the dead' and 'Taking the Buhari/Jubril story seriously', authored by two Nigerian writers, Tunde Odesola and Abimbola Adelakun, respectively and retrieved online from 360nobs.com and Nairaland blogs, on December 3, 2018, and December 7, 2018, respectively, served as data for the study. The data were analysed using the Stance Theory and the Pragmatic Act Theory. Findings showed that the writers employed stance acts, rhetorical questions, metaphors, histo-political allusions, name-calling, and derogatives, in achieving the pragmeme of disabusing. This results in a pragmatic reconstruction of readers' views on the issue.

Keywords: Buhari/Jubril claims, online articles, pragmatic strategies, stance theory

Procedia PDF Downloads 141
13719 Arguments against Innateness of Theory of Mind

Authors: Arkadiusz Gut, Robert Mirski

Abstract:

The nativist-constructivist debate constitutes a considerable part of current research on mindreading. Peter Carruthers and his colleagues are known for their nativist position in the debate and take issue with constructivist views proposed by other researchers, with Henry Wellman, Alison Gopnik, and Ian Apperly at the forefront. More specifically, Carruthers together with Evan Westra propose a nativistic explanation of Theory of Mind Scale study results that Wellman et al. see as supporting constructivism. While allowing for development of the innate mindreading system, Westra and Carruthers base their argumentation essentially on a competence-performance gap, claiming that cross-cultural differences in Theory of Mind Scale progression as well as discrepancies between infants’ and toddlers’ results on verbal and non-verbal false-belief tasks are fully explainable in terms of acquisition of other, pragmatic, cognitive developments, which are said to allow for an expression of the innately present Theory of Mind understanding. The goal of the present paper is to bring together arguments against the view offered by Westra and Carruthers. It will be shown that even though Carruthers et al.’s interpretation has not been directly controlled for in Wellman et al.’s experiments, there are serious reasons to dismiss such nativistic views which Carruthers et al. advance. The present paper discusses the following issues that undermine Carruthers et al.’s nativistic conception: (1) The concept of innateness is argued to be developmentally inaccurate; it has been dropped in many biological sciences altogether and many developmental psychologists advocate for doing the same in cognitive psychology. Reality of development is a complex interaction of changing elements that is belied by the simplistic notion of ‘the innate.’ (2) The purported innate mindreading conceptual system posited by Carruthers ascribes adult-like understanding to infants, ignoring the difference between first- and second-order understanding, between what can be called ‘presentation’ and ‘representation.’ (3) Advances in neurobiology speak strongly against any inborn conceptual knowledge; neocortex, where conceptual knowledge finds its correlates, is said to be largely equipotential at birth. (4) Carruthers et al.’s interpretations are excessively charitable; they extend results of studies done with 15-month-olds to conclusions about innateness, whereas in reality at that age there has been plenty of time for construction of the skill. (5) Looking-time experiment paradigm used in non-verbal false belief tasks that provide the main support for Carruthers’ argumentation has been criticized on methodological grounds. In the light of the presented arguments, nativism in theory of mind research is concluded to be an untenable position.

Keywords: development, false belief, mindreading, nativism, theory of mind

Procedia PDF Downloads 203
13718 Qualitative and Quantitative Research Methodology Theoretical Framework and Descriptive Theory: PhD Construction Management

Authors: Samuel Quashie

Abstract:

PhDs in Construction Management often designs their methods based on those established in social sciences using theoretical models, to collect, gather and analysis data to answer research questions. Work aim is to apply qualitative and quantitative as a data analysis method, and as part of the theoretical framework - descriptive theory. To improve the ability to replicate the contribution to knowledge the research. Using practical triangulation approach, which covers, interviews and observations, literature review and (archival) document studies, project-based case studies, questionnaires surveys and review of integrated systems used in, construction and construction related industries. The clarification of organisational context and management delivery that influences organizational performance and quality of product and measures are achieved. Results illustrate improved reliability in this research approach when interpreting real world phenomena; cumulative results of research can be applied with confidence under similar environments. Assisted validity of the PhD research outcomes and strengthens the confidence to apply cumulative results of research under similar conditions in the Built Environment research systems, which have been criticised for the lack of reliability in approaches when interpreting real world phenomena.

