Search results for: random match probability
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3604

Search results for: random match probability

1984 Machine Learning Automatic Detection on Twitter Cyberbullying

Authors: Raghad A. Altowairgi

Abstract:

With the wide spread of social media platforms, young people tend to use them extensively as the first means of communication due to their ease and modernity. But these platforms often create a fertile ground for bullies to practice their aggressive behavior against their victims. Platform usage cannot be reduced, but intelligent mechanisms can be implemented to reduce the abuse. This is where machine learning comes in. Understanding and classifying text can be helpful in order to minimize the act of cyberbullying. Artificial intelligence techniques have expanded to formulate an applied tool to address the phenomenon of cyberbullying. In this research, machine learning models are built to classify text into two classes; cyberbullying and non-cyberbullying. After preprocessing the data in 4 stages; removing characters that do not provide meaningful information to the models, tokenization, removing stop words, and lowering text. BoW and TF-IDF are used as the main features for the five classifiers, which are; logistic regression, Naïve Bayes, Random Forest, XGboost, and Catboost classifiers. Each of them scores 92%, 90%, 92%, 91%, 86% respectively.

Keywords: cyberbullying, machine learning, Bag-of-Words, term frequency-inverse document frequency, natural language processing, Catboost

Procedia PDF Downloads 130
1983 Language Developmental Trends of Mandarin-Speaking Preschoolers in Beijing

Authors: Nga Yui Tong

Abstract:

Mandarin, the official language of China, is based on the Beijing dialect and is spoken by more than one billion people from all over the world. To investigate the trends of Mandarin acquisition, 192 preschoolers are recruited by stratified random sampling. They are from 4 different districts in Beijing, 2 schools in each district, with 4 age groups, both genders, and 3 children in each stratum. The children are paired up to conduct semi-structured free play for 30 minutes. Their language output is videotaped, transcribed, and coded for the calculation of Mean Length of Utterance (MLU). Two-way ANOVA showed that the variation of MLU is significantly contributed by age, which is coherent to previous findings of other languages. This first large-scale study to investigate the developmental trend of Mandarin in young children in Beijing provides empirical evidence to the development of standards and curriculum planning for early Mandarin education. Interestingly, the gender effect in the study is insignificant, with boys showing a slightly higher MLU than girls across all age groups and settings, except the 4.5 years same-gender dyads. The societal factors in the Chinese context on parenting and gender bias are worth looking into.

Keywords: Beijing, language development, Mandarin, preschoolers

Procedia PDF Downloads 118
1982 Stackelberg Security Game for Optimizing Security of Federated Internet of Things Platform Instances

Authors: Violeta Damjanovic-Behrendt

Abstract:

This paper presents an approach for optimal cyber security decisions to protect instances of a federated Internet of Things (IoT) platform in the cloud. The presented solution implements the repeated Stackelberg Security Game (SSG) and a model called Stochastic Human behaviour model with AttRactiveness and Probability weighting (SHARP). SHARP employs the Subjective Utility Quantal Response (SUQR) for formulating a subjective utility function, which is based on the evaluations of alternative solutions during decision-making. We augment the repeated SSG (including SHARP and SUQR) with a reinforced learning algorithm called Naïve Q-Learning. Naïve Q-Learning belongs to the category of active and model-free Machine Learning (ML) techniques in which the agent (either the defender or the attacker) attempts to find an optimal security solution. In this way, we combine GT and ML algorithms for discovering optimal cyber security policies. The proposed security optimization components will be validated in a collaborative cloud platform that is based on the Industrial Internet Reference Architecture (IIRA) and its recently published security model.

Keywords: security, internet of things, cloud computing, stackelberg game, machine learning, naive q-learning

Procedia PDF Downloads 353
1981 Designing for Experience-Based Tourism: A Virtual Tour in Tehran

Authors: Maryam Khalili, Fateme Ghanei

Abstract:

As one of the most significant phenomena of industrialized societies, tourism plays a key role in encouraging regional developments and enhancing higher standards of living for local communities in particular. Traveling is a formative experience endowed with lessons on various aspects of life. It allows us learning how to enhance the social position as well as the social relationships. However, people forget the need to travel and gain first-hand experiences as they have to cope with the ever-increasing rate of stress created by the disorders and routines of the urban dwelling style. In this paper, various spaces of such experiences were explored through a virtual tour with two underlying aims: 1) encouraging, informing, and educating the community in terms of tourism development, and 2) introducing a temporary release from the routines. This study enjoyed a practical-qualitative research methodology, and the required data were collected through observation and using a multiple-response questionnaire. The participants (19-48 years old) included 41 citizens of both genders (63.4% male and 36.6% female) from two regions in Tehran, selected by cluster-probability sampling. The results led to development of a spatial design for a virtual tour experience in Tehran where different areas are explored to both raise people’s awareness and educate them on their cultural heritage.

