Search results for: user attributes analysis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 29707

Search results for: user attributes analysis

28087 A Survey of Sentiment Analysis Based on Deep Learning

Authors: Pingping Lin, Xudong Luo, Yifan Fan

Abstract:

Sentiment analysis is a very active research topic. Every day, Facebook, Twitter, Weibo, and other social media, as well as significant e-commerce websites, generate a massive amount of comments, which can be used to analyse peoples opinions or emotions. The existing methods for sentiment analysis are based mainly on sentiment dictionaries, machine learning, and deep learning. The first two kinds of methods rely on heavily sentiment dictionaries or large amounts of labelled data. The third one overcomes these two problems. So, in this paper, we focus on the third one. Specifically, we survey various sentiment analysis methods based on convolutional neural network, recurrent neural network, long short-term memory, deep neural network, deep belief network, and memory network. We compare their futures, advantages, and disadvantages. Also, we point out the main problems of these methods, which may be worthy of careful studies in the future. Finally, we also examine the application of deep learning in multimodal sentiment analysis and aspect-level sentiment analysis.

Keywords: document analysis, deep learning, multimodal sentiment analysis, natural language processing

Procedia PDF Downloads 160
28086 Condensation of Moist Air in Heat Exchanger Using CFD

Authors: Jan Barak, Karel Frana, Joerg Stiller

Abstract:

This work presents results of moist air condensation in heat exchanger. It describes theoretical knowledge and definition of moist air. Model with geometry of square canal was created for better understanding and post processing of condensation phenomena. Different approaches were examined on this model to find suitable software and model. Obtained knowledge was applied to geometry of real heat exchanger and results from experiment were compared with numerical results. One of the goals is to solve this issue without creating any user defined function in the applied code. It also contains summary of knowledge and outlook for future work.

Keywords: condensation, exchanger, experiment, validation

Procedia PDF Downloads 401
28085 Durian Marker Kit for Durian (Durio zibethinus Murr.) Identity

Authors: Emma K. Sales

Abstract:

Durian is the flagship fruit of Mindanao and there is an abundance of several cultivars with many confusing identities/ names. The project was conducted to develop procedure for reliable and rapid detection and sorting of durian planting materials. Moreover, it is also aimed to establish specific genetic or DNA markers for routine testing and authentication of durian cultivars in question. The project developed molecular procedures for routine testing. SSR primers were also screened and identified for their utility in discriminating durian cultivars collected. Results of the study showed the following accomplishments; 1. Twenty (29) SSR primers were selected and identified based on their ability to discriminate durian cultivars, 2. Optimized and established standard procedure for identification and authentication of Durian cultivars 3. Genetic profile of durian is now available at Biotech Unit. Our results demonstrate the relevance of using molecular techniques in evaluating and identifying durian clones. The most polymorphic primers tested in this study could be useful tools for detecting variation even at the early stage of the plant especially for commercial purposes. The process developed combines the efficiency of the microsatellites development process with the optimization of non-radioactive detection process resulting in a user-friendly protocol that can be performed in two (2) weeks and easily incorporated into laboratories about to start microsatellite development projects. This can be of great importance to extend microsatellite analyses to other crop species where minimal genetic information is currently available. With this, the University can now be a service laboratory for routine testing and authentication of durian clones.

Keywords: DNA, SSR analysis, genotype, genetic diversity, cultivars

Procedia PDF Downloads 451
28084 Characterization of Onion Peels Extracts and Its Utilization in a Deep Fried Snack

Authors: Nabia Siddiqui, Tahira Mohsin Ali, Tanveer Abbas, Abid Hasnain

Abstract:

The present study proposed the use of different onion peel extracts in a South Asian snacks called ‘sew’. The polyphenols extracted from peels were initially analyzed for their antimicrobial potential and bioactive components following three different extraction systems. A relatively higher level of total phenolic content (TP), total flavonoid (TF) and antioxidant activity was observed for EWE (ethanol and water based) extracts followed by EAAE (ethanol and acetic acid) and WE (water extract) sample. Onion extracts showed ability to inhibit gram-positive as well as gram-negative bacteria. The incorporation of onion peel extracts in sew showed a marked increase in bioactive components. Besides bioactivity, sensory attributes, textural characteristics and storage stability of these snacks containing onion peel extract also significantly improved during the shelf study at ambient temperature for up to two months. Thus, these results justify the utilization of these plant polyphenols in fried snacks.

Keywords: onion peels extract, South Asian snacks, antioxidant capacity, bioactivity

Procedia PDF Downloads 237
28083 Pivoting to Fortify our Digital Self: Revealing the Need for Personal Cyber Insurance

Authors: Richard McGregor, Carmen Reaiche, Stephen Boyle

Abstract:

Cyber threats are a relatively recent phenomenon and offer cyber insurers a dynamic and intelligent peril. As individuals en mass become increasingly digitally dependent, Personal Cyber Insurance (PCI) offers an attractive option to mitigate cyber risk at a personal level. This abstract proposes a literature review that conceptualises a framework for siting Personal Cyber Insurance (PCI) within the context of cyberspace. The lack of empirical research within this domain demonstrates an immediate need to define the scope of PCI to allow cyber insurers to understand personal cyber risk threats and vectors, customer awareness, capabilities, and their associated needs. Additionally, this will allow cyber insurers to conceptualise appropriate frameworks allowing effective management and distribution of PCI products and services within a landscape often in-congruent with risk attributes commonly associated with traditional personal line insurance products. Cyberspace has provided significant improvement to the quality of social connectivity and productivity during past decades and allowed enormous capability uplift of information sharing and communication between people and communities. Conversely, personal digital dependency furnish ample opportunities for adverse cyber events such as data breaches and cyber-attacksthus introducing a continuous and insidious threat of omnipresent cyber risk–particularly since the advent of the COVID-19 pandemic and wide-spread adoption of ‘work-from-home’ practices. Recognition of escalating inter-dependencies, vulnerabilities and inadequate personal cyber behaviours have prompted efforts by businesses and individuals alike to investigate strategies and tactics to mitigate cyber risk – of which cyber insurance is a viable, cost-effective option. It is argued that, ceteris parabus, the nature of cyberspace intrinsically provides characteristic peculiarities that pose significant and bespoke challenges to cyber insurers, often in-congruent with risk attributes commonly associated with traditional personal line insurance products. These challenges include (inter alia) a paucity of historical claim/loss data for underwriting and pricing purposes, interdependencies of cyber architecture promoting high correlation of cyber risk, difficulties in evaluating cyber risk, intangibility of risk assets (such as data, reputation), lack of standardisation across the industry, high and undetermined tail risks, and moral hazard among others. This study proposes a thematic overview of the literature deemed necessary to conceptualise the challenges to issuing personal cyber coverage. There is an evident absence of empirical research appertaining to PCI and the design of operational business models for this business domain, especially qualitative initiatives that (1) attempt to define the scope of the peril, (2) secure an understanding of the needs of both cyber insurer and customer, and (3) to identify elements pivotal to effective management and profitable distribution of PCI - leading to an argument proposed by the author that postulates that the traditional general insurance customer journey and business model are ill-suited for the lineaments of cyberspace. The findings of the review confirm significant gaps in contemporary research within the domain of personal cyber insurance.

Keywords: cyberspace, personal cyber risk, personal cyber insurance, customer journey, business model

Procedia PDF Downloads 100
28082 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm

Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima

Abstract:

In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.

Keywords: cloud space, AES, FTP, NetBeans IDE

Procedia PDF Downloads 204
28081 The Effects of Leadership on the Claim of Responsibility

Authors: Katalin Kovacs

Abstract:

In most forms of violence the perpetrators intend to hide their identities. Terrorism is different. Terrorist groups often take responsibility for their attacks, and consequently they reveal their identities. This unique characteristic of terrorism has been largely overlooked, and scholars are still puzzled as to why terrorist groups claim responsibility for their attacks. Certainly, the claim of responsibility is worth analysing. It would help to have a clearer picture of what terrorist groups try to achieve and how, but also to develop an understanding of the strategic planning of terrorist attacks and the message the terrorists intend to deliver. The research aims to answer the question why terrorist groups choose to claim responsibility for some of their attacks and not for others. In order to do so the claim of responsibility is considered to be a tactical choice, based on the assumption that terrorists weigh the costs and benefits of claiming responsibility. The main argument is that terrorist groups do not claim responsibility in cases when there is no tactical advantage gained from claiming responsibility. The idea that the claim of responsibility has tactical value offers the opportunity to test these assertions using a large scale empirical analysis. The claim of responsibility as a tactical choice depends on other tactical choices, such as the choice of target, the internationality of the attack, the number of victims and whether the group occupies territory or operates as an underground group. The structure of the terrorist groups and the level of decision making also affects the claim of responsibility. Terrorists on the lower level are less disciplined than the leaders. This means that the terrorists on lower levels pay less attention to the strategic objectives and engage easier in indiscriminate violence, and consequently they would less like to claim responsibility. Therefore, the research argues that terrorists, who are on a highest level of decision making would claim responsibility for the attacks as those are who takes into account the strategic objectives. As most studies on terrorism fail to provide definitions; therefore the researches are fragmented and incomparable. Separate, isolated researches do not support comprehensive thinking. It is also very important to note that there are only a few researches using quantitative methods. The aim of the research is to develop a new and comprehensive overview of the claim of responsibility based on strong quantitative evidence. By using well-established definitions and operationalisation the current research focuses on a broad range of attributes that can have tactical values in order to determine circumstances when terrorists are more likely to claim responsibility.

Keywords: claim of responsibility, leadership, tactical choice, terrorist group

Procedia PDF Downloads 310
28080 UKIYO-E: User Knowledge Improvement Based on Youth Oriented Entertainment, Art Appreciation Support by Interacting with Picture

Authors: Haruya Tamaki, Tsugunosuke Sakai, Ryuichi Yoshida, Ryohei Egusa, Shigenori Inagaki, Etsuji Yamaguchi, Fusako Kusunoki, Miki Namatame, Masanori Sugimoto, Hiroshi Mizoguchi

Abstract:

Art appreciation is important as part of children education. Art appreciation can enrich sensibility and creativity. To enrich sensibility and creativity, the children have to learning knowledge of picture such as social and historical backgrounds and author intention. High learning effect can acquire by actively learning. In short, it is important that encourage learning of the knowledge about pictures actively. It is necessary that children feel like interest to encourage learning of the knowledge about pictures actively. In a general art museum, comments on pictures are done through writing. Thus, we expect that this method cannot arouse the interest of the children in pictures, because children feel like boring. In brief, learning about the picture information is difficult. Therefore, we are developing an art-appreciation support system that will encourage learning of the knowledge about pictures actively by children feel like interest. This system uses that Interacting with Pictures to learning of the knowledge about pictures. To Interacting with Pictures, children have to utterance by themselves. We expect that will encourage learning of the knowledge about pictures actively by Interacting with Pictures. To more actively learning, children can choose who talking with by information that location and movement of the children. This system must be able to acquire real-time knowledge of the location, movement, and voice of the children. We utilize the Microsoft’s Kinect v2 sensor and its library, namely, Kinect for Windows SDK and Speech Platform SDK v11 for this purpose. By using these sensor and library, we can determine the location, movement, and voice of the children. As the first step of this system, we developed ukiyo-e game that use ukiyo-e to appreciation object. Ukiyo-e is a traditional Japanese graphic art that has influenced the western society. Therefore, we believe that the ukiyo-e game will be appreciated. In this study, we applied talking to pictures to learn information about the pictures because we believe that learning information about the pictures by talking to the pictures is more interesting than commenting on the pictures using only texts. However, we cannot confirm if talking to the pictures is more interesting than commenting using texts only. Thus, we evaluated through EDA measurement whether the user develops an interest in the pictures while talking to them using voice recognition or by commenting on the pictures using texts only. Hence, we evaluated that children have interest to picture while talking to them using voice recognition through EDA measurement. In addition, we quantitatively evaluate that enjoyed this game or not and learning information about the pictures for primary schoolchildren. In this paper, we summarize these two evaluation results.

