Search results for: job access with speech
2023 Short Text Classification for Saudi Tweets
Authors: Asma A. Alsufyani, Maram A. Alharthi, Maha J. Althobaiti, Manal S. Alharthi, Huda Rizq
Abstract:
Twitter is one of the most popular microblogging sites that allows users to publish short text messages called 'tweets'. Increasing the number of accounts to follow (followings) increases the number of tweets that will be displayed from different topics in an unclassified manner in the timeline of the user. Therefore, it can be a vital solution for many Twitter users to have their tweets in a timeline classified into general categories to save the user’s time and to provide easy and quick access to tweets based on topics. In this paper, we developed a classifier for timeline tweets trained on a dataset consisting of 3600 tweets in total, which were collected from Saudi Twitter and annotated manually. We experimented with the well-known Bag-of-Words approach to text classification, and we used support vector machines (SVM) in the training process. The trained classifier performed well on a test dataset, with an average F1-measure equal to 92.3%. The classifier has been integrated into an application, which practically proved the classifier’s ability to classify timeline tweets of the user.Keywords: corpus creation, feature extraction, machine learning, short text classification, social media, support vector machine, Twitter
Procedia PDF Downloads 1552022 Affective Robots: Evaluation of Automatic Emotion Recognition Approaches on a Humanoid Robot towards Emotionally Intelligent Machines
Authors: Silvia Santano Guillén, Luigi Lo Iacono, Christian Meder
Abstract:
One of the main aims of current social robotic research is to improve the robots’ abilities to interact with humans. In order to achieve an interaction similar to that among humans, robots should be able to communicate in an intuitive and natural way and appropriately interpret human affects during social interactions. Similarly to how humans are able to recognize emotions in other humans, machines are capable of extracting information from the various ways humans convey emotions—including facial expression, speech, gesture or text—and using this information for improved human computer interaction. This can be described as Affective Computing, an interdisciplinary field that expands into otherwise unrelated fields like psychology and cognitive science and involves the research and development of systems that can recognize and interpret human affects. To leverage these emotional capabilities by embedding them in humanoid robots is the foundation of the concept Affective Robots, which has the objective of making robots capable of sensing the user’s current mood and personality traits and adapt their behavior in the most appropriate manner based on that. In this paper, the emotion recognition capabilities of the humanoid robot Pepper are experimentally explored, based on the facial expressions for the so-called basic emotions, as well as how it performs in contrast to other state-of-the-art approaches with both expression databases compiled in academic environments and real subjects showing posed expressions as well as spontaneous emotional reactions. The experiments’ results show that the detection accuracy amongst the evaluated approaches differs substantially. The introduced experiments offer a general structure and approach for conducting such experimental evaluations. The paper further suggests that the most meaningful results are obtained by conducting experiments with real subjects expressing the emotions as spontaneous reactions.Keywords: affective computing, emotion recognition, humanoid robot, human-robot-interaction (HRI), social robots
Procedia PDF Downloads 2352021 Investigating Willingness to Pay for Water Services in a Newly Established Municipality in Malamulele, Vhembe District Municipality, South Africa
Authors: D. T. Chabalala
Abstract:
Currently South Africa is facing a triple challenge of poverty, unemployment and inequality. As such, communities have limited access to basic municipal services such as water, sanitation and electricity. Citizens such as those residing at Malamulele Township will be responsible to pay for the cost of water services that they consume instead of having the costs subsidised by the newly formed Municipality. The question on whether Malamulele residents would be willing to pay for water services provided for them need to be investigated. This study was conducted in Malamulele Township and surrounding villages. The article is based on a survey of 500 randomly selected households from township and villages surrounding Malamulele. The study uses the contingent valuation method to determine households’ willingness to pay for water services as well as the consequences they possibly will encounter in case their response is negative. The obtained results can be used by the Municipality and other Government Departments in order to better identify the affordable rates and the quantity of water service to be provided. Thus, it will make Municipality water supply services stable and sustainable. It will also be used as a tool to provide inform decisions about a range of infrastructure to enhance water supply systems.Keywords: willingness to pay, contingent valuation method, water supply systems, Malamulele
Procedia PDF Downloads 2282020 Study on the OTP Authentication Method and Security for User Mobility in the Cloud
Authors: Jong-Won Lee
Abstract:
Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry.Keywords: cloud, OTP, mobility, security, authentication
Procedia PDF Downloads 3502019 RE:SOUNDING a 2000-Year-Old Vietnamese Dong Son Bronze Drum; Artist-Led Collaborations outside the Museum to Challenge the Impasse of Repatriating and Rematriating Cultural Instruments
Authors: H. A. J. Nguyen, V. A. Pham
Abstract:
RE:SOUNDING is an ongoing research project and artwork seeking to return the sound and knowledge of Dong Son bronze drums back to contemporary musicians. Colonial collections of ethnographic instruments are problematic in how they commit acts of conceptual, cultural, and acoustic silencing. The collection (or more honestly), the plagiarism, and pillaging of these instruments have systemically separated them from living and breathing cultures. This includes diasporic communities, who have come to resettle in close proximity - but still have little access - to the museums and galleries that display their cultural objects. Despite recent attempts to 'open up' and 'recognise' the tensions and violence of these ethnographic collections, many museums continue to structurally organize and reproduce knowledge with the same procedural distance and limitations of imperial condescension. Impatient with the slowness of these museums, our diaspora led collaborations participated in the opaque economy of the auction market to gain access and begin the process of digitally recording and archiving the actual sounds of the ancient Dong Son drum. This self-directed, self-initiated artwork not only acoustically reinvigorated