Search results for: mobile online social networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14364

Search results for: mobile online social networks

11694 Classification of Computer Generated Images from Photographic Images Using Convolutional Neural Networks

Authors: Chaitanya Chawla, Divya Panwar, Gurneesh Singh Anand, M. P. S Bhatia

Abstract:

This paper presents a deep-learning mechanism for classifying computer generated images and photographic images. The proposed method accounts for a convolutional layer capable of automatically learning correlation between neighbouring pixels. In the current form, Convolutional Neural Network (CNN) will learn features based on an image's content instead of the structural features of the image. The layer is particularly designed to subdue an image's content and robustly learn the sensor pattern noise features (usually inherited from image processing in a camera) as well as the statistical properties of images. The paper was assessed on latest natural and computer generated images, and it was concluded that it performs better than the current state of the art methods.

Keywords: image forensics, computer graphics, classification, deep learning, convolutional neural networks

Procedia PDF Downloads 318
11693 ILearn, a Pathway to Progress

Authors: Reni Francis

Abstract:

Learning has transcended the classroom boundaries to create a learner centric, interactive, and integrative teaching learning environment. This study analysed the impact of iLearn on the teaching, learning, and evaluation among 100 teacher trainees. The objectives were to cater to the different learning styles of the teacher trainees, to incorporate innovative teaching learning activities, to assist in peer tutoring, to implement different evaluation processes. i: Identifying the learning styles among the teacher trainees through VARK Learning style checklist was followed by planning the teaching-learning process to meet the learning styles of the teacher trainees. L: Leveraging innovations in teaching- learning by planning and creating modules incorporating innovative teaching learning and hence the concept based year plan was prepared. E: Engage learning through constructivism using different teaching methodology to engage the teacher trainees in the learning process through Workshop, Round Robin, Gallery walk, Co-Operative learning, Think-Pair-Share, EDMODO, Course Networking, Concept Map, Brainstorming Sessions, Video Clippings. A: Assessing the learning through an Open Book assignment, Closed book assignment, and Multiple Choice Questions and Seminar presentation. R: Remediation through peer tutoring through Mentor-mentee approach in the tutorial groups, Group work, Library Hours. N: Norming new standards. This was done in the form of extended remediation and tutorials to understand the need of the teacher trainee and support them for further achievements in learning through Face to face interaction, Supervised Study Circle, Mobile (Device) learning. The findings of the study revealed the positive impact of iLearn towards student achievement and enhanced social skills.

Keywords: academic achievement, innovative strategy, learning styles, social skills

Procedia PDF Downloads 343
11692 Shark Detection and Classification with Deep Learning

Authors: Jeremy Jenrette, Z. Y. C. Liu, Pranav Chimote, Edward Fox, Trevor Hastie, Francesco Ferretti

Abstract:

Suitable shark conservation depends on well-informed population assessments. Direct methods such as scientific surveys and fisheries monitoring are adequate for defining population statuses, but species-specific indices of abundance and distribution coming from these sources are rare for most shark species. We can rapidly fill these information gaps by boosting media-based remote monitoring efforts with machine learning and automation. We created a database of shark images by sourcing 24,546 images covering 219 species of sharks from the web application spark pulse and the social network Instagram. We used object detection to extract shark features and inflate this database to 53,345 images. We packaged object-detection and image classification models into a Shark Detector bundle. We developed the Shark Detector to recognize and classify sharks from videos and images using transfer learning and convolutional neural networks (CNNs). We applied these models to common data-generation approaches of sharks: boosting training datasets, processing baited remote camera footage and online videos, and data-mining Instagram. We examined the accuracy of each model and tested genus and species prediction correctness as a result of training data quantity. The Shark Detector located sharks in baited remote footage and YouTube videos with an average accuracy of 89\%, and classified located subjects to the species level with 69\% accuracy (n =\ eight species). The Shark Detector sorted heterogeneous datasets of images sourced from Instagram with 91\% accuracy and classified species with 70\% accuracy (n =\ 17 species). Data-mining Instagram can inflate training datasets and increase the Shark Detector’s accuracy as well as facilitate archiving of historical and novel shark observations. Base accuracy of genus prediction was 68\% across 25 genera. The average base accuracy of species prediction within each genus class was 85\%. The Shark Detector can classify 45 species. All data-generation methods were processed without manual interaction. As media-based remote monitoring strives to dominate methods for observing sharks in nature, we developed an open-source Shark Detector to facilitate common identification applications. Prediction accuracy of the software pipeline increases as more images are added to the training dataset. We provide public access to the software on our GitHub page.

Keywords: classification, data mining, Instagram, remote monitoring, sharks

Procedia PDF Downloads 100
11691 Psychological Contract Breach and Violation Relationships with Stress and Wellbeing

Authors: Fazeelat Duran, Darren Bishopp, Jessica Woodhams

Abstract:

Negative emotions resulting from the breach of perceived obligations by an employer is called the psychological contract violation. Employees perceiving breach and feelings of negative emotions result in adverse outcomes for both the employee and employer. This paper aims to identify the relationships between contract breach, violation, stress and wellbeing and investigate whether fairness and self-efficacy mediate the relationships. A mixed method approach was used to analyze the online-surveys and semi-structured interviews with the police officers. It was identified that the psychological contract violation predicts stress and job-related well-being. Fairness and self-efficacy were identified as significant mediators to understand the underlying mechanisms of association. Whilst, in the interviews social support was identified as a popular mediator. Practical implications for employers are discussed.