Keywords: actively learning, art appreciation, EDA, Kinect V2

Procedia PDF Downloads 282
28079 Information Extraction Based on Search Engine Results

Authors: Mohammed R. Elkobaisi, Abdelsalam Maatuk

Abstract:

The search engines are the large scale information retrieval tools from the Web that are currently freely available to all. This paper explains how to convert the raw resulted number of search engines into useful information. This represents a new method for data gathering comparing with traditional methods. When a query is submitted for a multiple numbers of keywords, this take a long time and effort, hence we develop a user interface program to automatic search by taking multi-keywords at the same time and leave this program to collect wanted data automatically. The collected raw data is processed using mathematical and statistical theories to eliminate unwanted data and converting it to usable data.

Keywords: search engines, information extraction, agent system

Procedia PDF Downloads 424
28078 KPI and Tool for the Evaluation of Competency in Warehouse Management for Furniture Business

Authors: Kritchakhris Na-Wattanaprasert

Abstract:

The objective of this research is to design and develop a prototype of a key performance indicator system this is suitable for warehouse management in a case study and use requirement. In this study, we design a prototype of key performance indicator system (KPI) for warehouse case study of furniture business by methodology in step of identify scope of the research and study related papers, gather necessary data and users requirement, develop key performance indicator base on balance scorecard, design pro and database for key performance indicator, coding the program and set relationship of database and finally testing and debugging each module. This study use Balance Scorecard (BSC) for selecting and grouping key performance indicator. The system developed by using Microsoft SQL Server 2010 is used to create the system database. In regard to visual-programming language, Microsoft Visual C# 2010 is chosen as the graphic user interface development tool. This system consists of six main menus: menu login, menu main data, menu financial perspective, menu customer perspective, menu internal, and menu learning and growth perspective. Each menu consists of key performance indicator form. Each form contains a data import section, a data input section, a data searches – edit section, and a report section. The system generates outputs in 5 main reports, the KPI detail reports, KPI summary report, KPI graph report, benchmarking summary report and benchmarking graph report. The user will select the condition of the report and period time. As the system has been developed and tested, discovers that it is one of the ways to judging the extent to warehouse objectives had been achieved. Moreover, it encourages the warehouse functional proceed with more efficiency. In order to be useful propose for other industries, can adjust this system appropriately. To increase the usefulness of the key performance indicator system, the recommendations for further development are as follows: -The warehouse should review the target value and set the better suitable target periodically under the situation fluctuated in the future. -The warehouse should review the key performance indicators and set the better suitable key performance indicators periodically under the situation fluctuated in the future for increasing competitiveness and take advantage of new opportunities.

Keywords: key performance indicator, warehouse management, warehouse operation, logistics management

Procedia PDF Downloads 428
28077 Food Sharing App and the Ubuntu Ssharing Economy: Accessing the Impact of Technology of Food Waste Reduction

Authors: Gabriel Sunday Ayayia

Abstract:

Food waste remains a critical global challenge with significant environmental, economic, and ethical implications. In an era where food waste and food insecurity coexist, innovative technology-driven solutions have emerged, aiming to bridge the gap between surplus food and those in need. Simultaneously, disparities in food access persist, exacerbating issues of hunger and malnutrition. Emerging food-sharing apps offer a promising avenue to mitigate these problems but require further examination within the context of the Ubuntu sharing economy. This study seeks to understand the impact of food-sharing apps, guided by the principles of Ubuntu, on reducing food waste and enhancing food access. The study examines how specific food-sharing apps within the Ubuntu sharing economy could contribute to fostering community resilience and reducing food waste. Ubuntu underscores the idea that we are all responsible for the well-being of our community members. In the context of food waste, this means that individuals and businesses have a collective responsibility to ensure that surplus food is shared rather than wasted. Food-sharing apps align with this principle by facilitating the sharing of excess food with those in need, transforming waste into a communal resource. This research employs a mixed-methods approach of both quantitative analysis and qualitative inquiry. Large-scale surveys will be conducted to assess user behavior, attitudes, and experiences with food-sharing apps, focusing on the frequency of use, motivations, and perceived impacts. Qualitative interviews with app users, community organizers, and stakeholders will explore the Ubuntu-inspired aspects of food-sharing apps and their influence on reducing food waste and improving food access. Quantitative data will be analyzed using statistical techniques, while qualitative data will undergo thematic analysis to identify key patterns and insights. This research addresses a critical gap in the literature by examining the role of food-sharing apps in reducing food waste and enhancing food access, particularly within the Ubuntu sharing economy framework. Findings will offer valuable insights for policymakers, technology developers, and communities seeking to leverage technology to create a more just and sustainable food system.

