Search results for: aspect-level opinion mining
600 Investigating of the Fuel Consumption in Construction Machinery and Ways to Reduce Fuel Consumption
Authors: Reza Bahboodian
Abstract:
One of the most important factors in the use of construction machinery is the fuel consumption cost of this equipment. The use of diesel engines in off-road vehicles is an important source of nitrogen oxides and particulate matter. Emissions of nitrogen oxides and particulate matter 10 in off-road vehicles (construction and mining) may be high. Due to the high cost of fuel, it is necessary to minimize fuel consumption. Factors affecting the fuel consumption of these cars are very diverse. Climate changes such as changes in pressure, temperature, humidity, fuel type selection, type of gearbox used in the car are effective in fuel consumption and pollution, and engine efficiency. In this paper, methods for reducing fuel consumption and pollutants by considering valid European and European standards are examined based on new methods such as hybridization, optimal gear change, adding hydrogen to diesel fuel, determining optimal working fluids, and using oxidation catalysts.Keywords: improve fuel consumption, construction machinery, pollutant reduction, determining the optimal working cycle
Procedia PDF Downloads 161599 Belt Conveyor Dynamics in Transient Operation for Speed Control
Authors: D. He, Y. Pang, G. Lodewijks
Abstract:
Belt conveyors play an important role in continuous dry bulk material transport, especially at the mining industry. Speed control is expected to reduce the energy consumption of belt conveyors. Transient operation is the operation of increasing or decreasing conveyor speed for speed control. According to literature review, current research rarely takes the conveyor dynamics in transient operation into account. However, in belt conveyor speed control, the conveyor dynamic behaviors are significantly important since the poor dynamics might result in risks. In this paper, the potential risks in transient operation will be analyzed. An existing finite element model will be applied to build a conveyor model, and simulations will be carried out to analyze the conveyor dynamics. In order to realize the soft speed regulation, Harrison’s sinusoid acceleration profile will be applied, and Lodewijks estimator will be built to approximate the required acceleration time. A long inclined belt conveyor will be studied with two major simulations. The conveyor dynamics will be given.Keywords: belt conveyor , speed control, transient operation, dynamics
Procedia PDF Downloads 331598 Intelligent Software Architecture and Automatic Re-Architecting Based on Machine Learning
Authors: Gebremeskel Hagos Gebremedhin, Feng Chong, Heyan Huang
Abstract:
Software system is the combination of architecture and organized components to accomplish a specific function or set of functions. A good software architecture facilitates application system development, promotes achievement of functional requirements, and supports system reconfiguration. We describe three studies demonstrating the utility of our architecture in the subdomain of mobile office robots and identify software engineering principles embodied in the architecture. The main aim of this paper is to analyze prove architecture design and automatic re-architecting using machine learning. Intelligence software architecture and automatic re-architecting process is reorganizing in to more suitable one of the software organizational structure system using the user access dataset for creating relationship among the components of the system. The 3-step approach of data mining was used to analyze effective recovery, transformation and implantation with the use of clustering algorithm. Therefore, automatic re-architecting without changing the source code is possible to solve the software complexity problem and system software reuse.Keywords: intelligence, software architecture, re-architecting, software reuse, High level design
Procedia PDF Downloads 119597 Circular Bio-economy of Copper and Gold from Electronic Wastes
Authors: Sadia Ilyas, Hyunjung Kim, Rajiv R. Srivastava
Abstract:
Current work has attempted to establish the linkages between circular bio-economy and recycling of copper and gold from urban mine by applying microbial activities instead of the smelter and chemical technologies. Thereafter, based on the potential of microbial approaches and research hypothesis, the structural model has been tested for a significance level of 99%, which is supported by the corresponding standardization co-efficient values. A prediction model applied to determine the recycling impact on circular bio-economy indicates to re-circulate 51,833 tons of copper and 58 tons of gold by 2030 for the production of virgin metals/raw-materials, while recycling rate of the accumulated e-waste remains to be 20%. This restoration volume of copper and gold through the microbial activities corresponds to mitigate 174 million kg CO₂ emissions and 24 million m³ water consumption if compared with the primary production activities. The study potentially opens a new window for environmentally-friendly biotechnological recycling of e-waste urban mine under the umbrella concept of circular bio-economy.Keywords: urban mining, biobleaching, circular bio-economy, environmental impact
Procedia PDF Downloads 157596 An Analysis of the Panel’s Perceptions on Cooking in “Metaverse Kitchen”
Authors: Minsun Kim
Abstract:
This study uses the concepts of augmented reality, virtual reality, mirror world, and lifelogging to describe “Metaverse Kitchen” that can be defined as a space in the virtual world where users can cook the dishes they want using the meal kit regardless of location or time. This study examined expert’s perceptions of cooking and food delivery services using "Metaverse Kitchen." In this study, a consensus opinion on the concept, potential pros, and cons of "Metaverse Kitchen" was derived from 20 culinary experts through the Delphi technique. The three Delphi rounds were conducted for one month, from December 2022 to January 2023. The results are as follows. First, users select and cook food after visiting the "Metaverse Kitchen" in the virtual space. Second, when a user cooks in "Metaverse Kitchen" in AR or VR, the information is transmitted to nearby restaurants. Third, the platform operating the "Metaverse Kitchen" assigns the order to the restaurant that can provide the meal kit cooked by the user in the virtual space first in the same way among these restaurants. Fourth, the user pays for the "Metaverse Kitchen", and the restaurant delivers the cooked meal kit to the user and then receives payment for the user's meal and delivery fee from the platform. Fifth, the platform company that operates the mirror world "Metaverse Kitchen" uses lifelogging to manage customers. They receive commissions from users and affiliated restaurants and operate virtual restaurant businesses using meal kits. Among the selection attributes for meal kits provided in "Metaverse Kitchen", the panelists suggested convenience, quality, and reliability as advantages and predicted relatively high price as a disadvantage. "Metaverse Kitchen" using meal kits is expected to form a new food supply system in the future society. In follow-up studies, an empirical analysis is required targeting producers and consumers.Keywords: metaverse, meal kits, Delphi technique, Metaverse Kitchen
