Search results for: social network tools
14562 The Effectiveness of Goldstein's Social Skillstreaming Model on Social Skills of Special Education Pre-Service Teachers
Authors: Ragea Alqahtani
Abstract:
The purpose of the study was to measure the effectiveness of the Goldstein’s social skill streaming model based on the special and general pre-service teachers’ knowledge about controlling their emotions in conflict situations. A review of previous pieces of literature guided the design and measurement of the effectiveness of the approach to the control of emotions. The teachers were assessed using the coping strategy, adult anger, and Goldstein’s skill streaming inventories. Lastly, the paper provides various recommendations on the sensitization of the Goldstein’s Social Skill streaming model to both the special and pre-service teachers to promote their knowledge about controlling emotions in conflicts.Keywords: emotional control, Goldstein social skill streaming model, modeling technique, self- as-a-model, self-efficacy, self-regulation
Procedia PDF Downloads 2014561 Application of Lean Six Sigma Tools to Minimize Time and Cost in Furniture Packaging
Authors: Suleiman Obeidat, Nabeel Mandahawi
Abstract:
In this work, the packaging process for a move is improved. The customers of this move need their household stuff to be moved from their current house to the new one with minimum damage, in an organized manner, on time and with the minimum cost. Our goal was to improve the process between 10% and 20% time efficiency, 90% reduction in damaged parts and an acceptable improvement in the cost of the total move process. The expected ROI was 833%. Many improvement techniques have been used in terms of the way the boxes are prepared, their preparation cost, packing the goods, labeling them and moving them to a place for moving out. DMAIC technique is used in this work: SIPOC diagram, value stream map of “As Is” process, Root Cause Analysis, Maps of “Future State” and “Ideal State” and an Improvement Plan. A value of ROI=624% is obtained which is lower than the expected value of 833%. The work explains the techniques of improvement and the deficiencies in the old process.Keywords: packaging, lean tools, six sigma, DMAIC methodology, SIPOC
Procedia PDF Downloads 42814560 Importance of Location Selection of an Energy Storage System in a Smart Grid
Authors: Vanaja Rao
Abstract:
In the recent times, the need for the integration of Renewable Energy Sources (RES) in a Smart Grid is on the rise. As a result of this, associated energy storage systems are known to play important roles in sustaining the efficient operation of such RES like wind power and solar power. This paper investigates the importance of location selection of Energy Storage Systems (ESSs) in a Smart Grid. Three scenarios of ESS location is studied and analyzed in a Smart Grid, which are – 1. Near the generation/source, 2. In the middle of the Grid and, 3. Near the demand/consumption. This is explained with the aim of assisting any Distribution Network Operator (DNO) in deploying the ESSs in a power network, which will significantly help reduce the costs and time of planning and avoid any damages incurred as a result of installing them at an incorrect location of a Smart Grid. To do this, the outlined scenarios mentioned above are modelled and analyzed with the National Grid’s datasets of energy generation and consumption in the UK power network. As a result, the outcome of this analysis aims to provide a better overview for the location selection of the ESSs in a Smart Grid. This ensures power system stability and security along with the optimum usage of the ESSs.Keywords: distribution networks, energy storage system, energy security, location planning, power stability, smart grid
Procedia PDF Downloads 29914559 Enhancing Knowledge Graph Convolutional Networks with Structural Adaptive Receptive Fields for Improved Node Representation and Information Aggregation
Authors: Zheng Zhihao
Abstract:
Recently, Knowledge Graph Framework Network (KGCN) has developed powerful capabilities in knowledge representation and reasoning tasks. However, traditional KGCN often uses a fixed weight mechanism when aggregating information, failing to make full use of rich structural information, resulting in a certain expression ability of node representation, and easily causing over-smoothing problems. In order to solve these challenges, the paper proposes an new graph neural network model called KGCN-STAR (Knowledge Graph Convolutional Network with Structural Adaptive Receptive Fields). This model dynamically adjusts the perception of each node by introducing a structural adaptive receptive field. wild range, and a subgraph aggregator is designed to capture local structural information more effectively. Experimental results show that KGCN-STAR shows significant performance improvement on multiple knowledge graph data sets, especially showing considerable capabilities in the task of representation learning of complex structures.Keywords: knowledge graph, graph neural networks, structural adaptive receptive fields, information aggregation
Procedia PDF Downloads 3314558 The Use of YouTube and Its Relation to Changing the Kuwaiti Children’s Social Values from Parents’ Perspectives: Field Study
Authors: Laila Alkhayat
Abstract:
In this study, the researcher explored the positive and negative effects of children watching YouTube on changing social values from the perspective of parents in Kuwait. This study also explored whether any correlation exists between changed values from watching YouTube and the following variables: relationship with a child, social situation, school level, gender, and age. The researcher collected data from 286 questionnaires distributed randomly to parents in Kuwait. The results of the study show that parents face many disadvantages when dealing with children watching YouTube, such as children spending too much time in front of screens, inability to organize bedtime, and children’s social isolation. However, the researcher found some positives come from watching YouTube, such as learning new information, enabling children to search for new information, and introducing children to the culture of their society and other cultures around them. Moreover, this study found that boys are more likely to have negative viewing habits than girls. Given the results, this study shows that the biggest impact on social values from children watching YouTube is that they are preoccupied with watching YouTube and they waste time, which makes them feel disturbed, and this affects the value of time management and delays children’s sleeping times. This study concludes that watching YouTube simultaneously has negative and positive effects on changing social values, but it plays a negative role in changing social values of children from the parents’ perspective.Keywords: YouTube, children, social value, social media effects
