Search results for: social network theory
15694 Oil Reservoir Asphalting Precipitation Estimating during CO2 Injection
Authors: I. Alhajri, G. Zahedi, R. Alazmi, A. Akbari
Abstract:
In this paper, an Artificial Neural Network (ANN) was developed to predict Asphaltene Precipitation (AP) during the injection of carbon dioxide into crude oil reservoirs. In this study, the experimental data from six different oil fields were collected. Seventy percent of the data was used to develop the ANN model, and different ANN architectures were examined. A network with the Trainlm training algorithm was found to be the best network to estimate the AP. To check the validity of the proposed model, the model was used to predict the AP for the thirty percent of the data that was unevaluated. The Mean Square Error (MSE) of the prediction was 0.0018, which confirms the excellent prediction capability of the proposed model. In the second part of this study, the ANN model predictions were compared with modified Hirschberg model predictions. The ANN was found to provide more accurate estimates compared to the modified Hirschberg model. Finally, the proposed model was employed to examine the effect of different operating parameters during gas injection on the AP. It was found that the AP is mostly sensitive to the reservoir temperature. Furthermore, the carbon dioxide concentration in liquid phase increases the AP.Keywords: artificial neural network, asphaltene, CO2 injection, Hirschberg model, oil reservoirs
Procedia PDF Downloads 36415693 Rhetoric and Renarrative Structure of Digital Images in Trans-Media
Abstract:
The misreading theory of Harold Bloom provides a new diachronic perspective as an approach to the consistency between rhetoric of digital technology, dynamic movement of digital images and uncertain meaning of text. Reinterpreting the diachroneity of 'intertextuality' in the context of misreading theory extended the range of the 'intermediality' of transmedia to the intense tension between digital images and symbolic images throughout history of images. With the analogy between six categories of revisionary ratios and six steps of digital transformation, digital rhetoric might be illustrated as a linear process reflecting dynamic, intensive relations between digital moving images and original static images. Finally, it was concluded that two-way framework of the rhetoric of transformation of digital images and reversed served as a renarrative structure to revive static images by reconnecting them with digital moving images.Keywords: rhetoric, digital art, intermediality, misreading theory
Procedia PDF Downloads 25615692 Order vs. Justice: The Cases of Libya and Syria from the Perspective of the English School Theory
Authors: A. Gün Güneş
Abstract:
This study aims to explicate the functionality of the responsibility to protect (R2P) in terms of order and justice within the context of the main traditions of the English School theory. The conflicts in Libya and Syria and the response of the international society to these crises are analyzed in the pluralism-solidarism dichotomy of the English School. In this regard, the intervention under R2P in Libya exemplifies the solidaristic side emphasizing justice, while the non-intervention in Syria exemplifies the pluralistic side emphasizing order. This study discusses the cases of Libya and Syria on the basis of Great Powers.Keywords: English school theory, international society, order, justice, responsibility to protect
Procedia PDF Downloads 43515691 The Role of Social Enterprise in Supporting Economic Development in Nigeria
Authors: Susan P. Teru, Jerome Nyameh
Abstract:
Many contemporary organizations are placing a greater emphasis on business enterprise systems as a means of generating higher levels of economic development. Many business research and literature has also concur that enterprise drive economic development, giving little or no credit to social enterprise, whose profit is reinvest to the community development compare to the business enterprise that share their profit to shareholders. Economic development includes economic policies that affect the beneficiaries of the economic entity. We suggest that producing social enterprise increments may be best achieved by orienting social enterprise entrepreneurs system to promote economic development. To this end, we describe a new approach to the social enterprise process that includes social entrepreneur and the key drivers of economic development at each stage. We present a model of social enterprise that incorporates the main ideas of the paper and suggests a new perspective for thinking about how to foster and manage social enterprise to achieve high levels of economic development.Keywords: social enterprise, economic development, Nigeria, business and management
Procedia PDF Downloads 51215690 An Exploration of Cross-culture Consumer Behaviour - The Characteristics of Chinese Consumers’ Decision Making in Europe
Authors: Yongsheng Guo, Xiaoxian Zhu, Mandella Osei-Assibey Bonsu
Abstract:
This study explores the effects of national culture on consumer behaviour by identifying the characteristics of Chinese consumers’ decision making in Europe. It offers a better understanding of how cultural factors affect consumers’ behaviour, and how consumers make decisions in other nations with different culture. It adopted a grounded theory approach and conducted twenty-four in-depth interviews. Grounded theory models are developed to link the causal conditions, process and consequences. Results reveal that some cultural factors including conservatism, emotionality, acquaintance community, long-term orientation and principles affect Chinese consumers when making purchase decisions in Europe. Most Chinese consumers plan and prepare their expenditure and stay in Europe as cultural learners, and purchase durable products or assets as investment, and share their experiences within a community. This study identified potential problems such as political and social environment, complex procedures, and restrictions. This study found that external factors influence on internal factors and then internal characters determine consumer behaviour. This study proposes that cultural traits developed in convergence evolution through social selection and Chinese consumers persist most characters but adapt some perceptions and actions overtime in other countries. This study suggests that cultural marketing could be adopted by companies to reflect consumers’ preferences. Agencies, shops, and the authorities could take actions to reduce the complexity and restrictions.Keywords: national culture, consumer behaviour, decision making, cultural marketing