Keywords: case studies, descriptive theory, theoretical framework, qualitative and quantitative research

Procedia PDF Downloads 375
13717 Biomedical Definition Extraction Using Machine Learning with Synonymous Feature

Authors: Jian Qu, Akira Shimazu

Abstract:

OOV (Out Of Vocabulary) terms are terms that cannot be found in many dictionaries. Although it is possible to translate such OOV terms, the translations do not provide any real information for a user. We present an OOV term definition extraction method by using information available from the Internet. We use features such as occurrence of the synonyms and location distances. We apply machine learning method to find the correct definitions for OOV terms. We tested our method on both biomedical type and name type OOV terms, our work outperforms existing work with an accuracy of 86.5%.

Keywords: information retrieval, definition retrieval, OOV (out of vocabulary), biomedical information retrieval

Procedia PDF Downloads 484
13716 Using Geographic Information Systems in the Desertification Risk’s Cartography: Case South of the Aurès Region, Algeria

Authors: Benmessaoud Hassen

Abstract:

The sensitivity to the desertification map of the south of Aurès region has been elaborated by the crossing of four thematic layers capable to have an impact on the process of desertification. The following step is inspired of MEDALUS (Mediterranean desertification and land Use), which use qualitative index to define the environment zones sensitive to the desertification. The cartographical information of vegetation, the climate, the soil and the socioeconomic state descended from cartographic data transformed to numerical data then seized on, structured and managed by an algorithm dedicated to a geographical information system. In step with information, each layer makes object of 3 or 4 classes, the geometrical median of the four layers used are leaded to sensitivity classes (ISD) of different mapped environment.

Keywords: information systems, thematic layers, the sensitivity to the desertification map, concept MEDALUS, South of Aurès

Procedia PDF Downloads 416
13715 Self-Action Effects of a Non-Gaussian Laser Beam Through Plasma

Authors: Sandeep Kumar, Naveen Gupta

Abstract:

The propagation of the Non-Gaussian laser beam results in strong self-focusing as compare to the Gaussian laser beam, which helps to achieve a prerequisite of the plasma-based electron, Terahertz generation, and higher harmonic generations. The theoretical investigation on the evolution of non-Gaussian laser beam through the collisional plasma with ramped density has been presented. The non-uniform irradiance over the cross-section of the laser beam results in redistribution of the carriers that modifies the optical response of the plasma in such a way that the plasma behaves like a converging lens to the laser beam. The formulation is based on finding a semi-analytical solution of the nonlinear Schrodinger wave equation (NLSE) with the help of variational theory. It has been observed that the decentred parameter ‘q’ of laser and wavenumber of ripples of medium contribute to providing the required conditions for the improvement of self-focusing.

Keywords: non-Gaussian beam, collisional plasma, variational theory, self-focusing

Procedia PDF Downloads 189
13714 Determining the Information Technologies Usage and Learning Preferences of Construction

Authors: Naci Büyükkaracığan, Yıldırım Akyol

Abstract:

Information technology is called the technology which provides transmission of information elsewhere regardless of time, location, distance. Today, information technology is providing the occurrence of ground breaking changes in all areas of our daily lives. Information can be reached quickly to millions of people with help of information technology. In this Study, effects of information technology on students for educations and their learning preferences were demonstrated with using data obtained from questionnaires administered to students of 2015-2016 academic year at Selcuk University Kadınhanı Faik İçil Vocational School Construction Department. The data was obtained by questionnaire consisting of 30 questions that was prepared by the researchers. SPSS 21.00 package programme was used for statistical analysis of data. Chi-square tests, Mann-Whitney U test, Kruskal-Wallis and Kolmogorov-Smirnov tests were used in the data analysis for Descriptiving statistics. In a study conducted with the participation of 61 students, 93.4% of students' reputation of their own information communication device (computer, smart phone, etc.) That have been shown to be at the same rate and to the internet. These are just a computer of itself, then 45.90% of the students. The main reasons for the students' use of the Internet, social networking sites are 85.24%, 13.11% following the news of the site, as seen. All student assignments in information technology, have stated that they use in the preparation of the project. When students acquire scientific knowledge in the profession regarding their preferred sources evaluated were seen exactly when their preferred internet. Male students showed that daily use of information technology while compared to female students was statistically significantly less. Construction Package program where students are eager to learn about the reputation of 72.13% and 91.80% identified in the well which they agreed that an indispensable element in the professional advancement of information technology.

