Search results for: network group behavior
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 18112

Search results for: network group behavior

17902 Determinants of Contraceptive Demand among Young Nulliparous Women in India: Evidence from National Family Health Survey-4

Authors: Bhawna Verma

Abstract:

Looking at the contraceptive use and unmet need specific to the different age groups would help to understand various determinants and characteristics of women from different age groups, which are often being neglected. The study explores contraceptive behavior, unmet need for family planning and its correlates among young nulliparous women aged 15-29, using data from NFHS-4 (2015-16), India. Method: The study utilized information from 26,924 currently married women, who has no child or who have had first terminated pregnancy and was aged 15-29 at the time of the survey. Chi-Square and logistic regression analysis have been used to assess the effects of socio-economic characteristics. Results: Of all the considered explanatory variables religion, caste, education, current age, age at marriage, media exposure and regional differences were found to be significantly affecting the behavior of contraceptive use. Women of the 25-29 age group are 0.6 percent less likely to have an unmet need than women of 12-19 age group. Unmet need is increasing with the increased level of education. Muslim women are 0.3 percent less likely to have an unmet need than women of Hindu category. Conclusion: Separate considerations must be given to the needs for family planning formation among nulliparous women along with the factors associated with the use and non-use of contraceptives among them. Separate considerations must be given for effective promotion of FP knowledge through print, electronic media, towards the unequal access to the contraceptives among nulliparous women. Marriages after legal minimum age and encouraging women for higher education may address existing socio-economic barriers.

Keywords: contraceptive use, unmet need, family planning, contraceptive behavior

Procedia PDF Downloads 111
17901 Human Action Recognition Using Wavelets of Derived Beta Distributions

Authors: Neziha Jaouedi, Noureddine Boujnah, Mohamed Salim Bouhlel

Abstract:

In the framework of human machine interaction systems enhancement, we focus throw this paper on human behavior analysis and action recognition. Human behavior is characterized by actions and reactions duality (movements, psychological modification, verbal and emotional expression). It’s worth noting that many information is hidden behind gesture, sudden motion points trajectories and speeds, many research works reconstructed an information retrieval issues. In our work we will focus on motion extraction, tracking and action recognition using wavelet network approaches. Our contribution uses an analysis of human subtraction by Gaussian Mixture Model (GMM) and body movement through trajectory models of motion constructed from kalman filter. These models allow to remove the noise using the extraction of the main motion features and constitute a stable base to identify the evolutions of human activity. Each modality is used to recognize a human action using wavelets of derived beta distributions approach. The proposed approach has been validated successfully on a subset of KTH and UCF sports database.

Keywords: feautures extraction, human action classifier, wavelet neural network, beta wavelet

Procedia PDF Downloads 406
17900 Congestion Control in Mobile Network by Prioritizing Handoff Calls

Authors: O. A. Lawal, O. A Ojesanmi

Abstract:

The demand for wireless cellular services continues to increase while the radio resources remain limited. Thus, network operators have to continuously manage the scarce radio resources in order to have an improved quality of service for mobile users. This paper proposes how to handle the problem of congestion in the mobile network by prioritizing handoff call, using the guard channel allocation scheme. The research uses specific threshold value for the time of allocation of the channel in the algorithm. The scheme would be simulated by generating various data for different traffics in the network as it would be in the real life. The result would be used to determine the probability of handoff call dropping and the probability of the new call blocking as a way of measuring the network performance.

Keywords: call block, channel, handoff, mobile cellular network

Procedia PDF Downloads 391
17899 Person Re-Identification using Siamese Convolutional Neural Network

Authors: Sello Mokwena, Monyepao Thabang

Abstract:

In this study, we propose a comprehensive approach to address the challenges in person re-identification models. By combining a centroid tracking algorithm with a Siamese convolutional neural network model, our method excels in detecting, tracking, and capturing robust person features across non-overlapping camera views. The algorithm efficiently identifies individuals in the camera network, while the neural network extracts fine-grained global features for precise cross-image comparisons. The approach's effectiveness is further accentuated by leveraging the camera network topology for guidance. Our empirical analysis on benchmark datasets highlights its competitive performance, particularly evident when background subtraction techniques are selectively applied, underscoring its potential in advancing person re-identification techniques.

Keywords: camera network, convolutional neural network topology, person tracking, person re-identification, siamese

Procedia PDF Downloads 68
17898 The Development of Group Counseling Program for Elderly's Caregivers by Base on Person-Centered Theory to Promoting for the Resilience Quotient in Elderly People

Authors: Jirapan Khruesarn, Wimwipa Boonklin

Abstract:

Background: Currently, Thailand has an aging population. In 2017, the elderly population was over 11.14 million. There will be an increase in the number of elderly people, 8.39 million, some people grumble to themselves and have conflicts with their offspring or those close to them. It is a source of stress. Mental health promotion should be given to the elderly in order to cope with these changes. Due to the family characteristics of Thai society, these family members will act as caregivers for the elderly. Therefore, a group-counseling program based on Personnel-Centered Theory for Elderly Caregivers in Mental Health Promotion for Older People in Na Kaeo Municipality, Kau Ka District, Lampang Province, has been developed to compare the elderly care behavior before and after the participation. Methods: This research was study for 20 elderly' caregiver: Those aimed to compare the before and after use of group program for caregiver to promoting for the elderly by the following methods: Step 1 Establish a framework for evaluating elderly care behaviors and develop a group counseling program for promote mental health for elderly on: 1) Body 2) Willpower 3) Social and community management and 4) Organizing learning process. Step 2 Assessing an Elderly Care Behaviors by using "The behavior assessment on caring for the elderly" and assessing the mental health power level of the elderly and follow the counseling program 9 times and compare of the elderly care behaviors before and after joined a group program, and compare of mental health level of caregiver attends a group program. Results: This study is developing a group counseling program to promoting for the resilience quotient in elderly people that the results of the study could be summarized as follows: 1) Before the elderly's caregivers join a group counseling program: Mental health promotion behaviors of the elderly were at the high level of (3.32), and after: were at the high level of (3.44). 2) Before the elderly's caregiver attends a group counseling program: the mental health level of the elderly the mean score was (47.85 percent), and the standard deviation was (0.21 percent) and after. The elderly had a higher score of (51.45 percent) In summary, after the elderly caregivers joined the group, the elderly are higher in all aspects promote mental health for elderly and the statistically significance at the 0.05, It shows that programs are fit for personal and community condition in promoting the mental health of the elderly because this theory has the idea that: Humans have the ability to use their intelligence to solve problems or make decisions effectively, And member of group counseling program have ventured and express grievances that the counselor is a facilitator who focuses on personal development by building relationships among people. In other words, the factors contributing to higher levels of elderly care behaviors is group counseling, that isn't a hypothetical process but focus on building relationships that are based on mutual trust and Unconditional acceptance.

Keywords: group counseling base on person-centered theory, elderly person, resilience quotient: RQ, caregiver

Procedia PDF Downloads 86
17897 Investigating the Neural Heterogeneity of Developmental Dyscalculia

Authors: Fengjuan Wang, Azilawati Jamaludin

Abstract:

Developmental Dyscalculia (DD) is defined as a particular learning difficulty with continuous challenges in learning requisite math skills that cannot be explained by intellectual disability or educational deprivation. Recent studies have increasingly recognized that DD is a heterogeneous, instead of monolithic, learning disorder with not only cognitive and behavioral deficits but so too neural dysfunction. In recent years, neuroimaging studies employed group comparison to explore the neural underpinnings of DD, which contradicted the heterogenous nature of DD and may obfuscate critical individual differences. This research aimed to investigate the neural heterogeneity of DD using case studies with functional near-infrared spectroscopy (fNIRS). A total of 54 aged 6-7 years old of children participated in this study, comprising two comprehensive cognitive assessments, an 8-minute resting state, and an 8-minute one-digit addition task. Nine children met the criteria of DD and scored at or below 85 (i.e., the 16th percentile) on the Mathematics or Math Fluency subtest of the Wechsler Individual Achievement Test, Third Edition (WIAT-III) (both subtest scores were 90 and below). The remaining 45 children formed the typically developing (TD) group. Resting-state data and brain activation in the inferior frontal gyrus (IFG), superior frontal gyrus (SFG), and intraparietal sulcus (IPS) were collected for comparison between each case and the TD group. Graph theory was used to analyze the brain network under the resting state. This theory represents the brain network as a set of nodes--brain regions—and edges—pairwise interactions across areas to reveal the architectural organizations of the nervous network. Next, a single-case methodology developed by Crawford et al. in 2010 was used to compare each case’s brain network indicators and brain activation against 45 TD children’s average data. Results showed that three out of the nine DD children displayed significant deviation from TD children’s brain indicators. Case 1 had inefficient nodal network properties. Case 2 showed inefficient brain network properties and weaker activation in the IFG and IPS areas. Case 3 displayed inefficient brain network properties with no differences in activation patterns. As a rise above, the present study was able to distill differences in architectural organizations and brain activation of DD vis-à-vis TD children using fNIRS and single-case methodology. Although DD is regarded as a heterogeneous learning difficulty, it is noted that all three cases showed lower nodal efficiency in the brain network, which may be one of the neural sources of DD. Importantly, although the current “brain norm” established for the 45 children is tentative, the results from this study provide insights not only for future work in “developmental brain norm” with reliable brain indicators but so too the viability of single-case methodology, which could be used to detect differential brain indicators of DD children for early detection and interventions.