Keywords: sharing economy, food waste reduction, technology, community- based approach

Procedia PDF Downloads 65
28076 Investigating the Organizational Capacity of Communities Affecting Water Supply Resilience

Authors: Behrooz Balaei, Suzanne Wilkinson, Regan Potangaroa, Larry Abel, Philip McFarlane

Abstract:

Water supply system failure has serious direct and indirect effects on people wellbeing. Post-disaster water system serviceability depends on a variety of factors from technical characteristics to social, economic, and organizational attributes of communities. This paper tests the organizational factors affecting water supply resilience to outline how these factors contributed to previous disasters. To do so, a framework is briefly introduced in this study to provide a clear guide to identify the significant relevant organizational factors. Then the factors affecting water serviceability following a disaster are outlines. Next, these factors are measured in the case of Tropical Cyclone Pam, which hit Vanuatu in March 2015. Reviewing the existing literature has also been carried out to obtain a comprehensive understanding of the background A site visit and a series of interviews have also been undertaken following the cyclone to collect site-specific data and information. In the end, the organizational factors were ranked to enable decision makers to identify significance of each factor compared to the others.

Keywords: water supply, resilience, organizational capacity, Vanuatu, Tropical Cyclone Pam

Procedia PDF Downloads 127
28075 Containment/Penetration Analysis for the Protection of Aircraft Engine External Configuration and Nuclear Power Plant Structures

Authors: Dong Wook Lee, Adrian Mistreanu

Abstract:

The authors have studied a method for analyzing containment and penetration using an explicit nonlinear Finite Element Analysis. This method may be used in the stage of concept design for the protection of external configurations or components of aircraft engines and nuclear power plant structures. This paper consists of the modeling method, the results obtained from the method and the comparison of the results with those calculated from simple analytical method. It shows that the containment capability obtained by proposed method matches well with analytically calculated containment capability.

Keywords: computer aided engineering, containment analysis, finite element analysis, impact analysis, penetration analysis

Procedia PDF Downloads 135
28074 Age-Stage, Two-Sex Life Table Characteristics of Aedes albopictus (Skuse) and Aedes aegypti (Linnaeus)) (Diptera: Culicidae) in Penang Island, Malaysia

Authors: A. H. Maimusa, A. Abu Hassan, Nur Faeza A. Kassim

Abstract:

In this study, we report on the main life table developmental attributes of laboratory colonies of wild strains Ae. albopictus and Ae. aegypti. The raw life history data of the two species were analyzed and compared based on the age-stage and two-sex life table. The total pre-adult development times were 9.47 days (Ae. albopictus) and 8.76 days (Ae. aegypti). The adult pre-oviposition periods (APOP) was 1.61 day for Ae. albopictus and 2.02 for Ae. aegypti. The total pre-oviposition period (TPOP) of Ae. albopictus is significantly longer (11.66 days) than (10.75 days) for Ae. aegypti. The mean intrinsic rate of increase (r) was 0.124 days (Ae. albopictus) and 1.151 days (Ae. aegypti) while the mean finite rate of increase (λ) was 1.13 day (Ae. albopictus) and (1.16 d) (Ae. aegypti). The net reproductive rates (Ro) were 8.10 and 10.75 for Ae. albopictus and Ae. aegypti, respectively. The mean generation time (T) for Ae. albopictus and Ae. aegypti, were 16.81 days and 15.77 days respectively. The mean development time for each stage insignificantly correlated with temperature (r = -0.208, p > 0.05) and (r = -0.312, p > 0.05) for Ae. albopictus and Ae. aegypti respectively. The life expectancy was 19.01 and 19.94 days for Ae. albopictus and Ae. aegypti respectively. Mortality occurred mostly during the adult stage and ranged between 0.01 and 0.07%. The population parameters suggest that Ae. albopictus and Ae. aegypti populations are r-strategist characterized by a high r, a large Ro, and short T. This kind of information is crucial in understanding mosquito population dynamics in disease transmission and control.

Keywords: Ae. aegypti, Ae. albopictus, age-stage, life table, two-sex

Procedia PDF Downloads 314
28073 Effect of Silicon in Mitigating Cadmium Toxicity in Maize

Authors: Ghulam Hasan Abbasi, Moazzam Jamil, M. Anwar-Ul-Haq

Abstract:

Heavy metals are significant pollutants in environment and their toxicity is a problem for survival of living things while Silicon (Si) is one of the most ubiquitous macroelements, performing an essential function in healing plants in response to environmental stresses. A hydroponic experiment was conducted to investigate the role of exogenous application of silicon under cadmium stress in six different maize hybrids with five treatments comprising of control, 7.5 µM Cd + 5 mM Si, 7.5 µM Cd + 10 mM Si, 15 µM Cd + 5 mM Si and 15 µM Cd + 10 mM Si. Results revealed that treatments of plants with 10mM Si application under both 7.5µM Cd and 15 µM Cd stress resulted in maximum improvement in plant morphological attributes (root and shoot length, root and shoot fresh and dry weight, leaf area and relative water contents) and antioxidant enzymes (POD and CAT) relative to 5 mM Si application in all maize hybrids. Results regarding Cd concentrations showed that Cd was more retained in roots followed by shoots and then leaves and maximum reduction in Cd uptake was observed at 10mM Si application. Maize hybrid 6525 showed maximum growth and least concentration of Cd whereas maize hybrid 1543 showed the minimum growth and maximum Cd concentration among all maize hybrids.

