Search results for: popular romance narratives
695 Study of Growth Patterns of the Built-Up Area in Tourism Destinations in Relation to Sustainable Development
Authors: Tagore Sai Priya Nunna, Ankhi Banerjee
Abstract:
The rapid growth of the tourism industry in India in the last few years after the economic crisis in 2009 has been one of the significant causes that led to the Land Use Land Cover change (LULC) of most tourism destinations. The tourist regions are subjected to significant increase in built-up due to increased construction activities for developing accommodation facilities further boosting tourism demand. This research attempts to analyse the changing LULC and the growth pattern of the built-up area within tourist destinations. Four popular tourist destinations, which promises various types of tourism activity and which are significantly dependent on tourism for economic growth, are selected for the study. The study uses remotely sensed data for analysis of land use change through supervised segmentation into five broad classes. Further, the landuse map is reclassified into binary classes to extract the built-up area. The growth patterns of the built-up are analysed in terms of size, shape, direction and form of growth, through a set of spatial metrics. Additionally, a detailed analysis of the existing development pattern corresponding to planned development zones was performed to identify unplanned growth spots in the study regions. The findings of the study provide insights into how tourism has contributed to significant changes in LULC around tourist sites. Also, the study highlights the growth pattern of built-up areas with respect to the type of tourism activity and geographical characteristics. The research attempts to address the need of integrating spatial metrics for the development of sustainable tourism plans as part of the goals of sustainable development.Keywords: built-up, growth, patterns, tourism, sustainable
Procedia PDF Downloads 114694 Time Series Simulation by Conditional Generative Adversarial Net
Authors: Rao Fu, Jie Chen, Shutian Zeng, Yiping Zhuang, Agus Sudjianto
Abstract:
Generative Adversarial Net (GAN) has proved to be a powerful machine learning tool in image data analysis and generation. In this paper, we propose to use Conditional Generative Adversarial Net (CGAN) to learn and simulate time series data. The conditions include both categorical and continuous variables with different auxiliary information. Our simulation studies show that CGAN has the capability to learn different types of normal and heavy-tailed distributions, as well as dependent structures of different time series. It also has the capability to generate conditional predictive distributions consistent with training data distributions. We also provide an in-depth discussion on the rationale behind GAN and the neural networks as hierarchical splines to establish a clear connection with existing statistical methods of distribution generation. In practice, CGAN has a wide range of applications in market risk and counterparty risk analysis: it can be applied to learn historical data and generate scenarios for the calculation of Value-at-Risk (VaR) and Expected Shortfall (ES), and it can also predict the movement of the market risk factors. We present a real data analysis including a backtesting to demonstrate that CGAN can outperform Historical Simulation (HS), a popular method in market risk analysis to calculate VaR. CGAN can also be applied in economic time series modeling and forecasting. In this regard, we have included an example of hypothetical shock analysis for economic models and the generation of potential CCAR scenarios by CGAN at the end of the paper.Keywords: conditional generative adversarial net, market and credit risk management, neural network, time series
Procedia PDF Downloads 143693 Optimization Parameters Using Response Surface Method on Biomechanical Analysis for Malaysian Soccer Players
Authors: M. F. M. Ali, A. R. Ismail, B. M. Deros
Abstract:
Soccer is very popular and ranked as the top sports in the world as well as in Malaysia. Although soccer sport in Malaysia is currently professionalized, but it’s plunging achievements within recent years continue and are not to be proud of. After review, the Malaysian soccer players are still weak in terms of kicking techniques. The instep kick is a technique, which is often used in soccer for the purpose of short passes and making a scoring. This study presents the 3D biomechanics analysis on a soccer player during performing instep kick. This study was conducted to determine the optimization value for approach angle, distance of supporting leg from the ball and ball internal pressure respect to the knee angular velocity of the ball on the kicking leg. Six subjects from different categories using dominant right leg and free from any injury were selected to take part in this study. Subjects were asked to perform one step instep kick according to the setting for the variables with different parameter. Data analysis was performed using 3 Dimensional “Qualisys Track Manager” system and will focused on the bottom of the body from the waist to the ankle. For this purpose, the marker will be attached to the bottom of the body before the kicking is perform by the subjects. Statistical analysis was conducted by using Minitab software using Response Surface Method through Box-Behnken design. The results of this study found the optimization values for all three parameters, namely the approach angle, 53.6º, distance of supporting leg from the ball, 8.84sm and ball internal pressure, 0.9bar with knee angular velocity, 779.27 degrees/sec have been produced.Keywords: biomechanics, instep kick, soccer, optimization
Procedia PDF Downloads 230692 Migration and Mobility of South African Teachers: A Case Study
Authors: Rian de Villiers
Abstract:
Human mobility is one of the most significant development, foreign policy and domestic issues in the world today. Teacher loss due to migration is a global phenomenon that is impacting both developed and developing nations the world over. The purpose of this study was to find out how many newly qualified South African teachers were planning to teach in a foreign country; what were the prospective migrant teachers’ motives for migration; what destination countries were the most popular and why; and what were the prospective migrant teachers’ information needs before leaving South Africa. A group of final-year Bachelor of Education student teachers from a single university responded to a questionnaire on intra-and intercontinental migration. The responses were analysed quantitatively and/or qualitatively. The findings showed that 79% of the students indicated that they would be teaching in South Africa, 9% were planning to teach in another country, while 8% were undecided. More than a third of the students (38%) said that they would like to teach in another country in five years time. Just more than a quarter of the students (27%) preferred Australia as a destination, followed by the United Kingdom (16%), Korea (16%) and the USA (14%). The student teachers’ most important motive to teach in a foreign country was the opportunity to travel (27%), followed by earning a higher salary (26%) and professional development (23%). The student teachers indicated that their most important migration needs before leaving South Africa were information about health care, accommodation and banking assistance. Huge loss of teachers to host countries has a serious, negative impact upon the education system of most developing and/or source countries, including South Africa. Several steps and strategies to resolve teacher loss in South Africa are discussed.Keywords: migration, academic mobility, teachers, teacher students, South Africa