Keywords: brain activation, brain network, case study, developmental dyscalculia, functional near-infrared spectroscopy, graph theory, neural heterogeneity

Procedia PDF Downloads 50
17896 Modeling of Power Network by ATP-Draw for Lightning Stroke Studies

Authors: John Morales, Armando Guzman

Abstract:

Protection relay algorithms play a crucial role in Electric Power System stability, where, it is clear that lightning strokes produce the mayor percentage of faults and outages of Transmission Lines (TLs) and Distribution Feeders (DFs). In this context, it is imperative to develop novel protection relay algorithms. However, in order to get this aim, Electric Power Systems (EPS) network have to be simulated as real as possible, especially the lightning phenomena, and EPS elements that affect their behavior like direct and indirect lightning, insulator string, overhead line, soil ionization and other. However, researchers have proposed new protection relay algorithms considering common faults, which are not produced by lightning strokes, omitting these imperative phenomena for the transmission line protection relays behavior. Based on the above said, this paper presents the possibilities of using the Alternative Transient Program ATP-Draw for the modeling and simulation of some models to make lightning stroke studies, especially for protection relays, which are developed through Transient Analysis of Control Systems (TACS) and MODELS language corresponding to the ATP-Draw.

Keywords: back-flashover, faults, flashover, lightning stroke, modeling of lightning, outages, protection relays

Procedia PDF Downloads 308
17895 Performance Analysis of ERA Using Fuzzy Logic in Wireless Sensor Network

Authors: Kamalpreet Kaur, Harjit Pal Singh, Vikas Khullar

Abstract:

In Wireless Sensor Network (WSN), the main limitation is generally inimitable energy consumption during processing of the sensor nodes. Cluster head (CH) election is one of the main issues that can reduce the energy consumption. Therefore, discovering energy saving routing protocol is the focused area for research. In this paper, fuzzy-based energy aware routing protocol is presented, which enhances the stability and network lifetime of the network. Fuzzy logic ensures the well-organized selection of CH by taking four linguistic variables that are concentration, energy, centrality, and distance to base station (BS). The results show that the proposed protocol shows better results in requisites of stability and throughput of the network.

Keywords: ERA, fuzzy logic, network model, WSN

Procedia PDF Downloads 274
17894 3D Object Model Reconstruction Based on Polywogs Wavelet Network Parametrization

Authors: Mohamed Othmani, Yassine Khlifi

Abstract:

This paper presents a technique for compact three dimensional (3D) object model reconstruction using wavelet networks. It consists to transform an input surface vertices into signals,and uses wavelet network parameters for signal approximations. To prove this, we use a wavelet network architecture founded on several mother wavelet families. POLYnomials WindOwed with Gaussians (POLYWOG) wavelet families are used to maximize the probability to select the best wavelets which ensure the good generalization of the network. To achieve a better reconstruction, the network is trained several iterations to optimize the wavelet network parameters until the error criterion is small enough. Experimental results will shown that our proposed technique can effectively reconstruct an irregular 3D object models when using the optimized wavelet network parameters. We will prove that an accurateness reconstruction depends on the best choice of the mother wavelets.

Keywords: 3d object, optimization, parametrization, polywog wavelets, reconstruction, wavelet networks

Procedia PDF Downloads 280
17893 Explainable Graph Attention Networks

Authors: David Pham, Yongfeng Zhang

Abstract:

Graphs are an important structure for data storage and computation. Recent years have seen the success of deep learning on graphs such as Graph Neural Networks (GNN) on various data mining and machine learning tasks. However, most of the deep learning models on graphs cannot easily explain their predictions and are thus often labelled as “black boxes.” For example, Graph Attention Network (GAT) is a frequently used GNN architecture, which adopts an attention mechanism to carefully select the neighborhood nodes for message passing and aggregation. However, it is difficult to explain why certain neighbors are selected while others are not and how the selected neighbors contribute to the final classification result. In this paper, we present a graph learning model called Explainable Graph Attention Network (XGAT), which integrates graph attention modeling and explainability. We use a single model to target both the accuracy and explainability of problem spaces and show that in the context of graph attention modeling, we can design a unified neighborhood selection strategy that selects appropriate neighbor nodes for both better accuracy and enhanced explainability. To justify this, we conduct extensive experiments to better understand the behavior of our model under different conditions and show an increase in both accuracy and explainability.

Keywords: explainable AI, graph attention network, graph neural network, node classification

Procedia PDF Downloads 190
17892 Teachers’ Stress as a Moderator of the Impact of POMPedaSens on Preschool Children’s Social-Emotional Learning

Authors: Maryam Zarra-Nezhad, Ali Moazami-Goodarzi, Joona Muotka, Nina Sajaniemi

Abstract:

This study examines the extent to which the impact of a universal intervention program, i.e., POMPedaSens, on children’s early social-emotional learning (SEL) is different depending on early childhood education (ECE) teaches stress at work. The POMPedaSens program aims to promote children’s (5–6-year-olds) SEL by supporting ECE teachers’ engagement and emotional availability. The intervention effectiveness has been monitored using an 8-month randomized controlled trial design with an intervention (IG; 26 teachers and 195 children) and a waiting control group (CG; 36 teachers and 198 children) that provided the data before and after the program implementation. The ECE teachers in the IG are trained to implement the intervention program in their early childhood education and care groups. Latent change score analysis suggests that the program increases children’s prosocial behavior in the IG when teachers show a low level of stress. No significant results were found for the IG regarding a change in antisocial behavior. However, when teachers showed a high level of stress, an increase in prosocial behavior and a decrease in antisocial behavior were only found for children in the CG. The results suggest a promising application of the POMPedaSens program for promoting prosocial behavior in early childhood when teachers have low stress. The intervention will likely need a longer time to display the moderating effect of ECE teachers’ well-being on children’s antisocial behavior change.

