Search results for: internet usage
1939 First-Person Pronoun Pragmatic Functions in Three Historical Chinese Texts
Authors: Cher Leng Lee
Abstract:
The existence of multiple first-person pronouns (1PPs) in classical Chinese is an issue that has not been resolved despite linguists using the grammatical perspective. This paper proposes pragmatics as a viable solution. There is also a lack of research exploring the evolving usage patterns of 1PPs within the historical context of Chinese language use. Such research can help us comprehend the changes and developments of these linguistic elements. To fill these research gaps, we use the diachronic pragmatics approach to contrast the functions of Chinese 1PPs in three representative texts from three different historical periods: The Analects (The Spring and Autumn Period), The Grand Scribe’s Records (Grand Records) (Qin and Han Period), and A New Account of Tales of the World (New Account) (The Wei, Jin and Southern and Northern Period). The 1PPs of these texts are manually identified and classified according to the pragmatic functions in the given contexts to observe their historical changes, understand the factors that contribute to these changes, and provide possible answers to the development of how wo became the only 1PP in today’s spoken Mandarin.Keywords: Chinese language, classical Chinese, historical linguistics, pragmatics, first-person pronouns
Procedia PDF Downloads 241938 Applications of AI, Machine Learning, and Deep Learning in Cyber Security
Authors: Hailyie Tekleselase
Abstract:
Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data
Procedia PDF Downloads 1261937 Do Industry Expert Audit Engagement Partners Earn Fee Premiums? Evidence from Labor Usage and the Hourly Charge Rate
Authors: Gil Bae, Seung Uk Choi, Jae Eun Lee, Joon Hwa Rho
Abstract:
Using proprietary engagement partner identity information for the Big 4 audit firms in Korea over the 2001-2011 period, we find that expert engagement partners obtain significantly higher total compensation than do non-expert partners. Importantly, we also find that expert partners increase the number of audit hours compared to their non-expert counterparts. The hourly billing rate, calculated as total fees divided by total audit hours, of expert partners is not higher than that of non-expert partners, indicating that there is no expert partner premium reflected in the hourly rate. This finding suggests that the increase in total audit fees is attributable mainly to the increase in the quantity of audit hours that expert partners work, not from the higher fee per hour. The results are not attributable to auditor selection bias.Keywords: industry expert partners, expert premiums, audit hours, hourly charge rate
Procedia PDF Downloads 3061936 Making Use of Content and Language Integrated Learning for Teaching Entrepreneurship and Neuromarketing to Master Students: Case Study
Authors: Svetlana Polskaya
Abstract:
The study deals with the issue of using the Content and Language Integrated Learning (CLIL) concept when teaching Master Program students majoring in neuromarketing and entrepreneurship. Present-day employers expect young graduates to conduct professional communication with their English-speaking peers and demonstrate proper knowledge of the industry’s terminology and jargon. The idea of applying CLIL was the result of the above-mentioned students possessing high proficiency in English, thus, not requiring any further knowledge of the English language in terms of traditional grammar or lexis. Due to this situation, a CLIL-type program was devised, allowing learners to acquire new knowledge of entrepreneurship and neuromarketing spheres combined with simultaneous honing their English language practical usage. The case study analyzes CLIL application within this particular program as well as the experience accumulated in the process.Keywords: CLIL, entrepreneurship, neuromarketing, foreign language acquisition, proficiency level
Procedia PDF Downloads 911935 The Effect of Soil Fractal Dimension on the Performance of Cement Stabilized Soil
Authors: Nkiru I. Ibeakuzie, Paul D. J. Watson, John F. Pescatore
Abstract:
In roadway construction, the cost of soil-cement stabilization per unit area is significantly influenced by the binder content, hence the need to optimise cement usage. This research work will characterize the influence of soil fractal geometry on properties of cement-stabilized soil, and strive to determine a correlation between mechanical proprieties of cement-stabilized soil and the mass fractal dimension Dₘ indicated by particle size distribution (PSD) of aggregate mixtures. Since strength development in cemented soil relies not only on cement content but also on soil PSD, this study will investigate the possibility of reducing cement content by changing the PSD of soil, without compromising on strength, reduced permeability, and compressibility. A series of soil aggregate mixes will be prepared in the laboratory. The mass fractal dimension Dₘ of each mix will be determined from sieve analysis data prior to stabilization with cement. Stabilized soil samples will be tested for strength, permeability, and compressibility.Keywords: fractal dimension, particle size distribution, cement stabilization, cement content