Procedia PDF Downloads 221595 Improving the Ability of Constructed Wetlands to Treat Acid Mine Drainage
Authors: Chigbo Emmanuel Ikechukwu
Abstract:
Constructed wetlands are seen as a potential means of ameliorating the poor quality water that derives from coal and gold mining operations. However, the processes whereby a wetland environment is able to improve water quality are not well understood and techniques for optimising their performance poorly developed. A parameter that may be manipulated in order to improve the treatment capacity of a wetland is the substrate in which the aquatic plants are rooted. This substrate can provide an environment wherein sulphate reducing bacteria, which contribute to the removal of contaminants from the water, are able to flourish. The bacteria require an energy source which is largely provided by carbon in the substrate. This paper discusses the form in which carbon is most suitable for the bacteria and describes the results of a series of experiments in which different materials were used as substrate. Synthetic acid mine drainage was passed through an anaerobic bioreactor that contained either compost or cow manure. The effluent water quality was monitored with respect to time and the effect of the substrate composition discussed.Keywords: constructed wetland, bacteria, carbon, acid mine drainage, sulphate
Procedia PDF Downloads 441594 Response of Subfossile Diatoms, Cladocera, and Chironomidae in Sediments of Small Ponds to Changes in Wastewater Discharges from a Zn–Pb Mine
Authors: Ewa Szarek-Gwiazda, Agata Z. Wojtal, Agnieszka Pociecha, Andrzej Kownacki, Dariusz Ciszewski
Abstract:
Mining of metal ores is one of the largest sources of heavy metals, which deteriorate aquatic systems. The response of organisms to environmental changes can be well recorded in sediments of the affected water bodies and may be reconstructed based on analyses of organisms' remains. The present study aimed at the response of diatoms (Bacillariophyta), Cladocera, and Chironomidae communities to the impact of Zn-Pb mine water discharge recorded in sediment cores of small subsidence ponds on the Chechło River floodplain (Silesia–Krakow Region, southern Poland). We hypothesize various responses of the above groups to high metal concentrations (Cd, Pb, Zn, and Cu). The investigated ponds were formed either during the peak of the ore exploitation (DOWN) or after mining cessation (UP). Currently, the concentrations of dissolved metals (in µg g⁻¹) in water reached up to 0.53 for Cd, 7.3 for Pb, and up to 47.1 for Zn. All the sediment cores from subsidence ponds were heavily polluted with Cd 6.7–612 μg g⁻¹, Pb 0.1–10.2 mg g⁻¹, and Zn 0.5–23.1 mg g⁻¹. Core sediments varied also in respect to pH 5.8-7.1 and concentrations of organic matter (5.7-39.8%). The impact of high metal concentrations was expressed by the occurrence of metal-tolerant taxa like diatoms – Nitzschia amphibia, Sellaphora nigri, and Surirella brebisonii var. kuetzingii; Cladocera – Chydorus sphaericus (dominated in cores from all ponds), and Chironomidae – Chironomus and Cricotopus especially in the DOWN ponds. Statistical analysis exhibited a negative impact of metals on some taxa of diatoms and Cladocera but only on Polypedilum sp. from Chironomidae. The abundance of such diatoms like Gomphonema utae, Staurosirella pinnata, Eunotia bilunaris, and Cladocera like Alona, Chydorus, Graptoleberis, and Pleuroxus decreased with increasing Pb concentration. However, the occurrence or dominance of more sensitive species of diatoms and Cladocera indicates their adaptation to higher metal loads, which was facilitated by neutral pH and slightly alkaline waters. Diatom assemblages were generally resistant to Zn, Pb, Cu, and Cd pollution, as indicated by their large similarity to populations from non-contaminated waters. Comparison with reference objects clearly indicates the dominance of Achnanthidium minutissimum, Staurosira venter, and Fragilaria gracilis in very diverse assemblages of unpolluted waters. The distribution of the Cladocera and Chironomidae taxa depended on the habitat type. The DOWN ponds with stagnant water and overgrown with macrophytes were more suitable for cladocerans (14 taxa, higher diversity) than the UP ponds with river water flowing through their centre and with a small share of macrophytes (8 taxa). The Chironominae, mainly Chironomus and Microspectra, were abundant in cores from the UP ponds with muddy bottoms. Inversely, the density of Orthocladiinae, especially genus Cricotopus, was related to the organic matter content and dominated in cores from the DOWN ponds. The presence of diatoms like Nitzschia amphibia, Sellaphora nigri, and Surirella brebisonii var. kuetzingii, cladocerans: Bosmina longirostris, Chydorus sphaericus, Alona affinis, and A. rectangularis as well as Chironomidae Chironomus sp. (UP ponds) and Psecrotanypus varius (DOWN ponds) indicate the influence of the water trophy on their distribution.Keywords: Chironomidae, Cladocera, diatoms, metals, Zn-Pb mine, sediment cores, subsidence ponds
Procedia PDF Downloads 77593 Unsupervised Text Mining Approach to Early Warning System
Authors: Ichihan Tai, Bill Olson, Paul Blessner
Abstract:
Traditional early warning systems that alarm against crisis are generally based on structured or numerical data; therefore, a system that can make predictions based on unstructured textual data, an uncorrelated data source, is a great complement to the traditional early warning systems. The Chicago Board Options Exchange (CBOE) Volatility Index (VIX), commonly referred to as the fear index, measures the cost of insurance against market crash, and spikes in the event of crisis. In this study, news data is consumed for prediction of whether there will be a market-wide crisis by predicting the movement of the fear index, and the historical references to similar events are presented in an unsupervised manner. Topic modeling-based prediction and representation are made based on daily news data between 1990 and 2015 from The Wall Street Journal against VIX index data from CBOE.Keywords: early warning system, knowledge management, market prediction, topic modeling.
