Search results for: task and ego orientation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3184

Search results for: task and ego orientation

1654 Determinants of the Shadow Economy with an Islamic Orientation: An Application to Organization of Islamic Cooperation and Non-Organization of Islamic Cooperation Countries

Authors: Shabeer Khan

Abstract:

The main objective of Islamic Finance is to promote social justice thorough financial inclusion and redistribution of economic resources between rich and poor. The approach of Islamic finance is more comprehensive in nature and covers both formal and informal sectors of the economy, first, through reducing the gap between both sectors, and second by using specific Islamic values to reallocate the wealth between formal and informal sectors. Applying Generalized Method of Movements (GMM) to the annual data spanning from 1995-2015 for 141 countries, this study explores the determinants of informal business sector in Organization of Islamic Cooperation (OIC) countries and then compares with Non-OIC countries. Economic freedom and institutions variables as well as economic growth and money supply are found to reduce informal business sector in both OIC and Non-OIC nations while government expenditure are found to increase informal business sector in both group of nations. Informal Business sector remain the same in both types of countries but still the majority Muslim population in OIC economies create main difference between both groups of nations and justify the potential role of Islamic Finance in informal business sector in OIC nations. The study suggests that institutions quality should be improved and entrepreneurs’ friendly business environment must be provided. This study refines the main features of informal business sector and discuss their implications on policy designing and implementation, particularly in the context of Islamic finance fight against poverty, inequality and improving living standards of informal sector participants in OIC countries.

Keywords: Islamic finance, informal Business Sector, Generalized Method of Movements (GMM) and OIC

Procedia PDF Downloads 149
1653 The Layered Transition Metal Dichalcogenides as Materials for Storage Clean Energy: Ab initio Investigations

Authors: S. Meziane, H. I. Faraoun, C. Esling

Abstract:

Transition metal dichalcogenides have potential applications in power generation devices that convert waste heat into electric current by the so-called Seebeck and Hall effects thus providing an alternative energy technology to reduce the dependence on traditional fossil fuels. In this study, the thermoelectric properties of 1T and 2HTaX2 (X= S or Se) dichalcogenide superconductors have been computed using the semi-classical Boltzmann theory. Technologically, the task is to fabricate suitable materials with high efficiency. It is found that 2HTaS2 possesses the largest value of figure of merit ZT= 1.27 at 175 K. From a scientific point of view, we aim to model the underlying materials properties and in particular the transport phenomena as mediated by electrons and lattice vibrations responsible for superconductivity, Charge Density Waves (CDW) and metal/insulator transitions as function of temperature. The goal of the present work is to develop an understanding of the superconductivity of these selected materials using the transport properties at the fundamental level.

Keywords: Ab initio, High efficiency, Power generation devices, Transition metal dichalcogenides

Procedia PDF Downloads 197
1652 Factors Affecting English Language Acquisition and Learning for Primary Schools in Nigeria

Authors: Chibuzor Dalmeida

Abstract:

This paper shall discuss the factors affecting English Language Acquisition and Learning for Primary School in Nigeria. Learning English language is a difficult task mostly those at the primary school level. Pupils find it more difficult on vocabulary, grammar and sentence structure, idioms, pronunciation etc. Researchers have discovered the reasons behind these discrepancies and have formulated theories that could be of utmost assistance to English language teachers and students. This paper further looked at the following factors that include Learner Characteristics and Personal Traits, Situational and Environmental Factors, Prior Language Development and Competence and Age and Brain Development. It further recommended that pupils must learn new vocabulary, rules for grammar and sentence structure, idioms, pronunciation. Pupils whose families and communities set high standards for language acquisition learn more quickly than those who do not. Exposure to high-quality programs also essential. Pupils do best when they are allowed to speak their native language.

Keywords: acquisition, affecting, factors, learning

Procedia PDF Downloads 629
1651 Experimental Study of Hyperparameter Tuning a Deep Learning Convolutional Recurrent Network for Text Classification

Authors: Bharatendra Rai

Abstract:

The sequence of words in text data has long-term dependencies and is known to suffer from vanishing gradient problems when developing deep learning models. Although recurrent networks such as long short-term memory networks help to overcome this problem, achieving high text classification performance is a challenging problem. Convolutional recurrent networks that combine the advantages of long short-term memory networks and convolutional neural networks can be useful for text classification performance improvements. However, arriving at suitable hyperparameter values for convolutional recurrent networks is still a challenging task where fitting a model requires significant computing resources. This paper illustrates the advantages of using convolutional recurrent networks for text classification with the help of statistically planned computer experiments for hyperparameter tuning.