an ancient instrument but redistributed these sonic materials back to contemporary musicians, composers, and their diasporic communities throughout Vietnam, South East Asia, and Australia. Our methodologies not only highlight the persistent inflexibility of museum infrastructures but demand that museums refrain from their paternalistic practice of risk-averse ownership, to seriously engage with new technologies and political formations that require all public institutions to be held accountable for the ethical and intellectual viability of their colonial collections. The integrated and practical resolve of diasporic artists and their communities are more than capable of working with new technologies to reclaim and reinvigorate what is culturally and spiritually theirs. The motivation to rematriate – as opposed to merely repatriate – the acoustic legacies of these instruments to contemporary musicians and artists is a new model for decolonial and restorative practices. Exposing the inadequacies of western scholarship that continues to treat these instruments as discreet, disembodied, and detached artifacts, these collaborative strategies have thus far produced a wealth of new knowledge – new to the west perhaps – but not that new to these, our own communities. This includes the little-acknowledged fact that the Dong Son drum were political instruments of war and technology, rather than their simplistic description in the museum and western academia as agrarian instruments of fertility and harvest. Through the collective and continued sharing of knowledge and sound materials produced from this research, these drums are gaining a contemporary relevance beyond the cultural silencing of the museum display cabinet. Acknowledgement: We acknowledge the Wurundjeri and Boon Wurrung of the Kulin Nation and the Gadigal of the Eora Nation where we began this project. We pay our respects to the Peoples, Lands, Traditional Custodians, Practices, and Creator Ancestors of these Great Nations, as well as those First Nations peoples throughout Australia, Vietnam, and Indonesia, where this research continues, and upon whose stolen lands and waterways were never ceded.Keywords: acoustic archaeology, decolonisation, museum collections, rematriation, repatriation, Dong Son, experimental music, digital recording
Procedia PDF Downloads 1512018 A Novel Dual Band-pass filter Based On Coupling of Composite Right/Left Hand CPW and (CSRRs) Uses Ferrite Components
Authors: Mohammed Berka, Khaled Merit
Abstract:
Recent works on microwave filters show that the constituent materials such filters are very important in the design and realization. Several solutions have been proposed to improve the qualities of filtering. In this paper, we propose a new dual band-pass filter based on the coupling of a composite (CRLH) coplanar waveguide with complementary split ring resonators (CSRRs). The (CRLH) CPW is composed of two resonators, each one has an interdigital capacitor (CID) and two short-circuited stubs parallel to top ground plane. On the lower ground plane, we use defected ground structure technology (DGS) to engrave two (CSRRs) offered with different shapes and dimensions. Between the top ground plane and the substrate, we place a ferrite layer to control the electromagnetic coupling between (CRLH) CPW and (CSRRs). The global filter that has coplanar access will have a dual band-pass behavior around the magnetic resonances of (CSRRs). Since there’s no scientific or experimental result in the literature for this kind of complicated structure, it was necessary to perform simulation using HFSS Ansoft designer.Keywords: complementary split ring resonators, coplanar waveguide, ferrite, filter, stub.
Procedia PDF Downloads 4032017 A QoE-driven Cross-layer Resource Allocation Scheme for High Traffic Service over Open Wireless Network Downlink
Authors: Liya Shan, Qing Liao, Qinyue Hu, Shantao Jiang, Tao Wang
Abstract:
In this paper, a Quality of Experience (QoE)-driven cross-layer resource allocation scheme for high traffic service over Open Wireless Network (OWN) downlink is proposed, and the related problem about the users in the whole cell including the users in overlap region of different cells has been solved.A method, in which assess models of the BestEffort service and the no-reference assess algorithm for video service are adopted, to calculate the Mean Opinion Score (MOS) value for high traffic service has been introduced. The cross-layer architecture considers the parameters in application layer, media access control layer and physical layer jointly. Based on this architecture and the MOS value, the Binary Constrained Particle Swarm Optimization (B_CPSO) algorithm is used to solve the cross-layer resource allocation problem. In addition,simulationresults show that the proposed scheme significantly outperforms other schemes in terms of maximizing average users’ MOS value for the whole system as well as maintaining fairness among users.Keywords: high traffic service, cross-layer resource allocation, QoE, B_CPSO, OWN
Procedia PDF Downloads 5412016 Psychological Factors of Readiness of Defectologists to Professional Development: On the Example of Choosing an Educational Environment
Authors: Inna V. Krotova
Abstract:
The study pays special attention to the definition of the psychological potential of a specialist-defectologist, which determines his desire to increase the level of his or her professional competence. The group included participants of the educational environment – an additional professional program 'Technologies of psychological and pedagogical assistance for children with complex developmental disabilities' implemented by the department of defectology and clinical psychology of the KFU jointly with the Support Fund for the Deafblind people 'Co-Unity'. The purpose of our study was to identify the psychological aspects of the readiness of the specialist-defectologist to his or her professional development. The study assessed the indicators of psychological preparedness, and its four components were taken into account: motivational, cognitive, emotional and volitional. We used valid and standardized tests during the study. As a result of the factor analysis of data received (from Extraction Method: Principal Component Analysis, Rotation Method: Varimax with Kaiser Normalization, Rotation converged in 12 iterations), there were identified three factors with maximum factor load from 24 indices, and their correlation coefficients with other indicators were taken into account at the level of reliability p ≤ 0.001 and p ≤ 0.01. Thus the system making factor was determined – it’s a 'motivation to achieve success'; it formed a correlation galaxy with two other factors: 'general internality' and 'internality in the field of achievements', as well as with such psychological indicators as 'internality in the field of family relations', 'internality in the field of interpersonal relations 'and 'low self-control-high self-control' (the names of the scales used is the same as names in the analysis methods. In conclusion of the article, we present some proposals to take into account the psychological model of readiness of specialists-defectologists for their professional development, to stimulate the growth of their professional competence. The study has practical value for all providers of special education and organizations that have their own specialists-defectologists, teachers-defectologists, teachers for correctional and ergotherapeutic activities, specialists working in the field of correctional-pedagogical activity (speech therapists) to people with special needs who need true professional support.Keywords: psychological readiness, defectologist, professional development, psychological factors, special education, professional competence, innovative educational environment