Procedia PDF Downloads 472691 A Discourse Analysis of Menopause for Thai Women
Authors: Prapaipan Phingchim
Abstract:
The number of women approaching menopausal age in Thailand is increasing, making menopause an important health topic. In order to understand Thai women's different ways of interpreting menopausal experiences and the way they construct meaning relating to menopause, it is necessary to include the context in which meaning is constructed as well as the background of cultural attitudes to menopause existing in the Thai society. The aim of this study was to describe different discourses on menopause in Thailand that present themselves to menopausal women through the use of language and to analyze linguistic strategies used to represent such identity. This study adopts discourse theory and a close pragmatic analysis to examine the discursive construction of menopause for Thai women. Two hundreds and fifteen pieces of text under the heading or subject of `menopause' or `becoming a middle-aged woman', published from 2010 to 2019, were included. All material was addressed to Thai women, and consisted of booklets and informational material, articles from newspapers and magazines and popular science books. Five different discourses on menopause were identified: the biomedical discourse; the health-promotion discourse; the consumer discourse; the alternative discourse; and the feminist/ critical discourse. The biomedical discourse on menopause was found to be dominant, but was expanded or challenged by other discourses by offering different scopes of action and/or resting on different fundamental values. The discourses constructed and positioned individual women differently; thus, the women's position varied noticeably from one discourse to another. There are seven major linguistic strategies used to construct those identities. That is, lexical selection, presupposition manipulation, presupposition denial, the use of implication, the use of passive construction, using the cause and effect sentence structure, and rhetoric questions.Keywords: discourse analysis, discursive construction, menopause, Thai women
Procedia PDF Downloads 145690 A Survey of WhatsApp as a Tool for Instructor-Learner Dialogue, Learner-Content Dialogue, and Learner-Learner Dialogue
Authors: Ebrahim Panah, Muhammad Yasir Babar
Abstract:
Thanks to the development of online technology and social networks, people are able to communicate as well as learn. WhatsApp is a popular social network which is growingly gaining popularity. This app can be used for communication as well as education. It can be used for instructor-learner, learner-learner, and learner-content interactions; however, very little knowledge is available on these potentials of WhatsApp. The current study was undertaken to investigate university students’ perceptions of WhatsApp used as a tool for instructor-learner dialogue, learner-content dialogue, and learner-learner dialogue. The study adopted a survey approach and distributed the questionnaire developed by Google Forms to 54 (11 males and 43 females) university students. The obtained data were analyzed using SPSS version 20. The result of data analysis indicates that students have positive attitudes towards WhatsApp as a tool for Instructor-Learner Dialogue: it easy to reach the lecturer (4.07), the instructor gives me valuable feedback on my assignment (4.02), the instructor is supportive during course discussion and offers continuous support with the class (4.00). Learner-Content Dialogue: WhatsApp allows me to academically engage with lecturers anytime, anywhere (4.00), it helps to send graphics such as pictures or charts directly to the students (3.98), it also provides out of class, extra learning materials and homework (3.96), and Learner-Learner Dialogue: WhatsApp is a good tool for sharing knowledge with others (4.09), WhatsApp allows me to academically engage with peers anytime, anywhere (4.07), and we can interact with others through the use of group discussion (4.02). It was also found that there are significant positive correlations between students’ perceptions of Instructor-Learner Dialogue (ILD), Learner-Content Dialogue (LCD), Learner-Learner Dialogue (LLD) and WhatsApp Application in classroom. The findings of the study have implications for lectures, policy makers and curriculum developers.Keywords: instructor-learner dialogue, learners-contents dialogue, learner-learner dialogue, whatsapp application
Procedia PDF Downloads 158689 Investigating the Effectiveness of a 3D Printed Composite Mold
Authors: Peng Hao Wang, Garam Kim, Ronald Sterkenburg
Abstract:
In composite manufacturing, the fabrication of tooling and tooling maintenance contributes to a large portion of the total cost. However, as the applications of composite materials continue to increase, there is also a growing demand for more tooling. The demand for more tooling places heavy emphasis on the industry’s ability to fabricate high quality tools while maintaining the tool’s cost effectiveness. One of the popular techniques of tool fabrication currently being developed utilizes additive manufacturing technology known as 3D printing. The popularity of 3D printing is due to 3D printing’s ability to maintain low material waste, low cost, and quick fabrication time. In this study, a team of Purdue University School of Aviation and Transportation Technology (SATT) faculty and students investigated the effectiveness of a 3D printed composite mold. A steel valve cover from an aircraft reciprocating engine was modeled utilizing 3D scanning and computer-aided design (CAD) to create a 3D printed composite mold. The mold was used to fabricate carbon fiber versions of the aircraft reciprocating engine valve cover. The carbon fiber valve covers were evaluated for dimensional accuracy and quality while the 3D printed composite mold was evaluated for durability and dimensional stability. The data collected from this study provided valuable information in the understanding of 3D printed composite molds, potential improvements for the molds, and considerations for future tooling design.Keywords: additive manufacturing, carbon fiber, composite tooling, molds
Procedia PDF Downloads 114688 Reasons for Adhesion of Membership: A Case Study of Brazilian Soccer Team
Authors: Alexandre Olkoski, Marcelo Curth
Abstract:
Football in Brazil is considered a passion, being the most popular sport in the country, both by the consumer public and by the means of communication that divulge it individually, when compared with other sports modalities. In the last two decades, the soccer teams have given greater importance to the management, since they understood that the same should be managed as a company, but with peculiarities related to the business. In this sense, Brazilian soccer clubs started to make bigger investments for the adhesion of fans in their social frames, allowing a greater need of understanding about the profile of this group of fans/clients. Thus, this work aims to understand the reasons that cause the fans to join the club and identify variables present in the process of intention to join the club. For that, a qualitative exploratory research was conducted, in which thirty-one membership of a soccer club from southern Brazil were interviewed. Based on the interviews, five categories were classified as emotional aspects (passion and love), cognitive aspects (easy access to the stadium and promotional values in tickets), external influences (family and friends), situational aspects (club moment) and aspects related to the event (engagement by modality). As results found in the analysis, it can be highlighted that the motivation of the majority of the respondents to become a member of the analyzed club, is related to the emotional aspects, such as passion and love. Thus, it is perceived that sport, in the case of soccer, generates in the involved ones (fans and leaders) different manifestations, suggesting that the management of this type of business has great complexity and should not be observed only by the spectrum of the club like a business.Keywords: consumer behavior, marketing, membership, soccer