Procedia PDF Downloads 9415689 The Impact of Different Social Networks on the Development of Digital Entrepreneurship
Authors: Mohammad Mehdizadeh, Sara Miri
Abstract:
In today's world, competition is one of the essential components of different markets. Therefore, in addition to economic factors, social factors can also affect the development and prosperity of businesses. In this regard, social networks are of particular importance and play a critical role in the flourishing and development of Internet businesses. The purpose of this article is to investigate the effect of different social networks in promoting digital entrepreneurship. The research method is the descriptive survey. The results show that social networks have a positive and significant impact on digital entrepreneurship development. Among the social networks studied, Instagram and Facebook have the most positive effect on digital entrepreneurship.Keywords: entrepreneurship, Facebook, Instagram, social media
Procedia PDF Downloads 35015688 Community Participation and Place Identity as Mediators on the Impact of Resident Social Capital on Support Intention for Festival Tourism
Authors: Nien-Te Kuo, Yi-Sung Cheng, Kuo-Chien Chang
Abstract:
Cultural festival tourism is now seen by many as an opportunity to facilitate community development because it has significant influences on the economic, social, cultural, and political aspects of local communities. The potential for tourist attraction has been recognized as a useful tool to strengthen local economies from governments. However, most community festivals in Taiwan are short-lived, often only lasting for a few years or occasionally not making it past a one-off event. Researchers suggested that most governments and other stakeholders do not recognize the importance of building a partnership with residents when developing community tourism. Thus, the sustainable community tourism development still remains a key issue in the existing literature. The success of community tourism is related to the attitudes and lifestyles of local residents. In order to maintain sustainable tourism, residents need to be seen as development partners. Residents’ support intention for tourism development not only helps to increase awareness of local culture, history, the natural environment, and infrastructure, but also improves the interactive relationship between the host community and tourists. Furthermore, researchers have identified the social capital theory as the core of sustainable community tourism development. The social capital of residents has been seen as a good way to solve issues of tourism governance, forecast the participation behavior and improve support intention of residents. In addition, previous studies have pointed out the role of community participation and place identity in increasing resident support intention for tourism development. A lack of place identity is one of the main reasons that community tourism has become a mere formality and is not sustainable. It refers to how much residents participate during tourism development and is mainly influenced by individual interest. Scholars believed that the place identity of residents is the soul of community festivals. It shows the community spirit to visitors and has significant impacts on tourism benefits and support intention of residents in community tourism development. Although the importance of community participation and place identity have been confirmed by both governmental and non-governmental organizations, real-life execution still needs to be improved. This study aimed to use social capital theory to investigate the social structure between community residents, participation levels in festival tourism, degrees of place identity, and resident support intention for future community tourism development, and the causal relationship that these factors have with cultural festival tourism. A quantitative research approach was employed to examine the proposed model. Structural equation model was used to test and verify the proposed hypotheses. This was a case study of the Kaohsiung Zuoying Wannian Folklore Festival. The festival was located in the Zuoying District of Kaohsiung City, Taiwan. The target population of this study was residents who attended the festival. The results reveal significant correlations among social capital, community participation, place identity and support intention. The results also confirm that impacts of social capital on support intention were significantly mediated by community participation and place identity. Practical suggestions were provided for tourism operators and policy makers. This work was supported by the Ministry of Science and Technology of Taiwan, Republic of China, under the grant MOST-105-2410-H-328-013.Keywords: community participation, place identity, social capital, support intention
Procedia PDF Downloads 32615687 Entrepreneurship Training of Young People as a Pillar to Generate Income and Create Jobs: Progress Report of the Moroccan National Human Development Initiative in the Region of Meknes
Authors: Bennani Zoubir Nada, El Hiri Abderrazak, El Hajri Aimad
