Search results for: TV-viewing behaviors identification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4264

Search results for: TV-viewing behaviors identification

4024 Authentic Connection between the Deity and the Individual Human Being Is Vital for Psychological, Biological, and Social Health

Authors: Sukran Karatas

Abstract:

Authentic energy network interrelations between the Creator and the creations as well as from creations to creations are the most important points for the worlds of physics and metaphysic to unite together and work in harmony, both within human beings, on the other hand, have the ability to choose their own life style voluntarily. However, it includes the automated involuntary spirit, soul and body working systems together with the voluntary actions, which involve personal, cultural and universal, rational or irrational variable values. Therefore, it is necessary for human beings to know the methods of existing authentic energy network connections to be able to communicate correlate and accommodate the physical and metaphysical entities as a proper functioning unity; this is essential for complete human psychological, biological and social well-being. Authentic knowledge is necessary for human beings to verify the position of self within self and with others to regulate conscious and voluntary actions accordingly in order to prevent oppressions and frictions within self and between self and others. Unfortunately, the absence of genuine individual and universal basic knowledge about how to establish an authentic energy network connection within self, with the deity and the environment is the most problematic issue even in the twenty-first century. The second most problematic issue is how to maintain freedom, equality and justice among human beings during these strictly interwoven network connections, which naturally involve physical, metaphysical and behavioral actions of the self and the others. The third and probably the most complicated problem is the scientific identification and the authentication of the deity. This not only provides the whole power and control over the choosers to set their life orders but also to establish perfect physical and metaphysical links as fully coordinated functional energy network. This thus indicates that choosing an authentic deity is the key-point that influences automated, emotional, and behavioral actions altogether, which shapes human perception, personal actions, and life orders. Therefore, we will be considering the existing ‘four types of energy wave end boundary behaviors’, comprising, free end, fixed end boundary behaviors, as well as boundary behaviors from denser medium to less dense medium and from less dense medium to denser medium. Consequently, this article aims to demonstrate that the authentication and the choice of deity has an important effect on individual psychological, biological and social health. It is hoped that it will encourage new researches in the field of authentic energy network connections to establish the best position and the most correct interrelation connections with self and others without violating the authorized orders and the borders of one another to live happier and healthier lives together. In addition, the book ‘Deity and Freedom, Equality, Justice in History, Philosophy, Science’ has more detailed information for those interested in this subject.

Keywords: deity, energy network, power, freedom, equality, justice, happiness, sadness, hope, fear, psychology, biology, sociology

Procedia PDF Downloads 325
4023 Heart Failure Identification and Progression by Classifying Cardiac Patients

Authors: Muhammad Saqlain, Nazar Abbas Saqib, Muazzam A. Khan

Abstract:

Heart Failure (HF) has become the major health problem in our society. The prevalence of HF has increased as the patient’s ages and it is the major cause of the high mortality rate in adults. A successful identification and progression of HF can be helpful to reduce the individual and social burden from this syndrome. In this study, we use a real data set of cardiac patients to propose a classification model for the identification and progression of HF. The data set has divided into three age groups, namely young, adult, and old and then each age group have further classified into four classes according to patient’s current physical condition. Contemporary Data Mining classification algorithms have been applied to each individual class of every age group to identify the HF. Decision Tree (DT) gives the highest accuracy of 90% and outperform all other algorithms. Our model accurately diagnoses different stages of HF for each age group and it can be very useful for the early prediction of HF.

Keywords: decision tree, heart failure, data mining, classification model

Procedia PDF Downloads 380
4022 An Approach to Apply Kernel Density Estimation Tool for Crash Prone Location Identification

Authors: Kazi Md. Shifun Newaz, S. Miaji, Shahnewaz Hazanat-E-Rabbi

Abstract:

In this study, the kernel density estimation tool has been used to identify most crash prone locations in a national highway of Bangladesh. Like other developing countries, in Bangladesh road traffic crashes (RTC) have now become a great social alarm and the situation is deteriorating day by day. Today’s black spot identification process is not based on modern technical tools and most of the cases provide wrong output. In this situation, characteristic analysis and black spot identification by spatial analysis would be an effective and low cost approach in ensuring road safety. The methodology of this study incorporates a framework on the basis of spatial-temporal study to identify most RTC occurrence locations. In this study, a very important and economic corridor like Dhaka to Sylhet highway has been chosen to apply the method. This research proposes that KDE method for identification of Hazardous Road Location (HRL) could be used for all other National highways in Bangladesh and also for other developing countries. Some recommendations have been suggested for policy maker to reduce RTC in Dhaka-Sylhet especially in black spots.