Procedia PDF Downloads 15714557 An Examination of Business Ethics and Corporate Social Responsibility: A Case Study of Zenith Bank PLC Jalingo
Authors: Abubakar Mohammed Bakoji
Abstract:
The paper examine business ethics through it pursuit for corporate social responsibility to the society in which the business long existed, Zenith bank PLC was selected as case study for it longer period of its business in the state, in order to achieve the research objective of the paper which sought the following: i. To examine relationship between business ethics and corporate social responsibility in Zenith bank PLC Jalingo; ii. To establish whether or not such ethics statement that acclaim corporate social responsibility are adhere to by the Zenith bank PLC Jalingo; iii. To determine the benefit drive by the society on the corporate social responsibility of Zenith bank PLC Jalingo to the people of the state of their operation. The research was conducted using qualitative research design approach, where convenience sampling technique was adopted using semi structured interview to one of the key staff of Zenith bank PLC Jalingo and five other beneficiaries of Zenith bank PLC corporate social responsibility projects served as respondents. The data obtained was analyze using content analysis and the result of the findings revealed that Zenith bank PLC has a Good business ethics and they adhere to the ethics, that they have completed several viable projects to the state as their corporate social responsibility and the beneficiaries and the respondents beneficiaries has confirmed and have produced evidence of how the projects has assisted in stifle their hardship. Hence, business ethics has a significant relationship with corporate social responsibility in Zenith bank PLC Jalingo.Keywords: business ethics, Corporate Social Responsibility, Zenith Bank PLC, business ethics
Procedia PDF Downloads 47914556 AI-based Radio Resource and Transmission Opportunity Allocation for 5G-V2X HetNets: NR and NR-U Networks
Authors: Farshad Zeinali, Sajedeh Norouzi, Nader Mokari, Eduard Jorswieck
Abstract:
The capacity of fifth-generation (5G) vehicle-to-everything (V2X) networks poses significant challenges. To ad- dress this challenge, this paper utilizes New Radio (NR) and New Radio Unlicensed (NR-U) networks to develop a heterogeneous vehicular network (HetNet). We propose a new framework, named joint BS assignment and resource allocation (JBSRA) for mobile V2X users and also consider coexistence schemes based on flexible duty cycle (DC) mechanism for unlicensed bands. Our objective is to maximize the average throughput of vehicles while guaranteeing the WiFi users' throughput. In simulations based on deep reinforcement learning (DRL) algorithms such as deep deterministic policy gradient (DDPG) and deep Q network (DQN), our proposed framework outperforms existing solutions that rely on fixed DC or schemes without consideration of unlicensed bands.Keywords: vehicle-to-everything (V2X), resource allocation, BS assignment, new radio (NR), new radio unlicensed (NR-U), coexistence NR-U and WiFi, deep deterministic policy gradient (DDPG), deep Q-network (DQN), joint BS assignment and resource allocation (JBSRA), duty cycle mechanism
Procedia PDF Downloads 10314555 Investigating the Neural Heterogeneity of Developmental Dyscalculia
Authors: Fengjuan Wang, Azilawati Jamaludin
Abstract:
Developmental Dyscalculia (DD) is defined as a particular learning difficulty with continuous challenges in learning requisite math skills that cannot be explained by intellectual disability or educational deprivation. Recent studies have increasingly recognized that DD is a heterogeneous, instead of monolithic, learning disorder with not only cognitive and behavioral deficits but so too neural dysfunction. In recent years, neuroimaging studies employed group comparison to explore the neural underpinnings of DD, which contradicted the heterogenous nature of DD and may obfuscate critical individual differences. This research aimed to investigate the neural heterogeneity of DD using case studies with functional near-infrared spectroscopy (fNIRS). A total of 54 aged 6-7 years old of children participated in this study, comprising two comprehensive cognitive assessments, an 8-minute resting state, and an 8-minute one-digit addition task. Nine children met the criteria of DD and scored at or below 85 (i.e., the 16th percentile) on the Mathematics or Math Fluency subtest of the Wechsler Individual Achievement Test, Third Edition (WIAT-III) (both subtest scores were 90 and below). The remaining 45 children formed the typically developing (TD) group. Resting-state data and brain activation in the inferior frontal gyrus (IFG), superior frontal gyrus (SFG), and intraparietal sulcus (IPS) were collected for comparison between each case and the TD group. Graph theory was used to analyze the brain network under the resting state. This theory represents the brain network as a set of nodes--brain regions—and edges—pairwise interactions across areas to reveal the architectural organizations of the nervous network. Next, a single-case methodology developed by Crawford et al. in 2010 was used to compare each case’s brain network indicators and brain activation against 45 TD children’s average data. Results showed that three out of the nine DD children displayed significant deviation from TD children’s brain indicators. Case 1 had inefficient nodal network properties. Case 2 showed inefficient brain network properties and weaker activation in the IFG and IPS areas. Case 3 displayed inefficient brain network properties with no differences in activation patterns. As a rise above, the present study was able to distill differences in architectural organizations and brain activation of DD vis-à-vis TD children using fNIRS and single-case methodology. Although DD is regarded as a heterogeneous learning difficulty, it is noted that all three cases showed lower nodal efficiency in the brain network, which may be one of the neural sources of DD. Importantly, although the current “brain norm” established for the 45 children is tentative, the results from this study provide insights not only for future work in “developmental brain norm” with reliable brain indicators but so too the viability of single-case methodology, which could be used to detect differential brain indicators of DD children for early detection and interventions.Keywords: brain activation, brain network, case study, developmental dyscalculia, functional near-infrared spectroscopy, graph theory, neural heterogeneity