Keywords: antioxidant, cadmium, maize, silicon

Procedia PDF Downloads 515
28072 Estimation of Reservoirs Fracture Network Properties Using an Artificial Intelligence Technique

Authors: Reda Abdel Azim, Tariq Shehab

Abstract:

The main objective of this study is to develop a subsurface fracture map of naturally fractured reservoirs by overcoming the limitations associated with different data sources in characterising fracture properties. Some of these limitations are overcome by employing a nested neuro-stochastic technique to establish inter-relationship between different data, as conventional well logs, borehole images (FMI), core description, seismic attributes, and etc. and then characterise fracture properties in terms of fracture density and fractal dimension for each data source. Fracture density is an important property of a system of fracture network as it is a measure of the cumulative area of all the fractures in a unit volume of a fracture network system and Fractal dimension is also used to characterize self-similar objects such as fractures. At the wellbore locations, fracture density and fractal dimension can only be estimated for limited sections where FMI data are available. Therefore, artificial intelligence technique is applied to approximate the quantities at locations along the wellbore, where the hard data is not available. It should be noted that Artificial intelligence techniques have proven their effectiveness in this domain of applications.

Keywords: naturally fractured reservoirs, artificial intelligence, fracture intensity, fractal dimension

Procedia PDF Downloads 248
28071 Collision Theory Based Sentiment Detection Using Discourse Analysis in Hadoop

Authors: Anuta Mukherjee, Saswati Mukherjee

Abstract:

Data is growing everyday. Social networking sites such as Twitter are becoming an integral part of our daily lives, contributing a large increase in the growth of data. It is a rich source especially for sentiment detection or mining since people often express honest opinion through tweets. However, although sentiment analysis is a well-researched topic in text, this analysis using Twitter data poses additional challenges since these are unstructured data with abbreviations and without a strict grammatical correctness. We have employed collision theory to achieve sentiment analysis in Twitter data. We have also incorporated discourse analysis in the collision theory based model to detect accurate sentiment from tweets. We have also used the retweet field to assign weights to certain tweets and obtained the overall weightage of a topic provided in the form of a query. Hadoop has been exploited for speed. Our experiments show effective results.

Keywords: sentiment analysis, twitter, collision theory, discourse analysis

Procedia PDF Downloads 528
28070 Social Representations: Unplanned and Unwanted Pregnancy in Adolescents from Leon-Mexico

Authors: Alejandra Sierra, Maria de los Angeles Covarrubias, Guillermo Julian Gonzalez, Noe Alfaro

Abstract:

The objective of this study was to identify the cultural dimensions of the terms unplanned pregnancy and unwanted pregnancy built by adolescent women, through the focus of the social representations. Two associative methods were used: free listings and the paired comparison. 72 female students between the ages of 15 and 19 were interviewed, from the downtown area of Leon Guanajuato, Mexico. Words related to inducer terms were classified into five thematic categories: facilitators, consequences, reactions, expectations, and lexicon. The results showed that the social representations of unplanned pregnancy highlighted elements related to economic difficulties and negative emotional aspects, while unwanted pregnancy was associated with negative emotional aspects such as anger, anxiety, and sadness. The meanings each person attributes to terms related to pregnancy are culturally constructed and differ between populations; therefore, more attention should be paid to understanding the cultural meanings and attitudes of people in fertility decision-making, including also the views of adolescent men and other types of population, stratified by age groups and social conditions.

Keywords: adolescent, qualitative research, unplanned pregnancy, unwanted pregnancy

Procedia PDF Downloads 207
28069 The Shape of the Sculptor: Exploring Psychologist’s Perceptions of a Model of Parenting Ability to Guide Intervention in Child Custody Evaluations in South Africa

Authors: Anthony R. Townsend, Robyn L. Fasser

Abstract:

This research project provides an interpretative phenomenological analysis of a proposed conceptual model of parenting ability that has been designed to offer recommendations to guide intervention in child custody evaluations in South Africa. A recent review of the literature on child custody evaluations reveals that while there have been significant and valuable shifts in the capacity of the legal system aided by mental health professionals in understanding children and family dynamics, there remains a conceptual gap regarding the nature of parenting ability. With a view to addressing this paucity of a theoretical basis for considering parenting ability, this research project reviews a dimensional model for the assessment of parenting ability by conceiving parenting ability as a combination of good parenting and parental fitness. This model serves as a conceptual framework to guide child-custody evaluation and refine intervention in such cases to better meet the best interests of the child in a manner that bridges the professional gap between parties, legal entities, and mental health professionals. Using a model of good parenting as a point of theoretical departure, this model incorporates both intra-psychic and interpersonal attributes and behaviours of parents to form an impression of parenting ability and identify areas for potential enhancement. This research, therefore, hopes to achieve the following: (1) to provide nuanced descriptions of parents’ parenting ability; (2) to describe parents’ parenting potential; (3) to provide a parenting assessment tool for investigators in forensic family matters that will enable more useful recommendations and interventions; (4) to develop a language of consensus for investigators, attorneys, judges and parents, in forensic family matters, as to what comprises parenting ability and how this can be assessed; and (5) that all of the aforementioned will serve to advance the best interests of the children involved in such litigious matters. The evaluative promise and post-assessment prospects of this model are illustrated through three interlinking data sets: (1) the results of interviews with South African psychologists about the model, (2) retrospective analysis of care and contact evaluation reports using the model to determine if different conclusions or more specific recommendations are generated with its use and (3) the results of an interview with a psychologist who piloted this model by using it in care and contact evaluation.