Procedia PDF Downloads 1752015 Voices of Dissent: Case Study of a Digital Archive of Testimonies of Political Oppression
Authors: Andrea Scapolo, Zaya Rustamova, Arturo Matute Castro
Abstract:
The “Voices in Dissent” initiative aims at collecting and making available in a digital format, testimonies, letters, and other narratives produced by victims of political oppression from different geographical spaces across the Atlantic. By recovering silenced voices behind the official narratives, this open-access online database will provide indispensable tools for rewriting the history of authoritarian regimes from the margins as memory debates continue to provoke controversy among academic and popular transnational circles. In providing an extensive database of non-hegemonic discourses in a variety of political and social contexts, the project will complement the existing European and Latin-American studies, and invite further interdisciplinary and trans-national research. This digital resource will be available to academic communities and the general audience and will be organized geographically and chronologically. “Voices in Dissent” will offer a first comprehensive study of these personal accounts of persecution and repression against determined historical backgrounds and their impact on collective memory formation in contemporary societies. The digitalization of these texts will allow to run metadata analyses and adopt comparatist approaches for a broad range of research endeavors. Most of the testimonies included in our archive are testimonies of trauma: the trauma of exile, imprisonment, torture, humiliation, censorship. The research on trauma has now reached critical mass and offers a broad spectrum of critical perspectives. By putting together testimonies from different geographical and historical contexts, our project will provide readers and scholars with an extraordinary opportunity to investigate how culture shapes individual and collective memories and provides or denies resources to make sense and cope with the trauma. For scholars dealing with the epistemological and rhetorical analysis of testimonies, an online open-access archive will prove particularly beneficial to test theories on truth status and the formation of belief as well as to study the articulation of discourse. An important aspect of this project is also its pedagogical applications since it will contribute to the creation of Open Educational Resources (OER) to support students and educators worldwide. Through collaborations with our Library System, the archive will form part of the Digital Commons database. The texts collected in this online archive will be made available in the original languages as well as in English translation. They will be accompanied by a critical apparatus that will contextualize them historically by providing relevant background information and bibliographical references. All these materials can serve as a springboard for a broad variety of educational projects and classroom activities. They can also be used to design specific content courses or modules. In conclusion, the desirable outcomes of the “Voices in Dissent” project are: 1. the collections and digitalization of political dissent testimonies; 2. the building of a network of scholars, educators, and learners involved in the design, development, and sustainability of the digital archive; 3. the integration of the content of the archive in both research and teaching endeavors, such as publication of scholarly articles, design of new upper-level courses, and integration of the materials in existing courses.Keywords: digital archive, dissent, open educational resources, testimonies, transatlantic studies
Procedia PDF Downloads 1062014 An Innovative Auditory Impulsed EEG and Neural Network Based Biometric Identification System
Authors: Ritesh Kumar, Gitanjali Chhetri, Mandira Bhatia, Mohit Mishra, Abhijith Bailur, Abhinav
Abstract:
The prevalence of the internet and technology in our day to day lives is creating more security issues than ever. The need for protecting and providing a secure access to private and business data has led to the development of many security systems. One of the potential solutions is to employ the bio-metric authentication technique. In this paper we present an innovative biometric authentication method that utilizes a person’s EEG signal, which is acquired in response to an auditory stimulus,and transferred wirelessly to a computer that has the necessary ANN algorithm-Multi layer perceptrol neural network because of is its ability to differentiate between information which is not linearly separable.In order to determine the weights of the hidden layer we use Gaussian random weight initialization. MLP utilizes a supervised learning technique called Back propagation for training the network. The complex algorithm used for EEG classification reduces the chances of intrusion into the protected public or private data.Keywords: EEG signal, auditory evoked potential, biometrics, multilayer perceptron neural network, back propagation rule, Gaussian random weight initialization
Procedia PDF Downloads 4092013 Myers-Briggs Type Index Personality Type Classification Based on an Individual’s Spotify Playlists
Authors: Sefik Can Karakaya, Ibrahim Demir
Abstract:
In this study, the relationship between musical preferences and personality traits has been investigated in terms of Spotify audio analysis features. The aim of this paper is to build such a classifier capable of segmenting people into their Myers-Briggs Type Index (MBTI) personality type based on their Spotify playlists. Music takes an important place in the lives of people all over the world and online music streaming platforms make it easier to reach musical contents. In this context, the motivation to build such a classifier is allowing people to gain access to their MBTI personality type and perhaps for more reliably and more quickly. For this purpose, logistic regression and deep neural networks have been selected for classifier and their performances are compared. In conclusion, it has been found that musical preferences differ statistically between personality traits, and evaluated models are able to distinguish personality types based on given musical data structure with over %60 accuracy rate.Keywords: myers-briggs type indicator, music psychology, Spotify, behavioural user profiling, deep neural networks, logistic regression