Procedia PDF Downloads 5314554 Analysis of Performance Improvement Factors in Supply Chain Manufacturing Using Analytic Network Process and Kaizen
Authors: Juliza Hidayati, Yesie M. Sinuhaji, Sawarni Hasibuan
Abstract:
A company producing drinking water through many incompatibility issues that affect supply chain performance. The study was conducted to determine the factors that affect the performance of the supply chain and improve it. To obtain the dominant factors affecting the performance of the supply chain used Analytic Network Process, while to improve performance is done by using Kaizen. Factors affecting the performance of the supply chain to be a reference to identify the cause of the non-conformance. Results weighting using ANP indicates that the dominant factor affecting the level of performance is the precision of the number of shipments (15%), the ability of the fulfillment of the booking amount (12%), and the number of rejected products when signing (12%). Incompatibility of the factors that affect the performance of the supply chain are identified, so that found the root cause of the problem is most dominant. Based on the weight of Risk Priority Number (RPN) gained the most dominant root cause of the problem, namely the poorly maintained engine, the engine worked for three shifts, machine parts that are not contained in the plant. Improvements then performed using the Kaizen method of systematic and sustainable.Keywords: analytic network process, booking amount, risk priority number, supply chain performance
Procedia PDF Downloads 29414553 Quality-Of-Service-Aware Green Bandwidth Allocation in Ethernet Passive Optical Network
Authors: Tzu-Yang Lin, Chuan-Ching Sue
Abstract:
Sleep mechanisms are commonly used to ensure the energy efficiency of each optical network unit (ONU) that concerns a single class delay constraint in the Ethernet Passive Optical Network (EPON). How long the ONUs can sleep without violating the delay constraint has become a research problem. Particularly, we can derive an analytical model to determine the optimal sleep time of ONUs in every cycle without violating the maximum class delay constraint. The bandwidth allocation considering such optimal sleep time is called Green Bandwidth Allocation (GBA). Although the GBA mechanism guarantees that the different class delay constraints do not violate the maximum class delay constraint, packets with a more relaxed delay constraint will be treated as those with the most stringent delay constraint and may be sent early. This means that the ONU will waste energy in active mode to send packets in advance which did not need to be sent at the current time. Accordingly, we proposed a QoS-aware GBA using a novel intra-ONU scheduling to control the packets to be sent according to their respective delay constraints, thereby enhancing energy efficiency without deteriorating delay performance. If packets are not explicitly classified but with different packet delay constraints, we can modify the intra-ONU scheduling to classify packets according to their packet delay constraints rather than their classes. Moreover, we propose the switchable ONU architecture in which the ONU can switch the architecture according to the sleep time length, thus improving energy efficiency in the QoS-aware GBA. The simulation results show that the QoS-aware GBA ensures that packets in different classes or with different delay constraints do not violate their respective delay constraints and consume less power than the original GBA.Keywords: Passive Optical Networks, PONs, Optical Network Unit, ONU, energy efficiency, delay constraint
Procedia PDF Downloads 28414552 An Event Relationship Extraction Method Incorporating Deep Feedback Recurrent Neural Network and Bidirectional Long Short-Term Memory
Authors: Yin Yuanling
Abstract:
A Deep Feedback Recurrent Neural Network (DFRNN) and Bidirectional Long Short-Term Memory (BiLSTM) are designed to address the problem of low accuracy of traditional relationship extraction models. This method combines a deep feedback-based recurrent neural network (DFRNN) with a bi-directional long short-term memory (BiLSTM) approach. The method combines DFRNN, which extracts local features of text based on deep feedback recurrent mechanism, BiLSTM, which better extracts global features of text, and Self-Attention, which extracts semantic information. Experiments show that the method achieves an F1 value of 76.69% on the CEC dataset, which is 0.0652 better than the BiLSTM+Self-ATT model, thus optimizing the performance of the deep learning method in the event relationship extraction task.Keywords: event relations, deep learning, DFRNN models, bi-directional long and short-term memory networks
Procedia PDF Downloads 14414551 A Study of Predicting Judgments on Causes of Online Privacy Invasions: Based on U.S Judicial Cases
Authors: Minjung Park, Sangmi Chai, Myoung Jun Lee
Abstract:
Since there are growing concerns on online privacy, enterprises could involve various personal privacy infringements cases resulting legal causations. For companies that are involving online business, it is important for them to pay extra attentions to protect users’ privacy. If firms can aware consequences from possible online privacy invasion cases, they can more actively prevent future online privacy infringements. This study attempts to predict the probability of ruling types caused by various invasion cases under U.S Personal Privacy Act. More specifically, this research explores online privacy invasion cases which was sentenced guilty to identify types of criminal punishments such as penalty, imprisonment, probation as well as compensation in civil cases. Based on the 853 U.S judicial cases ranged from January, 2000 to May, 2016, which related on data privacy, this research examines the relationship between personal information infringements cases and adjudications. Upon analysis results of 41,724 words extracted from 853 regal cases, this study examined online users’ privacy invasion cases to predict the probability of conviction for a firm as an offender in both of criminal and civil law. This research specifically examines that a cause of privacy infringements and a judgment type, whether it leads a civil or criminal liability, from U.S court. This study applies network text analysis (NTA) for data analysis, which is regarded as a useful method to discover embedded social trends within texts. According to our research