Search results for: popular opinion
736 A Survey of WhatsApp as a Tool for Instructor-Learner Dialogue, Learner-Content Dialogue, and Learner-Learner Dialogue
Authors: Ebrahim Panah, Muhammad Yasir Babar
Abstract:
Thanks to the development of online technology and social networks, people are able to communicate as well as learn. WhatsApp is a popular social network which is growingly gaining popularity. This app can be used for communication as well as education. It can be used for instructor-learner, learner-learner, and learner-content interactions; however, very little knowledge is available on these potentials of WhatsApp. The current study was undertaken to investigate university students’ perceptions of WhatsApp used as a tool for instructor-learner dialogue, learner-content dialogue, and learner-learner dialogue. The study adopted a survey approach and distributed the questionnaire developed by Google Forms to 54 (11 males and 43 females) university students. The obtained data were analyzed using SPSS version 20. The result of data analysis indicates that students have positive attitudes towards WhatsApp as a tool for Instructor-Learner Dialogue: it easy to reach the lecturer (4.07), the instructor gives me valuable feedback on my assignment (4.02), the instructor is supportive during course discussion and offers continuous support with the class (4.00). Learner-Content Dialogue: WhatsApp allows me to academically engage with lecturers anytime, anywhere (4.00), it helps to send graphics such as pictures or charts directly to the students (3.98), it also provides out of class, extra learning materials and homework (3.96), and Learner-Learner Dialogue: WhatsApp is a good tool for sharing knowledge with others (4.09), WhatsApp allows me to academically engage with peers anytime, anywhere (4.07), and we can interact with others through the use of group discussion (4.02). It was also found that there are significant positive correlations between students’ perceptions of Instructor-Learner Dialogue (ILD), Learner-Content Dialogue (LCD), Learner-Learner Dialogue (LLD) and WhatsApp Application in classroom. The findings of the study have implications for lectures, policy makers and curriculum developers.Keywords: instructor-learner dialogue, learners-contents dialogue, learner-learner dialogue, whatsapp application
Procedia PDF Downloads 158735 Teachers' Experience for Improving Fine Motor Skills of Children with Down Syndrome in the Context of Special Education in Southern Province of Sri Lanka
Authors: Sajee A. Gamage, Champa J. Wijesinghe, Patricia Burtner, Ananda R. Wickremasinghe
Abstract:
Background: Teachers working in the context of special education have an enormous responsibility of enhancing performance skills of children in their classroom settings. Fine Motor Skills (FMS) are essential functional skills for children to gain independence in Activities of Daily Living. Children with Down Syndrome (DS) are predisposed to specific challenges due to deficits in FMS. This study is aimed to determine the teachers’ experience on improving FMS of children with DS in the context of special education of Southern Province, Sri Lanka. Methodology: A cross-sectional study was conducted among all consenting eligible teachers (n=147) working in the context of special education in government schools of Southern Province of Sri Lanka. A self-administered questionnaire was developed based on literature and expert opinion to assess teachers’ experience regarding deficits of FMS, limitations of classroom activity performance and barriers to improve FMS of children with DS. Results: Approximately 93% of the teachers were females with a mean age ( ± SD) of 43.1 ( ± 10.1) years. Thirty percent of the teachers had training in special educationand 83% had children with DS in their classrooms. Major deficits of FMS reported were deficits in grasping (n=116; 79%), in-hand manipulation (n=103; 70%) and bilateral hand use (n=99; 67.3%). Paperwork (n=70; 47.6%), painting (n=58; 39.5%), scissor work (n=50; 34.0%), pencil use for writing (n=45; 30.6%) and use of tools in the classroom (n=41; 27.9%) were identified as major classroom performance limitations of children with DS. Parental factors (n=67; 45.6%), disease specific characteristics (n=58; 39.5%) and classroom factors (n=36; 24.5%), were identified as major barriers to improve FMS in the classroom setting. Lack of resources and standard tools, social stigma and late school admission were also identified as barriers to FMS training. Eighty nine percent of the teachers informed that training fine motor activities in a special education classroom was more successful than work with normal classroom setting. Conclusion: Major areas of FMS deficits were grasping, in-hand manipulation and bilateral hand use; classroom performance limitations included paperwork, painting and scissor work of children with DS. Teachers recommended regular practice of fine motor activities according to individual need. Further research is required to design a culturally specific FMS assessment tool and intervention methods to improve FMS of children with DS in Sri Lanka.Keywords: classroom activities, Down syndrome, experience, fine motor skills, special education, teachers
Procedia PDF Downloads 153734 Investigating the Effectiveness of a 3D Printed Composite Mold
Authors: Peng Hao Wang, Garam Kim, Ronald Sterkenburg
Abstract:
In composite manufacturing, the fabrication of tooling and tooling maintenance contributes to a large portion of the total cost. However, as the applications of composite materials continue to increase, there is also a growing demand for more tooling. The demand for more tooling places heavy emphasis on the industry’s ability to fabricate high quality tools while maintaining the tool’s cost effectiveness. One of the popular techniques of tool fabrication currently being developed utilizes additive manufacturing technology known as 3D printing. The popularity of 3D printing is due to 3D printing’s ability to maintain low material waste, low cost, and quick fabrication time. In this study, a team of Purdue University School of Aviation and Transportation Technology (SATT) faculty and students investigated the effectiveness of a 3D printed composite mold. A steel valve cover from an aircraft reciprocating engine was modeled utilizing 3D scanning and computer-aided design (CAD) to create a 3D printed composite mold. The mold was used to fabricate carbon fiber versions of the aircraft reciprocating engine valve cover. The carbon fiber valve covers were evaluated for dimensional accuracy and quality while the 3D printed composite mold was evaluated for durability and dimensional stability. The data collected from this study provided valuable information in the understanding of 3D printed composite molds, potential improvements for the molds, and considerations for future tooling design.Keywords: additive manufacturing, carbon fiber, composite tooling, molds
Procedia PDF Downloads 114733 Reasons for Adhesion of Membership: A Case Study of Brazilian Soccer Team
Authors: Alexandre Olkoski, Marcelo Curth
Abstract:
Football in Brazil is considered a passion, being the most popular sport in the country, both by the consumer public and by the means of communication that divulge it individually, when compared with other sports modalities. In the last two decades, the soccer teams have given greater importance to the management, since they understood that the same should be managed as a company, but with peculiarities related to the business. In this sense, Brazilian soccer clubs started to make bigger investments for the adhesion of fans in their social frames, allowing a greater need of understanding about the profile of this group of fans/clients. Thus, this work aims to understand the reasons that cause the fans to join the club and identify variables present in the process of intention to join the club. For that, a qualitative exploratory research was conducted, in which thirty-one membership of a soccer club from southern Brazil were interviewed. Based on the interviews, five categories were classified as emotional aspects (passion and love), cognitive aspects (easy access to the stadium and promotional values in tickets), external influences (family and friends), situational aspects (club moment) and aspects related to the event (engagement by modality). As results found in the analysis, it can be highlighted that the motivation of the majority of the respondents to become a member of the analyzed club, is related to the emotional aspects, such as passion and love. Thus, it is perceived that sport, in the case of soccer, generates in the involved ones (fans and leaders) different manifestations, suggesting that the management of this type of business has great complexity and should not be observed only by the spectrum of the club like a business.Keywords: consumer behavior, marketing, membership, soccer
Procedia PDF Downloads 333732 Behavioral Response of Dogs to Interior Environment: An Exploratory Study on Design Parameters for Designing Dog Boarding Centers in Indian Context
Authors: M. R. Akshaya, Veena Rao
Abstract:
Pet population in India is increasing phenomenally owing to the changes in urban lifestyle with increasing number of single professionals, single parents, delayed parenthood etc. The animal companionship as a means of reducing stress levels, deriving emotional support, and unconditional love provided by dogs are a few reasons attributed for increasing pet ownership. The consequence is the booming of the pet care products and dog care centers catering to the different requirements of rearing the pets. Dog care centers quite popular in tier 1 metros of India cater to the requirement of the dog owners providing space for the dogs in absence of the owner. However, it is often reported that the absence of the owner leads to destructive and exploratory behavior issues; the main being the anxiety disorders. In the above context, it becomes imperative for a designer to design dog boarding centers that help in reducing the separation anxiety in dogs keeping in mind the different interior design parameters. An exploratory research with focus group discussion is employed involving a group of dog owners, behaviorists, proprietors of day care as well as boarding centers, and veterinarians to understand their perception on the significance of different interior parameters of color, texture, ventilation, aroma therapy and acoustics as a means of reducing the stress levels in dogs sent to the boarding centers. The data collected is organized as thematic networks thus enabling the listing of the interior design parameters that needs to be considered in designing dog boarding centers.Keywords: behavioral response, design parameters, dog boarding centers, interior environment
Procedia PDF Downloads 204731 Criminal Law Instruments to Counter Corporate Crimes in Poland
Authors: Dorota Habrat
Abstract:
In Polish law, the idea of the introduction of corporate responsibility for crimes is becoming more popular and creates a lot of questions. The need to introduce into the Polish legal system liability of corporate (collective entities) has resulted, among others, from the Polish Republic's international commitments, in particular related to membership in the European Union. The Act of 28 October 2002 on the liability of collective entities for acts prohibited under penalty is one of the example of adaptation of Polish law to Community law. Introduction to Polish law a criminal nature liability of corporations (legal persons) has resulted in a lot of controversy and lack of acceptance from both the scientific community as well as the judiciary. The responsibility of collective entities under the Act has a criminal nature. The main question concerns the ability of the collective entity to be brought to guilt under criminal law sense. Polish criminal law knows only the responsibility of individual persons. So far, guilt as a personal feature of action, based on the ability of the offender to feel in his psyche, could be considered only in relation to the individual person, while the said Act destroyed this conviction. Guilt of collective entity must be proven under at least one of the three possible forms: the guilt in the selection or supervision and so called organizational guilt. The next question is how the principle of proportionality in relation to criminal measures in response of collective entities should be considered. It should be remembered that the legal subjectivity of collective entities, including their rights and freedoms, is an emanation of the rights and freedoms of individual persons which create collective entities and through these entities implement their rights and freedoms. The adopted Act largely reflects the international legal regulations but also contains the unknown and original legislative solutions.Keywords: criminal corporate responsibility, Polish criminal law, legislative solutions, Act of 28 October 2002
Procedia PDF Downloads 505730 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies
Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk
Abstract:
Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, this project proposes AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project presents the best-in-school techniques used to preserve the data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptographic techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures and identifies potential correction/mitigation measures.Keywords: data privacy, artificial intelligence (AI), healthcare AI, data sharing, healthcare organizations (HCOs)
Procedia PDF Downloads 93729 Continuous FAQ Updating for Service Incident Ticket Resolution
Authors: Kohtaroh Miyamoto
Abstract:
As enterprise computing becomes more and more complex, the costs and technical challenges of IT system maintenance and support are increasing rapidly. One popular approach to managing IT system maintenance is to prepare and use an FAQ (Frequently Asked Questions) system to manage and reuse systems knowledge. Such an FAQ system can help reduce the resolution time for each service incident ticket. However, there is a major problem where over time the knowledge in such FAQs tends to become outdated. Much of the knowledge captured in the FAQ requires periodic updates in response to new insights or new trends in the problems addressed in order to maintain its usefulness for problem resolution. These updates require a systematic approach to define the exact portion of the FAQ and its content. Therefore, we are working on a novel method to hierarchically structure the FAQ and automate the updates of its structure and content. We use structured information and the unstructured text information with the timelines of the information in the service incident tickets. We cluster the tickets by structured category information, by keywords, and by keyword modifiers for the unstructured text information. We also calculate an urgency score based on trends, resolution times, and priorities. We carefully studied the tickets of one of our projects over a 2.5-year time period. After the first 6 months, we started to create FAQs and confirmed they improved the resolution times. We continued observing over the next 2 years to assess the ongoing effectiveness of our method for the automatic FAQ updates. We improved the ratio of tickets covered by the FAQ from 32.3% to 68.9% during this time. Also, the average time reduction of ticket resolution was between 31.6% and 43.9%. Subjective analysis showed more than 75% reported that the FAQ system was useful in reducing ticket resolution times.Keywords: FAQ system, resolution time, service incident tickets, IT system maintenance
Procedia PDF Downloads 338728 DLtrace: Toward Understanding and Testing Deep Learning Information Flow in Deep Learning-Based Android Apps
