Search results for: minority forms of information processing
14643 Searching for Health-Related Information on the Internet: A Case Study on Young Adults
Authors: Dana Weimann Saks
Abstract:
This study aimed to examine the use of the internet as a source of health-related information (HRI), as well as the change in attitudes following the online search for HRI. The current study sample included 88 participants, randomly divided into two experimental groups. One was given the name of an unfamiliar disease and told to search for information about it using various search engines, and the second was given a text about the disease from a credible scientific source. The study findings show a large percentage of participants used the internet as a source of HRI. Likewise, no differences were found in the extent to which the internet was used as a source of HRI when demographics were compared. Those who searched for the HRI on the internet had more negative opinions and believed symptoms of the disease were worse than the average opinion among those who obtained the information about the disease from a credible scientific source. The Internet clearly influences the participants’ beliefs, regardless of demographic differences.Keywords: health-related information, internet, young adults, HRI
Procedia PDF Downloads 12614642 A Sui Generis Technique to Detect Pathogens in Post-Partum Breast Milk Using Image Processing Techniques
Authors: Yogesh Karunakar, Praveen Kandaswamy
Abstract:
Mother’s milk provides the most superior source of nutrition to a child. There is no other substitute to the mother’s milk. Postpartum secretions like breast milk can be analyzed on the go for testing the presence of any harmful pathogen before a mother can feed the child or donate the milk for the milk bank. Since breast feeding is one of the main causes for transmission of diseases to the newborn, it is mandatory to test the secretions. In this paper, we describe the detection of pathogens like E-coli, Human Immunodeficiency Virus (HIV), Hepatitis B (HBV), Hepatitis C (HCV), Cytomegalovirus (CMV), Zika and Ebola virus through an innovative method, in which we are developing a unique chip for testing the mother’s milk sample. The chip will contain an antibody specific to the target pathogen that will show a color change if there are enough pathogens present in the fluid that will be considered dangerous. A smart-phone camera will then be acquiring the image of the strip and using various image processing techniques we will detect the color development due to antigen antibody interaction within 5 minutes, thereby not adding to any delay, before the newborn is fed or prior to the collection of the milk for the milk bank. If the target pathogen comes positive through this method, then the health care provider can provide adequate treatment to bring down the number of pathogens. This will reduce the postpartum related mortality and morbidity which arises due to feeding infectious breast milk to own child.Keywords: postpartum, fluids, camera, HIV, HCV, CMV, Zika, Ebola, smart-phones, breast milk, pathogens, image processing techniques
Procedia PDF Downloads 22214641 Simulation of a Fluid Catalytic Cracking Process
Authors: Sungho Kim, Dae Shik Kim, Jong Min Lee
Abstract:
Fluid catalytic cracking (FCC) process is one of the most important process in modern refinery indusrty. This paper focuses on the fluid catalytic cracking (FCC) process. As the FCC process is difficult to model well, due to its nonlinearities and various interactions between its process variables, rigorous process modeling of whole FCC plant is demanded for control and plant-wide optimization of the plant. In this study, a process design for the FCC plant includes riser reactor, main fractionator, and gas processing unit was developed. A reactor model was described based on four-lumped kinetic scheme. Main fractionator, gas processing unit and other process units are designed to simulate real plant data, using a process flowsheet simulator, Aspen PLUS. The custom reactor model was integrated with the process flowsheet simulator to develop an integrated process model.Keywords: fluid catalytic cracking, simulation, plant data, process design
Procedia PDF Downloads 45714640 Application of Wireless Sensor Networks: A Survey in Thailand
Authors: Sathapath Kilaso
Abstract:
Nowadays, Today, wireless sensor networks are an important technology that works with Internet of Things. It is receiving various data from many sensor. Then sent to processing or storing. By wireless network or through the Internet. The devices around us are intelligent, can receiving/transmitting and processing data and communicating through the system. There are many applications of wireless sensor networks, such as smart city, smart farm, environmental management, weather. This article will explore the use of wireless sensor networks in Thailand and collect data from Thai Thesis database in 2012-2017. How to Implementing Wireless Sensor Network Technology. Advantage from this study To know the usage wireless technology in many fields. This will be beneficial for future research. In this study was found the most widely used wireless sensor network in agriculture field. Especially for smart farms. And the second is the adoption of the environment. Such as weather stations and water inspection.Keywords: wireless sensor network, smart city, survey, Adhoc Network
Procedia PDF Downloads 20714639 MIMIC: A Multi Input Micro-Influencers Classifier
Authors: Simone Leonardi, Luca Ardito
Abstract:
Micro-influencers are effective elements in the marketing strategies of companies and institutions because of their capability to create an hyper-engaged audience around a specific topic of interest. In recent years, many scientific approaches and commercial tools have handled the task of detecting this type of social media users. These strategies adopt solutions ranging from rule based machine learning models to deep neural networks and graph analysis on text, images, and account information. This work compares the existing solutions and proposes an ensemble method to generalize them with different input data and social media platforms. The deployed solution combines deep learning models on unstructured data with statistical machine learning models on structured data. We retrieve both social media accounts information and multimedia posts on Twitter and Instagram. These data are mapped into feature vectors for an eXtreme Gradient Boosting (XGBoost) classifier. Sixty different topics have been analyzed to build a rule based gold standard dataset and to compare the performances of our approach against baseline classifiers. We prove the effectiveness of our work by comparing the accuracy, precision, recall, and f1 score of our model with different configurations and architectures. We obtained an accuracy of 0.91 with our best performing model.Keywords: deep learning, gradient boosting, image processing, micro-influencers, NLP, social media
Procedia PDF Downloads 18314638 Effects of Financial and Non-Financial Accounting Information Reports on Corporate Credibility and Image of the Listed-Firms in Thailand
Authors: Anocha Rojanapanich
Abstract:
This research investigates the effect of financial accounting information and non-financial accounting reports on corporate credibility via strength of board of directors and market environment volatility as moderating effect. Data in this research is collected by questionnaire form non-financial companies listed on the Stock Exchange of Thailand. Multiple regression statistic technique is used for analyzing the data. Results find that firms with greater financial accounting information reports and non-financial accounting information reports will gain greater corporate credibility. Therefore, the corporate reporting has the value for the firms. Moreover, the strength of board of directors will positively moderate the financial and non-financial accounting information reports and corporate credibility relationship. And market environment volatility will negatively moderate the financial and nonfinancial accounting information reports and corporate credibility relationship and the contribution of accounting information reports on corporate credibility is generated to the corporate image. That is the corporate image has affected by corporate credibility.Keywords: corporate credibility, financial and non-financial reports, firms performance, corporate image
Procedia PDF Downloads 29814637 Role of the Marshes in the Natural Decontamination of Surface Water: A Case of the Redjla Marsh, North-Eastern Algerian
Authors: S. Benessam, T. H. Debieche, A. Drouiche, S. Mahdid, F. Zahi
Abstract:
The marsh is the impermeable depression. It is not very deep and presents the stagnant water. Their water level varies according to the contributions of water (rain, groundwater, stream etc.), when this last reaches the maximum level of the marsh, it flows towards the downstream through the discharge system. The marsh accumulates all the liquid and solid contributions of upstream part. In the North-East Algerian, the Redjla marsh is located on the course of the Tassift river. Its contributions of water come from the upstream part of the river, often characterized by the presence of several pollutants in water related to the urban effluents, and its discharge system supply the downstream part of the river. In order to determine the effect of the marsh on the water quality of the river this study was conducted. A two-monthly monitoring of the physicochemical parameters and water chemistry of the river were carried out, before and after the marsh, during the period from November 2013 to January 2015. The results show that the marsh plays the role of a natural purifier of water of Tassift river, present by drops of conductivity and concentration of the pollutants (ammonium, phosphate, iron, chlorides and bicarbonates) between the upstream part and downstream of the marsh. That indicates that these pollutants are transformed with other chemical forms (case of ammonium towards nitrate), precipitated in complex forms or/and adsorbed by the sediments of the marsh. This storage of the pollutants in the ground of the marsh will be later on a source of pollution for the plants and river water.Keywords: marsh, natural purification, urban pollution, nitrogen
Procedia PDF Downloads 26314636 Analyzing Brand Related Information Disclosure and Brand Value: Further Empirical Evidence
Authors: Yves Alain Ach, Sandra Rmadi Said
Abstract:
An extensive review of literature in relation to brands has shown that little research has focused on the nature and determinants of the information disclosed by companies with respect to the brands they own and use. The objective of this paper is to address this issue. More specifically, the aim is to characterize the nature of the information disclosed by companies in terms of estimating the value of brands and to identify the determinants of that information according to the company’s characteristics most frequently tested by previous studies on the disclosure of information on intangible capital, by studying the practices of a sample of 37 French companies. Our findings suggest that companies prefer to communicate accounting, economic and strategic information in relation to their brands instead of providing financial information. The analysis of the determinants of the information disclosed on brands leads to the conclusion that the groups which operate internationally and have chosen a category 1 auditing firm to communicate more information to investors in their annual report. Our study points out that the sector is not an explanatory variable for voluntary brand disclosure, unlike previous studies on intangible capital. Our study is distinguished by the study of an element that has been little studied in the financial literature, namely the determinants of brand-related information. With regard to the effect of size on brand-related information disclosure, our research does not confirm this link. Many authors point out that large companies tend to publish more voluntary information in order to respond to stakeholder pressure. Our study also establishes that the relationship between brand information supply and performance is insignificant. This relationship is already controversial by previous research, and it shows that higher profitability motivates managers to provide more information, as this strengthens