Procedia PDF Downloads 338592 Cross-Knowledge Graph Relation Completion for Non-Isomorphic Cross-Lingual Entity Alignment
Authors: Yuhong Zhang, Dan Lu, Chenyang Bu, Peipei Li, Kui Yu, Xindong Wu
Abstract:
The Cross-Lingual Entity Alignment (CLEA) task aims to find the aligned entities that refer to the same identity from two knowledge graphs (KGs) in different languages. It is an effective way to enhance the performance of data mining for KGs with scarce resources. In real-world applications, the neighborhood structures of the same entities in different KGs tend to be non-isomorphic, which makes the representation of entities contain diverse semantic information and then poses a great challenge for CLEA. In this paper, we try to address this challenge from two perspectives. On the one hand, the cross-KG relation completion rules are designed with the alignment constraint of entities and relations to improve the topology isomorphism of two KGs. On the other hand, a representation method combining isomorphic weights is designed to include more isomorphic semantics for counterpart entities, which will benefit the CLEA. Experiments show that our model can improve the isomorphism of two KGs and the alignment performance, especially for two non-isomorphic KGs.Keywords: knowledge graphs, cross-lingual entity alignment, non-isomorphic, relation completion
Procedia PDF Downloads 124591 FCNN-MR: A Parallel Instance Selection Method Based on Fast Condensed Nearest Neighbor Rule
Authors: Lu Si, Jie Yu, Shasha Li, Jun Ma, Lei Luo, Qingbo Wu, Yongqi Ma, Zhengji Liu
Abstract:
Instance selection (IS) technique is used to reduce the data size to improve the performance of data mining methods. Recently, to process very large data set, several proposed methods divide the training set into some disjoint subsets and apply IS algorithms independently to each subset. In this paper, we analyze the limitation of these methods and give our viewpoint about how to divide and conquer in IS procedure. Then, based on fast condensed nearest neighbor (FCNN) rule, we propose a large data sets instance selection method with MapReduce framework. Besides ensuring the prediction accuracy and reduction rate, it has two desirable properties: First, it reduces the work load in the aggregation node; Second and most important, it produces the same result with the sequential version, which other parallel methods cannot achieve. We evaluate the performance of FCNN-MR on one small data set and two large data sets. The experimental results show that it is effective and practical.Keywords: instance selection, data reduction, MapReduce, kNN
Procedia PDF Downloads 253590 Transport Medium That Prevents the Conversion of Helicobacter Pylori to the Coccoid Form
Authors: Eldar Mammadov, Konul Mammadova, Aytaj Ilyaszada
Abstract:
Background: According to many studies, it is known that H. pylori transform into the coccoid form, which cannot be cultured and has poor metabolic activity.In this study, we succeeded in preserving the spiral shape of H.pylori for a long time by preparing a biphase transport medium with a hard bottom (Muller Hinton with 7% HRBC (horse red blood cells) agar 5ml) and liquid top part (BH (brain heart) broth + HS (horse serum)+7% HRBC+antibiotics (Vancomycin 5 mg, Trimethoprim lactate 25 mg, Polymyxin B 1250 I.U.)) in cell culture flasks with filter caps. For comparison, we also used a BH broth medium with 7% HRBC used for the transport of H.pylori. Methods: Rapid urease test positive 7 biopsy specimens were also inoculated into biphasic and BH broth medium with 7% HRBC, then put in CO2 Gaspak packages and sent to the laboratory. Then both mediums were kept in the thermostat at 37 °C for 1 day. After microscopic, PCR and urease test diagnosis, they were transferred to Columbia Agar with 7% HRBC. Incubated at 37°C for 5-7 days, cultures were examined for colony characteristics and bacterial morphology. E-test antimicrobial susceptibility test was performed. Results: There were 3 growths from biphasic transport medium passed to Columbia agar with 7% HRBC and only 1 growth from BH broth medium with 7% HRBC. It was also observed that after the first 3 days in BH broth medium with 7%, H.pylori passed into coccoid form and its biochemical activity weakened, while its spiral shape did not change for 2-3 weeks in the biphase transport medium. Conclusions: By using the biphase transport medium we have prepared; we can culture the bacterium by preventing H.pylori from spiraling into the coccoid form. In our opinion, this may result in the wide use of culture method for diagnosis of H.pylori, study of antibiotic susceptibility and molecular genetic analysis.Keywords: clinical trial, H.pylori, coccoid form, transport medium
Procedia PDF Downloads 73589 Development of Innovative Islamic Web Applications
Authors: Farrukh Shahzad
Abstract:
The rich Islamic resources related to religious text, Islamic sciences, and history are widely available in print and in electronic format online. However, most of these works are only available in Arabic language. In this research, an attempt is made to utilize these resources to create interactive web applications in Arabic, English and other languages. The system utilizes the Pattern Recognition, Knowledge Management, Data Mining, Information Retrieval and Management, Indexing, storage and data-analysis techniques to parse, store, convert and manage the information from authentic Arabic resources. These interactive web Apps provide smart multi-lingual search, tree based search, on-demand information matching and linking. In this paper, we provide details of application architecture, design, implementation and technologies employed. We also presented the summary of web applications already developed. We have also included some screen shots from the corresponding web sites. These web applications provide an Innovative On-line Learning Systems (eLearning and computer based education).Keywords: Islamic resources, Muslim scholars, hadith, narrators, history, fiqh
Procedia PDF Downloads 283588 Knowledge Management Efficiency of Personnel in Rajamangala University of Technology Srivijaya Songkhla, Thailand
Authors: Nongyao Intasaso, Atchara Rattanama, Navarat Pewnual
Abstract:
This research is survey research purposed to study the factor affected to knowledge management efficiency of personnel in Rajamangala University of Technology Srivijaya, and study the problem of knowledge management affected to knowledge development of personnel in the university. The tool used in this study is structures questioner standardize rating scale in 5 levels. The sample selected by purposive sampling and there are 137 participation calculated in 25% of population. The result found that factor affected to knowledge management efficiency in the university included (1) result from the organization factor found that the university provided project or activity that according to strategy and mission of knowledge management affected to knowledge management efficiency in highest level (x̅ = 4.30) (2) result from personnel factor found that the personnel are eager for knowledge and active to learning to develop themselves and work (Personal Mastery) affected to knowledge management efficiency in high level (x̅ = 3.75) (3) result from technological factor found that the organization brought multimedia learning aid to facilitate learning process affected to knowledge management efficiency in high level (x̅ = 3.70) and (4) the result from learning factor found that the personnel communicated and sharing knowledge and opinion based on acceptance to each other affected to knowledge management efficiency in high level (x̅ = 3.78). The problem of knowledge management in the university included the personnel do not change their work behavior, insufficient of collaboration, lack of acceptance in knowledge and experience to each other, and limited budget. The solutions to solve these problems are the university should be support sufficient budget, the university should follow up and evaluate organization development based on knowledge using, the university should provide the activity emphasize to personnel development and assign the committee to process and report knowledge management procedure.Keywords: knowledge management, efficiency, personnel, learning process
Procedia PDF Downloads 301587 The Ideology of the Jordanian Media Women’s Discourse: Lana Mamkgh as an Example
Authors: Amani Hassan Abu Atieh
Abstract:
This study aims at examining the patterns of ideology reflected in the written discourse of women writers in the media of Jordan; Lana Mamkgh is taken as an example. This study critically analyzes the discursive, linguistic, and cognitive representations that she employs as an agent in the institutionalized discourse of the media. Grounded in van Dijk’s critical discourse analysis approach to Sociocognitive Discourse Studies, the present study builds a multilayer framework that encompasses van Dijk’s triangle: discourse, society, and cognition. Specifically, the study attempts to analyze, at both micro and macro levels, the underlying cognitive processes and structures, mainly ideology and discursive strategies, which are functional in the production of women’s discourse in terms of meaning, forms, and functions. Cognitive processes that social actors adopt are underlined by experience/context and semantic mental models on the one hand and social cognition on the other. This study is based on qualitative research and adopts purposive sampling, taking as an example a sample of an opinion article written by Lana Mamkgh in the Arabic Jordanian Daily, Al Rai. Taking her role as an agent in the public sphere, she stresses the National and feminist ideologies, demonstrating the use of assertive, evaluative, and expressive linguistic and rhetorical devices that appeal to the logic, ethics, and emotions of the addressee. Highlighting the agency of Jordanian writers in the media, the study sought to achieve the macro goal of dispensing political and social justice to the underprivileged. Further, the study seeks to prove that the voice of Jordanian women, viewed as underrepresented and invisible in the public arena, has come through clearly.Keywords: critical discourse analysis, sociocognitive theory, ideology, women discourse, media
Procedia PDF Downloads 108586 Consumer Preferences towards Sorbets: A Questionnaire Study
Authors: Kinga Topolska, Agnieszka Filipiak-Florkiewicz, Adam Florkiewicz, Daria Chechelska, Iwona Cieślik, Ewa Cieślik
Abstract:
Food choice is a complex human behaviour, that is influenced by many interrelating factors. It is important to understand what consumers really want to eat. Nowadays, the growing popularity of frozen desserts is observed. Among them, sorbets are of the special interest. They are made primarily of fruit juice or fruit purée, water and sugar. A questionnaire study was done to evaluate the consumer preferences towards sorbets. A hundred respondents were included in the study. The respondents answered the questions concerning, inter alia, on the favourite taste of sorbets, additional ingredients (pieces of fruits, nuts etc.), the reason for choosing the product and also the opinion about potential purchasing or not the new product. Women, more frequently than men, indicated strawberry sorbet or the product on the basis of citrus fruits as a favourite one. In turn, 14% of men chose the apple taste. Pieces of chocolate were chosen by most of respondents. Men, more often than women, regarded raisins, alcohol and nuts as the most desirable additional ingredients of sorbets. The candied fruits and spices were indicated more frequently by women. Most of respondents indicated the taste as the major reason for sorbet buying. In turn, for 20% women the most important determinant was the care for their figure. It was observed that more than a half of women regarded sorbets as healthier than traditional ice creams. Answering the question: 'If you had the opportunity to try a new sorbet, containing the ingredient with proven healthy properties, would you buy it?', significantly more men than women answered 'yes, because I like novelty'. Meanwhile, for 14% respondents (independently of gender) it would be only a publicity stunt. Knowing what the consumers desire in selecting a product, is a very important information to design and offer them a new one. Sorbets could be an interesting alternative to ice creams.Keywords: consumer, preferences, sorbets, questionnaire study
Procedia PDF Downloads 286585 Social and Digital Transformation of the Saudi Education System: A Cyberconflict Analysis
Authors: Mai Alshareef
Abstract:
The Saudi government considers the modernisation of the education system as a critical component of the national development plan, Saudi Vision 2030; however, this sudden reform creates tension amongst Saudis. This study examines first the reflection of the social and digital education reform on stakeholders and the general Saudi public, and second, the influence of information and communication technologies (ICTs) on the ethnoreligious conflict in Saudi Arabia. This study employs Cyberconflict theory to examine conflicts in the real world and cyberspace. The findings are based on a qualitative case study methodology that uses netnography, an analysis of 3,750 Twitter posts and semi-structural interviews with 30 individuals, including key actors in the Saudi education sector and Twitter activists during 2019\2020. The methods utilised are guided by thematic analysis to map an understanding of factors that influence societal conflicts in Saudi Arabia, which in this case include religious, national, and gender identity. Elements of Cyberconflict theory are used to better understand how conflicting groups build their identities in connection to their ethnic/religious/cultural differences and competing national identities. The findings correspond to the ethnoreligious components of the Cyberconflict theory. Twitter became a battleground for liberals, conservatives, the Saudi public and elites, and it is used in a novel way to influence public opinion and to challenge the media monopoly. Opposing groups relied heavily on a discourse of exclusion and inclusion and showed ethnic and religious affiliations, national identity, and chauvinism. The findings add to existing knowledge in the cyberconflict field of study, and they also reveal outcomes that are critical to the Saudi Arabian national context.Keywords: education, cyberconflict, Twitter, national identity