Procedia PDF Downloads 1442012 Automatic Teller Machine System Security by Using Mobile SMS Code
Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem
Abstract:
The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition
Procedia PDF Downloads 3652011 Social Media Mining with R. Twitter Analyses
Authors: Diana Codat
Abstract:
Tweets' analysis is part of text mining. Each document is a written text. It's possible to apply the usual text search techniques, in particular by switching to the bag-of-words representation. But the tweets induce peculiarities. Some may enrich the analysis. Thus, their length is calibrated (at least as far as public messages are concerned), special characters make it possible to identify authors (@) and themes (#), the tweet and retweet mechanisms make it possible to follow the diffusion of the information. Conversely, other characteristics may disrupt the analyzes. Because space is limited, authors often use abbreviations, emoticons to express feelings, and they do not pay much attention to spelling. All this creates noise that can complicate the task. The tweets carry a lot of potentially interesting information. Their exploitation is one of the main axes of the analysis of the social networks. We show how to access Twitter-related messages. We will initiate a study of the properties of the tweets, and we will follow up on the exploitation of the content of the messages. We will work under R with the package 'twitteR'. The study of tweets is a strong focus of analysis of social networks because Twitter has become an important vector of communication. This example shows that it is easy to initiate an analysis from data extracted directly online. The data preparation phase is of great importance.Keywords: data mining, language R, social networks, Twitter
Procedia PDF Downloads 1842010 Simulation Model for Evaluating the Impact of Adaptive E-Learning in the Agricultural Sector
Authors: Maria Nabakooza
Abstract:
Efficient agricultural production is very significant in attaining food sufficiency and security in the world. Many methods are employed by the farmers while attending to their gardens, from manual to mechanized, with Farmers range from subsistence to commercial depending on the motive. This creates a lacuna in the modes of operation in this field as different farmers will take different approaches. This has led to many e-Learning courses being introduced to address this gap. Many e-learning systems use advanced network technologies like Web services, grid computing to promote learning at any time and any place. Many of the existing systems have not inculcated the applicability of the modules in them, the tools to be used and further access whether they are the right tools for the right job. A thorough investigation into the applicability of adaptive eLearning in the agricultural sector has not been taken into account; enabling the assumption that eLearning is the right tool for boosting productivity in this sector. This study comes in to provide an insight and thorough analysis as to whether adaptive eLearning is the right tool for boosting agricultural productivity. The Simulation will adopt a system dynamics modeling approach as a way of examining causality and effect relationship. This study will provide teachers with an insight into which tools they should adopt in designing, and provide students the opportunities to achieve an orderly learning experience through adaptive navigating e-learning services.Keywords: agriculture, adaptive, e-learning, technology
Procedia PDF Downloads 2512009 Sustainable Development Variables to Assess Transport Infrastructure in Remote Destinations
Authors: Dimitrios J. Dimitriou, Maria F. Sartzetaki
Abstract:
The assessment variables of the accessibility and the sustainability of access infrastructure for remote regions may vary significant by location and a wide range of factors may affect the decision process. In this paper, the environmental disturbance implications of transportation system to key demand and supply variables impact the economic system in remote destination are descripted. According to a systemic approach, the key sustainability variables deals with decision making process that have to be included in strategic plan for the critical transport infrastructure development and their relationship to regional socioeconomic system are presented. The application deals with the development of railway in remote destinations, where the traditional CBA not include the external cost generated by the environmental impacts that may have a range of diverse impacts on transport infrastructure and services. The analysis output provides key messages to decision and policy makers towards sustainable development of transport infrastructure, especially for remote destinations where accessibility is a key factor of regional economic development and social stability. The key conclusion could be essential useful for relevant applications in remote regions in the same latitude.Keywords: sustainable development in remote regions, transport infrastructure, strategic planning, sustainability variables
Procedia PDF Downloads 3542008 Neural Network Analysis Applied to Risk Prediction of Early Neonatal Death
Authors: Amanda R. R. Oliveira, Caio F. F. C. Cunha, Juan C. L. Junior, Amorim H. P. Junior
Abstract:
Children deaths are traumatic events that most often can be prevented. The technology of prevention and intervention in cases of infant deaths is available at low cost and with solid evidence and favorable results, however, with low access cover. Weight is one of the main factors related to death in the neonatal period, so the newborns of low birth weight are a population at high risk of death in the neonatal period, especially early neonatal period. This paper describes the development of a model based in neural network analysis to predict the mortality risk rating in the early neonatal period for newborns of low birth weight to identify the individuals of this population with increased risk of death. The neural network applied was trained with a set of newborns data obtained from Brazilian health system. The resulting network presented great success rate in identifying newborns with high chances of death, which demonstrates the potential for using this tool in an integrated manner to the health system, in order to direct specific actions for improving prognosis of newborns.Keywords: low birth weight, neonatal death risk, neural network, newborn
Procedia PDF Downloads 4482007 Simulation on Fuel Metering Unit Used for TurboShaft Engine Model
Authors: Bin Wang, Hengyu Ji, Zhifeng Ye
Abstract:
Fuel Metering Unit (FMU) in fuel system of an aeroengine sometimes has direct influence on the engine performance, which is neglected for the sake of easy access to mathematical model of the engine in most cases. In order to verify the influence of FMU on an engine model, this paper presents a co-simulation of a stepping motor driven FMU (digital FMU) in a turboshaft aeroengine, using AMESim and MATLAB to obtain the steady and dynamic characteristics of the FMU. For this method, mechanical and hydraulic section of the unit is modeled through AMESim, while the stepping motor is mathematically modeled through MATLAB/Simulink. Combining these two sub-models yields an AMESim/MATLAB co-model of the FMU. A simplified component level model for the turboshaft engine is established and connected with the FMU model. Simulation results on the full model show that the engine model considering FMU characteristics describes the engine more precisely especially in its transition state. An FMU dynamics will cut down the rotation speed of the high pressure shaft and the inlet pressure of the combustor during the step response. The work in this paper reveals the impact of FMU on engine operation characteristics and provides a reference to an engine model for ground tests.Keywords: fuel metering unit, stepping motor, AMESim/Matlab, full digital simulation
Procedia PDF Downloads 2492006 Optimizing the Public Policy Information System under the Environment of E-Government
Authors: Qian Zaijian
Abstract:
E-government is one of the hot issues in the current academic research of public policy and management. As the organic integration of information and communication technology (ICT) and public administration, e-government is one of the most important areas in contemporary information society. Policy information system is a basic subsystem of public policy system, its operation affects the overall effect of the policy process or even exerts a direct impact on the operation of a public policy and its success or failure. The basic principle of its operation is information collection, processing, analysis and release for a specific purpose. The function of E-government for public policy information system lies in the promotion of public access to the policy information resources, information transmission through e-participation, e-consultation in the process of policy analysis and processing of information and electronic services in policy information stored, to promote the optimization of policy information systems. However, due to many factors, the function of e-government to promote policy information system optimization has its practical limits. In the building of E-government in our country, we should take such path as adhering to the principle of freedom of information, eliminating the information divide (gap), expanding e-consultation, breaking down information silos and other major path, so as to promote the optimization of public policy information systems.Keywords: China, e-consultation, e-democracy, e-government, e-participation, ICTs, public policy information systems
Procedia PDF Downloads 8652005 Current Status of Inclusive Education for Students with Disabilities in Punjab, Pakistan
Authors: Muhammad Shahid Shah, Akram Maqbool, Samina Ashraf
Abstract:
Since start of this century, world has adopted inclusion as a trend in special education. To meet the challenges of inclusion response, the Punjab government has developed a progressive policy to implement inclusive education. The objectives of this research were to analyze the administration and implementation process by consideration on the management, student’s admission process, screening and assessment, adaptations in curriculum and instruction along with an evaluation, government and nonprofit organizations support. The sample consisted of 50 schools both public and private with a total of 3000 students, 9 percent of which (270) were students with disabilities. Among all the students with disabilities, 63 percent (170) were male and 37 percent (100) were female. The concluded remarks regarding management revealed that a large number of inclusive schools was lacking in terms of developing a certain model for inclusion, including the managerial breakup of staff, the involvement of stakeholders, and conducted frequent meetings. Many of schools are not able to restructure their school organizations due to lack of financial resources, consultations, and backup. As for as student’s admission/identification/assessment was concerned, only 12 percent schools applied a selection process regarding student admission, half of which used different procedures for disable candidates. Approximately 5 percent of inclusive schools had modified their curriculum, including a variety of standards. In terms of instruction, 25 percent of inclusive schools reported that they modified their instructional process. Only a few schools, however, provided special equipment for students with visual impairment, physical impairment, speech and hearing problems, students with mild intellectual disabilities, and autism. In a student evaluation, more than 45 percent reported that test items, administration, time allocations, and students’ reports were modified. For the primary board examination conducted by the Education Department of Government of Punjab, this number decreased dramatically. Finally, government and nonprofit organizations support in the forms of funding, coaching, and facilities were mostly provided by provincial governments and by Ghazali Education Trust.Keywords: inclusion, identification, assessment, funding, facilities, evaluation
Procedia PDF Downloads 1382004 Networking the Biggest Challenge in Hybrid Cloud Deployment
Authors: Aishwarya Shekhar, Devesh Kumar Srivastava
Abstract:
Cloud computing has emerged as a promising direction for cost efficient and reliable service delivery across data communication networks. The dynamic location of service facilities and the virtualization of hardware and software elements are stressing the communication networks and protocols, especially when data centres are interconnected through the internet. Although the computing aspects of cloud technologies have been largely investigated, lower attention has been devoted to the networking services without involving IT operating overhead. Cloud computing has enabled elastic and transparent access to infrastructure services without involving IT operating overhead. Virtualization has been a key enabler for cloud computing. While resource virtualization and service abstraction have been widely investigated, networking in cloud remains a difficult puzzle. Even though network has significant role in facilitating hybrid cloud scenarios, it hasn't received much attention in research community until recently. We propose Network as a Service (NaaS), which forms the basis of unifying public and private clouds. In this paper, we identify various challenges in adoption of hybrid cloud. We discuss the design and implementation of a cloud platform.Keywords: cloud computing, networking, infrastructure, hybrid cloud, open stack, naas
Procedia PDF Downloads 4272003 Beyond the Economics of Food: Household Food Strategies in Clusters of the Umkhanyakude District Municipality
Authors: Mduduzi Nhlozi
Abstract:
Food insecurity continues to persist in rural areas of South Africa today. A number of factors can be attributed to this including declining rural economies, rising unemployment, natural disasters such as drought as well as shifting cultural norms, values, traditions and beliefs. This paper explores mechanisms used by rural households to achieve food security in the midst of various threats and risks to their livelihoods. The study used semi-structured questionnaire to collect information on lived experiences of households in their quest to access and ensure availability of food. The paper finds that households use a number of food strategies namely economy-related, culture-related and rite-of-passage related strategies to achieve food security. The thrust of argument in the paper is that there is a need for food security studies to move beyond the orthodox, economic analytic framework, towards new institutional economics, focusing on local governance and socio-cultural systems supporting households to achieve food security. It advocates for localised food security plans to be developed by local municipalities to improve food security status for rural households.Keywords: household, food insecurity, food strategies, new institutional economics, umkhanyakude
Procedia PDF Downloads 1212002 Dynamic Interaction between Renwable Energy Consumption and Sustainable Development: Evidence from Ecowas Region
Authors: Maman Ali M. Moustapha, Qian Yu, Benjamin Adjei Danquah
Abstract:
This paper investigates the dynamic interaction between renewable energy consumption (REC) and economic growth using dataset from the Economic Community of West African States (ECOWAS) from 2002 to 2016. For this study the Autoregressive Distributed Lag- Bounds test approach (ARDL) was used to examine the long run relationship between real gross domestic product and REC, while VECM based on Granger causality has been used to examine the direction of Granger causality. Our empirical findings indicate that REC has significant and positive impact on real gross domestic product. In addition, we found that REC and the percentage of access to electricity had unidirectional Granger causality to economic growth while carbon dioxide emission has bidirectional Granger causality to economic growth. Our findings indicate also that 1 per cent increase in the REC leads to an increase in Real GDP by 0.009 in long run. Thus, REC can be a means to ensure sustainable economic growth in the ECOWAS sub-region. However, it is necessary to increase further support and investments on renewable energy production in order to speed up sustainable economic development throughout the regionKeywords: Economic Growth, Renewable Energy, Sustainable Development, Sustainable Energy
Procedia PDF Downloads 2092001 A Novel Way to Create Qudit Quantum Error Correction Codes
Authors: Arun Moorthy
Abstract:
Quantum computing promises to provide algorithmic speedups for a number of tasks; however, similar to classical computing, effective error-correcting codes are needed. Current quantum computers require costly equipment to control each particle, so having fewer particles to control is ideal. Although traditional quantum computers are built using qubits (2-level systems), qudits (more than 2-levels) are appealing since they can have an equivalent computational space using fewer particles, meaning fewer particles need to be controlled. Currently, qudit quantum error-correction codes are available for different level qudit systems; however, these codes have sometimes overly specific constraints. When building a qudit system, it is important for researchers to have access to many codes to satisfy their requirements. This project addresses two methods to increase the number of quantum error correcting codes available to researchers. The first method is generating new codes for a given set of parameters. The second method is generating new error-correction codes by using existing codes as a starting point to generate codes for another level (i.e., a 5-level system code on a 2-level system). So, this project builds a website that researchers can use to generate new error-correction codes or codes based on existing codes.Keywords: qudit, error correction, quantum, qubit
Procedia PDF Downloads 1602000 Deciphering Information Quality: Unraveling the Impact of Information Distortion in the UK Aerospace Supply Chains
Authors: Jing Jin
Abstract:
The incorporation of artificial intelligence (AI) and machine learning (ML) in aircraft manufacturing and aerospace supply chains leads to the generation of a substantial amount of data among various tiers of suppliers and OEMs. Identifying the high-quality information challenges decision-makers. The application of AI/ML models necessitates access to 'high-quality' information to yield desired outputs. However, the process of information sharing introduces complexities, including distortion through various communication channels and biases introduced by both human and AI entities. This phenomenon significantly influences the quality of information, impacting decision-makers engaged in configuring supply chain systems. Traditionally, distorted information is categorized as 'low-quality'; however, this study challenges this perception, positing that distorted information, contributing to stakeholder goals, can be deemed high-quality within supply chains. The main aim of this study is to identify and evaluate the dimensions of information quality crucial to the UK aerospace supply chain. Guided by a central research question, "What information quality dimensions are considered when defining information quality in the UK aerospace supply chain?" the study delves into the intricate dynamics of information quality in the aerospace industry. Additionally, the research explores the nuanced impact of information distortion on stakeholders' decision-making processes, addressing the question, "How does the information distortion phenomenon influence stakeholders’ decisions regarding information quality in the UK aerospace supply chain system?" This study employs deductive methodologies rooted in positivism, utilizing a cross-sectional approach and a mono-quantitative method -a questionnaire survey. Data is systematically collected from diverse tiers of supply chain stakeholders, encompassing end-customers, OEMs, Tier 0.5, Tier 1, and Tier 2 suppliers. Employing robust statistical data analysis methods, including mean values, mode values, standard deviation, one-way analysis of variance (ANOVA), and Pearson’s correlation analysis, the study interprets and extracts meaningful insights from the gathered data. Initial analyses challenge conventional notions, revealing that information distortion positively influences the definition of information quality, disrupting the established perception of distorted information as inherently low-quality. Further exploration through correlation analysis unveils the varied perspectives of different stakeholder tiers on the impact of information distortion on specific information quality dimensions. For instance, Tier 2 suppliers demonstrate strong positive correlations between information distortion and dimensions like access security, accuracy, interpretability, and