investor confidence and may increase managers' compensation. Our main contribution focuses on the nature of the inherent characteristics of the companies that disclose the most information about brands. Our results show the absence of a link between size and industry on the one hand and the supply of brand information on the other, contrary to previous research. Our analysis highlights three types of information disclosed about brands: accounting, economics and strategy. We, therefore, question the reasons that may lead companies to voluntarily communicate mainly accounting, economic and strategic information in relation to our study from one year to the next and not to communicate detailed information that would allow them to reconstitute the financial value of their brands. Our results can be useful for companies and investors. Our results highlight, to our surprise, the lack of financial information that would allow investors to understand a better valuation of brands. We believe that additional information is needed to improve the quality of accounting and financial information related to brands. The additional information provided in the special report that we recommend could be called a "report on intangible assets”.Keywords: brand related information, brand value, information disclosure, determinants
Procedia PDF Downloads 8414635 Testing Chat-GPT: An AI Application
Authors: Jana Ismail, Layla Fallatah, Maha Alshmaisi
Abstract:
ChatGPT, a cutting-edge language model built on the GPT-3.5 architecture, has garnered attention for its profound natural language processing capabilities, holding promise for transformative applications in customer service and content creation. This study delves into ChatGPT's architecture, aiming to comprehensively understand its strengths and potential limitations. Through systematic experiments across diverse domains, such as general knowledge and creative writing, we evaluated the model's coherence, context retention, and task-specific accuracy. While ChatGPT excels in generating human-like responses and demonstrates adaptability, occasional inaccuracies and sensitivity to input phrasing were observed. The study emphasizes the impact of prompt design on output quality, providing valuable insights for the nuanced deployment of ChatGPT in conversational AI and contributing to the ongoing discourse on the evolving landscape of natural language processing in artificial intelligence.Keywords: artificial Inelegance, chatGPT, open AI, NLP
Procedia PDF Downloads 7714634 Physicochemical and Sensorial Evaluation of Astringency Reduction in Cashew Apple (Annacardium occidentale L.) Powder Processing in Cookie Elaboration
Authors: Elida Gastelum-Martinez, Neith A. Pacheco-Lopez, Juan L. Morales-Landa
Abstract:
Cashew agroindustry obtained from cashew apple crop (Anacardium occidentale L.) generates large amounts of unused waste in Campeche, Mexico. Despite having a high content of nutritional compounds such as ascorbic acid, carotenoids, fiber, carbohydrates, and minerals, it is not consumed due to its astringent sensation. The aim of this work was to develop a processing method for cashew apple waste in order to obtain a powder with reduced astringency able to be used as an additive in the food industry. The processing method consisted first in reducing astringency by inducing tannins from cashew apple peel to react and form precipitating complexes with a colloid rich in proline and histidine. Then cashew apples were processed to obtain a dry powder. Astringency reduction was determined by total phenolic content and evaluated by sensorial analysis in cashew-apple-powder based cookies. Total phenolic content in processed powders showed up to 72% lower concentration compared to control samples. The sensorial evaluation indicated that cookies baked using cashew apple powder with reduced astringency were 96.8% preferred. Sensorial characteristics like texture, color and taste were also well-accepted attributes. In conclusion, the method applied for astringency reduction is a viable tool to produce cashew apple powder with desirable sensorial properties to be used in the development of food products.Keywords: astringency reduction, cashew apple waste, food industry, sensorial evaluation
Procedia PDF Downloads 35114633 Intrusion Detection in SCADA Systems
Authors: Leandros A. Maglaras, Jianmin Jiang
Abstract:
The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection
Procedia PDF Downloads 55214632 Bilingual Experience Influences Different Components of Cognitive Control: Evidence from fMRI Study
Authors: Xun Sun, Le Li, Ce Mo, Lei Mo, Ruiming Wang, Guosheng Ding
Abstract:
Cognitive control plays a central role in information processing, which is comprised of various components including response suppression and inhibitory control. Response suppression is considered to inhibit the irrelevant response during the cognitive process; while inhibitory control to inhibit the irrelevant stimulus in the process of cognition. Both of them undertake distinct functions for the cognitive control, so as to enhance the performances in behavior. Among numerous factors on cognitive control, bilingual experience is a substantial and indispensible factor. It has been reported that bilingual experience can influence the neural activity of cognitive control as whole. However, it still remains unknown how the neural influences specifically present on the components of cognitive control imposed by bilingualism. In order to explore the further issue, the study applied fMRI, used anti-saccade paradigm and compared the cerebral activations between high and low proficient Chinese-English bilinguals. Meanwhile, the study provided experimental evidence for the brain plasticity of language, and offered necessary bases on the interplay between language and cognitive control. The results showed that response suppression recruited the middle frontal gyrus (MFG) in low proficient Chinese-English bilinguals, but the inferior patrietal lobe in high proficient Chinese-English bilinguals. Inhibitory control engaged the superior temporal gyrus (STG) and middle temporal gyrus (MTG) in low proficient Chinese-English bilinguals, yet the right insula cortex was more active in high proficient Chinese-English bilinguals during the process. These findings illustrate insights that bilingual experience has neural influences on different components of cognitive control. Compared with low proficient bilinguals, high proficient bilinguals turn to activate advanced neural areas for the processing of cognitive control. In addition, with the acquisition and accumulation of language, language experience takes effect on the brain plasticity and changes the neural basis of cognitive control.Keywords: bilingual experience, cognitive control, inhibition control, response suppression