Authors: Jie Zhang, Qianyu Guo, Tieyi Zhang, Zhiyong Feng, Xiaohong Li
Abstract:
With the widespread popularity of mobile devices and the development of artificial intelligence (AI), deep learning (DL) has been extensively applied in Android apps. Compared with traditional Android apps (traditional apps), deep learning based Android apps (DL-based apps) need to use more third-party application programming interfaces (APIs) to complete complex DL inference tasks. However, existing methods (e.g., FlowDroid) for detecting sensitive information leakage in Android apps cannot be directly used to detect DL-based apps as they are difficult to detect third-party APIs. To solve this problem, we design DLtrace; a new static information flow analysis tool that can effectively recognize third-party APIs. With our proposed trace and detection algorithms, DLtrace can also efficiently detect privacy leaks caused by sensitive APIs in DL-based apps. Moreover, using DLtrace, we summarize the non-sequential characteristics of DL inference tasks in DL-based apps and the specific functionalities provided by DL models for such apps. We propose two formal definitions to deal with the common polymorphism and anonymous inner-class problems in the Android static analyzer. We conducted an empirical assessment with DLtrace on 208 popular DL-based apps in the wild and found that 26.0% of the apps suffered from sensitive information leakage. Furthermore, DLtrace has a more robust performance than FlowDroid in detecting and identifying third-party APIs. The experimental results demonstrate that DLtrace expands FlowDroid in understanding DL-based apps and detecting security issues therein.Keywords: mobile computing, deep learning apps, sensitive information, static analysis
Procedia PDF Downloads 177727 Authentic Visual Resources for the Foreign Language Classroom
Authors: O. Yeret
Abstract:
Visual resources are all around us, especially in today's media-driven world, which gravitates, more and more, towards the visual. As a result, authentic resources, such as television advertisements, become testaments – authentic cultural materials – that reflect the landscape of certain groups and communities during a specific point in time. Engaging language students with popular advertisements can provide a great opportunity for developing cultural awareness, a component that is sometimes overlooked in the foreign language classroom. This paper will showcase practical examples of using Israeli Television Ads in various Modern Hebrew language courses. Several approaches for combining the study of language and culture, through the use of advertisements, will be included; for example, targeted assignments based on students' proficiency levels, such as: asking to recognize vocabulary words and answer basic information questions, as opposed to commenting on the significance of an ad and analyzing its particular cultural elements. The use of visual resources in the language classroom does not only enable students to learn more about the culture of the target language, but also to combine their language skills. Most often, interacting with an ad requires close listening and some reading (through captions or other data). As students analyze the ad, they employ their writing and speaking skills by answering questions in text or audio form. Hence, these interactions are able to elicit complex language use across the four domains: listening, speaking, writing, and reading. This paper will include examples of practical assignments that were developed for several Modern Hebrew language courses, together with the specific advertisements and questions related to them. Conclusions from the process and recent feedback notes received from students regarding the use of visual resources will be mentioned as well.Keywords: authentic materials, cultural awareness, second language acquisition, visual resources
Procedia PDF Downloads 108726 Performance Evaluation and Comparison between the Empirical Mode Decomposition, Wavelet Analysis, and Singular Spectrum Analysis Applied to the Time Series Analysis in Atmospheric Science
Authors: Olivier Delage, Hassan Bencherif, Alain Bourdier
Abstract:
Signal decomposition approaches represent an important step in time series analysis, providing useful knowledge and insight into the data and underlying dynamics characteristics while also facilitating tasks such as noise removal and feature extraction. As most of observational time series are nonlinear and nonstationary, resulting of several physical processes interaction at different time scales, experimental time series have fluctuations at all time scales and requires the development of specific signal decomposition techniques. Most commonly used techniques are data driven, enabling to obtain well-behaved signal components without making any prior-assumptions on input data. Among the most popular time series decomposition techniques, most cited in the literature, are the empirical mode decomposition and its variants, the empirical wavelet transform and singular spectrum analysis. With increasing popularity and utility of these methods in wide ranging applications, it is imperative to gain a good understanding and insight into the operation of these algorithms. In this work, we describe all of the techniques mentioned above as well as their ability to denoise signals, to capture trends, to identify components corresponding to the physical processes involved in the evolution of the observed system and deduce the dimensionality of the underlying dynamics. Results obtained with all of these methods on experimental total ozone columns and rainfall time series will be discussed and comparedKeywords: denoising, empirical mode decomposition, singular spectrum analysis, time series, underlying dynamics, wavelet analysis
Procedia PDF Downloads 116725 Treaties-Fulfilled or Breached: A Study for Peacefulness of Religions
Authors: Syed A. Alam, Arifa Bilal
Abstract:
A propagated wave of barbaric and injustice Muslims has been popularized by the International powers in the recent past to divert the winning force of Muslims in the Afghan war against Russia. It is a tactic to demolish the power of Jihaad and the religious image of Islam. The propaganda picturized that Muslims were not peaceful or trustworthy people by displaying some brutal actions of a little number of funded people. The word ‘Islam’ is titled as ‘complete codes of life’ because of the peacefulness and trustworthiness of these codes for whole lives. These codes help the whole of humanity beyond the boundaries of any religion, sect, creed, color, geography, or race to lead their lives peacefully and trustfully. The human beings who act upon these codes of life, Islam, can be called Muslims. Those people are not Muslims who do not act upon these codes of life. History is evident that the Muslims proved themselves, collectively, that they are acting upon these codes of life. In this article, an analytical study was conducted regarding popular treaties signed between Muslims and non-Muslim communities in different times and regions on different matters. The study included the treaties of Hudabiyah Treaty, Mithaq-e-Madinah, Lucknow Pact, Indus Water Pact, Air Space Violation Treaty, Gallipoli Treaty, Amity Treaty, US-Russia Peace Treaty, and Wadi Arab Peace Treaty. After critical analysis of these treaties, it can be clearly concluded that Muslims fulfilled these treatises, but non-Muslim stakeholders of these treaties broke these treaties in one aspect or many and in the start or later. It can be concluded that the history of treaties between Muslim and non-Muslim communities declared that Muslims had fulfilled these treaties and pacts, so they are more trustworthy and peaceful people.Keywords: fulfilled treaties, Muslim and non-muslim pacts, Islam and peacefulness, Islam and treaties
Procedia PDF Downloads 131724 Identity and Disability in Contemporary East Asian Dance
Authors: Sanghyun Park
Abstract:
Influenced by the ideas of collectivism, East Asian contemporary dance is marked by an emphasis on unity and synchronization. A growing element of this discipline that disrupts the path that strives to attain perfection, requiring coordination between multiple parties in order to produce work of their highest artistic potential, with the support from individuals or groups is the presence of disabled dancers. Kawanaka Yo, a Japanese dancer with a mental disability, argues through her '“Dance of Peace' that a dancer should focus on her impulses and natural thoughts through improvisational dancing and eschewal of documentation. Professor and poet Jung-Gyu Jeong, co-founder of the Korea Disability International Art Company, demonstrates with his company’s modernized performances of popular works and musicals that disabled artists do not need perfection so long as they can assert their finesse to mimic or create an equivalence with able-bodied dancers. Yo has studied various forms of modern dance and ballet in Japan and has used her training to ease her mental disability but also accept her handicap as an extension of her identity, representing a trend in disabled dance that favors individuality and acceptance. In contrast, Jeong is an influential figure in South Korea for disabled dancers and artists, believing that disabled artists must overcome a certain threshold in order to reach a status as an artist that is equivalent to a 'normal artist.' East Asian art created by the disabled should not be judged according to different criteria or rubrics compared to able-bodied artists because, as Yo explains, a person’s identity and her handicaps characterize the meaning of, and the value of, the piece.Keywords: disability studies, modern dance, East Asia, politics of identity
Procedia PDF Downloads 208723 Fault Tolerant Control of the Dynamical Systems Based on Internal Structure Systems
Authors: Seyed Mohammad Hashemi, Shahrokh Barati
Abstract:
The problem of fault-tolerant control (FTC) by accommodation method has been studied in this paper. The fault occurs in any system components such as actuators, sensors or internal structure of the system and leads to loss of performance and instability of the system. When a fault occurs, the purpose of the fault-tolerant control is designate strategy that can keep the control loop stable and system performance as much as possible perform it without shutting down the system. Here, the section of fault detection and isolation (FDI) system has been evaluated with regard to actuator's fault. Designing a fault detection and isolation system for a multi input-multi output (MIMO) is done by an unknown input observer, so the system is divided to several subsystems as the effect of other inputs such as disturbing given system state equations. In this observer design method, the effect of these disturbances will weaken and the only fault is detected on specific input. The results of this approach simulation can confirm the ability of the fault detection and isolation system design. After fault detection and isolation, it is necessary to redesign controller based on a suitable modification. In this regard after the use of unknown input observer theory and obtain residual signal and evaluate it, PID controller parameters redesigned for iterative. Stability of the closed loop system has proved in the presence of this method. Also, In order to soften the volatility caused by Annie variations of the PID controller parameters, modifying Sigma as a way acceptable solution used. Finally, the simulation results of three tank popular example confirm the accuracy of performance.Keywords: fault tolerant control, fault detection and isolation, actuator fault, unknown input observer
Procedia PDF Downloads 452722 The Influence of Class and Gender on the Capitalist Patriarchal Society in Fitzgerald’s “The Great Gatsby”: A Marxist Feminist Perspective
Authors: Atousa Mirzapour Kouhdasht
Abstract:
The Great Gatsby is a 1925 novel set in the Jazz Age on Long Island by American writer F. Scott Fitzgerald. The novel depicts interactions between the first-person narrator, Nick Carraway, and his mysterious millionaire neighbor, Jay Gatsby, and his obsession to reunite with his former lover, Daisy Buchanan. During World War II, the Council on Books in Wartime sent free copies to American soldiers, so the novel experienced an unanticipated wave in popularity. This newfound popularity brought up critical literary re-examination. The work soon became a part of most American high school curricula and, as a result, a part of American popular culture. Multiple adaptations, on stage and screen, followed in the succeeding decades. The novel's treatment of social class, old money versus those who do not have familial wealth, gender, race, and its cynical attitude towards the American Dream is now a matter of discussion. The old money does not allow the new money to present itself due to its fear of changes. Although Gatsby is now a wealthy man who throws many parties, he is not considered equal to Thomas Buchanan, Daisy's husband, a millionaire who lives in East Egg. Even Gatsby feels shame when it comes to the history of his family, who was not actually from the bourgeoisie. Furthermore, the patriarchal system restrains women's behavior in society and puts them in the second position after men to follow what men ask them to do. The female characters are not able to make decisions for themselves. So the researcher uses The Great Gatsby, patriarchal theory, and Marxist feminist perspective to investigate the influence of gender and social status on women's position in a patriarchal society.Keywords: Marxist, feminist, class status, gender, the American dream, The Great Gatsby, Fitzgerald
Procedia PDF Downloads 121721 Identification of Spam Keywords Using Hierarchical Category in C2C E-Commerce
Authors: Shao Bo Cheng, Yong-Jin Han, Se Young Park, Seong-Bae Park
Abstract:
Consumer-to-Consumer (C2C) E-commerce has been growing at a very high speed in recent years. Since identical or nearly-same kinds of products compete one another by relying on keyword search in C2C E-commerce, some sellers describe their products with spam keywords that are popular but are not related to their products. Though such products get more chances to be retrieved and selected by consumers than those without spam keywords, the spam keywords mislead the consumers and waste their time. This problem has been reported in many commercial services like e-bay and taobao, but there have been little research to solve this problem. As a solution to this problem, this paper proposes a method to classify whether keywords of a product are spam or not. The proposed method assumes that a keyword for a given product is more reliable if the keyword is observed commonly in specifications of products which are the same or the same kind as the given product. This is because that a hierarchical category of a product in general determined precisely by a seller of the product and so is the specification of the product. Since higher layers of the hierarchical category represent more general kinds of products, a reliable degree is differently determined according to the layers. Hence, reliable degrees from different layers of a hierarchical category become features for keywords and they are used together with features only from specifications for classification of the keywords. Support Vector Machines are adopted as a basic classifier using the features, since it is powerful, and widely used in many classification tasks. In the experiments, the proposed method is evaluated with a golden standard dataset from Yi-han-wang, a Chinese C2C e-commerce, and is compared with a baseline method that does not consider the hierarchical category. The experimental results show that the proposed method outperforms the baseline in F1-measure, which proves that spam keywords are effectively identified by a hierarchical category in C2C e-commerce.Keywords: spam keyword, e-commerce, keyword features, spam filtering