Keywords: long short-term memory networks, convolutional recurrent networks, text classification, hyperparameter tuning, Tukey honest significant differences

Procedia PDF Downloads 129
1650 A Taxonomy of Behavior for a Medical Coordinator by Utlizing Leadership Styles

Authors: Aryana Collins Jackson, Elisabetta Bevacqua, Pierre De Loor, Ronan Querrec

Abstract:

This paper presents a taxonomy of non-technical skills, communicative intentions, and behavior for an individual acting as a medical coordinator. In medical emergency situations, a leader among the group is imperative to both patient health and team emotional and mental health. Situational Leadership is used to make clear and easy-to-follow guidelines for behavior depending on circumstantial factors. Low-level leadership behaviors belonging to two different styles, directive and supporting, are identified from literature and are included in the proposed taxonomy. The high-level information in the taxonomy consists of the necessary non-technical skills belonging to a medical coordinator: situation awareness, decision making, task management, and teamwork. Finally, communicative intentions, dimensions, and functions are included. Thus this work brings high-level and low-level information - medical non-technical skills, communication capabilities, and leadership behavior - into a single versatile taxonomy of behavior.

Keywords: human behavior, leadership styles, medical, taxonomy

Procedia PDF Downloads 159
1649 Unauthorized License Verifier and Secure Access to Vehicle

Authors: G. Prakash, L. Mohamed Aasiq, N. Dhivya, M. Jothi Mani, R. Mounika, B. Gomathi

Abstract:

In our day to day life, many people met with an accident due to various reasons like over speed, overload in the vehicle, violation of the traffic rules, etc. Driving license system is difficult task for the government to monitor. To prevent non-licensees from driving who are causing most of the accidents, a new system is proposed. The proposed system consists of a smart card capable of storing the license details of a particular person. Vehicles such as cars, bikes etc., should have a card reader capable of reading the particular license. A person, who wishes to drive the vehicle, should insert the card (license) in the vehicle and then enter the password in the keypad. If the license data stored in the card and database about the entire license holders in the microcontroller matches, he/she can proceed for ignition after the automated opening of the fuel tank valve, otherwise the user is restricted to use the vehicle. Moreover, overload detector in our proposed system verifies and then prompts the user to avoid overload before driving. This increases the security of vehicles and also ensures safe driving by preventing accidents.

Keywords: license, verifier, EEPROM, secure, overload detection

Procedia PDF Downloads 242
1648 Rainstorm Characteristics over the Northeastern Region of Thailand: Weather Radar Analysis

Authors: P. Intaracharoen, P. Chantraket, C. Detyothin, S. Kirtsaeng

Abstract:

Radar reflectivity data from Phimai weather radar station of DRRAA (Department of Royal Rainmaking and Agricultural Aviation) were used to analyzed the rainstorm characteristics via Thunderstorm Identification Tracking Analysis and Nowcasting (TITAN) algorithm. The Phimai weather radar station was situated at Nakhon Ratchasima province, northeastern Thailand. The data from 277 days of rainstorm events occurring from May 2016 to May 2017 were used to investigate temporal distribution characteristics of convective individual rainclouds. The important storm properties, structures, and their behaviors were analyzed by 9 variables as storm number, storm duration, storm volume, storm area, storm top, storm base, storm speed, storm orientation, and maximum storm reflectivity. The rainstorm characteristics were also examined by separating the data into two periods as wet and dry season followed by an announcement of TMD (Thai Meteorological Department), under the influence of southwest monsoon (SWM) and northeast monsoon (NEM). According to the characteristics of rainstorm results, it can be seen that rainstorms during the SWM influence were found to be the most potential rainstorms over northeastern region of Thailand. The SWM rainstorms are larger number of the storm (404, 140 no./day), storm area (34.09, 26.79 km²) and storm volume (95.43, 66.97 km³) than NEM rainstorms, respectively. For the storm duration, the average individual storm duration during the SWM and NEM was found a minor difference in both periods (47.6, 48.38 min) and almost all storm duration in both periods were less than 3 hours. The storm velocity was not exceeding 15 km/hr (13.34 km/hr for SWM and 10.67 km/hr for NEM). For the rainstorm reflectivity, it was found a little difference between wet and dry season (43.08 dBz for SWM and 43.72 dBz for NEM). It assumed that rainstorms occurred in both seasons have same raindrop size.