Procedia PDF Downloads 48314631 A Mixed Approach to Assess Information System Risk, Operational Risk, and Congolese Microfinance Institutions Performance
Authors: Alfred Kamate Siviri, Angelus Mafikiri Tsongo, Jean Robert Kala Kamdjoug
Abstract:
Digitalization and information systems well organized have been selected as relevant measures to mitigate operational risks within organizations. Unfortunately, information system comes with new threats that can cause severe damage and quick organization lockout. This study aims to measure perceived information system risks and their effects on operational risks within the microfinance institution in D.R. Congo. Also, the factors influencing the operational risk are identified, and the link between operational risk with other risks and performance is to be assessed. The study proposes a research model drawn on the combination of Resources-Based-View, dynamic capabilities, the agency theory, the Information System Security Model, and social theories of risk. Therefore, we suggest adopting a mixed methods research with the sole aim of increasing the literature that already exists on perceived operational risk assessment and its link with other risk and performance, a focus on IT risk.Keywords: Democratic Republic Congo, information system risk, microfinance performance, operational risk
Procedia PDF Downloads 22414630 Valence and Arousal-Based Sentiment Analysis: A Comparative Study
Authors: Usama Shahid, Muhammad Zunnurain Hussain
Abstract:
This research paper presents a comprehensive analysis of a sentiment analysis approach that employs valence and arousal as its foundational pillars, in comparison to traditional techniques. Sentiment analysis is an indispensable task in natural language processing that involves the extraction of opinions and emotions from textual data. The valence and arousal dimensions, representing the intensity and positivity/negativity of emotions, respectively, enable the creation of four quadrants, each representing a specific emotional state. The study seeks to determine the impact of utilizing these quadrants to identify distinct emotional states on the accuracy and efficiency of sentiment analysis, in comparison to traditional techniques. The results reveal that the valence and arousal-based approach outperforms other approaches, particularly in identifying nuanced emotions that may be missed by conventional methods. The study's findings are crucial for applications such as social media monitoring and market research, where the accurate classification of emotions and opinions is paramount. Overall, this research highlights the potential of using valence and arousal as a framework for sentiment analysis and offers invaluable insights into the benefits of incorporating specific types of emotions into the analysis. These findings have significant implications for researchers and practitioners in the field of natural language processing, as they provide a basis for the development of more accurate and effective sentiment analysis tools.Keywords: sentiment analysis, valence and arousal, emotional states, natural language processing, machine learning, text analysis, sentiment classification, opinion mining
Procedia PDF Downloads 10114629 Mask-Prompt-Rerank: An Unsupervised Method for Text Sentiment Transfer
Authors: Yufen Qin
Abstract:
Text sentiment transfer is an important branch of text style transfer. The goal is to generate text with another sentiment attribute based on a text with a specific sentiment attribute while maintaining the content and semantic information unrelated to sentiment unchanged in the process. There are currently two main challenges in this field: no parallel corpus and text attribute entanglement. In response to the above problems, this paper proposed a novel solution: Mask-Prompt-Rerank. Use the method of masking the sentiment words and then using prompt regeneration to transfer the sentence sentiment. Experiments on two sentiment benchmark datasets and one formality transfer benchmark dataset show that this approach makes the performance of small pre-trained language models comparable to that of the most advanced large models, while consuming two orders of magnitude less computing and memory.Keywords: language model, natural language processing, prompt, text sentiment transfer
Procedia PDF Downloads 8114628 Model Based Development of a Processing Map for Friction Stir Welding of AA7075
Authors: Elizabeth Hoyos, Hernán Alvarez, Diana Lopez, Yesid Montoya
Abstract:
The main goal of this research relates to the modeling of FSW from a different or unusual perspective coming from mechanical engineering, particularly looking for a way to establish process windows by assessing soundness of the joints as a priority and with the added advantage of lower computational time. This paper presents the use of a previously developed model applied to specific aspects of soundness evaluation of AA7075 FSW welds. EMSO software (Environment for Modeling, Simulation, and Optimization) was used for simulation and an adapted CNC machine was used for actual welding. This model based approach showed good agreement with the experimental data, from which it is possible to set a window of operation for commercial aluminum alloy AA7075, all with low computational costs and employing simple quality indicators that can be used by non-specialized users in process modeling.Keywords: aluminum AA7075, friction stir welding, phenomenological based semiphysical model, processing map
Procedia PDF Downloads 26114627 Wh-Movement in Second Language Acquisition: Evidence from Magnitude Estimation
Authors: Dong-Bo Hsu
Abstract:
Universal Grammar (UG) claims that the constraints that are derived from this should operate in language users’ L2 grammars. This study investigated this hypothesis on knowledge of Subjacency and resumptive pronoun usage among Chinese learners of English. Chinese fulfills two requirements to examine the existence of UG, i.e., Subjacency does not operate in Chinese and resumptive pronouns in English are very different from those in Chinese and second L2 input undermines the knowledge of Subjacency. The results indicated that Chinese learners of English demonstrated a nearly identical pattern as English native speakers do but the resumptive pronoun in the embedding clauses. This may be explained in terms of the case that Chinese speakers’ usage of pronouns is not influenced by the number of embedding clauses. Chinese learners of English have full access to knowledge endowed by UG but their processing of English sentences may be different from native speakers as a general slow rate for processing in their L2 English.Keywords: universal grammar, Chinese, English, wh-questions, resumption
Procedia PDF Downloads 46914626 Influence of Building Orientation and Post Processing Materials on Mechanical Properties of 3D-Printed Parts
Authors: Raf E. Ul Shougat, Ezazul Haque Sabuz, G. M. Najmul Quader, Monon Mahboob
Abstract:
Since there are lots of ways for building and post processing of parts or models in 3D printing technology, the main objective of this research is to provide an understanding how mechanical characteristics of 3D printed parts get changed for different building orientations and infiltrates. Tensile, compressive, flexure, and hardness test were performed for the analysis of mechanical properties of those models. Specimens were designed in CAD software, printed on Z-printer 450 with five different build orientations and post processed with four different infiltrates. Results show that with the change of infiltrates or orientations each of the above mechanical property changes and for each infiltrate the highest tensile strength, flexural strength, and hardness are found for such orientation where there is the lowest number of layers while printing.Keywords: 3D printing, building orientations, infiltrates, mechanical characteristics, number of layers
Procedia PDF Downloads 28014625 An Improved Two-dimensional Ordered Statistical Constant False Alarm Detection
Authors: Weihao Wang, Zhulin Zong
Abstract:
Two-dimensional ordered statistical constant false alarm detection is a widely used method for detecting weak target signals in radar signal processing applications. The method is based on analyzing the statistical characteristics of the noise and clutter present in the radar signal and then using this information to set an appropriate detection threshold. In this approach, the reference cell of the unit to be detected is divided into several reference subunits. These subunits are used to estimate the noise level and adjust the detection threshold, with the aim of minimizing the false alarm rate. By using an ordered statistical approach, the method is able to effectively suppress the influence of clutter and noise, resulting in a low false alarm rate. The detection process involves a number of steps, including filtering the input radar signal to remove any noise or clutter, estimating the noise level based on the statistical characteristics of the reference subunits, and finally, setting the detection threshold based on the estimated noise level. One of the main advantages of two-dimensional ordered statistical constant false alarm detection is its ability to detect weak target signals in the presence of strong clutter and noise. This is achieved by carefully analyzing the statistical properties of the signal and using an ordered statistical approach to estimate the noise level and adjust the detection threshold. In conclusion, two-dimensional ordered statistical constant false alarm detection is a powerful technique for detecting weak target signals in radar signal processing applications. By dividing the reference cell into several subunits and using an ordered statistical approach to estimate the noise level and adjust the detection threshold, this method is able to effectively suppress the influence of clutter and noise and maintain a low false alarm rate.Keywords: two-dimensional, ordered statistical, constant false alarm, detection, weak target signals
Procedia PDF Downloads 7814624 Race, Class, Gender, and the American Welfare State (1930s-1990s)
Authors: Tahar Djebbar Aziza
Abstract:
The American society, like all societies, is fractured by social divisions between different groups of people. It is divided by race, class, gender, and other social and cultural characteristics. Social divisions affect the way and the manner welfare is delivered for citizens within the American society. The welfare state exists to guarantee the promotion of well –being for all the different components within a society without taking into account their age, gender, their ethnicity/race, or their social belonging (class). Race, class, and even gender issues are the main factors that affected the formal structure, the nature, as well as the evolution of the American welfare state and led to its uniqueness. They have affected the structure and the evolution of the American welfare state since its creation in the 1930s, and led to its uniqueness in an international level. This study aims therefore at enhancing the readers’ awareness of social divisions: race, class, gender and their implications for the distribution of welfare resources and life chances in the USA from the early 1930s to the late 1990s.Keywords: African Americans, class, gender, minority groups, race, social divisions, social policy, U.S. welfare state
Procedia PDF Downloads 55514623 Information Asymmetry and Governing Boards in Higher Education: The Heat Map of Information Asymmetry Across Competencies and the Role of Training in Mitigating Information Asymmetry
Authors: Ana Karaman, Dmitriy Gaevoy
Abstract:
Successful and effective governing boards play an essential role in higher education by providing essential oversight and helping to steer the direction of an institution while creating and maintaining a thriving culture of stewardship. A well-functioning board can also help mitigate conflicts of interest, ensure responsible use of an organization's assets, and maintain institutional transparency. However, boards’ functions in higher education are inhibited by the presence of information asymmetry between the board and management. Board members typically have little specific knowledge about the business side of the higher education, in general, and an institution under their oversight in particular. As a result, boards often must rely on the discretion of the institutional upper administration as to what type of pertinent information being disclosed to the board. The phenomenon of information asymmetry is not unique to the higher education and has been studied previously in the context of both corporate and non-for-profit boards. Various board characteristics have been analyzed with respect to mitigating the information asymmetry between an organizational board and management. For example, it has been argued that such board characteristics as its greater size, independence, and a higher proportion of female members tend to reduce information asymmetry by raising levels of information disclosure and organizational transparency. This paper explores the phenomenon of information asymmetry between boards and management in the context of higher education. In our analysis, we propose a heat map of information asymmetry based on the categories of board competencies in higher education. The proposed heat map is based on the assessment of potential risks to both the boards and its institutions. It employs an assumption that a potential risk created by the presence of information asymmetry varies in its magnitude across various areas of boards’ competencies. Then, we explore the role of board members’ training in mitigating information asymmetry between the boards and the management by increasing the level of information disclosure and enhancing transparency in management communication with the boards. The paper seeks to demonstrate how appropriate training can provide board members with an adequate preparation to request a sufficient level of information disclose and transparency by arming them with knowledge of what questions to ask of the management.Keywords: higher education, governing boards information asymmetry, board competencies, board training
Procedia PDF Downloads 7114622 Symbolic Partial Differential Equations Analysis Using Mathematica
Authors: Davit Shahnazaryan, Diogo Gomes, Mher Safaryan
Abstract:
Many symbolic computations and manipulations required in the analysis of partial differential equations (PDE) or systems of PDEs are tedious and error-prone. These computations arise when determining conservation laws, entropies or integral identities, which are essential tools for the study of PDEs. Here, we discuss a new Mathematica package for the symbolic analysis of PDEs that automate multiple tasks, saving time and effort. Methodologies: During the research, we have used concepts of linear algebra and partial differential equations. We have been working on creating algorithms based on theoretical mathematics to find results mentioned below. Major Findings: Our package provides the following functionalities; finding symmetry group of different PDE systems, generation of polynomials invariant with respect to different symmetry groups; simplification of integral quantities by integration by parts and null Lagrangian cleaning, computing general forms of expressions by integration by parts; finding equivalent forms of an integral expression that are simpler or more symmetric form; determining necessary and sufficient conditions on the coefficients for the positivity of a given symbolic expression. Conclusion: Using this package, we can simplify integral identities, find conserved and dissipated quantities of time-dependent PDE or system of PDEs. Some examples in the theory of mean-field games and semiconductor equations are discussed.Keywords: partial differential equations, symbolic computation, conserved and dissipated quantities, mathematica
Procedia PDF Downloads 16314621 Shame and Pride in Moral Self-Improvement
Authors: Matt Stichter
Abstract:
Moral development requires learning from one’s failures, but that turnsout to be especially challenging when dealing with moral failures. The distress prompted by moral failure can cause responses ofdefensiveness or disengagement rather than attempts to make amends and work on self-change. The most potentially distressing response to moral failure is a shame. However, there appears to be two different senses of “shame” that are conflated in the literature, depending on whether the failure is appraised as the result of a global and unalterable self-defect, or a local and alterable self-defect. One of these forms of shame does prompt self-improvement in response to moral failure. This occurs if one views the failure as indicating only a specific (local) defect in one’s identity, where that’s something repairable, rather than asanoverall(orglobal)defectinyouridentity that can’t be fixed. So, if the whole of one’s identity as a morally good person isn’t being called into question, but only a part, then that is something one could work on to improve. Shame, in this sense, provides motivation for self-improvement to fix this part oftheselfinthe long run, and this would be important for moral development. One factor that looks to affect these different self-attributions in the wake of moral failure can be found in mindset theory, as reactions to moral failure in these two forms of shame are similar to how those with a fixed or growth mindset of their own abilities, such as intelligence, react to failure. People fall along a continuum with respect to how they view abilities – it is more of a fixed entity that you cannot do much to change, or it is malleable such that you can train to improve it. These two mindsets, ‘fixed’ versus ‘growth’, have different consequences for how we react to failure – a fixed mindset leads to maladaptive responses because of feelings of helplessness to do better; whereas a growth mindset leads to adaptive responses where a person puts forth effort to learn how to act better the next time. Here we can see