Keywords: ecotourism, education, gamification, social interaction, urban design, virtual tour

Procedia PDF Downloads 188
1980 Victim and Active Subject of the Crime of Violence in Family Reflected in the Criminal Code of the Republic of Moldova

Authors: Nastas Andrei

Abstract:

Ensuring accessible and functional justice is one of the priority objectives of judicial reform, and protecting the family against any acts that may harm its existence is one of the first priorities that have determined the need to defend the social order. In this context, the correlative approach of the victim and the aggressor becomes relevant as a subject of the crime of domestic violence. Domestic violence is a threat of physical, moral, or material harm, externalized now or in the past, or its provocation, which is characterized by a constant tendency to escalate and a high probability of repetitiveness in the relationship between the social partners, regardless of their legal status or domicile.Studying the legal support to identify the particularities of the victim and the subject of the crime of domestic violence facilitates the identification of the determinants of this crime, therefore, the development of means to prevent domestic violence. The scientific research has been effectuated on the base of the proper and authentic empirical data obtained from the analysis of the judicial practice in the matter of domestic violence, as well as being based on the most recent scientific issues in the field of the Substantive Criminal Law and other branches of science (criminology, psychology, sociology, pedagogy). As a result of the study performed, there have been formulated conclusions and interpretations able to be used in the science of the Substantive Criminal law, as well as in the practice of application of the legal norm in the matter of domestic violence.

Keywords: family violence, victim, crime, violence

Procedia PDF Downloads 106
1979 Cost Analysis of Optimized Fast Network Mobility in IEEE 802.16e Networks

Authors: Seyyed Masoud Seyyedoshohadaei, Borhanuddin Mohd Ali

Abstract:

To support group mobility, the NEMO Basic Support Protocol has been standardized as an extension of Mobile IP that enables an entire network to change its point of attachment to the Internet. Using NEMO in IEEE 802.16e (WiMax) networks causes latency in handover procedure and affects seamless communication of real-time applications. To decrease handover latency and service disruption time, an integrated scheme named Optimized Fast NEMO (OFNEMO) was introduced by authors of this paper. In OFNEMO a pre-establish multi tunnels concept, cross function optimization and cross layer design are used. In this paper, an analytical model is developed to evaluate total cost consisting of signaling and packet delivery costs of the OFNEMO compared with RFC3963. Results show that OFNEMO increases probability of predictive mode compared with RFC3963 due to smaller handover latency. Even though OFNEMO needs extra signalling to pre-establish multi tunnel, it has less total cost thanks to its optimized algorithm. OFNEMO can minimize handover latency for supporting real time application in moving networks.

Keywords: fast mobile IPv6, handover latency, IEEE802.16e, network mobility

Procedia PDF Downloads 195
1978 A New Approach to Interval Matrices and Applications

Authors: Obaid Algahtani

Abstract:

An interval may be defined as a convex combination as follows: I=[a,b]={x_α=(1-α)a+αb: α∈[0,1]}. Consequently, we may adopt interval operations by applying the scalar operation point-wise to the corresponding interval points: I ∙J={x_α∙y_α ∶ αϵ[0,1],x_α ϵI ,y_α ϵJ}, With the usual restriction 0∉J if ∙ = ÷. These operations are associative: I+( J+K)=(I+J)+ K, I*( J*K)=( I*J )* K. These two properties, which are missing in the usual interval operations, will enable the extension of the usual linear system concepts to the interval setting in a seamless manner. The arithmetic introduced here avoids such vague terms as ”interval extension”, ”inclusion function”, determinants which we encounter in the engineering literature that deal with interval linear systems. On the other hand, these definitions were motivated by our attempt to arrive at a definition of interval random variables and investigate the corresponding statistical properties. We feel that they are the natural ones to handle interval systems. We will enable the extension of many results from usual state space models to interval state space models. The interval state space model we will consider here is one of the form X_((t+1) )=AX_t+ W_t, Y_t=HX_t+ V_t, t≥0, where A∈ 〖IR〗^(k×k), H ∈ 〖IR〗^(p×k) are interval matrices and 〖W 〗_t ∈ 〖IR〗^k,V_t ∈〖IR〗^p are zero – mean Gaussian white-noise interval processes. This feeling is reassured by the numerical results we obtained in a simulation examples.