Keywords: early childhood, social-emotional learning, universal intervention program, professional development, teachers' stress

Procedia PDF Downloads 87
17891 Study on the Characteristics of Chinese Urban Network Space from the Perspective of Innovative Collaboration

Authors: Wei Wang, Yilun Xu

Abstract:

With the development of knowledge economy era, deepening the mechanism of cooperation and adhering to sharing and win-win cooperation has become new direction of urban development nowadays. In recent years, innovative collaborations between cities are becoming more and more frequent, whose influence on urban network space has aroused many scholars' attention. Taking 46 cities in China as the research object, the paper builds the connectivity of innovative network between cities and the linkages of urban external innovation using patent cooperation data among cities, and explores urban network space in China by the application of GIS, which is a beneficial exploration to the study of social network space in China in the era of information network. The result shows that the urban innovative network space and geographical entity space exist differences, and the linkages of external innovation are not entirely related to the city innovative capacity and the level of economy development. However, urban innovative network space and geographical entity space are similar in hierarchical clustering. They have both formed Beijing-Tianjin-Hebei, Yangtze River Delta, Pearl River Delta three metropolitan areas and Beijing-Shenzhen-Shanghai-Hangzhou four core cities, which lead the development of innovative network space in China.

Keywords: innovative collaboration, urban network space, the connectivity of innovative network, the linkages of external innovation

Procedia PDF Downloads 173
17890 Identifying Patterns of Seeking and Providing Help Online among Adolescents in Israel

Authors: Gali Pesin, Yuliya Lipshits-Braziler, Sima Amram-Vaknin, Moshe Tatar

Abstract:

The present study introduces four different patterns of seeking and providing help online among adolescents: (I) ‘Transceivers’ - adolescents who both seek as well as provide help online; (II) ‘Receivers’ - adolescents who seek help online, yet don’t provide it; (III) ‘Transmitters’ - adolescents who provide help online, yet don’t seek it; and (IV) ‘Idles’ - adolescents who refrain from seeking and providing help online. The study examined differences in seeking and providing help online between possible combinations of the four patterns, as well as gender differences within each pattern. Data was collected from 528 adolescents in Israel (59% were girls). Findings revealed that Transceivers are the largest group (45%) in this study, with higher representation of girls (65%). These adolescents seek help mainly around social difficulties, and they turn to peers who are both known and unknown to them. In addition, their preferred way to seek and provide help is through social network sites. Moreover, they often accept and give others emotional support. Receivers are the smallest group (5%) in this study. They turn to both known and unknown professionals more often than to friends and family. In addition, they seek help mostly around health and nutrition issues, and they usually receive instrumental support. For Receivers, the most important factor for seeking help online is anonymity, and the least important factor is familiarity with the help giver. Transmitters represent 16% of the adolescents in this study, with a greater representation of boys (52%). Their main reason to refrain from seeking help online is self-reliance. Nevertheless, these adolescents provide help to others online, mainly to those known to them through posting or responding to posts on social network sites. Idles represent 34% of the adolescents in this study. They refrain from seeking help online mainly due to their preference to seek help face to face, and due to their lack of trust in the internet or those using it. Idles and Transmitters are willing to seek help online mostly from friends and family. In addition, they are willing seek help online mainly regarding questions concerning military or civil service. They consider the most important facilitators for seeking help online as confidentiality and reliability. The present study’s main contribution is exploring the role of providing online help in understanding the adolescent behavior of seeking help online. In addition, the results of the present study have practical implications for the work of mental health providers, such as counseling psychologists and online mental health support.

Keywords: adolescents, counseling, online help-seeking, online help-providing

Procedia PDF Downloads 155
17889 Factors Predicting Preventive Behavior for Osteoporosis in University Students

Authors: Thachamon Sinsoongsud, Noppawan Piaseu

Abstract:

This predictive study was aimed to 1) describe self efficacy for risk reduction and preventive behavior for osteoporosis, and 2) examine factors predicting preventive behavior for osteoporosis in nursing students. Through purposive sampling, the sample included 746 nursing students in a public university in Bangkok, Thailand. Data were collected by a self-reported questionnaire on self efficacy and preventive behavior for osteoporosis. Data were analyzed using descriptive statistics and multiple regression analysis with stepwise method. Results revealed that majority of the students were female (98.3%) with mean age of 19.86 + 1.26 years. The students had self efficacy and preventive behavior for osteoporosis at moderate level. Self efficacy and level of education could together predicted 35.2% variance of preventive behavior for osteoporosis (p< .001). Results suggest approaches for promoting preventive behavior for osteoporosis through enhancing self efficacy among nursing students in a public university in Bangkok, Thailand.