Keywords: information technologies, computer, construction, internet, learning systems

Procedia PDF Downloads 290
13713 Indecisiveness in 'The Road Not Taken' by Robert Frost: An Expressive Critical Analysis

Authors: Kurt S. Candilas

Abstract:

This expressive critical study is an effort to bring in light new interpretation of Robert Frost poem 'The Road Not Taken' as a reflection of his indecisiveness in life. Specifically, it aims at examining Frost’s inner being, emphasizing his own self and experiences in the poem or text. The study employs the qualitative research design which made use of discourse analysis using the critical theory of expressivism as the main guide. In acquiring the data of the study, the art of historiography is used such as autobiographical and/or biographical notes, sources documents, and web information. In executing the methods involved in this study, it is observed that the poem shows a naturalist implicatures, expressing Frost’s strong feelings and emotions being devoid of free will and a narrow bit of confusions and ambiguities with his indecisions in life.

Keywords: The Road Not Taken, expressivism, indecisiveness, naturalist implicatures

Procedia PDF Downloads 338
13712 Historical Geography of Lykaonia Region

Authors: Asuman Baldiran, Erdener Pehlivan

Abstract:

In this study, the root of the name Lykaonia and the geographical area defined as Lykaonia Region are mentioned. In this context, information concerning the settlements of Paleolithic Age, Neolithic Age and Chalcolithic Age are given place. Particularly the settlements belonging to Classical Age are localized and brief information about the history of these settlements is provided. In the light of this information, roads of Antique period in the region are evaluated.

Keywords: ancient cities, central anatolia, historical geography, Lykaonia region

Procedia PDF Downloads 373
13711 Critical Realism as a Bridge between Critical Pedagogy and Queer Theory

Authors: Mike Seal

Abstract:

This paper explores the traditions of critical and queer pedagogy, its intersections, tensions and paradoxes. Critical pedagogy, with a materialist realist ontology, and queer theory, which is often post-modern, post-structural and anti-essential, may not seem compatible. Similarly, there are tensions between activist orientations, often enacted through essential sexual identities, and a queer approach that questions such identities and subjectivities. It will argue that critical realism gives us a bridge between critical and queer pedagogy in preserving a realist materialist ontology, where economic forces are real, and independent of consciousness and hermeneutic constructions of them. At the same time, it offers an epistemology that does not necessitate a binary view of the roles of the oppressed, liberator, or even oppressor. It accepts that our knowledge is contingent, partial and contestable, but has the potential, and enough validity, to demand action and potentially inform the actions of others.

Keywords: critical pedagogy, queer pedagogy, critical realsim, heteronormativity

Procedia PDF Downloads 187
13710 Lyapunov and Input-to-State Stability of Stochastic Differential Equations

Authors: Arcady Ponosov, Ramazan Kadiev

Abstract:

Input-to-State Stability (ISS) is widely used in deterministic control theory but less known in the stochastic case. Roughly speaking, the theory explains when small perturbations of the right-hand sides of the system on the entire semiaxis cause only small changes in the solutions of the system, again on the entire semiaxis. This property is crucial in many applications. In the report, we explain how to define and study ISS for systems of linear stochastic differential equations with or without delays. The central result connects ISS with the property of Lyapunov stability. This relationship is well-known in the deterministic setting, but its stochastic version is new. As an application, a method of studying asymptotic Lyapunov stability for stochastic delay equations is described and justified. Several examples are provided that confirm the efficiency and simplicity of the framework.

Keywords: asymptotic stability, delay equations, operator methods, stochastic perturbations

Procedia PDF Downloads 165
13709 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis

Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim

Abstract:

As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.

Keywords: private information, value, users, perceived risk, online information privacy, attributes

Procedia PDF Downloads 229
13708 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 296
13707 Multidimensional Item Response Theory Models for Practical Application in Large Tests Designed to Measure Multiple Constructs

Authors: Maria Fernanda Ordoñez Martinez, Alvaro Mauricio Montenegro

Abstract:

This work presents a statistical methodology for measuring and founding constructs in Latent Semantic Analysis. This approach uses the qualities of Factor Analysis in binary data with interpretations present on Item Response Theory. More precisely, we propose initially reducing dimensionality with specific use of Principal Component Analysis for the linguistic data and then, producing axes of groups made from a clustering analysis of the semantic data. This approach allows the user to give meaning to previous clusters and found the real latent structure presented by data. The methodology is applied in a set of real semantic data presenting impressive results for the coherence, speed and precision.