Keywords: interval analysis, interval matrices, state space model, Kalman Filter

Procedia PDF Downloads 424
1977 An Influence of Marketing Mix on Hotel Booking Decision: Japanese Senior Traveler Case

Authors: Kingkan Pongsiri

Abstract:

The study of marketing mix influencing on hotel booking decision making: Japanese senior traveler case aims to study the individual factors that are involved in the decision-making reservation for Japanese elderly travelers. Then, it aims to study other factors that influence the decision of tourists booking elderly Japanese people. This is a quantitative research methods, total of 420 completed questionnaires were collect via a Non-Probability sampling techniques. The study found that the majority of samples were female, 53.3 percent of 224 people aged between 66-70 years were 197, representing a 46.9 percent majority, the marital status of marriage is 212 per cent.50.5. Majority of samples have a bachelor degree of education with number of 326 persons (77.6 percentages) 50 percentages of samples (210 people) have monthly income in between 1,501-2,000 USD. The Samples mostly have a length of stay in a short period between 1-14 days counted as 299 people which representing 71.2 percentages of samples. The senior Japanese tourists apparently sensitive to the factors of products/services the most. Then they seem to be sensitive to the price, the marketing promotion and people, respectively. There are two factors identified as moderately influence to the Japanese senior tourists are places or distribution channels and physical evidences.

Keywords: Japanese senior traveler, marketing mix, senior tourist, hotel booking

Procedia PDF Downloads 297
1976 Noncritical Phase-Matched Fourth Harmonic Generation of Converging Beam by Deuterated Potassium Dihydrogen Phosphate Crystal

Authors: Xiangxu Chai, Bin Feng, Ping Li, Deyan Zhu, Liquan Wang, Guanzhong Wang, Yukun Jing

Abstract:

In high power large-aperture laser systems, such as the inertial confinement fusion project, the Nd: glass laser (1053nm) is usually needed to be converted to ultraviolet (UV) light and the fourth harmonic generation (FHG) is one of the most favorite candidates to achieve UV light. Deuterated potassium dihydrogen phosphate (DKDP) crystal is an optimal choice for converting the Nd: glass radiation to the fourth harmonic laser by noncritical phase matching (NCPM). To reduce the damage probability of focusing lens, the DKDP crystal is suggested to be set before the focusing lens. And a converging beam enters the FHG crystal consequently. In this paper, we simulate the process of FHG in the scheme and the dependence of FHG efficiency on the lens’ F is derived. Besides, DKDP crystal with gradient deuterium is proposed to realize the NCPM FHG of the converging beam. At every position, the phase matching is achieved by adjusting the deuterium level, and the FHG efficiency increases as a result. The relation of the lens’ F with the deuterium gradient is investigated as well.

Keywords: fourth harmonic generation, laser induced damage, converging beam, DKDP crystal

Procedia PDF Downloads 228
1975 Secret Sharing in Visual Cryptography Using NVSS and Data Hiding Techniques

Authors: Misha Alexander, S. B. Waykar

Abstract:

Visual Cryptography is a special unbreakable encryption technique that transforms the secret image into random noisy pixels. These shares are transmitted over the network and because of its noisy texture it attracts the hackers. To address this issue a Natural Visual Secret Sharing Scheme (NVSS) was introduced that uses natural shares either in digital or printed form to generate the noisy secret share. This scheme greatly reduces the transmission risk but causes distortion in the retrieved secret image through variation in settings and properties of digital devices used to capture the natural image during encryption / decryption phase. This paper proposes a new NVSS scheme that extracts the secret key from randomly selected unaltered multiple natural images. To further improve the security of the shares data hiding techniques such as Steganography and Alpha channel watermarking are proposed.

Keywords: decryption, encryption, natural visual secret sharing, natural images, noisy share, pixel swapping

Procedia PDF Downloads 403
1974 Suppression Subtractive Hybridization Technique for Identification of the Differentially Expressed Genes

Authors: Tuhina-khatun, Mohamed Hanafi Musa, Mohd Rafii Yosup, Wong Mui Yun, Aktar-uz-Zaman, Mahbod Sahebi

Abstract:

Suppression subtractive hybridization (SSH) method is valuable tool for identifying differentially regulated genes in disease specific or tissue specific genes important for cellular growth and differentiation. It is a widely used method for separating DNA molecules that distinguish two closely related DNA samples. SSH is one of the most powerful and popular methods for generating subtracted cDNA or genomic DNA libraries. It is based primarily on a suppression polymerase chain reaction (PCR) technique and combines normalization and subtraction in a solitary procedure. The normalization step equalizes the abundance of DNA fragments within the target population, and the subtraction step excludes sequences that are common to the populations being compared. This dramatically increases the probability of obtaining low-abundance differentially expressed cDNAs or genomic DNA fragments and simplifies analysis of the subtracted library. SSH technique is applicable to many comparative and functional genetic studies for the identification of disease, developmental, tissue specific, or other differentially expressed genes, as well as for the recovery of genomic DNA fragments distinguishing the samples under comparison.

