Search results for: text symbols
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1452

Search results for: text symbols

462 Critical Thinking and Academic Writing: A Case Study

Authors: Mubina Rauf

Abstract:

Critical thinking is a highly valued outcome of university education. There is an agreement in literature that it is demonstrated through the abilities to highlight issues and assumptions, find links between ideas and concepts, make correct inferences, evaluate evidence or authority and deduce conclusions (Tsui, 2002). Although Critical thinking plays a significant role in developing all academic skills, its role in developing writing skills is significant (Kurfiss, 1988). SAW (student academic writing) is an observable output of critical thinking (Wilson K. , 2016). When students apply critical thinking to their writing, they present clear, accurate, significant and logical arguments constructing their own voice in the form of an essay or dissertation (Matsuda, 2001). This presentation will show how a rubric can be used to find evidence of critical thinking in SAW. Participants will experience how evidence-based written arguments supported by background knowledge and authorial voice can develop students into efficient critical thinkers. Participants will have an opportunity to use the rubric to find the evidence of critical thinking in SAW samples. This presentation is intended for classroom teachers with or without the basic knowledge of implementing critical thinking in academic settings. Participants will also learn tips how various features of critical thinking can be developed among students. After the session, the participants will be able to use or adapt the rubric according to their needs to find evidence of critical thinking in SAW within their context.

Keywords: critical thinking, Rubric, student academic writing, argumentation, text analysis

Procedia PDF Downloads 46
461 Intra-miR-ExploreR, a Novel Bioinformatics Platform for Integrated Discovery of MiRNA:mRNA Gene Regulatory Networks

Authors: Surajit Bhattacharya, Daniel Veltri, Atit A. Patel, Daniel N. Cox

Abstract:

miRNAs have emerged as key post-transcriptional regulators of gene expression, however identification of biologically-relevant target genes for this epigenetic regulatory mechanism remains a significant challenge. To address this knowledge gap, we have developed a novel tool in R, Intra-miR-ExploreR, that facilitates integrated discovery of miRNA targets by incorporating target databases and novel target prediction algorithms, using statistical methods including Pearson and Distance Correlation on microarray data, to arrive at high confidence intragenic miRNA target predictions. We have explored the efficacy of this tool using Drosophila melanogaster as a model organism for bioinformatics analyses and functional validation. A number of putative targets were obtained which were also validated using qRT-PCR analysis. Additional features of the tool include downloadable text files containing GO analysis from DAVID and Pubmed links of literature related to gene sets. Moreover, we are constructing interaction maps of intragenic miRNAs, using both micro array and RNA-seq data, focusing on neural tissues to uncover regulatory codes via which these molecules regulate gene expression to direct cellular development.

Keywords: miRNA, miRNA:mRNA target prediction, statistical methods, miRNA:mRNA interaction network

Procedia PDF Downloads 477
460 Psychodidactic Strategies to Facilitate Flow of Logical Thinking in Preparation of Academic Documents

Authors: Deni Stincer Gomez, Zuraya Monroy Nasr, Luis Pérez Alvarez

Abstract:

The preparation of academic documents such as thesis, articles and research projects is one of the requirements of the higher educational level. These documents demand the implementation of logical argumentative thinking which is experienced and executed with difficulty. To mitigate the effect of these difficulties this study designed a thesis seminar, with which the authors have seven years of experience. It is taught in a graduate program in Psychology at the National Autonomous University of Mexico. In this study the authors use the Toulmin model as a mental heuristic and for the application of a set of psychodidactic strategies that facilitate the elaboration of the plot and culmination of the thesis. The efficiency in obtaining the degree in the groups exposed to the seminar has increased by 94% compared to the 10% that existed in the generations that were not exposed to the seminar. In this article the authors will emphasize the psychodidactic strategies used. The Toulmin model alone does not guarantee the success achieved. A set of actions of a psychological nature (almost psychotherapeutic) and didactics of the teacher also seem to contribute. These are actions that derive from an understanding of the psychological, epistemological and ontogenetic obstacles and the most frequent errors in which thought tends to fall when it is demanded a logical course. The authors have grouped the strategies into three groups: 1) strategies to facilitate logical thinking, 2) strategies to strengthen the scientific self and 3) strategies to facilitate the act of writing the text. In this work the authors delve into each of them.

Keywords: psychodidactic strategies, logical thinking, academic documents, Toulmin model

Procedia PDF Downloads 158
459 Hand Gesture Interpretation Using Sensing Glove Integrated with Machine Learning Algorithms

Authors: Aqsa Ali, Aleem Mushtaq, Attaullah Memon, Monna

Abstract:

In this paper, we present a low cost design for a smart glove that can perform sign language recognition to assist the speech impaired people. Specifically, we have designed and developed an Assistive Hand Gesture Interpreter that recognizes hand movements relevant to the American Sign Language (ASL) and translates them into text for display on a Thin-Film-Transistor Liquid Crystal Display (TFT LCD) screen as well as synthetic speech. Linear Bayes Classifiers and Multilayer Neural Networks have been used to classify 11 feature vectors obtained from the sensors on the glove into one of the 27 ASL alphabets and a predefined gesture for space. Three types of features are used; bending using six bend sensors, orientation in three dimensions using accelerometers and contacts at vital points using contact sensors. To gauge the performance of the presented design, the training database was prepared using five volunteers. The accuracy of the current version on the prepared dataset was found to be up to 99.3% for target user. The solution combines electronics, e-textile technology, sensor technology, embedded system and machine learning techniques to build a low cost wearable glove that is scrupulous, elegant and portable.