Keywords: hazardous road location (HRL), crash, GIS, kernel density

Procedia PDF Downloads 274
4021 Representation of the Disabled in Turkish Cinema from a Dramatological Frame

Authors: Esra Ince

Abstract:

As an important means of cultural transmission, cinema is an important resource for seeing cultural and social definitions, meanings and descriptions of people with disabilities. This study is aimed to reveal how disabled people are represented in the films selected from Turkish cinema. For this purpose, the films were examined with qualitative content analysis. The Goffmanian perspective was adopted in the study. The relationship between disability and stigma has been tried to be explained. How the disabled, which Goffman defines as a stigmatized group due to their differences, are represented in the cinema has been examined within the dramaturgy model. In the research, it was seen that the disabled characters took place in similar representations in different regions of dramaturgy. It has been seen that the films reinforce the negative discourse and behaviors by reflecting the prejudices, attitudes and behaviors in the society and continue to stigmatize disability.

Keywords: disability, Turkish cinema, Goffman, stigma

Procedia PDF Downloads 45
4020 The Effect of Mindfulness on Eating Enjoyment and Behavior in Preschool and Elementary Children: A Field Experiment across Four Schools

Authors: Phan Hong, David Lishner, Matthew Hanson

Abstract:

Sixty-five children across four school research sites participated in the present experiment, which was designed to examine whether mindfulness promotes eating enjoyment and diverse eating behaviors in preschool- and early elementary-age children. Children, ages 3-9 years old, were randomly assigned to a 4-week mindfulness intervention condition or a 4-week exposure, control condition. Each week for four days, children received one of four different foods (celery, cauliflower, kidney beans, or garbanzo beans). Children either received instructions to mindfully engage with the food or were given the food and allowed to eat without mindfulness prompts from the researchers. Following the eating exercise, they recorded the amount eaten and rated their enjoyment level. Across all sessions, researchers modeled eating behaviors for the children by eating all the offered food. Results suggested that a brief mindfulness intervention promoted more diverse eating behaviors and more overall food consumption of typically not preferred and unfamiliar foods (celery, cauliflower, and garbanzo beans), compared with an exposure, control condition in preschool children and elementary-age children. However, food enjoyment ratings did not significantly differ between the two conditions for any of the foods. Implications of the finding for addressing eating behavior of young children are considered.

Keywords: children, control trial, eating behavior, eating enjoyment, mindfulness, schools

Procedia PDF Downloads 200
4019 Human Behavior Modeling in Video Surveillance of Conference Halls

Authors: Nour Charara, Hussein Charara, Omar Abou Khaled, Hani Abdallah, Elena Mugellini

Abstract:

In this paper, we present a human behavior modeling approach in videos scenes. This approach is used to model the normal behaviors in the conference halls. We exploited the Probabilistic Latent Semantic Analysis technique (PLSA), using the 'Bag-of-Terms' paradigm, as a tool for exploring video data to learn the model by grouping similar activities. Our term vocabulary consists of 3D spatio-temporal patch groups assigned by the direction of motion. Our video representation ensures the spatial information, the object trajectory, and the motion. The main importance of this approach is that it can be adapted to detect abnormal behaviors in order to ensure and enhance human security.

Keywords: activity modeling, clustering, PLSA, video representation

Procedia PDF Downloads 355
4018 The Effect of Physical and Functional Structure on Citizens` Social Behavior: Case Study of Valiasr Crossroads, Tehran, Iran

Authors: Seyedeh Samaneh Hosseini Yousefi

Abstract:

Space does not play role just in mentioning the place or locations. It also takes part in people attendance and social structures. Urban space is of substantial aspects of city which is a public sphere for free and unlimited appearance of citizens. Along with such appearances and regarding physical, environmental and functional conditions, different personal and social behaviors can be seen and analyzed toward people. The main principle of an urban space is including social relations and communications. In this survey, urban space has been referred to one in which physical, environmental and functional attractions cause pause and staying of people. Surveys have shown that urban designers have discussed about place more than architects or planners. With attention to mutual relations between urban space, society and civilization, proper policy making and planning are essential due to achieving an ideal urban space. The survey has been decided to analyze the effect of functional and physical structure of urban spaces on citizens' social behaviors. Hence, Valiasr crossroads, Tehran identified public space, has been selected in which analytic-descriptive method utilized. To test the accuracy of assumptions, statistical test has been accomplished by SPSS. Findings have shown that functional structure affects social behaviors, relations, integration and participation more than physical structure does.