Keywords: suppression subtractive hybridization, differentially expressed genes, disease specific genes, tissue specific genes

Procedia PDF Downloads 431
1973 The Impact of Low-Systematization Level in Physical Education in Primary School

Authors: Wu Hong, Pan Cuilian, Wu Panzifan

Abstract:

The student’s attention during the class is one of the most important indicators for the learning evaluation; the level of attention is directly related to the results of primary education. In recent years, extensive research has been conducted across China on improving primary school students’ attention during class. During the specific teaching activities in primary school, students have the characteristics of short concentration periods, high probability of distraction, and difficulty in long-term immersive learning. In physical education teaching, where there are mostly outdoor activities, this characteristic is particularly prominent due to the large changes in the environment and the strong sense of freshness among students. It is imperative to overcome this characteristic in a targeted manner, improve the student’s experience in the course, and raise the degree of systematization. There are many ways to improve the systematization of teaching and learning, but most of them lack quantitative indicators, which makes it difficult to evaluate the improvements before and after changing the teaching methods. Based on the situation above, we use the case analysis method, combined with a literature review, to study the negative impact of low systematization levels in primary school physical education teaching, put forward targeted improvement suggestions, and make a quantitative evaluation of the method change.

Keywords: attention, adolescent, evaluation, systematism, training-method

Procedia PDF Downloads 44
1972 Audit Management of Constipation According to National Institute for Health and Care Excellence Guideline

Authors: Areej Makeineldein Mustafa

Abstract:

The study evaluates the management processes and healthcare provider compliance with the National Institute for Health and Care Excellence recommendations for constipation management. We aimed to evaluate the adherence to National Institute for Health and Care Excellence guidelines in the management of constipation during the period from February to June 2023. We collected data from a random sample ( 51 patients) over 4 months with inclusion criteria for patients above 60 who were just admitted to the care of the elderly department during this period. Patient age, sex, medical records for constipation, acute or chronic constipation, or opioid-induced constipation, and treatment options were used to identify constipation and the type of treatment given. Our findings indicate that there is a gap between practice and National Institute for Health and Care Excellence guideline steps; only 3 patient was given medications according to National Institute for Health and Care Excellence guidelines in order of combination or steps of escalation. Addressing these gaps could potentially lead to enhanced patient outcomes and an overall improvement in the quality of care provided to individuals suffering from constipation.

Keywords: constipation, elderly, management, patient

Procedia PDF Downloads 88
1971 Analysis of Rainfall Hazard in North East of Algeria

Authors: Imene Skhakhfa, Lahbaci Ouerdachi

Abstract:

The design of sewerage systems is directly related to rainfall, which has a highly random character. Showers are usually described by three characteristics: intensity, volume and duration. Several studies considered only in two of the three models. The objective of our work is to perform an analysis of the impact of three variables on put in charge of sewerage system, responsible for misbehavior, origin of urban flooding. 30 events were considered events for the longest, most rushed and most intense period which runs from 1986 -2001. We built the IDF curves and heavy projects double symmetrical triangles associated with this selection. A simulation of the operation, with the model canoe, sewage from the city of Annaba (Algeria) in the three rain solicitation project, double triangles associated with events considered. It appears that the sewage of the city of Annaba, in terms of charging, is much more sensitive to rain most precipitous, and the more intense causing loadings and last the longest. Further analysis of all the rain and the field measurements are underway to confirm the test simulations.

Keywords: intensity, volume, duration, sewerage, design, simulation

Procedia PDF Downloads 443
1970 Using Machine Learning Techniques for Autism Spectrum Disorder Analysis and Detection in Children

Authors: Norah Mohammed Alshahrani, Abdulaziz Almaleh

Abstract:

Autism Spectrum Disorder (ASD) is a condition related to issues with brain development that affects how a person recognises and communicates with others which results in difficulties with interaction and communication socially and it is constantly growing. Early recognition of ASD allows children to lead safe and healthy lives and helps doctors with accurate diagnoses and management of conditions. Therefore, it is crucial to develop a method that will achieve good results and with high accuracy for the measurement of ASD in children. In this paper, ASD datasets of toddlers and children have been analyzed. We employed the following machine learning techniques to attempt to explore ASD and they are Random Forest (RF), Decision Tree (DT), Na¨ıve Bayes (NB) and Support Vector Machine (SVM). Then Feature selection was used to provide fewer attributes from ASD datasets while preserving model performance. As a result, we found that the best result has been provided by the Support Vector Machine (SVM), achieving 0.98% in the toddler dataset and 0.99% in the children dataset.