Keywords: semantic analysis, factorial analysis, dimension reduction, penalized logistic regression

Procedia PDF Downloads 434
13706 Using the Theory of Reasoned Action and Parental Mediation Theory to Examine Cyberbullying Perpetration among Children and Adolescents

Authors: Shirley S. Ho

Abstract:

The advancement and development of social media have inadvertently brought about a new form of bullying – cyberbullying – that transcends across physical boundaries of space. Although extensive research has been conducted in the field of cyberbullying, most of these studies have taken an overwhelmingly empirical angle. Theories guiding cyberbullying research are few. Furthermore, very few studies have explored the association between parental mediation and cyberbullying, with majority of existing studies focusing on cyberbullying victimization rather than perpetration. Therefore, this present study investigates cyberbullying perpetration from a theoretical angle, with a focus on the Theory of Reasoned Action and the Parental Mediation Theory. More specifically, this study examines the direct effects of attitude, subjective norms, descriptive norms, injunctive norms and active mediation and restrictive mediation on cyberbullying perpetration on social media among children and adolescents in Singapore. Furthermore, the moderating role of age on the relationship between parental mediation and cyberbullying perpetration on social media are examined. A self-administered paper-and-pencil nationally-representative survey was conducted. Multi-stage cluster random sampling was used to ensure that schools from all the four (North, South, East, and West) regions of Singapore were equally represented in the sample used for the survey. In all 607 upper primary school children (i.e., Primary 4 to 6 students) and 782 secondary school adolescents participated in our survey. The total average response rates were 69.6% for student participation. An ordinary least squares hierarchical regression analysis was conducted to test the hypotheses and research questions. The results revealed that attitude and subjective norms were positively associated with cyberbullying perpetration on social media. Descriptive norms and injunctive norms were not found to be significantly associated with cyberbullying perpetration. The results also showed that both parental mediation strategies were negatively associated with cyberbullying perpetration on social media. Age was a significant moderator of both parental mediation strategies and cyberbullying perpetration. The negative relationship between active mediation and cyberbullying perpetration was found to be greater in the case of children than adolescents. Children who received high restrictive parental mediation were less likely to perform cyberbullying behaviors, while adolescents who received high restrictive parental mediation were more likely to be engaged in cyberbullying perpetration. The study reveals that parents should apply active mediation and restrictive mediation in different ways for children and adolescents when trying to prevent cyberbullying perpetration. The effectiveness of active parental mediation for reducing cyberbullying perpetration was more in the case of children than for adolescents. Younger children were found to be more likely to respond more positively toward restrictive parental mediation strategies, but in the case of adolescents, overly restrictive control was found to increase cyberbullying perpetration. Adolescents exhibited less cyberbullying behaviors when under low restrictive strategies. Findings highlight that the Theory of Reasoned Action and Parental Mediation Theory are promising frameworks to apply in the examination of cyberbullying perpetration. The findings that different parental mediation strategies had differing effectiveness, based on the children’s age, bring about several practical implications that may benefit educators and parents when addressing their children’s online risk.

Keywords: cyberbullying perpetration, theory of reasoned action, parental mediation, social media, Singapore

Procedia PDF Downloads 247
13705 Discourse Analysis and Semiotic Researches: Using Michael Halliday's Sociosemiotic Theory

Authors: Deyu Yuan

Abstract:

Discourse analysis as an interdisciplinary approach has more than 60-years-history since it was first named by Zellig Harris in 'Discourse Analysis' on Language in 1952. Ferdinand de Saussure differentiated the 'parole' from the 'langue' that established the principle of focusing on language but not speech. So the rising of discourse analysis can be seen as a discursive turn for the entire language research that closely related to the theory of Speech act. Critical discourse analysis becomes the mainstream of contemporary language research through drawing upon M. A. K. Halliday's socio-semiotic theory and Foucault, Barthes, Bourdieu's views on the sign, discourse, and ideology. So in contrast to general semiotics, social semiotics mainly focuses on parole and the application of semiotic theories to some applicable fields. The article attempts to discuss this applicable sociosemiotics and show the features of it that differ from the Saussurian and Peircian semiotics in four aspects: 1) the sign system is about meaning-generation resource in the social context; 2) the sign system conforms to social and cultural changes with the form of metaphor and connotation; 3) sociosemiotics concerns about five applicable principles including the personal authority principle, non-personal authority principle, consistency principle, model demonstration principle, the expertise principle to deepen specific communication; 4) the study of symbolic functions is targeted to the characteristics of ideational, interpersonal and interactional function in social communication process. Then the paper describes six features which characterize this sociosemiotics as applicable semiotics: social, systematic, usable interdisciplinary, dynamic, and multi-modal characteristics. Thirdly, the paper explores the multi-modal choices of sociosemiotics in the respects of genre, discourse, and style. Finally, the paper discusses the relationship between theory and practice in social semiotics and proposes a relatively comprehensive theoretical framework for social semiotics as applicable semiotics.