results, certain online privacy infringement cases caused by online spamming and adware have a high possibility that firms are liable in the case. Our research results provide meaningful insights to academia as well as industry. First, our study is providing a new insight by applying Big Data analytics to legal cases so that it can predict the cause of invasions and legal consequences. Since there are few researches applying big data analytics in the domain of law, specifically in online privacy, this study suggests new area that future studies can explore. Secondly, this study reflects social influences, such as a development of privacy invasion technologies and changes of users’ level of awareness of online privacy on judicial cases analysis by adopting NTA method. Our research results indicate that firms need to improve technical and managerial systems to protect users’ online privacy to avoid negative legal consequences.Keywords: network text analysis, online privacy invasions, personal information infringements, predicting judgements
Procedia PDF Downloads 22914550 Effects of Lung Protection Ventilation Strategies on Postoperative Pulmonary Complications After Noncardiac Surgery: A Network Meta-Analysis of Randomized Controlled Trials
Abstract:
Background: Mechanical ventilation has been confirmed to increase the incidence of postoperative pulmonary complications (PPCs), and several studies have shown that low tidal volumes combined with positive end-expiratory pressure (PEEP) and recruitment manoeuvres (RM) reduce the incidence of PPCs. However, the optimal lung-protective ventilatory strategy remains unclear. Methods: Multiple databases were searched for randomized controlled trials (RCTs) published prior to October 2023. The association between individual PEEP (iPEEP) or other forms of lung-protective ventilation and the incidence of PPCs was evaluated by Bayesian network meta-analysis. Results: We included 58 studies (11610 patients) in this meta-analysis. The network meta-analysis showed that low ventilation (LVt) combined with iPEEP and RM was associated with significantly lower incidences of PPCs [HVt: OR=0.38 95CrI (0.19, 0.75), LVt: OR=0.33, 95% CrI (0.12, 0.82)], postoperative atelectasis, and pneumonia than was HVt or LVt. In abdominal surgery, LVT combined with iPEEP or medium-to-high PEEP and RM were associated with significantly lower incidences of PPCs, postoperative atelectasis, and pneumonia. LVt combined with iPEEP and RM was ranked the highest, which was based on SUCRA scores. Conclusion: LVt combined with iPEEP and RM decreased the incidences of PPCs, postoperative atelectasis, and pneumonia in noncardiac surgery patients. iPEEP-guided ventilation was the optimal lung protection ventilation strategy. The quality of evidence was moderate.Keywords: protection ventilation strategies, postoperative pulmonary complications, network meta-analysis, noncardiac surgery
Procedia PDF Downloads 3514549 Knowledge Management in the Tourism Industry in Project Management Paradigm
Authors: Olga A. Burukina
Abstract:
Tourism is a complex socio-economic phenomenon, partly regulated by national tourism industries. The sustainable development of tourism in a region, country or in tourist destination depends on a number of factors (political, economic, social, cultural, legal and technological), the understanding and correct interpretation of which is invariably anthropocentric. It is logical that for the successful functioning of a tour operating company, it is necessary to ensure its sustainable development. Sustainable tourism is defined as tourism that fully considers its current and future economic, social and environmental impacts, taking into account the needs of the industry, the environment and the host communities. For the business enterprise, sustainable development is defined as adopting business strategies and activities that meet the needs of the enterprise and its stakeholders today while protecting, sustaining and enhancing the human and natural resources that will be needed in the future. In addition to a systemic approach to the analysis of tourist destinations, each tourism project can and should be considered as a system characterized by a very high degree of variability, since each particular case of its implementation differs from the previous and subsequent ones, sometimes in a cardinal way. At the same time, it is important to understand that this variability is predominantly of anthropogenic nature (except for force majeure situations that are considered separately and afterwards). Knowledge management is the process of creating, sharing, using and managing the knowledge and information of an organization. It refers to a multidisciplinary approach to achieve organisational objectives by making the best use of knowledge. Knowledge management is seen as a key systems component that allows obtaining, storing, transferring, and maintaining information and knowledge in particular, in a long-term perspective. The study aims, firstly, to identify (1) the dynamic changes in the Italian travel industry in the last 5 years before the COVID19 pandemic, which can be considered the scope of force majeure circumstances, (2) the impact of the pandemic on the industry and (3) efforts required to restore it, and secondly, how project management tools can help to improve knowledge management in tour operating companies to maintain their sustainability, diminish potential risks and restore their pre-pandemic performance level as soon as possible. The pilot research is based upon a systems approach and has employed a pilot survey, semi-structured interviews, prior research analysis (aka literature review), comparative analysis, cross-case analysis, and modelling. The results obtained are very encouraging: PM tools can improve knowledge management in tour operating companies and secure the more sustainable development of the Italian tourism industry based on proper knowledge management and risk management.Keywords: knowledge management, project management, sustainable development, tourism industr
Procedia PDF Downloads 15514548 The Role of Social Parameters in the Choice of Address Forms Used in Kinship Domain in Punjab, Pakistan
Authors: Ana Ramsha, Samrah Hidayat
Abstract:
This study examines the role of social parameters in the choice of address forms used in kinship domain in Punjab, Pakistan. The study targeted 140 respondents in order to test the impact of social factors along with the regional differences in the choices of address forms in kinship domain. Statistical analyses are done by applying t-test for gender in relation to choices of address forms and ANOVA for age, income, education and social class. The study finds out that there is a strong connection of different social parameters not only with language use and practice but also in choices and use of address forms, especially in kinship relationships. Moreover, it is highlighted that gender does not influence in the choices of address forms, even the participants belonging to young and middle categories show no significant difference with regard to the choices of address form despite the fact that all the factors and parameters exert influence on the choices of address forms. Hence address forms as being one of the major traits of language and society is affected by all the social factors around and regional differences are also most important as they give identity and ethnicity to the society.Keywords: address forms, kinship, social parameters, linguistics
Procedia PDF Downloads 13314547 Exploring Affordable Care Practs in Nigeria’s Health Insurance Discourse
Authors: Emmanuel Chinaguh, Kehinde Adeosun
Abstract:
Nigerians die untimely, with 55.75 years of life expectancy, which is 17.45 below the world average of 73.2 (Worldometer, 2020). This is due, among other factors, to the country's limited access to high-quality healthcare. To increase access to good and affordable healthcare services, the National Health Insurance Authority (NHIA) Bill 2022 – which repealed the National Health Insurance Scheme Act 2004 – was passed into law. Applying Jacob Mey’s (2001) pragmatics act (pract) theory, this study explores how NHIA seeks to actualise these healthcare goals by characterising the general situational prototype or pragmemes and pragmatic acts in institutional communications. Data was sourced from the NHIA operational guidelines, which has 147 pages and four sections, and shared posters on NHIA Nigeria Twitter Handle with 14,200 followers. Digital humanities tools, like AntConc and Voyant, were engaged in the data analysis for text encoding and data visualisation. This study identifies these discourse tokens in the data: advertisement and programmes, standards and accreditation, records and information, and offences and penalties. Advertisement and programmes pract facilitating, propagating, prospecting, advising and informing; standards and accreditation, and records and information pract stating, informing and instructing; and offences and penalties pract stating and sanctioning. These practs combined to advance the goals of affordable care and universal accessibility to quality healthcare services. The pragmatic acts were marked by these pragmatic tools: shared situational knowledge (SSK), relevance (REL), reference (REF) and inference (INF). This paper adds to the understanding of health insurance discourse in Nigeria as a mediated social practice that promotes the health of Nigerians.Keywords: affordable care, NHIA, Nigeria’s health insurance discourse, pragmatic acts.
Procedia PDF Downloads 8514546 Assessing the Competence of Oral Surgery Trainees: A Systematic Review
Authors: Chana Pavneet
Abstract:
Background: In more recent years in dentistry, a greater emphasis has been placed on competency-based education (CBE) programmes. Undergraduate and postgraduate curriculums have been reformed to reflect these changes, and adopting a CBE approach has shown to be beneficial to trainees and places an emphasis on continuous lifelong learning. The literature is vast; however, very little work has been done specifically to the assessment of competence in dentistry and even less so in oral surgery. The majority of the literature tends to opinion pieces. Some small-scale studies have been undertaken in this area researching assessment tools which can be used to assess competence in oral surgery. However, there is a lack of general consensus on the preferable assessment methods. The aim of this review is to identify the assessment methods available and their usefulness. Methods: Electronic databases (Medline, Embase, and the Cochrane Database of systematic reviews) were searched. PRISMA guidelines were followed to identify relevant papers. Abstracts of studies were reviewed, and if they met the inclusion criteria, they were included in the review. Papers were reviewed against the critical appraisal skills programme (CASP) checklist and medical education research quality instrument (MERQSI) to assess their quality and identify any bias in a systematic manner. The validity and reliability of each assessment method or tool were assessed. Results: A number of assessment methods were identified, including self-assessment, peer assessment, and direct observation of skills by someone senior. Senior assessment tended to be the preferred method, followed by self-assessment and, finally, peer assessment. The level of training was shown to affect the preferred assessment method, with one study finding peer assessment more useful in postgraduate trainees as opposed to undergraduate trainees. Numerous tools for assessment were identified, including a checklist scale and a global rating scale. Both had their strengths and weaknesses, but the evidence was more favourable for global rating scales in terms of reliability, applicability to more clinical situations, and easier to use for examiners. Studies also looked into trainees’ opinions on assessment tools. Logbooks were not found to be significant in measuring the competence of trainees. Conclusion: There is limited literature exploring the methods and tools which assess the competence of oral surgery trainees. Current evidence shows that the most favourable assessment method and tool may differ depending on the stage of training. More research is required in this area to streamline assessment methods and tools.Keywords: competence, oral surgery, assessment, trainees, education
Procedia PDF Downloads 13414545 The Role of Cognitive Control and Social Camouflage Associated with Social Anxiety Autism Spectrum Conditions
Authors: Siqing Guan, Fumiyo Oshima, Eiji Shimizu, Nozomi Tomita, Toru Takahashi, Hiroaki Kumano
Abstract:
Risk factors for social anxiety in autism spectrum conditions involve executive attention, emotion regulation, and thought regulation as processes of cognitive dysregulation. Social camouflaging behaviors as strategies used to mask and/or compensate for autism characteristics during social interactions in autism spectrum conditions have also been emphasized. However, the role of cognitive dysregulation and social camouflaging related to social anxiety in autism spectrum conditions has not been clarified. Whether these factors are specific to social anxiety in autism spectrum conditions or common to social anxiety independent of autism spectrum conditions needs to be clarified. Here, we explored risk factors specific to social anxiety in autism spectrum conditions and general risk factors for social anxiety independent of autism spectrum conditions. From the Japanese participants in early adulthood (age=18~39) of the online survey in Japan, those who exceeded the Japanese version Autism-Spectrum Quotient cutoff (33 points or more )were divided into the autism spectrum conditions group (ASC; N=255, mean age=32.08, SD age=5.16)and those who did not exceed the cutoff were divided into the non-autism spectrum conditions group (Non-ASC; N=255, mean age=31.70, SD age=5.09). Using the Japanese versions of the Social Phobia Scale, the Social Interaction Anxiety Scale, and the Short Fear of Negative Evaluation Scale, a composite score for social anxiety was calculated using a method of principal. We also measured emotional control difficulties using the Difficulties in Emotion Regulation Scale, executive attention using the Effortful Control Scale for Adults, rumination using the Rumination-Reflection Questionnaire, and worry using the Penn State Worry Questionnaire. This study was passed through the review of the Ethics Committee. No conflicts of interest. Multiple regression analysis with forced entry method was used to predict social anxiety in the ASC and non-ASC groups separately, based on executive attention, emotion dysregulation, worry, rumination, and social camouflage. In the ASC group, emotion dysregulation (β=.277, p<.001), worry (β=.162, p<.05), assimilation (β=.308, p<.001) and masking (β=.275, p<.001) were significant predictors of social anxiety (F (7,247) = 45.791, p <.001, R2=.565). In the non-ASC groups,emotion dysregulation (β=.171, p<.05), worry (β=.344,p <.001), assimilation (β=.366,p <.001) and executive attention (β=-.132,p <.05) were significant predictors of social anxiety (F (7,207) =47.333, p <.001, R2=.615).The findings suggest that masking was shown to be a risk factor for social anxiety specific to autism spectrum conditions, while emotion dysregulation, worry, and assimilation were shown to be common risk factors for social anxiety, regardless of autism spectrum conditions. In addition, executive attention is a risk factor for social anxiety without autism spectrum conditions.Keywords: autism spectrum, cognitive control, social anxiety, social camouflaging
Procedia PDF Downloads 20814544 The Tourism in the Regional Development of South Caucasus
Authors: Giorgi Sulashvili, Vladimer Kekenadze, Olga Khutsishvili, Bela Khotenashvili, Tsiuri Phkhakadze, Besarion Tsikhelashvili
Abstract:
The article dealt with the South Caucasus is a complex economic policy, which consists of strands: The process of deepening economic integration in the South Caucasus region; deepening economic integration with the EU in the framework of "Neighbourhood policy with Europe" and in line with the Maastricht criteria; the development of bilateral trade and economic relations with many countries of the world community; the development of sufficient conditions for the integration of the South Caucasus region in the world to enter the market. According to the author, to determine the place of Georgia in the regional policy of the South Caucasus, it is necessary to consider two views about Georgia: The first is the view of Georgia, as a part of global economic and political processes and the second look at Georgia, as a country located in the geo-economic and geopolitical space of the South Caucasus. Such approaches reveal the place of Georgia in two dimensions; in the global and regional economies. In the countries of South Caucasus, the tourism has been developing fast and has a great social and economic importance. Tourism influences deeply on the social and economic growth of the regions of the country. Tourism development formulates thousand new jobs, fixes the positions of small and middle businesses, ensures the development of the education and culture of the population. In the countries of South Caucasus, the Tourist Industry can be specified as the intersectoral complex, which consists of travel transport and it’s technical service network, tourist enterprises which are specialized in various types, wide network services. Tourists have a chance to enjoy all of these services. At the transitional stage of shifting to the market economy, tourism is among the priorities in the development of the national economy of our country. It is true that the Georgian tourism faces a range of problems at present, but its recognition and the necessity for its development may be considered as a fact. Besides, we would underline that the revitalization of the Georgian tourism is not only the question of time. This area can bring a lot of benefits as to private firms, as to specific countries. It also has many negative effects were conducted fundamental research and studies to consider both, positive and negative impacts of tourism. In the future such decisions will be taken that will bring, the maximum benefit at minimum cost, in order for tourism to take its place in Georgia it is necessary to understand the role of the tourism sector in the economic structure.Keywords: transitional stage, national economy, Georgian tourism, positive and negative impacts
Procedia PDF Downloads 39714543 Design and Implement a Remote Control Robot Controlled by Zigbee Wireless Network
Authors: Sinan Alsaadi, Mustafa Merdan
Abstract:
Communication and access systems can be made with many methods in today’s world. These systems are such standards as Wifi, Wimax, Bluetooth, GPS and GPRS. Devices which use these standards also use system resources excessively in direct proportion to their transmission speed. However, large-scale data communication is not always needed. In such cases, a technology which will use system resources as little as possible and support smart network topologies has been needed in order to enable the transmissions of such small packet data and provide the control for this kind of devices. IEEE issued 802.15.4 standard upon this necessity and enabled the production of Zigbee protocol which takes these standards as its basis and devices which support this protocol. In our project, this communication protocol was preferred. The aim of this study is to provide the immediate data transmission of our robot from the field within the scope of the project. In addition, making the communication with the robot through Zigbee Protocol has also been aimed. While sitting on the computer, obtaining the desired data from the region where the robot is located has been taken as the basis. Arduino Uno R3 microcontroller which provides the control mechanism, 1298 shield as the motor driver.Keywords: ZigBee, wireless network, remote monitoring, smart home, agricultural industry