Keywords: autism spectrum disorder, machine learning, feature selection, support vector machine

Procedia PDF Downloads 148
1969 Cyberbullying among College Students: Prevalence and Effects on Psychological Well-Being

Authors: Jeyaseelan Maria Michael

Abstract:

This study investigated the prevalence of cyberbullying among college female students and its effects on their psychological well-being. The respondents were from the age group of 17 and 18, doing the first-year college in Tamilnadu, India. In this study, 110 participants were selected through simple random sampling. The standardized questionnaire of David Alvare-Garcia’s Cybervictimization Questionnaire for Adolescents (CYVIC) and Ryff’s Psychological Well-Being (PWB) were administered for data collection. CYVIC has four subdomains namely, impersonation, visual-sexual cybervictimization, written-verbal cybervictimization, online exclusion. Ryff’s PWB has six domains namely, autonomy, environmental mastery, personal growth, positive relations with others, purpose in life, and self- acceptance. The collected data were analyzed by SPSS v.23. The results indicate that cyberbullying prevails among college female students (M=1.24, SD= .21). Among the participants, 17 are scored one standard deviation above the mean (1.45). Among the subdomains of the CYVIC, the respondents have the highest score (M=1.40, SD= .38) in written-verbal cybervictimization. Cyber victimization has a significant correlation at the 0.01 level with psychological well-being.

Keywords: college students, cyberbullying, cyber victimization, psychological well-being

Procedia PDF Downloads 126
1968 Ultra Wideband Breast Cancer Detection by Using SAR for Indication the Tumor Location

Authors: Wittawat Wasusathien, Samran Santalunai, Thanaset Thosdeekoraphat, Chanchai Thongsopa

Abstract:

This paper presents breast cancer detection by observing the specific absorption rate (SAR) intensity for identification tumor location, the tumor is identified in coordinates (x,y,z) system. We examined the frequency between 4-8 GHz to look for the most appropriate frequency. Results are simulated in frequency 4-8 GHz, the model overview include normal breast with 50 mm radian, 5 mm diameter of tumor, and ultra wideband (UWB) bowtie antenna. The models are created and simulated in CST Microwave Studio. For this simulation, we changed antenna to 5 location around the breast, the tumor can be detected when an antenna is close to the tumor location, which the coordinate of maximum SAR is approximated the tumor location. For reliable, we experiment by random tumor location to 3 position in the same size of tumor and simulation the result again by varying the antenna position in 5 position again, and it also detectable the tumor position from the antenna that nearby tumor position by maximum value of SAR, which it can be detected the tumor with precision in all frequency between 4-8 GHz.

Keywords: specific absorption rate (SAR), ultra wideband (UWB), coordinates, cancer detection

Procedia PDF Downloads 402
1967 The Impact of Brand Loyalty on Product Performance

Authors: Tanzeel bin Abdul Rauf Patker, Saba Mateen

Abstract:

This research investigates the impact of Brand Loyalty on the product performance and the factors those are considered more important in brand reputation. Variables selected for this research are Brand quality, Brand Equity, Brand Reputation to explore the impact of these variables on Product performance. For this purpose, primary research has been conducted. The questionnaire survey for this research study was administered among the population mainly at the shopping malls. For this research study, a sample size of 250 respondents has been taken into consideration. Customers from the shopping malls and university students constitute the sample for this research study using random sampling (non-probabilistic) used as a sampling technique for conducting the research survey. According to the results obtained from the collected data, it is interpreted that product performance shares a direct relationship with brand quality, brand quality, and brand reputation. Result also showed that brand quality and brand equity has a significant effect on product performance, whereas brand reputation has an insignificant effect on product performance.

Keywords: product performance, brand quality, brand equity, brand reputation

Procedia PDF Downloads 311
1966 A Proposed Training Program for the Development of the Kindergarten Teacher According To Her Contemporary Professionàĺ Needs

Authors: Abdulhakim Ali Mosleh Alzubidy

Abstract:

The study's aim was to establish a proposed training program for kindergarten teachers according to their modern professional demands so that they could effectively teach children through movement education and play. The sample, which consisted of (46) teachers and administrators selected at random from the Ibb governorate, represented the study population of kindergarten teachers and administrators. The researcher developed three survey forms as a tool for data collection, and the forms were used with the research sample. The researcher used the descriptive method due to its applicability and the nature of the study, and he also used the appropriate statistical treatment of the data, which is to extract the percentage and the percentage of agreement. The study came to the following conclusions: ● The proposed program is of great importance in preparing the kindergarten teacher in an appropriate manner that keeps pace with modern developments in this field. ● The field of movement education is a necessity for the kindergarten teacher, through which she will be able to prepare the child physically and kinetically and teach him effectively the principles of reading, writing, and numerical and arithmetic concepts.

Keywords: training program, professional needs, kindergarten, kindergarten teacher

Procedia PDF Downloads 82
1965 A PROMETHEE-BELIEF Approach for Multi-Criteria Decision Making Problems with Incomplete Information

Authors: H. Moalla, A. Frikha

Abstract:

Multi-criteria decision aid methods consider decision problems where numerous alternatives are evaluated on several criteria. These methods are used to deal with perfect information. However, in practice, it is obvious that this information requirement is too much strict. In fact, the imperfect data provided by more or less reliable decision makers usually affect decision results since any decision is closely linked to the quality and availability of information. In this paper, a PROMETHEE-BELIEF approach is proposed to help multi-criteria decisions based on incomplete information. This approach solves problems with incomplete decision matrix and unknown weights within PROMETHEE method. On the base of belief function theory, our approach first determines the distributions of belief masses based on PROMETHEE’s net flows and then calculates weights. Subsequently, it aggregates the distribution masses associated to each criterion using Murphy’s modified combination rule in order to infer a global belief structure. The final action ranking is obtained via pignistic probability transformation. A case study of real-world application concerning the location of a waste treatment center from healthcare activities with infectious risk in the center of Tunisia is studied to illustrate the detailed process of the BELIEF-PROMETHEE approach.