Abstract:
In context of economic and health crisis, sustainable entrepreneurship has become one of the best solutions to economic recovery. This study is about the third program of the Moroccan national human development initiative in her third phase which began in 2019 and continuous until 2023, and which deals with income improvement and social inclusion of young people, under the high patronage of his majesty the king of Morocco. What is the approach of this program and how entrepreneurship training of young people can be a pillar to generate income and create jobs? Starting on the effectuation theory, we adopted an exploratory qualitative approach through semi-structured interviews with national human development initiative stakeholders in the area of Meknes-Morocco, which allowed us the state of progress of this program. We carried out a survey based on a grid of questions to collect information that we processed using NVIVO software. The most relevant results are that people eligible are jobless young people, who are between 18 and 35 years old, who reside in Meknes and surroundings and who have a project idea. They are trained by experts in entrepreneurship and management through targeted and diversified courses. To ensure the sustainability of projects, the project organisers have provided measures to ensure the sustainability of the companies through continuous monitoring and evaluation as well as support during all phases from the project idea to the realisation and progress.Keywords: sustainable entrepreneurship, training, social inclusion, national human development initiative in Morocco (INDH), youth entrepreneurship, the effectuation theory
Procedia PDF Downloads 11015686 Egalitarianism and Social Stratification: An Overview of the Caste System among the Southern Muslims of Sri Lanka
Authors: Mohamed Faslan
Abstract:
This paper describes how caste-based differentiation functions among the Southern Muslims of Sri Lanka despite Islamic egalitarian principles. Such differences are not promoted by religious teachings, mosques, or the various Islamic religious denominations. Instead, it underpins a hereditary, hierarchical stratification in social structure. Since Islam is against social stratification and promotes egalitarianism, what are the persuasive social structures that organize the existing caste system among Southern Muslims? To answer this puzzle, this paper discusses and analyses the caste system under these five subsections: ancestry; marriage; geography; mosque ownership or trustees; and occupation. The study of caste in Sri Lanka is generally compartmentalized into separate Sinhala and Tamil systems. Most caste studies have focused on the characteristics, upward mobility, or discrimination of specific castes in relation to other castes within ethnic systems. As an operational definition, in this paper, by “southern” or the south of Sri Lanka, I refer to the Kalutara, Galle and Matara Districts. This research was conducted in these three districts, and the respondents were selected purposively. Community history interviews were used as a tool for collecting information, and grounded theory used for analysis. Caste stratification among the Southern Muslims of Sri Lanka is directly connected to whether they are descended from Arab or South Indian ancestors. Arab ancestors are considered upper caste and South Indian ancestors are considered lower caste. Endogamy is the most serious driving factor keeping caste system functioning among Muslims while the other factors—geography, mosques, and occupations—work as supporting factors.Keywords: caste, social stratification, Sri Lanka Muslims, endogamy
Procedia PDF Downloads 17315685 Use of Social Media in Political Communications: Example of Facebook
Authors: Havva Nur Tarakci, Bahar Urhan Torun
Abstract:
The transformation that is seen in every area of life by technology, especially internet technology changes the structure of political communications too. Internet, which is at the top of new communication technologies, affects political communications with its structure in a way that no traditional communication tools ever have and enables interaction and the channel between receiver and sender, and it becomes one of the most effective tools preferred among the political communication applications. This state as a result of technological convergence makes Internet an unobtainable place for political communication campaigns. Political communications, which means every kind of communication strategies that political parties called 'actors of political communications' use with the aim of messaging their opinions and party programmes to their present and potential voters who are a target group for them, is a type of communication that is frequently used also among social media tools at the present day. The electorate consisting of different structures is informed, directed, and managed by social media tools. Political parties easily reach their electorate by these tools without any limitations of both time and place and also are able to take the opinions and reactions of their electorate by the element of interaction that is a feature of social media. In this context, Facebook, which is a place that political parties use in social media at most, is a communication network including in our daily life since 2004. As it is one of the most popular social networks today, it is among the most-visited websites in the global scale. In this way, the research is based on the question, “How do the political parties use Facebook at the campaigns, which they conduct during the election periods, for informing their voters?” and it aims at clarifying the Facebook using practices of the political parties. In direction of this objective the official Facebook accounts of the four political parties (JDP–AKParti, PDP–BDP, RPP-CHP, NMP-MHP), which reach their voters by social media besides other communication tools, are treated, and a frame for the politics of Turkey is formed. The time of examination is constricted with totally two weeks, one week before the mayoral elections and one week after the mayoral elections, when it is supposed that the political parties use their Facebook accounts in full swing. As a research method, the method of content analysis is preferred, and the texts and the visual elements that are gotten are interpreted based on this analysis.Keywords: Facebook, political communications, social media, electrorate