Procedia PDF Downloads 2191934 Analysis of the Topics of Research of Brazilian Researchers Acting in the Areas of Engineering
Authors: Jether Gomes, Thiago M. R. Dias, Gray F. Moita
Abstract:
The production and publication of scientific works have increased significantly in the last years, being the Internet the main factor of access and diffusion of these. In view of this, researchers from several areas of knowledge have carried out several studies on scientific production data in order to analyze phenomena and trends about science. The understanding of how research has evolved can, for example, serve as a basis for building scientific policies for further advances in science and stimulating research groups to become more productive. In this context, the objective of this work is to analyze the main research topics investigated along the trajectory of the Brazilian science of researchers working in the areas of engineering, in order to map scientific knowledge and identify topics in highlights. To this end, studies are carried out on the frequency and relationship of the keywords of the set of scientific articles registered in the existing curricula in the Lattes Platform of each one of the selected researchers, counting with the aid of bibliometric analysis features.Keywords: research topics, bibliometrics, topics of interest, Lattes Platform
Procedia PDF Downloads 2211933 An Assessment of Existing Material Management Process in Building Construction Projects in Nepal
Authors: Uttam Neupane, Narendra Budha, Subash Kumar Bhattarai
Abstract:
Material management is an essential part in construction project management. There are a number of material management problems in the Nepalese construction industry, which contribute to an inefficient material management system. Ineffective material management can cause waste of time and money thus increasing the problem of time and cost overrun. An assessment of material management system with gap and solution was carried out on 20 construction projects implemented by the Federal Level Project Implementation Unit (FPIU); Kaski district of Nepal. To improve the material management process, the respondents have provided possible solutions to overcome the gaps seen in the current material management process. The possible solutions are preparation of material schedule in line with the construction schedule for material requirement planning, verifications of material and locating of source, purchasing of the required material in advance before commencement of work, classifying the materials, and managing the inventory based on their usage value and eliminating and reduction in wastages during the overall material management process.Keywords: material management, construction site, inventory, construction project
Procedia PDF Downloads 701932 Fuzzy Sentiment Analysis of Customer Product Reviews
Authors: Samaneh Nadali, Masrah Azrifah Azmi Murad
Abstract:
As a result of the growth of the web, people are able to express their views and opinions. They can now post reviews of products at merchant sites and express their views on almost anything in internet forums, discussion groups, and blogs. Therefore, the number of product reviews has grown rapidly. The large numbers of reviews make it difficult for manufacturers or businesses to automatically classify them into different semantic orientations (positive, negative, and neutral). For sentiment classification, most existing methods utilize a list of opinion words whereas this paper proposes a fuzzy approach for evaluating sentiments expressed in customer product reviews, to predict the strength levels (e.g. very weak, weak, moderate, strong and very strong) of customer product reviews by combinations of adjective, adverb and verb. The proposed fuzzy approach has been tested on eight benchmark datasets and obtained 74% accuracy, which leads to help the organization with a more clear understanding of customer's behavior in support of business planning process.Keywords: fuzzy logic, customer product review, sentiment analysis
Procedia PDF Downloads 3631931 Energy Analysis of Seasonal Air Conditioning Demand of All Income Classes Using Bottom up Model in Pakistan
Authors: Saba Arif, Anam Nadeem, Roman Kalvin, Tanzeel Rashid, Burhan Ali, Juntakan Taweekun
Abstract:
Currently, the energy crisis is taking serious attention. Globally, industries and building are major share takers of energy. 72% of total global energy is consumed by residential houses, markets, and commercial building. Additionally, in appliances air conditioners are major consumer of electricity; about 60% energy is used for cooling purpose in houses due to HVAC units. Energy demand will aid in determining what changes will be needed whether it is the estimation of the required energy for households or instituting conservation measures. Bottom-up model is one of the most famous methods for forecasting. In current research bottom-up model of air conditioners' energy consumption in all income classes in comparison with seasonal variation and hourly consumption is calculated. By comparison of energy consumption of all income classes by usage of air conditioners, total consumption of actual demand and current availability can be seen.Keywords: air conditioning, bottom up model, income classes, energy demand