Keywords: citizens' social behavior, functional structure, physical structure, urban space

Procedia PDF Downloads 458
4017 A Longitudinal Survey Study of Izmir Commuter Rail System (IZBAN)

Authors: Samet Sen, Yalcin Alver

Abstract:

Before Izmir Commuter Rail System (IZBAN), most of the respondents along the railway were making their trips by city buses, minibuses or private cars. After IZBAN was put into service, some people changed their previous trip behaviors and they started travelling by IZBAN. Therefore a big travel demand in IZBAN occurred. In this study, the characteristics of passengers and their trip behaviors are found out based on the longitudinal data conducted via two wave trip surveys. Just after one year from IZBAN's opening, the first wave of the surveys was carried out among 539 passengers at six stations during morning peak hours between 07.00 am-09.30 am. The second wave was carried out among 669 passengers at the same six stations two years after the first wave during the same morning peak hours. As a result of this study, the respondents' socio-economic specifications, the distribution of trips by region, the impact of IZBAN on transport modes, the changes in travel time and travel cost and satisfaction data were obtained. These data enabled to compare two waves and explain the changes in socio-economic factors and trip behaviors. In both waves, 10 % of the respondents stopped driving their own cars and they started to take IZBAN. This is an important development in solving traffic problems. More public transportation means less traffic congestion.

Keywords: commuter rail system, comparative study, longitudinal survey, public transportation

Procedia PDF Downloads 405
4016 Oral Hygiene Behaviors among Pregnant Women with Diabetes Who Attend Primary Health Care Centers at Baghdad City

Authors: Zena F. Mushtaq, Iqbal M. Abbas

Abstract:

Background: Diabetes mellitus during pregnancy is one of the major medical and social problems with increasing prevalence in last decades and may lead to more vulnerable to dental problems and increased risk for periodontal diseases. Objectives: To assess oral hygiene behaviors among pregnant women with diabetes who attended primary health care centers and find out the relationship between oral hygiene behaviors and studied variables. Methodology: A cross sectional design was conducted from 7 July to 30 September 2014 on non probability (convenient sample) of 150 pregnant women with diabetes was selected from twelve Primary Health Care Centers at Baghdad city. Questionnaire format is tool for data collection which had designed and consisted of three main parts including: socio demographic, reproductive characteristics and items of oral hygiene behaviors among pregnant women with diabetes. Reliability of the questionnaire was determined through internal consistency of correlation coefficient (R= 0.940) and validity of content was determined through reviewing it by (12) experts in different specialties and was determined through pilot study. Descriptive and inferential statistics were used to analyze collected data. Result: Result of study revealed that (35.3%) of study sample was (35-39) years old with mean and SD is (X & SD = 33.57 ± 5.54) years, and (34.7%) of the study sample was graduated from primary school and less, half of the study sample was government employment and self employed, (42.7%) of the study sample had moderate socioeconomic status, the highest percentage (70.0%) of the study sample was nonsmokers, The result indicates that oral hygiene behaviors have moderate mean score in all items. There are no statistical significant association between oral hygiene domain and studied variables. Conclusions: All items related to health behavior concerning oral hygiene is in moderate mean of score, which may expose pregnant women with diabetes to high risk of periodontal diseases. Recommendations: Dental care provider should perform a dental examination at least every three months for each pregnant woman with diabetes, explanation of the effect of DM on periodontal health, oral hygiene instruction, oral prophylaxis, professional cleaning and treatment of periodontal diseases(scaling and root planing) when needed.