Keywords: psychological contract violation and breach, stressors, depression, anxiety

Procedia PDF Downloads 236
11690 Awareness, Use and Searching Behavior of 'Virtua' Online Public Access Catalog Users

Authors: Saira Soroya, Khalid Mahmood

Abstract:

Library catalogs open the door to the library collection. OPAC (Online Public Access Catalog) are one of the services offered by automated libraries. The present study aims to explore user’s awareness, the level of use and their searching behavior of OPAC with a purpose to give suggestions and ways to improve user-friendly features of library OPAC. The population consisted of OPAC users of Lahore University of Management Sciences (LUMS). Convenient sampling technique was carried out. Total sample size was 100 OPAC users. Quantitative research design, based on survey method used to carry out the study. The data collection instrument was adopted. Data was analyzed using SPSS. Results revealed that a considerable number of users were not aware of OPAC i.e. (30%); however, those who were aware were using basic features of the OPAC. It was found that lack of knowledge was considered the frequent reason for not using all features of OPAC. In this regard, it is strongly recommended that compulsory information literacy programme should be established.

Keywords: catalog, OPAC, library automation, usability study, university library

Procedia PDF Downloads 316
11689 Factors Affecting Online Health Seeking Behaviors in Middle-Income Class Filipino Adults

Authors: Reinzo Vittorio B. Cardenas, Heather Venice L. Abogado, Andrea Therese V. Afable, Rhea D. Avillanoza, Marie Abegail P. Ayagan, Catherine D. Bantayan

Abstract:

As the Internet provides fast and reliable health-related information, the tendency to self-diagnose increases to further understand medical jargon in a diagnosis with a physician and decreases costly consultation fees. The study aimed to explore and understand the factors affecting online health-seeking behaviors in middle-income class adults in Metro Manila. The study was conducted from March to April of 2021 with a sample size of 200 individuals aged 20 to 49 years old. The study was delivered via an online survey that used a questionnaire adapted from the research of Lee et al. (2015). Specifically, the survey consisted of three sections: assessing web-based health-seeking behaviors, consultation with health professionals, and participants' hesitancy to consult with physicians, which used a mix of a 5-point Likert-type scale with multiple responses and multiple-choice options. The results showed that the age and educational attainment of the respondents had a negative effect while presenting a positive effect of socio-economic status on health-seeking behavior. Lastly, there was a significant effect of participant’s hesitancy for professional consultation on their health-seeking behavior. The results gleaned from the study indicated that various individual and socio-economic factors might significantly affect one’s health-seeking behaviors. Although hesitancy had a significant effect on the spectrum of health-seeking behaviors, this does not imply that certain factors are specifically related to an individual’s tendency to seek health information. This information instead becomes essential in understanding the patient-physician relationship and giving patients a more holistic treatment.

Keywords: health-seeking behavior, health information, Internet, physician consultation

Procedia PDF Downloads 206
11688 Churn Prediction for Telecommunication Industry Using Artificial Neural Networks

Authors: Ulas Vural, M. Ergun Okay, E. Mesut Yildiz

Abstract:

Telecommunication service providers demand accurate and precise prediction of customer churn probabilities to increase the effectiveness of their customer relation services. The large amount of customer data owned by the service providers is suitable for analysis by machine learning methods. In this study, expenditure data of customers are analyzed by using an artificial neural network (ANN). The ANN model is applied to the data of customers with different billing duration. The proposed model successfully predicts the churn probabilities at 83% accuracy for only three months expenditure data and the prediction accuracy increases up to 89% when the nine month data is used. The experiments also show that the accuracy of ANN model increases on an extended feature set with information of the changes on the bill amounts.

Keywords: customer relationship management, churn prediction, telecom industry, deep learning, artificial neural networks

Procedia PDF Downloads 131
11687 An Application of Path Planning Algorithms for Autonomous Inspection of Buried Pipes with Swarm Robots

Authors: Richard Molyneux, Christopher Parrott, Kirill Horoshenkov

Abstract:

This paper aims to demonstrate how various algorithms can be implemented within swarms of autonomous robots to provide continuous inspection within underground pipeline networks. Current methods of fault detection within pipes are costly, time consuming and inefficient. As such, solutions tend toward a more reactive approach, repairing faults, as opposed to proactively seeking leaks and blockages. The paper presents an efficient inspection method, showing that autonomous swarm robotics is a viable way of monitoring underground infrastructure. Tailored adaptations of various Vehicle Routing Problems (VRP) and path-planning algorithms provide a customised inspection procedure for complicated networks of underground pipes. The performance of multiple algorithms is compared to determine their effectiveness and feasibility. Notable inspirations come from ant colonies and stigmergy, graph theory, the k-Chinese Postman Problem ( -CPP) and traffic theory. Unlike most swarm behaviours which rely on fast communication between agents, underground pipe networks are a highly challenging communication environment with extremely limited communication ranges. This is due to the extreme variability in the pipe conditions and relatively high attenuation of acoustic and radio waves with which robots would usually communicate. This paper illustrates how to optimise the inspection process and how to increase the frequency with which the robots pass each other, without compromising the routes they are able to take to cover the whole network.