Procedia PDF Downloads 294720 Implementing Service Learning in the Health Education Curriculum
Authors: Karen Butler
Abstract:
Johnson C. Smith University, one of the nation’s oldest Historically Black Colleges and Universities, has a strong history of service learning and community service. We first integrated service learning and peer education into health education courses in the spring of 2000. Students enrolled in the classes served as peer educators for the semester. Since then, the program has evolved and expanded but remains an integral part of several courses. The purpose of this session is to describe our program in terms of development, successes, and obstacles, and feedback received. A detailed description of the service learning component in HED 235: Drugs and Drug Education and HED 337: Environmental Health will be provided. These classes are required of our Community Health majors but are also popular electives for students in other disciplines. Three sources of student feedback were used to evaluate and continually modify the component: the SIR II course evaluation, service learning reflection papers, and focus group interviews. Student feedback has been largely positive. When criticism was given, it was thoughtful and constructive – given in the spirit of making it better for the next group. Students consistently agreed that the service learning program increased their awareness of pertinent health issues; that both the service providers and service recipients benefited from the project; and that the goals/issues targeted by the service learning component fit the objectives of the course. Also, evidence of curriculum and learning enhancement was found in the reflection papers and focus group sessions. Service learning sets up a win-win situation. It provides a way to respond to campus and community health needs while enhancing the curriculum, as students learn more by doing things that benefit the health and wellness of others. Service learning is suitable for any health education course and any target audience would welcome the effort.Keywords: black colleges, community health, health education, service learning
Procedia PDF Downloads 340719 The Evolution of the Israel Defence Forces’ Information Operations: A Case Study of the Israel Defence Forces' Activities in the Information Domain 2006–2014
Authors: Teemu Saressalo
Abstract:
This article examines the evolution of the Israel Defence Forces’ information operation activities during an eight-year timespan from the 2006 war with Hezbollah to more recent operations such as Pillar of Defence and Protective Edge. To this end, the case study will show a change in the Israel Defence Forces’ activities in the information domain. In the 2006 war with Hezbollah in Lebanon, Israel inflicted enormous damage on the Lebanese infrastructure, leaving more than 1,200 people dead and 4,400 injured. Casualties among Hezbollah, Israel’s main adversary, were estimated to range from 250 to 700 fighters. Damage to the Lebanese infrastructure was estimated at over USD 2.5bn, with almost 2,000 houses and buildings damaged and destroyed. Even this amount of destruction did not force Hezbollah to yield and while both sides were claiming victory in the war, Israel paid a heavier price in political backlashes and loss of reputation, mainly due to failures in the media and the way in which the war was portrayed and perceived in Israel and abroad. Much of this can be credited to Hezbollah’s efficient use of the media, and Israel’s failure to do so. Israel managed the next conflict it was engaged in completely differently – it had learnt its lessons and built up new ways to counter its adversary’s propaganda and media operations. In Operation Cast Lead at the turn of 2009, Hamas, Israel’s adversary and Gaza’s dominating faction, was not able to utilize the media in the same way that Hezbollah had. By creating a virtual and physical barrier around the Gaza Strip, Israel almost totally denied its adversary access to the worldwide media, and by restricting the movement of journalists in the area, Israel could let its voice be heard above all. The operation Cast Lead began with a deception operation, which caught Hamas totally off guard. The 21-day campaign left the Gaza Strip devastated, but did not cause as much protest in Israel during the operation as the 2006 war did, mainly due to almost total Israeli dominance in the information dimension. The most important outcome from the Israeli perspective was the fact that Operation Cast Lead was assessed to be a success and the operation enjoyed domestic support along with support from many western nations, which had condemned Israeli actions in the 2006 war. Later conflicts have shown the same tendency towards virtually total dominance in the information domain, which has had an impact on target audiences across the world. Thus, it is clear that well-planned and conducted information operations are able to shape public opinion and influence decision-makers, although Israel might have been outpaced by its rivals.Keywords: Hamas, Hezbollah, information operations, Israel Defence Forces
Procedia PDF Downloads 237718 Synthesis and Characterization of Cellulose-Based Halloysite-Carbon Adsorbent
Authors: Laura Frydel, Piotr M. Slomkiewicz, Beata Szczepanik
Abstract:
Triclosan has been used as a disinfectant in many medical products, such as: hand disinfectant soaps, creams, mouthwashes, pastes and household cleaners. Due to its strong antimicrobial activity, triclosan is becoming more and more popular and the consumption of disinfectants with triclosan in it is increasing. As a result, this compound increasingly finds its way into waters and soils in an unchanged form, pollutes the environment and may have a negative effect on organisms. The aim of this study was to investigate the synthesis of cellulose-based halloysite-carbon adsorbent and perform its characterization. The template in the halloysite-carbon adsorbent was halloysite nanotubes and the carbon precursor was microcrystalline cellulose. Scanning electron microscope (SEM) images were obtained and the elementary composition (qualitative and quantitative) of the sample was determined by energy dispersion spectroscopy (EDS). The identification of the crystallographic composition of the halloysite nanotubes and the sample of the halloysite-carbon composite was carried out using the X-ray powder diffraction (XRPD) method. The FTIR spectra were acquired before and after the adsorption process in order to determine the functional groups on the adsorbent surface and confirm the interactions between adsorbent and adsorbate molecules. The parameters of the porous structure of the adsorbent, such as the specific surface area (Brunauer-Emmett-Teller method), the total pore volume and the volume of mesopores and micropores were determined. Total carbon and total organic carbon were also determined in the samples. A cellulose-based halloysite-carbon adsorbent was used to remove triclosan from water. The degree of removal of triclosan from water was approximately 90%. The results indicate that the halloysite-carbon composite can be successfully used as an effective adsorbent for removing triclosan from water.Keywords: Adsorption, cellulose, halloysite, triclosan
Procedia PDF Downloads 128717 The Bayesian Premium Under Entropy Loss
Authors: Farouk Metiri, Halim Zeghdoudi, Mohamed Riad Remita
Abstract:
Credibility theory is an experience rating technique in actuarial science which can be seen as one of quantitative tools that allows the insurers to perform experience rating, that is, to adjust future premiums based on past experiences. It is used usually in automobile insurance, worker's compensation premium, and IBNR (incurred but not reported claims to the insurer) where credibility theory can be used to estimate the claim size amount. In this study, we focused on a popular tool in credibility theory which is the Bayesian premium estimator, considering Lindley distribution as a claim distribution. We derive this estimator under entropy loss which is asymmetric and squared error loss which is a symmetric loss function with informative and non-informative priors. In a purely Bayesian setting, the prior distribution represents the insurer’s prior belief about the insured’s risk level after collection of the insured’s data at the end of the period. However, the explicit form of the Bayesian premium in the case when the prior is not a member of the exponential family could be quite difficult to obtain as it involves a number of integrations which are not analytically solvable. The paper finds a solution to this problem by deriving this estimator using numerical approximation (Lindley approximation) which is one of the suitable approximation methods for solving such problems, it approaches the ratio of the integrals as a whole and produces a single numerical result. Simulation study using Monte Carlo method is then performed to evaluate this estimator and mean squared error technique is made to compare the Bayesian premium estimator under the above loss functions.Keywords: bayesian estimator, credibility theory, entropy loss, monte carlo simulation
Procedia PDF Downloads 334716 Copyright Clearance for Artificial Intelligence Training Data: Challenges and Solutions
Authors: Erva Akin
Abstract:
– The use of copyrighted material for machine learning purposes is a challenging issue in the field of artificial intelligence (AI). While machine learning algorithms require large amounts of data to train and improve their accuracy and creativity, the use of copyrighted material without permission from the authors may infringe on their intellectual property rights. In order to overcome copyright legal hurdle against the data sharing, access and re-use of data, the use of copyrighted material for machine learning purposes may be considered permissible under certain circumstances. For example, if the copyright holder has given permission to use the data through a licensing agreement, then the use for machine learning purposes may be lawful. It is also argued that copying for non-expressive purposes that do not involve conveying expressive elements to the public, such as automated data extraction, should not be seen as infringing. The focus of such ‘copy-reliant technologies’ is on understanding language rules, styles, and syntax and no creative ideas are being used. However, the non-expressive use defense is within the framework of the fair use doctrine, which allows the use of copyrighted material for research or educational purposes. The questions arise because the fair use doctrine is not available in EU law, instead, the InfoSoc Directive provides for a rigid system of exclusive rights with a list of exceptions and limitations. One could only argue that non-expressive uses of copyrighted material for machine learning purposes do not constitute a ‘reproduction’ in the first place. Nevertheless, the use of machine learning with copyrighted material is difficult because EU copyright law applies to the mere use of the works. Two solutions can be proposed to address the problem of copyright clearance for AI training data. The first is to introduce a broad exception for text and data mining, either mandatorily or for commercial and scientific purposes, or to permit the reproduction of works for non-expressive purposes. The second is that copyright laws should permit the reproduction of works for non-expressive purposes, which opens the door to discussions regarding the transposition of the fair use principle from the US into EU law. Both solutions aim to provide more space for AI developers to operate and encourage greater freedom, which could lead to more rapid innovation in the field. The Data Governance Act presents a significant opportunity to advance these debates. Finally, issues concerning the balance of general public interests and legitimate private interests in machine learning training data must be addressed. In my opinion, it is crucial that robot-creation output should fall into the public domain. Machines depend on human creativity, innovation, and expression. To encourage technological advancement and innovation, freedom of expression and business operation must be prioritised.Keywords: artificial intelligence, copyright, data governance, machine learning
Procedia PDF Downloads 83715 Efficiency of Robust Heuristic Gradient Based Enumerative and Tunneling Algorithms for Constrained Integer Programming Problems
Authors: Vijaya K. Srivastava, Davide Spinello
Abstract:
This paper presents performance of two robust gradient-based heuristic optimization procedures based on 3n enumeration and tunneling approach to seek global optimum of constrained integer problems. Both these procedures consist of two distinct phases for locating the global optimum of integer problems with a linear or non-linear objective function subject to linear or non-linear constraints. In both procedures, in the first phase, a local minimum of the function is found using the gradient approach coupled with hemstitching moves when a constraint is violated in order to return the search to the feasible region. In the second phase, in one optimization procedure, the second sub-procedure examines 3n integer combinations on the boundary and within hypercube volume encompassing the result neighboring the result from the first phase and in the second optimization procedure a tunneling function is constructed at the local minimum of the first phase so as to find another point on the other side of the barrier where the function value is approximately the same. In the next cycle, the search for the global optimum commences in both optimization procedures again using this new-found point as the starting vector. The search continues and repeated for various step sizes along the function gradient as well as that along the vector normal to the violated constraints until no improvement in optimum value is found. The results from both these proposed optimization methods are presented and compared with one provided by popular MS Excel solver that is provided within MS Office suite and other published results.Keywords: constrained integer problems, enumerative search algorithm, Heuristic algorithm, Tunneling algorithm
Procedia PDF Downloads 325714 Effects of Bariatric Surgery on Preventing the Progression of Diabetic Retinopathy
Authors: Yunzi Chen, James Laybourne, Sarah Steven, Peter Carey, David Steel, Maria Sandinha
Abstract:
Introduction: Bariatric surgery is popular with the rising incidence of obesity. Its well-known benefits include significant and rapid glycaemic control. However, cases of paradoxical worsening in diabetic retinopathy (DR) despite improved glycaemic control have been reported. Purpose: clarification on the evolution of diabetic retinopathy after bariatric surgery. Method: retrospective study of 40 patients with Type 2 diabetes who underwent bariatric surgery in a UK specialist bariatric unit between 2009 and 2011. Pre-operative and post-operative visual acuity (VA), weight, HbA1c and annual DRSS screening results were analysed. Median follow up was 50 months. Results: No significant change in VA was found during the post-operative period. 85% of patients improved HbA1c post-operatively of which 53% achieved non-diabetic HbA1c of <6.1% - despite this, 2 patients developed new DR. First post-operative screening showed 80% of patients experienced no change, 8% improved but 13% of patients developed new DR (1 case with sight-threatening maculopathy). 80% of these cases persisted up to 24 months. The proportion of patients developing new or worse DR fluctuated over time, peaking at the 3rd annual screening with 26% (15% regressed, 56% stable). The probability of developing new or worse DR postoperatively was significantly associated with a high pre-operative HbA1c (>8%) and male gender. Conclusions: bariatric surgery does not guarantee long-term improvement or prevention of DR. Asymptomatic changes in DR occurred up to 5 years postoperatively. We therefore consider it prudent to continue screening in this cohort of patients.Keywords: bariatric surgery, diabetic retinopathy, obesity, type 2 diabetes mellitus