Keywords: rainstorm characteristics, weather radar, TITAN, Northeastern Thailand

Procedia PDF Downloads 193
1647 Performance Comparison of AODV and Soft AODV Routing Protocol

Authors: Abhishek, Seema Devi, Jyoti Ohri

Abstract:

A mobile ad hoc network (MANET) represents a system of wireless mobile nodes that can self-organize freely and dynamically into arbitrary and temporary network topology. Unlike a wired network, wireless network interface has limited transmission range. Routing is the task of forwarding data packets from source to a given destination. Ad-hoc On Demand Distance Vector (AODV) routing protocol creates a path for a destination only when it required. This paper describes the implementation of AODV routing protocol using MATLAB-based Truetime simulator. In MANET's node movements are not fixed while they are random in nature. Hence intelligent techniques i.e. fuzzy and ANFIS are used to optimize the transmission range. In this paper, we compared the transmission range of AODV, fuzzy AODV and ANFIS AODV. For soft computing AODV, we have taken transmitted power and received threshold as input and transmission range as output. ANFIS gives better results as compared to fuzzy AODV.

Keywords: ANFIS, AODV, fuzzy, MANET, reactive routing protocol, routing protocol, truetime

Procedia PDF Downloads 498
1646 Frequent-Pattern Tree Algorithm Application to S&P and Equity Indexes

Authors: E. Younsi, H. Andriamboavonjy, A. David, S. Dokou, B. Lemrabet

Abstract:

Software and time optimization are very important factors in financial markets, which are competitive fields, and emergence of new computer tools further stresses the challenge. In this context, any improvement of technical indicators which generate a buy or sell signal is a major issue. Thus, many tools have been created to make them more effective. This worry about efficiency has been leading in present paper to seek best (and most innovative) way giving largest improvement in these indicators. The approach consists in attaching a signature to frequent market configurations by application of frequent patterns extraction method which is here most appropriate to optimize investment strategies. The goal of proposed trading algorithm is to find most accurate signatures using back testing procedure applied to technical indicators for improving their performance. The problem is then to determine the signatures which, combined with an indicator, outperform this indicator alone. To do this, the FP-Tree algorithm has been preferred, as it appears to be the most efficient algorithm to perform this task.

Keywords: quantitative analysis, back-testing, computational models, apriori algorithm, pattern recognition, data mining, FP-tree

Procedia PDF Downloads 361
1645 Higher Order Thinking Skills Workshop: Faculty Professional Development and Its Effect on Their Teaching Strategies

Authors: Amani Hamdan

Abstract:

A post-workshop of higher-order thinking skills (HOTS), for faculty from diverse academic disciplines, was conducted and the researcher surveyed the participants’ intentions and plans to include HOTS as a goal, as learning and teaching task in their practices. Follow-up interviews with a random sample of participants were used to determine if they fulfilled their intentions three 3 months after the workshop. The degree of planned and enacted HOTS then was analyzed against the post-workshop HOT ability and knowledge. This is one topic that has not been adequately explored in faculty professional development literature where measuring the effect of learning on their ability to use what they learned. This qualitative method study explored a group of male and female faculty members (n=85) enrolled in HOTS 2 day workshop. The results showed that 89% of faculty members although were mostly enthused to apply what they learned after a 3 months period they were caught up with routine presentations and lecturing.

Keywords: higher education, faculty development, Saudi Arabia, higher order thinking skills

Procedia PDF Downloads 457
1644 The Use of Videoconferencing in a Task-Based Beginners' Chinese Class

Authors: Sijia Guo

Abstract:

The development of new technologies and the falling cost of high-speed Internet access have made it easier for institutes and language teachers to opt different ways to communicate with students at distance. The emergence of web-conferencing applications, which integrate text, chat, audio / video and graphic facilities, offers great opportunities for language learning to through the multimodal environment. This paper reports on data elicited from a Ph.D. study of using web-conferencing in the teaching of first-year Chinese class in order to promote learners’ collaborative learning. Firstly, a comparison of four desktop videoconferencing (DVC) tools was conducted to determine the pedagogical value of the videoconferencing tool-Blackboard Collaborate. Secondly, the evaluation of 14 campus-based Chinese learners who conducted five one-hour online sessions via the multimodal environment reveals the users’ choice of modes and their learning preference. The findings show that the tasks designed for the web-conferencing environment contributed to the learners’ collaborative learning and second language acquisition.

Keywords: computer-mediated communication (CMC), CALL evaluation, TBLT, web-conferencing, online Chinese teaching

Procedia PDF Downloads 309
1643 Generative AI: A Comparison of Conditional Tabular Generative Adversarial Networks and Conditional Tabular Generative Adversarial Networks with Gaussian Copula in Generating Synthetic Data with Synthetic Data Vault

Authors: Lakshmi Prayaga, Chandra Prayaga. Aaron Wade, Gopi Shankar Mallu, Harsha Satya Pola

Abstract:

Synthetic data generated by Generative Adversarial Networks and Autoencoders is becoming more common to combat the problem of insufficient data for research purposes. However, generating synthetic data is a tedious task requiring extensive mathematical and programming background. Open-source platforms such as the Synthetic Data Vault (SDV) and Mostly AI have offered a platform that is user-friendly and accessible to non-technical professionals to generate synthetic data to augment existing data for further analysis. The SDV also provides for additions to the generic GAN, such as the Gaussian copula. We present the results from two synthetic data sets (CTGAN data and CTGAN with Gaussian Copula) generated by the SDV and report the findings. The results indicate that the ROC and AUC curves for the data generated by adding the layer of Gaussian copula are much higher than the data generated by the CTGAN.