Keywords: autonomous inspection, buried pipes, stigmergy, swarm intelligence, vehicle routing problem

Procedia PDF Downloads 154
11686 Multi Object Tracking for Predictive Collision Avoidance

Authors: Bruk Gebregziabher

Abstract:

The safe and efficient operation of Autonomous Mobile Robots (AMRs) in complex environments, such as manufacturing, logistics, and agriculture, necessitates accurate multiobject tracking and predictive collision avoidance. This paper presents algorithms and techniques for addressing these challenges using Lidar sensor data, emphasizing ensemble Kalman filter. The developed predictive collision avoidance algorithm employs the data provided by lidar sensors to track multiple objects and predict their velocities and future positions, enabling the AMR to navigate safely and effectively. A modification to the dynamic windowing approach is introduced to enhance the performance of the collision avoidance system. The overall system architecture encompasses object detection, multi-object tracking, and predictive collision avoidance control. The experimental results, obtained from both simulation and real-world data, demonstrate the effectiveness of the proposed methods in various scenarios, which lays the foundation for future research on global planners, other controllers, and the integration of additional sensors. This thesis contributes to the ongoing development of safe and efficient autonomous systems in complex and dynamic environments.

Keywords: autonomous mobile robots, multi-object tracking, predictive collision avoidance, ensemble Kalman filter, lidar sensors

Procedia PDF Downloads 68
11685 Marginalized Children's Drawings Speak for Themselves: Self Advocacy for Protecting Their Rights

Authors: Bhavneet Bharti, Prahbhjot Malhi, Vandana Thakur

Abstract:

Introduction: Children of the urban migrant laborers have great difficulty in accessing government programs which are otherwise routinely available in rural settings. These include programs for child care, nutrition, health and education. There are major communicative fault-lines preventing advocacy for these marginalized children. The overarching aim of this study was to investigate the role of an innovative strategy of children’s drawings in supporting communication between children, social workers, pediatricians and other child advocates to fulfil their fundamental child rights. Materials and Methods: The data was collected over a period of one-year April 2015 to April 2016 during the routine visits by the members of the Social Pediatrics team including a social worker, pediatricians and an artist to the makeshift colony of migrant laborers. Once a week a drawing session was organized where the children including adolescents were asked to any drawing and provide a narrative thereafter. 5-30 children attended these weekly sessions for one year. All these drawings were then classified into various themes and exhibited on 16th April 2016 in the Govt. College of Art Museum. The forum was used for advocacy of Child Rights of these underprivileged children to Secretary social welfare. Results: Mean (SD) age of children in present observational study was 8.5 (2.5) years, with 60% of the boys. Majority of children demonstrated themes which were local and contextualized to their daily needs, threats and festivals which clearly underscored their fundamental right to basic services and equality of opportunities to achieve their full development Drawings of tap with flowing water, queues of people collecting water from hand pumps reflect the local problem of water availability for these children. Young children talking about fear of rape and murder following their drawings indicate the looming threat of potential abuse and neglect. Besides reality driven drawing, children also echoed supernatural beliefs, dangers and festivities in their drawings. Anyone who watched these children at work with art materials was able to see the intense level of absorption, clearly indicating the enjoyment they received, making it a meaningful activity. Indeed, this self-advocacy through art exhibition led to the successful establishment of mobile Anganwadi (A social safety net programme of the government) in their area of stay. Conclusions: This observational study is an example of how children were able to do self-advocacy to protect their rights. Of particular importance, these drawings address how psychologists and other child advocates can ensure in a child-centered manner that the voice of children is heard and represented in all assessments of their well-being and future care options.

Keywords: child advocacy, children drawings, child rights, marginalized children

Procedia PDF Downloads 163
11684 Pain Management Program in Helping Community-Dwelling Older Adults and Their Informal Caregivers to Manage Pain and Related Situations

Authors: Mimi My Tse

Abstract:

The prevalence of chronic non-cancer pain is high among community-dwelling older adults. Pain affects physical and psychosocial abilities. Older adults tend to be less mobile and have a high tendency to fall risk. In addition, older adults with pain are depressed, anxious, and not too willing to join social activities. This will make them feel very lonely and social isolation. Instead of giving pain management education and programs to older adults/clients, both older adults and their caregivers, it is sad to find that the majority of existing services are given to older adults only. Given the importance of family members in increasing compliance with health-promoting programs, we proposed to offer pain management programs to both older adults with his/her caregiver as a “dyad.” We used the Health Promotion Model and implemented a dyadic pain management program (DPM). The DPM is an 8-week group-based program. The DPM comprises 4 weeks of center-based, face-to-face activities and 4 weeks of digital-based activities delivered via a WhatsApp group. There were 30 dyads (15 in the experimental group with DPM and 15 in the control group with pain education pamphlets). Upon the completion of DPM, pain intensity and pain interference were significantly lower in the intervention group as compared to the control group. At the same time, physical function showed significant improvement and lower depression scores in the intervention group. In conclusion, the study highlights the potential benefits of involving caregivers in the management of chronic pain for older adults. This approach should be widely promoted in managing chronic pain situations for community-dwelling older adults and their caregivers.

