Search results for: Amman Message
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 391

Search results for: Amman Message

151 The Use of Facebook as a Social Media by Political Parties in the June 7 Election in Konya

Authors: Yasemin Gülşen Yılmaz, Süleyman Hakan Yılmaz, Muhammet Erbay

Abstract:

Social media is among the most important means of communication. Social media offers individuals and groups with an opportunity for participatory socialization over the internet, which is free of any time and place restrictions. Social media is a kind of interactive communication and bilateral social network. Various communication contents can be shared and put into mass circulation easily and quickly through social media. These sharings are not only limited to individuals but also happen to groups, institutions, and different constitutions. Their contents consist of any type of written message, audio and video files. We are living in the social media era now. It is not surprising that social media which has extensive communication facilities and massive prevalence is used in politics. Therefore, the use of social media (Facebook) by political parties during the Turkish general elections held on June 7, 2015, has been chosen as our research subject. Four parties namely, AKP, CHP, MHP and HDP who have the majority of votes in Turkey and participate in elections in Konya have been selected for our study. Their provincial centers’ and parliamentary candidates` use of social media (Facebook) on the last three days prior to the election have been examined and subjected to a qualitative analysis by means of content analysis.

Keywords: social media, June 7 general elections, politics, Facebook

Procedia PDF Downloads 403
150 The Influence of Language and Background Culture on Speakers from the Viewpoint of Gender and Identity

Authors: Yuko Tomoto

Abstract:

The purpose of this research is to examine the assumption that female bilingual speakers more often change the way they talk or think depending on the language they use compared with male bilingual speakers. The author collected data through questionnaires on 241 bilingual speakers. Also, in-depth interview surveys were conducted with 13 Japanese/English bilingual speakers whose native language is Japanese and 16 English/Japanese bilingual speakers whose native language is English. The results indicate that both male and female bilingual speakers are more or less influenced consciously and unconsciously by the language they use, as well as by the background cultural values of each language. At the same time, it was found that female speakers are much more highly affected by the language they use, its background culture and also by the interlocutors they were talking to. This was probably due to the larger cultural expectations on women. Through conversations, speakers are not only conveying a message but also attempting to express who they are, and what they want to be like. In other words, they are constantly building up and updating their own identities by choosing the most appropriate language and descriptions to express themselves in the dialogues. It has been claimed that the images of ideal L2 self could strongly motivate learners. The author hopes to make the best use of the fact that bilingual speakers change their presence depending on the language they use, in order to motivate Japanese learners of English, especially female learners from the viewpoint of finding their new selves in English.

Keywords: cultural influence, gender expectation, language learning, L2 self

Procedia PDF Downloads 422
149 About Multi-Resolution Techniques for Large Eddy Simulation of Reactive Multi-Phase Flows

Authors: Giacomo Rossi, Bernardo Favini, Eugenio Giacomazzi, Franca Rita Picchia, Nunzio Maria Salvatore Arcidiacono

Abstract:

A numerical technique for mesh refinement in the HeaRT (Heat Release and Transfer) numerical code is presented. In the CFD framework, Large Eddy Simulation (LES) approach is gaining in importance as a tool for simulating turbulent combustion processes, also if this approach has an high computational cost due to the complexity of the turbulent modeling and the high number of grid points necessary to obtain a good numerical solution. In particular, when a numerical simulation of a big domain is performed with a structured grid, the number of grid points can increase so much that the simulation becomes impossible: this problem can be overcame with a mesh refinement technique. Mesh refinement technique developed for HeaRT numerical code (a staggered finite difference code) is based on an high order reconstruction of the variables at the grid interfaces by means of a least square quasi-ENO interpolation: numerical code is written in modern Fortran (2003 standard of newer) and is parallelized using domain decomposition and message passing interface (MPI) standard.

Keywords: LES, multi-resolution, ENO, fortran

Procedia PDF Downloads 365
148 Intelligent Technology for Real-Time Monitor and Data Analysis of the Aquaculture Toxic Water Concentration

Authors: Chin-Yuan Hsieh, Wei-Chun Lu, Yu-Hong Zeng

Abstract:

The situation of a group of fish die is frequently found due to the fish disease caused by the deterioration of aquaculture water quality. The toxic ammonia is produced by animals as a byproduct of protein. The system is designed by the smart sensor technology and developed by the mathematical model to monitor the water parameters 24 hours a day and predict the relationship among twelve water quality parameters for monitoring the water quality in aquaculture. All data measured are stored in cloud server. In productive ponds, the daytime pH may be high enough to be lethal to the fish. The sudden change of the aquaculture conditions often results in the increase of PH value of water, lack of oxygen dissolving content, water quality deterioration and yield reduction. From the real measurement, the system can send the message to user’s smartphone successfully on the bad conditions of water quality. From the data comparisons between measurement and model simulation in fish aquaculture site, the difference of parameters is less than 2% and the correlation coefficient is at least 98.34%. The solubility rate of oxygen decreases exponentially with the elevation of water temperature. The correlation coefficient is 98.98%.

