Search results for: task messages
2403 The Impact of Task-Based Language Teaching on Iranian Female Intermediate EFL Learners’ Writing Performance
Authors: Gholam Reza Parvizi, Hossein Azad, Ali Reza Kargar
Abstract:
This article investigated the impact of task-based language teaching (TBLT) on writing performance of the Iranian intermediate EFL learners. There were two groups of forty students of the intermediate female learners studying English in Jahad-e-Daneshgahi language institute, ranging in age from thirteen to nineteen. They participated in their regular classes in the institute and were assigned to two groups including an experimental group of task-based language teaching and a control group for the purpose of homogeneity, all students in two groups took an achievement test before the treatment. As a pre-test; students were assigned to write a task at the beginning of the course. One of the classes was conducted through talking a TBLT approach on their writing, while the other class followed regular patterns of teaching, namely traditional approach for TBLT group. There were some tasks chosen from learners’ textbook. The task selection was in accordance with learning standards for ESL and TOFEL writing sections. At the end of the treatment, a post-test was administered to both experimental group and the control group. Scoring was done on the basis of scoring scale of “expository writing quality scale”. The researcher used paired samples t-test to analyze the effect of TBLT teaching approach on the writing performance of the learners. The data analysis revealed that the subjects in TBLT group performed better on the writing performance post-test than the subjects in control group. The findings of the study also demonstrated that TBLT would enhance writing performance in the group of learners. Moreover, it was indicated that TBLT has been effective in teaching writing performance to Iranian EFL learnersKeywords: task-based language teaching, task, language teaching approach, writing proficiency, EFL learners
Procedia PDF Downloads 4232402 On Developing a Core Guideline for English Language Training Programs in Business Settings
Authors: T. Ito, K. Kawaguchi, R. Ohta
Abstract:
The purpose of this study is to provide a guideline to assist globally-minded companies in developing task-based English-language programs for their employees. After conducting an online self-assessment questionnaire comprised of 45 job-related tasks, we analyzed responses received from 3,000 Japanese company employees and developed a checklist that considered three areas: (i) the percentage of those who need to accomplish English-language tasks in their workplace (need for English), (ii) a five-point self-assessment score (task performance level), and (iii) the impact of previous task experience on perceived performance (experience factor). The 45 tasks were graded according to five proficiency levels. Our results helped us to create a core guideline that may assist companies in two ways: first, in helping determine which tasks employees with a certain English proficiency should be able to satisfactorily carry out, and secondly, to quickly prioritize which business-related English skills they would need in future English language programs.Keywords: business settings, can-do statements, English language training programs, self-assessment, task experience
Procedia PDF Downloads 2522401 A Memetic Algorithm Approach to Clustering in Mobile Wireless Sensor Networks
Authors: Masood Ahmad, Ataul Aziz Ikram, Ishtiaq Wahid
Abstract:
Wireless sensor network (WSN) is the interconnection of mobile wireless nodes with limited energy and memory. These networks can be deployed formany critical applications like military operations, rescue management, fire detection and so on. In flat routing structure, every node plays an equal role of sensor and router. The topology may change very frequently due to the mobile nature of nodes in WSNs. The topology maintenance may produce more overhead messages. To avoid topology maintenance overhead messages, an optimized cluster based mobile wireless sensor network using memetic algorithm is proposed in this paper. The nodes in this network are first divided into clusters. The cluster leaders then transmit data to that base station. The network is validated through extensive simulation study. The results show that the proposed technique has superior results compared to existing techniques.Keywords: WSN, routing, cluster based, meme, memetic algorithm
Procedia PDF Downloads 4812400 Immediate Effect of Augmented Feedback on Jumping Performance of the Athletes with Dynamic Knee Valgus
Authors: Mohamadreza Hatefi, Malihe Hadadnezhad
Abstract:
It is well established that jump-landing-related biomechanical deficiencies, such as dynamic knee valgus (DKV), can be improved by using various forms of feedback; However, the effectiveness of these interventions synchronously on athletes' jumping performance remains unknown. Twenty-one recreational athletes with DKV performed countermovement jump (CMJ) and drop vertical jump (DVJ) tasks before and after feedback intervention while the kinematic, force plate and electromyography data of the lower extremity were synchronously captured. The athletes’ jumping performance was calculated by using the reactive strength index-modified (RSIₘₒ𝒹). The athletes at the post-intervention exhibited significantly less hip adduction and more tibial internal rotation during both CMJ and DVJ tasks and maximum knee flexion just during DVJ task. Moreover, athletes exhibited increased time to take-off and consequently decreased RSIₘₒ𝒹 during DVJ task, but no difference was observed in CMJ task. Feedback immediately improved DKV without disturbing the athletes’ jumping height during both tasks, But athletes exhibited increased time to take-off and consequently decreased RSIₘₒ𝒹 only during DVJ task, which suggests that the results may differ according to the nature of jumping task. Nevertheless, the effectiveness of landing-related biomechanical deficiencies improvement on athletes' jumping performance must be investigated in the long-term as a new movement pattern.Keywords: reactive strength index, feedback, biomechanics, dynamic knee valgus
Procedia PDF Downloads 1022399 Exploring the Impacts of Field of View on 3D Game Experiences and Task Performances
Authors: Jiunde Lee, Meng-Yu Wun
Abstract:
The present study attempted to explore how the range differences of ‘Geometric Field of Vision’ (GFOV) and differences in camera control in 3D simulation games, OMSI—The Bus Simulator of the 2013 PC version, affected players’ cognitive load, anxiety, and task performances. The study employed a between-subjects factorial experimental design. A total of 80 subjects completed experiment whose data were eligible for further analysis. The results of this study showed that in the difference of field of view, players had better task performances in a spacious view. Although cognitive resources consumed more of the players’ ‘mental demand,’ ‘physical demand’, and ‘temporal demand’, they had better performances in the experiment, and their anxiety was effectively reduced. On the other hand, in the narrow GFOV, players thought they spent more cognitive resources on ‘effort’ and ‘frustration degree,’ and had worse task performances, but it was not significant enough to reduce their anxiety. In terms of difference of camera control, players had worse performances since the fixed lens restricted their dexterous control. However, there was no significant difference in the players’ subjective cognitive resources or anxiety. The results further illustrated that task performances were affected by the interaction of GFOV and camera control.Keywords: geometric field of view, camera lens, cognitive load, anxiety
Procedia PDF Downloads 1492398 An Empirical Analysis of the Determinants for Adopting Vocera Wireless Communication Systems
Authors: Patrick David Chirilele
Abstract:
There are growing interests in improving service delivery in the healthcare sector through the adoption of emerging digital technologies, including the Vocera B3000n communication system badge. As a result, understanding the factors that impact the adoption of such digital technologies is becoming important. This study investigates the determinants of task-technology fit through the adoption of Vocera B3000n communication system badge in healthcare sector in South Africa. Statistical analyses are performed on the data collected from 143 healthcare workers including registered nurses and personal care workers at three hospitals in South Africa through survey to test the relationship between task characteristics, technology characteristics and user characteristics for better understanding the task-technology fit and the adoption of Vocera communication systems in South African hospitals. The result reveals that all three factors have a significant impact on task-technology fit through the adoption of Vocera B3000n communication system badge. Such findings are useful for healthcare sector in their adoption of digital technologies for improving service delivery through effective communication in their workplace.Keywords: adoption, communication systems, task-technology fit, user characteristics, Vocera
Procedia PDF Downloads 1412397 Exploring Relationship between Attention and Consciousness
Authors: Aarushi Agarwal, Tara Singh, Anju Lata Singh, Trayambak Tiwari, Indramani Lal Singh
Abstract:
The existing interdependent relationship between attention and consciousness has been put to debate since long. To testify the nature, dual-task paradigm has been used to simultaneously manipulate awareness and attention. With central discrimination task which is attentional demanding, participants also perform simple discrimination task in the periphery in near absence of attention. Individual-based analysis of performance accuracy in single and dual condition showed and above chance level performance i.e. more than 80%. In order to widen the understanding of extent of discrimination carried in near absence of attention, natural image and its geometric equivalent shape were presented in the periphery; synthetic objects accounted to lower level of performance than natural objects in dual condition. The gaze plot and heatmap indicate that peripheral performance do not necessarily involve saccade every time, verifying the discrimination in the periphery was in near absence of attention. Thus our studies show an interdependent nature of attention and awareness.Keywords: attention, awareness, dual task paradigm, natural and geometric images