Keywords: pain, older adults, dyadic approach, education

Procedia PDF Downloads 58
11683 The Role of Financial Literacy in Driving Consumer Well-Being

Authors: Amin Nazifi, Amir Raki, Doga Istanbulluoglu

Abstract:

The incorporation of technological advancements into financial services, commonly referred to as Fintech, is primarily aimed at promoting services that are accessible, convenient, and inclusive, thereby benefiting both consumers and businesses. Fintech services employ a variety of technologies, including Artificial Intelligence (AI), blockchain, and big data, to enhance the efficiency and productivity of traditional services. Cryptocurrency, a component of Fintech, is projected to be a trillion-dollar industry, with over 320 million consumers globally investing in various forms of cryptocurrencies. However, these potentially transformative services can also lead to adverse outcomes. For instance, recent Fintech innovations have been increasingly linked to misconduct and disservice, resulting in serious implications for consumer well-being. This could be attributed to the ease of access to Fintech, which enables adults to trade cryptocurrencies, shares, and stocks via mobile applications. However, there is little known about the darker aspects of technological advancements, such as Fintech. Hence, this study aims to generate scholarly insights into the design of robust and resilient Fintech services that can add value to businesses and enhance consumer well-being. Using a mixed-method approach, the study will investigate the personal and contextual factors influencing consumers’ adoption and usage of technology innovations and their impacts on consumer well-being. First, semi-structured interviews will be conducted with a sample of Fintech users until theoretical saturation is achieved. Subsequently, based on the findings of the first study, a quantitative study will be conducted to develop and empirically test the impacts of these factors on consumers’ well-being using an online survey with a sample of 300 participants experienced in using Fintech services. This study will contribute to the growing Transformative Service Research (TSR) literature by addressing the latest priorities in service research and shedding light on the impact of fintech services on consumer well-being.

Keywords: consumer well-being, financial literacy, Fintech, service innovation

Procedia PDF Downloads 51
11682 Linguistic Codes: Food as a Class Indicator

Authors: Elena Valeryevna Pozhidaeva

Abstract:

This linguistic case study is based on an interaction between the social position and foodways. In every culture there is a social hierarchical system in which there can be means to express and to identify the social status of a person. Food serves as a class indicator. The British being a verbal nation use the words as a preferred medium for signalling and recognising the social status. The linguistic analysis reflects a symbolic hierarchy determined by social groups in the UK. The linguistic class indicators of a British hierarchical system are detectable directly – in speech acts. They are articulated in every aspect of a national identity’s life from preferences of the food and the choice to call it to the names of the meals. The linguistic class indicators can as well be detected indirectly – through symbolic meaning or via the choice of the mealtime, its class (e.g the classes of tea or marmalade), the place to buy food (the class of the supermarket) and consume it (the places for eating out and the frequency of such practices). Under analysis of this study are not only food items and their names but also such categories as cutlery as a class indicator and the act of eating together as a practice of social significance and a class indicator. Current social changes and economic developments are considered and their influence on the class indicators appearance and transformation.

Keywords: linguistic, class, social indicator, English, food class

Procedia PDF Downloads 388
11681 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy

Authors: Neda Seyyedi, Reza Berangi

Abstract:

Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.

Keywords: VOIP networks, flooding attacks, entropy, computer networks

Procedia PDF Downloads 391
11680 Reflecting and Teaching on the Dialectical Nature of Social Work

Authors: Eli Buchbinder

Abstract:

Dialectics theory perceives two or more forces or themes as mutually opposed and negating on the one hand and as interdependent for their definition, existence, and resolution on the other. Such opposites might never be fully reconciled but might, simultaneously, continue to produce a higher level of integration and synthesis as well as tension, contradictions, and paradoxes. The identity of social work is constructed by poles; an understanding that emerges through key concepts that shape the profession. The key concept of person-in-environment creates dialectical tensions between the psychological versus the social pole. Important examples that reflect this focus on the psychological versus the social nature of human beings. This meta-perspective influences and constructs the implementation of values, ways of intervention, and professional relationships, e.g., creating a conflict between personal/social empowerment and social control and correction as the aims of the profession. Social work is dynamic and changing, with a unique way of perceiving and conceptualizing human behavior. Social workers must be able to face and accept the contradicting elements inherent in practicing social work. The basic philosophy for social work education is a dialectic conceptualization. In light of the above, social work students require dialectics as a critical mode of perception, reflection, and intervention. In the presentation, the focus will be on reflection on teaching students to conceptualize dialectics as a frame when training to be social workers. It is believed that the focus should emphasis two points: 1) the need to assist students to identify poles and to analyze the interrelationships created between them while coping emotionally with the tension and difficulties involved in containing these poles; 2) teaching students to integrate poles as a basis for assessment, planning, and intervention.

Keywords: professional ontology, a generic social work education, skills and values of social work, reflecting on social work teaching methods

Procedia PDF Downloads 74
11679 Design of the Ubiquitous Cloud Learning Management System

Authors: Panita Wannapiroon, Noppadon Phumeechanya, Sitthichai Laisema

Abstract:

This study is the research and development which is intended to: 1) design the ubiquitous cloud learning management system and: 2) assess the suitability of the design of the ubiquitous cloud learning management system. Its methods are divided into 2 phases. Phase 1 is the design of the ubiquitous cloud learning management system, phase 2 is the assessment of the suitability of the design the samples used in this study are work done by 25 professionals in the field of Ubiquitous cloud learning management systems and information and communication technology in education selected using the purposive sampling method. Data analyzed by arithmetic mean and standard deviation. The results showed that the ubiquitous cloud learning management system consists of 2 main components which are: 1) the ubiquitous cloud learning management system server (u-Cloud LMS Server) including: cloud repository, cloud information resources, social cloud network, cloud context awareness, cloud communication, cloud collaborative tools, and: 2) the mobile client. The result of the system suitability assessment from the professionals is in the highest range.