Keywords: aquaculture, sensor, ammonia, dissolved oxygen

Procedia PDF Downloads 283
147 Evaluation of Social Media Customer Engagement: A Content Analysis of Automobile Brand Pages

Authors: Adithya Jaikumar, Sudarsan Jayasingh

Abstract:

The dramatic technology led changes that continue to take place at the market place has led to the emergence and implication of online brand pages on social media networks. The Facebook brand page has become extremely popular among different brands. The primary aim of this study was to identify the impact of post formats and content type on customer engagement in Facebook brand pages. Methodology used for this study was to analyze and categorize 9037 content messages posted by 20 automobile brands in India during April 2014 to March 2015 and the customer activity it generated in return. The data was obtained from Fanpage karma- an online tool used for social media analytics. The statistical technique used to analyze the count data was negative binomial regression. The study indicates that there is a statistically significant relationship between the type of post and the customer engagement. The study shows that photos are the most posted format and highest engagement is found to be related to videos. The finding also reveals that social events and entertainment related content increases engagement with the message.

Keywords: content analysis, customer engagement, digital engagement, facebook brand pages, social media

Procedia PDF Downloads 322
146 An Intelligent Watch-Over System Using an IoT Device, for Elderly People Living by Themselves

Authors: Hideo Suzuki, Yuya Kiyonobu, Kotaro Matsushita, Masaki Hanada, Rie Suzuki, Noriko Niijima, Noriko Uosaki, Tadao Nakamura

Abstract:

People often worry about their elderly family members who are living by themselves or staying alone somewhere. An intelligent watch-over system for such elderly people, using a Raspberry Pi IoT device, has been newly developed to monitor those who live or stay separately from their families and alert them if a problem occurs. The system consists of motion sensors and temperature-humidity combined sensors that are located at seven points within an elderly person's home. The intelligent algorithms of the system detect signs and the possibility of unhealthy situations arising for the elderly relative; e.g., an unusually long bathing time, or a visit to a restroom, too high a room temperature, etc., by using data cached by the sensors above, at seven points within their house. The system gives more consideration to the elderly person's privacy, by using the sensors above, instead of using cameras and microphones placed around the house. The system invented and described here, can send a Twitter direct message to designated family members when an elderly relative is possibly in an unhealthy condition. Thus the system helps decrease family members' anxieties regarding their elderly relatives and increases their sense of security.

Keywords: elderly person, IoT device, Raspberry Pi, watch-over system

Procedia PDF Downloads 223
145 Explainable Graph Attention Networks

Authors: David Pham, Yongfeng Zhang

Abstract:

Graphs are an important structure for data storage and computation. Recent years have seen the success of deep learning on graphs such as Graph Neural Networks (GNN) on various data mining and machine learning tasks. However, most of the deep learning models on graphs cannot easily explain their predictions and are thus often labelled as “black boxes.” For example, Graph Attention Network (GAT) is a frequently used GNN architecture, which adopts an attention mechanism to carefully select the neighborhood nodes for message passing and aggregation. However, it is difficult to explain why certain neighbors are selected while others are not and how the selected neighbors contribute to the final classification result. In this paper, we present a graph learning model called Explainable Graph Attention Network (XGAT), which integrates graph attention modeling and explainability. We use a single model to target both the accuracy and explainability of problem spaces and show that in the context of graph attention modeling, we can design a unified neighborhood selection strategy that selects appropriate neighbor nodes for both better accuracy and enhanced explainability. To justify this, we conduct extensive experiments to better understand the behavior of our model under different conditions and show an increase in both accuracy and explainability.

Keywords: explainable AI, graph attention network, graph neural network, node classification

Procedia PDF Downloads 198
144 Communication About Health and Fitness in Media and Its Hidden Message About Objectification

Authors: Emiko Suzuki

Abstract:

Although fitness is defined as the body’s ability to respond to the demand of physical activity without undue fatigue in health science, in media oftentimes physical activity is presented as means to an attractive body rather than a fit and healthy one. Of all types of media, Instagram is becoming an increasingly persuasive source of information and advice on health and fitness, where individuals conceptualize what health and fitness mean for them. However, this user-generated and unregulated platform can be problematic, as it can communicate misleading information about health and fitness and possibly leading individuals to psychological problems such as eating disorders. In fact, previous research has shown that some messages that were posted with a tag that related to inspire others to do fitness, in fact, encouraged distancing the self from the internal needs of the body. For this reason, this present study aims to explore how health and fitness are communicated on Instagram by analyzing images and texts. A content analysis of images that were labeled with particular hashtags was performed, followed by a thematic analysis of texts from the same set of images. The result shows an interesting insight about messages about how health and fitness are communicated from companies through media, then digested and further shared among communities on Instagram. The study explores how the use of visual focused way of communicating health and fitness can lead to the dehumanization of human bodies.