Keywords: synthetic data generation, generative adversarial networks, conditional tabular GAN, Gaussian copula

Procedia PDF Downloads 82
1642 Enhancement Dynamic Cars Detection Based on Optimized HOG Descriptor

Authors: Mansouri Nabila, Ben Jemaa Yousra, Motamed Cina, Watelain Eric

Abstract:

Research and development efforts in intelligent Advanced Driver Assistance Systems (ADAS) seek to save lives and reduce the number of on-road fatalities. For traffic and emergency monitoring, the essential but challenging task is vehicle detection and tracking in reasonably short time. This purpose needs first of all a powerful dynamic car detector model. In fact, this paper presents an optimized HOG process based on shape and motion parameters fusion. Our proposed approach mains to compute HOG by bloc feature from foreground blobs using configurable research window and pathway in order to overcome the shortcoming in term of computing time of HOG descriptor and improve their dynamic application performance. Indeed we prove in this paper that HOG by bloc descriptor combined with motion parameters is a very suitable car detector which reaches in record time a satisfactory recognition rate in dynamic outside area and bypasses several popular works without using sophisticated and expensive architectures such as GPU and FPGA.

Keywords: car-detector, HOG, motion, computing time

Procedia PDF Downloads 323
1641 Experiencing Daylight in Architectural Spaces: A Case Study of Public Buildings in the Context of Karachi, Pakistan

Authors: Safia Asif, Saadia Bano

Abstract:

In a world with rapidly depleting resources, using artificial lighting during daytime is an act of human ignorance. Imitated light is the major source of energy consumption in public buildings. Despite, the fact that substantial working hours of these buildings usually persist in natural daylight time; there is a trend of isolated, un-fenestrated and a-contextual interiors majorly dependent on active energy sources. On the contrary, if direct and un-controlled sunlight is allowed inside the building, it will create visual and thermal discomfort. Controlled daylighting with appropriate design mechanisms is one of the important aspects of achieving thermal and visual comfort. The natural sunlight can be utilized intelligently with the help of architectural thermal controlling mechanisms to achieve a healthy and productive environment. This paper is an attempt to investigate and analyze the importance of daylighting with reference to energy efficiency and thermal comfort. For this purpose, three public buildings including two educational institutions and one general post office are selected, as case-studies in the context of Karachi, Pakistan. Various parameters of visual and thermal comfort are analyzed which includes orientation, ceiling heights, overall building profile along with daylight controlling mechanisms in terms of penetration, distribution, protection, and control. In the later part of the research, a questionnaire survey is also conducted to evaluate the user experience in terms of adequate daylighting and thermal comfort.

Keywords: daylight, public buildings, sustainable architecture, visual and thermal comfort

Procedia PDF Downloads 210
1640 Estimation of Functional Response Model by Supervised Functional Principal Component Analysis

Authors: Hyon I. Paek, Sang Rim Kim, Hyon A. Ryu

Abstract:

In functional linear regression, one typical problem is to reduce dimension. Compared with multivariate linear regression, functional linear regression is regarded as an infinite-dimensional case, and the main task is to reduce dimensions of functional response and functional predictors. One common approach is to adapt functional principal component analysis (FPCA) on functional predictors and then use a few leading functional principal components (FPC) to predict the functional model. The leading FPCs estimated by the typical FPCA explain a major variation of the functional predictor, but these leading FPCs may not be mostly correlated with the functional response, so they may not be significant in the prediction for response. In this paper, we propose a supervised functional principal component analysis method for a functional response model with FPCs obtained by considering the correlation of the functional response. Our method would have a better prediction accuracy than the typical FPCA method.