Keywords: belief function theory, incomplete information, multiple criteria analysis, PROMETHEE method

Procedia PDF Downloads 165
1964 Experimental Evaluation of Succinct Ternary Tree

Authors: Dmitriy Kuptsov

Abstract:

Tree data structures, such as binary or in general k-ary trees, are essential in computer science. The applications of these data structures can range from data search and retrieval to sorting and ranking algorithms. Naive implementations of these data structures can consume prohibitively large volumes of random access memory limiting their applicability in certain solutions. Thus, in these cases, more advanced representation of these data structures is essential. In this paper we present the design of the compact version of ternary tree data structure and demonstrate the results for the experimental evaluation using static dictionary problem. We compare these results with the results for binary and regular ternary trees. The conducted evaluation study shows that our design, in the best case, consumes up to 12 times less memory (for the dictionary used in our experimental evaluation) than a regular ternary tree and in certain configuration shows performance comparable to regular ternary trees. We have evaluated the performance of the algorithms using both 32 and 64 bit operating systems.

Keywords: algorithms, data structures, succinct ternary tree, per- formance evaluation

Procedia PDF Downloads 159
1963 The Effect of Sensory Integration in Reduction of Stereotype Behaviour in Autistic Children

Authors: Mohammad Khamoushi, Reza Mirmahdi

Abstract:

The aim of this research was the effect of sensory integration in reduction of stereotype behaviors in autistic children. The statistical population included 55 children with the age range 2/8 – 14 in Esfahan Ordibehesht autistic center. Purposive sampling was used for selecting the sample group and 20 children with random assignment were designated in two group; experimental and control . Research project was quasi-experimental two-group with pretest and posttest. Data collection tools included repetitive behavior scale-revised with six sub-scales: stereotype behavior, self-injurious behavior, compulsive behavior, ritualistic behavior, sameness behavior, restricted behavior. Analysis of covariance was used for analyzing hypotheses. Result show that sensory integration procedure was effective in reduction of stereotype behavior, compulsive behavior and self-injurious behavior in autistic children. According to the findings, it is suggested that effect sensory integration procedure in stereotype behavior of autism children should be studied and used for treatment of other disabilities of this children.

Keywords: autism, sensory integration procedure, stereotype behavior, compulsive behavior

Procedia PDF Downloads 578
1962 Memory Retrieval and Implicit Prosody during Reading: Anaphora Resolution by L1 and L2 Speakers of English

Authors: Duong Thuy Nguyen, Giulia Bencini

Abstract:

The present study examined structural and prosodic factors on the computation of antecedent-reflexive relationships and sentence comprehension in native English (L1) and Vietnamese-English bilinguals (L2). Participants read sentences presented on the computer screen in one of three presentation formats aimed at manipulating prosodic parsing: word-by-word (RSVP), phrase-segment (self-paced), or whole-sentence (self-paced), then completed a grammaticality rating and a comprehension task (following Pratt & Fernandez, 2016). The design crossed three factors: syntactic structure (simple; complex), grammaticality (target-match; target-mismatch) and presentation format. An example item is provided in (1): (1) The actress that (Mary/John) interviewed at the awards ceremony (about two years ago/organized outside the theater) described (herself/himself) as an extreme workaholic). Results showed that overall, both L1 and L2 speakers made use of a good-enough processing strategy at the expense of more detailed syntactic analyses. L1 and L2 speakers’ comprehension and grammaticality judgements were negatively affected by the most prosodically disrupting condition (word-by-word). However, the two groups demonstrated differences in their performance in the other two reading conditions. For L1 speakers, the whole-sentence and the phrase-segment formats were both facilitative in the grammaticality rating and comprehension tasks; for L2, compared with the whole-sentence condition, the phrase-segment paradigm did not significantly improve accuracy or comprehension. These findings are consistent with the findings of Pratt & Fernandez (2016), who found a similar pattern of results in the processing of subject-verb agreement relations using the same experimental paradigm and prosodic manipulation with English L1 and L2 English-Spanish speakers. The results provide further support for a Good-Enough cue model of sentence processing that integrates cue-based retrieval and implicit prosodic parsing (Pratt & Fernandez, 2016) and highlights similarities and differences between L1 and L2 sentence processing and comprehension.