Keywords: Instagram, fitness, dehumanization, body image, embodiment

Procedia PDF Downloads 138
143 A Profile of the Patients at the Hearing and Speech Clinic at the University of Jordan: A Retrospective Study

Authors: Maisa Haj-Tas, Jehad Alaraifi

Abstract:

The significance of the study: This retrospective study examined the speech and language profiles of patients who received clinical services at the University of Jordan Hearing and Speech Clinic (UJ-HSC) from 2009 to 2014. The UJ-HSC clinic is located in the capital Amman and was established in the late 1990s. It is the first hearing and speech clinic in Jordan and one of first speech and hearing clinics in the Middle East. This clinic provides services to an annual average of 2000 patients who are diagnosed with different communication disorders. Examining the speech and language profiles of patients in this clinic could provide an insight about the most common disorders seen in patients who attend similar clinics in Jordan. It could also provide information about community awareness of the role of speech therapists in the management of speech and language disorders. Methodology: The researchers examined the clinical records of 1140 patients (797 males and 343 females) who received clinical services at the UJ-HSC between the years 2009 and 2014 for the purpose of data analysis for this study. The main variables examined in the study were disorder type and gender. Participants were divided into four age groups: children, adolescents, adults, and older adults. The examined disorders were classified as either speech disorders, language disorders, or dysphagia (i.e., swallowing problems). The disorders were further classified as childhood language impairments, articulation disorders, stuttering, cluttering, voice disorders, aphasia, and dysphagia. Results: The results indicated that the prevalence for language disorders was the highest (50.7%) followed by speech disorders (48.3%), and dysphagia (0.9%). The majority of patients who were seen at the JU-HSC were diagnosed with childhood language impairments (47.3%) followed consecutively by articulation disorders (21.1%), stuttering (16.3%), voice disorders (12.1%), aphasia (2.2%), dysphagia (0.9%), and cluttering (0.2%). As for gender, the majority of patients seen at the clinic were males in all disorders except for voice disorders and cluttering. Discussion: The results of the present study indicate that the majority of examined patients were diagnosed with childhood language impairments. Based on this result, the researchers suggest that there seems to be a high prevalence of childhood language impairments among children in Jordan compared to other types of speech and language disorders. The researchers also suggest that there is a need for further examination of the actual prevalence data on speech and language disorders in Jordan. The fact that many of the children seen at the UJ-HSC were brought to the clinic either as a result of parental concern or teacher referral indicates that there seems to an increased awareness among parents and teachers about the services speech pathologists can provide about assessment and treatment of childhood speech and language disorders. The small percentage of other disorders (i.e., stuttering, cluttering, dysphasia, aphasia, and voice disorders) seen at the UJ-HSC may indicate a little awareness by the local community about the role of speech pathologists in the assessment and treatment of these disorders.

Keywords: clinic, disorders, language, profile, speech

Procedia PDF Downloads 313
142 Anajaa-Visual Substitution System: A Navigation Assistive Device for the Visually Impaired

Authors: Juan Pablo Botero Torres, Alba Avila, Luis Felipe Giraldo

Abstract:

Independent navigation and mobility through unknown spaces pose a challenge for the autonomy of visually impaired people (VIP), who have relied on the use of traditional assistive tools like the white cane and trained dogs. However, emerging visually assistive technologies (VAT) have proposed several human-machine interfaces (HMIs) that could improve VIP’s ability for self-guidance. Hereby, we introduce the design and implementation of a visually assistive device, Anajaa – Visual Substitution System (AVSS). This system integrates ultrasonic sensors with custom electronics, and computer vision models (convolutional neural networks), in order to achieve a robust system that acquires information of the surrounding space and transmits it to the user in an intuitive and efficient manner. AVSS consists of two modules: the sensing and the actuation module, which are fitted to a chest mount and belt that communicate via Bluetooth. The sensing module was designed for the acquisition and processing of proximity signals provided by an array of ultrasonic sensors. The distribution of these within the chest mount allows an accurate representation of the surrounding space, discretized in three different levels of proximity, ranging from 0 to 6 meters. Additionally, this module is fitted with an RGB-D camera used to detect potentially threatening obstacles, like staircases, using a convolutional neural network specifically trained for this purpose. Posteriorly, the depth data is used to estimate the distance between the stairs and the user. The information gathered from this module is then sent to the actuation module that creates an HMI, by the means of a 3x2 array of vibration motors that make up the tactile display and allow the system to deliver haptic feedback. The actuation module uses vibrational messages (tactones); changing both in amplitude and frequency to deliver different awareness levels according to the proximity of the obstacle. This enables the system to deliver an intuitive interface. Both modules were tested under lab conditions, and the HMI was additionally tested with a focal group of VIP. The lab testing was conducted in order to establish the processing speed of the computer vision algorithms. This experimentation determined that the model can process 0.59 frames per second (FPS); this is considered as an adequate processing speed taking into account that the walking speed of VIP is 1.439 m/s. In order to test the HMI, we conducted a focal group composed of two females and two males between the ages of 35-65 years. The subject selection was aided by the Colombian Cooperative of Work and Services for the Sightless (COOTRASIN). We analyzed the learning process of the haptic messages throughout five experimentation sessions using two metrics: message discrimination and localization success. These correspond to the ability of the subjects to recognize different tactones and locate them within the tactile display. Both were calculated as the mean across all subjects. Results show that the focal group achieved message discrimination of 70% and a localization success of 80%, demonstrating how the proposed HMI leads to the appropriation and understanding of the feedback messages, enabling the user’s awareness of its surrounding space.