timeliness. Conversely, Tier 1 suppliers emphasise strong negative influences on the security of accessing information and negligible impact on information timeliness. Tier 0.5 suppliers showcase very strong positive correlations with dimensions like conciseness and completeness, while OEMs exhibit limited interest in considering information distortion within the supply chain. Introducing social network analysis (SNA) provides a structural understanding of the relationships between information distortion and quality dimensions. The moderately high density of ‘information distortion-by-information quality’ underscores the interconnected nature of these factors. In conclusion, this study offers a nuanced exploration of information quality dimensions in the UK aerospace supply chain, highlighting the significance of individual perspectives across different tiers. The positive influence of information distortion challenges prevailing assumptions, fostering a more nuanced understanding of information's role in the Industry 4.0 landscape.Keywords: information distortion, information quality, supply chain configuration, UK aerospace industry
Procedia PDF Downloads 641999 Multi Cloud Storage Systems for Resource Constrained Mobile Devices: Comparison and Analysis
Authors: Rajeev Kumar Bedi, Jaswinder Singh, Sunil Kumar Gupta
Abstract:
Cloud storage is a model of online data storage where data is stored in virtualized pool of servers hosted by third parties (CSPs) and located in different geographical locations. Cloud storage revolutionized the way how users access their data online anywhere, anytime and using any device as a tablet, mobile, laptop, etc. A lot of issues as vendor lock-in, frequent service outage, data loss and performance related issues exist in single cloud storage systems. So to evade these issues, the concept of multi cloud storage introduced. There are a lot of multi cloud storage systems exists in the market for mobile devices. In this article, we are providing comparison of four multi cloud storage systems for mobile devices Otixo, Unclouded, Cloud Fuze, and Clouds and evaluate their performance on the basis of CPU usage, battery consumption, time consumption and data usage parameters on three mobile phones Nexus 5, Moto G and Nexus 7 tablet and using Wi-Fi network. Finally, open research challenges and future scope are discussed.Keywords: cloud storage, multi cloud storage, vendor lock-in, mobile devices, mobile cloud computing
Procedia PDF Downloads 4071998 Food Security Indicators in Deltaic and Coastal Research: A Scoping Review
Authors: Sylvia Szabo, Thilini Navaratne, Indrajit Pal, Seree Park
Abstract:
Deltaic and coastal regions are often strategically important both from local and regional perspectives. While deltas are known to be bread baskets of the world, delta inhabitants often face the risk of food and nutritional insecurity. These risks are highly exacerbated by the impacts of climate and environmental change. While numerous regional studies examined the prevalence and the determinants of food security in specific delta and coastal regions, there is still a lack of a systematic analysis of the most widely used scientific food security indicators. In order to fill this gap, a systematic review was carried out using Covidence, a Cochrane-adopted systematic review processing software. Papers included in the review were selected from the SCOPUS, Thomson Reuters Web of Science, Science Direct, ProQuest, and Google Scholar databases. Both scientific papers and grey literature (e.g., reports by international organizations) were considered. The results were analyzed by food security components (access, availability, quality, and strategy) and by world regions. Suggestions for further food security, nutrition, and health research, as well as policy-related implications, are also discussed.Keywords: delta regions, coastal, food security, indicators, systematic review
Procedia PDF Downloads 2391997 Debt Portfolios of the Poor: The Case of Street Vendors in Cali, Colombia
Authors: Lina Martinez, Juan David Rivera Acevedo, Isabella Franco
Abstract:
The informal economy plays a significant role in the job market in Colombia. Cali, the third largest city in the country, is characterized by a high percentage of socially and economically vulnerable population groups who take part in the urban informal economy, with street vending as their primary source of income. This paper studies the socio-economic dimensions of street vendors in Cali. In particular, it examines why they are unable to capitalize on their comparatively high earnings and are not likely to escape poverty even though they usually profit from government welfare and tax evasion due to the non-regulated character of informality. The analysis of an observational study and two surveys with 637 and 300 participants show that street vending is a cash-based day-to-day activity. Since most of the street vendors do not have access to formal banking systems, they depend on payday loans with incomparably high interest rates which absorb a large share of their income and maintain a continuous indebtedness. This is one of the main reasons why they are unable to improve their living conditions. However, the daily cash flow masks the high opportunity cost of loans and long-term deficits.Keywords: Colombia, informal economy, payday loans, street vendors
Procedia PDF Downloads 3241996 The Effectiveness of Virtual Reality Training for Improving Interpersonal Communication Skills: An Experimental Study
Authors: Twinkle Sara Joseph
Abstract:
Virtual reality technology has emerged as a revolutionary power that can transform the education sector in many ways. VR environments can break the boundaries of the traditional classroom setting by immersing the students in realistic 3D environments where they can interact with virtual characters without fearing being judged. Communication skills are essential for every profession, and studies suggest the importance of implementing basic-level communication courses at both the school and graduate levels. Interpersonal communication is a skill that gains prominence as it is required in every profession. Traditional means of training have limitations for trainees as well as participants. The fear of being judged, the audience interaction, and other factors can affect the performance of a participant in a traditional classroom setting. Virtual reality offers a unique opportunity for its users to participate in training that does not set any boundaries that prevent the participants from performing in front of an audience. Specialised applications designed in VR headsets offer a range of training and exercises for participants without any time, space, or audience limitations. The present study aims at measuring the effectiveness of VR training in improving interpersonal communication skills among students. The study uses a mixed-method approach, in which a pre-and post-test will be designed to measure effectiveness. A preliminary selection process involving a questionnaire and a screening test will identify suitable candidates based on their current communication proficiency levels. Participants will undergo specialised training through the VR application Virtual Speech tailored for interpersonal communication and public speaking, designed to operate without the traditional constraints of time, space, or audience. The training's impact will subsequently be measured through situational exercises to engage the participants in interpersonal communication tasks, thereby assessing the improvement in their skills. The significance of this study lies in its potential to provide empirical evidence supporting VR technology's role in enhancing communication skills, thereby offering valuable insights for integrating VR-based methodologies into educational frameworks to prepare students more effectively for their professional futures.Keywords: virtual reality, VR training, interpersonal communication, communication skills, 3D environments