Keywords: American sign language, assistive hand gesture interpreter, human-machine interface, machine learning, sensing glove

Procedia PDF Downloads 265
458 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 233
457 An Experimental Study on the Variability of Nonnative and Native Inference of Word Meanings in Timed and Untimed Conditions

Authors: Swathi M. Vanniarajan

Abstract:

Reading research suggests that online contextual vocabulary comprehension while reading is an interactive and integrative process. One’s success in it depends on a variety of factors including the amount and the nature of available linguistic and nonlinguistic cues, his/her analytical and integrative skills, schema memory (content familiarity), and processing speed characterized along the continuum of controlled to automatic processing. The experiment reported here, conducted with 30 native speakers as one group and 30 nonnative speakers as another group (all graduate students), hypothesized that while working on (24) tasks which required them to comprehend an unfamiliar word in real time without backtracking, due to the differences in the nature of their respective reading processes, the nonnative subjects would be less able to construct the meanings of the unknown words by integrating the multiple but sufficient contextual cues provided in the text but the native subjects would be able to. The results indicated that there were significant inter-group as well as intra-group differences in terms of the quality of definitions given. However, when given additional time, while the nonnative speakers could significantly improve the quality of their definitions, the native speakers in general would not, suggesting that all things being equal, time is a significant factor for success in nonnative vocabulary and reading comprehension processes and that accuracy precedes automaticity in the development of nonnative reading processes also.

Keywords: reading, second language processing, vocabulary comprehension

Procedia PDF Downloads 144
456 Music Therapy Intervention as a Means of Stimulating Communicative Abilities of Seniors with Neurocognitive Disorders – Theory versus Practice

Authors: Pavel Svoboda, Oldřich Müller

Abstract:

The paper contains a screening of the opinions of helping professional workers working in a home for seniors with individuals with neurocognitive disorders and compares them with the opinions of a younger generation of students who are just preparing for this work. The authors carried out a comparative questionnaire survey with both target groups, focusing on the analysis and comparison of possible differences in their knowledge in the field of care for elderly people with neurocognitive disorders. Specifically, they focused on knowledge and experience with approaches, methods and tools applicable within the framework of music therapy interventions, as they are understood in practice in comparison with the theoretical knowledge of secondary school students focused on social work. The questionnaire was mainly aimed at assessing the knowledge of the possibilities of effective memory stimulation of the elderly and their communication skills using the means of music. The conducted investigation was based on the research of studies dealing with so-called non-pharmacological approaches to the given clientele; for professional caregivers, it followed music therapy lessons, which the authors regularly implemented from the beginning of 2022. Its results will, among other things, serve as the basis for an upcoming study with a scoping design review.

Keywords: neurocognitive disorders, seniors, music therapy intervention, melody, rhythm, text, memory stimulation, communication skills

Procedia PDF Downloads 47
455 Post-occupancy Evaluation of Greenway Based on Multi-source data : A Case Study of Jincheng Greenway in Chengdu

Authors: Qin Zhu

Abstract:

Under the development concept of Park City, Tianfu Greenway system, as the basic and pre-configuration element of Chengdu Global Park construction, connects urban open space with linear and circular structures and undertakes and exerts the ecological, cultural and recreational functions of the park system. Chengdu greenway construction is in full swing. In the process of greenway planning and construction, the landscape effect of greenway on urban quality improvement is more valued, and the long-term impact of crowd experience on the sustainable development of greenway is often ignored. Therefore, it is very important to test the effectiveness of greenway construction from the perspective of users. Taking Jincheng Greenway in Chengdu as an example, this paper attempts to introduce multi-source data to construct a post-occupancy evaluation model of greenway and adopts behavior mapping method, questionnaire survey method, web text analysis and IPA analysis method to comprehensively evaluate the user 's behavior characteristics and satisfaction. According to the evaluation results, we can grasp the actual behavior rules and comprehensive needs of users so that the experience of building greenways can be fed back in time and provide guidance for the optimization and improvement of built greenways and the planning and construction of future greenways.

Keywords: multi-source data, greenway, IPA analysis, post -occupancy evaluation (POE)

Procedia PDF Downloads 35
454 Extraction of Compound Words in Malay Sentences Using Linguistic and Statistical Approaches

Authors: Zamri Abu Bakar Zamri, Normaly Kamal Ismail Normaly, Mohd Izani Mohamed Rawi Izani

Abstract:

Malay noun compound are phrases that consist of two or more nouns. The key characteristic behind noun compounds lies on its frequent occurrences within the text. Therefore, extracting these noun compounds is essential for several domains of research such as Information Retrieval, Sentiment Analysis and Question Answering. Many research efforts have been proposed in terms of extracting Malay noun compounds using linguistic and statistical approaches. Most of the existing methods have concentrated on the extraction of bi-gram noun+noun compound. However, extracting noun+verb, noun+adjective and noun+prepositional is challenging due to the difficulty of selecting an appropriate method with effective results. Thus, there is still room for improvement in terms of enhancing the effectiveness of compound word extraction. Therefore, this study proposed a combination of linguistic approach and statistical measures in order to enhance the extraction of compound words. Several preprocessing steps are involved including normalization, tokenization, and stemming. The linguistic approach that has been used in this study is Part-of-Speech (POS) tagging. In addition, a new linguistic pattern for named entities has been utilized using a list of Malays named entities in order to enhance the linguistic approach in terms of noun compound recognition. The proposed statistical measures consists of NC-value, NTC-value and NLC value.

Keywords: Compound Word, Noun Compound, Linguistic Approach, Statistical Approach

Procedia PDF Downloads 320
453 Flood Hazard and Risk Mapping to Assess Ice-Jam Flood Mitigation Measures

Authors: Karl-Erich Lindenschmidt, Apurba Das, Joel Trudell, Keanne Russell

Abstract:

In this presentation, we explore options for mitigating ice-jam flooding along the Athabasca River in western Canada. Not only flood hazard, expressed in this case as the probability of flood depths and extents being exceeded, but also flood risk, in which annual expected damages are calculated. Flood risk is calculated, which allows a cost-benefit analysis to be made so that decisions on the best mitigation options are not based solely on flood hazard but also on the costs related to flood damages and the benefits of mitigation. The river ice model is used to simulate extreme ice-jam flood events with which scenarios are run to determine flood exposure and damages in flood-prone areas along the river. We will concentrate on three mitigation options – the placement of a dike, artificial breakage of the ice cover along the river, the installation of an ice-control structure, and the construction of a reservoir. However, any mitigation option is not totally failsafe. For example, dikes can still be overtopped and breached, and ice jams may still occur in areas of the river where ice covers have been artificially broken up. Hence, for all options, it is recommended that zoning of building developments away from greater flood hazard areas be upheld. Flood mitigation can have a negative effect of giving inhabitants a false sense of security that flooding may not happen again, leading to zoning policies being relaxed. (Text adapted from Lindenschmidt [2022] "Ice Destabilization Study - Phase 2", submitted to the Regional Municipality of Wood Buffalo, Alberta, Canada)