Keywords: osteoporosis, self-efficacy, preventive behavior, nursing students

Procedia PDF Downloads 375
17888 Structural Vulnerability of Banking Network – Systemic Risk Approach

Authors: Farhad Reyazat, Richard Werner

Abstract:

This paper contributes to the existent literature by developing a framework that explains how to monitor potential threats to banking sector stability. The study explores structural vulnerabilities at the country level, but also look at bilateral exposures within a network context. The study contributes in analysing of the European banking systemic risk at aggregated level, which integrates the characteristics of bank size, and interconnectedness relative to the size of the economy which ultimate risk belong to, taking to account the concentration ratio of the banking industry within the whole economy. The nature of the systemic risk depends on the interplay of the network topology with the nature of financial transactions over the network, assets and buffer stemming from bank size, correlations, and the nature of the shocks to the financial system. The study’s results illustrate the contribution of banks’ size, size of economy and concentration of counterparty exposures to a given country’s banks in explaining its systemic importance, how much the banking network depends on a few traditional hubs activities and the changes of this dependencies over the last 9 years. The role of few of traditional hubs such as Swiss banks and British Banks and also Irish banks- where the financial sector is fairly new and grew strongly between 1990s till 2008- take the fourth position on 2014 reducing the relative size since 2006 where they had the first position. In-degree concentration index analysis in the study shows concentration index of banking network was not changed since financial crisis 2007-8. In-degree concentration index on first quarter of 2014 indicates that US, UK and Germany together, getting over 70% of the network exposures. The result of comparing the in-degree concentration index with 2007-4Q, shows the same group having over 70% of the network exposure, however the UK getting more important role in the hub and the market share of US and Germany are slightly diminished.

Keywords: systemic risk, counterparty risk, financial stability, interconnectedness, banking concentration, european banks risk, network effect on systemic risk, concentration risk

Procedia PDF Downloads 487
17887 Cellular Mobile Telecommunication GSM Radio Base Station Network Planning

Authors: Saeed Alzahrani, Yaser Miaji

Abstract:

The project involves the design and simulation of a Mobile Cellular Telecommunication Network using the software tool CelPlanner. The design is mainly concerned with Global System for Mobile Communications . The design and simulation of the network is done for a small part of the area allocated for us in the terrain area of Shreveport city .The project is concerned with designing a network that is cost effective and which also efficiently meets the required Grade of Service (GOS) AND Quality of Service (QOS).The expected outcome of this project is the design of a network that gives a good coverage for the area allocated to us with minimum co-channel interference and adjacent channel interference. The Handover and Traffic Handling Capacity should also be taken into consideration and should be good for the given area . The Traffic Handling Capacity of the network in a way decides whether the designed network is good or bad . The design also takes into consideration the topographical and morphological information.

Keywords: mobile communication, GSM, radio base station, network planning

Procedia PDF Downloads 435
17886 Unbreakable Obedience of Safety Regulation: The Study of Authoritarian Leadership and Safety Performance

Authors: Hong-Yi Kuo

Abstract:

Leadership is a key factor of improving workplace safety, and there have been abundant of studies which support the positive effects of appropriate leadership on employee safety performance in the western academic. However, little safety research focus on the Chinese leadership style like paternalistic leadership. To fill this gap, the resent study aims to examine the relationship between authoritarian leadership (one of the ternary mode in paternalistic leadership) and safety outcomes. This study makes hypothesis on different levels. First, on the group level, as an authoritarian leader regards safety value as the most important tasks, there would be positive effect on group safety outcomes through strengthening safety group norms by the emphasis on etiquette. Second, on the cross level, when a leader with authoritarian style has high priority on safety, employees may more obey the safety rules because of fear due to emphasis on absolute authority over the leader. Therefore, employees may show more safety performance and then increase individual safety outcomes. Survey data would be collected from 50 manufacturing groups (each group with more than 5 members and a leader) and a hierarchical linear modeling analysis would be conducted to analyze the hypothesis. Above the predictive result, the study expects to be a cornerstone of safety leadership research in the Chinese academic and practice.

Keywords: safety leadership, authoritarian leadership, group norms, safety behavior, supervisor safety priority

Procedia PDF Downloads 228
17885 Driver Behavior Analysis and Inter-Vehicular Collision Simulation Approach

Authors: Lu Zhao, Nadir Farhi, Zoi Christoforou, Nadia Haddadou

Abstract:

The safety test of deploying intelligent connected vehicles (ICVs) on the road network is a critical challenge. Road traffic network simulation can be used to test the functionality of ICVs, which is not only time-saving and less energy-consuming but also can create scenarios with car collisions. However, the relationship between different human driver behaviors and the car-collision occurrences has been not understood clearly; meanwhile, the procedure of car-collisions generation in the traffic numerical simulators is not fully integrated. In this paper, we propose an approach to identify specific driver profiles from real driven data; then, we replicate them in numerical traffic simulations with the purpose of generating inter-vehicular collisions. We proposed three profiles: (i) 'aggressive': short time-headway, (ii) 'inattentive': long reaction time, and (iii) 'normal' with intermediate values of reaction time and time-headway. These three driver profiles are extracted from the NGSIM dataset and simulated using the intelligent driver model (IDM), with an extension of reaction time. At last, the generation of inter-vehicular collisions is performed by varying the percentages of different profiles.