Keywords: diabetes, health behavior, pregnant women, oral hygiene

Procedia PDF Downloads 258
4015 Studying in Private Muslim Schools in Australia: Implications for Identity, Religiosity, and Adjustment

Authors: Hisham Motkal Abu-Rayya, Maram Hussein Abu-Rayya

Abstract:

Education in religious private schools raises questions regarding identity, belonging and adaptation in multicultural Australia. This research project aimed at examined cultural identification styles among Australian adolescent Muslims studying in Muslim schools, adolescents’ religiosity and the interconnections between cultural identification styles, religiosity, and adaptation. Two Muslim high school samples were recruited for the purposes of this study, one from Muslim schools in metropolitan Sydney and one from Muslim schools in metropolitan Melbourne. Participants filled in a survey measuring themes of the current study. Findings revealed that the majority of Australian adolescent Muslims showed a preference for the integration identification style (55.2%); separation was less prevailing (26.9%), followed by assimilation (9.7%) and marginalisation (8.3%). Supporting evidence suggests that the styles of identification were valid representation of the participants’ identification. A series of hierarchical regression analyses revealed that while adolescents’ preference for integration of their cultural and Australian identities was advantageous for a range of their psychological and socio-cultural adaptation measures, marginalisation was consistently the worst. Further hierarchical regression analyses showed that adolescent Muslims’ religiosity was better for a range of their adaptation measures compared to their preference for an integration acculturation style. Theoretical and practical implications of these findings are discussed.

Keywords: adaptation, identity, multiculturalism, religious school education

Procedia PDF Downloads 278
4014 Smartphone Video Source Identification Based on Sensor Pattern Noise

Authors: Raquel Ramos López, Anissa El-Khattabi, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

An increasing number of mobile devices with integrated cameras has meant that most digital video comes from these devices. These digital videos can be made anytime, anywhere and for different purposes. They can also be shared on the Internet in a short period of time and may sometimes contain recordings of illegal acts. The need to reliably trace the origin becomes evident when these videos are used for forensic purposes. This work proposes an algorithm to identify the brand and model of mobile device which generated the video. Its procedure is as follows: after obtaining the relevant video information, a classification algorithm based on sensor noise and Wavelet Transform performs the aforementioned identification process. We also present experimental results that support the validity of the techniques used and show promising results.

Keywords: digital video, forensics analysis, key frame, mobile device, PRNU, sensor noise, source identification

Procedia PDF Downloads 405
4013 A Personality-Based Behavioral Analysis on eSports

Authors: Halkiopoulos Constantinos, Gkintoni Evgenia, Koutsopoulou Ioanna, Antonopoulou Hera

Abstract:

E-sports and e-gaming have emerged in recent years since the increase in internet use have become universal and e-gamers are the new reality in our homes. The excessive involvement of young adults with e-sports has already been revealed and the adverse consequences have been reported in researches in the past few years, but the issue has not been fully studied yet. The present research is conducted in Greece and studies the psychological profile of video game players and provides information on personality traits, habits and emotional status that affect online gamers’ behaviors in order to help professionals and policy makers address the problem. Three standardized self-report questionnaires were administered to participants who were young male and female adults aged from 19-26 years old. The Profile of Mood States (POMS) scale was used to evaluate people’s perceptions of their everyday life mood; the personality features that can trace back to people’s habits and anticipated reactions were measured by Eysenck Personality Questionnaire (EPQ), and the Trait Emotional Intelligence Questionnaire (TEIQue) was used to measure which cognitive (gamers’ beliefs) and emotional parameters (gamers’ emotional abilities) mainly affected/ predicted gamers’ behaviors and leisure time activities?/ gaming behaviors. Data mining techniques were used to analyze the data, which resulted in machine learning algorithms that were included in the software package R. The research findings attempt to designate the effect of personality traits, emotional status and emotional intelligence influence and correlation with e-sports, gamers’ behaviors and help policy makers and stakeholders take action, shape social policy and prevent the adverse consequences on young adults. The need for further research, prevention and treatment strategies is also addressed.

Keywords: e-sports, e-gamers, personality traits, POMS, emotional intelligence, data mining, R

Procedia PDF Downloads 203
4012 Examining the Investment Behavior of Arab Women in the Stock Market

Authors: Razan Salem

Abstract:

Gender plays a vital role in the stock markets because men and women differ in their behavior when investing in stocks. Accordingly, the role of gender differences in investment behavior is an increasingly important strand in the field of behavioral finance research. The investment behaviors of women relative to men have been examined in the behavioral finance literature, mainly for comparison purposes. Women's roles in the stock market have not been examined in the behavioral finance literature, however, particularly with respect to the Arab region. This study aims to contribute towards a better understanding of the investment behavior of Arab women (in regards to their risk tolerance, investment confidence, and investment literacy levels) relative to Arab men; using a sample from Arab women and men investors living in Saudi Arabia and Jordan. In order to achieve the study's main aim, the researcher used non-parametric tests, as Mann-Whitney U test, along with frequency distribution analysis to analyze the study’s primary data. The researcher distributed close-ended online questionnaires to a sample of 550 Arab male and female individuals investing in stocks in both Saudi Arabia and Jordan. The results confirm that the sample Arab women invest less in stocks compared to Arab men due to their risk-averse behaviors and limited confidence levels. The results also reveal that due to Arab women’s very low investment literacy levels, they fear from taking the risk and invest often in stocks relative to Arab men. Overall, the study’s main variables (risk tolerance, investment confidence, and investment literacy levels) have a combined effect on the investment behavior of Arab women and their limited participation in the stock market. Hence, this study is one of the very first studies that indicate the combined effect of the three main variables (which are usually studied separately in the existing literature) on the investment behavior of women, particularly Arab women. This study makes three important contributions to the growing literature on gender differences in investment behavior. First, while the behavioral finance literature documents evidence on gender differences in investment behaviors in many developed countries, there are very limited studies that investigate such differences in Arab countries. Arab women investors, generally, are ignored from the behavioral finance literature due probably to cultural barriers and data collection difficulties. Thus, this study extends the literature to include Arab women and their investment behaviors when trading stock relative to Arab men. Moreover, the study associates women investment literacy and confidence levels with their financial risk behaviors and participation in the stock market. This study provides direct evidence on Arab women's investment behaviors when trading stocks. Overall, studying Arab women investors is important to investigate whether the investment behavior identified for Western women investors are also found in Arab women investors.

Keywords: Arab women, gender differences, investment behavior, stock markets

Procedia PDF Downloads 157
4011 [Keynote Talk]: A Blueprint for an Educational Trajectory: The Power of Discourse in Constructing “Naughty” and “Adorable” Kindergarten Students

Authors: Fernanda T. Orsati, Julie Causton

Abstract:

Discursive practices enacted by educators in kindergarten create a blueprint for how the educational trajectories of students with disabilities are constructed. This two-year ethnographic case study critically examine educators’ relationships with students considered to present challenging behaviors in one kindergarten classroom located in a predominantly White middle-class school district in the Northeast of the United States. Focusing on the language and practices used by one special education teacher and three teaching assistants, this paper analyzes how teacher responses to students’ behaviors constructs and positions students over one year of kindergarten education. Using a critical discourse analysis, it shows that educators understand students’ behaviors as a deficit and needing consequences. This study highlights how educators’ responses reflect students' individual characteristics including family background, socioeconomics and ability status. This paper offers in-depth analysis of two students’ stories, which evidenced that the language used by educators amplifies the social positioning of students within the classroom and creates a foundation for who they are constructed to be. Through exploring routine language and practices, this paper demonstrates that educators outlined a blueprint of kindergartners, which positioned students as learners in ways that became the ground for either a limited or a promising educational pathway for them.

Keywords: behavior, early education, special education, critical discourse analysis

Procedia PDF Downloads 278
4010 Native Language Identification with Cross-Corpus Evaluation Using Social Media Data: ’Reddit’

Authors: Yasmeen Bassas, Sandra Kuebler, Allen Riddell

Abstract:

Native language identification is one of the growing subfields in natural language processing (NLP). The task of native language identification (NLI) is mainly concerned with predicting the native language of an author’s writing in a second language. In this paper, we investigate the performance of two types of features; content-based features vs. content independent features, when they are evaluated on a different corpus (using social media data “Reddit”). In this NLI task, the predefined models are trained on one corpus (TOEFL), and then the trained models are evaluated on different data using an external corpus (Reddit). Three classifiers are used in this task; the baseline, linear SVM, and logistic regression. Results show that content-based features are more accurate and robust than content independent ones when tested within the corpus and across corpus.

Keywords: NLI, NLP, content-based features, content independent features, social media corpus, ML

Procedia PDF Downloads 102
4009 Automatic Detection of Suicidal Behaviors Using an RGB-D Camera: Azure Kinect

Authors: Maha Jazouli

Abstract:

Suicide is one of the most important causes of death in the prison environment, both in Canada and internationally. Rates of attempts of suicide and self-harm have been on the rise in recent years, with hangings being the most frequent method resorted to. The objective of this article is to propose a method to automatically detect in real time suicidal behaviors. We present a gesture recognition system that consists of three modules: model-based movement tracking, feature extraction, and gesture recognition using machine learning algorithms (MLA). Our proposed system gives us satisfactory results. This smart video surveillance system can help assist staff responsible for the safety and health of inmates by alerting them when suicidal behavior is detected, which helps reduce mortality rates and save lives.