Keywords: learning management system, cloud computing, ubiquitous learning, ubiquitous learning management system

Procedia PDF Downloads 505
11678 Governance of Inter-Organizational Research Cooperation

Authors: Guenther Schuh, Sebastian Woelk

Abstract:

Companies face increasing challenges in research due to higher costs and risks. The intensifying technology complexity and interdisciplinarity require unique know-how. Therefore, companies need to decide whether research shall be conducted internally or externally with partners. On the other hand, research institutes meet increasing efforts to achieve good financing and to maintain high research reputation. Therefore, relevant research topics need to be identified and specialization of competency is necessary. However, additional competences for solving interdisciplinary research projects are also often required. Secured financing can be achieved by bonding industry partners as well as public fundings. The realization of faster and better research drives companies and research institutes to cooperate in organized research networks, which are managed by an administrative organization. For an effective and efficient cooperation, necessary processes, roles, tools and a set of rules need to be determined. The goal of this paper is to show the state-of-art research and to propose a governance framework for organized research networks.

Keywords: interorganizational cooperation, design of network governance, research network

Procedia PDF Downloads 353
11677 Combating Fake News: A Qualitative Evidence Synthesis of Organizational Stakeholder Trust in Social Media Communication during Crisis

Authors: Todd R. Walton

Abstract:

Social media would seem to be an ideal mechanism for crisis communication, yet it has been met with varied results. Natural disasters, such as hurricanes, provide a slow moving view of how social media can be leveraged to guide stakeholders and the public through a crisis. Crisis communication managers have struggled to reach target audiences with credible messaging. This Qualitative Evidence Synthesis (QES) analyzed the findings of eight studies published in the last year to determine how organizations effectively utilize social media for crisis communication. Additionally, the evidence was analyzed to note strategies for establishing credibility in a medium fraught with misinformation. Studies indicated wide agreement on the use of multiple social media channels in addition to frequent accurate messaging in order to establish credibility. Studies indicated mixed agreement on the use of text based emergency notification systems. The findings in this QES will help crisis communication professionals plan for social media use for crisis communication.

Keywords: crisis communication, crisis management, emergency response, social media

Procedia PDF Downloads 184
11676 A Hybrid Distributed Algorithm for Solving Job Shop Scheduling Problem

Authors: Aydin Teymourifar, Gurkan Ozturk

Abstract:

In this paper, a distributed hybrid algorithm is proposed for solving the job shop scheduling problem. The suggested method executes different artificial neural networks, heuristics and meta-heuristics simultaneously on more than one machine. The neural networks are used to control the constraints of the problem while the meta-heuristics search the global space and the heuristics are used to prevent the premature convergence. To attain an efficient distributed intelligent method for solving big and distributed job shop scheduling problems, Apache Spark and Hadoop frameworks are used. In the algorithm implementation and design steps, new approaches are applied. Comparison between the proposed algorithm and other efficient algorithms from the literature shows its efficiency, which is able to solve large size problems in short time.

Keywords: distributed algorithms, Apache Spark, Hadoop, job shop scheduling, neural network

Procedia PDF Downloads 373
11675 An Enhanced Connectivity Aware Routing Protocol for Vehicular Ad Hoc Networks

Authors: Ahmadu Maidorawa, Kamalrulnizam Abu Bakar

Abstract:

This paper proposed an Enhanced Connectivity Aware Routing (ECAR) protocol for Vehicular Ad hoc Network (VANET). The protocol uses a control broadcast to reduce the number of overhead packets needed in a route discovery process. It is also equipped with an alternative backup route that is used whenever a primary path to destination failed, which highly reduces the frequent launching and re-launching of the route discovery process that waste useful bandwidth and unnecessarily prolonging the average packet delay. NS2 simulation results show that the performance of ECAR protocol outperformed the original connectivity aware routing (CAR) protocol by reducing the average packet delay by 28%, control overheads by 27% and increased the packet delivery ratio by 22%.

Keywords: alternative path, primary path, protocol, routing, VANET, vehicular ad hoc networks

Procedia PDF Downloads 385
11674 Self-Education, Recognition and Well-Being Insights into Qualitative-Reconstructive Educational Research on the Value of Non-formal Education in the Adolescence

Authors: Sandra Biewers Grimm

Abstract:

International studies such as Pisa have shown an increasing social inequality in the education system, which is determined in particular by social origin and migration status. This is especially the case in the Luxembourg school system, which creates challenges for many young people due to the multilingualism in the country. While the international and also the national debate on education in the immediate aftermath of the publications of the Pisa results mainly focused on the further development of school-based learning venues and formal educational processes, it initially remained largely unclear what role exactly out-of-school learning venues and non-formal and informal learning processes could play in this further development. This has changed in the meantime. Both in the political discourses and in the scientific disciplines, those voices have become louder that draw attention to the important educational function and the enormous educational potential of out-of-school learning places as a response to the crisis of the formal education system and more than this. Youth work as an actor and approach of non-formal education is particularly in demand here. Due to its principles of self-education, participation and openness, it is considered to have a special potential in supporting the acquisition of important key competencies. In this context, the study "Educational experiences in non-formal settings" at CCY takes a differentiated look behind the scenes of education-oriented youth work and describes on the basis of empirical data what and how young people learn in youth centers and which significance they attach to these educational experiences for their subjective life situation. In this sense, the aim of the study is to reconstruct the subjective educational experiences of young people in Open Youth Work as well as to explore the value that these experiences have for young people. In doing so, it enables scientifically founded conclusions about the educational potential of youth work from the user's perspective. Initially, the study focuses on defining the concept of education in the context of non-formal education and thus sets a theoretical framework for the empirical analysis. This socio-educational term of education differs from the relevant conception of education in curricular, formal education as the acquisition of knowledge. It also differs from the operationalization of education as competence, or the differentiation into cultural, social and personal or into factual, social or methodological competence, which is often used in the European context and which has long been interpreted as a "social science reading of the question of education" (XX). Now the aim is to define a "broader" concept of education that goes beyond the normative and educational policy dimensions of a "non-formal education" and includes the classical socio-educational dimensions. Furthermore, the study works with different methods of empirical social research: In addition to ethnographic observation and an online survey, group discussions were conducted with the young people. The presentation gives an insight into the context, the methodology and the results of this study.

Keywords: non-formal education, youth research, qualitative research, educational theory

Procedia PDF Downloads 152
11673 Scheduling Nodes Activity and Data Communication for Target Tracking in Wireless Sensor Networks

Authors: AmirHossein Mohajerzadeh, Mohammad Alishahi, Saeed Aslishahi, Mohsen Zabihi

Abstract:

In this paper, we consider sensor nodes with the capability of measuring the bearings (relative angle to the target). We use geometric methods to select a set of observer nodes which are responsible for collecting data from the target. Considering the characteristics of target tracking applications, it is clear that significant numbers of sensor nodes are usually inactive. Therefore, in order to minimize the total network energy consumption, a set of sensor nodes, called sentinel, is periodically selected for monitoring, controlling the environment and transmitting data through the network. The other nodes are inactive. Furthermore, the proposed algorithm provides a joint scheduling and routing algorithm to transmit data between network nodes and the fusion center (FC) in which not only provides an efficient way to estimate the target position but also provides an efficient target tracking. Performance evaluation confirms the superiority of the proposed algorithm.

Keywords: coverage, routing, scheduling, target tracking, wireless sensor networks

Procedia PDF Downloads 365
11672 Role of Gender in Apparel Stores' Consumer Review: A Sentiment Analysis

Authors: Sarif Ullah Patwary, Matthew Heinrich, Brandon Payne

Abstract:

The ubiquity of web 2.0 platforms, in the form of wikis, social media (e.g., Facebook, Twitter, etc.) and online review portals (e.g., Yelp), helps shape today’s apparel consumers’ purchasing decision. Online reviews play important role towards consumers’ apparel purchase decision. Each of the consumer reviews carries a sentiment (positive, negative or neutral) towards products. Commercially, apparel brands and retailers analyze sentiment of this massive amount of consumer review data to update their inventory and bring new products in the market. The purpose of this study is to analyze consumer reviews of selected apparel stores with a view to understand, 1) the difference of sentiment expressed through men’s and woman’s text reviews, 2) the difference of sentiment expressed through men’s and woman’s star-based reviews, and 3) the difference of sentiment between star-based reviews and text-based reviews. A total of 9,363 reviews (1,713 men and 7,650 women) were collected using Yelp Dataset Challenge. Sentiment analysis of collected reviews was carried out in two dimensions: star-based reviews and text-based reviews. Sentiment towards apparel stores expressed through star-based reviews was deemed: 1) positive for 3 or 4 stars 2) negative for 1 or 2 stars and 3) neutral for 3 stars. Sentiment analysis of text-based reviews was carried out using Bing Liu dictionary. The analysis was conducted in IPyhton 5.0. Space. The sentiment analysis results revealed the percentage of positive text reviews by men (80%) and women (80%) were identical. Women reviewers (12%) provided more neutral (e.g., 3 out of 5 stars) star reviews than men (6%). Star-based reviews were more negative than the text-based reviews. In other words, while 80% men and women wrote positive reviews for the stores, less than 70% ended up giving 4 or 5 stars in those reviews. One of the key takeaways of the study is that star reviews provide slightly negative sentiment of the consumer reviews. Therefore, in order to understand sentiment towards apparel products, one might need to combine both star and text aspects of consumer reviews. This study used a specific dataset consisting of selected apparel stores from particular geographical locations (the information was not given for privacy concern). Future studies need to include more data from more stores and locations to generalize the findings of the study.