Procedia PDF Downloads 2491930 Insight-Based Evaluation of a Map-Based Dashboard
Authors: Anna Fredriksson Häägg, Charlotte Weil, Niklas Rönnberg
Abstract:
Map-based dashboards are used for data exploration every day. The present study used an insight-based methodology for evaluating a map-based dashboard that presents research findings of water management and ecosystem services in the Amazon. In addition to analyzing the insights gained from using the dashboard, the evaluation method was compared to standardized questionnaires and task-based evaluations. The result suggests that the dashboard enabled the participants to gain domain-relevant, complex insights regarding the topic presented. Furthermore, the insight-based analysis highlighted unexpected insights and hypotheses regarding causes and potential adaptation strategies for remediation. Although time- and resource-consuming, the insight-based methodology was shown to have the potential of thoroughly analyzing how end users can utilize map-based dashboards for data exploration and decision making. Finally, the insight-based methodology is argued to evaluate tools in scenarios more similar to real-life usage compared to task-based evaluation methods.Keywords: visual analytics, dashboard, insight-based evaluation, geographic visualization
Procedia PDF Downloads 1161929 BER Analysis of Energy Detection Spectrum Sensing in Cognitive Radio Using GNU Radio
Authors: B. Siva Kumar Reddy, B. Lakshmi
Abstract:
Cognitive Radio is a turning out technology that empowers viable usage of the spectrum. Energy Detector-based Sensing is the most broadly utilized spectrum sensing strategy. Besides, it is a lot of generic as receivers does not like any information on the primary user's signals, channel data, of even the sort of modulation. This paper puts forth the execution of energy detection sensing for AM (Amplitude Modulated) signal at 710 KHz, FM (Frequency Modulated) signal at 103.45 MHz (local station frequency), Wi-Fi signal at 2.4 GHz and WiMAX signals at 6 GHz. The OFDM/OFDMA based WiMAX physical layer with convolutional channel coding is actualized utilizing USRP N210 (Universal Software Radio Peripheral) and GNU Radio based Software Defined Radio (SDR). Test outcomes demonstrated the BER (Bit Error Rate) augmentation with channel noise and BER execution is dissected for different Eb/N0 (the energy per bit to noise power spectral density ratio) values.Keywords: BER, Cognitive Radio, GNU Radio, OFDM, SDR, WiMAX
Procedia PDF Downloads 5001928 Enabling Enterprise Information System Interoperability: A Future Perspective
Authors: Mahdi Alkaeed, Adeel Ehsan
Abstract:
Enterprise information systems (EIS) act as the backbone of organizations that belong to different domains. These systems not only play a major role in the efficient usage of resources and time but also throw light on the future roadmap for the enterprise. In today's rapidly expanding world of business and technology, enterprise systems from various heterogenous environments have to exchange information at some point, be it within the same organization or between different organizations. This reality strengthens the importance of interoperability between these systems, which is one of the key enablers of systems collaboration. Both information technology infrastructure and business processes have to be aligned with each other to achieve this effect. This will be difficult to attain if traditional tightly coupled architecture is used. Instead, a more loosely coupled service-oriented architecture has to be used. That would enable an effective interoperability level between different EIS. This paper discusses and presents the current work that has been done in the field of EIS interoperability. Along the way, it also discusses the challenges, solutions to tackle those challenges presented in the studied literature, and limitations, if any.Keywords: enterprise systems interoperability, collaboration and integration, service-based architecture, open system architecture
Procedia PDF Downloads 1121927 Greening the Academic Library: Analysis of the Effectiveness of Sustainable Online Services Towards Reducing the Environmental Impact of Academic Libraries
Authors: George Clifford Yamson
Abstract:
As institutions across the world become more focused on sustainability, academic libraries are considering ways to reduce their environmental impact. One strategy is the use of sustainable online services, which can reduce the need for physical materials and transportation. This study aims to analyze the effectiveness of sustainable online services in reducing the environmental impact of academic libraries. Using a mixed-methods approach, the survey will be used to solicit information from library staff and users to gather data on their attitudes towards sustainable online services and their usage patterns. A comparative analysis will be conducted on the costs of traditional library services versus sustainable online services. The findings of this study will contribute to the growing body of literature on green academic libraries and provide insights into the potential of sustainable online services to reduce the environmental impact of academic libraries.Keywords: sustainability, environmental sustainability, academic libraries, green printing, green copying, online services