Procedia PDF Downloads 174584 Semi-Automatic Method to Assist Expert for Association Rules Validation
Authors: Amdouni Hamida, Gammoudi Mohamed Mohsen
Abstract:
In order to help the expert to validate association rules extracted from data, some quality measures are proposed in the literature. We distinguish two categories: objective and subjective measures. The first one depends on a fixed threshold and on data quality from which the rules are extracted. The second one consists on providing to the expert some tools in the objective to explore and visualize rules during the evaluation step. However, the number of extracted rules to validate remains high. Thus, the manually mining rules task is very hard. To solve this problem, we propose, in this paper, a semi-automatic method to assist the expert during the association rule's validation. Our method uses rule-based classification as follow: (i) We transform association rules into classification rules (classifiers), (ii) We use the generated classifiers for data classification. (iii) We visualize association rules with their quality classification to give an idea to the expert and to assist him during validation process.Keywords: association rules, rule-based classification, classification quality, validation
Procedia PDF Downloads 439583 Practical Ways to Acquire the Arabic Language through Electronic Means
Authors: Hondozi Jahja
Abstract:
There is an obvious need to learn Arabic language and teach it to other speakers through the new curricula. The idea is to bridge the gap between theory and practice. To that end, we have sought to offer some means of help to master the Arabic language, in addition to our efforts to apply these means, enriching the culture of the student and develop his vocabulary. There is no doubt that taking care of the practical aspect of the grammar was our constant goal, and this particular aspect is what builds the student’s positive values and refine his taste and develop his language. In addressing these issues, we have adopted a school-based approach based primarily on the active and positive participation of the student. The theoretical linguistic issues - in our opinion - are not a primary goal, but the goal is to be used them by students through speaking and applying them. Among the objectives of this research is to establish the basic language skills of the students using new means that help the student to acquire these skills and apply them in various subjects of interest in his progress and development. Unfortunately, some of our students consider the grammar as ‘difficult’, ‘complex’ and ‘heavy’ in itself. This is one of the obstacles that stand in the way of their desired results. As a consequence, they end up talking – mumbling - about the difficulties they face in applying those rules. Therefore, some of our students finish their university studies and are unable to express what they feel using language correctly. For this purpose, we have sought in this research to follow a new integrated approach, which is to study the grammar of the language through modern means of the consolidation of the principle of functional language, and that the rule implies to control tongues and linguistic expressions properly. This research is a result of a practical experience as a teacher of Arabic language for non-native speakers at the ‘Hassan Pristina’ University, located in Pristina, the capital of Kosovo and at the Qatar Training Center since its establishment in 2012.Keywords: arabic, applied methods, acquire, learning
Procedia PDF Downloads 158582 Development of Terrorist Threat Prediction Model in Indonesia by Using Bayesian Network
Authors: Hilya Mudrika Arini, Nur Aini Masruroh, Budi Hartono
Abstract:
There are more than 20 terrorist threats from 2002 to 2012 in Indonesia. Despite of this fact, preventive solution through studies in the field of national security in Indonesia has not been conducted comprehensively. This study aims to provide a preventive solution by developing prediction model of the terrorist threat in Indonesia by using Bayesian network. There are eight stages to build the model, started from literature review, build and verify Bayesian belief network to what-if scenario. In order to build the model, four experts from different perspectives are utilized. This study finds several significant findings. First, news and the readiness of terrorist group are the most influent factor. Second, according to several scenarios of the news portion, it can be concluded that the higher positive news proportion, the higher probability of terrorist threat will occur. Therefore, the preventive solution to reduce the terrorist threat in Indonesia based on the model is by keeping the positive news portion to a maximum of 38%.Keywords: Bayesian network, decision analysis, national security system, text mining
Procedia PDF Downloads 392581 Detection of the Effectiveness of Training Courses and Their Limitations Using CIPP Model (Case Study: Isfahan Oil Refinery)
Authors: Neda Zamani
Abstract:
The present study aimed to investigate the effectiveness of training courses and their limitations using the CIPP model. The investigations were done on Isfahan Refinery as a case study. From a purpose point of view, the present paper is included among applied research and from a data gathering point of view, it is included among descriptive research of the field type survey. The population of the study included participants in training courses, their supervisors and experts of the training department. Probability-proportional-to-size (PPS) was used as the sampling method. The sample size for participants in training courses included 195 individuals, 30 supervisors and 11 individuals from the training experts’ group. To collect data, a questionnaire designed by the researcher and a semi-structured interview was used. The content validity of the data was confirmed by training management experts and the reliability was calculated through 0.92 Cronbach’s alpha. To analyze the data in descriptive statistics aspect (tables, frequency, frequency percentage and mean) were applied, and inferential statistics (Mann Whitney and Wilcoxon tests, Kruskal-Wallis test to determine the significance of the opinion of the groups) have been applied. Results of the study indicated that all groups, i.e., participants, supervisors and training experts, absolutely believe in the importance of training courses; however, participants in training courses regard content, teacher, atmosphere and facilities, training process, managing process and product as to be in a relatively appropriate level. The supervisors also regard output to be at a relatively appropriate level, but training experts regard content, teacher and managing processes as to be in an appropriate and higher than average level.Keywords: training courses, limitations of training effectiveness, CIPP model, Isfahan oil refinery company
Procedia PDF Downloads 75580 A Comparative Analysis of (De)legitimation Strategies in Selected African Inaugural Speeches