Procedia PDF Downloads 38315684 Decision Support System for Diagnosis of Breast Cancer
Authors: Oluwaponmile D. Alao
Abstract:
In this paper, two models have been developed to ascertain the best network needed for diagnosis of breast cancer. Breast cancer has been a disease that required the attention of the medical practitioner. Experience has shown that misdiagnose of the disease has been a major challenge in the medical field. Therefore, designing a system with adequate performance for will help in making diagnosis of the disease faster and accurate. In this paper, two models: backpropagation neural network and support vector machine has been developed. The performance obtained is also compared with other previously obtained algorithms to ascertain the best algorithms.Keywords: breast cancer, data mining, neural network, support vector machine
Procedia PDF Downloads 34715683 Classifying Students for E-Learning in Information Technology Course Using ANN
Authors: Sirilak Areerachakul, Nat Ployong, Supayothin Na Songkla
Abstract:
This research’s objective is to select the model with most accurate value by using Neural Network Technique as a way to filter potential students who enroll in IT course by electronic learning at Suan Suanadha Rajabhat University. It is designed to help students selecting the appropriate courses by themselves. The result showed that the most accurate model was 100 Folds Cross-validation which had 73.58% points of accuracy.Keywords: artificial neural network, classification, students, e-learning
Procedia PDF Downloads 42615682 Exploring the Unintended Consequences of Loyalty programs in the Gambling Sector
Authors: Violet Justine Mtonga, Cecilia Diaz
Abstract:
this paper explores the prevalence of loyalty programs in the UK gambling industry and their association with unintended consequences and harm amongst program members. The use of loyalty programs within the UK gambling industry has risen significantly with over 40 million cards in circulation. Some research suggests that as of 2013-2014, nearly 95% of UK consumers have at least one loyalty card with 78% being members of two or more programs, and the average household possesses ‘22 loyalty programs’, nearly half of which tend to be used actively. The core design of loyalty programs is to create a relational ‘win-win’ approach where value is jointly created between the parties involved through repetitive engagement. However, main concern about the diffusion of gambling organisations’ loyalty programs amongst consumers, might be the use by the organisations within the gambling industry to over influence customer engagement and potentially cause unintended harm. To help understand the complex phenomena of the diffusions and adaptation of the use of loyalty programs in the gambling industry, and the potential unintended outcomes, this study is theoretically underpinned by the social exchange theory of relationships entrenched in the processes of social exchanges of resources, rewards, and costs for long-term interactions and mutual benefits. Qualitative data were collected via in-depth interviews from 14 customers and 12 employees within the UK land-based gambling firms. Data were analysed using a combination of thematic and clustering analysis to help reveal and discover the emerging themes regarding the use of loyalty cards for gambling companies and exploration of subgroups within the sample. The study’s results indicate that there are different unintended consequences and harm of loyalty program engagement and usage such as maladaptive gambling behaviours, risk of compulsiveness, and loyalty programs promoting gambling from home. Furthermore, there is a strong indication of a rite of passage among loyalty program members. There is also strong evidence to support other unfavorable behaviors such as amplified gambling habits and risk-taking practices. Additionally, in pursuit of rewards, loyalty program incentives effectuate overconsumption and heighten expenditure. Overall, the primary findings of this study show that loyalty programs in the gambling industry should be designed with an ethical perspective and practice.Keywords: gambling, loyalty programs, social exchange theory, unintended harm
Procedia PDF Downloads 8915681 Profit-Based Artificial Neural Network (ANN) Trained by Migrating Birds Optimization: A Case Study in Credit Card Fraud Detection
Authors: Ashkan Zakaryazad, Ekrem Duman
Abstract:
A typical classification technique ranks the instances in a data set according to the likelihood of belonging to one (positive) class. A credit card (CC) fraud detection model ranks the transactions in terms of probability of being fraud. In fact, this approach is often criticized, because firms do not care about fraud probability but about the profitability or costliness of detecting a fraudulent transaction. The key contribution in this study is to focus on the profit maximization in the model building step. The artificial neural network proposed in this study works based on profit maximization instead of minimizing the error of prediction. Moreover, some studies have shown that the back propagation algorithm, similar to other gradient–based algorithms, usually gets trapped in local optima and swarm-based algorithms are more successful in this respect. In this study, we train our profit maximization ANN using the Migrating Birds optimization (MBO) which is introduced to literature recently.Keywords: neural network, profit-based neural network, sum of squared errors (SSE), MBO, gradient descent