Procedia PDF Downloads 5182396 An Intelligent Thermal-Aware Task Scheduler in Multiprocessor System on a Chip
Authors: Sina Saadati
Abstract:
Multiprocessors Systems-On-Chips (MPSOCs) are used widely on modern computers to execute sophisticated software and applications. These systems include different processors for distinct aims. Most of the proposed task schedulers attempt to improve energy consumption. In some schedulers, the processor's temperature is considered to increase the system's reliability and performance. In this research, we have proposed a new method for thermal-aware task scheduling which is based on an artificial neural network (ANN). This method enables us to consider a variety of factors in the scheduling process. Some factors like ambient temperature, season (which is important for some embedded systems), speed of the processor, computing type of tasks and have a complex relationship with the final temperature of the system. This Issue can be solved using a machine learning algorithm. Another point is that our solution makes the system intelligent So that It can be adaptive. We have also shown that the computational complexity of the proposed method is cheap. As a consequence, It is also suitable for battery-powered systems.Keywords: task scheduling, MOSOC, artificial neural network, machine learning, architecture of computers, artificial intelligence
Procedia PDF Downloads 1032395 The Perils of Flagging Pirates: How Gender, False Consensus and Normative Messages Influence Digital Piracy Intentions
Authors: Kate Whitman, Zahra Murad, Joe Cox, Adam Cox
Abstract:
This study investigates the influence of normative communications on digital piracy intentions. Although descriptive norms are thought to influence behavior, the study examines the potential bias in one's own behavior, leading to false consensus—a phenomenon perpetuating undesirable activities. The research tests the presence of false consensus and the effect of correcting normative predictions on changes in piracy intentions, examining gender differences. Results from a controlled experiment (N = 684) indicate that normative communications, reflecting the "real" norm based on government data (N=5000), increase (decrease) piracy intentions among men (women) underestimating their peers' behavior. Conversely, neither men nor women overestimating their peers' piracy show any notable change in intentions. Considering men consume more illegal content than women, suggesting they pose a higher risk, the study highlights the need for cautious use of normative communications. Therefore, policymakers should minimize the visibility of piracy behavior for effective digital piracy management.Keywords: digital piracy, false consensus, normative interventions, persuasive messages
Procedia PDF Downloads 592394 Overcoming Challenges of Teaching English as a Foreign Language in Technical Classrooms: A Case Study at TVTC College of Technology
Authors: Sreekanth Reddy Ballarapu
Abstract:
The perception of the whole process of teaching and learning is undergoing a drastic and radical change. More and more student-centered, pragmatic, and flexible approaches are gradually replacing teacher-centered lecturing and structural-syllabus instruction. The issue of teaching English as a Foreign language is no exception in this regard. The traditional Present-Practice-Produce (P-P-P) method of teaching English is overtaken by Task-Based Teaching which is a subsidiary branch of Communicative Language Teaching. At this juncture this article strongly tries to convey that - Task-based learning, has an advantage over other traditional methods of teaching. All teachers of English must try to customize their texts into productive tasks, apply them, and evaluate the students as well as themselves. Task Based Learning is a double edged tool which can enhance the performance of both the teacher and the taught. The sample for this case study is a class of 35 students from Semester III - Network branch at TVTC College of Technology, Adhum - Kingdom of Saudi Arabia. The students are high school passed out and aged between 19-21years.For the present study the prescribed textbook Technical English 1 by David Bonamy was used and a number of language tasks were chalked out during the pre- task stage and the learners were made to participate voluntarily and actively. The Action Research methodology was adopted within the dual framework of Communicative Language Teaching and Task-Based Learning. The different tools such as questionnaires, feedback and interviews were used to collect data. This study provides information about various techniques of Communicative Language Teaching and Task Based Learning and focuses primarily on the advantages of using a Task Based Learning approach. This article presents in detail the objectives of the study, the planning and implementation of the action research, the challenges encountered during the execution of the plan, and the pedagogical outcome of this project. These research findings serve two purposes: first, it evaluates the effectiveness of Task Based Learning and, second, it empowers the teacher's professionalism in designing and implementing the tasks. In the end, the possibility of scope for further research is presented in brief.Keywords: action research, communicative language teaching, task based learning, perception