Keywords: apparel, consumer review, sentiment analysis, gender

Procedia PDF Downloads 148
11671 Transformation to M-Learning at the Nursing Institute in the Armed Force Hospital Alhada, in Saudi Arabia Based on Activity Theory

Authors: Rahimah Abdulrahman, A. Eardle, Wilfred Alan, Abdel Hamid Soliman

Abstract:

With the rapid development in technology, and advances in learning technologies, m-learning has begun to occupy a great part of our lives. The pace of the life getting together with the need for learning started mobile learning (m-learning) concept. In 2008, Saudi Arabia requested a national plan for the adoption of information technology (IT) across the country. Part of the recommendations of this plan concerns the implementation of mobile learning (m-learning) as well as their prospective applications to higher education within the Kingdom of Saudi Arabia. The overall aim of the research is to explore the main issues that impact the deployment of m-learning in nursing institutes in Saudi Arabia, at the Armed Force Hospitals (AFH), Alhada. This is in order to be able to develop a generic model to enable and assist the educational policy makers and implementers of m-learning, to comprehend and treat those issues effectively. Specifically, the research will explore the concept of m-learning; identify and analyse the main organisational; technological and cultural issue, that relate to the adoption of m-learning; develop a model of m-learning; investigate the perception of the students of the Nursing Institutes to the use of m-learning technologies for their nursing diploma programmes based on their experiences; conduct a validation of the m-learning model with the use of the nursing Institute of the AFH, Alhada in Saudi Arabia, and evaluate the research project as a learning experience and as a contribution to the body of knowledge. Activity Theory (AT) will be adopted for the study due to the fact that it provides a conceptual framework that engenders an understanding of the structure, development and the context of computer-supported activities. The study will be adopt a set of data collection methods which engage nursing students in a quantitative survey, while nurse teachers are engaged through in depth qualitative studies to get first-hand information about the organisational, technological and cultural issues that impact on the deployment of m-learning. The original contribution will be a model for developing m-learning material for classroom-based learning in the nursing institute that can have a general application.

Keywords: activity theory (at), mobile learning (m-learning), nursing institute, Saudi Arabia (sa)

Procedia PDF Downloads 341
11670 The Developmental Model of Self-Efficacy Emotional Intelligence and Social Maturity among High School Boys and Girls

Authors: Shrikant Chavan, Vikas Minchekar

Abstract:

The present study examined the self-efficacy, emotional intelligence and social maturity of High school boys and girls. Furthermore, study aimed at to foster the self-efficacy, emotional intelligence and social maturity of high school students. The study was conducted on 100 high school students, out of which 50 boys and 50 girls were selected through simple random sampling method from the Sangli city of Maharashtra state, India. The age range of the sample is 14 to 16 years. Self-efficacy scale developed by Jesusalem Schwarzer, Emotional intelligence scale developed by Hyde, Pethe and Dhar and social maturity scale developed by Rao were administered to the sample. Data was analyzed using mean, SD and ‘t’ test further Karl Pearson’s product moment, correlation of coefficient was used to know the correlation between emotional intelligence, self-efficacy, and social maturity. Results revealed that boys and girls did not differ significantly in their self-efficacy and social maturity. Further, the analysis revealed that girls are having high emotional intelligence compared to boys, which is significant at 0.01 level. It is also found that there is a significant and positive correlation between self-efficacy and emotional intelligence, self-efficacy and social maturity and emotional intelligence and social maturity. Some developmental strategies to strengthen the self-efficacy, emotional intelligence and social maturity of high school students are suggested in the study.

Keywords: self-efficacy, emotional intelligence, social maturity, developmental model and high school students

Procedia PDF Downloads 455
11669 A Longitudinal Exploration into Computer-Mediated Communication Use (CMC) and Relationship Change between 2005-2018

Authors: Laurie Dempsey

Abstract:

Relationships are considered to be beneficial for emotional wellbeing, happiness and physical health. However, they are also complicated: individuals engage in a multitude of complex and volatile relationships during their lifetime, where the change to or ending of these dynamics can be deeply disruptive. As the internet is further integrated into everyday life and relationships are increasingly mediated, Media Studies’ and Sociology’s research interests intersect and converge. This study longitudinally explores how relationship change over time corresponds with the developing UK technological landscape between 2005-2018. Since the early 2000s, the use of computer-mediated communication (CMC) in the UK has dramatically reshaped interaction. Its use has compelled individuals to renegotiate how they consider their relationships: some argue it has allowed for vast networks to be accumulated and strengthened; others contend that it has eradicated the core values and norms associated with communication, damaging relationships. This research collaborated with UK media regulator Ofcom, utilising the longitudinal dataset from their Adult Media Lives study to explore how relationships and CMC use developed over time. This is a unique qualitative dataset covering 2005-2018, where the same 18 participants partook in annual in-home filmed depth interviews. The interviews’ raw video footage was examined year-on-year to consider how the same people changed their reported behaviour and outlooks towards their relationships, and how this coincided with CMC featuring more prominently in their everyday lives. Each interview was transcribed, thematically analysed and coded using NVivo 11 software. This study allowed for a comprehensive exploration into these individuals’ changing relationships over time, as participants grew older, experienced marriages or divorces, conceived and raised children, or lost loved ones. It found that as technology developed between 2005-2018, everyday CMC use was increasingly normalised and incorporated into relationship maintenance. It played a crucial role in altering relationship dynamics, even factoring in the breakdown of several ties. Three key relationships were identified as being shaped by CMC use: parent-child; extended family; and friendships. Over the years there were substantial instances of relationship conflict: for parents renegotiating their dynamic with their child as they tried to both restrict and encourage their child’s technology use; for estranged family members ‘forced’ together in the online sphere; and for friendships compelled to publicly display their relationship on social media, for fear of social exclusion. However, it was also evident that CMC acted as a crucial lifeline for these participants, providing opportunities to strengthen and maintain their bonds via previously unachievable means, both over time and distance. A longitudinal study of this length and nature utilising the same participants does not currently exist, thus provides crucial insight into how and why relationship dynamics alter over time. This unique and topical piece of research draws together Sociology and Media Studies, illustrating how the UK’s changing technological landscape can reshape one of the most basic human compulsions. This collaboration with Ofcom allows for insight that can be utilised in both academia and policymaking alike, making this research relevant and impactful across a range of academic fields and industries.