Keywords: vehicular collisions, human driving behavior, traffic modeling, car-following models, microscopic traffic simulation

Procedia PDF Downloads 168
17884 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 442
17883 Internet Use and Academic Procrastination Behavior in High School Students

Authors: Endah Mastuti, Prihastuti Sudaryono

Abstract:

The rapid development of Internet usage and technology influences the academic behavior of students in high schools. One of the consequences is the emergence of academic procrastination behavior. Academic procrastination behavior is students’ procrastinate behavior in completing assignments. This study aimed to see whether there are differences in the duration of using the internet with academic procrastinate behavior among high school students in Surabaya. The number of research subject is 498 high school students. Instruments of the research are academic procrastination scale and duration of the internet usage questionnaire. The results from One Way Anova shows F value 0.241 with a significance level of 0.868 This demonstrates that there is no difference between the duration of the use of the Internet with academic procrastination behavior in high school students.

Keywords: academic procrastination, duration of internet usage, students, senior high school

Procedia PDF Downloads 355
17882 Estimation of Coefficient of Discharge of Side Trapezoidal Labyrinth Weir Using Group Method of Data Handling Technique

Authors: M. A. Ansari, A. Hussain, A. Uddin

Abstract:

A side weir is a flow diversion structure provided in the side wall of a channel to divert water from the main channel to a branch channel. The trapezoidal labyrinth weir is a special type of weir in which crest length of the weir is increased to pass higher discharge. Experimental and numerical studies related to the coefficient of discharge of trapezoidal labyrinth weir in an open channel have been presented in the present study. Group Method of Data Handling (GMDH) with the transfer function of quadratic polynomial has been used to predict the coefficient of discharge for the side trapezoidal labyrinth weir. A new model is developed for coefficient of discharge of labyrinth weir by regression method. Generalized models for predicting the coefficient of discharge for labyrinth weir using Group Method of Data Handling (GMDH) network have also been developed. The prediction based on GMDH model is more satisfactory than those given by traditional regression equations.

Keywords: discharge coefficient, group method of data handling, open channel, side labyrinth weir

Procedia PDF Downloads 153
17881 Effect of Experience on Evacuation of Mice in Emergency Conditions

Authors: Teng Zhang, Shenshi Huang, Gang Xu, Xuelin Zhang, Shouxiang Lu

Abstract:

With the acceleration of urbanization and the increasing of the population in the city, the evacuation of pedestrians suffering from disaster environments such as fire in a room or other limited space becomes a vital issue in modern society. Mice have been used in experimental crowd evacuation in recent years for its good similarities to human in physical structure and stress reaction. In this study, the effect of experience or memory on the collective behavior of mice was explored. To help mice familiarize themselves with the design of the space and the stimulus caused by smoke, we trained them repeatedly for 2 days so that they can escape from the emergency conditions as soon as possible. The escape pattern, trajectories, walking speed, turning angle and mean individual escape time of mice in each training trail were analyzed. We found that mice can build memory quickly after the first trial on the first day. On the second day, the evacuation of mice was maintained in a stable and efficient state. Meanwhile, the group with size of 30 (G30) had a shorter mean individual escape time compared with G12. Furthermore, we tested the experience of evacuation skill of mice after several days. The results showed that the mice can hold the experience or memory over 3 weeks. We proposed the importance of experience of evacuation skill and the research of training methods in experimental evacuation of mice. The results can deepen our understanding of collective behavior of mice and conduce to the establishment of animal models in the study of pedestrian crowd dynamics in emergency conditions.

Keywords: experience, evacuation, mice, group size, behavior

Procedia PDF Downloads 266
17880 Structural Model on Organizational Climate, Leadership Behavior and Organizational Commitment: Work Engagement of Private Secondary School Teachers in Davao City

Authors: Genevaive Melendres

Abstract:

School administrators face the reality of teachers losing their engagement, or schools losing the teachers. This study is then conducted to identify a structural model that best predict work engagement of private secondary teachers in Davao City. Ninety-three teachers from four sectarian schools and 56 teachers from four non-sectarian schools were involved in the completion of four survey instruments namely Organizational Climate Questionnaire, Leader Behavior Descriptive Questionnaire, Organizational Commitment Scales, and Utrecht Work Engagement Scales. Data were analyzed using frequency distribution, mean, standardized deviation, t-test for independent sample, Pearson r, stepwise multiple regression analysis, and structural equation modeling. Results show that schools have high level of organizational climate dimensions; leaders oftentimes show work-oriented and people-oriented behavior; teachers have high normative commitment and they are very often engaged at their work. Teachers from non-sectarian schools have higher organizational commitment than those from sectarian schools. Organizational climate and leadership behavior are positively related to and predict work engagement whereas commitment did not show any relationship. This study underscores the relative effects of three variables on the work engagement of teachers. After testing network of relationships and evaluating several models, a best-fitting model was found between leadership behavior and work engagement. The noteworthy findings suggest that principals pay attention and consistently evaluate their behavior for this best predicts the work engagement of the teachers. The study provides value to administrators who take decisions and create conditions in which teachers derive fulfillment.