Keywords: supervised, functional principal component analysis, functional response, functional linear regression

Procedia PDF Downloads 76
1639 Retrieval-Induced Forgetting Effects in Retrospective and Prospective Memory in Normal Aging: An Experimental Study

Authors: Merve Akca

Abstract:

Retrieval-induced forgetting (RIF) refers to the phenomenon that selective retrieval of some information impairs memory for related, but not previously retrieved information. Despite age differences in retrieval-induced forgetting regarding retrospective memory being documented, this research aimed to highlight age differences in RIF of the prospective memory tasks for the first time. By using retrieval-practice paradigm, this study comparatively examined RIF effects in retrospective memory and event-based prospective memory in young and old adults. In this experimental study, a mixed factorial design with age group (Young, Old) as a between-subject variable, and memory type (Prospective, Retrospective) and item type (Practiced, Non-practiced) as within-subject variables was employed. Retrieval-induced forgetting was observed in the retrospective but not in the prospective memory task. Therefore, the results indicated that selective retrieval of past events led to suppression of other related past events in both age groups but not the suppression of memory for future intentions.

Keywords: prospective memory, retrieval-induced forgetting, retrieval inhibition, retrospective memory

Procedia PDF Downloads 316
1638 Public Perception of Energy Security in Lithuania: Between Material Interest and Energy Independence

Authors: Dainius Genys, Vylius Leonavicius, Ricardas Krikstolaitis

Abstract:

Energy security problems in Lithuania are analyzed on a regular basis; however, there is no comprehensive research on the very issue of the concept of public energy security. There is a lack of attention not only to social determinants of perception of energy security, but also a lack of a deeper analysis of the public opinion. This article aims to research the Lithuanian public perception of energy security. Complex tasks were set during the sociological study. Survey questionnaire consisted of different sets of questions: view of energy security (risk perception, political orientation, and energy security; comprehensiveness and energy security); view of energy risks and threats (perception of energy safety factors; individual dependence and burden; disobedience and risk); view of the activity of responsible institutions (energy policy assessment; confidence in institutions and energy security), demographic issues. In this article, we will focus on two aspects: a) We will analyze public opinion on the most important aspects of energy security and social factors influencing them; The hypothesis is made that public perception of energy security is related to value orientations: b) We will analyze how public opinion on energy policy executed by the government and confidence in the government are intertwined with the concept of energy security. Data of the survey, conducted on May 10-19 and June 7-17, 2013, when Seimas and the government consisted of the coalition dominated by Social Democrats with Labor, Order and Justice Parties and the Electoral Action of Poles, were used in this article. It is important to note that the survey was conducted prior to Russia’s occupation of the Crimea.

Keywords: energy security, public opinion, risk, energy threat, energy security policy

Procedia PDF Downloads 510
1637 Hierarchical Tree Long Short-Term Memory for Sentence Representations

Authors: Xiuying Wang, Changliang Li, Bo Xu

Abstract:

A fixed-length feature vector is required for many machine learning algorithms in NLP field. Word embeddings have been very successful at learning lexical information. However, they cannot capture the compositional meaning of sentences, which prevents them from a deeper understanding of language. In this paper, we introduce a novel hierarchical tree long short-term memory (HTLSTM) model that learns vector representations for sentences of arbitrary syntactic type and length. We propose to split one sentence into three hierarchies: short phrase, long phrase and full sentence level. The HTLSTM model gives our algorithm the potential to fully consider the hierarchical information and long-term dependencies of language. We design the experiments on both English and Chinese corpus to evaluate our model on sentiment analysis task. And the results show that our model outperforms several existing state of the art approaches significantly.

Keywords: deep learning, hierarchical tree long short-term memory, sentence representation, sentiment analysis

Procedia PDF Downloads 349
1636 Establishing Feedback Partnerships in Higher Education: A Discussion of Conceptual Framework and Implementation Strategies

Authors: Jessica To

Abstract:

Feedback is one of the powerful levers for enhancing students’ performance. However, some students are under-engaged with feedback because they lack responsibility for feedback uptake. To resolve this conundrum, recent literature proposes feedback partnerships in which students and teachers share the power and responsibilities to co-construct feedback. During feedback co-construction, students express feedback needs to teachers, and teachers respond to individuals’ needs in return. Though this approach can increase students’ feedback ownership, its application is lagging as the field lacks conceptual clarity and implementation guide. This presentation aims to discuss the conceptual framework of feedback partnerships and feedback co-construction strategies. It identifies the components of feedback partnerships and strategies which could facilitate feedback co-construction. A systematic literature review was conducted to answer the questions. The literature search was performed using ERIC, PsycINFO, and Google Scholar with the keywords “assessment partnership”, “student as partner,” and “feedback engagement”. No time limit was set for the search. The inclusion criteria encompassed (i) student-teacher partnerships in feedback, (ii) feedback engagement in higher education, (iii) peer-reviewed publications, and (iv) English as the language of publication. Those without addressing conceptual understanding and implementation strategies were excluded. Finally, 65 publications were identified and analysed using thematic analysis. For the procedure, the texts relating to the questions were first extracted. Then, codes were assigned to summarise the ideas of the texts. Upon subsuming similar codes into themes, four themes emerged: students’ responsibilities, teachers’ responsibilities, conditions for partnerships development, and strategies. Their interrelationships were examined iteratively for framework development. Establishing feedback partnerships required different responsibilities of students and teachers during feedback co-construction. Students needed to self-evaluate performance against task criteria, identify inadequacies and communicate their needs to teachers. During feedback exchanges, they interpreted teachers’ comments, generated self-feedback through reflection, and co-developed improvement plans with teachers. Teachers had to increase students’ understanding of criteria and evaluation skills and create opportunities for students’ expression of feedback needs. In feedback dialogue, teachers responded to students’ needs and advised on the improvement plans. Feedback partnerships would be best grounded in an environment with trust and psychological safety. Four strategies could facilitate feedback co-construction. First, students’ understanding of task criteria could be increased by rubrics explanation and exemplar analysis. Second, students could sharpen evaluation skills if they participated in peer review and received teacher feedback on the quality of peer feedback. Third, provision of self-evaluation checklists and prompts and teacher modeling of self-assessment process could aid students in articulating feedback needs. Fourth, the trust could be fostered when teachers explained the benefits of feedback co-construction, showed empathy, and provided personalised comments in dialogue. Some strategies were applied in interactive cover sheets in which students performed self-evaluation and made feedback requests on a cover sheet during assignment submission, followed by teachers’ response to individuals’ requests. The significance of this presentation lies in unpacking the conceptual framework of feedback partnerships and outlining feedback co-construction strategies. With a solid foundation in theory and practice, researchers and teachers could better enhance students’ engagement with feedback.

Keywords: conceptual framework, feedback co-construction, feedback partnerships, implementation strategies

Procedia PDF Downloads 90
1635 Action Research through Drama in Education on Adolescents’ Career Self-Efficacy and Decision-Making Skills Development

Authors: Christina Zourna, Ioanna Papavassiliou-Alexiou

Abstract:

The purpose of this multi-phased action research PhD study in Greece was to investigate if and how Drama in Education (DiE) – used as an innovative group counselling method – may have positive effects on secondary education students’career self-efficacy and career decision-making skills development. Using both quantitative and qualitative research tools, high quality data were gathered at various stages of the research and were analysed through multivariate methods and open-source computer aided data analysis software such as R Studio, QualCoder, and SPSS packages. After a five-month-long educational intervention based on DiE method, it was found that 9th, 10th, and 11th gradersameliorated their self-efficacy and learned the process of making an informed career decision – through targeted information gathering about themselves and possible study paths – thus, developing career problem-solving and career management skills. Gender differences were non statistically important, while differences in grades showed a minor influence on some of the measured factorssuch as general career indecisiveness and self-evaluation. Students in the 11th grade scored significantly higher than younger students in the career self-efficacy scale and have stronger faith in their abilities e.g., choosing general over vocational school and major study orientation. The study has shown that DiE can be effective in group career guidance, especially concerning the pillars of self-awareness, self-efficacy, and career decision-making processes.

Keywords: career decision-making skills, career self-efficacy, CDDQ scale, CDMSE-SF scale, drama in education method

Procedia PDF Downloads 125
1634 Semantic Textual Similarity on Contracts: Exploring Multiple Negative Ranking Losses for Sentence Transformers

Authors: Yogendra Sisodia

Abstract:

Researchers are becoming more interested in extracting useful information from legal documents thanks to the development of large-scale language models in natural language processing (NLP), and deep learning has accelerated the creation of powerful text mining models. Legal fields like contracts benefit greatly from semantic text search since it makes it quick and easy to find related clauses. After collecting sentence embeddings, it is relatively simple to locate sentences with a comparable meaning throughout the entire legal corpus. The author of this research investigated two pre-trained language models for this task: MiniLM and Roberta, and further fine-tuned them on Legal Contracts. The author used Multiple Negative Ranking Loss for the creation of sentence transformers. The fine-tuned language models and sentence transformers showed promising results.

Keywords: legal contracts, multiple negative ranking loss, natural language inference, sentence transformers, semantic textual similarity

Procedia PDF Downloads 108
1633 Amharic Text News Classification Using Supervised Learning

Authors: Misrak Assefa

Abstract:

The Amharic language is the second most widely spoken Semitic language in the world. There are several new overloaded on the web. Searching some useful documents from the web on a specific topic, which is written in the Amharic language, is a challenging task. Hence, document categorization is required for managing and filtering important information. In the classification of Amharic text news, there is still a gap in the domain of information that needs to be launch. This study attempts to design an automatic Amharic news classification using a supervised learning mechanism on four un-touch classes. To achieve this research, 4,182 news articles were used. Naive Bayes (NB) and Decision tree (j48) algorithms were used to classify the given Amharic dataset. In this paper, k-fold cross-validation is used to estimate the accuracy of the classifier. As a result, it shows those algorithms can be applicable in Amharic news categorization. The best average accuracy result is achieved by j48 decision tree and naïve Bayes is 95.2345 %, and 94.6245 % respectively using three categories. This research indicated that a typical decision tree algorithm is more applicable to Amharic news categorization.