Keywords: computer vision on embedded systems, electronic trave aids, human-machine interface, haptic feedback, visual assistive technologies, vision substitution systems

Procedia PDF Downloads 80
141 Linguistic Symbols Principle Construction in Cultural Creative Product Design

Authors: Pei-Jun Xue, Ming-Yu Hsiao

Abstract:

Language is the emblem of a culture, representing the extension of cultural life. In addition, it is also an important tool for communication and message transmission. It carries not only information but also covers the self-conscious of the information constructor as well as the situational experiences of users from different backgrounds. Moreover, design can be regarded as a language, a dynamic process of coding and decoding. With the designers’ experiences in everyday life, they bring them into the products’ experiences. Considered from the aspects of atmosphere and the five senses, a designer should consider and reconsider how to communicate the messages effectively to suit the users’ needs. In the process of language learning, we should understand the construction behind it and the rules of the compositions of language codes. Regarding the understanding of the design of works or the form of product construction, it is necessary for us to understand the coding system during the process of product construction. The form (signifiers) and meanings (signified) of Chinese characters are closely related. At the same time, it is also a process of simplifying the complicated to the simple. This study discusses the chinese characters that used in the cultural symbols construction, and analysis of existing products by Peirce's semiotic triangles. Through people's cognition of Chinese characters and constitute method, help to understand the way of construction product symbol.

Keywords: cultural-creative product design, cultural product, cultural symbols, linguistic symbols

Procedia PDF Downloads 449
140 A Virtual Grid Based Energy Efficient Data Gathering Scheme for Heterogeneous Sensor Networks

Authors: Siddhartha Chauhan, Nitin Kumar Kotania

Abstract:

Traditional Wireless Sensor Networks (WSNs) generally use static sinks to collect data from the sensor nodes via multiple forwarding. Therefore, network suffers with some problems like long message relay time, bottle neck problem which reduces the performance of the network. Many approaches have been proposed to prevent this problem with the help of mobile sink to collect the data from the sensor nodes, but these approaches still suffer from the buffer overflow problem due to limited memory size of sensor nodes. This paper proposes an energy efficient scheme for data gathering which overcomes the buffer overflow problem. The proposed scheme creates virtual grid structure of heterogeneous nodes. Scheme has been designed for sensor nodes having variable sensing rate. Every node finds out its buffer overflow time and on the basis of this cluster heads are elected. A controlled traversing approach is used by the proposed scheme in order to transmit data to sink. The effectiveness of the proposed scheme is verified by simulation.

Keywords: buffer overflow problem, mobile sink, virtual grid, wireless sensor networks

Procedia PDF Downloads 391
139 Effecting the Unaffected Through the Effervescent Disk Theory, a Different Perspective of Media Effective Theories

Authors: Tarik Elaujali

Abstract:

This study examines a new media effective theory was developed by the author, it is called ‘The Effervescent Disk Theory’ (EDT). The theory main goal is to affect the unaffected audience who are either not exposing to a particular message or do not show interest in it. EDT suggest melting down messages that means to be affected within the media materials which are selected willingly by the audience themselves. A certain set of procedures to test EDT hypotheses were taken and illustrated in this study. A sample of 342 respondents (males & females) was collected from Tripoli University in Libya during the academic year 2013-2014. The designated sample is representing students who were failing to pass the English module for beginners’. This study aims to change the students’ negative notion about the importance of learning English, and to put their new idea into action. The theory seeks to affect audience cognition, emotions, and behaviors. EDT was applied in the present study alongside the media dependency theory. EDT hypotheses were confirmed, study results denoted that 73.6 percentage of the students responded positively and passed their English exam for beginners after being exposed selectively to their favorite TV program that contains a dissolved messages about the importance and vitality of learning English language.

Keywords: effervescent disk theory, selective exposure, media dependency, Libyan students

Procedia PDF Downloads 245
138 Enhancing Learning Ability among Deaf Students by Using Photographic Images

Authors: Aidah Alias, Mustaffa Halabi Azahari, Adzrool Idzwan Ismail, Salasiah Ahmad

Abstract:

Education is one of the most important elements in a human life. Educations help us in learning and achieve new things in life. The ability of hearing gave us chances to hear voices and it is important in our communication. Hearing stories told by others; hearing news and music to create our creative and sense; seeing and hearing make us understand directly the message trying to deliver. But, what will happen if we are born deaf or having hearing loss while growing up? The objectives of this paper are to identify the current practice in teaching and learning among deaf students and to analyse an appropriate method in enhancing learning process among deaf students. A case study method was employed by using methods of observation and interview to selected deaf students and teachers. The findings indicated that the suitable method of teaching for deaf students is by using pictures and body movement. In other words, by combining these two medium of images and body movement, the best medium that the study suggested is by using video or motion pictures. The study concluded and recommended that video or motion pictures is recommended medium to be used in teaching and learning for deaf students.