Authors: Lily Chimuanya, Ehioghae Esther
Abstract:
Language, a versatile and sophisticated tool, is fundamentally sacrosanct to mankind especially within the realm of politics. In this dynamic world, political leaders adroitly use language to engage in a strategic show aimed at manipulating or mechanising the opinion of discerning people. This nuanced synergy is marked by different rhetorical strategies, meticulously synced with contextual factors ranging from cultural, ideological, and political to achieve multifaceted persuasive objectives. This study investigates the (de)legitimation strategies inherent in African presidential inaugural speeches, as African leaders not only state their policy agenda through inaugural speeches but also subtly indulge in a dance of legitimation and delegitimation, performing a twofold objective of strengthening the credibility of their administration and, at times, undermining the performance of the past administration. Drawing insights from two different legitimation models and a dataset of 4 African presidential inaugural speeches obtained from authentic websites, the study describes the roles of authorisation, rationalisation, moral evaluation, altruism, and mythopoesis in unmasking the structure of political discourse. The analysis takes a mixed-method approach to unpack the (de)legitimation strategy embedded in the carefully chosen speeches. The focus extends beyond a superficial exploration and delves into the linguistic elements that form the basis of presidential discourse. In conclusion, this examination goes beyond the nuanced landscape of language as a potent tool in politics, with each strategy contributing to the overall rhetorical impact and shaping the narrative. From this perspective, the study argues that presidential inaugural speeches are not only linguistic exercises but also viable weapons that influence perceptions and legitimise authority.Keywords: CDA, legitimation, inaugural speeches, delegitmation
Procedia PDF Downloads 69579 Questioning the Relationship Between Young People and Fake News Through Their Use of Social Media
Authors: Marion Billard
Abstract:
This paper will focus on the question of the real relationship between young people and fake news. Fake news is one of today’s main issues in the world of information and communication. Social media and its democratization helped to spread false information. According to traditional beliefs, young people are more inclined to believe what they read through social media. But, the individuals concerned, think that they are more inclined to make a distinction between real and fake news. This phenomenon is due to their use of the internet and social media from an early age. During the 2016 and 2017 French and American presidential campaigns, the term fake news was in the mouth of the entire world and became a real issue in the field of information. While young people were informing themselves with newspapers or television until the beginning of the ’90s, Gen Z (meaning people born between 1997 and 2010), has always been immersed in this world of fast communication. They know how to use social media from a young age and the internet has no secret for them. Today, despite the sporadic use of traditional media, young people tend to turn to their smartphones and social networks such as Instagram or Twitter to stay abreast of the latest news. The growth of social media information led to an “ambient journalism”, giving access to an endless quantity of information. Waking up in the morning, young people will see little posts with short texts supplying the essential of the news, without, for the most, many details. As a result, impressionable people are not able to do a distinction between real media, and “junk news” or Fake News. This massive use of social media is probably explained by the inability of the youngsters to find connections between the communication of the traditional media and what they are living. The question arises if this over-confidence of the young people in their ability to distinguish between accurate and fake news would not make it more difficult for them to examine critically the information. Their relationship with media and fake news is more complex than popular opinion. Today’s young people are not the master in the quest for information, nor inherently the most impressionable public on social media.Keywords: fake news, youngsters, social media, information, generation
Procedia PDF Downloads 161578 Identification of Risks Associated with Process Automation Systems
Authors: J. K. Visser, H. T. Malan
Abstract:
A need exists to identify the sources of risks associated with the process automation systems within petrochemical companies or similar energy related industries. These companies use many different process automation technologies in its value chain. A crucial part of the process automation system is the information technology component featuring in the supervisory control layer. The ever-changing technology within the process automation layers and the rate at which it advances pose a risk to safe and predictable automation system performance. The age of the automation equipment also provides challenges to the operations and maintenance managers of the plant due to obsolescence and unavailability of spare parts. The main objective of this research was to determine the risk sources associated with the equipment that is part of the process automation systems. A secondary objective was to establish whether technology managers and technicians were aware of the risks and share the same viewpoint on the importance of the risks associated with automation systems. A conceptual model for risk sources of automation systems was formulated from models and frameworks in literature. This model comprised six categories of risk which forms the basis for identifying specific risks. This model was used to develop a questionnaire that was sent to 172 instrument technicians and technology managers in the company to obtain primary data. 75 completed and useful responses were received. These responses were analyzed statistically to determine the highest risk sources and to determine whether there was difference in opinion between technology managers and technicians. The most important risks that were revealed in this study are: 1) the lack of skilled technicians, 2) integration capability of third-party system software, 3) reliability of the process automation hardware, 4) excessive costs pertaining to performing maintenance and migrations on process automation systems, and 5) requirements of having third-party communication interfacing compatibility as well as real-time communication networks.Keywords: distributed control system, identification of risks, information technology, process automation system
Procedia PDF Downloads 139577 Frequent-Pattern Tree Algorithm Application to S&P and Equity Indexes
Authors: E. Younsi, H. Andriamboavonjy, A. David, S. Dokou, B. Lemrabet
Abstract:
Software and time optimization are very important factors in financial markets, which are competitive fields, and emergence of new computer tools further stresses the challenge. In this context, any improvement of technical indicators which generate a buy or sell signal is a major issue. Thus, many tools have been created to make them more effective. This worry about efficiency has been leading in present paper to seek best (and most innovative) way giving largest improvement in these indicators. The approach consists in attaching a signature to frequent market configurations by application of frequent patterns extraction method which is here most appropriate to optimize investment strategies. The goal of proposed trading algorithm is to find most accurate signatures using back testing procedure applied to technical indicators for improving their performance. The problem is then to determine the signatures which, combined with an indicator, outperform this indicator alone. To do this, the FP-Tree algorithm has been preferred, as it appears to be the most efficient algorithm to perform this task.Keywords: quantitative analysis, back-testing, computational models, apriori algorithm, pattern recognition, data mining, FP-tree
Procedia PDF Downloads 361576 Modeling the Present Economic and Social Alienation of Working Class in South Africa in the Musical Production ‘from Marikana to Mahagonny’ at Durban University of Technology (DUT)
Authors: Pamela Tancsik
Abstract:
The stage production in 2018, titled ‘From‘Marikana to Mahagonny’, began with a prologue in the form of the award-winning documentary ‘Miners Shot Down' by Rehad Desai, followed by Brecht/Weill’s song play or scenic cantata ‘Mahagonny’, premièred in Baden-Baden 1927. The central directorial concept of the DUT musical production ‘From Marikana to Mahagonny’ was to show a connection between the socio-political alienation of mineworkers in present-day South Africa and Brecht’s alienation effect in his scenic cantata ‘Mahagonny’. Marikana is a mining town about 50 km west of South Africa’s capital Pretoria. Mahagonny is a fantasy name for a utopian mining town in the United States. The characters, setting, and lyrics refer to America with of songs like ‘Benares’ and ‘Moon of Alabama’ and the use of typical American inventions such as dollars, saloons, and the telephone. The six singing characters in ‘Mahagonny’ all have typical American names: Charlie, Billy, Bobby, Jimmy, and the two girls they meet later are called Jessie and Bessie. The four men set off to seek Mahagonny. For them, it is the ultimate dream destination promising the fulfilment of all their desires, such as girls, alcohol, and dollars – in short, materialistic goals. Instead of finding a paradise, they experience how money and the practice of exploitive capitalism, and the lack of any moral and humanity is destroying their lives. In the end, Mahagonny gets demolished by a hurricane, an event which happened in 1926 in the United States. ‘God’ in person arrives disillusioned and bitter, complaining about violent and immoral mankind. In the end, he sends them all to hell. Charlie, Billy, Bobby, and Jimmy reply that this punishment does not mean anything to them because they have already been in hell for a long time – hell on earth is a reality, so the threat of hell after life is meaningless. Human life was also taken during the stand-off between striking mineworkers and the South African police on 16 August 2012. Miners from the Lonmin Platinum Mine went on an illegal strike, equipped with bush knives and spears. They were striking because their living conditions had never improved; they still lived in muddy shacks with no running water and electricity. Wages were as low as R4,000 (South African Rands), equivalent to just over 200 Euro per month. By August 2012, the negotiations between Lonmin management and the mineworkers’ unions, asking for a minimum wage of R12,500 per month, had failed. Police were sent in by the Government, and when the miners did not withdraw, the police shot at them. 34 were killed, some by bullets in their backs while running away and trying to hide behind rocks. In the musical play ‘From Marikana to Mahagonny’ audiences in South Africa are confronted with a documentary about Marikana, followed by Brecht/Weill’s scenic cantata, highlighting the tragic parallels between the Mahagonny story and characters from 1927 America and the Lonmin workers today in South Africa, showing that in 95 years, capitalism has not changed.Keywords: alienation, brecht/Weill, mahagonny, marikana/South Africa, musical theatre
Procedia PDF Downloads 97575 The Use of Piezocone Penetration Test Data for the Assessment of Iron Ore Tailings Liquefaction Susceptibility
Authors: Breno M. Castilho
Abstract:
The Iron Ore Quadrangle, located in the state of Minas Gerais, Brazil is responsible for most of the country’s iron ore production. As a result, some of the biggest tailings dams in the country are located in this area. In recent years, several major failure events have happened in Tailings Storage Facilities (TSF) located in the Iron Ore Quadrangle. Some of these failures were found to be caused by liquefaction flowslides. This paper presents Piezocone Penetration Test (CPTu) data that was used, by applying Olson and Peterson methods, for the liquefaction susceptibility assessment of the iron ore tailings that are typically found in most TSF in the area. Piezocone data was also used to determine the steady-state strength of the tailings so as to allow for comparison with its drained strength. Results have shown great susceptibility for liquefaction to occur in the studied tailings and, more importantly, a large reduction in its strength. These results are key to understanding the failures that took place over the last few years.Keywords: Piezocone Penetration Test CPTu, iron ore tailings, mining, liquefaction susceptibility assessment
Procedia PDF Downloads 233574 Semantic Textual Similarity on Contracts: Exploring Multiple Negative Ranking Losses for Sentence Transformers
Authors: Yogendra Sisodia
Abstract:
Researchers are becoming more interested in extracting useful information from legal documents thanks to the development of large-scale language models in natural language processing (NLP), and deep learning has accelerated the creation of powerful text mining models. Legal fields like contracts benefit greatly from semantic text search since it makes it quick and easy to find related clauses. After collecting sentence embeddings, it is relatively simple to locate sentences with a comparable meaning throughout the entire legal corpus. The author of this research investigated two pre-trained language models for this task: MiniLM and Roberta, and further fine-tuned them on Legal Contracts. The author used Multiple Negative Ranking Loss for the creation of sentence transformers. The fine-tuned language models and sentence transformers showed promising results.Keywords: legal contracts, multiple negative ranking loss, natural language inference, sentence transformers, semantic textual similarity
Procedia PDF Downloads 108573 The Economic Geology of Ijero Ekiti, South Western Nigeria: A Need for Sustainable Mining for a Responsible Socio-Economic Growth and Development
Authors: Olagunju John Olusesan-Remi
Abstract:
The study area Ijero-Ekiti falls within the Ilesha-Ekiti Schist belt, originating from the long year of the Pan-Africa orogenic events and various cataclysmic tectonic activities in history. Ijero-Ekiti is situated within latitude 7 degree 45N and 7 Degree 55N. Ijero Ekiti is bordered between the Dahomean Basin and the southern Bida/Benue basin on the Geological map of Nigeria. This research work centers on majorly on investigating the chemical composition and as well as the mineralogical distribution of the various mineral-bearing rocks that composed the study area. This work is essentially carried out with a view to assessing and at the same time ascertaining the economic potentials and or the industrial significance of the area to Ekiti-south western region and the Nigeria nation as a whole. The mineralogical distribution pattern is of particular interest to us in this study. In this regard essential focus is put on the mostly the economic gemstones distributions within the various mineral bearing rocks in the zone, some of which includes the tourmaline formation, cassiterite deposit, tin-ore, tantalum columbite, smoky quartz, amethyst, polychrome and emerald variety beryl among others as they occurred within the older granite of the Precambrian rocks. To this end, samples of the major rock types were taken from various locations within the study area for detail scientific analysis as follows: The Igemo pegmatite of Ijero west, the epidiorite of Idaho, the biotitic hornblende gneiss of Ikoro-Ijero north and the beryl crystalline rock types to mention a few. The slides of the each rock from the aforementioned zones were later prepared and viewed under a cross Nichol petro graphic microscope with a particular focus on the light reflection ability of the constituent minerals in each rock samples. The results from the physical analysis viewed from the colour had it that the pegmatite samples ranges from pure milky white to fairly pinkish coloration. Other physical properties investigated include the streak, luster, form, specific gravity, cleavage/fracture pattern etc. The optical examination carried out centers on the refractive indices and pleochroism of the minerals present while the chemical analysis reveals from the tourmaline samples a differing correlation coefficient of the various oxides in each samples collected through which the mineral presence was established. In conclusion, it was inferred that the various minerals outlined above were in reasonable quantity within the Ijero area. With the above discoveries, therefore, we strongly recommend a detailed scientific investigation to be carried out such that will lead to a comprehensive mining of the area. Above all, it is our conclusion that a comprehensive mineralogical exploitation of this area will not only boost the socio-economic potential of the area but at the same time will go a long way contributing immensely to the socio-economic growth and development of the Nation-Nigeria at large.Keywords: Ijero Ekiti, Southwestern Nigeria, economic minerals, pegmatite of the pan African origin, cataclastic tectonic activities, Ilesha Schistbelt, precambrian formations
Procedia PDF Downloads 258572 Informed Decision-Making in Classrooms among High School Students regarding Nuclear Power Use in India
Authors: Dinesh N. Kurup, Celine Perriera
Abstract:
The economic development of any country is based on the policies adopted by the government from time to time. If these policies are framed by the opinion of the people of the country, there is need for having strong knowledge base, right from the school level. There should be emphasis to provide in education, an ability to take informed decisions regarding socio-scientific issues. It would be better to adopt this practice in high school classrooms to build capacity among future citizens. This study is an attempt to provide a different approach of teaching and learning in classrooms at the high school level in Indian schools for providing opportunity for informed decision making regarding nuclear power use. A unit of work based on the 5E instructional model about the use of nuclear energy is used to build knowledge base and find out the effectiveness in terms of its influence for taking decisions as a future citizen. A sample of 120 students from three high schools using different curricula and teaching and learning methods were chosen for this study. This research used a design based research method. A pre and post questionnaire based on the theory of reasoned action, structured observations, focus group interviews and opportunity for decision making were used during the intervention. The data analysed qualitatively and quantitatively, and the qualitative data were coded into categories based on responses. The results of the study show that students were able to make informed decisions and could give reasons for their decisions. They were enthusiastic in formulating policy making based on their knowledge base and have strong held views and reasoning for their choice.Keywords: informed decision making, socio-scientific issues, nuclear energy use, policy making
Procedia PDF Downloads 302571 Cinematic Liberty vs. Offending Social, Religious Beliefs: With Special Reference to the Controversial Contents in Cinema and Print Media
Authors: Govind Ji Pandey
Abstract:
The divergent opinions in the society are important for its development but with reasonable restrictions. The world recently witnessed one of the most violent protests by a group against the editor and publisher of the magazine ‘Charlie Hebdo’ for publishing cartoon of their religious leader. The supporter of freedom of speech and expression around the world were in shock and termed it the strongest attack against the free speech. People all around the world condemned the killing of the journalists but many soft voices from several corners were also coming for reasonable restrictions on the freedom of speech and expression. Of late, Indian society has witnessed many protests and supports of films with controversial content. It is the beauty of the Indian democracy which gives an opportunity to all for discussion and debate on any issue that challenges established social norms. However, many organizations as well as individuals misuse it for their personal benefits. There have been many film directors who faced protest from several quarters for their controversial themes. This research aims at analyzing the controversial contents published in print media and shown in films. To understand the nature and frequency of such media reports, content analysis technique is used. The research also highlights the perception of the public regarding the controversies. For getting the popular opinion on the coverage of controversial content in cinema and print media, five hundred people from Lucknow, UP, India were randomly selected. The findings of this research are important to understand the response of media and society towards the controversial content presented in cinema and print media. The research highlights that how a handful of people curb free speech in a democratic country like India.Keywords: cinema, censor board, free speech, liberty, social-religious beliefs
Procedia PDF Downloads 264