Keywords: text categorization, supervised machine learning, naive Bayes, decision tree

Procedia PDF Downloads 211
1632 Education in Schools and Public Policy in India

Authors: Sujeet Kumar

Abstract:

Education has greater importance particularly in terms of increasing human capital and economic competitiveness. It plays a crucial role in terms of cognitive and skill development. Its plays a vital role in process of socialization, fostering social justice, and enhancing social cohesion. Policy related to education has been always a priority for developed countries, which is later adopted by developing countries also. The government of India has also brought change in education polices in line with recognizing change at national and supranational level. However, quality education is still not become an open door for every child in India and several reports are produced year to year about level of school education in India. This paper is concerned with schooling in India. Particularly, it focuses on two government and two private schools in Bihar, but reference has made to schools in Delhi especially around slum communities. The paper presents brief historical context and an overview of current school systems in India. Later, it focuses on analysis of current development in policy in reference with field observation, which is anchored around choice, diversity, market – orientation and gap between different groups of pupils. There is greater degree of difference observed at private and government school levels in terms of quality of teachers, method of teaching and overall environment of learning. The paper concludes that the recent policy development in education particularly Sarva Siksha Abhiyaan (SAA) and Right to Education Act (2009) has required renovating new approach to bridge the gap through broader consultation at grassroots and participatory approach with different stakeholders.

Keywords: education, public policy, participatory approach

Procedia PDF Downloads 394
1631 Static and Dynamic Analysis of Microcantilever Beam

Authors: S. B. Kerur, B. S. Murgayya

Abstract:

The development of micro and nano particle is challenging task and the study of the behavior of material at the micro level is gaining importance as their behavior at micro/nano level is different. These micro particle are being used as a sensing element to measure and detects the hazardous chemical, gases, explosives and biological agents. In the present study, finite element method is used for static and dynamic analysis of simple and composite cantilever beams of different shapes. The present FE model is validated with available analytical results and various parameters like shape, materials properties, damped and undamped conditions are considered for the numerical study. The results show the effects of shape change on the natural frequency and as these are used with fluid for chemical applications, the effect of damping due to viscous nature of fluid are simulated by considering different damping coefficient effect on the dynamic behavior of cantilever beams. The obtained results show the effect of these parameters can be effectively utilized based on system requirements.

Keywords: micro, FEM, dynamic, cantilever beam

Procedia PDF Downloads 383
1630 Organizational Learning, Job Satisfaction and Work Performance among Nurses

Authors: Rafia Rafique, Arifa Khadim

Abstract:

This research investigates the moderating role of job satisfaction between organizational learning and work performance among nurses. Correlation research design was used. Non-probability purposive sampling technique was utilized to recruit a sample of 110 nurses from public hospitals situated in the city of Lahore. The construct of organizational learning was measured using subscale of Integrated Scale for Measuring Organizational Learning. Job satisfaction was measured with the help of Job Satisfaction Survey. Performance of employees (task performance, contextual performance and counterproductive work behavior) was assessed by Individual Work Performance Questionnaire. Job satisfaction negatively moderates the relationship between organizational learning and counterproductive work behavior. Education has a significant positive relationship with organizational learning. Age, current hospital experience, marital satisfaction and salary of the nurses have positive relationship while number of children has significant negative relationship with counterproductive work behavior. These outcomes can be insightful in understanding the dynamics involved in work performance. Based on the result of this study relevant solutions can be proposed to improve the work performance of nurses.

Keywords: counterproductive work behavior, nurses, organizational learning, work performance

Procedia PDF Downloads 445
1629 A Software Engineering Methodology for Developing Secure Obfuscated Software

Authors: Carlos Gonzalez, Ernesto Linan

Abstract:

We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.