Procedia PDF Downloads 791926 Ways for University to Conduct Research Evaluation: Based on National Research University Higher School of Economics Example
Authors: Svetlana Petrikova, Alexander Yu Kostinskiy
Abstract:
Management of research evaluation in the Higher School of Economics (HSE) originates from the HSE Academic Fund created in 2004 to facilitate and support academic research and presents its results to international academic community. As the means to inspire the applicants, science projects went through competitive selection process evaluated by the group of experts. Drastic development of HSE, quantity of applied projects for each Academic Fund competition and the need to coordinate the conduct of expert evaluation resulted in founding of the Office for Research Evaluation in 2013. The Office’s primary objective is management of research evaluation of science projects. The standards to conduct the evaluation are defined as follows: - The exercise of the process approach, the unification of the functioning of department. - The uniformity of regulatory, organizational and methodological framework. - The development of proper on-line evaluation system. - The broad involvement of external Russian and international experts, the renouncement of the usage of own employees. - The development of an algorithm to make a correspondence between experts and science projects. - The methodical usage of opened/closed international and Russian databases to extend the expert database. - The transparency of evaluation results – free access to assessment while keeping experts confidentiality. The management of research evaluation of projects is based on the sole standard, organization and financing. The standard way of conducting research evaluation at HSE is based upon Regulations on basic principles for research evaluation at HSE. These Regulations have been developed from the moment of establishment of the Office for Research Evaluation and are based on conventional corporate standards for regulatory document management. The management system of research evaluation is implemented on the process approach basis. Process approach means deployment of work as a process, which is the aggregation of interrelated and interacting activities processing inputs into outputs. Inputs are firstly client asking for the assessment to be conducted, defining the conditions for organizing and carrying of the assessment and secondly the applicant with proper for the competition application; output is assessment given to the client. While exercising process approach to clarify interrelation and interacting main parties or subjects of the assessment are determined and the way for interaction between them forms up. Parties to expert assessment are: - Ordering Party – The department of the university taking the decision to subject a project to expert assessment; - Providing Party – The department of the university authorized to provide such assessment by the Ordering Party; - Performing Party – The legal and natural entities that have expertise in the area of research evaluation. Experts assess projects in accordance with criteria and states of expert opinions approved by the Ordering Party. Objects of assessment generally are applications or HSE competition project reports. Mainly assessments are deployed for internal needs, i.e. the most ordering parties are HSE branches and departments, but assessment can also be conducted for external clients. The financing of research evaluation at HSE is based on the established corporate culture and traditions of HSE.Keywords: expert assessment, management of research evaluation, process approach, research evaluation
Procedia PDF Downloads 2531925 Reliability Analysis of Computer Centre at Yobe State University Nigeria under Different Repair Policies
Authors: Vijay Vir Singh
Abstract:
In this paper, we focus on the reliability and performance analysis of Computer Centre (CC) at Yobe State University, Damaturu, Nigeria. The CC consists of three servers: one database mail server, one redundant and one for sharing with the client computers in the CC (called as local server). Observing the different possibilities of functioning of the CC, analysis has been done to evaluate the various reliability characteristics of the system. The system can completely fail due to failure of router, redundant server before repairing the mail server, and switch failure. The system can also partially fail when local server fails. The system can also fail completely due to a cooling failure, electricity failure or some natural calamity like earthquake, fire etc. All the failure rates are assumed to be constant while repair follows two types of distributions: general and Gumbel-Hougaard family copula.Keywords: reliability, availability Gumbel-Hougaard family copula, MTTF, internet data centre