Procedia PDF Downloads 47515680 A Summary-Based Text Classification Model for Graph Attention Networks
Authors: Shuo Liu
Abstract:
In Chinese text classification tasks, redundant words and phrases can interfere with the formation of extracted and analyzed text information, leading to a decrease in the accuracy of the classification model. To reduce irrelevant elements, extract and utilize text content information more efficiently and improve the accuracy of text classification models. In this paper, the text in the corpus is first extracted using the TextRank algorithm for abstraction, the words in the abstract are used as nodes to construct a text graph, and then the graph attention network (GAT) is used to complete the task of classifying the text. Testing on a Chinese dataset from the network, the classification accuracy was improved over the direct method of generating graph structures using text.Keywords: Chinese natural language processing, text classification, abstract extraction, graph attention network
Procedia PDF Downloads 10015679 Fault Detection of Pipeline in Water Distribution Network System
Authors: Shin Je Lee, Go Bong Choi, Jeong Cheol Seo, Jong Min Lee, Gibaek Lee
Abstract:
Water pipe network is installed underground and once equipped; it is difficult to recognize the state of pipes when the leak or burst happens. Accordingly, post management is often delayed after the fault occurs. Therefore, the systematic fault management system of water pipe network is required to prevent the accident and minimize the loss. In this work, we develop online fault detection system of water pipe network using data of pipes such as flow rate or pressure. The transient model describing water flow in pipelines is presented and simulated using Matlab. The fault situations such as the leak or burst can be also simulated and flow rate or pressure data when the fault happens are collected. Faults are detected using statistical methods of fast Fourier transform and discrete wavelet transform, and they are compared to find which method shows the better fault detection performance.Keywords: fault detection, water pipeline model, fast Fourier transform, discrete wavelet transform
Procedia PDF Downloads 51215678 A General Iterative Nonlinear Programming Method to Synthesize Heat Exchanger Network
Authors: Rupu Yang, Cong Toan Tran, Assaad Zoughaib
Abstract:
The work provides an iterative nonlinear programming method to synthesize a heat exchanger network by manipulating the trade-offs between the heat load of process heat exchangers (HEs) and utilities. We consider for the synthesis problem two cases, the first one without fixed cost for HEs, and the second one with fixed cost. For the no fixed cost problem, the nonlinear programming (NLP) model with all the potential HEs is optimized to obtain the global optimum. For the case with fixed cost, the NLP model is iterated through adding/removing HEs. The method was applied in five case studies and illustrated quite well effectiveness. Among which, the approach reaches the lowest TAC (2,904,026$/year) compared with the best record for the famous Aromatic plants problem. It also locates a slightly better design than records in literature for a 10 streams case without fixed cost with only 1/9 computational time. Moreover, compared to the traditional mixed-integer nonlinear programming approach, the iterative NLP method opens a possibility to consider constraints (such as controllability or dynamic performances) that require knowing the structure of the network to be calculated.Keywords: heat exchanger network, synthesis, NLP, optimization
Procedia PDF Downloads 16315677 Scaling Siamese Neural Network for Cross-Domain Few Shot Learning in Medical Imaging
Authors: Jinan Fiaidhi, Sabah Mohammed
Abstract:
Cross-domain learning in the medical field is a research challenge as many conditions, like in oncology imaging, use different imaging modalities. Moreover, in most of the medical learning applications, the sample training size is relatively small. Although few-shot learning (FSL) through the use of a Siamese neural network was able to be trained on a small sample with remarkable accuracy, FSL fails to be effective for use in multiple domains as their convolution weights are set for task-specific applications. In this paper, we are addressing this problem by enabling FSL to possess the ability to shift across domains by designing a two-layer FSL network that can learn individually from each domain and produce a shared features map with extra modulation to be used at the second layer that can recognize important targets from mix domains. Our initial experimentations based on mixed medical datasets like the Medical-MNIST reveal promising results. We aim to continue this research to perform full-scale analytics for testing our cross-domain FSL learning.Keywords: Siamese neural network, few-shot learning, meta-learning, metric-based learning, thick data transformation and analytics
Procedia PDF Downloads 5615676 Optimization of a Convolutional Neural Network for the Automated Diagnosis of Melanoma
Authors: Kemka C. Ihemelandu, Chukwuemeka U. Ihemelandu
Abstract:
The incidence of melanoma has been increasing rapidly over the past two decades, making melanoma a current public health crisis. Unfortunately, even as screening efforts continue to expand in an effort to ameliorate the death rate from melanoma, there is a need to improve diagnostic accuracy to decrease misdiagnosis. Artificial intelligence (AI) a new frontier in patient care has the ability to improve the accuracy of melanoma diagnosis. Convolutional neural network (CNN) a form of deep neural network, most commonly applied to analyze visual imagery, has been shown to outperform the human brain in pattern recognition. However, there are noted limitations with the accuracy of the CNN models. Our aim in this study was the optimization of convolutional neural network algorithms for the automated diagnosis of melanoma. We hypothesized that Optimal selection of the momentum and batch hyperparameter increases model accuracy. Our most successful model developed during this study, showed that optimal selection of momentum of 0.25, batch size of 2, led to a superior performance and a faster model training time, with an accuracy of ~ 83% after nine hours of training. We did notice a lack of diversity in the dataset used, with a noted class imbalance favoring lighter vs. darker skin tone. Training set image transformations did not result in a superior model performance in our study.Keywords: melanoma, convolutional neural network, momentum, batch hyperparameter
Procedia PDF Downloads 10115675 About the Case Portfolio Management Algorithms and Their Applications
Authors: M. Chumburidze, N. Salia, T. Namchevadze
Abstract:
This work deal with case processing problems in business. The task of strategic credit requirements management of cases portfolio is discussed. The information model of credit requirements in a binary tree diagram is considered. The algorithms to solve issues of prioritizing clusters of cases in business have been investigated. An implementation of priority queues to support case management operations has been presented. The corresponding pseudo codes for the programming application have been constructed. The tools applied in this development are based on binary tree ordering algorithms, optimization theory, and business management methods.Keywords: credit network, case portfolio, binary tree, priority queue, stack
Procedia PDF Downloads 15015674 'Freud and Jung: Dissenting Friends'; An Analysis of the Foundations of the Psychoanalytical Theory in Theirs Letters
Authors: Laurence Doremus
Abstract:
Freud as the builder of psychoanalysis as a discipline had created the science with Carl Gustav Jung (1875-1961), a psychiatry specialist from Zurich who was very important in the Freudian theory. The knowledge about the foundation of psychoanalysis is often focused on the influence of the works from Breuer or Charcot in the Freudian praxis, at least at the beginning of his career, and Jung's influence is often under-estimated. The paper focuses on the importance of the Jungian contributions in Freud's theories at the beginning of the creation of the discipline in the 1910s. We often meet Jungian schools on the first hand and Freudian schools, on the other hand in the academic field, but the Freudian field has to admit the importance of the Jungian theories in Freudian science. And also, the dialectical energy which appears in the letters exchanged between both of the fathers of psychoanalysis is important to understand the foundations of Freud Theory. That's why the paper will analyze in detail the correspondence between them in an epistemological and historical approach. Effectively the letters were translated and published (in French but also in English and other languages) lately in history and are still not well knew by the researchers in the psychoanalytical field. We well explain how Freud was helped by Jung despite his desire to build the theory. We analyze how the second topic named 'unconscious, preconscious, and conscious', is the result of the first topic that Jung built with Freud. The paper is a contribution to the knowledge we should have about the intense friendship between the two protagonists.Keywords: Carl Gustav Jung, correspondence, Freud's letters, psychoanalytic theory
Procedia PDF Downloads 14915673 Assessment of E-Readiness in Libraries of Public Sector Universities Khyber Pakhtunkhwa-Pakistan
Authors: Saeed Ullah Jan
Abstract:
This study has examined the e-readiness in libraries of public sector universities in Khyber Pakhtunkhwa. Efforts were made to evaluate the availability of human resources, electronic infrastructure, and network services and programs in the public sector university libraries. The population of the study was the twenty-seven public sector university libraries of Khyber Pakhtunkhwa. A quantitative approach was adopted, and a questionnaire-based survey was conducted to collect data from the librarian/in charge of public sector university libraries. The collected data were analyzed using Statistical Package for Social Sciences version 22 (SPSS). The mean score of the knowledge component interpreted magnitudes below three which indicates that the respondents are poorly or moderately satisfied regards knowledge of libraries. The satisfaction level of the respondents about the other components, such as electronic infrastructure, network services and programs, and enhancers of the networked world, was rated as average or below. The study suggested that major aspects of existing public-sector university libraries require significant transformation. For this purpose, the government should provide all the required resources and facilities to meet the population's informational and recreational demands. The Information Communication Technology (ICT) infrastructure of public university libraries needs improvement in terms of the availability of computer equipment, databases, network servers, multimedia projectors, digital cameras, uninterruptible power supply, scanners, and backup devices such as hard discs and Digital Video Disc/Compact Disc.Keywords: ICT-libraries, e-readiness-libraries, e-readiness-university libraries, e-readiness-Pakistan
Procedia PDF Downloads 8815672 A Neural Network Control for Voltage Balancing in Three-Phase Electric Power System
Authors: Dana M. Ragab, Jasim A. Ghaeb
Abstract:
The three-phase power system suffers from different challenging problems, e.g. voltage unbalance conditions at the load side. The voltage unbalance usually degrades the power quality of the electric power system. Several techniques can be considered for load balancing including load reconfiguration, static synchronous compensator and static reactive power compensator. In this work an efficient neural network is designed to control the unbalanced condition in the Aqaba-Qatrana-South Amman (AQSA) electric power system. It is designed for highly enhanced response time of the reactive compensator for voltage balancing. The neural network is developed to determine the appropriate set of firing angles required for the thyristor-controlled reactor to balance the three load voltages accurately and quickly. The parameters of AQSA power system are considered in the laboratory model, and several test cases have been conducted to test and validate the proposed technique capabilities. The results have shown a high performance of the proposed Neural Network Control (NNC) technique for correcting the voltage unbalance conditions at three-phase load based on accuracy and response time.Keywords: three-phase power system, reactive power control, voltage unbalance factor, neural network, power quality
Procedia PDF Downloads 19515671 The Search for the Self in Psychotherapy: Findings from Relational Theory and Neuroanatomy
Authors: Harry G. Segal
Abstract:
The idea of the “self” has been essential ever since the early modern period in western culture, especially since the development of psychotherapy, but advances in neuroscience and cognitive theory challenge traditional notions of the self. More specifically, neuroanatomists have found no location of “the self” in the brain; instead, consciousness has been posited to be a rapid combination of perception, memory, anticipation of future events, and judgment. In this paper, a theoretical model is presented to address these neuroanatomical findings and to revise the historical understanding of “selfhood” in the practice of psychotherapy.Keywords: the self, psychotherapy, the self and the brain
Procedia PDF Downloads 10515670 Investigating Gender Differences in M-Learning Gameplay Adoption
Authors: Chih-Ping Chen
Abstract:
Despite the increasing popularity of and interest in mobile games, there has been little research that evaluates gender differences in users’ actual preferences for mobile game content, and the factors that influence entertainment and mobile-learning habits. To fill this void, this study examines different gender users’ experience of mobile English learning game adoption in order to identify the areas of development in Taiwan, using Uses and Gratification Theory, Expectation Confirmation Theory and experiential value. The integration of these theories forms the basis of an extended research concept. Users’ responses to questions about cognitive perceptions, confirmation, gratifications and continuous use were collected and analyzed with various factors derived from the theories.Keywords: expectation confirmation theory, experiential value, gender difference, mobile game, uses and gratification
Procedia PDF Downloads 33115669 Implementation of Social Network Analysis to Analyze the Dependency between Construction Bid Packages
Authors: Kawalpreet Kaur, Panagiotis Mitropoulos
Abstract:
The division of the project scope into work packages is the most important step in the preconstruction phase of construction projects. The work division determines the scope and complexity of each bid package, resulting in dependencies between project participants performing these work packages. The coordination between project participants is necessary because of these dependencies. Excessive dependencies between the bid packages create coordination difficulties, leading to delays, added costs, and contractual friction among project participants. However, the literature on construction provides limited knowledge regarding work structuring approaches, issues, and challenges. Manufacturing industry literature provides a systematic approach to defining the project scope into work packages, and the implementation of social network analysis (SNA) in manufacturing is an effective approach to defining and analyzing the divided scope of work at the dependencies level. This paper presents a case study of implementing a similar approach using SNA in construction bid packages. The study uses SNA to analyze the scope of bid packages and determine the dependency between scope elements. The method successfully identifies the bid package with the maximum interaction with other trade contractors and the scope elements that are crucial for project performance. The analysis provided graphical and quantitative information on bid package dependencies. The study can be helpful in performing an analysis to determine the dependencies between bid packages and their scope elements and how these scope elements are critical for project performance. The study illustrates the potential use of SNA as a systematic approach to analyzing bid package dependencies in construction projects, which can guide the division of crucial scope elements to minimize negative impacts on project performance.Keywords: work structuring, bid packages, work breakdown, project participants
Procedia PDF Downloads 7815668 Path Planning for Collision Detection between two Polyhedra
Authors: M. Khouil, N. Saber, M. Mestari
Abstract:
This study aimed to propose, a different architecture of a Path Planning using the NECMOP. where several nonlinear objective functions must be optimized in a conflicting situation. The ability to detect and avoid collision is very important for mobile intelligent machines. However, many artificial vision systems are not yet able to quickly and cheaply extract the wealth information. This network, which has been particularly reviewed, has enabled us to solve with a new approach the problem of collision detection between two convex polyhedra in a fixed time (O (1) time). We used two types of neurons linear and threshold logic, which simplified the actual implementation of all the networks proposed. This article represents a comprehensive algorithm that determine through the AMAXNET network a measure (a mini-maximum point) in a fixed time, which allows us to detect the presence of a potential collision.Keywords: path planning, collision detection, convex polyhedron, neural network