Keywords: ice jam, flood hazard, flood risk river ice modelling, flood risk

Procedia PDF Downloads 150
452 Semantic Differences between Bug Labeling of Different Repositories via Machine Learning

Authors: Pooja Khanal, Huaming Zhang

Abstract:

Labeling of issues/bugs, also known as bug classification, plays a vital role in software engineering. Some known labels/classes of bugs are 'User Interface', 'Security', and 'API'. Most of the time, when a reporter reports a bug, they try to assign some predefined label to it. Those issues are reported for a project, and each project is a repository in GitHub/GitLab, which contains multiple issues. There are many software project repositories -ranging from individual projects to commercial projects. The labels assigned for different repositories may be dependent on various factors like human instinct, generalization of labels, label assignment policy followed by the reporter, etc. While the reporter of the issue may instinctively give that issue a label, another person reporting the same issue may label it differently. This way, it is not known mathematically if a label in one repository is similar or different to the label in another repository. Hence, the primary goal of this research is to find the semantic differences between bug labeling of different repositories via machine learning. Independent optimal classifiers for individual repositories are built first using the text features from the reported issues. The optimal classifiers may include a combination of multiple classifiers stacked together. Then, those classifiers are used to cross-test other repositories which leads the result to be deduced mathematically. The produce of this ongoing research includes a formalized open-source GitHub issues database that is used to deduce the similarity of the labels pertaining to the different repositories.

Keywords: bug classification, bug labels, GitHub issues, semantic differences

Procedia PDF Downloads 173
451 Intelligent Chatbot Generating Dynamic Responses Through Natural Language Processing

Authors: Aarnav Singh, Jatin Moolchandani

Abstract:

The proposed research work aims to build a query-based AI chatbot that can answer any question related to any topic. A chatbot is software that converses with users via text messages. In the proposed system, we aim to build a chatbot that generates a response based on the user’s query. For this, we use natural language processing to analyze the query and some set of texts to form a concise answer. The texts are obtained through web-scrapping and filtering all the credible sources from a web search. The objective of this project is to provide a chatbot that is able to provide simple and accurate answers without the user having to read through a large number of articles and websites. Creating an AI chatbot that can answer a variety of user questions on a variety of topics is the goal of the proposed research project. This chatbot uses natural language processing to comprehend user inquiries and provides succinct responses by examining a collection of writings that were scraped from the internet. The texts are carefully selected from reliable websites that are found via internet searches. This project aims to provide users with a chatbot that provides clear and precise responses, removing the need to go through several articles and web pages in great detail. In addition to exploring the reasons for their broad acceptance and their usefulness across many industries, this article offers an overview of the interest in chatbots throughout the world.

Keywords: Chatbot, Artificial Intelligence, natural language processing, web scrapping

Procedia PDF Downloads 37
450 Linguistic Cyberbullying, a Legislative Approach

Authors: Simona Maria Ignat

Abstract:

Bullying online has been an increasing studied topic during the last years. Different approaches, psychological, linguistic, or computational, have been applied. To our best knowledge, a definition and a set of characteristics of phenomenon agreed internationally as a common framework are still waiting for answers. Thus, the objectives of this paper are the identification of bullying utterances on Twitter and their algorithms. This research paper is focused on the identification of words or groups of words, categorized as “utterances”, with bullying effect, from Twitter platform, extracted on a set of legislative criteria. This set is the result of analysis followed by synthesis of law documents on bullying(online) from United States of America, European Union, and Ireland. The outcome is a linguistic corpus with approximatively 10,000 entries. The methods applied to the first objective have been the following. The discourse analysis has been applied in identification of keywords with bullying effect in texts from Google search engine, Images link. Transcription and anonymization have been applied on texts grouped in CL1 (Corpus linguistics 1). The keywords search method and the legislative criteria have been used for identifying bullying utterances from Twitter. The texts with at least 30 representations on Twitter have been grouped. They form the second corpus linguistics, Bullying utterances from Twitter (CL2). The entries have been identified by using the legislative criteria on the the BoW method principle. The BoW is a method of extracting words or group of words with same meaning in any context. The methods applied for reaching the second objective is the conversion of parts of speech to alphabetical and numerical symbols and writing the bullying utterances as algorithms. The converted form of parts of speech has been chosen on the criterion of relevance within bullying message. The inductive reasoning approach has been applied in sampling and identifying the algorithms. The results are groups with interchangeable elements. The outcomes convey two aspects of bullying: the form and the content or meaning. The form conveys the intentional intimidation against somebody, expressed at the level of texts by grammatical and lexical marks. This outcome has applicability in the forensic linguistics for establishing the intentionality of an action. Another outcome of form is a complex of graphemic variations essential in detecting harmful texts online. This research enriches the lexicon already known on the topic. The second aspect, the content, revealed the topics like threat, harassment, assault, or suicide. They are subcategories of a broader harmful content which is a constant concern for task forces and legislators at national and international levels. These topic – outcomes of the dataset are a valuable source of detection. The analysis of content revealed algorithms and lexicons which could be applied to other harmful contents. A third outcome of content are the conveyances of Stylistics, which is a rich source of discourse analysis of social media platforms. In conclusion, this corpus linguistics is structured on legislative criteria and could be used in various fields.