Keywords: deaf, photographic images, visual communication, education, learning ability

Procedia PDF Downloads 284
137 Relationship between ICTs Application with Production and Protection Technology: Lesson from Rural Punjab-Pakistan

Authors: Tahir Munir Butt, Gao Qijie, Babar Shahbaz, Muhammad Zakaria Yousaf Hassan, Zhnag Chuanhong

Abstract:

The main objective of this paper is to identify the relationship between Information Communication Technology (ICTs) applications with Agricultural development in the process of communication at rural Punjab-Pakistan. The authors analyzed the relationship of ICTs applications with the most prominent factor for the Agricultural Information Services (AIS) in the Agricultural Extension Approaches (AEA). The data collection procedure was started from Jan. 2015 and completed in July 2015. It is the one of the part in PhD studies at China Agriculture, University Hadian-Beijng China. It was observed that on major constraint in the AIS disseminated was the limited number of farmers especially and unknown the farmers about new ICTs technology for Agriculture at rural areas. Majority of ICTs application e.g. Toll free number; Robo Calls; Text message was highly significances in the AIS approach. The recommendation is communication and capacity building one of the indispensable elements for sustainable and agricultural development and Agricultural extension should be provided training to farmer about new ICTs technologies to access and use of it for Sustainable Agriculture Development (SAD) and update the scenario of flow of information also with try to established ICTs hub at the village level.

Keywords: ICTs, AEA, AIS, SAD, rural farmers

Procedia PDF Downloads 300
136 Floating Populations, Rooted Networks Tracing the Evolution of Russeifa City in Relation to Marka Refugee Camp

Authors: Dina Dahood Dabash

Abstract:

Refugee camps are habitually defined as receptive sites, transient spaces of exile and nondescript depoliticized places of exception. However, such arguments form partial sides of reality, especially in countries that are geopolitically challenged and rely immensely on international aid. In Jordan, the dynamics brought with the floating population of refugees (Palestinian amongst others) have resulted in spatial after-effects that cannot be easily overlooked. For instance, Palestine refugee camps have turned by time into socioeconomic centers of gravity and cores of spatial evolution. Yet, such a position is not instantaneous. Amongst various reasons, it can be related, according to this paper, to a distinctive institutional climate that has been co-produced by the refugees, host community and the state. This paper aims to investigate the evolution of urban and spatial regulations in Jordan between 1948 and 1995, more specifically, state regulations, community regulations and refugee-self-regulation that all dynamically interacted that period. The paper aims to unpack the relations between refugee camps and their environs to further explore the agency of such floating populations in establishing rooted networks that extended the time and place boundaries. The paper’s argument stems from the fact that the spatial configuration of urban systems is not only an outcome of a historical evolutionary process but is also a result of interactions between the actors. The research operationalizes Marka camp in Jordan as a case study. Marka Camp is one of the six "emergency" camps erected in 1968 to shelter 15,000 Palestine refugees and displaced persons who left the West Bank and Gaza Strip. Nowadays, camp shelters more than 50,000 refugees in the same area of land. The camp is located in Russeifa, a city in Zarqa Governorate in Jordan. Together with Amman and Zarqa, Russeifa is part of a larger metropolitan area that acts as a home to more than half of Jordan’s businesses. The paper aspires to further understand the post-conflict strategies which were historically applied in Jordan and can be employed to handle more recent geopolitical challenges such as the Syrian refugee crisis. Methodological framework: The paper traces the evolution of the refugee-camp regulating norms in Jordan, parallel with the horizontal and vertical evolution of the Marka camp and its surroundings. Consequently, the main methods employed are historical and mental tracing, Interviews, in addition to using available Aerial and archival photos of the Marka camp and its surrounding.

Keywords: forced migration, Palestine refugee camps, spatial agency, urban regulations

Procedia PDF Downloads 186
135 Jesus’ Approach in Liberation of the Poor, Luke 4:18-19: Lesson for Nigerian Leaders

Authors: Aboekwe, Mary Emilia

Abstract:

Jesus’ mission was not only a religious one but had social and political implications. From the birth to the death of Jesus, God’s message of liberation is proclaimed in and through Jesus. This work studied Jesus’ inaugural mission in Luke 4: 18 -19 in the context of Nigerian leaders. A theological interpretation was adopted and it was discovered that Luke 4: 18-19 unfolded Jesus’ mission statement. This mission statement centered in preaching the good news to the poor, the release of the captives, healing the sick, liberation to the oppressed, and favour and abundance in the land. Related to the Jewish-Roman world of Jesus and the Nigerian nation, it was discovered that most of the maladies enumerated in Jesus’ inaugural mission statement were prevalent in Nigerian society. Maladies like poverty, oppression, violence, sickness and diseases are widespread in Nigeria. Poverty affects all, irrespective of gender, religion, or ethnicity. There is insecurity everywhere. Unemployment bites harder on Nigeria’s youthful population, and they are unable to find a job at the prevailing wage rate. To this effect, therefore, this study proposes Jesus’ liberative technique as a solution to these maladies prevalent in the country. The work equally challenged the Nigerian leaders to emulate Jesus’ mission statement and take proactive measures in fighting against these social challenges resident in Nigeria today.