Procedia PDF Downloads 333687 Keeping Education Non-Confessional While Teaching Children about Religion
Authors: Tünde Puskás, Anita Andersson
Abstract:
This study is part of a research project about whether religion is considered as part of Swedish cultural heritage in Swedish preschools. Our aim in this paper is to explore how a Swedish preschool balance between keeping the education non-confessional and at the same time teaching children about a particular tradition, Easter.The paper explores how in a Swedish preschool with a religious profile teachers balance between keeping education non-confessional and teaching about a tradition with religious roots. The point of departure for the theoretical frame of our study is that practical considerations in pedagogical situations are inherently dilemmatic. The dilemmas that are of interest for our study evolve around formalized, intellectual ideologies, such us multiculturalism and secularism that have an impact on everyday practice. Educational dilemmas may also arise in the intersections of the formalized ideology of non-confessionalism, prescribed in policy documents and the common sense understandings of what is included in what is understood as Swedish cultural heritage. In this paper, religion is treated as a human worldview that, similarly to secular ideologies, can be understood as a system of thought. We make use of Ninian Smart's theoretical framework according to which in modern Western world religious and secular ideologies, as human worldviews, can be studied from the same analytical framework. In order to be able to study the distinctive character of human worldviews Smart introduced a multi-dimensional model within which the different dimensions interact with each other in various ways and to different degrees. The data for this paper is drawn from fieldwork carried out in 2015-2016 in the form of video ethnography. The empirical material chosen consists of a video recording of a specific activity during which the preschool group took part in an Easter play performed in the local church. The analysis shows that the policy of non-confessionalism together with the idea that teaching covering religious issues must be purely informational leads in everyday practice to dilemmas about what is considered religious. At the same time what the adults actually do with religion fulfills six of seven dimensions common to religious traditions as outlined by Smart. What we can also conclude from the analysis is that whether it is religion or a cultural tradition that is thought through the performance the children watched in the church depends on how the concept of religion is defined. The analysis shows that the characters of the performance themselves understood religion as the doctrine of Jesus' resurrection from the dead. This narrow understanding of religion enabled them indirectly to teach about the traditions and narratives surrounding Easter while avoiding teaching religion as a belief system.Keywords: non-confessional education, preschool, religion, tradition
Procedia PDF Downloads 159686 Behavioral Response of Dogs to Interior Environment: An Exploratory Study on Design Parameters for Designing Dog Boarding Centers in Indian Context
Authors: M. R. Akshaya, Veena Rao
Abstract:
Pet population in India is increasing phenomenally owing to the changes in urban lifestyle with increasing number of single professionals, single parents, delayed parenthood etc. The animal companionship as a means of reducing stress levels, deriving emotional support, and unconditional love provided by dogs are a few reasons attributed for increasing pet ownership. The consequence is the booming of the pet care products and dog care centers catering to the different requirements of rearing the pets. Dog care centers quite popular in tier 1 metros of India cater to the requirement of the dog owners providing space for the dogs in absence of the owner. However, it is often reported that the absence of the owner leads to destructive and exploratory behavior issues; the main being the anxiety disorders. In the above context, it becomes imperative for a designer to design dog boarding centers that help in reducing the separation anxiety in dogs keeping in mind the different interior design parameters. An exploratory research with focus group discussion is employed involving a group of dog owners, behaviorists, proprietors of day care as well as boarding centers, and veterinarians to understand their perception on the significance of different interior parameters of color, texture, ventilation, aroma therapy and acoustics as a means of reducing the stress levels in dogs sent to the boarding centers. The data collected is organized as thematic networks thus enabling the listing of the interior design parameters that needs to be considered in designing dog boarding centers.Keywords: behavioral response, design parameters, dog boarding centers, interior environment
Procedia PDF Downloads 204685 Criminal Law Instruments to Counter Corporate Crimes in Poland
Authors: Dorota Habrat
Abstract:
In Polish law, the idea of the introduction of corporate responsibility for crimes is becoming more popular and creates a lot of questions. The need to introduce into the Polish legal system liability of corporate (collective entities) has resulted, among others, from the Polish Republic's international commitments, in particular related to membership in the European Union. The Act of 28 October 2002 on the liability of collective entities for acts prohibited under penalty is one of the example of adaptation of Polish law to Community law. Introduction to Polish law a criminal nature liability of corporations (legal persons) has resulted in a lot of controversy and lack of acceptance from both the scientific community as well as the judiciary. The responsibility of collective entities under the Act has a criminal nature. The main question concerns the ability of the collective entity to be brought to guilt under criminal law sense. Polish criminal law knows only the responsibility of individual persons. So far, guilt as a personal feature of action, based on the ability of the offender to feel in his psyche, could be considered only in relation to the individual person, while the said Act destroyed this conviction. Guilt of collective entity must be proven under at least one of the three possible forms: the guilt in the selection or supervision and so called organizational guilt. The next question is how the principle of proportionality in relation to criminal measures in response of collective entities should be considered. It should be remembered that the legal subjectivity of collective entities, including their rights and freedoms, is an emanation of the rights and freedoms of individual persons which create collective entities and through these entities implement their rights and freedoms. The adopted Act largely reflects the international legal regulations but also contains the unknown and original legislative solutions.Keywords: criminal corporate responsibility, Polish criminal law, legislative solutions, Act of 28 October 2002
Procedia PDF Downloads 505684 Coping with Incompatible Identities in Russia: Case of Orthodox Gays
Authors: Siuzan Uorner
Abstract:
The era of late modernity is characterized, on the one hand, by social disintegration, values of personal freedom, tolerance, and self-expression. Boundaries between the accessible and the elitist, normal and abnormal are blurring. On the other hand, traditional social institutions, such as religion (especially Russian Orthodox Church), exist, criticizing lifestyle and worldview other than conventionally structured canons. Despite the declared values and opportunities in late modern society, people's freedom is ambivalent. Personal identity and its aspects are becoming a subject of choice. Hence, combinations of identity aspects can be incompatible. Our theoretical framework is based on P. Ricoeur's concept of narrative identity and hermeneutics, E. Goffman’s theory of social stigma, self-presentation, discrepant roles and W. James lectures about varieties of religious experience. This paper aims to reconstruct ways of coping with incompatible identities of Orthodox gays (an extreme sampling of a combination of sexual orientation and religious identity in a heteronormative society). This study focuses on the discourse of Orthodox gay parishioners and ROC gay priests in Russia (sampling ‘hard to reach’ populations because of the secrecy of gay community in ROC and sensitivity of the topic itself). We conducted a qualitative research design, using in-depth personal semi-structured online-interviews. Recruiting of informants took place in 'Nuntiare et Recreare' (Russian movement of religious LGBT) page in VKontakte through the post with an invitation to participate in the research. In this work, we analyzed interview transcripts using axial coding. We chose the Grounded Theory methodology to construct a theory from empirical data and contribute to the growing body of knowledge in ways of harmonizing incompatible identities in late modern societies. The research has found that there are two types of conflicts Orthodox gays meet with: canonic contradictions (postulates of Scripture and its interpretations) and problems in social interaction, mainly with ROC priests and Orthodox parishioners. We have revealed semantic meanings of most commonly used words that appear in the narratives (words such as ‘love’, ‘sin’, ‘religion’ etc.). Finally, we have reconstructed biographical patterns of LGBT social movements’ involvement. This paper argues that all incompatibilities are harmonizing in the narrative itself. As Ricoeur has suggested, the narrative configuration allows the speaker to gather facts and events together and to compose causal relationships between them. Sexual orientation and religious identity are getting along and harmonizing in the narrative.Keywords: gay priests, incompatible identities, narrative identity, Orthodox gays, religious identity, ROC, sexual orientation
Procedia PDF Downloads 137683 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies
Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk
Abstract:
Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, this project proposes AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project presents the best-in-school techniques used to preserve the data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptographic techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures and identifies potential correction/mitigation measures.Keywords: data privacy, artificial intelligence (AI), healthcare AI, data sharing, healthcare organizations (HCOs)
Procedia PDF Downloads 93682 Continuous FAQ Updating for Service Incident Ticket Resolution
Authors: Kohtaroh Miyamoto
Abstract:
As enterprise computing becomes more and more complex, the costs and technical challenges of IT system maintenance and support are increasing rapidly. One popular approach to managing IT system maintenance is to prepare and use an FAQ (Frequently Asked Questions) system to manage and reuse systems knowledge. Such an FAQ system can help reduce the resolution time for each service incident ticket. However, there is a major problem where over time the knowledge in such FAQs tends to become outdated. Much of the knowledge captured in the FAQ requires periodic updates in response to new insights or new trends in the problems addressed in order to maintain its usefulness for problem resolution. These updates require a systematic approach to define the exact portion of the FAQ and its content. Therefore, we are working on a novel method to hierarchically structure the FAQ and automate the updates of its structure and content. We use structured information and the unstructured text information with the timelines of the information in the service incident tickets. We cluster the tickets by structured category information, by keywords, and by keyword modifiers for the unstructured text information. We also calculate an urgency score based on trends, resolution times, and priorities. We carefully studied the tickets of one of our projects over a 2.5-year time period. After the first 6 months, we started to create FAQs and confirmed they improved the resolution times. We continued observing over the next 2 years to assess the ongoing effectiveness of our method for the automatic FAQ updates. We improved the ratio of tickets covered by the FAQ from 32.3% to 68.9% during this time. Also, the average time reduction of ticket resolution was between 31.6% and 43.9%. Subjective analysis showed more than 75% reported that the FAQ system was useful in reducing ticket resolution times.Keywords: FAQ system, resolution time, service incident tickets, IT system maintenance
Procedia PDF Downloads 338681 DLtrace: Toward Understanding and Testing Deep Learning Information Flow in Deep Learning-Based Android Apps
Authors: Jie Zhang, Qianyu Guo, Tieyi Zhang, Zhiyong Feng, Xiaohong Li
Abstract:
With the widespread popularity of mobile devices and the development of artificial intelligence (AI), deep learning (DL) has been extensively applied in Android apps. Compared with traditional Android apps (traditional apps), deep learning based Android apps (DL-based apps) need to use more third-party application programming interfaces (APIs) to complete complex DL inference tasks. However, existing methods (e.g., FlowDroid) for detecting sensitive information leakage in Android apps cannot be directly used to detect DL-based apps as they are difficult to detect third-party APIs. To solve this problem, we design DLtrace; a new static information flow analysis tool that can effectively recognize third-party APIs. With our proposed trace and detection algorithms, DLtrace can also efficiently detect privacy leaks caused by sensitive APIs in DL-based apps. Moreover, using DLtrace, we summarize the non-sequential characteristics of DL inference tasks in DL-based apps and the specific functionalities provided by DL models for such apps. We propose two formal definitions to deal with the common polymorphism and anonymous inner-class problems in the Android static analyzer. We conducted an empirical assessment with DLtrace on 208 popular DL-based apps in the wild and found that 26.0% of the apps suffered from sensitive information leakage. Furthermore, DLtrace has a more robust performance than FlowDroid in detecting and identifying third-party APIs. The experimental results demonstrate that DLtrace expands FlowDroid in understanding DL-based apps and detecting security issues therein.Keywords: mobile computing, deep learning apps, sensitive information, static analysis
Procedia PDF Downloads 177680 Authentic Visual Resources for the Foreign Language Classroom
Authors: O. Yeret
Abstract:
Visual resources are all around us, especially in today's media-driven world, which gravitates, more and more, towards the visual. As a result, authentic resources, such as television advertisements, become testaments – authentic cultural materials – that reflect the landscape of certain groups and communities during a specific point in time. Engaging language students with popular advertisements can provide a great opportunity for developing cultural awareness, a component that is sometimes overlooked in the foreign language classroom. This paper will showcase practical examples of using Israeli Television Ads in various Modern Hebrew language courses. Several approaches for combining the study of language and culture, through the use of advertisements, will be included; for example, targeted assignments based on students' proficiency levels, such as: asking to recognize vocabulary words and answer basic information questions, as opposed to commenting on the significance of an ad and analyzing its particular cultural elements. The use of visual resources in the language classroom does not only enable students to learn more about the culture of the target language, but also to combine their language skills. Most often, interacting with an ad requires close listening and some reading (through captions or other data). As students analyze the ad, they employ their writing and speaking skills by answering questions in text or audio form. Hence, these interactions are able to elicit complex language use across the four domains: listening, speaking, writing, and reading. This paper will include examples of practical assignments that were developed for several Modern Hebrew language courses, together with the specific advertisements and questions related to them. Conclusions from the process and recent feedback notes received from students regarding the use of visual resources will be mentioned as well.Keywords: authentic materials, cultural awareness, second language acquisition, visual resources
Procedia PDF Downloads 108679 Performance Evaluation and Comparison between the Empirical Mode Decomposition, Wavelet Analysis, and Singular Spectrum Analysis Applied to the Time Series Analysis in Atmospheric Science
Authors: Olivier Delage, Hassan Bencherif, Alain Bourdier
Abstract:
Signal decomposition approaches represent an important step in time series analysis, providing useful knowledge and insight into the data and underlying dynamics characteristics while also facilitating tasks such as noise removal and feature extraction. As most of observational time series are nonlinear and nonstationary, resulting of several physical processes interaction at different time scales, experimental time series have fluctuations at all time scales and requires the development of specific signal decomposition techniques. Most commonly used techniques are data driven, enabling to obtain well-behaved signal components without making any prior-assumptions on input data. Among the most popular time series decomposition techniques, most cited in the literature, are the empirical mode decomposition and its variants, the empirical wavelet transform and singular spectrum analysis. With increasing popularity and utility of these methods in wide ranging applications, it is imperative to gain a good understanding and insight into the operation of these algorithms. In this work, we describe all of the techniques mentioned above as well as their ability to denoise signals, to capture trends, to identify components corresponding to the physical processes involved in the evolution of the observed system and deduce the dimensionality of the underlying dynamics. Results obtained with all of these methods on experimental total ozone columns and rainfall time series will be discussed and comparedKeywords: denoising, empirical mode decomposition, singular spectrum analysis, time series, underlying dynamics, wavelet analysis
Procedia PDF Downloads 116678 Examining Historically Defined Periods in Autobiographical Memories for Transitional Events
Authors: Khadeeja Munawar, Shamsul Haque
Abstract:
We examined the plausibility of transition theory suggesting that memories of transitional events, which give rise to a significant and persistent change in the fabric of daily life, are organized around the historically defined autobiographical periods (H-DAPs). 141 Pakistani older adults retrieved 10 autobiographical memories (AMs) each to 10 cue words. As the history of Pakistan is dominated by various political and nationwide transitional events, it was expected that the participants would recall memories with H-DAPs references. The content analysis revealed that 0.7% of memories had H-DAP references and 0.4% memories mentioned major transitional events such as War/Natural Disaster. There was a vivid reminiscence bump between 10 - 20 years of age in lifespan distribution of AMs. There were 67.9% social-focused AMs. Significantly more self-focused memories were reported by individuals who endorsed themselves as conservatives. Only a few H-DAPs were reported, although the history of Pakistan was dominated by numerous political, historical and nationwide transitional events. Memories within and outside of the bump period were mostly positive. The participants rarely used historical/political or nationwide significant events or periods to date the memories elicited. The intense and nationwide (as well as region-wise) significant historical/political events spawned across decades in the lives of participants of the present study but these events did not produce H-DAPs. The findings contradicted the previous studies on H-DAPs and transition theory. The dominance of social-focused AMs in the present study is in line with the past studies comparing the memories of collectivist and individualist cultures (i.e., European Americans vs. Asian, African and Latin-American cultures). The past empirical evidence shows that conservative values and beliefs are adopted as a coping strategy to feel secure in the face of danger when future is dominated with uncertainty and to connect to likeminded others. In the present study, conservative political ideology is somehow assisting the participants in living a stable life midst of their complex social worlds. The reminiscence bump, as well as dominance of positive memories within and outside the bump period, are in line with the narrative/identity account which states that the events and experiences during adolescence and early adulthood assimilate into a person’s lifelong narratives. Hence these events are used as identity markers and are more easily recalled later in life. Also, according to socioemotional theory and the positivity effect, the participants evaluated past events more positively as they grow up and the intensity of negative emotions decreased with time.Keywords: autobiographical memory, historically defined autobiographical periods, narrative/identity account, Pakistan, reminiscence bump, SMS framework, transition theory
Procedia PDF Downloads 232677 Treaties-Fulfilled or Breached: A Study for Peacefulness of Religions
Authors: Syed A. Alam, Arifa Bilal
Abstract:
A propagated wave of barbaric and injustice Muslims has been popularized by the International powers in the recent past to divert the winning force of Muslims in the Afghan war against Russia. It is a tactic to demolish the power of Jihaad and the religious image of Islam. The propaganda picturized that Muslims were not peaceful or trustworthy people by displaying some brutal actions of a little number of funded people. The word ‘Islam’ is titled as ‘complete codes of life’ because of the peacefulness and trustworthiness of these codes for whole lives. These codes help the whole of humanity beyond the boundaries of any religion, sect, creed, color, geography, or race to lead their lives peacefully and trustfully. The human beings who act upon these codes of life, Islam, can be called Muslims. Those people are not Muslims who do not act upon these codes of life. History is evident that the Muslims proved themselves, collectively, that they are acting upon these codes of life. In this article, an analytical study was conducted regarding popular treaties signed between Muslims and non-Muslim communities in different times and regions on different matters. The study included the treaties of Hudabiyah Treaty, Mithaq-e-Madinah, Lucknow Pact, Indus Water Pact, Air Space Violation Treaty, Gallipoli Treaty, Amity Treaty, US-Russia Peace Treaty, and Wadi Arab Peace Treaty. After critical analysis of these treaties, it can be clearly concluded that Muslims fulfilled these treatises, but non-Muslim stakeholders of these treaties broke these treaties in one aspect or many and in the start or later. It can be concluded that the history of treaties between Muslim and non-Muslim communities declared that Muslims had fulfilled these treaties and pacts, so they are more trustworthy and peaceful people.Keywords: fulfilled treaties, Muslim and non-muslim pacts, Islam and peacefulness, Islam and treaties