Keywords: corpus linguistics, cyberbullying, legislation, natural language processing, twitter

Procedia PDF Downloads 58
449 Visual Template Detection and Compositional Automatic Regular Expression Generation for Business Invoice Extraction

Authors: Anthony Proschka, Deepak Mishra, Merlyn Ramanan, Zurab Baratashvili

Abstract:

Small and medium-sized businesses receive over 160 billion invoices every year. Since these documents exhibit many subtle differences in layout and text, extracting structured fields such as sender name, amount, and VAT rate from them automatically is an open research question. In this paper, existing work in template-based document extraction is extended, and a system is devised that is able to reliably extract all required fields for up to 70% of all documents in the data set, more than any other previously reported method. The approaches are described for 1) detecting through visual features which template a given document belongs to, 2) automatically generating extraction rules for a given new template by composing regular expressions from multiple components, and 3) computing confidence scores that indicate the accuracy of the automatic extractions. The system can generate templates with as little as one training sample and only requires the ground truth field values instead of detailed annotations such as bounding boxes that are hard to obtain. The system is deployed and used inside a commercial accounting software.

Keywords: data mining, information retrieval, business, feature extraction, layout, business data processing, document handling, end-user trained information extraction, document archiving, scanned business documents, automated document processing, F1-measure, commercial accounting software

Procedia PDF Downloads 102
448 Experimental Device to Test Corrosion Behavior of Materials in the Molten Salt Reactor Environment

Authors: Jana Petru, Marie Kudrnova

Abstract:

The use of technologies working with molten salts is conditioned by finding suitable construction materials that must meet several demanding criteria. In addition to temperature resistance, materials must also show corrosion resistance to salts; they must meet mechanical requirements and other requirements according to the area of use – for example, radiation resistance in Molten Salt Reactors. The present text describes an experimental device for studying the corrosion resistance of candidate materials in molten mixtures of salts and is a partial task of the international project ADAR, dealing with the evaluation of advanced nuclear reactors based on molten salts. The design of the device is based on a test exposure of Inconel 625 in the mixture of salts Hitec in a high temperature tube furnace. The result of the pre-exposure is, in addition to the metallographic evaluation of the behavior of material 625 in the mixture of nitrate salts, mainly a list of operational and construction problems that were essential for the construction of the new experimental equipment. The main output is a scheme of a newly designed gas-tight experimental apparatus capable of operating in an inert argon atmosphere, temperature up to 600 °C, pressure 3 bar, in the presence of a corrosive salt environment, with an exposure time of hundreds of hours. This device will enable the study of promising construction materials for nuclear energy.

Keywords: corrosion, experimental device, molten salt, steel

Procedia PDF Downloads 100
447 Implementing Text Using Political and Current Issues to Create Choreography: “The Pledge 2.0”

Authors: Muhammad Fairul Azreen bin Mohd Zahid, Melissa Querk, Aimi Nabila bt Anizaim

Abstract:

For this particular research, the focus is based on the practice as research which will produce a choreography as the outcome. The ideas organically develop as an “epiphany” from the meeting, brainstorming, or situation that revolves around surroundings. In this study, the researchers are approaching the national pillar of Malaysia known as ‘Rukun Negara’ to develop a choreographic idea. The concept theory of Speech Act by J.L Austin is used to compose the choreography alongside with national pillar ‘Rukun Negara’ as a guideline for a contemporary work titled, The Pledge 2.0, besides fostering the spirit of unity. These approaches will offer flexibility in creating a choreography piece. The pledge has crossed the boundaries by using texts and heavy issues in choreography developments. It will emphasize the concept of delivering the speech via verbal and nonverbal body language. Besides using the Theory of Speech Acts, the development process of creating this piece will lay the bare normative structure implicit in performance practice. Converging current issues into the final choreographic piece for this research is vital as this research will explore a few choreography methods from different perspectives. Hence, the audience will be able to see the world of dance that always revolves in line with the diachronic process in many ways. The method used in this research is qualitative, which will be used in finding the movement that fits the given facts.

Keywords: performing arts, speech act, performative, nationalism, choreography, politic in dance

Procedia PDF Downloads 64
446 A Transformer-Based Question Answering Framework for Software Contract Risk Assessment

Authors: Qisheng Hu, Jianglei Han, Yue Yang, My Hoa Ha

Abstract:

When a company is considering purchasing software for commercial use, contract risk assessment is critical to identify risks to mitigate the potential adverse business impact, e.g., security, financial and regulatory risks. Contract risk assessment requires reviewers with specialized knowledge and time to evaluate the legal documents manually. Specifically, validating contracts for a software vendor requires the following steps: manual screening, interpreting legal documents, and extracting risk-prone segments. To automate the process, we proposed a framework to assist legal contract document risk identification, leveraging pre-trained deep learning models and natural language processing techniques. Given a set of pre-defined risk evaluation problems, our framework utilizes the pre-trained transformer-based models for question-answering to identify risk-prone sections in a contract. Furthermore, the question-answering model encodes the concatenated question-contract text and predicts the start and end position for clause extraction. Due to the limited labelled dataset for training, we leveraged transfer learning by fine-tuning the models with the CUAD dataset to enhance the model. On a dataset comprising 287 contract documents and 2000 labelled samples, our best model achieved an F1 score of 0.687.

Keywords: contract risk assessment, NLP, transfer learning, question answering

Procedia PDF Downloads 105
445 The Implication of Small Group Therapy on Sexuality in Breast Cancer Survivors

Authors: Cherng-Jye Jeng, Ming-Feng Hou, Hsing-Yuan Liu, Chuan-Feng Chang, Lih-Rong Wang, Yen-Chin Lin

Abstract:

Introduction: The incidence of breast cancer has gradually increased in Taiwan, and the characteristic of younger ages impact these women in their middle age, and may also cause challenges in terms of family, work, and illness. Breasts are symbols of femininity, as well as of sex. For women, breasts are important organs for the female identity and sexual expression. Losing breasts not only affects the female role, but would also affect sexual attraction and sexual desire. Thus, women with breast cancer who have need for mastectomies experience physical incompletion, which affects women’s self-confidence, physical image, and self-orientation. Purposes: 1. To understand the physical experience of women with breast cancer. 2. To explore the issue of sexual issues on the health effects of women with breast cancer. 3. To construct a domestic sex life issue group model for domestic women with breast cancer. 4. To explore the accompaniment experiences and sexual relationship adjustments of spouses when women have breast cancer. Method: After the research plan passes IRB review, participants will be recruited at breast surgery clinic in the affiliated hospital, to screen suitable subjects for entry into the group. Between March and May 2015, two sexual health and sex life consultation groups were conducted, which were (1) 10 in postoperative groups for women with cancer; (2) 4 married couples group for postoperative women with cancer. After sharing experiences and dialogue, women can achieve mutual support and growth. Data organization and analysis underwent descriptive analysis in qualitative research, and the group process was transcribed into transcripts for overall-content and category-content analysis. Results: Ten women with breast cancer believed that participating in group can help them exchange experiences, and elevate sexual health. The main issues include: (1) after breast cancer surgery, patients generally received chemotherapy or estrogen suppressants, causing early menopause; in particular, vaginal dryness can cause pain or bleeding in intercourse, reducing their desire for sexual activity; (2) breast cancer accentuates original spousal or family and friend relationships; some people have support and care from their family, and spouses emphasize health over the appearance of breasts; however, some people do not have acceptance and support from their family, and some even hear spousal sarcasm about loss of breasts; (3) women with breast cancer have polarized expressions of optimism and pessimism in regards to their emotions, beliefs, and body image regarding cancer; this is related to the women’s original personalities, attribution of causes of cancer, and extent of worry about relapse. Conclusion: The research results can be provided as a reference to medical institutions or breast cancer volunteer teams, to pay attention to maintaining the health of women with breast cancer.

Keywords: women with breast cancer, experiences of objectifying the body, quality of sex life, sexual health

Procedia PDF Downloads 297
444 Assessing EU-China Security Interests from Contradiction to Convergence

Authors: Julia Gurol

Abstract:

Why do we observe a shift towards convergence in EU-China security interests? While contradicting attitudes towards key principles of inter-state and region-to-state relations, including state sovereignty, territorial integrity, and intervention policies have ever since hindered EU-China inter-regional cooperation beyond the economic realm, collaboration in peace and security issues is now becoming a key pillar of European-Chinese relations. In addition, the Belt and Road Initiative as most ambitious Chinese foreign policy project explicitly touches upon several European foreign policy and security preferences. Based on these counterintuitive findings, this paper traces the process of convergence of Sino-European security interests. Drawing on qualitative text analysis of official Chinese and European policy papers and documents from the establishment of diplomatic relations in 1975 until today, it assesses the striking change over time. On this basis, the paper uses theories of neo-functionalism, inter-regionalism, and securitization and borrows from constructivist views in International Relations’ theory, to expound possible motives for the change in Chinese and respectively European preferences in the security realm. The results reveal interesting insights into the decisive factors and motives behind both countries’ foreign policies. The paper concludes with a discussion of further potential and difficulties of EU-China security cooperation.

Keywords: belt and road initiative, China, European Union, foreign policy, neo-functionalism, security

Procedia PDF Downloads 260
443 Introducing a Video-Based E-Learning Module to Improve Disaster Preparedness at a Tertiary Hospital in Oman

Authors: Ahmed Al Khamisi

Abstract:

The Disaster Preparedness Standard (DPS) is one of the elements that is evaluated by the Accreditation Canada International (ACI). ACI emphasizes to train and educate all staff, including service providers and senior leaders, on emergency and disaster preparedness upon the orientation and annually thereafter. Lack of awareness and deficit of knowledge among the healthcare providers about DPS have been noticed in a tertiary hospital where ACI standards were implemented. Therefore, this paper aims to introduce a video-based e-learning (VB-EL) module that explains the hospital’s disaster plan in a simple language which will be easily accessible to all healthcare providers through the hospital’s website. The healthcare disaster preparedness coordinator in the targeted hospital will be responsible to ensure that VB-EL is ready by 25 April 2019. This module will be developed based on the Kirkpatrick evaluation method. In fact, VB-EL combines different data forms such as images, motion, sounds, text in a complementary fashion which will suit diverse learning styles and individual learning pace of healthcare providers. Moreover, the module can be adjusted easily than other tools to control the information that healthcare providers receive. It will enable healthcare providers to stop, rewind, fast-forward, and replay content as many times as needed. Some anticipated limitations in the development of this module include challenges of preparing VB-EL content and resistance from healthcare providers.

Keywords: Accreditation Canada International, Disaster Preparedness Standard, Kirkpatrick evaluation method, video-based e-learning

Procedia PDF Downloads 129
442 Efficacy of Cognitive Rehabilitation Therapy on Poststroke Depression among Survivors of Stroke; A Systematic Review

Authors: Zahra Hassani

Abstract:

Background and Purpose: Poststroke depression (PSD) is one of the complications of a stroke that reduces the patient's chance of recovery, becomes irritable, and changes personality. Cognitive rehabilitation is one of the non-pharmacological methods that improve deficits such as attention, memory, and symptoms of depression. Therefore, the purpose of the present study is to evaluate the Efficacy of Cognitive Rehabilitation Therapy on Poststroke Depression among Survivors of stroke. Method: In this study, a systematic review of the databases Google Scholar, PubMed, Science Direct, Elsevier between the years 2015 and 2019 with the keywords cognitive rehabilitation therapy, post-stroke, depression Search is done. In this process, studies that examined the Efficacy of Cognitive Rehabilitation Therapy on Poststroke Depression among Survivors of stroke were included in the study. Results: Inclusion criteria were full-text availability, interventional study, and non-review articles. There was a significant difference between the articles in terms of the indices studied, sample number, method of implementation, and so on. A review of studies have shown that cognitive rehabilitation therapy has a significant role in reducing the symptoms of post-stroke depression. The use of these interventions is also effective in improving problem-solving skills, improving memory, and improving attention and concentration. Conclusion: This study emphasizes on the development of efficient and flexible adaptive skills through cognitive processes and its effect on reducing depression in patients after stroke.