Keywords: liberation, leadership, maladies, poverty

Procedia PDF Downloads 76
134 Exploring the Use of Adverbs in Two Young Learners Written Corpora

Authors: Chrysanthi S. Tiliakou, Katerina T. Frantzi

Abstract:

Writing has always been considered a most demanding skill for English as a Foreign Language learners as well as for native speakers. Novice foreign language writers are asked to handle a limited range of vocabulary to produce writing tasks at lower levels. Adverbs are the parts of speech that are not used extensively in the early stages of English as a Foreign Language writing. An additional problem with learning new adverbs is that, next to learning their meanings, learners are expected to acquire the proper placement of adverbs in a sentence. The use of adverbs is important as they enhance “expressive richness to one’s message”. By exploring the patterns of use of adverbs, researchers and educators can identify types of adverbs, which appear more taxing for young learners or that puzzle novice English as a Foreign Language writers with their placement, and focus on their teaching. To this end, the study examines the use of adverbs on two written Corpora of young learners of English of A1 – A2 levels and determines the types of adverbs used, their frequencies, problems in their use, and whether there is any differentiation between levels. The Antconc concordancing tool was used for the Greek Learner Corpus, and the Corpuscle concordancing tool for the Norwegian Corpus. The research found a similarity in the normalized frequencies of the adverbs used in the A1-A2 level Greek Learner Corpus with the frequencies of the same adverbs in the Norwegian Learner Corpus.

Keywords: learner corpora, young learners, writing, use of adverbs

Procedia PDF Downloads 92
133 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology

Authors: Mark Davey

Abstract:

Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.

Keywords: embedded systems, multiprocessor, network on chip, side channel

Procedia PDF Downloads 71
132 Exploring the Role of Humorous Dialogues in Advertisements of Pakistani Network Companies: Analysis of Discourses through Multi-Modal Critical Approach

Authors: Jane E. Alam Solangi

Abstract:

The contribution of the study is to explore the important part of humorous dialogues in cellular network advertisements. This promotes the message of valuable construction and promotion of network companies in Pakistan that employ different and broad techniques to give promotion to selling products. It merely instigates the consumers to buy it. The results of the study after analysis of its collected data gives a vision that advertisers of network advertisements use humorous dialogues as a significant device to the greater level. The source of entertainment in the advertisement is accompanied by the texts and humorous discourses to influence buying decisions of the consumers. Therefore, it tends to neutralize personal and social based values. The earlier contribution of scholars presented that the technical employment of humorous devices leads to the successful market of the relevant products. In order to analyze the humorous discourse devices, the approach of multi-modality of Fairclough (1989) is used. It is accompanied by the framework of Kress and van Leeuwen’s (1996). It analyzes the visual graph of the grammar. The overall findings in the study verified the role of humorous devices in the captivation of consumers’ decision to buy the product that interests them. Therefore, the role of humor acts as a breaker of the monotonous rhythm of advertisements.

Keywords: advertisements, devices, humorous, multi-modality, networks, Pakistan

Procedia PDF Downloads 103
131 A Group Setting of IED in Microgrid Protection Management System

Authors: Jyh-Cherng Gu, Ming-Ta Yang, Chao-Fong Yan, Hsin-Yung Chung, Yung-Ruei Chang, Yih-Der Lee, Chen-Min Chan, Chia-Hao Hsu

Abstract:

There are a number of distributed generations (DGs) installed in microgrid, which may have diverse path and direction of power flow or fault current. The overcurrent protection scheme for the traditional radial type distribution system will no longer meet the needs of microgrid protection. Integrating the intelligent electronic device (IED) and a supervisory control and data acquisition (SCADA) with IEC 61850 communication protocol, the paper proposes a microgrid protection management system (MPMS) to protect power system from the fault. In the proposed method, the MPMS performs logic programming of each IED to coordinate their tripping sequence. The GOOSE message defined in IEC 61850 is used as the transmission information medium among IEDs. Moreover, to cope with the difference in fault current of microgrid between grid-connected mode and islanded mode, the proposed MPMS applies the group setting feature of IED to protect system and robust adaptability. Once the microgrid topology varies, the MPMS will recalculate the fault current and update the group setting of IED. Provided there is a fault, IEDs will isolate the fault at once. Finally, the Matlab/Simulink and Elipse Power Studio software are used to simulate and demonstrate the feasibility of the proposed method.