Procedia PDF Downloads 273713 Unlocking E-commerce: Analyzing User Behavior and Segmenting Customers for Strategic Insights
Authors: Aditya Patil, Arun Patil, Vaishali Patil, Sudhir Chitnis, Anjum Patel
Abstract:
Rapid growth has given e-commerce platforms a lot of client behavior and spending data. To maximize their strategy, businesses must understand how customers utilize online shopping platforms and what influences their purchases. Our research focuses on e-commerce user behavior and purchasing trends. This extensive study examines spending and user behavior. Regression and grouping disclose relevant data from the dataset. We can understand user spending trends via multilevel regression. We can analyze how pricing, user demographics, and product categories affect customer purchase decisions with this technique. Clustering groups consumers by spending. Important information was found. Purchase habits vary by user group. Our analysis illuminates the complex world of e-commerce consumer behavior and purchase trends. Understanding user behavior helps create effective e-commerce marketing strategies. This market can benefit from K-means clustering. This study focuses on tailoring strategies to user groups and improving product and price effectiveness. Customer buying behaviors across categories were shown via K-means clusters. Average spending is highest in Cluster 4 and lowest in Cluster 3. Clothing is less popular than gadgets and appliances around the holidays. Cluster spending distribution is examined using average variables. Our research enhances e-commerce analytics. Companies can improve customer service and decision-making with this data.Keywords: e-commerce, regression, clustering, k-means
Procedia PDF Downloads 18712 The Effect of Using Universal Design for Learning to Improve the Quality of Vocational Programme with Intellectual Disabilities and the Challenges Facing This Method from the Teachers' Point of View
Authors: Ohud Adnan Saffar
Abstract:
This study aims to know the effect of using universal design for learning (UDL) to improve the quality of vocational programme with intellectual disabilities (SID) and the challenges facing this method from the teachers' point of view. The significance of the study: There are comparatively few published studies on UDL in emerging nations. Therefore, this study will encourage the researchers to consider a new approaches teaching. Development of this study will contribute significant information on the cognitively disabled community on a universal scope. In order to collect and evaluate the data and for the verification of the results, this study has been used the mixed research method, by using two groups comparison method. To answer the study questions, we were used the questionnaire, lists of observations, open questions, and pre and post-test. Thus, the study explored the advantages and drawbacks, and know about the impact of using the UDL method on integrating SID with students non-special education needs in the same classroom. Those aims were realized by developing a workshop to explain the three principles of the UDL and train (16) teachers in how to apply this method to teach (12) students non-special education needs and the (12) SID in the same classroom, then take their opinion by using the questionnaire and questions. Finally, this research will explore the effects of the UDL on the teaching of professional photography skills for the SID in Saudi Arabia. To achieve this goal, the research method was a comparison of the performance of the SID using the UDL method with that of female students with the same challenges applying other strategies by teachers in control and experiment groups, we used the observation lists, pre and post-test. Initial results: It is clear from the previous response to the participants that most of the answers confirmed that the use of UDL achieves the principle of inclusion between the SID and students non-special education needs by 93.8%. In addition, the results show that the majority of the sampled people see that the most important advantages of using UDL in teaching are creating an interactive environment with using new and various teaching methods, with a percentage of 56.2%. Following this result, the UDL is useful for integrating students with general education, with a percentage of 31.2%. Moreover, the finding indicates to improve understanding through using the new technology and exchanging the primitive ways of teaching with the new ones, with a percentage of 25%. The result shows the percentages of the sampled people's opinions about the financial obstacles, and it concluded that the majority see that the cost is high and there is no computer maintenance available, with 50%. There are no smart devices in schools to help in implementing and applying for the program, with a percentage of 43.8%.Keywords: universal design for learning, intellectual disabilities, vocational programme, the challenges facing this method
Procedia PDF Downloads 129711 Graphene Based Materials as Novel Membranes for Water Desalination and Boron Separation
Authors: Francesca Risplendi, Li-Chiang Lin, Jeffrey C. Grossman, Giancarlo Cicero
Abstract:
Desalination is one of the most employed approaches to supply water in the context of a rapidly growing global water shortage. However, the most popular water filtration method available is the reverse osmosis (RO) technique, still suffers from important drawbacks, such as a large energy demands and high process costs. In addition some serious limitations have been recently discovered, among them, the boron problem seems to have a critical meaning. Boron has been found to have a dual effect on the living systems on Earth and the difference between boron deficiency and boron toxicity levels is quite small. The aim of this project is to develop a new generation of RO membranes based on porous graphene or reduced graphene oxide (rGO) able to remove salts from seawater and to reduce boron concentrations in the permeate to the level that meets the drinking or process water requirements, by means of a theoretical approach based on density functional theory and classical molecular dynamics. Computer simulations have been employed to investigate the relationship between the atomic structure of nanoporous graphene or rGO monolayer and its membrane properties in RO applications (i.e. water permeability and resilience at RO pressures). In addition, an emphasis has been given to multilayer nanoporous rGO and rGO flakes based membranes. By means of non-equilibrium MD simulations, we investigated the water transport mechanism permeating through such multilayer membrane focusing on the effect of slit widths and sheet geometries. These simulations allowed us to establish the implications of these graphene based materials as promising membrane properties for desalination plants and as boron filtration.Keywords: boron filtration, desalination, graphene membrane, reduced graphene oxide membrane
Procedia PDF Downloads 299710 An Exploration of the Place of Buddhism in the Tham Luang Cave Rescue and Its Aftermath
Authors: Hamish de Nett
Abstract:
On 23rd June 2018, twelve young footballers from the Wild Boar Academy and their coach went to explore the Tham Luang cave in the Doi Nang Non mountain range in Chiang Rai Province, Northern Thailand. Whilst they were inside the cave, monsoon rains hit, and the complex became partially flooded. In the following days, Thai Navy SEALs and an international team of expert divers assembled at the cave complex in order to rescue the boys. Although it was only marginally reported in the Western press, Buddhism and ritual activities played a major role in the rescue and its aftermath. This paper utilises numerous news articles and books written by reporters who covered the cave rescue to uncover what the place of Buddhism was in the Tham Luang cave rescue. This paper initially sets out the development of Thai Buddhism and the Thai nation state, paying particular note to the tension in Thai Buddhism between Buddhism as it is popularly practised and normative, state-favoured Buddhism. Secondly, this paper demonstrates that, during the Tham Luang cave rescue, Buddhism helped people cope with the disaster, provided an explanation for its occurrence, and allowed bystanders some efficacy in the process. Thirdly, this paper discusses how Buddhism helped people to give thanks after the rescue, achieve reconciliation, and gain closure. Finally, this paper analyses how the government and the political sphere utilised Buddhism during the rescue. The conclusion reached is that the Buddhism practiced during the Tham Luang cave rescue and its aftermath is representative of the wider tension between popular Buddhism and normative state-favoured Buddhism that is currently present within Thai Buddhism and has been for centuries.Keywords: cave rescue, contemporary Buddhism, lived religion, Thai Buddhism, Tham Luang cave rescue
Procedia PDF Downloads 129709 The Concept of Accounting in Islamic Transactions
Authors: Ahmad Abdulkadir Ibrahim
Abstract:
The Islamic law of transactions laid down the methods and instruments of accounting and analyzed its basic assumptions in the modern world. There is a need to examine the implications of accounting initiatives in the Muslim world and attempt to outline the important characteristics of Islamic accounting and how Islamic accounting resolves the problem of measuring the cost of Murabaha goods in case of exchange rate variation. The research tends to discuss an analytical approach to the Islamic accounting concept as well as elaborating the jurisprudential matter and practical aspects of accounting in Islamic financial transactions. It also aims to alert the practitioners of accounting in the Islamic world to be aware of the concept of accounting in Islamic jurisprudence and its historical development. The methodology adopted in this research is the qualitative method through the consultation of relevant literature, which focuses on the thematic study of the subject matter. This is followed by an analysis and discussion of the contents of the materials used. It is concluded that Islamic accounting is unique in its norms as it has been characterized by fairness, accuracy in measuring tools, truthfulness, mutual trust, moderation in making a profit, and tolerance. It was also qualified by capacity and flexibility in terms of the tools and terminology used and invented by Islamic jurisprudence in the accounting system, which indicates its validity and consistency anytime and anywhere. An important conclusion of the research also lies in the refutation of the popular idea that an Italian writer known as Luca Pacilio was the first writer who developed the basis of double-entry due to the presented proofs by Muslim scholars of critical accounting developments, which cannot be ignored. It concludes further that Islamic jurisprudence draws the accounting system codified in the foundations of a market that is far from usury, fraud, cheating, and unfair competition in all areas.Keywords: accounting, Islamic accounting, Islamic transactions, Islamic jurisprudence, double entry, murabaha, characteristics
Procedia PDF Downloads 64708 Study of Expatriation as Countermeasure to Citizenship-Based Taxation
Authors: Gabriele Palumbo
Abstract:
This research empirically examines some of the reasons behind the fact that recently the number of people giving up their American citizenship for tax purposes has recently increased drastically. The United States Jurisdiction represents a unicum in the practice of taxing worldwide income not only to residents of the United States but also to U.S. citizens living abroad. The worldwide income taxation also affects people defined as “Accidental Americans” who are unaware that they are U.S. citizens. Those people are considered Americans even though they have not been to the United States. American residents abroad can rely on United States income tax treaties and some national law provisions, such as the exclusion of foreign income and foreign tax credits, which are designed specifically to avoid double taxation. However, this mechanism may prove unsatisfactory for people who have not been linked anymore or individuals who have never had relations with the United States. U.S. citizens who are determined to cut all of the ties between themselves and the United States, especially those that involve tax implications, can renounce their U.S. citizenship with the expatriation procedure. The expatriation process represents the extrema ratio and implicates several steps which must be followed carefully. This paper shows the complexity of the procedure that a U.S. citizen who is resident in a foreign country would have to follow to relinquish U.S. citizenship for tax purposes. The mechanism is intended to discourage people from renounce. Going beyond the question of whether U.S. tax regulation is fair or not, this principle nowadays characterizes a popular topic that many scholars and lawyers are discussing. The outcome provides interesting implications that could induce the Congress to rethink the definition of citizenship for both fiscal and nationality law purposes. Indeed, even if a sort of checks and balances has the task of mitigating the renunciation of U.S. citizenship, more and more U.S. citizens desire to get rid of their citizenship.Keywords: double taxation, expatriation tax, international taxation, relinquishment of United States citizenship
Procedia PDF Downloads 112707 Investigation of Overarching Effects of Artificial Intelligence Implementation into Education Through Research Synthesis
Authors: Justin Bin
Abstract:
Artificial intelligence (AI) has been rapidly rising in usage recently, already active in the daily lives of millions, from distinguished AIs like the popular ChatGPT or Siri to more obscure, inconspicuous AIs like those used in social media or internet search engines. As upcoming generations grow immersed in emerging technology, AI will play a vital role in their development. Namely, the education sector, an influential portion of a person’s early life as a student, faces a vast ocean of possibilities concerning the implementation of AI. The main purpose of this study is to analyze the effect that AI will have on the future of the educational field. More particularly, this study delves deeper into the following three categories: school admissions, the productivity of students, and ethical concerns (role of human teachers, purpose of schooling itself, and significance of diplomas). This study synthesizes research and data on the current effects of AI on education from various published literature sources and journals, as well as estimates on further AI potential, in order to determine the main, overarching effects it will have on the future of education. For this study, a systematic organization of data in terms of type (quantitative vs. qualitative), the magnitude of effect implicated, and other similar factors were implemented within each area of significance. The results of the study suggest that AI stands to change all the beforementioned subgroups. However, its specific effects vary in magnitude and favorability (beneficial or harmful) and will be further discussed. The results discussed will reveal to those affiliated with the education field, such as teachers, counselors, or even parents of students, valuable information on not just the projected possibilities of AI in education but the effects of those changes moving forward.Keywords: artificial intelligence, education, schools, teachers
Procedia PDF Downloads 522