Procedia PDF Downloads 2382393 Streaming Communication Component for Multi-Robots
Authors: George Oliveira, Luana D. Fronza, Luiza Medeiros, Patricia D. M. Plentz
Abstract:
The research presented in this article is part of a wide project that proposes a scheduling system for multi-robots in intelligent warehouses employing multi-robot path-planning (MPP) and multi-robot task allocation (MRTA) to reconcile multiple restrictions (task delivery time, task priorities, charging capacity, and robots battery capacity). We present the software component capable of interconnecting an open streaming processing architecture and robot operating system (ROS), ensuring communication and message exchange between robots and the environment in which they are inserted. Simulation results show the good performance of our proposed technique for connecting ROS and streaming platforms.Keywords: complex distributed systems, mobile robots, smart warehouses, streaming platforms
Procedia PDF Downloads 1932392 Impact of Task Technology Fit on User Effectiveness, Efficiency and Creativity in Iranian Pharmaceutical Oraganizations
Authors: Milad Keshvardoost, Amir Khanlari, Nader Khalesi
Abstract:
Background: Any firm in the pharmaceutical industry requires efficient and effective management information systems (MIS) to support managerial functions. Purpose: The aim of this study is to investigate the impact of Task-Technology Fit on user effectiveness, efficiency, and creativity in Iranian pharmaceutical companies. Methodology: 345 reliable and validate questionnaires were distributed among selected samples, through the cluster method, to Information system users of eight leading Iranian pharmaceutical companies, based on the likert scale. The proposed model of the article is based on a model with Task technology fit, on user performance with the definition of efficiency, effectiveness, and creativity through mediation effects of perceived usefulness and ease of use. Results: This study confirmed that TTF with definitions of adequacy and compatibility has positive impacts on user performance Conclusion: We concluded that pharmaceutical users of IS, utilizing a system with a precise and intense observation of users' demands, may make facilitation for them to design an exclusive IS framework.Keywords: information systems, user performance, pharmaceuticals, task technology fit
Procedia PDF Downloads 1702391 Work demand and Prevalence of Work-Related Musculoskeletal Disorders: A Case Study of Pakistan Aviation Maintenance Workers
Authors: Muzamil Mahmood, Afshan Naseem, Muhammad Zeeshan Mirza, Yasir Ahmad, Masood Raza
Abstract:
The purpose of this research is to analyze how aviation maintenance workers’ characteristics and work demand affect their development of work-related musculoskeletal disorders (WMSDs). Guided by literature on task characteristics, work demand, and WMSDs, data is collected from 128 aviation maintenance workers of private and public airlines. Data is then analyzed through descriptive and inferential statistics. It is found that task characteristics have a significant positive effect on WMSDs and an increase in tasks performed by aviation maintenance workers leads to increase in WMSDs. Work demand did not have a significant effect on WMSDs. The task characteristics of aviation maintenance workers moderates the relationship between their work demand and WMSDs. This reveals that task characteristics of aviation maintenance workers enhance the effect of work demand on WMSDs. The task characteristics of aviation maintenance workers are challenging and unpredictable. Subsequently, WMSDs are prevalent among aviation maintenance workers. The work demand of aviation maintenance workers does not influence their development of WMSDs. Pakistan Civil Aviation Authority should minimize the intensity of tasks assigned to aviation maintenance workers by introducing work dynamisms such as task sharing, job rotation, and probably teleworking to enhance flexibility. Human Resource and Recruitment Department need to consider the ability and fitness levels of potential aviation maintenance workers during recruitment. In addition, regular physical activities and ergonomic policies should be put in place by the management of the Pakistan Civil Aviation Authority to reduce the incidences of WMSDs.Keywords: work related musculoskeletal disorders, ergonomics, occupational health and safety, human factors
Procedia PDF Downloads 1622390 The Role of Meaningful Work in Transformational Leadership and Work Outcomes Relationship
Authors: Zainur Rahman
Abstract:
Meaningful work is the topic that will be discussed in this article, especially in changing period. It has an important role because by reaching meaningful work, it will drive to be positive in the workplace. Therefore, task performance will be increased and cynicism about organizational change (CAOC) will be reduced. Moreover, it is influenced by situational factor, which is transformational leadership. In this conceptual paper, the author discusses how the construct of meaningful work influenced by transformational leadership that will have impact on the follower’ work outcomes in the organizational change. It is proposed that the construct of meaningful work are susceptible with situational variable. Transformational leaders who are respectful on the process of humanizing the followers affect task performance and reduce CAOC in organizational change.Keywords: transformational leadership, meaningful work, task performance, CAOC
Procedia PDF Downloads 3202389 Maintaining User-Level Security in Short Message Service
Authors: T. Arudchelvam, W. W. E. N. Fernando
Abstract:
Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication
Procedia PDF Downloads 3952388 Semantic Processing in Chinese: Category Effects, Task Effects and Age Effects
Authors: Yi-Hsiu Lai
Abstract:
The present study aimed to elucidate the nature of semantic processing in Chinese. Language and cognition related to the issue of aging are examined from the perspective of picture naming and category fluency tasks. Twenty Chinese-speaking adults (ranging from 25 to 45 years old) and twenty Chinese-speaking seniors (ranging from 65 to 75 years old) in Taiwan participated in this study. Each of them individually completed two tasks: a picture naming task and a category fluency task. Instruments for the naming task were sixty black-and-white pictures: thirty-five object and twenty-five action pictures. Category fluency task also consisted of two semantic categories – objects (or nouns) and actions (or verbs). Participants were asked to report as many items within a category as possible in one minute. Scores of action fluency and of object fluency were a summation of correct responses in these two categories. Category effects (actions vs. objects) and age effects were examined in these tasks. Objects were further divided into two major types: living objects and non-living objects. Actions were also categorized into two major types: action verbs and process verbs. Reaction time to each picture/question was additionally calculated and analyzed. Results of the category fluency task indicated that the content of information in Chinese seniors was comparatively deteriorated, thus producing smaller number of semantic-lexical items. Significant group difference was also found in the results of reaction time. Category Effect was significant for both Chinese adults and seniors in the semantic fluency task. Findings in the present study helped characterize the nature of semantic processing in Chinese-speaking adults and seniors and contributed to the issue of language and aging.Keywords: semantic processing, aging, Chinese, category effects
Procedia PDF Downloads 3612387 The Amount of Information Processing and Balance Performance in Children: The Dual-Task Paradigm
Authors: Chin-Chih Chiou, Tai-Yuan Su, Ti-Yu Chen, Wen-Yu Chiu, Chungyu Chen
Abstract:
The purpose of this study was to investigate the effect of reaction time (RT) or balance performance as the number of stimulus-response choices increases, the amount of information processing of 0-bit and 1-bit conditions based on Hick’s law, using the dual-task design. Eighteen children (age: 9.38 ± 0.27 years old) were recruited as the participants for this study, and asked to assess RT and balance performance separately and simultaneously as following five conditions: simple RT (0-bit decision), choice RT (1-bit decision), single balance control, balance control with simple RT, and balance control with choice RT. Biodex 950-300 balance system and You-Shang response timer were used to record and analyze the postural stability and information processing speed (RT) respectively for the participants. Repeated measures one-way ANOVA with HSD post-hoc test and 2 (balance) × 2 (amount of information processing) repeated measures two-way ANOVA were used to test the parameters of balance performance and RT (α = .05). The results showed the overall stability index in the 1-bit decision was lower than in 0-bit decision, and the mean deflection in the 1-bit decision was lower than in single balance performance. Simple RTs were faster than choice RTs both in single task condition and dual task condition. It indicated that the chronometric approach of RT could use to infer the attention requirement of the secondary task. However, this study did not find that the balance performance is interfered for children by the increasing of the amount of information processing.Keywords: capacity theory, reaction time, Hick’s law, balance
Procedia PDF Downloads 4512386 Comparison of Machine Learning and Deep Learning Algorithms for Automatic Classification of 80 Different Pollen Species
Authors: Endrick Barnacin, Jean-Luc Henry, Jimmy Nagau, Jack Molinie
Abstract:
Palynology is a field of interest in many disciplines due to its multiple applications: chronological dating, climatology, allergy treatment, and honey characterization. Unfortunately, the analysis of a pollen slide is a complicated and time consuming task that requires the intervention of experts in the field, which are becoming increasingly rare due to economic and social conditions. That is why the need for automation of this task is urgent. A lot of studies have investigated the subject using different standard image processing descriptors and sometimes hand-crafted ones.In this work, we make a comparative study between classical feature extraction methods (Shape, GLCM, LBP, and others) and Deep Learning (CNN, Autoencoders, Transfer Learning) to perform a recognition task over 80 regional pollen species. It has been found that the use of Transfer Learning seems to be more precise than the other approachesKeywords: pollens identification, features extraction, pollens classification, automated palynology
Procedia PDF Downloads 1362385 A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security
Authors: James Andrew Fitzjohn
Abstract:
This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions.Keywords: quantum computing, encryption, RSA, roadmap, real world
Procedia PDF Downloads 1312384 The Effects of Prosocial and Antisocial Behaviors on Task Cohesion and Burnout: The Role of Affect and Motivational Climate
Authors: Ali Al-Yaaribi, Maria Kavussanu
Abstract:
Prosocial and antisocial behavior occurs in sport. Prosocial behavior is voluntary behavior intended to help or benefit another individual, while antisocial behavior is behavior intended to harm or disadvantage another individual. Previous sport morality research has investigated primarily antecedents of prosocial and antisocial behavior. However, the potential consequences of these behaviors remain unexplored. The aims of this study were to examine whether: (a) perceived prosocial and antisocial teammate behavior predicts task cohesion and burnout; (b) affect mediate these relationships; and (c) motivational climate moderates any of these effects. Participants were male (n = 96) and female (n = 176) teams sport players (Mage = 21.86, SD = 4.36), who completed questionnaires measuring the aforementioned variables. Mediation analysis (Hayes, 2013) indicated that prosocial teammate behavior positively predicted task cohesion and negatively predicted burnout; these effects were mediated by positive affect. Also, mastery climate moderated the positive effect of prosocial teammate behavior on task cohesion: The effect of antisocial teammate behavior on task cohesion was stronger for players who perceived a higher mastery climate created by their coaches. Performance climate moderated the negative effect of prosocial teammate behavior on burnout: This effect was only significant for players who perceived moderate or low levels of performance team climate. Antisocial teammate behavior negatively predicted task cohesion and positively predicted burnout, and these effects were mediated by negative affect. Also, performance climate moderated the positive effect of antisocial teammate behavior on burnout, such that the effect of antisocial teammate behavior on burnout was stronger for players who perceived a lower performance climate. The research findings shed some light on the potential role of prosocial and antisocial teammate behaviors as well as coach-created motivational climate on influencing players’ affect, task cohesion, and burnout. Coaches should focus on creating a mastery motivational climate and rewarding prosocial behavior while at the same time trying to deter antisocial behavior among teammates in order to enhance positive affect, task cohesion, and prevent experience of negative affect and burnout.Keywords: mediation, moderation, morality, teams sport
Procedia PDF Downloads 3552383 Processing Big Data: An Approach Using Feature Selection
Authors: Nikat Parveen, M. Ananthi
Abstract:
Big data is one of the emerging technology, which collects the data from various sensors and those data will be used in many fields. Data retrieval is one of the major issue where there is a need to extract the exact data as per the need. In this paper, large amount of data set is processed by using the feature selection. Feature selection helps to choose the data which are actually needed to process and execute the task. The key value is the one which helps to point out exact data available in the storage space. Here the available data is streamed and R-Center is proposed to achieve this task.Keywords: big data, key value, feature selection, retrieval, performance
Procedia PDF Downloads 3412382 Packet Fragmentation Caused by Encryption and Using It as a Security Method
Authors: Said Rabah Azzam, Andrew Graham
Abstract:
Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch.Keywords: fragmentation, encryption, security, switch
Procedia PDF Downloads 3332381 Determining the Number of Words Required to Fulfil the Writing Task in an English Proficiency Exam with the Raters’ Scores
Authors: Defne Akinci Midas
Abstract:
The aim of this study was to determine the minimum, and maximum number of words that would be sufficient to fulfill the writing task in the local English Proficiency Exam (EPE) produced and administered at the Middle East Technical University, Ankara, Turkey. The relationship between the number of words and the scores of the written products that had been awarded by two raters in three online EPEs administered in 2020 was examined. The means, standard deviations, percentages, range, minimum and maximum scores as well as correlations of the scores awarded to written products with the words that amount to 0-50, 51-100, 101-150, 151-200, 201-250, 251-300, and so on were computed. The results showed that the raters did not award a full score to texts that had fewer than 100 words. Moreover, the texts that had around 200 words were awarded the highest scores. The highest number of words that earned the highest scores was about 225, and from then onwards, the scores were either stable or lower. A positive low to moderate correlation was found between the number of words and scores awarded to the texts. We understand that the idea of ‘the longer, the better’ did not apply here. The results also showed that words between 101 to about 225 were sufficient to fulfill the writing task to fully display writing skills and language ability in the specific case of this exam.Keywords: English proficiency exam, number of words, scoring, writing task
Procedia PDF Downloads 1752380 The Relationship between Life Event Stress, Depressive Thoughts, and Working Memory Capacity
Authors: Eid Abo Hamza, Ahmed Helal
Abstract:
Purpose: The objective is to measure the capacity of the working memory, ie. the maximum number of elements that can be retrieved and processed, by measuring the basic functions of working memory (inhibition/transfer/update), and also to investigate its relationship to life stress and depressive thoughts. Methods: The study sample consisted of 50 students from Egypt. A cognitive task was designed to measure the working memory capacity based on the determinants found in previous research, which showed that cognitive tasks are the best measurements of the functions and capacity of working memory. Results: The results indicated that there were statistically significant differences in the level of life stress events (high/low) on the task of measuring the working memory capacity. The results also showed that there were no statistically significant differences between males and females or between academic major on the task of measuring the working memory capacity. Furthermore, the results reported that there was no statistically significant effect of the interaction of the level of life stress (high/low) and gender (male/female) on the task of measuring working memory capacity. Finally, the results showed that there were significant differences in the level of depressive thoughts (high/low) on the task of measuring working memory. Conclusions: The current research concludes that neither the interaction of stressful life events, gender, and academic major, nor the interaction of depressive thoughts, gender, and academic major, influence on working memory capacity.Keywords: working memory, depression, stress, life event
Procedia PDF Downloads 1602379 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks
Authors: Naveed Ghani, Samreen Javed
Abstract:
In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.Keywords: network worms, malware infection propagating malicious code, virus, security, VPN
Procedia PDF Downloads 3582378 Communication About Health and Fitness in Media and Its Hidden Message About Objectification
Authors: Emiko Suzuki
Abstract:
Although fitness is defined as the body’s ability to respond to the demand of physical activity without undue fatigue in health science, in media oftentimes physical activity is presented as means to an attractive body rather than a fit and healthy one. Of all types of media, Instagram is becoming an increasingly persuasive source of information and advice on health and fitness, where individuals conceptualize what health and fitness mean for them. However, this user-generated and unregulated platform can be problematic, as it can communicate misleading information about health and fitness and possibly leading individuals to psychological problems such as eating disorders. In fact, previous research has shown that some messages that were posted with a tag that related to inspire others to do fitness, in fact, encouraged distancing the self from the internal needs of the body. For this reason, this present study aims to explore how health and fitness are communicated on Instagram by analyzing images and texts. A content analysis of images that were labeled with particular hashtags was performed, followed by a thematic analysis of texts from the same set of images. The result shows an interesting insight about messages about how health and fitness are communicated from companies through media, then digested and further shared among communities on Instagram. The study explores how the use of visual focused way of communicating health and fitness can lead to the dehumanization of human bodies.Keywords: Instagram, fitness, dehumanization, body image, embodiment
Procedia PDF Downloads 1382377 Multishape Task Scheduling Algorithms for Real Time Micro-Controller Based Application
Authors: Ankur Jain, W. Wilfred Godfrey
Abstract:
Embedded systems are usually microcontroller-based systems that represent a class of reliable and dependable dedicated computer systems designed for specific purposes. Micro-controllers are used in most electronic devices in an endless variety of ways. Some micro-controller-based embedded systems are required to respond to external events in the shortest possible time and such systems are known as real-time embedded systems. So in multitasking system there is a need of task Scheduling,there are various scheduling algorithms like Fixed priority Scheduling(FPS),Earliest deadline first(EDF), Rate Monotonic(RM), Deadline Monotonic(DM),etc have been researched. In this Report various conventional algorithms have been reviewed and analyzed, these algorithms consists of single shape task, A new Multishape scheduling algorithms has been proposed and implemented and analyzed.Keywords: dm, edf, embedded systems, fixed priority, microcontroller, rtos, rm, scheduling algorithms
Procedia PDF Downloads 4032376 Authentic Leadership, Task Performance, and Organizational Citizenship Behavior
Authors: C. V. Chen, Y. H. Jeng, S. J. Wang
Abstract:
Leadership is essential to enhancing followers’ psychological empowerment and has an effect on their willingness to take on extra-role behavior and aim for greater performance. Authentic leadership is confirmed to promote employees’ positive affect, psychological empowerment, well-being, and performance. Employees’ spontaneous undertaking of organizationally desired behaviors allows organizations’ gaining the edge in the fiercely competitive business environment. Apart from the contextual factor of leadership, individuals’ goal orientation is found to be highly related to his/her performance. To better understand the psychological process and potential moderation of personal goal orientation, this study investigates the effect of authentic leadership on employees’ task performance and organizational citizenship behavior by including psychological empowerment as the mediating factor and goal orientation as the moderating factor.Keywords: authentic leadership, task performance, organizational citizenship behavior, goal orientation
Procedia PDF Downloads 7912375 Analysis of Newspaper Advertisements of 2015 Presidential Election in Nigeria
Authors: Thanny Noeem Taiwo
Abstract:
The study is an attempt to gauge the way political parties advertised their candidates and parties during the 2015 presidential election. It examined the prominence given to political advertisement by newspapers and their patrons. It also looked at the campaign issues that the candidates emphasized in their campaign and also the appeals used in the advertisements. This research work is examined against the backdrop of the Framing Theory. The agenda setting and framing effects theories are media effects theories that explain how the media affects the people, events and situations in the society. Samples comprising of three daily newspapers were selected to represent the newspapers in the Nigeria. The Punch Newspaper, the Nation and the Vanguard will be used for population of this study. These newspapers were chosen because they are widely read national dailies and also because of its affiliation with some political parties. The study revealed that low prominence was given to political messages because most of the advertisements were in the inside pages of the newspapers. The media or the print medium could be a partner in a political setting as the fourth estate of the realm. While the press was trying hard to be professional, its operations were considerably inhibited by the political adventures of the patrons of the media. There is the need for strict professionalism to the ethics of journalism in the commercialization of political messages that would eventually rub off positively on the way the media is perceived.Keywords: aAdvertisement, election, framing, newspaper
Procedia PDF Downloads 3262374 Training AI to Be Empathetic and Determining the Psychotype of a Person During a Conversation with a Chatbot
Authors: Aliya Grig, Konstantin Sokolov, Igor Shatalin
Abstract:
The report describes the methodology for collecting data and building an ML model for determining the personality psychotype using profiling and personality traits methods based on several short messages of a user communicating on an arbitrary topic with a chitchat bot. In the course of the experiments, the minimum amount of text was revealed to confidently determine aspects of personality. Model accuracy - 85%. Users' language of communication is English. AI for a personalized communication with a user based on his mood, personality, and current emotional state. Features investigated during the research: personalized communication; providing empathy; adaptation to a user; predictive analytics. In the report, we describe the processes that captures both structured and unstructured data pertaining to a user in large quantities and diverse forms. This data is then effectively processed through ML tools to construct a knowledge graph and draw inferences regarding users of text messages in a comprehensive manner. Specifically, the system analyzes users' behavioral patterns and predicts future scenarios based on this analysis. As a result of the experiments, we provide for further research on training AI models to be empathetic, creating personalized communication for a userKeywords: AI, empathetic, chatbot, AI models
Procedia PDF Downloads 92