Keywords: IEC 61850, IED, group Setting, microgrid

Procedia PDF Downloads 461
130 Computer Assisted Strategies Help to Pharmacist

Authors: Komal Fizza

Abstract:

All around the world in every field professionals are taking great support from their computers. Computer assisted strategies not only increase the efficiency of the professionals but also in case of healthcare they help in life-saving interventions. The background of this current research is aimed towards two things; first to find out if computer assisted strategies are useful for Pharmacist for not and secondly how much these assist a Pharmacist to do quality interventions. Shifa International Hospital is a 500 bedded hospital, and it is running Antimicrobial Stewardship, during their stewardship rounds pharmacists observed that a lot of wrong doses of antibiotics were coming at times those were being overlooked by the other pharmacist even. So, with the help of MIS team the patients were categorized into adult and peads depending upon their age. Minimum and maximum dose of every single antibiotic present in the pharmacy that could be dispensed to the patient was developed. These were linked to the order entry window. So whenever pharmacist would type any order and the dose would be below or above the therapeutic limit this would give an alert to the pharmacist. Whenever this message pop-up this was recorded at the back end along with the antibiotic name, pharmacist ID, date, and time. From 14th of January 2015 and till 14th of March 2015 the software stopped different users 350 times. Out of this 300 were found to be major errors which if reached to the patient could have harmed them to the greater extent. While 50 were due to typing errors and minor deviations. The pilot study showed that computer assisted strategies can be of great help to the pharmacist. They can improve the efficacy and quality of interventions.

Keywords: antibiotics, computer assisted strategies, pharmacist, stewardship

Procedia PDF Downloads 490
129 Ice Breakers: A Tool for Esl Learners

Authors: Nazia Shehzad

Abstract:

An icebreaker is a facilitation exercise intended to help a group to begin the process of forming themselves into a team. Icebreakers are commonly presented as a game to ‘warm up’ the group by helping the members to get to know each other. They often focus on sharing personal information such as names, hobbies, etc. Challenging icebreakers also have the ability to allow a group to be better prepared to complete its assigned tasks. For example, if the team's objective is to redesign a business process such as Accounts Payable, the icebreaker activity might take the team through a process analysis. The analysis could include the identification of failure points, challenging assumptions, and development of new solutions — all in a simpler and ‘safer’ setting where the team can practice the group dynamics which they will use to solve the assigned problem. Icebreakers help establish a positive environment and provide an opportunity for students to get to know one another and the instructor. Both are critical to the retention and success of students. There are a number of benefits of using ice-breakers activities in the classroom. It reduces both student and instructor anxiety prior to introducing the course, fosters in a powerful way both student-student and faculty-student interactions. It creates an environment where the learner is expected to participate and the instructor is willing to listen, actively engage students from the onset. It conveys the message that the instructor cares about getting to know the students and makes it easier for students to form relationships early in the semester so they can work together both in and out of class.

Keywords: actively engages students, facilitation exercise, faculty- student interactions, group dynamics, warm up

Procedia PDF Downloads 351
128 Communication Aesthetics of Techno-Scenery and Lighting in Bolanle Austen-Peters Queen Moremi the Musical

Authors: Badeji Adebayo John

Abstract:

Technology has immense contribution in every aspect of human endeavor; it has not only made work easier but also provided exhilarating impression in the mind of the people. Theatre is not exempted from the multifaceted influence of technology on phenomenon. Therefore, theatre performances have experienced the excellence of technology in the contemporary era such that audiences have unforgettable experiences after seeing theatre performances. Some of these technological advancements that have amplified the aesthetics of performances in the theatre are techno-scenery (3D mapping) and lighting. In view of this, the objective of this study is to explore how techno-scenery and lighting technologies were used to communicate messages in the performance of Queen Moremi the Musical. In so doing, Participant-Observation Method and Content Analysis are adopted. Berlo’s model of communication is also employed to explain the communicative aesthetics of these theatre technologies in the performance. Techno-scenery and lighting are communication media modifier that facilitates audiences’ comprehension of the messages in the performance of Queen Moremi the Musical. They also create clear motion pictures of the setting which the performers cannot communicate in their acting, dances and singing, to ease the audiences’ decoding of messages that the performers are sending to the audience. Therefore, consistent incorporation of these technologies to theatre performances will facilitate easy flow of communication in-between the performers who are the sender, the message which is the performance and the audience who are the receiver.

Keywords: communication, aesthetics, techno-scenery, lighting, musical

Procedia PDF Downloads 85
127 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 446
126 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service

Authors: Mabrouka Algherinai, Fatma Karkouri

Abstract:

Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.

Keywords: SMS, RSA, McEliece, RABIN

Procedia PDF Downloads 163
125 Fuzzy Logic Modeling of Evaluation the Urban Skylines by the Entropy Approach

Authors: Murat Oral, Seda Bostancı, Sadık Ata, Kevser Dincer

Abstract:

When evaluating the aesthetics of cities, an analysis of the urban form development depending on design properties with a variety of factors is performed together with a study of the effects of this appearance on human beings. Different methods are used while making an aesthetical evaluation related to a city. Entropy, in its preliminary meaning, is the mathematical representation of thermodynamic results. Measuring the entropy is related to the distribution of positional figures of a message or information from the probabilities standpoint. In this study, analysis of evaluation the urban skylines by the entropy approach was modelled with Rule-Based Mamdani-Type Fuzzy (RBMTF) modelling technique. Input-output parameters were described by RBMTF if-then rules. Numerical parameters of input and output variables were fuzzificated as linguistic variables: Very Very Low (L1), Very Low (L2), Low (L3), Negative Medium (L4), Medium (L5), Positive Medium (L6), High (L7), Very High (L8) and Very Very High (L9) linguistic classes. The comparison between application data and RBMTF is done by using absolute fraction of variance (R2). The actual values and RBMTF results indicated that RBMTF can be successfully used for the analysis of evaluation the urban skylines by the entropy approach. As a result, RBMTF model has shown satisfying relation with experimental results, which suggests an alternative method to evaluation of the urban skylines by the entropy approach.