Procedia PDF Downloads 131676 Identity and Disability in Contemporary East Asian Dance
Authors: Sanghyun Park
Abstract:
Influenced by the ideas of collectivism, East Asian contemporary dance is marked by an emphasis on unity and synchronization. A growing element of this discipline that disrupts the path that strives to attain perfection, requiring coordination between multiple parties in order to produce work of their highest artistic potential, with the support from individuals or groups is the presence of disabled dancers. Kawanaka Yo, a Japanese dancer with a mental disability, argues through her '“Dance of Peace' that a dancer should focus on her impulses and natural thoughts through improvisational dancing and eschewal of documentation. Professor and poet Jung-Gyu Jeong, co-founder of the Korea Disability International Art Company, demonstrates with his company’s modernized performances of popular works and musicals that disabled artists do not need perfection so long as they can assert their finesse to mimic or create an equivalence with able-bodied dancers. Yo has studied various forms of modern dance and ballet in Japan and has used her training to ease her mental disability but also accept her handicap as an extension of her identity, representing a trend in disabled dance that favors individuality and acceptance. In contrast, Jeong is an influential figure in South Korea for disabled dancers and artists, believing that disabled artists must overcome a certain threshold in order to reach a status as an artist that is equivalent to a 'normal artist.' East Asian art created by the disabled should not be judged according to different criteria or rubrics compared to able-bodied artists because, as Yo explains, a person’s identity and her handicaps characterize the meaning of, and the value of, the piece.Keywords: disability studies, modern dance, East Asia, politics of identity
Procedia PDF Downloads 208675 Fault Tolerant Control of the Dynamical Systems Based on Internal Structure Systems
Authors: Seyed Mohammad Hashemi, Shahrokh Barati
Abstract:
The problem of fault-tolerant control (FTC) by accommodation method has been studied in this paper. The fault occurs in any system components such as actuators, sensors or internal structure of the system and leads to loss of performance and instability of the system. When a fault occurs, the purpose of the fault-tolerant control is designate strategy that can keep the control loop stable and system performance as much as possible perform it without shutting down the system. Here, the section of fault detection and isolation (FDI) system has been evaluated with regard to actuator's fault. Designing a fault detection and isolation system for a multi input-multi output (MIMO) is done by an unknown input observer, so the system is divided to several subsystems as the effect of other inputs such as disturbing given system state equations. In this observer design method, the effect of these disturbances will weaken and the only fault is detected on specific input. The results of this approach simulation can confirm the ability of the fault detection and isolation system design. After fault detection and isolation, it is necessary to redesign controller based on a suitable modification. In this regard after the use of unknown input observer theory and obtain residual signal and evaluate it, PID controller parameters redesigned for iterative. Stability of the closed loop system has proved in the presence of this method. Also, In order to soften the volatility caused by Annie variations of the PID controller parameters, modifying Sigma as a way acceptable solution used. Finally, the simulation results of three tank popular example confirm the accuracy of performance.Keywords: fault tolerant control, fault detection and isolation, actuator fault, unknown input observer
Procedia PDF Downloads 452674 The Influence of Class and Gender on the Capitalist Patriarchal Society in Fitzgerald’s “The Great Gatsby”: A Marxist Feminist Perspective
Authors: Atousa Mirzapour Kouhdasht
Abstract:
The Great Gatsby is a 1925 novel set in the Jazz Age on Long Island by American writer F. Scott Fitzgerald. The novel depicts interactions between the first-person narrator, Nick Carraway, and his mysterious millionaire neighbor, Jay Gatsby, and his obsession to reunite with his former lover, Daisy Buchanan. During World War II, the Council on Books in Wartime sent free copies to American soldiers, so the novel experienced an unanticipated wave in popularity. This newfound popularity brought up critical literary re-examination. The work soon became a part of most American high school curricula and, as a result, a part of American popular culture. Multiple adaptations, on stage and screen, followed in the succeeding decades. The novel's treatment of social class, old money versus those who do not have familial wealth, gender, race, and its cynical attitude towards the American Dream is now a matter of discussion. The old money does not allow the new money to present itself due to its fear of changes. Although Gatsby is now a wealthy man who throws many parties, he is not considered equal to Thomas Buchanan, Daisy's husband, a millionaire who lives in East Egg. Even Gatsby feels shame when it comes to the history of his family, who was not actually from the bourgeoisie. Furthermore, the patriarchal system restrains women's behavior in society and puts them in the second position after men to follow what men ask them to do. The female characters are not able to make decisions for themselves. So the researcher uses The Great Gatsby, patriarchal theory, and Marxist feminist perspective to investigate the influence of gender and social status on women's position in a patriarchal society.Keywords: Marxist, feminist, class status, gender, the American dream, The Great Gatsby, Fitzgerald
Procedia PDF Downloads 121673 Identification of Spam Keywords Using Hierarchical Category in C2C E-Commerce
Authors: Shao Bo Cheng, Yong-Jin Han, Se Young Park, Seong-Bae Park
Abstract:
Consumer-to-Consumer (C2C) E-commerce has been growing at a very high speed in recent years. Since identical or nearly-same kinds of products compete one another by relying on keyword search in C2C E-commerce, some sellers describe their products with spam keywords that are popular but are not related to their products. Though such products get more chances to be retrieved and selected by consumers than those without spam keywords, the spam keywords mislead the consumers and waste their time. This problem has been reported in many commercial services like e-bay and taobao, but there have been little research to solve this problem. As a solution to this problem, this paper proposes a method to classify whether keywords of a product are spam or not. The proposed method assumes that a keyword for a given product is more reliable if the keyword is observed commonly in specifications of products which are the same or the same kind as the given product. This is because that a hierarchical category of a product in general determined precisely by a seller of the product and so is the specification of the product. Since higher layers of the hierarchical category represent more general kinds of products, a reliable degree is differently determined according to the layers. Hence, reliable degrees from different layers of a hierarchical category become features for keywords and they are used together with features only from specifications for classification of the keywords. Support Vector Machines are adopted as a basic classifier using the features, since it is powerful, and widely used in many classification tasks. In the experiments, the proposed method is evaluated with a golden standard dataset from Yi-han-wang, a Chinese C2C e-commerce, and is compared with a baseline method that does not consider the hierarchical category. The experimental results show that the proposed method outperforms the baseline in F1-measure, which proves that spam keywords are effectively identified by a hierarchical category in C2C e-commerce.Keywords: spam keyword, e-commerce, keyword features, spam filtering
Procedia PDF Downloads 294672 Implementing Service Learning in the Health Education Curriculum
Authors: Karen Butler
Abstract:
Johnson C. Smith University, one of the nation’s oldest Historically Black Colleges and Universities, has a strong history of service learning and community service. We first integrated service learning and peer education into health education courses in the spring of 2000. Students enrolled in the classes served as peer educators for the semester. Since then, the program has evolved and expanded but remains an integral part of several courses. The purpose of this session is to describe our program in terms of development, successes, and obstacles, and feedback received. A detailed description of the service learning component in HED 235: Drugs and Drug Education and HED 337: Environmental Health will be provided. These classes are required of our Community Health majors but are also popular electives for students in other disciplines. Three sources of student feedback were used to evaluate and continually modify the component: the SIR II course evaluation, service learning reflection papers, and focus group interviews. Student feedback has been largely positive. When criticism was given, it was thoughtful and constructive – given in the spirit of making it better for the next group. Students consistently agreed that the service learning program increased their awareness of pertinent health issues; that both the service providers and service recipients benefited from the project; and that the goals/issues targeted by the service learning component fit the objectives of the course. Also, evidence of curriculum and learning enhancement was found in the reflection papers and focus group sessions. Service learning sets up a win-win situation. It provides a way to respond to campus and community health needs while enhancing the curriculum, as students learn more by doing things that benefit the health and wellness of others. Service learning is suitable for any health education course and any target audience would welcome the effort.Keywords: black colleges, community health, health education, service learning
Procedia PDF Downloads 340671 Synthesis and Characterization of Cellulose-Based Halloysite-Carbon Adsorbent
Authors: Laura Frydel, Piotr M. Slomkiewicz, Beata Szczepanik
Abstract:
Triclosan has been used as a disinfectant in many medical products, such as: hand disinfectant soaps, creams, mouthwashes, pastes and household cleaners. Due to its strong antimicrobial activity, triclosan is becoming more and more popular and the consumption of disinfectants with triclosan in it is increasing. As a result, this compound increasingly finds its way into waters and soils in an unchanged form, pollutes the environment and may have a negative effect on organisms. The aim of this study was to investigate the synthesis of cellulose-based halloysite-carbon adsorbent and perform its characterization. The template in the halloysite-carbon adsorbent was halloysite nanotubes and the carbon precursor was microcrystalline cellulose. Scanning electron microscope (SEM) images were obtained and the elementary composition (qualitative and quantitative) of the sample was determined by energy dispersion spectroscopy (EDS). The identification of the crystallographic composition of the halloysite nanotubes and the sample of the halloysite-carbon composite was carried out using the X-ray powder diffraction (XRPD) method. The FTIR spectra were acquired before and after the adsorption process in order to determine the functional groups on the adsorbent surface and confirm the interactions between adsorbent and adsorbate molecules. The parameters of the porous structure of the adsorbent, such as the specific surface area (Brunauer-Emmett-Teller method), the total pore volume and the volume of mesopores and micropores were determined. Total carbon and total organic carbon were also determined in the samples. A cellulose-based halloysite-carbon adsorbent was used to remove triclosan from water. The degree of removal of triclosan from water was approximately 90%. The results indicate that the halloysite-carbon composite can be successfully used as an effective adsorbent for removing triclosan from water.Keywords: Adsorption, cellulose, halloysite, triclosan
Procedia PDF Downloads 128670 Bad Juju: The Translation of the African Zombi to Nigerian and Western Screens
Authors: Randall Gray Underwood
Abstract:
Within the past few decades, zombie cinema has evolved from a niche outgrowth of the horror genre into one of the most widely-discussed and thoroughly-analyzed subgenres of film. Rising to international popularity during the 1970s and 1980s following the release of George Romero’s landmark classic, Night of the Living Dead (1968), and its much-imitated sequel, Dawn of the Dead (1978), the zombie genre returned to global screens in full force at the turn of the century following earth-shattering events such as the 9/11 terrorist attacks, America’s subsequent war in the Middle East, environmental pandemics, and the emergence of a divided and disconnected global populace in the age of social media. Indeed, the presence of the zombie in all manner of art and entertainment—movies, literature, television, video games, comic books, and more—has become nothing short of pervasive, engendering a plethora of scholarly writings, books, opinion pieces, and video essays from all manner of academics, cultural commentators, critics, and casual fans, with each espousing their own theories regarding the zombie’s allegorical and symbolic value within global fiction. Consequently, the walking dead of recent years have been variously positioned as fictive manifestations of human fears of societal collapse, environmental contagion, sexually-transmitted disease, primal regression, dwindling population rates, global terrorism, and the foreign “Other”. Less commonly analyzed within film scholarship, however, is the connection between the zombie’s folkloric roots and native African/Haitian spiritual practice; specifically, how this connection impacts the zombie’s presentation in African films by native storytellers versus in similar narratives told from a western perspective. This work will examine the unlikely connections and contrasts inherent the portrayal of the traditional African/Haitian zombie (or zombi, in Haitian French) in the Nollywood film Witchdoctor of the Livingdead (1985, Charles Abi Enonchong) versus its depiction in the early Hollywood films White Zombie (1932, Victor Halperin) and I Walked with a Zombie (1943, Jacques Tourneur), through analysis of each cinemas’ use of the zombie as a visual metaphor for subjugation/slavery, as well as differences in their representation of the the spiritual folklore from which the figure of the zombie originates. Select films from the post-Night of the Living Dead zombie cinema landscape will also warrant brief discussion in relation to Witchdoctor of the Livingdead.Keywords: Nollywood, Zombie cinema, Horror cinema, Classical Hollywood