Keywords: leadership behavior, organizational climate, organizational commitment, private secondary school teachers, structural model on work engagement

Procedia PDF Downloads 263
17879 Virtual Routing Function Allocation Method for Minimizing Total Network Power Consumption

Authors: Kenichiro Hida, Shin-Ichi Kuribayashi

Abstract:

In a conventional network, most network devices, such as routers, are dedicated devices that do not have much variation in capacity. In recent years, a new concept of network functions virtualisation (NFV) has come into use. The intention is to implement a variety of network functions with software on general-purpose servers and this allows the network operator to select their capacities and locations without any constraints. This paper focuses on the allocation of NFV-based routing functions which are one of critical network functions, and presents the virtual routing function allocation algorithm that minimizes the total power consumption. In addition, this study presents the useful allocation policy of virtual routing functions, based on an evaluation with a ladder-shaped network model. This policy takes the ratio of the power consumption of a routing function to that of a circuit and traffic distribution between areas into consideration. Furthermore, the present paper shows that there are cases where the use of NFV-based routing functions makes it possible to reduce the total power consumption dramatically, in comparison to a conventional network, in which it is not economically viable to distribute small-capacity routing functions.

Keywords: NFV, resource allocation, virtual routing function, minimum power consumption

Procedia PDF Downloads 338
17878 Citation Analysis of New Zealand Court Decisions

Authors: Tobias Milz, L. Macpherson, Varvara Vetrova

Abstract:

The law is a fundamental pillar of human societies as it shapes, controls and governs how humans conduct business, behave and interact with each other. Recent advances in computer-assisted technologies such as NLP, data science and AI are creating opportunities to support the practice, research and study of this pervasive domain. It is therefore not surprising that there has been an increase in investments into supporting technologies for the legal industry (also known as “legal tech” or “law tech”) over the last decade. A sub-discipline of particular appeal is concerned with assisted legal research. Supporting law researchers and practitioners to retrieve information from the vast amount of ever-growing legal documentation is of natural interest to the legal research community. One tool that has been in use for this purpose since the early nineteenth century is legal citation indexing. Among other use cases, they provided an effective means to discover new precedent cases. Nowadays, computer-assisted network analysis tools can allow for new and more efficient ways to reveal the “hidden” information that is conveyed through citation behavior. Unfortunately, access to openly available legal data is still lacking in New Zealand and access to such networks is only commercially available via providers such as LexisNexis. Consequently, there is a need to create, analyze and provide a legal citation network with sufficient data to support legal research tasks. This paper describes the development and analysis of a legal citation Network for New Zealand containing over 300.000 decisions from 125 different courts of all areas of law and jurisdiction. Using python, the authors assembled web crawlers, scrapers and an OCR pipeline to collect and convert court decisions from openly available sources such as NZLII into uniform and machine-readable text. This facilitated the use of regular expressions to identify references to other court decisions from within the decision text. The data was then imported into a graph-based database (Neo4j) with the courts and their respective cases represented as nodes and the extracted citations as links. Furthermore, additional links between courts of connected cases were added to indicate an indirect citation between the courts. Neo4j, as a graph-based database, allows efficient querying and use of network algorithms such as PageRank to reveal the most influential/most cited courts and court decisions over time. This paper shows that the in-degree distribution of the New Zealand legal citation network resembles a power-law distribution, which indicates a possible scale-free behavior of the network. This is in line with findings of the respective citation networks of the U.S. Supreme Court, Austria and Germany. The authors of this paper provide the database as an openly available data source to support further legal research. The decision texts can be exported from the database to be used for NLP-related legal research, while the network can be used for in-depth analysis. For example, users of the database can specify the network algorithms and metrics to only include specific courts to filter the results to the area of law of interest.

Keywords: case citation network, citation analysis, network analysis, Neo4j

Procedia PDF Downloads 101
17877 A Survey of Attacks and Security Requirements in Wireless Sensor Networks

Authors: Vishnu Pratap Singh Kirar

Abstract:

Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.

Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements

Procedia PDF Downloads 487
17876 Theory of Mind and Its Brain Distribution in Patients with Temporal Lobe Epilepsy

Authors: Wei-Han Wang, Hsiang-Yu Yu, Mau-Sun Hua

Abstract:

Theory of Mind (ToM) refers to the ability to infer another’s mental state. With appropriate ToM, one can behave well in social interactions. A growing body of evidence has demonstrated that patients with temporal lobe epilepsy (TLE) may have damaged ToM due to impact on regions of the underlying neural network of ToM. However, the question of whether there is cerebral laterality for ToM functions remains open. This study aimed to examine whether there is cerebral lateralization for ToM abilities in TLE patients. Sixty-seven adult TLE patients and 30 matched healthy controls (HC) were recruited. Patients were classified into right (RTLE), left (LTLE), and bilateral (BTLE) TLE groups on the basis of a consensus panel review of their seizure semiology, EEG findings, and brain imaging results. All participants completed an intellectual test and four tasks measuring basic and advanced ToM. The results showed that, on all ToM tasks; (1)each patient group performed worse than HC; (2)there were no significant differences between LTLE and RTLE groups; (3)the BTLE group performed the worst. It appears that the neural network responsible for ToM is distributed evenly between the cerebral hemispheres.