Keywords: computer mediated communication, longitudinal research, personal relationships, qualitative data

Procedia PDF Downloads 108
11668 A Review on Big Data Movement with Different Approaches

Authors: Nay Myo Sandar

Abstract:

With the growth of technologies and applications, a large amount of data has been producing at increasing rate from various resources such as social media networks, sensor devices, and other information serving devices. This large collection of massive, complex and exponential growth of dataset is called big data. The traditional database systems cannot store and process such data due to large and complexity. Consequently, cloud computing is a potential solution for data storage and processing since it can provide a pool of resources for servers and storage. However, moving large amount of data to and from is a challenging issue since it can encounter a high latency due to large data size. With respect to big data movement problem, this paper reviews the literature of previous works, discusses about research issues, finds out approaches for dealing with big data movement problem.

Keywords: Big Data, Cloud Computing, Big Data Movement, Network Techniques

Procedia PDF Downloads 69
11667 Production of Hydroxy Marilone C as a Bioactive Compound from Streptomyces badius

Authors: Osama H. Elsayed, Mohsen M. S. Asker, Mahmoud A. Swelim, Ibrahim H. Abbas, Aziza I. Attwa, Mohamed E. El Awady

Abstract:

Hydroxy marilone C is a bioactive metabolite was produced from the culture broth of Streptomyces badius isolated from Egyptian soil. hydroxy marilone C was purified and fractionated by silica gel column with a gradient mobile phase dicloromethane (DCM) : Methanol then Sephadex LH-20 column using methanol as a mobile phase. It was subjected to many instruments as Infrared (IR), nuclear magnetic resonance (NMR), Mass spectroscopy (MS) and UV spectroscopy to the elucidation of its structure. It was evaluated for antioxidant, cytotoxicity against human alveolar basal epithelial cell line (A-549) and human breast adenocarcinoma cell line (MCF-7) and antiviral activities; showed that the maximum antioxidant activity was 78.8 % at 3000 µg/ml after 90 min. and the IC50 value against DPPH radical found about 1500 µg/ml after 60 min. By Using MTT assay the effect of the pure compound on the proliferation of A-549 cells and MCF-7 cells were 443 µg/ml and 147.9 µg/ml, respectively. While for detection of antiviral activity using Madin-Darby canine kidney (MDCK) cells the maximum cytotoxicity was at 27.9% and IC50 was 128.1µg/ml. The maximum concentration required for protecting 50% of the virus-infected cells against H1N1 viral cytopathogenicity (EC50) was 33.25% for 80 µg/ml. This results indicated that the hydroxy marilone C has a potential antitumor and antiviral activities.

Keywords: hydroxy marilone C, production, bioactive compound, Streptomyces badius

Procedia PDF Downloads 247
11666 'Internationalization': Discussing the Ethics of the Global North Developing Social Work Courses for the Global South

Authors: Mary Goitom, Maria Liegghio

Abstract:

In this paper, we critically explore the ethics of Schools of Social Work from the global North developing courses for programs within the Global South. In it, we discuss our experiences of partnering with the University of Guyana to develop and teach graduate courses in a newly formed Masters of Social Work program. Under the umbrella of our university’s goal for 'internationalization', that is, developing and establishing global and local collaborations for teaching, research and scholarship, we bring into question whether a new form of academic imperialism is occurring under the guise of global citizenship and social justice.

Keywords: academic imperialism, global north and south, internationalization, social work education

Procedia PDF Downloads 333
11665 Correlation of Empathy with Job Satisfaction and Stress of Social Workers

Authors: Theodosios Paralikas, Evangelia Kotrotsiou, Mairy Gouva, Manolis Mentis, Stiliani Stavrotheodorou, Stiliani Kotrotsiou, Maria Malliarou

Abstract:

There is a big discussion in the international literature on empathy, job satisfaction and job occupational among various of disciplines, including social workers. Νevertheless these parameters have not been specifically studied in the Greek territory. This paper aims to study empathy of social workers, to produce results related to whether empathy is influenced by demographic factors such as gender, age, marital status, level of education and study their perceived stress levels and also the satisfaction they derive from their work. For the first time, an attempt is made to link the empathy of these professionals to their job satisfaction and their anxiety. The sample of this survey consists of 165 social workers working on providers of public and private social services. The results showed that social workers have high levels of empathy contrary to the perceived stress levels which were low to moderate. Regarding the field of the job satisfaction, the survey showed that social workers are very satisfied with their workpiece and workplace. The survey shows no significant relationship between empathy and demographic factors, but there is a significant relationship between empathy and the workpiece/job satisfaction and the feeling of success.

Keywords: empathy, stress, job satisfaction, social workers

Procedia PDF Downloads 151