Keywords: development methodology, obfuscated software, secure software development, software engineering

Procedia PDF Downloads 250
1628 Assessing Firm Readiness to Implement Cloud Computing: Toward a Comprehensive Model

Authors: Seyed Mohammadbagher Jafari, Elahe Mahdizadeh, Masomeh Ghahremani

Abstract:

Nowadays almost all organizations depend on information systems to run their businesses. Investment on information systems and their maintenance to keep them always in best situation to support firm business is one of the main issues for every organization. The new concept of cloud computing was developed as a technical and economic model to address this issue. In cloud computing the computing resources, including networks, applications, hardwares and services are configured as needed and are available at the moment of request. However, migration to cloud is not an easy task and there are many issues that should be taken into account. This study tries to provide a comprehensive model to assess a firm readiness to implement cloud computing. By conducting a systematic literature review, four dimensions of readiness were extracted which include technological, human, organizational and environmental dimensions. Every dimension has various criteria that have been discussed in details. This model provides a framework for cloud computing readiness assessment. Organizations that intend to migrate to cloud can use this model as a tool to assess their firm readiness before making any decision on cloud implementation.

Keywords: cloud computing, human readiness, organizational readiness, readiness assessment model

Procedia PDF Downloads 396
1627 A Study of Numerical Reaction-Diffusion Systems on Closed Surfaces

Authors: Mei-Hsiu Chi, Jyh-Yang Wu, Sheng-Gwo Chen

Abstract:

The diffusion-reaction equations are important Partial Differential Equations in mathematical biology, material science, physics, and so on. However, finding efficient numerical methods for diffusion-reaction systems on curved surfaces is still an important and difficult problem. The purpose of this paper is to present a convergent geometric method for solving the reaction-diffusion equations on closed surfaces by an O(r)-LTL configuration method. The O(r)-LTL configuration method combining the local tangential lifting technique and configuration equations is an effective method to estimate differential quantities on curved surfaces. Since estimating the Laplace-Beltrami operator is an important task for solving the reaction-diffusion equations on surfaces, we use the local tangential lifting method and a generalized finite difference method to approximate the Laplace-Beltrami operators and we solve this reaction-diffusion system on closed surfaces. Our method is not only conceptually simple, but also easy to implement.

Keywords: closed surfaces, high-order approachs, numerical solutions, reaction-diffusion systems

Procedia PDF Downloads 376
1626 An Intergenerational Study of Iranian Migrant Families in Australia: Exploring Language, Identity, and Acculturation

Authors: Alireza Fard Kashani

Abstract:

This study reports on the experiences and attitudes of six Iranian migrant families, from two groups of asylum seekers and skilled workers, with regard to their language, identity, and acculturation in Australia. The participants included first generation parents and 1.5-generation adolescents, who had lived in Australia for a minimum of three years. For this investigation, Mendoza’s (1984, 2016) acculturation model, as well as poststructuralist views of identity, were employed. The semi-structured interview results have highlighted that Iranian parents and adolescents face low degrees of intergenerational conflicts in most domains of their acculturation. However, the structural and lawful patterns in Australia have caused some internal conflicts for the parents, especially fathers (e.g., their power status within the family or their children’s freedom). Furthermore, while most participants reported ‘cultural eclecticism’ as their preferred acculturation orientation, female participants seemed to be more eclectic than their male counterparts who showed inclination towards keeping more aspects of their home culture. This finding, however, highlights a meaningful effort on the part of husbands that in order to make their married lives continue well in Australia they need to re-consider the traditional male-dominated customs they used to have in Iran. As for identity, not only the parents but also the adolescents proudly identified themselves as Persians. In addition, with respect to linguistic behaviour, almost all adolescents showed enthusiasm to retain the Persian language at home to be able to maintain contacts with their relatives and friends in Iran and to enjoy many other benefits the language may offer them in the future.

Keywords: acculturation, asylum seekers, identity, intergenerational conflicts, language, skilled workers, 1.5 generation

Procedia PDF Downloads 239
1625 Improved Throttled Load Balancing Approach for Cloud Environment

Authors: Sushant Singh, Anurag Jain, Seema Sabharwal

Abstract:

Cloud computing is advancing with a rapid speed. Already, it has been adopted by a huge set of users. Easy to use and anywhere access like potential of cloud computing has made it more attractive relative to other technologies. This has resulted in reduction of deployment cost on user side. It has also allowed the big companies to sell their infrastructure to recover the installation cost for the organization. Roots of cloud computing have extended from Grid computing. Along with the inherited characteristics of its predecessor technologies it has also adopted the loopholes present in those technologies. Some of the loopholes are identified and corrected recently, but still some are yet to be rectified. Two major areas where still scope of improvement exists are security and performance. The proposed work is devoted to performance enhancement for the user of the existing cloud system by improving the basic throttled mapping approach between task and resources. The improved procedure has been tested using the cloud analyst simulator. The results are compared with the original and it has been found that proposed work is one step ahead of existing techniques.

Keywords: cloud analyst, cloud computing, load balancing, throttled

Procedia PDF Downloads 249