Keywords: anaphora resolution, bilingualism, implicit prosody, sentence processing

Procedia PDF Downloads 152
1961 Comparative study of the technical efficiency of the cotton farms in the towns of Banikoara and Savalou

Authors: Boukari Abdou Wakilou

Abstract:

Benin is one of West Africa's major cotton-producing countries. Cotton is the country's main source of foreign currency and employment. But it is also one of the sources of soil degradation. The search for good agricultural practices is therefore, a constant preoccupation. The aim of this study is to measure the technical efficiency of cotton growers by comparing those who constantly grow cotton on the same land with those who practice crop rotation. The one-step estimation approach of the stochastic production frontier, including determinants of technical inefficiency, was applied to a stratified random sample of 261 cotton producers. Overall, the growers had a high average technical efficiency level of 90%. However, there was no significant difference in the level of technical efficiency between the two groups of growers studied. All the factors linked to compliance with the technical production itinerary had a positive influence on the growers' level of efficiency. It is, therefore, important to continue raising awareness of the importance of respecting the technical production itinerary and of integrated soil fertility management techniques.

Keywords: technical efficiency, soil fertility, cotton, crop rotation, benin

Procedia PDF Downloads 64
1960 Simulation Study on Particle Fluidization and Drying in a Spray Fluidized Bed

Authors: Jinnan Guo, Daoyin Liu

Abstract:

The quality of final products in the coating process significantly depends on particle fluidization and drying in the spray-fluidized bed. In this study, fluidizing gas temperature and velocity are changed, and their effects on particle flow, moisture content, and heat transfer in a spray fluidized bed are investigated by the CFD – Discrete Element Model (DEM). The gas flow velocity distribution of the fluidized bed is symmetrical, with high velocity in the middle and low velocity on both sides. During the heating process, the particles inside the central tube and at the bottom of the bed are rapidly heated. The particle circulation in the annular area is heated slowly and the temperature is low. The inconsistency of particle circulation results in two peaks in the probability density distribution of the particle temperature during the heating process, and the overall temperature of the particles increases uniformly. During the drying process, the distribution of particle moisture transitions from initial uniform moisture to two peaks, and then the number of completely dried (moisture content of 0) particles gradually increases. Increasing the fluidizing gas temperature and velocity improves particle circulation, drying and heat transfer in the bed. The current study provides an effective method for studying the hydrodynamics of spray fluidized beds with simultaneous processes of heating and particle fluidization.

Keywords: heat transfer, CFD-DEM, spray fluidized bed, drying

Procedia PDF Downloads 69
1959 The Impact of Migrants’ Remittances on Household Poverty and Inequality: A Case Study of Mazar-i-Sharif, Balkh Province, Afghanistan

Authors: Baqir Khawari

Abstract:

This study has been undertaken to investigate the impact of remittances on household poverty and inequality using OLS and Logit Models with a strictly multi-random sampling method. The result of the OLS model reveals that if the per capita international remittances increase by 1%, then it is estimated that the per capita income will increase by 0.071% and 0.059% during 2019/20 and 2020/21, respectively. In addition, a 1% increase in external remittances results in a 0.0272% and 0.025% reduction in per capita depth of poverty and a 0.0149% and 0.0145% decrease in severity of poverty during 2019/20 and 2020/21, respectively. It is also shown that the effect of external remittances on poverty is greater than internal remittances. In terms of inequality, the result represents that remittances reduced the Gini coefficient by 2% and 7% during 2019/20 and 2020/21, respectively. Further, it is bold that COVID-19 negatively impacts the amount of received remittances by households, thus resulting in a reduction in the size of the effect of remittances. Therefore, a concerted effort of effective policies and governance and international assistance is imperative to address this prolonged problem.

Keywords: migration, remittances, poverty, inequality, COVID-19, Afghanistan

Procedia PDF Downloads 66
1958 A Case Study on the Tourists' Satisfaction: Local Gastronomy in Pagudpud, Ilocos Norte

Authors: Reysand Mae A. Abapial, Christine Claire Z. Agra, Quenna Lyn V. De Guzman, Marielle Arianne Joyce Q. Hojilla, John Joseph A. Tiangco

Abstract:

The study focused on the assessment of the tourists’ satisfaction on the local gastronomy in Pagudpud, Ilocos Norte as a tourist destination as perceived by 100 tourists visiting the tourist destination, which is determined through convenient random sampling. Mean, percentage frequency and Wilcoxon rank sum test were used in the collection of data. The results revealed that the tourists agree that the local establishments offering local cuisines are accessible in terms of the location, internet visibility and facilities for persons-with-disabilities. The tourist are also willing to pay for the local food because it is attainable, budget-friendly, worthy for an expensive price, satisfies the cravings, reflects the physical appearance of the establishment and its quantity is reasonable based on the price. However, the tourists disagree that the local food completes their overall experience as tourists and it does not have the potential to satisfy all types of tourists. Recommendations for the enhancement of the local cuisine and implications for future research are discussed.