the parallels between a fixed mindset of one’s own (im)morality, as the way people respond to shame when viewed as indicating a global and unalterable self-defect parallels the reactions people have to failure when they have a fixed mindset. In addition, it looks like there may be a similar structure to pride. Pride is, like shame, a self-conscious emotion that arises from internal attributions about the self as being the cause of some event. There are also paradoxical results from research on pride, where pride was found to motivate pro-social behavior in some cases but aggression in other cases. Research suggests that there may be two forms of pride, authentic and hubristic, that are also connected to different self-attributions, depending on whether one is feeling proud about a particular (local) aspect of the self versus feeling proud about the whole of oneself (global).Keywords: emotion, mindset, moral development, moral psychology, pride, shame, self-regulation
Procedia PDF Downloads 10714620 Vegetation Assessment Under the Influence of Environmental Variables; A Case Study from the Yakhtangay Hill of Himalayan Range, Pakistan
Authors: Hameed Ullah, Shujaul Mulk Khan, Zahid Ullah, Zeeshan Ahmad Sadia Jahangir, Abdullah, Amin Ur Rahman, Muhammad Suliman, Dost Muhammad
Abstract:
The interrelationship between vegetation and abiotic variables inside an ecosystem is one of the main jobs of plant scientists. This study was designed to investigate the vegetation structure and species diversity along with the environmental variables in the Yakhtangay hill district Shangla of the Himalayan Mountain series Pakistan by using multivariate statistical analysis. Quadrat’s method was used and a total of 171 Quadrats were laid down 57 for Tree, Shrubs and Herbs, respectively, to analyze the phytosociological attributes of the vegetation. The vegetation of the selected area was classified into different Life and leaf-forms according to Raunkiaer classification, while PCORD software version 5 was used to classify the vegetation into different plants communities by Two-way indicator species Analysis (TWINSPAN). The CANOCCO version 4.5 was used for DCA and CCA analysis to find out variation directories of vegetation with different environmental variables. A total of 114 plants species belonging to 45 different families was investigated inside the area. The Rosaceae (12 species) was the dominant family followed by Poaceae (10 species) and then Asteraceae (7 species). Monocots were more dominant than Dicots and Angiosperms were more dominant than Gymnosperms. Among the life forms the Hemicryptophytes and Nanophanerophytes were dominant, followed by Therophytes, while among the leaf forms Microphylls were dominant, followed by Leptophylls. It is concluded that among the edaphic factors such as soil pH, the concentration of soil organic matter, Calcium Carbonates concentration in soil, soil EC, soil TDS, and physiographic factors such as Altitude and slope are affecting the structure of vegetation, species composition and species diversity at the significant level with p-value ≤0.05. The Vegetation of the selected area was classified into four major plants communities and the indicator species for each community was recorded. Classification of plants into 4 different communities based upon edaphic gradients favors the individualistic hypothesis. Indicator Species Analysis (ISA) shows the indicators of the study area are mostly indicators to the Himalayan or moist temperate ecosystem, furthermore, these indicators could be considered for micro-habitat conservation and respective ecosystem management plans.Keywords: species richness, edaphic gradients, canonical correspondence analysis (CCA), TWCA
Procedia PDF Downloads 15314619 Modal FDTD Method for Wave Propagation Modeling Customized for Parallel Computing
Authors: H. Samadiyeh, R. Khajavi
Abstract:
A new FD-based procedure, modal finite difference method (MFDM), is proposed for seismic wave propagation modeling, in which simulation is dealt with in the modal space. The method employs eigenvalues of a characteristic matrix formed by appropriate time-space FD stencils. Since MFD runs for different modes are totally independent of each other, MFDM can easily be parallelized while considerable simplicity in parallel-algorithm is also achieved. There is no requirement to any domain-decomposition procedure and inter-core data exchange. More important is the possibility to skip processing of less-significant modes, which enables one to adjust the procedure up to the level of accuracy needed. Thus, in addition to considerable ease of parallel programming, computation and storage costs are significantly reduced. The method is qualified for its efficiency by some numerical examples.Keywords: Finite Difference Method, Graphics Processing Unit (GPU), Message Passing Interface (MPI), Modal, Wave propagation
Procedia PDF Downloads 29614618 Assessing the Current State of Software Engineering and Information Technology in Ghana
Authors: David Yartel
Abstract:
Drawing on the current state of software engineering and information technology in Ghana, the study documents its significant contribution to the development of Ghanaian industries. The study focuses on the application of modern trends in technology and the barriers faced in the area of software engineering and information technology. A thorough analysis of a dozen of interviews with stakeholders in software engineering and information technology via interviews reveals how modern trends in software engineering pose challenges to the industry in Ghana. Results show that to meet the expectation of modern software engineering and information technology trends, stakeholders must have skilled professionals, adequate infrastructure, and enhanced support for technology startups. Again, individuals should be encouraged to pursue a career in software engineering and information technology, as it has the propensity to increase the efficiency and effectiveness of work-related activities. This study recommends that stakeholders in software engineering and technology industries should invest enough in training more professionals by collaborating with international institutions well-versed in the area by organizing frequent training and seminars. The government should also provide funding opportunities for small businesses in the technology sector to drive creativity and development in order to bring about growth and development.Keywords: software engineering, information technology, Ghana, development