Procedia PDF Downloads 60669 The Bayesian Premium Under Entropy Loss
Authors: Farouk Metiri, Halim Zeghdoudi, Mohamed Riad Remita
Abstract:
Credibility theory is an experience rating technique in actuarial science which can be seen as one of quantitative tools that allows the insurers to perform experience rating, that is, to adjust future premiums based on past experiences. It is used usually in automobile insurance, worker's compensation premium, and IBNR (incurred but not reported claims to the insurer) where credibility theory can be used to estimate the claim size amount. In this study, we focused on a popular tool in credibility theory which is the Bayesian premium estimator, considering Lindley distribution as a claim distribution. We derive this estimator under entropy loss which is asymmetric and squared error loss which is a symmetric loss function with informative and non-informative priors. In a purely Bayesian setting, the prior distribution represents the insurer’s prior belief about the insured’s risk level after collection of the insured’s data at the end of the period. However, the explicit form of the Bayesian premium in the case when the prior is not a member of the exponential family could be quite difficult to obtain as it involves a number of integrations which are not analytically solvable. The paper finds a solution to this problem by deriving this estimator using numerical approximation (Lindley approximation) which is one of the suitable approximation methods for solving such problems, it approaches the ratio of the integrals as a whole and produces a single numerical result. Simulation study using Monte Carlo method is then performed to evaluate this estimator and mean squared error technique is made to compare the Bayesian premium estimator under the above loss functions.Keywords: bayesian estimator, credibility theory, entropy loss, monte carlo simulation
Procedia PDF Downloads 334668 Efficiency of Robust Heuristic Gradient Based Enumerative and Tunneling Algorithms for Constrained Integer Programming Problems
Authors: Vijaya K. Srivastava, Davide Spinello
Abstract:
This paper presents performance of two robust gradient-based heuristic optimization procedures based on 3n enumeration and tunneling approach to seek global optimum of constrained integer problems. Both these procedures consist of two distinct phases for locating the global optimum of integer problems with a linear or non-linear objective function subject to linear or non-linear constraints. In both procedures, in the first phase, a local minimum of the function is found using the gradient approach coupled with hemstitching moves when a constraint is violated in order to return the search to the feasible region. In the second phase, in one optimization procedure, the second sub-procedure examines 3n integer combinations on the boundary and within hypercube volume encompassing the result neighboring the result from the first phase and in the second optimization procedure a tunneling function is constructed at the local minimum of the first phase so as to find another point on the other side of the barrier where the function value is approximately the same. In the next cycle, the search for the global optimum commences in both optimization procedures again using this new-found point as the starting vector. The search continues and repeated for various step sizes along the function gradient as well as that along the vector normal to the violated constraints until no improvement in optimum value is found. The results from both these proposed optimization methods are presented and compared with one provided by popular MS Excel solver that is provided within MS Office suite and other published results.Keywords: constrained integer problems, enumerative search algorithm, Heuristic algorithm, Tunneling algorithm
Procedia PDF Downloads 325667 Effects of Bariatric Surgery on Preventing the Progression of Diabetic Retinopathy
Authors: Yunzi Chen, James Laybourne, Sarah Steven, Peter Carey, David Steel, Maria Sandinha
Abstract:
Introduction: Bariatric surgery is popular with the rising incidence of obesity. Its well-known benefits include significant and rapid glycaemic control. However, cases of paradoxical worsening in diabetic retinopathy (DR) despite improved glycaemic control have been reported. Purpose: clarification on the evolution of diabetic retinopathy after bariatric surgery. Method: retrospective study of 40 patients with Type 2 diabetes who underwent bariatric surgery in a UK specialist bariatric unit between 2009 and 2011. Pre-operative and post-operative visual acuity (VA), weight, HbA1c and annual DRSS screening results were analysed. Median follow up was 50 months. Results: No significant change in VA was found during the post-operative period. 85% of patients improved HbA1c post-operatively of which 53% achieved non-diabetic HbA1c of <6.1% - despite this, 2 patients developed new DR. First post-operative screening showed 80% of patients experienced no change, 8% improved but 13% of patients developed new DR (1 case with sight-threatening maculopathy). 80% of these cases persisted up to 24 months. The proportion of patients developing new or worse DR fluctuated over time, peaking at the 3rd annual screening with 26% (15% regressed, 56% stable). The probability of developing new or worse DR postoperatively was significantly associated with a high pre-operative HbA1c (>8%) and male gender. Conclusions: bariatric surgery does not guarantee long-term improvement or prevention of DR. Asymptomatic changes in DR occurred up to 5 years postoperatively. We therefore consider it prudent to continue screening in this cohort of patients.Keywords: bariatric surgery, diabetic retinopathy, obesity, type 2 diabetes mellitus
Procedia PDF Downloads 273666 Unlocking E-commerce: Analyzing User Behavior and Segmenting Customers for Strategic Insights
Authors: Aditya Patil, Arun Patil, Vaishali Patil, Sudhir Chitnis, Anjum Patel
Abstract:
Rapid growth has given e-commerce platforms a lot of client behavior and spending data. To maximize their strategy, businesses must understand how customers utilize online shopping platforms and what influences their purchases. Our research focuses on e-commerce user behavior and purchasing trends. This extensive study examines spending and user behavior. Regression and grouping disclose relevant data from the dataset. We can understand user spending trends via multilevel regression. We can analyze how pricing, user demographics, and product categories affect customer purchase decisions with this technique. Clustering groups consumers by spending. Important information was found. Purchase habits vary by user group. Our analysis illuminates the complex world of e-commerce consumer behavior and purchase trends. Understanding user behavior helps create effective e-commerce marketing strategies. This market can benefit from K-means clustering. This study focuses on tailoring strategies to user groups and improving product and price effectiveness. Customer buying behaviors across categories were shown via K-means clusters. Average spending is highest in Cluster 4 and lowest in Cluster 3. Clothing is less popular than gadgets and appliances around the holidays. Cluster spending distribution is examined using average variables. Our research enhances e-commerce analytics. Companies can improve customer service and decision-making with this data.Keywords: e-commerce, regression, clustering, k-means
Procedia PDF Downloads 18