Keywords: cognitive therapy, depression, stroke, rehabilitation

Procedia PDF Downloads 101
441 A Lexicographic Approach to Obstacles Identified in the Ontological Representation of the Tree of Life

Authors: Sandra Young

Abstract:

The biodiversity literature is vast and heterogeneous. In today’s data age, numbers of data integration and standardisation initiatives aim to facilitate simultaneous access to all the literature across biodiversity domains for research and forecasting purposes. Ontologies are being used increasingly to organise this information, but the rationalisation intrinsic to ontologies can hit obstacles when faced with the intrinsic fluidity and inconsistency found in the domains comprising biodiversity. Essentially the problem is a conceptual one: biological taxonomies are formed on the basis of specific, physical specimens yet nomenclatural rules are used to provide labels to describe these physical objects. These labels are ambiguous representations of the physical specimen. An example of this is with the genus Melpomene, the scientific nomenclatural representation of a genus of ferns, but also for a genus of spiders. The physical specimens for each of these are vastly different, but they have been assigned the same nomenclatural reference. While there is much research into the conceptual stability of the taxonomic concept versus the nomenclature used, to the best of our knowledge as yet no research has looked empirically at the literature to see the conceptual plurality or singularity of the use of these species’ names, the linguistic representation of a physical entity. Language itself uses words as symbols to represent real world concepts, whether physical entities or otherwise, and as such lexicography has a well-founded history in the conceptual mapping of words in context for dictionary making. This makes it an ideal candidate to explore this problem. The lexicographic approach uses corpus-based analysis to look at word use in context, with a specific focus on collocated word frequencies (the frequencies of words used in specific grammatical and collocational contexts). It allows for inconsistencies and contradictions in the source data and in fact includes these in the word characterisation so that 100% of the available evidence is counted. Corpus analysis is indeed suggested as one of the ways to identify concepts for ontology building, because of its ability to look empirically at data and show patterns in language usage, which can indicate conceptual ideas which go beyond words themselves. In this sense it could potentially be used to identify if the hierarchical structures present within the empirical body of literature match those which have been identified in ontologies created to represent them. The first stages of this research have revealed a hierarchical structure that becomes apparent in the biodiversity literature when annotating scientific species’ names, common names and more general names as classes, which will be the focus of this paper. The next step in the research is focusing on a larger corpus in which specific words can be analysed and then compared with existing ontological structures looking at the same material, to evaluate the methods by means of an alternative perspective. This research aims to provide evidence as to the validity of the current methods in knowledge representation for biological entities, and also shed light on the way that scientific nomenclature is used within the literature.

Keywords: ontology, biodiversity, lexicography, knowledge representation, corpus linguistics

Procedia PDF Downloads 110
440 The Translation Of Original Metaphor In Literature

Authors: Esther Matthews

Abstract:

This paper looks at ways of translating new metaphors: those conceived and created by authors, which are often called ‘original’ metaphors in the world of Translation Studies. An original metaphor is the most extreme form of figurative language, often dramatic and shocking in effect. It displays unexpected juxtapositions of language, suggesting there could be as many different translations as there are translators. However, some theorists say original metaphors should be translated ‘literally’ or ‘word for word’ as far as possible, suggesting a similarity between translators’ solutions. How do literary translators approach this challenge? This study focuses on Spanish-English translations of a novel full of original metaphors: Nada by Carmen Laforet (1921 – 2004). Original metaphors from the text were compared to the four published English translations by Inez Muñoz, Charles Franklin Payne, Glafyra Ennis, and Edith Grossman. These four translators employed a variety of translation methods, but they translated ‘literally’ in well over half of the original metaphors studied. In a two-part translation exercise and questionnaire, professional literary translators were asked to translate a number of these metaphors. Many different methods were employed, but again, over half of the original metaphors were translated literally. Although this investigation was limited to one author and language pair, it gives a clear indication that, although literary translators’ solutions vary, on the whole, they prefer to translate original metaphors as literally as possible within the confines of English grammar and syntax. It also reveals literary translators’ desire to reproduce the distinctive character of an author’s work as accurately as possible for the target reader.

Keywords: translation, original metaphor, literature, translator training

Procedia PDF Downloads 244
439 Trends in Conservation and Inheritance of Musical Culture of Ethnic Groups: A Case Study of the Akha Music in Chiang Rai Province, Thailand

Authors: Nutthan Inkhong, Sutthiphong Ruangchante

Abstract:

Chiang Rai province is located at the northern border of Thailand. Most of the geography there is the northern continental highlands, and the population has many types of inhabitants, including Thai people, immigrants and ethnic groups such as Akha, Lahu, Lisu, Yao, etc. Most of these ethnic groups migrated from neighbouring countries such as Myanmar, Laos, China, etc. and settled in the mountains. Each ethnic group has their unique traditions, culture, and ways of life, including the musical culture that the ancestors of each ethnic group brought with them. In the present, the Akha have the largest population in the region and still live together in numerous villages in many districts. Thus, Akha musical culture still appears in the community traditions and cultural events of Chiang Rai province regularly. This article presents the situations of Akha musical culture in the present and the predictions for the future. The study method involves the analysis of music information and the related social contexts, which were collected from the fieldwork of ethnomusicological methodology by in-depth interviews, observations, audio and visual recordings, and related documents. The results found that the important persons who are related with Akha musical culture include (1) a musical instrument maker (lives in Mae Chan district) who produces various Akha musical instruments, including gourd mouth organs, Akha drums, two-way flutes, three-hole flutes, Jew’s harps (the sound of teenage love), buffalo horns (the sound symbol of hunting) and bird call instruments (the imitation of bird sounds), (2) a folk philosopher (lives in Mae Pha Luang district) who can teach music to the new generation of Akha people as well as lecture and demonstrate music to academics and tourists, and (3) a community leader (lives in Mae Chan district) who conserves Akha performances, singing and music through various activities of the students in an informal school. Because of the changes to the social contexts and ways of life of the Akha people, such as the educational system, religion, social media, etc., including the popularity of both Thai and international popular music among the new generation of Akha people, changes to and the fading away of Akha musical culture in the future may likely occur. Therefore, the conservation and inheritance of Akha music is an issue that should be resolved quickly. This primary study leads to the next step of the ethnomusicological work and plays a part in preventing or reducing the problems impacting Akha musical culture survival by the recording of Akha music in all of its dimensions, such as producing musical instruments, playing musical instruments, analysis of tuning systems, recording Akha music as musical notation using symbols, researching related social contexts, etc. and the transcription of this information to create lessons that can be returned to the Akha community.