Keywords: alienation, attachment, best interests of the child, care and contact evaluation, children’s act (38 of 2005), child custody evaluation, civil forensics, gatekeeping, good parenting, good-enough parenting, health professions council of South Africa, family law, forensic mental healthcare practitioners, parental fitness, parenting ability, parent management training, parenting plan, problem-determined system, psychotherapy, support of other child-parent relationship, voice of the child

Procedia PDF Downloads 110
28068 Machine Learning Strategies for Data Extraction from Unstructured Documents in Financial Services

Authors: Delphine Vendryes, Dushyanth Sekhar, Baojia Tong, Matthew Theisen, Chester Curme

Abstract:

Much of the data that inform the decisions of governments, corporations and individuals are harvested from unstructured documents. Data extraction is defined here as a process that turns non-machine-readable information into a machine-readable format that can be stored, for instance, in a database. In financial services, introducing more automation in data extraction pipelines is a major challenge. Information sought by financial data consumers is often buried within vast bodies of unstructured documents, which have historically required thorough manual extraction. Automated solutions provide faster access to non-machine-readable datasets, in a context where untimely information quickly becomes irrelevant. Data quality standards cannot be compromised, so automation requires high data integrity. This multifaceted task is broken down into smaller steps: ingestion, table parsing (detection and structure recognition), text analysis (entity detection and disambiguation), schema-based record extraction, user feedback incorporation. Selected intermediary steps are phrased as machine learning problems. Solutions leveraging cutting-edge approaches from the fields of computer vision (e.g. table detection) and natural language processing (e.g. entity detection and disambiguation) are proposed.

Keywords: computer vision, entity recognition, finance, information retrieval, machine learning, natural language processing

Procedia PDF Downloads 107
28067 Illuminating Regional Identity: An Interdisciplinary Exploration in Saskatchewan

Authors: Anne Gibbons

Abstract:

Both inside and outside of academia, people have sought to understand the “sense of place” of various regions, many times over and for many different reasons. The concept of regional identity is highly complex and surrounded by considerable contention. There are multiple bodies of research on regional identity theory in many different disciplines and even across sub-disciplinary classifications. Each discipline takes a slightly different angle or perspective on regional identity, resulting in a fragmented body of work on this topic overall. There is a need to consolidate this body of increasingly fragmented theory through interdisciplinary integration. For the purpose of this study, the province of Saskatchewan will serve as an exemplar for exploring regional identity in a concrete context. Saskatchewan can be thought of as a ‘functional region,’ with clear boundaries and clear residency, from which regional identity can be studied. This thesis shares the outcomes of a qualitative study grounded in a series of group interviews with askatchewan residents, from which it is concluded that the use of interdisciplinary theory is an appropriate approach to the study of regional identity. Regional identity cannot be compartmentalized; it is a web of characteristics, attributes, and feelings that are inextricably linked. The thesis thus concludes by offering lessons learned about how we might better understand regional identity, as illuminated through both interdisciplinary theory and the lived experiences and imaginations of people living in the region of Saskatchewan.

Keywords: interdisciplinary, regional identity, Saskatchewan, tourism studies

Procedia PDF Downloads 526
28066 Understanding How Posting and Replying Behaviors in Social Media Differentiate the Social Capital Cultivation Capabilities of Users

Authors: Jung Lee

Abstract:

This study identifies how the cultivation capabilities of social capital influence the overall attitudes of social media users and how these influences differ across user groups. First, the cultivation capabilities of social capital are identified from three aspects, namely, social capital accessibility, potentiality and sensitivity. These three types of social capital acquisition capabilities collectively represent how the social media users perceive the social media environment in terms of possibilities for social capital creation. These three capabilities are hypothesized to influence social media satisfaction and continuing use intention. Next, two essential activities in social media are identified, namely, posting and replying, to categorise social media users based on behavioral patterns. Various social media activities consist of the combinations of these two basic activities. Posting represents the broadcasting aspect of social media, whereas replying represents the communicative aspect of social media. We categorize users into four from communicators to observers by using these two behaviors to develop usage pattern matrix. By applying the usage pattern matrix to the capability model, we argue that posting behavior generally has a positive moderating effect on the attitudes of social media users, whereas replying behavior occasionally exhibits the negative moderating effect. These different moderating effects of posting and replying behavior are explained based on the different levels of social capital sensitivity and expectation of individuals. When a person is highly expecting social capital from social media, he or she would post actively. However, when one is highly sensitive to social capital, he or she would actively respond and reply to postings of other people because such an act would create a longer and more interactive relationship. A total of 512 social media users are invited to answer the survey. They were asked about their attitudes toward the social media and how they expect social capital through this practice. They were asked to check their general social media usage pattern for user categorization. Result confirmed that most of the hypotheses were supported. Three types of social capital cultivation capabilities are significant determinants of social media attitudes, and two social media activities (i.e., posting and replying) exhibited different moderating effects on attitudes. This study provides following discussions. First, three types of social capital cultivation capabilities were identified. Despite the numerous concerns about social media, such as whether it is a decent and real environment that produces social capital, this study confirms that people explicitly expect and experience social capital values from social media. Second, posting and replying activities are two building blocks of social media activities. These two activities are useful in explaining different the attitudes of social media users and predict future usage.

Keywords: social media, social capital, social media satisfaction, social media use intention

Procedia PDF Downloads 189
28065 Using SNAP and RADTRAD to Establish the Analysis Model for Maanshan PWR Plant

Authors: J. R. Wang, H. C. Chen, C. Shih, S. W. Chen, J. H. Yang, Y. Chiang

Abstract:

In this study, we focus on the establishment of the analysis model for Maanshan PWR nuclear power plant (NPP) by using RADTRAD and SNAP codes with the FSAR, manuals, and other data. In order to evaluate the cumulative dose at the Exclusion Area Boundary (EAB) and Low Population Zone (LPZ) outer boundary, Maanshan NPP RADTRAD/SNAP model was used to perform the analysis of the DBA LOCA case. The analysis results of RADTRAD were similar to FSAR data. These analysis results were lower than the failure criteria of 10 CFR 100.11 (a total radiation dose to the whole body, 250 mSv; a total radiation dose to the thyroid from iodine exposure, 3000 mSv).