Procedia PDF Downloads 4611924 Information and Communication Technology Skills of Finnish Students in Particular by Gender
Authors: Antero J. S. Kivinen, Suvi-Sadetta Kaarakainen
Abstract:
Digitalization touches every aspect of contemporary society, changing the way we live our everyday life. Contemporary society is sometimes described as knowledge society including unprecedented amount of information people face daily. The tools to manage this information flow are ICT-skills which are both technical skills and reflective skills needed to manage incoming information. Therefore schools are under constant pressure of revision. In the latest Programme for International Student Assessment (PISA) girls have been outperforming boys in all Organization for Economic Co-operation and Development (OECD) member countries and the gender gap between girls and boys is widest in Finland. This paper presents results of the Comprehensive Schools in the Digital Age project of RUSE, University of Turku. The project is in connection with Finnish Government Analysis, Assessment and Research Activities. First of all, this paper examines gender differences in ICT-skills of Finnish upper comprehensive school students. Secondly, it explores in which way differences are changing when students proceed to upper secondary and vocational education. ICT skills are measured using a performance-based ICT-skill test. Data is collected in 3 phases, January-March 2017 (upper comprehensive schools, n=5455), September-December 2017 (upper secondary and vocational schools, n~3500) and January-March 2018 (Upper comprehensive schools). The age of upper comprehensive school student’s is 15-16 and upper secondary and vocational school 16-18. The test is divided into 6 categories: basic operations, productivity software, social networking and communication, content creation and publishing, applications and requirements for the ICT study programs. Students have filled a survey about their ICT-usage and study materials they use in school and home. Cronbach's alpha was used to estimate the reliability of the ICT skill test. Statistical differences between genders were examined using two-tailed independent samples t-test. Results of first data from upper comprehensive schools show that there is no statistically significant difference in ICT-skill tests total scores between genders (boys 10.24 and girls 10.64, maximum being 36). Although, there were no gender difference in total test scores, there are differences in above mentioned six categories. Girls get better scores on school related and social networking test subjects while boys perform better on more technical oriented subjects. Test scores on basic operations are quite low for both groups. Perhaps these can partly be explained by the fact that the test was made on computers and majority of students ICT-usage consist of smartphones and tablets. Against this background it is important to analyze further the reasons for these differences. In a context of ongoing digitalization of everyday life and especially working life, the significant purpose of this analyses is to find answers how to guarantee the adequate ICT skills for all students.Keywords: basic education, digitalization, gender differences, ICT-skills, upper comprehensive education, upper secondary education, vocational education
Procedia PDF Downloads 1351923 An Intelligent Baby Care System Based on IoT and Deep Learning Techniques
Authors: Chinlun Lai, Lunjyh Jiang
Abstract:
Due to the heavy burden and pressure of caring for infants, an integrated automatic baby watching system based on IoT smart sensing and deep learning machine vision techniques is proposed in this paper. By monitoring infant body conditions such as heartbeat, breathing, body temperature, sleeping posture, as well as the surrounding conditions such as dangerous/sharp objects, light, noise, humidity and temperature, the proposed system can analyze and predict the obvious/potential dangerous conditions according to observed data and then adopt suitable actions in real time to protect the infant from harm. Thus, reducing the burden of the caregiver and improving safety efficiency of the caring work. The experimental results show that the proposed system works successfully for the infant care work and thus can be implemented in various life fields practically.Keywords: baby care system, Internet of Things, deep learning, machine vision
Procedia PDF Downloads 2241922 An Examination on How Poetry Linguistic Elements Predict Trait Mindfulness
Authors: Crystal Jewell
Abstract:
Substantial evidence suggests a link exists between trait or dispositional mindfulness and creativity. While most studies on the mindfulness-creativity link focus on measures of divergent thinking, no study to date has explored the link through the lens of poetry writing. Thus, the present study sought to examine the relation between mindfulness and poetry through various linguistic elements, including word count, references to the self versus references to the collective, and frequency of past-, present-, and future-tense verb usage. Following a questionnaire on demographics, university undergraduates at a United States college completed a survey measuring trait mindfulness, then engaged in a two-part associated poetry-writing task intended to mimic writing tasks used to counter writer’s block. Results indicated no significant relations among any measures of poetry linguistic elements and trait mindfulness, as well as the facets of trait mindfulness. Limitations and future directions call for replication of results and further examination of different poetry linguistic elements.Keywords: mindfulness, poetry, linguistics, psychology
Procedia PDF Downloads 821921 Classification of IoT Traffic Security Attacks Using Deep Learning
Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem
Abstract:
The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.Keywords: IoT, traffic security, deep learning, classification
Procedia PDF Downloads 1541920 Exploring the Potential of Blockchain to Improve Higher Education
Authors: Tony Cripps, Larry Kimber
Abstract:
This paper will begin by briefly explaining how blockchain technology works. Then, after highlighting a few of the ways it promises to heavily impact all aspects of the digital landscape, the focus will shift to Blockchain in the field of education, with specific emphasis placed on practical applications in foreign language education. Blockchain is a decentralized Internet-based software application that guarantees truth in transactions. This means whenever two parties engage in a transaction using Blockchain, it is time-stamped, added to a block of other transactions, and then permanently attached to an unalterable ‘chain’ of blocks. The potential for developing applications with Blockchain is therefore immense, since software systems that ensure the impossibility of outside tampering are invaluable. Innovative ideas in every imaginable domain are presently being entertained and Blockchain in education is no exception. For instance, records kept within and between institutions of students’ grade performance, academic achievement and verification of assignment/course completion are just a few examples of how this new technology might potentially be used to revolutionize education. It is hoped that this paper will be of use to all educators interested in the application of technology in the field of education.Keywords: blockchain, disruption, potential, technology
Procedia PDF Downloads 1381919 The Smart Record and Replay Mechanism for Android
Authors: Kuei-Chun Liu, Yu-Yu Lai, Ching-Hong Wu, Hsiao-Han Huang
Abstract:
The number of Android applications (Apps) has increased rapidly in recent years. In order to get better programmatic control over Apps, we designed a record-and-replay mechanism to record Android input events and accessibility service events then make shortcuts. The shortcut is useful for complicated routine works and to Android beginners. We also generated graphical user interface (GUI) API by these shortcuts. GUI API helps developers make integrated Apps which can control other third-party Apps even if the official API is not offered by their providers. We demonstrated the usage of GUI API with two integrated Apps: Universal Bank App and Universal Communication App. Universal Bank App integrates three accounts from different banks and Universal Communication App integrates Line with WhatsApp. Both of them show the advantage of extendable GUI API. Furthermore, using our mechanism, shortcuts could replay almost all of the Top-100 Apps on Google Play correctly. In sum, the approach we present can help both Android developers and general users.Keywords: graphical user interface, GUI API, record-and-replay, third-party apps
Procedia PDF Downloads 4071918 Cyber Victimization: School Experience of Malaysian Cyberbullied Teenagers
Authors: Shireen Simon
Abstract:
Cyberbullying among schoolchildren and teenagers became a hot issue discussed by Malaysian society. Cyberbullying is a new age of bullying because it uses the modern digital technology intentionally to hurt and degrade someone in the cyber world. Cyberbullying is a problem affecting many teenagers as they embrace online communication and interaction whereby virtual world with no borders. By adopting a qualitative approach, this study has captured 8 cyberbullied victims’ school experience. Even years after leaving school, these 8 cyberbullied victims remember how it feels to be bullied in the cyber world. The principal investigator also tries to identify the possibility factors that contribute to cyberbullying among these 8 victims. The result shows that these victims were bullied differently in cyber world. This study not just primarily focuses on cyberbullying issues among schoolchildren and teenagers; it also addresses the motives and causes of cyberbullying. Lastly, this article will be served as guidance for school teachers, parents and teenagers to prepare to tackle cyberbullying together. Cyberbullying is no laughing matter in our community, and it is time to spread the seeds of peace inspires others to do the same.Keywords: cyberbullying, cyber victimization, internet, school experience, teenagers