Procedia PDF Downloads 43815667 Information and Cooperativity in Fiction: The Pragmatics of David Baboulene’s “Knowledge Gaps”
Authors: Cara DiGirolamo
Abstract:
In his 2017 Ph.D. thesis, script doctor David Baboulene presented a theory of fiction in which differences in the knowledge states between participants in a literary experience, including reader, author, and characters, create many story elements, among them suspense, expectations, subtext, theme, metaphor, and allegory. This theory can be adjusted and modeled by incorporating a formal pragmatic approach that understands narrative as a speech act with a conversational function. This approach requires both the Speaker and the Listener to be understood as participants in the discourse. It also uses theories of cooperativity and the QUD to identify the existence of implicit questions. This approach predicts that what an effective literary narrative must do: provide a conversational context early in the story so the reader can engage with the text as a conversational participant. In addition, this model incorporates schema theory. Schema theory is a cognitive model for learning and processing information about the world and transforming it into functional knowledge. Using this approach can extend the QUD model. Instead of describing conversation as a form of information gathering restricted to question-answer sets, the QUD can include knowledge modeling and understanding as a possible outcome of a conversation. With this model, Baboulene’s “Knowledge Gaps” can provide real insight into storytelling as a conversational move, and extend the QUD to be able to simply and effectively apply to a more diverse set of conversational interactions and also to narrative texts.Keywords: literature, speech acts, QUD, literary theory
Procedia PDF Downloads 315666 Analysis of Multilayer Neural Network Modeling and Long Short-Term Memory
Authors: Danilo López, Nelson Vera, Luis Pedraza
Abstract:
This paper analyzes fundamental ideas and concepts related to neural networks, which provide the reader a theoretical explanation of Long Short-Term Memory (LSTM) networks operation classified as Deep Learning Systems, and to explicitly present the mathematical development of Backward Pass equations of the LSTM network model. This mathematical modeling associated with software development will provide the necessary tools to develop an intelligent system capable of predicting the behavior of licensed users in wireless cognitive radio networks.Keywords: neural networks, multilayer perceptron, long short-term memory, recurrent neuronal network, mathematical analysis
Procedia PDF Downloads 42015665 Identifying Patterns of Seeking and Providing Help Online among Adolescents in Israel
Authors: Gali Pesin, Yuliya Lipshits-Braziler, Sima Amram-Vaknin, Moshe Tatar
Abstract:
The present study introduces four different patterns of seeking and providing help online among adolescents: (I) ‘Transceivers’ - adolescents who both seek as well as provide help online; (II) ‘Receivers’ - adolescents who seek help online, yet don’t provide it; (III) ‘Transmitters’ - adolescents who provide help online, yet don’t seek it; and (IV) ‘Idles’ - adolescents who refrain from seeking and providing help online. The study examined differences in seeking and providing help online between possible combinations of the four patterns, as well as gender differences within each pattern. Data was collected from 528 adolescents in Israel (59% were girls). Findings revealed that Transceivers are the largest group (45%) in this study, with higher representation of girls (65%). These adolescents seek help mainly around social difficulties, and they turn to peers who are both known and unknown to them. In addition, their preferred way to seek and provide help is through social network sites. Moreover, they often accept and give others emotional support. Receivers are the smallest group (5%) in this study. They turn to both known and unknown professionals more often than to friends and family. In addition, they seek help mostly around health and nutrition issues, and they usually receive instrumental support. For Receivers, the most important factor for seeking help online is anonymity, and the least important factor is familiarity with the help giver. Transmitters represent 16% of the adolescents in this study, with a greater representation of boys (52%). Their main reason to refrain from seeking help online is self-reliance. Nevertheless, these adolescents provide help to others online, mainly to those known to them through posting or responding to posts on social network sites. Idles represent 34% of the adolescents in this study. They refrain from seeking help online mainly due to their preference to seek help face to face, and due to their lack of trust in the internet or those using it. Idles and Transmitters are willing to seek help online mostly from friends and family. In addition, they are willing seek help online mainly regarding questions concerning military or civil service. They consider the most important facilitators for seeking help online as confidentiality and reliability. The present study’s main contribution is exploring the role of providing online help in understanding the adolescent behavior of seeking help online. In addition, the results of the present study have practical implications for the work of mental health providers, such as counseling psychologists and online mental health support.Keywords: adolescents, counseling, online help-seeking, online help-providing
Procedia PDF Downloads 163