Procedia PDF Downloads 27814542 Fault Diagnosis in Confined Systems
Authors: Nesrine Berber, Hafid Haffaf, Abdel Madjid Meghabar
Abstract:
In the last decade, technology has continued to grow and has changed the structure of our society. Today, new technologies including the information and communication (ICT) play a main role which importance continues to grow, now it's become indispensable to the economic, social and cultural. Thus, ICT technology has proven to be as a promising intervention in the area of road transport. The supervision model of class of train of intelligent and autonomous vehicles leads us to give some defintions about IAV and the different technologies used for communication between them. Our aim in this work is to present an hypergraph modeling a class of train of Intelligent and Autonomous Vehicles (IAV).Keywords: intelligent transportation system, intelligent autonomous vehicles, Ad Hoc network, wireless technologies, hypergraph modeling, supervision
Procedia PDF Downloads 54614541 Analysis of the Internationalisation of Spanish Enterprises in Colombia through Cooperation Agreements
Authors: Sandoval H. Leyla Angélica, Casani Fernando
Abstract:
The objective of this study is to analyse how enterprises in developed countries use cooperation agreements to expand into developing countries. Starting from the literature review, seven theoretical prepositions were derived. The qualitative methodology used includes case study, through interviews conducted with eight enterprises from Spain and Colombia. Results show that the cooperation agreements have provided a quick and solid connection that facilitates internationalization, bearing in mind aspects such as: strategic factors, partners, network, technology, experience, communication methods, social benefit and the connection between these aspects and allied enterprises.Keywords: internationalisation, firms, cooperation agreement, case study, Spain, Colombia
Procedia PDF Downloads 55514540 Association of Social Data as a Tool to Support Government Decision Making
Authors: Diego Rodrigues, Marcelo Lisboa, Elismar Batista, Marcos Dias
Abstract:
Based on data on child labor, this work arises questions about how to understand and locate the factors that make up the child labor rates, and which properties are important to analyze these cases. Using data mining techniques to discover valid patterns on Brazilian social databases were evaluated data of child labor in the State of Tocantins (located north of Brazil with a territory of 277000 km2 and comprises 139 counties). This work aims to detect factors that are deterministic for the practice of child labor and their relationships with financial indicators, educational, regional and social, generating information that is not explicit in the government database, thus enabling better monitoring and updating policies for this purpose.Keywords: social data, government decision making, association of social data, data mining
Procedia PDF Downloads 36914539 Device Control Using Brain Computer Interface
Authors: P. Neeraj, Anurag Sharma, Harsukhpreet Singh
Abstract:
In current years, Brain-Computer Interface (BCI) scheme based on steady-state Visual Evoked Potential (SSVEP) have earned much consideration. This study tries to evolve an SSVEP based BCI scheme that can regulate any gadget mock-up in two unique positions ON and OFF. In this paper, two distinctive gleam frequencies in low-frequency part were utilized to evoke the SSVEPs and were shown on a Liquid Crystal Display (LCD) screen utilizing Lab View. Two stimuli shading, Yellow, and Blue were utilized to prepare the system in SSVEPs. The Electroencephalogram (EEG) signals recorded from the occipital part. Elements of the brain were separated by utilizing discrete wavelet Transform. A prominent system for multilayer system diverse Neural Network Algorithm (NNA), is utilized to characterize SSVEP signals. During training of the network with diverse calculation Regression plot results demonstrated that when Levenberg-Marquardt preparing calculation was utilized the exactness turns out to be 93.9%, which is superior to another training algorithm.Keywords: brain computer interface, electroencephalography, steady-state visual evoked potential, wavelet transform, neural network
Procedia PDF Downloads 33414538 Social Media and the Future of Veganism Influence on Gender Norms
Authors: Athena Johnson
Abstract:
Veganism has seen a rapid increase in members over recent years. Understanding the mechanisms of social change associated with these dietary practices in relation to gender is significant as these groups may seem small, but they have a large impact as they influence many and change the food market. This research article's basic methodology is primarily a deep article research literature review with empirical research. The research findings show that the popularity of veganism is growing, in large part due to the extensive use of social media, which dispels longstanding gendered connotations with food, such as the correlations between meat and masculinity.Keywords: diversity, gender roles, social media, veganism
Procedia PDF Downloads 11314537 Predicting Entrepreneurial Intentions among Undergraduates Using Theory of Planned Behaviour
Authors: Mohammed Abubakar Mawoli
Abstract:
Theory of Planned Behavior (TPB) is a useful tool for predicting entrepreneurial intentions among individuals or groups of people. In view of the Nigerian government’s renewed educational policies and programs to prepare Nigerian undergraduates towards self-reliance and employers of labor after graduation, it becomes pertinent to empirically examine and predict the undergraduate’s entrepreneurial intentions at graduation. Thus, this study primarily examines the undergraduates entrepreneurial intentions using TPB, which includes perceived desirability, perceived social norm, and perceived feasibility factors. In so doing, a questionnaire research method was adopted in which 219 copies of a questionnaire distributed to final year undergraduates were belonging to five departments with a total population of 487 students. A combination of relative frequency, mean standard deviation and multiple regression statistical tools were employed for data analysis. The study found that TPB components exert a significant composite effect on undergraduate’s entrepreneurial intentions. Based on individual contribution of the independent variables, Perceived Desirability is the strongest predictor of the undergraduate’s entrepreneurial intentions, while Perceived Social Norm is a strong predictor of the undergraduate’s entrepreneurial intentions. However, Perceived Feasibility is not a strong predictor of student’s entrepreneurial intentions. The study therefore, recommends that the Perceived desirability, which is formed and shaped by ones level of education and skills acquisition, be improved upon to create the expected positive impact on graduates entrepreneurial intentions and possible venture creation.Keywords: entrepreneurship, entrepreneurship education, entrepreneurial intentions, planned behaviour, prediction, Nigeria