Procedia PDF Downloads 2871917 Atwood's Canadianisms and Neologisms: A Cognitive Approach to Literature
Authors: Eleonora Sasso
Abstract:
This paper takes as its starting point the notions of cognitive linguistics and lexical blending, and uses both these theoretical concepts to advance a new reading of Margaret Atwood’s latest writings, one which sees them as paramount literary examples of norm and usage in bilingual Canadian lexicography. Atwood’s prose seems to be imbued with Canadianisms and neologisms, lexical blends of zoomorphic forms, a kind of meeting-point between two conceptual structures which follow the principles of lexical economy and asyntactic relation. Atwood’s neologisms also attest to the undeniable impact on language exerted by Canada’s aboriginal peoples. This paper aims to track through these references and with the aid of the Eskimo-English dictionary look at the linguistic issues – attitudes to contaminations and hybridisations, questions of lexical blending in literary examples, etc – which they raise. Atwood’s fiction, whose cognitive linguistic strategy employs ‘the virtues of scissors and matches’, always strives to achieve isomorphism between word form and concept.Keywords: Atwood, Canadianisms, cognitive science, Eskimo/English dictionary
Procedia PDF Downloads 2641916 Learning through Gaming with Mobile Devices
Authors: Luis Rodrigo Valencia Pérez, Juan Manuel Peña Aguilar, Adelina Morita Alexander, Alberto Lamadrid Alvarez, Héctor Fernando Valencia Pérez
Abstract:
Financial education is among the areas of opportunity in the Spanish-speaking from an early age to high school, through mobile devices such as cell phones and tablets using ludic and fun applications like interactive games, children can learn money management and investment through time, thereby fostering the habit of saving and/or sound management of cash and family business resources, having interaction with an uncontrolled environment such as the involvement of other players in the external decisions of the environment in which the game is play. The application proposed in Phase 1 (design and development) was designed in multi-user environments, under methodologies of hybrid programming for any platform on the market and designed under CMMI standards that allow for quality production over time, following up on these improvements counting with continuous user feedback and usage statistics.Keywords: mobile educational games, ludic games, children, multiuser, design and software development
Procedia PDF Downloads 3821915 Web 2.0 in Higher Education: The Instructors’ Acceptance in Higher Educational Institutes in Kingdom of Bahrain
Authors: Amal M. Alrayes, Hayat M. Ali
Abstract:
Since the beginning of distance education with the rapid evolution of technology, the social network plays a vital role in the educational process to enforce the interaction been the learners and teachers. There are many Web 2.0 technologies, services and tools designed for educational purposes. This research aims to investigate instructors’ acceptance towards web-based learning systems in higher educational institutes in Kingdom of Bahrain. Questionnaire is used to investigate the instructors’ usage of Web 2.0 and the factors affecting their acceptance. The results confirm that instructors had high accessibility to such technologies. However, patterns of use were complex. Whilst most expressed interest in using online technologies to support learning activities, learners seemed cautious about other values associated with web-based system, such as the shared construction of knowledge in a public format. The research concludes that there are main factors that affect instructors’ adoption which are security, performance expectation, perceived benefits, subjective norm, and perceived usefulness.Keywords: Web 2.0, higher education, acceptance, students' perception
Procedia PDF Downloads 3371914 Spatial Correlation of Channel State Information in Real Long Range Measurement
Authors: Ahmed Abdelghany, Bernard Uguen, Christophe Moy, Dominique Lemur
Abstract:
The Internet of Things (IoT) is developed to ensure monitoring and connectivity within different applications. Thus, it is critical to study the channel propagation characteristics in Low Power Wide Area Network (LPWAN), especially Long Range Wide Area Network (LoRaWAN). In this paper, an in-depth investigation of the reciprocity between the uplink and downlink Channel State Information (CSI) is done by performing an outdoor measurement campaign in the area of Campus Beaulieu in Rennes. At each different location, the CSI reciprocity is quantified using the Pearson Correlation Coefficient (PCC) which shows a very high linear correlation between the uplink and downlink CSI. This reciprocity feature could be utilized for the physical layer security between the node and the gateway. On the other hand, most of the CSI shapes from different locations are highly uncorrelated from each other. Hence, it can be anticipated that this could achieve significant localization gain by utilizing the frequency hopping in the LoRa systems by getting access to a wider band.Keywords: IoT, LPWAN, LoRa, effective signal power, onsite measurement