Procedia PDF Downloads 9414617 Processing Studies and Challenges Faced in Development of High-Pressure Titanium Alloy Cryogenic Gas Bottles
Authors: Bhanu Pant, Sanjay H. Upadhyay
Abstract:
Frequently, the upper stage of high-performance launch vehicles utilizes cryogenic tank-submerged pressurization gas bottles with high volume-to-weight efficiency to achieve a direct gain in the satellite payload. Titanium alloys, owing to their high specific strength coupled with excellent compatibility with various fluids, are the materials of choice for these applications. Amongst the Titanium alloys, there are two alloys suitable for cryogenic applications, namely Ti6Al4V-ELI and Ti5Al2.5Sn-ELI. The two-phase alpha-beta alloy Ti6Al4V-ELI is usable up to LOX temperature of 90K, while the single-phase alpha alloy Ti5Al2.5Sn-ELI can be used down to LHe temperature of 4 K. The high-pressure gas bottles submerged in the LH2 (20K) can store more amount of gas in as compared to those submerged in LOX (90K) bottles the same volume. Thus, the use of these alpha alloy gas bottles stored at 20K gives a distinct advantage with respect to the need for a lesser number of gas bottles to store the same amount of high-pressure gas, which in turn leads to a one-to-one advantage in the payload in the satellite. The cost advantage to the tune of 15000$/ kg of weight is saved in the upper stages, and, thereby, the satellite payload gain is expected by this change. However, the processing of alpha Ti5Al2.5Sn-ELI alloy gas bottles poses challenges due to the lower forgeability of the alloy and mode of qualification for the critical severe application environment. The present paper describes the processing and challenges/ solutions during the development of these advanced gas bottles for LH2 (20K) applications.Keywords: titanium alloys, cryogenic gas bottles, alpha titanium alloy, alpha-beta titanium alloy
Procedia PDF Downloads 5714616 Analysis of Various Copy Move Image Forgery Techniques for Better Detection Accuracy
Authors: Grishma D. Solanki, Karshan Kandoriya
Abstract:
In modern era of information age, digitalization has revolutionized like never before. Powerful computers, advanced photo editing software packages and high resolution capturing devices have made manipulation of digital images incredibly easy. As per as image forensics concerns, one of the most actively researched area are detection of copy move forgeries. Higher computational complexity is one of the major component of existing techniques to detect such tampering. Moreover, copy move forgery is usually performed in three steps. First, copying of a region in an image then pasting the same one in the same respective image and finally doing some post-processing like rotation, scaling, shift, noise, etc. Consequently, pseudo Zernike moment is used as a features extraction method for matching image blocks and as a primary factor on which performance of detection algorithms depends.Keywords: copy-move image forgery, digital forensics, image forensics, image forgery
Procedia PDF Downloads 28814615 The Effect of Fly Ash in Dewatering of Marble Processing Wastewaters
Authors: H. A. Taner, V. Önen
Abstract:
In the thermal power plants established to meet the energy need, lignite with low calorie and high ash content is used. Burning of these coals results in wastes such as fly ash, slag and flue gas. This constitutes a significant economic and environmental problems. However, fly ash can find evaluation opportunities in various sectors. In this study, the effectiveness of fly ash on suspended solid removal from marble processing wastewater containing high concentration of suspended solids was examined. Experiments were carried out for two different suspensions, marble and travertine. In the experiments, FeCl3, Al2(SO4)3 and anionic polymer A130 were used also to compare with fly ash. Coagulant/flocculant type/dosage, mixing time/speed and pH were the experimental parameters. The performances in the experimental studies were assessed with the change in the interface height during sedimentation resultant and turbidity values of treated water. The highest sedimentation efficiency was achieved with anionic flocculant. However, it was determined that fly ash can be used instead of FeCl3 and Al2(SO4)3 in the travertine plant as a coagulant.Keywords: dewatering, flocculant, fly ash, marble plant wastewater
Procedia PDF Downloads 15214614 New Media and Deliberative Democracy in Malaysia
Authors: Rosyidah Muhamad
Abstract:
This article seeks to access the democratic implication of new media in Malaysia through three important key points of deliberative democracy; information access, rational critical deliberation and mechanism of vertical accountability. The article suggests that the Internet is expanding political opportunity in which contributed to a more diverse discourse. It is depending on how users used it; for democratic or non-democratic outcome. The Internet has been a key instrument in exposing human rights abuse, corruption, organizing protests and mobilizing voters during election campaigns. It therefore pushes for transparency and accountability and thus increasing the rise of deliberative democracy in Malaysia. While there are some elements of an emerging deliberative politics, it is also clear that the Malaysian online political discourse is acting as moderate forms of discourse as the sphere increasingly exist in a chaotic and diversified online discourse. Yet, the online sphere still allows citizens to discuss public affairs. When the public opinion is strong enough, it can influence public policies to ensure that they reflect the public interest. It is suggesting an increased space of negotiation and contestation among the previously muzzled offline situation. This is a big step in the progress democracy in Malaysia.Keywords: Keywords: New Media, democratization, deliberative democracy, Malaysian politics
Procedia PDF Downloads 300