Keywords: Akha music, Chiang Rai, ethnic music in Thailand, ethnomusicology

Procedia PDF Downloads 129
438 Techniques to Teach Reading at Pre-Reading Stage

Authors: Anh Duong

Abstract:

The three-phase reading lesson has been put forth around the world as the new and innovative framework which is corresponding to the learner-centered trend in English language teaching and learning. Among three stages, pre-reading attracts many teachers’ and researchers’ attention for its vital role in preparing students with knowledge and interest in reading class. The researcher’s desire to exemplify effectiveness of activities prior to text reading has provoked the current study. Three main aspects were investigated in this paper, i.e. teachers’ and student’s perception of pre-reading stage, teachers’ exploitation of pre-reading techniques and teachers’ recommendation of effective pre-reading activities. Aiming at pre-reading techniques for first-year students at English Department, this study involved 200 fresh-men and 10 teachers from Division 1 to participate in the questionnaire survey. Interviews with the teachers and classroom observation were employed as a tool to take an insight into the responses gained from the early instrument. After a detailed procedure of analyzing data, the researcher discovered that thanks to the participants’ acclamation of pre-reading stage, this phase was frequently conducted by the surveyed teachers. Despite the fact that pre-reading activities apparently put a hand in motivating students to read and creating a joyful learning atmosphere, they did not fulfill another function as supporting students’ reading comprehension. Therefore, a range of techniques and notices when preparing and conducting pre-reading phase was detected from the interviewed teachers. The findings assisted the researcher to propose some related pedagogical implications concerning teachers’ source of pre-reading techniques, variations of suggested activities and first-year reading syllabus.

Keywords: pre-reading stage, pre-reading techniques, teaching reading, language teaching

Procedia PDF Downloads 467
437 The Last National Anthem of the Ottoman Empire: Musical Code, Sociopolitical Control and Historical Realities

Authors: Nuray Ocakli

Abstract:

19th century was the era of changes and transformations for the Ottoman Empire. The first sultan of this century, Mahmud II (1808-1839), was the architect of Ottoman modernization and fundamental changes. The most radical of these was abolishing the Janissary corps and the traditional Ottoman military band, Mehteran. Mahmud II introduced modernized military corps as well as western style royal and military music. Mahmut II invited the Italian composer Giuseppe Donizetti to establish a modern military band for the new army and to compose the Sultan’s royal anthem. In 1828, Donizetti composed the first western-style Ottoman anthem, Mahmudiyye anthem. During the 19th and early 20th century, four other western style Ottoman anthems (Aziziyye, Mecidiyye, Hamidiyye, and Resadiyye) were composed but the last anthem adopted in the reign of Mehmet VI (r. 1918-1922) was again Mahmudiyye anthem. This paper aims to analyze the Mahmudiyye anthem composed as royal anthem in 1828 but adopted as national anthem in 1918. Research questions of this paper are as follows: What were the characteristics of the Mahmudiyye anthem making it the best choice of the last sultan for the last national anthem? Are there specific reasons of the last sultan to adopt Mahmudiyye anthem or not to adopt any of the other four anthems? The musical characteristics of the anthem are analyzed based on the Cerulo’s empirical research. Cerulo examined the musical structures of 124 western style anthems from 150 countries in the 1580-1976 period. Cerulo’s research categorizes musical codes of the anthems as basic and embellished related with the level of sociopolitical control. Musical analysis of the anthem indicates that the basic musical code of the anthem implies a high level of socio-political control during the reign of both Mahmut II and Mehmet VI. Historical analysis of each sultans’ reign shows that both sultans were autocratic. Mahmut II designed authoritarian government policies to suppress possible reactions against his reforms. On the other hand, authoritarian policies of Mehmet VI are related with the domestic and international political conditions following the World War I. Historical analysis of the research questions show that compared to the other western style Ottoman anthems, Mahmudiyye anthem remained the only neutral anthem symbolizing modernization and westernization of the empire. Other anthems were all the symbols of failed ideologies such as Ottomanism, pan-Islamism, and pan-Turkism. In the early 20th century, there were a few common things remained among the diverse communities of the Ottoman Empire: The land they shared as homeland and the idea of modernization to save the homeland. For this reason, the last sultan Mehmet VI adopted Mahmudiyye anthem as the memory of a unified empire under the rule of a powerful and modernist sultan. The last sultan’s reign lasted just for four years, and the Ottoman Empire disintegrated in 1922, but his adaptation of the Mahmudiyye anthem indicates his unifying policies, his attitudes to save the empire and the caliphate.

Keywords: Mahmudiyye anthem, musical code, national anthem, Ottoman Empire, royal anthem

Procedia PDF Downloads 173
436 Performance Assessment of Multi-Level Ensemble for Multi-Class Problems

Authors: Rodolfo Lorbieski, Silvia Modesto Nassar

Abstract:

Many supervised machine learning tasks require decision making across numerous different classes. Multi-class classification has several applications, such as face recognition, text recognition and medical diagnostics. The objective of this article is to analyze an adapted method of Stacking in multi-class problems, which combines ensembles within the ensemble itself. For this purpose, a training similar to Stacking was used, but with three levels, where the final decision-maker (level 2) performs its training by combining outputs from the tree-based pair of meta-classifiers (level 1) from Bayesian families. These are in turn trained by pairs of base classifiers (level 0) of the same family. This strategy seeks to promote diversity among the ensembles forming the meta-classifier level 2. Three performance measures were used: (1) accuracy, (2) area under the ROC curve, and (3) time for three factors: (a) datasets, (b) experiments and (c) levels. To compare the factors, ANOVA three-way test was executed for each performance measure, considering 5 datasets by 25 experiments by 3 levels. A triple interaction between factors was observed only in time. The accuracy and area under the ROC curve presented similar results, showing a double interaction between level and experiment, as well as for the dataset factor. It was concluded that level 2 had an average performance above the other levels and that the proposed method is especially efficient for multi-class problems when compared to binary problems.