Procedia PDF Downloads 531995 Moodle-Based E-Learning Course Development for Medical Interpreters
Authors: Naoko Ono, Junko Kato
Abstract:
According to the Ministry of Justice, 9,044,000 foreigners visited Japan in 2010. The number of foreign residents in Japan was over 2,134,000 at the end of 2010. Further, medical tourism has emerged as a new area of business. Against this background, language barriers put the health of foreigners in Japan at risk, because they have difficulty in accessing health care and communicating with medical professionals. Medical interpreting training is urgently needed in response to language problems resulting from the rapid increase in the number of foreign workers in Japan over recent decades. Especially, there is a growing need in medical settings in Japan to speak international languages for communication, with Tokyo selected as the host city of the 2020 Summer Olympics. Due to the limited number of practical activities on medical interpreting, it is difficult for learners to acquire the interpreting skills. In order to eliminate the shortcoming, a web-based English-Japanese medical interpreting training system was developed. We conducted a literature review to identify learning contents, core competencies for medical interpreters by using Pubmed, PsycINFO, Cochrane Library, and Google Scholar. Selected papers were investigated to find core competencies in medical interpreting. Eleven papers were selected through literature review indicating core competencies for medical interpreters. Core competencies in medical interpreting abstracted from the literature review, showed consistency in previous research whilst the content of the programs varied in domestic and international training programs for medical interpreters. Results of the systematic review indicated five core competencies: (a) maintaining accuracy and completeness; (b) medical terminology and understanding the human body; (c) behaving ethically and making ethical decisions; (d) nonverbal communication skills; and (e) cross-cultural communication skills. We developed an e-leaning program for training medical interpreters. A Web-based Medical Interpreter Training Program which cover these competencies was developed. The program included the following : online word list (Quizlet), allowing student to study online and on their smartphones; self-study tool (Quizlet) for help with dictation and spelling; word quiz (Quizlet); test-generating system (Quizlet); Interactive body game (BBC);Online resource for understanding code of ethics in medical interpreting; Webinar about non-verbal communication; and Webinar about incompetent vs. competent cultural care. The design of a virtual environment allows the execution of complementary experimental exercises for learners of medical interpreting and introduction to theoretical background of medical interpreting. Since this system adopts a self-learning style, it might improve the time and lack of teaching material restrictions of the classroom method. In addition, as a teaching aid, virtual medical interpreting is a powerful resource for the understanding how actual medical interpreting can be carried out. The developed e-learning system allows remote access, enabling students to perform experiments at their own place, without being physically in the actual laboratory. The web-based virtual environment empowers students by granting them access to laboratories during their free time. A practical example will be presented in order to show capabilities of the system. The developed web-based training program for medical interpreters could bridge the gap between medical professionals and patients with limited English proficiency.Keywords: e-learning, language education, moodle, medical interpreting
Procedia PDF Downloads 3661994 The Breakthrough of Sexual Cinematic Freedom in Denmark in the 1960s and 1970s
Authors: Søren Birkvad
Abstract:
This paper traces the development of sexual cinematic freedom in the wake of an epoch-making event in Danish cultural history. As the first in the world, the Danes abolished all censorship for adults in 1969, making the tiny nation of Denmark the world’s largest exporter of pornography for several years. Drawing on the insights of social and cultural history and the focus point of the National Cinema direction of Cinema Studies, this study focuses on Danish film pornography in the 1960s and 1970s in its own right (e.g., its peculiar mix of sex, popular comedy and certain ‘feminist’ agendas). More importantly, however, it covers a broader pattern, namely the culturally deep-rooted tradition of freedom of speech and sexual liberalism in Denmark. Thus, the key concept of frisind (“free mind”) in Danish cultural history took on an increasingly partisan application in the 1960s and 1970s. It became a designation for all-is-permitted hippie excess but was also embraced by dissenting movements on the left, such as feminism, which questioned whether a free mind necessarily meant free love. In all of this, Danish cinema from the 1960s and 1970s offers a remarkable source of historical insight, simultaneously reminding us of a number of acute issues of contemporary society. These issues include gendered ideas of sexuality and freedom then and now and the equivalent clash of cultures between a liberal commercial industry and the accelerating political demands of the “sexual revolution.” Finally, these issues include certain tensions between, on the one hand, a purely materialistic idea of sexual freedom – incarnated by anything from pornography to many of the taboo-breaking youth films and avant-garde films in the wake of the 1968-rebellion – and, on the other hand, growing opposition to this anti-spiritual perception of human sexuality (represented by for instance the ‘closet conservatism’ of Danish art film star Lars von Trier of nowadays). All in all, this presentation offers a reflection on ideas of sexuality and gender rooted in a unique historical moment in cinematic history.Keywords: Danish film history, cultural history, film pornography, history of sexuality, national cinema, sexual liberalism
Procedia PDF Downloads 216