Keywords: RADionuclide, transport, removal, and dose estimation (RADTRAD), symbolic nuclear analysis package (SNAP), dose, PWR

Procedia PDF Downloads 455
28064 A Data Envelopment Analysis Model in a Multi-Objective Optimization with Fuzzy Environment

Authors: Michael Gidey Gebru

Abstract:

Most of Data Envelopment Analysis models operate in a static environment with input and output parameters that are chosen by deterministic data. However, due to ambiguity brought on shifting market conditions, input and output data are not always precisely gathered in real-world scenarios. Fuzzy numbers can be used to address this kind of ambiguity in input and output data. Therefore, this work aims to expand crisp Data Envelopment Analysis into Data Envelopment Analysis with fuzzy environment. In this study, the input and output data are regarded as fuzzy triangular numbers. Then, the Data Envelopment Analysis model with fuzzy environment is solved using a multi-objective method to gauge the Decision Making Units' efficiency. Finally, the developed Data Envelopment Analysis model is illustrated with an application on real data 50 educational institutions.

Keywords: efficiency, Data Envelopment Analysis, fuzzy, higher education, input, output

Procedia PDF Downloads 54
28063 Mobile Cloud Computing: How to Improve

Authors: Abdullah Aljumah, Tariq Ahamad

Abstract:

The simplest possible human-computer interaction is mobile cloud computing as it emerges and makes the use of all modern-day human-oriented technology. The main aim of this idea is the QoS (quality of service) by using user-friendly and reliable software over the global network in order to make it economical by reducing cost, reliable, and increase the main storage. Since we studied and went through almost all the existing related work in this area and we came up with some challenges that will rise or might be rising for some basic areas in mobile cloud computing and mostly stogie and security area. In this research article, we suggest some recommendation for mobile cloud computing and for its security that will help in building more powerful tools to handle all this pressure.

Keywords: Cloud Computing, MCC, SAAS, computer interaction

Procedia PDF Downloads 376
28062 Three-Dimensional Model of Leisure Activities: Activity, Relationship, and Expertise

Authors: Taekyun Hur, Yoonyoung Kim, Junkyu Lim

Abstract:

Previous works on leisure activities had been categorizing activities arbitrarily and subjectively while focusing on a single dimension (e.g. active-passive, individual-group). To overcome these problems, this study proposed a Korean leisure activities’ matrix model that considered multidimensional features of leisure activities, which was comprised of 3 main factors and 6 sub factors: (a) Active (physical, mental), (b) Relational (quantity, quality), (c) Expert (entry barrier, possibility of improving). We developed items for measuring the degree of each dimension for every leisure activity. Using the developed Leisure Activities Dimensions (LAD) questionnaire, we investigated the presented dimensions of a total of 78 leisure activities which had been enjoyed by most Koreans recently (e.g. watching movie, taking a walk, watching media). The study sample consisted of 1348 people (726 men, 658 women) ranging in age from teenagers to elderlies in their seventies. This study gathered 60 data for each leisure activity, a total of 4860 data, which were used for statistical analysis. First, this study compared 3-factor model (Activity, Relation, Expertise) fit with 6-factor model (physical activity, mental activity, relational quantity, relational quality, entry barrier, possibility of improving) fit by using confirmatory factor analysis. Based on several goodness-of-fit indicators, the 6-factor model for leisure activities was a better fit for the data. This result indicates that it is adequate to take account of enough dimensions of leisure activities (6-dimensions in our study) to specifically apprehend each leisure attributes. In addition, the 78 leisure activities were cluster-analyzed with the scores calculated based on the 6-factor model, which resulted in 8 leisure activity groups. Cluster 1 (e.g. group sports, group musical activity) and Cluster 5 (e.g. individual sports) had generally higher scores on all dimensions than others, but Cluster 5 had lower relational quantity than Cluster 1. In contrast, Cluster 3 (e.g. SNS, shopping) and Cluster 6 (e.g. playing a lottery, taking a nap) had low scores on a whole, though Cluster 3 showed medium levels of relational quantity and quality. Cluster 2 (e.g. machine operating, handwork/invention) required high expertise and mental activity, but low physical activity. Cluster 4 indicated high mental activity and relational quantity despite low expertise. Cluster 7 (e.g. tour, joining festival) required not only moderate degrees of physical activity and relation, but low expertise. Lastly, Cluster 8 (e.g. meditation, information searching) had the appearance of high mental activity. Even though clusters of our study had a few similarities with preexisting taxonomy of leisure activities, there was clear distinctiveness between them. Unlike the preexisting taxonomy that had been created subjectively, we assorted 78 leisure activities based on objective figures of 6-dimensions. We also could identify that some leisure activities, which used to belong to the same leisure group, were included in different clusters (e.g. filed ball sports, net sports) because of different features. In other words, the results can provide a different perspective on leisure activities research and be helpful for figuring out what various characteristics leisure participants have.