Keywords: urban skylines, entropy, rule-based Mamdani type, fuzzy logic

Procedia PDF Downloads 289
124 The Impact of Political Satire on the Balance of Political Powers in Egypt: The Case of El-Bernameg in Egypt

Authors: Sally Barsoum

Abstract:

This paper is providing a significant insight into the role of satire in Egyptian politics and how it has been received from the government and viewer’s point of view. It mainly sets out to test whether Bassem Youssef’s satirical program has played a significant role in Egypt recent politics and to investigate what is the nature and extent of this role. In order to test this hypothesis, the researcher chose to critically analyze one episode of Bassem Youssef’s satirical show, El Bernameg. This paper goes further to highlight that the aims of satire is to invite citizens to analyze, criticize and question people in power and the realm of politics rather than remain as untouched subjects by combining humor with critique in order to enhance citizens’ political awareness and perhaps even political engagement. Moreover it identifies that Bassem Youssef’s satire is to use laughter as a medium to communicate his political message. By first informing the public and secondly engaging them through laughter, satire plays a very constructive political role, which have been argued finally that Bassem Youssef has indeed played an important part in the Egyptian political scene of today and this can be measured by the degree of censorship that he has been subject to and the level of international and domestic reaction towards his satirical show. At the end, this paper is suggesting that the measure of a strong government is its ability not only to accommodate satire but also to learn from it.

Keywords: political satirist, Bassem Youssef, capital broadcasting center, TV channel, muslims brotherhood regime, ONTV Egyptian TV channel

Procedia PDF Downloads 322
123 A Survey of Feature-Based Steganalysis for JPEG Images

Authors: Syeda Mainaaz Unnisa, Deepa Suresh

Abstract:

Due to the increase in usage of public domain channels, such as the internet, and communication technology, there is a concern about the protection of intellectual property and security threats. This interest has led to growth in researching and implementing techniques for information hiding. Steganography is the art and science of hiding information in a private manner such that its existence cannot be recognized. Communication using steganographic techniques makes not only the secret message but also the presence of hidden communication, invisible. Steganalysis is the art of detecting the presence of this hidden communication. Parallel to steganography, steganalysis is also gaining prominence, since the detection of hidden messages can prevent catastrophic security incidents from occurring. Steganalysis can also be incredibly helpful in identifying and revealing holes with the current steganographic techniques, which makes them vulnerable to attacks. Through the formulation of new effective steganalysis methods, further research to improve the resistance of tested steganography techniques can be developed. Feature-based steganalysis method for JPEG images calculates the features of an image using the L1 norm of the difference between a stego image and the calibrated version of the image. This calibration can help retrieve some of the parameters of the cover image, revealing the variations between the cover and stego image and enabling a more accurate detection. Applying this method to various steganographic schemes, experimental results were compared and evaluated to derive conclusions and principles for more protected JPEG steganography.

Keywords: cover image, feature-based steganalysis, information hiding, steganalysis, steganography

Procedia PDF Downloads 216
122 A Highly Efficient Broadcast Algorithm for Computer Networks

Authors: Ganesh Nandakumaran, Mehmet Karaata

Abstract:

A wave is a distributed execution, often made up of a broadcast phase followed by a feedback phase, requiring the participation of all the system processes before a particular event called decision is taken. Wave algorithms with one initiator such as the 1-wave algorithm have been shown to be very efficient for broadcasting messages in tree networks. Extensions of this algorithm broadcasting a sequence of waves using a single initiator have been implemented in algorithms such as the m-wave algorithm. However as the network size increases, having a single initiator adversely affects the message delivery times to nodes further away from the initiator. As a remedy, broadcast waves can be allowed to be initiated by multiple initiator nodes distributed across the network to reduce the completion time of broadcasts. These waves initiated by one or more initiator processes form a collection of waves covering the entire network. Solutions to global-snapshots, distributed broadcast and various synchronization problems can be solved efficiently using waves with multiple concurrent initiators. In this paper, we propose the first stabilizing multi-wave sequence algorithm implementing waves started by multiple initiator processes such that every process in the network receives at least one sequence of broadcasts. Due to being stabilizing, the proposed algorithm can withstand transient faults and do not require initialization. We view a fault as a transient fault if it perturbs the configuration of the system but not its program.

Keywords: distributed computing, multi-node broadcast, propagation of information with feedback and cleaning (PFC), stabilization, wave algorithms

Procedia PDF Downloads 504