Procedia PDF Downloads 1621913 Comparison of Web Development Using Framework over Library
Authors: Syamsul Syafiq, Maslina Daud, Hafizah Hasan, Ahmad Zairi, Shazil Imri, Ezaini Akmar, Norbazilah Rahim
Abstract:
Over recent years, web development has changed significantly. Driven largely by the rise of trends like mobiles, the world of development is rapidly evolving. The rise of the Internet makes web applications crucial nowadays. The web application has been an interface for a company and one of the ways they present their portfolio to the client. On the other hand, the web has become part of the file management system which takes over the role of paper. Due to high demand in web applications, developers are required to develop a web application that are cost-effective, secure and well coded. A framework has been proposed to develop an application rather than using library style development. The framework is helping the developer in creating the structure of a web automatically. This paper will compare the advantages and disadvantages of web development using framework against library-style development. This comparison is based on a previous research paper focusing on two main indicators, which are the impact to management and impact to the developer.Keywords: framework, library style development, web application development, traditional web, static web, dynamic web
Procedia PDF Downloads 2241912 An Energy Efficient Clustering Approach for Underwater Wireless Sensor Networks
Authors: Mohammad Reza Taherkhani
Abstract:
Wireless sensor networks that are used to monitor a special environment, are formed from a large number of sensor nodes. The role of these sensors is to sense special parameters from ambient and to make a connection. In these networks, the most important challenge is the management of energy usage. Clustering is one of the methods that are broadly used to face this challenge. In this paper, a distributed clustering protocol based on learning automata is proposed for underwater wireless sensor networks. The proposed algorithm that is called LA-Clustering forms clusters in the same energy level, based on the energy level of nodes and the connection radius regardless of size and the structure of sensor network. The proposed approach is simulated and is compared with some other protocols with considering some metrics such as network lifetime, number of alive nodes, and number of transmitted data. The simulation results demonstrate the efficiency of the proposed approach.Keywords: underwater sensor networks, clustering, learning automata, energy consumption
Procedia PDF Downloads 3611911 Applying Personel Resilence and Emotional Agitation in Occupational, Health and Safety Education and Training
Authors: M. Jayandran
Abstract:
Continual professional development is an important concept for safety professionals to strengthen the knowledge base and to achieve the required qualifications or international memberships in a given time. But the main problems which have observed among most of the safety aspirants are as follows: lack of focus, inferiority complex, superiority complex, lack of interest and lethargy, family and off job stress, health issues, usage of drugs and alcohol, and absenteeism. A HSE trainer should be an expert in soft skills and other stress, emotional handling techniques, so as to manage the above aspirants during training. To do this practice, a trainer has to brainstorm himself of few of the soft skills like personnel resilience, mnemonic techniques, mind healing, and subconscious suggestion techniques by integrating with an emotional intelligence quotient of the aspirants. By adopting these techniques, a trainer can successfully deliver the course and influence the different types of audience to achieve success in training.Keywords: personnel resilience, mnemonic techniques, mind healing, sub conscious suggestion techniques
Procedia PDF Downloads 3071910 Evaluation of Minimization of Moment Ratio Method by Physical Modeling
Authors: Amin Eslami, Jafar Bolouri Bazaz
Abstract:
Under active stress conditions, a rigid cantilever retaining wall tends to rotate about a pivot point located within the embedded depth of the wall. For purely granular and cohesive soils, a methodology was previously reported called minimization of moment ratio to determine the location of the pivot point of rotation. The usage of this new methodology is to estimate the rotational stability safety factor. Moreover, the degree of improvement required in a backfill to get a desired safety factor can be estimated by the concept of the shear strength demand. In this article, the accuracy of this method for another type of cantilever walls called Contiguous Bored Pile (CBP) retaining wall is evaluated by using physical modeling technique. Based on observations, the results of moment ratio minimization method are in good agreement with the results of the carried out physical modeling.Keywords: cantilever retaining wall, physical modeling, minimization of moment ratio method, pivot point
Procedia PDF Downloads 332