Procedia PDF Downloads 29914536 Impacts of Electronic Dance Music towards Social Harmony: The Malaysian Perspective
Authors: Kok Meng Ng, Sulung Veronica
Abstract:
Electronic Dance Music (EDM), a musical event that so sought-after amongst the youth, is getting prevailed around the world. The emergence of this à la mode event has magnetized lots of attentions from the media as well as the public due to its high probabilities in creating social problems and menacing social harmony of one destination, for instance, two death cases occurred during the EDM events in Malaysia caused a feeling of consternation of the society. The arguments over the impacts of such events towards the society are endless. This paper focuses on the study of the impacts of EDM towards social harmony in Klang Valley area, Malaysia by scrutinizing the contradiction of statements from several experts and the local communities. This study sampled 15-20 people that represent different social background with face-to-face and online interview through snowball sampling method. This study helps to understand the social context as a whole based on the impacts of EDM events that take place in Malaysia. It also provides valuable information to EDMs’ organizer as well as local authorities for a proper event management to minimize EDM impacts towards society as part of the sustainable growth of the event industry.Keywords: electronic dance music, social harmony, impacts, Klang Valley
Procedia PDF Downloads 25614535 An MIPSSTWM-based Emergency Vehicle Routing Approach for Quick Response to Highway Incidents
Authors: Siliang Luan, Zhongtai Jiang
Abstract:
The risk of highway incidents is commonly recognized as a major concern for transportation authorities due to the hazardous consequences and negative influence. It is crucial to respond to these unpredictable events as soon as possible faced by emergency management decision makers. In this paper, we focus on path planning for emergency vehicles, one of the most significant processes to avoid congestion and reduce rescue time. A Mixed-Integer Linear Programming with Semi-Soft Time Windows Model (MIPSSTWM) is conducted to plan an optimal routing respectively considering the time consumption of arcs and nodes of the urban road network and the highway network, especially in developing countries with an enormous population. Here, the arcs indicate the road segments and the nodes include the intersections of the urban road network and the on-ramp and off-ramp of the highway networks. An attempt in this research has been made to develop a comprehensive and executive strategy for emergency vehicle routing in heavy traffic conditions. The proposed Cuckoo Search (CS) algorithm is designed by imitating obligate brood parasitic behaviors of cuckoos and Lévy Flights (LF) to solve this hard and combinatorial problem. Using a Chinese city as our case study, the numerical results demonstrate the approach we applied in this paper outperforms the previous method without considering the nodes of the road network for a real-world situation. Meanwhile, the accuracy and validity of the CS algorithm also show better performances than the traditional algorithm.Keywords: emergency vehicle, path planning, cs algorithm, urban traffic management and urban planning
Procedia PDF Downloads 8014534 A Survey of Skin Cancer Detection and Classification from Skin Lesion Images Using Deep Learning
Authors: Joseph George, Anne Kotteswara Roa
Abstract:
Skin disease is one of the most common and popular kinds of health issues faced by people nowadays. Skin cancer (SC) is one among them, and its detection relies on the skin biopsy outputs and the expertise of the doctors, but it consumes more time and some inaccurate results. At the early stage, skin cancer detection is a challenging task, and it easily spreads to the whole body and leads to an increase in the mortality rate. Skin cancer is curable when it is detected at an early stage. In order to classify correct and accurate skin cancer, the critical task is skin cancer identification and classification, and it is more based on the cancer disease features such as shape, size, color, symmetry and etc. More similar characteristics are present in many skin diseases; hence it makes it a challenging issue to select important features from a skin cancer dataset images. Hence, the skin cancer diagnostic accuracy is improved by requiring an automated skin cancer detection and classification framework; thereby, the human expert’s scarcity is handled. Recently, the deep learning techniques like Convolutional neural network (CNN), Deep belief neural network (DBN), Artificial neural network (ANN), Recurrent neural network (RNN), and Long and short term memory (LSTM) have been widely used for the identification and classification of skin cancers. This survey reviews different DL techniques for skin cancer identification and classification. The performance metrics such as precision, recall, accuracy, sensitivity, specificity, and F-measures are used to evaluate the effectiveness of SC identification using DL techniques. By using these DL techniques, the classification accuracy increases along with the mitigation of computational complexities and time consumption.Keywords: skin cancer, deep learning, performance measures, accuracy, datasets
Procedia PDF Downloads 12914533 Performance of Total Vector Error of an Estimated Phasor within Local Area Networks
Authors: Ahmed Abdolkhalig, Rastko Zivanovic
Abstract:
This paper evaluates the Total Vector Error of an estimated Phasor as define in IEEE C37.118 standard within different medium access in Local Area Networks (LAN). Three different LAN models (CSMA/CD, CSMA/AMP, and Switched Ethernet) are evaluated. The Total Vector Error of the estimated Phasor has been evaluated for the effect of Nodes Number under the standardized network Band-width values defined in IEC 61850-9-2 communication standard (i.e. 0.1, 1, and 10 Gbps).Keywords: phasor, local area network, total vector error, IEEE C37.118, IEC 61850
Procedia PDF Downloads 311