Keywords: leisure, dimensional model, activity, relationship, expertise

Procedia PDF Downloads 308
28061 Acoustic Modeling of a Data Center with a Hot Aisle Containment System

Authors: Arshad Alfoqaha, Seth Bard, Dustin Demetriou

Abstract:

A new multi-physics acoustic modeling approach using ANSYS Mechanical FEA and FLUENT CFD methods is developed for modeling servers mounted to racks, such as IBM Z and IBM Power Systems, in data centers. This new approach allows users to determine the thermal and acoustic conditions that people are exposed to within the data center. The sound pressure level (SPL) exposure for a human working inside a hot aisle containment system inside the data center is studied. The SPL is analyzed at the noise source, at the human body, on the rack walls, on the containment walls, and on the ceiling and flooring plenum walls. In the acoustic CFD simulation, it is assumed that a four-inch diameter sphere with monopole acoustic radiation, placed in the middle of each rack, provides a single-source representation of all noise sources within the rack. Ffowcs Williams & Hawkings (FWH) acoustic model is employed. The target frequency is 1000 Hz, and the total simulation time for the transient analysis is 1.4 seconds, with a very small time step of 3e-5 seconds and 10 iterations to ensure convergence and accuracy. A User Defined Function (UDF) is developed to accurately simulate the acoustic noise source, and a Dynamic Mesh is applied to ensure acoustic wave propagation. Initial validation of the acoustic CFD simulation using a closed-form solution for the spherical propagation of an acoustic point source is performed.

Keywords: data centers, FLUENT, acoustics, sound pressure level, SPL, hot aisle containment, IBM

Procedia PDF Downloads 172
28060 PYTHEIA: A Scale for Assessing Rehabilitation and Assistive Robotics

Authors: Yiannis Koumpouros, Effie Papageorgiou, Alexandra Karavasili, Foteini Koureta

Abstract:

The objective of the present study was to develop a scale called PYTHEIA. The PYTHEIA is a self-reported measure for the assessment of rehabilitation and assistive robotics and other assistive technology devices. The development of PYTHEIA faced the absence of a valid instrument that can be used to evaluate the assistive robotic devices both as a whole, as well as any of their individual components or functionalities implemented. According to the results presented, PYTHEIA is a valid and reliable scale able to be applied to different target groups for the subjective evaluation of various assistive technology devices.

Keywords: rehabilitation, assistive technology, assistive robots, rehabilitation robots, scale, psychometric test, assessment, validation, user satisfaction

Procedia PDF Downloads 309
28059 A Sustainability Benchmarking Framework Based on the Life Cycle Sustainability Assessment: The Case of the Italian Ceramic District

Authors: A. M. Ferrari, L. Volpi, M. Pini, C. Siligardi, F. E. Garcia Muina, D. Settembre Blundo

Abstract:

A long tradition in the ceramic manufacturing since the 18th century, primarily due to the availability of raw materials and an efficient transport system, let to the birth and development of the Italian ceramic tiles district that nowadays represents a reference point for this sector even at global level. This economic growth has been coupled to attention towards environmental sustainability issues throughout various initiatives undertaken over the years at the level of the production sector, such as certification activities and sustainability policies. In this way, starting from an evaluation of the sustainability in all its aspects, the present work aims to develop a benchmarking helping both producers and consumers. In the present study, throughout the Life Cycle Sustainability Assessment (LCSA) framework, the sustainability has been assessed in all its dimensions: environmental with the Life Cycle Assessment (LCA), economic with the Life Cycle Costing (LCC) and social with the Social Life Cycle Assessment (S-LCA). The annual district production of stoneware tiles during the 2016 reference year has been taken as reference flow for all the three assessments, and the system boundaries cover the entire life cycle of the tiles, except for the LCC for which only the production costs have been considered at the moment. In addition, a preliminary method for the evaluation of local and indoor emissions has been introduced in order to assess the impact due to atmospheric emissions on both people living in the area surrounding the factories and workers. The Life Cycle Assessment results, obtained from IMPACT 2002+ modified assessment method, highlight that the manufacturing process is responsible for the main impact, especially because of atmospheric emissions at a local scale, followed by the distribution to end users, the installation and the ordinary maintenance of the tiles. With regard to the economic evaluation, both the internal and external costs have been considered. For the LCC, primary data from the analysis of the financial statements of Italian ceramic companies show that the higher cost items refer to expenses for goods and services and costs of human resources. The analysis of externalities with the EPS 2015dx method attributes the main damages to the distribution and installation of the tiles. The social dimension has been investigated with a preliminary approach by using the Social Hotspots Database, and the results indicate that the most affected damage categories are health and safety and labor rights and decent work. This study shows the potential of the LCSA framework applied to an industrial sector; in particular, it can be a useful tool for building a comprehensive benchmark for the sustainability of the ceramic industry, and it can help companies to actively integrate sustainability principles into their business models.

Keywords: benchmarking, Italian ceramic industry, life cycle sustainability assessment, porcelain stoneware tiles

Procedia PDF Downloads 125
28058 Constructivism Learning Management in Mathematics Analysis Courses

Authors: Komon Paisal

Abstract:

The purposes of this research were (1) to create a learning activity for constructivism, (2) study the Mathematical Analysis courses learning achievement, and (3) study students’ attitude toward the learning activity for constructivism. The samples in this study were divided into 2 parts including 3 Mathematical Analysis courses instructors of Suan Sunandha Rajabhat University who provided basic information and attended the seminar and 17 Mathematical Analysis courses students who were studying in the academic and engaging in the learning activity for constructivism. The research instruments were lesson plans constructivism, subjective Mathematical Analysis courses achievement test with reliability index of 0.8119, and an attitude test concerning the students’ attitude toward the Mathematical Analysis courses learning activity for constructivism. The result of the research show that the efficiency of the Mathematical Analysis courses learning activity for constructivism is 73.05/72.16, which is more than expected criteria of 70/70. The research additionally find that the average score of learning achievement of students who engaged in the learning activities for constructivism are equal to 70% and the students’ attitude toward the learning activity for constructivism are at the medium level.

Keywords: constructivism, learning management, mathematics analysis courses, learning activity

Procedia PDF Downloads 529