Keywords: discourse analysis, sociosemiotics, pragmatics, ideology

Procedia PDF Downloads 335
13704 Impact of Newspaper Coverage of 2015 General Elections in Nigeria

Authors: Shola H. Adeosun, Lekan M. Togunwa, Kolawole Z. Amos

Abstract:

This paper appraises ‘Newspaper Coverage of 2015 General Election: A study of The Punch and Guardian Newspapers’. The objectives of the study were to examine how credible newspaper reports of 2015 election were and to examine the significant role Nigeria Newspapers played in the 2015 general elections. Also this study examined the extent at which the print media contributed to the success of 2015 general election and to ascertain the extent at which print media reports serve as a tool for sensitizing the masses. The research questions that guided this research include: How credible was newspaper report of 2015 general election? To what extent did the print media contributed to the success of 2015 general elections? To what extent did the print media reports serve as a tool for sensitizing the masses? The research work was given solid theoretical foundation with the review of Agenda-setting theory, Media System Dependency Theory and Normative theories. This study was given solid theoretical foundation with the review of Agenda-setting theory, Media Dependency Theory and Normative theories. The theory was conducted using content analysis method of research and 30 publications of both The Guardian and Punch Newspaper between January 1st and March 30, 2015 forms the population for this research work. Selection of the dates and editions of Newspaper under study were done using the composite week sampling technique. All the days of the week were used for the newspapers because they (The Punch and The Guardian) are published all the days of the week. Coding sheet was the tool of data collection for the content analysis of this study. Findings of the study revealed that by the Punch newspaper and Guardian has played a significant role in eradicating election malpractices in Nigeria. It therefore concludes that media is metaphoric when we termed it to be a watchdog of the nation as well the mirror through which the nation see and recognize itself. The study also recommends that Nigerian media should strike balance between entertainment stories, crisis stories, economic stories, law story, education stories, terrorism stories, health stories, sport stories, metropolitan stories instead of portraying the country as being crime oriented.

Keywords: newspaper, coverage, general elections, impact

Procedia PDF Downloads 316
13703 Foreign News Coverage in Conservative and Liberal U.S. Newspapers: A Case Study of Saudi Arabia

Authors: Mohammed Huraysi

Abstract:

This research will investigate the historical coverage of foreign issues in U.S. newspapers. The study will focus on three main areas, which are coverage of wars, foreign leaders, and human rights in foreign countries, and analyze them by applying the framing theory to news stories about Saudi Arabia, used as a case study, within two different newspapers over some time Wall Street Journal and The New York Times will be investigated and representative of two distinct newspaper orientations, which are conservative and liberal ideological orientations. By the end of this research study, comprehensive coverage of these topics in U.S. newspapers from past to present will be provided, leading to an ability to discover consistency or lack thereof, explain the present, and devise future expectations.

Keywords: framing theory, US newspapers, historical research, Saudi Arabia

Procedia PDF Downloads 85
13702 Comparing the Motion of Solar System with Water Droplet Motion to Predict the Future of Solar System

Authors: Areena Bhatti

Abstract:

The geometric arrangement of planet and moon is the result of a self-organizing system. In our solar system, the planets and moons are constantly orbiting around the sun. The aim of this theory is to compare the motion of a solar system with the motion of water droplet when poured into a water body. The basic methodology is to compare both motions to know how they are related to each other. The difference between both systems will be that one is extremely fast, and the other is extremely slow. The role of this theory is that by looking at the fast system we can conclude how slow the system will get to an end. Just like ripples are formed around water droplet that move away from the droplet and water droplet forming those ripples become small in size will tell us how solar system will behave in the same way. So it is concluded that large and small systems can work under the same process but with different motions of time, and motion of the solar system is the slowest form of water droplet motion.

Keywords: motion, water, sun, time

Procedia PDF Downloads 140
13701 The Potential Benefits of Multimedia Information Representation in Enhancing Students’ Critical Thinking and History Reasoning

Authors: Ang Ling Weay, Mona Masood

Abstract:

This paper discusses the potential benefits of an interactive multimedia information representation in enhancing students’ critical thinking aligned with history reasoning in learning history between Secondary School students in Malaysia. Two modes of multimedia information representation implemented which are chronological and thematic information representation. A qualitative study of an unstructured interview was conducted among two history teachers, one history education lecturer, two i-think expert and program trainers and five form 4 secondary school students. The interview was to elicit their opinions on the implementation of thinking maps and interactive multimedia information representation in history learning. The key elements of interactive multimedia (e.g. multiple media, user control, interactivity, and use of timelines and concept maps) were then considered to improve the learning process. Findings of the preliminary investigation reveal that the interactive multimedia information representations have the potential benefits to be implemented as instructional resource in enhancing students’ higher order thinking skills (HOTs). This paper concludes by giving suggestions for future work.