Keywords: cerebral lateralization, social cognition, temporal lobe epilepsy, theory of mind

Procedia PDF Downloads 416
17875 Knowledge and Awareness of HIV/AIDS among Male Prisoners in Kuwait

Authors: Saroj Bala Grover, Al Munther Alhasawi, Prem N. Sharma, P. S. N. Menon

Abstract:

Background: Prisoners are considered one of the high-risk populations for the transmission of human immunodeficiency virus (HIV) infection. Targeting this group is one of the strategies to reduce the incidence of acquired immune deficiency syndrome (AIDS) in the community. Subjects and Methods: A cross-sectional study was conducted among male inmates in Kuwait’s prison by administering three sets of questionnaires to assess the level of their knowledge and awareness about the mode of transmission of HIV/AIDS, their risky personal behavior that may lead to HIV infection, and the presence of any negative attitudes and stigmatization towards HIV infected individuals. Results: The study included 123 male inmates, with a mean ± SD age of 30.9 ± 8.4 years. Most participants had good general knowledge (90%) about the mode of transmission of HIV/AIDS, including sharing contaminated syringes, risky personal behaviors such as having unprotected sex and increased number of extramarital relationships (66%), and the avoidance of the regular use of condoms. The younger age group (< 35 years) had more extramarital relationships than those > 35 years (71.4% Vs. 46.4%; p=0.016). There was a perceived attitude of stigmatization among inmates towards HIV-infected persons. Conclusions: This vulnerable group of prisoners, especially young adults, need educational programs to improve knowledge about the transmission of HIV and to correct and change their risky personal behaviors to protect themselves and the community against HIV transmission.

Keywords: HIV/AIDS, Kuwait, prisoners, knowledge, awareness, personal behavior, extramarital relationships, safe sex, discrimination, stigmatization

Procedia PDF Downloads 72
17874 Combining Mobile Intelligence with Formation Mechanism for Group Commerce

Authors: Lien Fa Lin, Yung Ming Li, Hsin Chen Hsieh

Abstract:

The rise of smartphones brings new concept So-Lo-Mo (social-local-mobile) in mobile commerce area in recent years. However, current So-Lo-Mo services only focus on individual users but not a group of users, and the development of group commerce is not enough to satisfy the demand of real-time group buying and less to think about the social relationship between customers. In this research, we integrate mobile intelligence with group commerce and consider customers' preference, real-time context, and social influence as components in the mechanism. With the support of this mechanism, customers are able to gather near customers with the same potential purchase willingness through mobile devices when he/she wants to purchase products or services to have a real-time group-buying. By matching the demand and supply of mobile group-buying market, this research improves the business value of mobile commerce and group commerce further.

Keywords: group formation, group commerce, mobile commerce, So-Lo-Mo, social influence

Procedia PDF Downloads 411
17873 Peer Support Groups as a Tool to Increase Chances of Passing General Practice UK Qualification Exams

Authors: Thomas Abraham, Garcia de la Vega Felipe, Lubna Nishath, Nzekwe Nduka, Powell Anne-Marie

Abstract:

Introduction: The purpose of this paper is to discuss the effectiveness of a peer support network created to provide medical education, pastoral support, and reliable resources to registrars to help them pass the MRCGP exams. This paper will include a description of the network and its purpose, discuss how it has been used by trainees since its creation, and explain how this methodology can be applied to other areas of medical education and primary care. Background: The peer support network was created in February 2021, using Facebook, Telegram, and WhatsApp platforms to facilitate discussion of cases and answer queries about the exams, share resources, and offer peer support from qualified GPs and specialists. The network was created and is maintained by the authors of this paper and is open to anyone who is registered with the General Medical Council (GMC) and is studying for the MRCGP exams. Purpose: The purpose of the network is to provide medical education, pastoral support, and reliable resources to registrars to help them pass the exams. The network is free to use and is designed to take the onus away from a single medical educator and collate a vast amount of information from multiple medical educators/trainers; thereby creating a digital library of information for all trainees - exam related or otherwise. Methodology The network is managed by a team of moderators who respond to queries and facilitate discussion. Smaller study groups are created from the main group and provide a platform for trainees to work together, share resources, and provide peer support. The network has had thousands of trainees using it since February 2021, with positive feedback from all trainees. Results: The feedback from trainees has been overwhelmingly positive. Word of mouth has spread rapidly, growing the groups exponentially. Trainees add colleagues to the groups and often stay after they pass their exams to 'give back' to their fellow trainees. To date, thousands of trainees have passed the MRCGP exams using the resources and support provided by the network. Conclusion The success of this peer support network demonstrates the effectiveness of creating a network of thousands of doctors to provide medical education and support.

Keywords: peer support, medical education, pastoral support, MRCGP exams

Procedia PDF Downloads 128