Keywords: gastronomy, local gastronomy, tourist satisfaction, Pagudpud

Procedia PDF Downloads 670
1957 Study on the Prediction of Serviceability of Garments Based on the Seam Efficiency and Selection of the Right Seam to Ensure Better Serviceability of Garments

Authors: Md Azizul Islam

Abstract:

Seam is the line of joining two separate fabric layers for functional or aesthetic purposes. Different kinds of seams are used for assembling the different areas or parts of the garment to increase serviceability. To empirically support the importance of seam efficiency on serviceability of garments, this study is focused on choosing the right type of seams for particular sewing parts of the garments based on the seam efficiency to ensure better serviceability. Seam efficiency is the ratio of seam strength and fabric strength. Single jersey knitted finished fabrics of four different GSMs (gram per square meter) were used to make the test garments T-shirt. Three distinct types of the seam: superimposed, lapped and flat seam was applied to the side seams of T-shirt and sewn by lockstitch (stitch class- 301) in a flat-bed plain sewing machine (maximum sewing speed: 5000 rpm) to make (3x4) 12 T-shirts. For experimental purposes, needle thread count (50/3 Ne), bobbin thread count (50/2 Ne) and the stitch density (stitch per inch: 8-9), Needle size (16 in singer system), stitch length (31 cm), and seam allowance (2.5cm) were kept same for all specimens. The grab test (ASTM D5034-08) was done in the Universal tensile tester to measure the seam strength and fabric strength. The produced T-shirts were given to 12 soccer players who wore the shirts for 20 soccer matches (each match of 90 minutes duration). Serviceability of the shirt were measured by visual inspection of a 5 points scale based on the seam conditions. The study found that T-shirts produced with lapped seam show better serviceability and T-shirts made of flat seams perform the lowest score in serviceability score. From the calculated seam efficiency (seam strength/ fabric strength), it was obvious that the performance (in terms of strength) of the lapped and bound seam is higher than that of the superimposed seam and the performance of superimposed seam is far better than that of the flat seam. So it can be predicted that to get a garment of high serviceability, lapped seams could be used instead of superimposed or other types of the seam. In addition, less stressed garments can be assembled by others seems like superimposed seams or flat seams.

Keywords: seam, seam efficiency, serviceability, T-shirt

Procedia PDF Downloads 200
1956 Fear of Negative Evaluation, Social Support and Wellbeing in People with Vitiligo

Authors: Rafia Rafique, Mutmina Zainab

Abstract:

The present study investigated the relationship between fear of negative evaluation (FNE), social support and well-being in people with Vitiligo. It was hypothesized that low level of FNE and greater social support is likely to predict well-being. It was also hypothesized that social support is likely to moderate the relationship between FNE and well-being. Correlational research design was used for the present study. Non-probability purposive sampling technique was used to collect a sample (N=122) of people with Vitiligo. Hierarchical Moderated Regression analysis was used to test prediction and moderation. Brief Fear of Negative Evaluation Scale, Multidimensional Scale of Perceived Social Support (MSPSS) and Mental Health Continuum-Short form (MHC-SF) were used to evaluate the study variables. Fear of negative evaluation negatively predicted well-being (emotional and psychological). Social support from significant others and friends predicted social well-being. Social Support from family predicted emotional and psychological well-being. It was found that social support from significant others moderated the relationship between FNE and emotional well-being and social support from family moderated the relationship between FNE and social well-being. Dermatologists treating people with Vitiligo need to educate them and their families about the buffering role of social support (family and significant others). Future studies need to focus on other important mediating factors that can possibly explain the relationship between fear of negative evaluation and wellbeing.

Keywords: fear of negative evaluation, hierarchical moderated regression, vitiligo, well-being

Procedia PDF Downloads 301
1955 Comparison of the Emotion Seeking and Attachment Styles of the Runaway and Normal Girls in Iran

Authors: Hassan Gharibi

Abstract:

This research aims to comparing the emotion seeking and attachment styles between runaway and normal girls. The statistical population consisted of 80 (13-25 year-old) girls were selected among runaway girls and normal girls(40 runaway girls +40 normal girls). Normal girls were matched with the runaway girls in demographic features and selected by simple random method. Measuring tools in this research include the 1993 Shaver and Hazan attachment style scale and the Arent emotion seeking scale. Data analyzed by independent t test. Findings showed that there is no significant difference between two groups of girls in ambivalent and avoidant attachment styles. Secure attachment style rate in normal girls is more than runaway girls. Findings showed significant difference of insecure attachment style (avoidant and ambivalent styles together) between the two groups bout in variable of emotion seeking there is no significant difference.

Keywords: attachment styles, emotion seeking, runaway, girls

Procedia PDF Downloads 154