Keywords: stacking, multi-layers, ensemble, multi-class

Procedia PDF Downloads 245
435 Sustainable Living Where the Immaterial Matters

Authors: Maria Hadjisoteriou, Yiorgos Hadjichristou

Abstract:

This paper aims to explore and provoke a debate, through the work of the design studio, “living where the immaterial matters” of the architecture department of the University of Nicosia, on the role that the “immaterial matter” can play in enhancing innovative sustainable architecture and viewing the cities as sustainable organisms that always grow and alter. The blurring, juxtaposing binary of immaterial and matter, as the theoretical backbone of the Unit is counterbalanced by the practicalities of the contested sites of the last divided capital Nicosia with its ambiguous green line and the ghost city of Famagusta in the island of Cyprus. Jonathan Hill argues that the ‘immaterial is as important to architecture as the material concluding that ‘Immaterial–Material’ weaves the two together, so that they are in conjunction not opposition’. This understanding of the relationship of the immaterial vs material set the premises and the departing point of our argument, and talks about new recipes for creating hybrid public space that can lead to the unpredictability of a complex and interactive, sustainable city. We hierarchized the human experience as a priority. We distinguish the notion of space and place referring to Heidegger’s ‘building dwelling thinking’: ‘a distinction between space and place, where spaces gain authority not from ‘space’ appreciated mathematically but ‘place’ appreciated through human experience’. Following the above, architecture and the city are seen as one organism. The notions of boundaries, porous borders, fluidity, mobility, and spaces of flows are the lenses of the investigation of the unit’s methodology, leading to the notion of a new hybrid urban environment, where the main constituent elements are in a flux relationship. The material and the immaterial flows of the town are seen interrelated and interwoven with the material buildings and their immaterial contents, yielding to new sustainable human built environments. The above premises consequently led to choices of controversial sites. Indisputably a provoking site was the ghost town of Famagusta where the time froze back in 1974. Inspired by the fact that the nature took over the a literally dormant, decaying city, a sustainable rebirthing was seen as an opportunity where both nature and built environment, material and immaterial are interwoven in a new emergent urban environment. Similarly, we saw the dividing ‘green line’ of Nicosia completely failing to prevent the trespassing of images, sounds and whispers, smells and symbols that define the two prevailing cultures and becoming a porous creative entity which tends to start reuniting instead of separating , generating sustainable cultures and built environments. The authors would like to contribute to the debate by introducing a question about a new recipe of cooking the built environment. Can we talk about a new ‘urban recipe’: ‘cooking architecture and city’ to deliver an ever changing urban sustainable organism, whose identity will mainly depend on the interrelationship of the immaterial and material constituents?

Keywords: blurring zones, porous borders, spaces of flow, urban recipe

Procedia PDF Downloads 393
434 Exploring the Difficulties of Acceleration Concept from the Perspective of Historical Textual Analysis

Authors: Yun-Ju Chiu, Feng-Yi Chen

Abstract:

Kinematics is the beginning to learn mechanics in physics course. The concept of acceleration plays an important role in learning kinematics. Teachers usually instruct the conception through the formulas and graphs of kinematics and the well-known law F = ma. However, over the past few decades, a lot of researchers reveal numerous students’ difficulties in learning acceleration. One of these difficulties is that students frequently confuse acceleration with velocity and force. Why is the concept of acceleration so difficult to learn? The aim of this study is to understand the conceptual evolution of acceleration through the historical textual analysis. Text analysis and one-to-one interviews with high school students and teachers are used in this study. This study finds the history of science constructed from textbooks is usually quite different from the real evolution of history. For example, most teachers and students believe that the best-known law F = ma was written down by Newton. The expression of the second law is not F = ma in Newton’s best-known book Principia in 1687. Even after more than one hundred years, a famous Cambridge textbook titled An Elementary Treatise on Mechanics by Whewell of Trinity College did not express this law as F = ma. At that time of Whewell, the early mid-nineteenth century Britain, the concept of acceleration was not only ambiguous but also confused with the concept of force. The process of learning the concept of acceleration is analogous to its conceptual development in history. The study from the perspective of historical textual analysis will promote the understanding of the concept learning difficulties, the development of professional physics teaching, and the improvement of the context of physics textbooks.

Keywords: acceleration, textbooks, mechanics, misconception, history of science

Procedia PDF Downloads 230
433 Evaluation of Video Development about Exclusive Breastfeeding as a Nutrition Education Media for Posyandu Cadre

Authors: Ari Istiany, Guspri Devi Artanti, M. Si

Abstract:

Based on the results Riskesdas, it is known that breastfeeding awareness about the importance of exclusive breastfeeding is still low at only 15.3 %. These conditions resulted in a very infant at risk for infectious diseases, such as diarrhea and acute respiratory infection. Therefore, the aim of this study to evaluate the video development about exclusive breastfeeding as a nutrition education media for posyandu cadre. This research used development methods for making the video about exclusive breastfeeding. The study was conducted in urban areas Rawamangun, East Jakarta. Respondents of this study were 1 media experts from the Department of Educational Technology - UNJ, 2 subject matter experts from Department of Home Economics - UNJ and 20 posyandu cadres to assess the quality of the video. Aspects assessed include the legibility of text, image display quality, color composition, clarity of sound, music appropriateness, duration, suitability of the material and language. Data were analyzed descriptively likes frequency distribution table, the average value, and deviation standard. The result of this study showed that the average score assessment according to media experts, subject matter experts, and posyandu cadres respectively was 3.43 ± 0.51 (good), 4.37 ± 0.52 (very good) and 3.6 ± 0.73 (good). The conclusion is on exclusive breastfeeding video as feasible as a media for nutrition education. While suggestions for the improvement of visual media is multiply illustrations, add material about the correct way of breastfeeding and healthy baby pictures.

Keywords: exclusive breastfeeding, posyandu cadre, video, nutrition education

Procedia PDF Downloads 389