Keywords: multimedia information representation, critical thinking, history reasoning, chronological and thematic information representation

Procedia PDF Downloads 343
13700 Information Retrieval from Internet Using Hand Gestures

Authors: Aniket S. Joshi, Aditya R. Mane, Arjun Tukaram

Abstract:

In the 21st century, in the era of e-world, people are continuously getting updated by daily information such as weather conditions, news, stock exchange market updates, new projects, cricket updates, sports and other such applications. In the busy situation, they want this information on the little use of keyboard, time. Today in order to get such information user have to repeat same mouse and keyboard actions which includes time and inconvenience. In India due to rural background many people are not much familiar about the use of computer and internet also. Also in small clinics, small offices, and hotels and in the airport there should be a system which retrieves daily information with the minimum use of keyboard and mouse actions. We plan to design application based project that can easily retrieve information with minimum use of keyboard and mouse actions and make our task more convenient and easier. This can be possible with an image processing application which takes real time hand gestures which will get matched by system and retrieve information. Once selected the functions with hand gestures, the system will report action information to user. In this project we use real time hand gesture movements to select required option which is stored on the screen in the form of RSS Feeds. Gesture will select the required option and the information will be popped and we got the information. A real time hand gesture makes the application handier and easier to use.

Keywords: hand detection, hand tracking, hand gesture recognition, HSV color model, Blob detection

Procedia PDF Downloads 282
13699 Information on Financial Statements for Loan Decision-Making of Commercial Banks in Vietnam

Authors: Mai Hoang Minh

Abstract:

Financial statements (FS) are tools which provide information to users for making business decisions. This article is going to present the survey which clarifies the role of financial statement to Commercial Banks’ loan decisions in Vietnam. Moreover, this also discusses about financial statement’s quality currently, thereby making suggestions for enterprises to enhance the usefulness of accounting information in borrowing activities.

Keywords: usefulness of financial statement, accounting information quality, loan decisions

Procedia PDF Downloads 270
13698 A New Framework for ECG Signal Modeling and Compression Based on Compressed Sensing Theory

Authors: Siavash Eftekharifar, Tohid Yousefi Rezaii, Mahdi Shamsi

Abstract:

The purpose of this paper is to exploit compressed sensing (CS) method in order to model and compress the electrocardiogram (ECG) signals at a high compression ratio. In order to obtain a sparse representation of the ECG signals, first a suitable basis matrix with Gaussian kernels, which are shown to nicely fit the ECG signals, is constructed. Then the sparse model is extracted by applying some optimization technique. Finally, the CS theory is utilized to obtain a compressed version of the sparse signal. Reconstruction of the ECG signal from the compressed version is also done to prove the reliability of the algorithm. At this stage, a greedy optimization technique is used to reconstruct the ECG signal and the Mean Square Error (MSE) is calculated to evaluate the precision of the proposed compression method.

Keywords: compressed sensing, ECG compression, Gaussian kernel, sparse representation

Procedia PDF Downloads 459
13697 Predictive Analysis of Personnel Relationship in Graph Database

Authors: Kay Thi Yar, Khin Mar Lar Tun

Abstract:

Nowadays, social networks are so popular and widely used in all over the world. In addition, searching personal information of each person and searching connection between them (peoples’ relation in real world) becomes interesting issue in our society. In this paper, we propose a framework with three portions for exploring peoples’ relations from their connected information. The first portion focuses on the Graph database structure to store the connected data of peoples’ information. The second one proposes the graph database searching algorithm, the Modified-SoS-ACO (Sense of Smell-Ant Colony Optimization). The last portion proposes the Deductive Reasoning Algorithm to define two persons’ relationship. This study reveals the proper storage structure for connected information, graph searching algorithm and deductive reasoning algorithm to predict and analyze the personnel relationship from peoples’ relation in their connected information.

Keywords: personnel information, graph storage structure, graph searching algorithm, deductive reasoning algorithm

Procedia PDF Downloads 444