Keywords: suicide detection, Kinect azure, RGB-D camera, SVM, machine learning, gesture recognition

Procedia PDF Downloads 152
4008 Design of Smart Urban Lighting by Using Social Sustainability Approach

Authors: Mohsen Noroozi, Maryam Khalili

Abstract:

Creating cities, objects and spaces that are economically, environmentally and socially sustainable and which meet the challenge of social interaction and generation change will be one of the biggest tasks of designers. Social sustainability is about how individuals, communities and societies live with each other and set out to achieve the objectives of development model which they have chosen for themselves. Urban lightning as one of the most important elements of urban furniture that people constantly interact with it in public spaces; can be a significant object for designers. Using intelligence by internet of things for urban lighting makes it more interactive in public environments. It can encourage individuals to carry out appropriate behaviors and provides them the social awareness through new interactions. The greatest strength of this technology is its strong impact on many aspects of everyday life and users' behaviors. The analytical phase of the research is based on a multiple method survey strategy. Smart lighting proposed in this paper is an urban lighting designed on results obtained from a collective point of view about the social sustainability. In this paper, referring to behavioral design methods, the social behaviors of the people has been studied. Data show that people demands for a deeper experience of social participation, safety perception and energy saving with the meaningful use of interactive and colourful lighting effects. By using intelligent technology, some suggestions are provided in the field of future lighting to consider the new forms of social sustainability.

Keywords: behavior pattern, internet of things, social sustainability, urban lighting

Procedia PDF Downloads 165
4007 Identification of Nonlinear Systems Using Radial Basis Function Neural Network

Authors: C. Pislaru, A. Shebani

Abstract:

This paper uses the radial basis function neural network (RBFNN) for system identification of nonlinear systems. Five nonlinear systems are used to examine the activity of RBFNN in system modeling of nonlinear systems; the five nonlinear systems are dual tank system, single tank system, DC motor system, and two academic models. The feed forward method is considered in this work for modelling the non-linear dynamic models, where the K-Means clustering algorithm used in this paper to select the centers of radial basis function network, because it is reliable, offers fast convergence and can handle large data sets. The least mean square method is used to adjust the weights to the output layer, and Euclidean distance method used to measure the width of the Gaussian function.

Keywords: system identification, nonlinear systems, neural networks, radial basis function, K-means clustering algorithm

Procedia PDF Downloads 443
4006 Indoor Thermal Comfort in Educational Buildings in the State of Kuwait

Authors: Sana El-Azzeh, Farraj Al-Ajmi, Abdulrahman Al-Aqqad, Mohamed Salem

Abstract:

Thermal comfort is defined according to ANSI/ASHRAE Standard 55 as a condition of mind that expresses satisfaction with the thermal environment and is assessed by subjective evaluation. Sustaining this standard of thermal comfort for occupants of buildings or other enclosures is one of the important goals of HVAC design engineers. This paper presents a study of thermal comfort and adaptive behaviors of occupants who occupies two locations at the campus of the Australian College of Kuwait. A longitudinal survey and field measurement were conducted to measure thermal comfort, adaptive behaviors, and indoor environment qualities. The study revealed that female occupants in the selected locations felt warmer than males and needed more air velocity and lower temperature.

Keywords: indoor thermal comfort, educational facility, gender analysis, dry desert climate

Procedia PDF Downloads 127
4005 A Distributed Mobile Agent Based on Intrusion Detection System for MANET

Authors: Maad Kamal Al-Anni

Abstract:

This study is about an algorithmic dependence of Artificial Neural Network on Multilayer Perceptron (MPL) pertaining to the classification and clustering presentations for Mobile Adhoc Network vulnerabilities. Moreover, mobile ad hoc network (MANET) is ubiquitous intelligent internetworking devices in which it has the ability to detect their environment using an autonomous system of mobile nodes that are connected via wireless links. Security affairs are the most important subject in MANET due to the easy penetrative scenarios occurred in such an auto configuration network. One of the powerful techniques used for inspecting the network packets is Intrusion Detection System (IDS); in this article, we are going to show the effectiveness of artificial neural networks used as a machine learning along with stochastic approach (information gain) to classify the malicious behaviors in simulated network with respect to different IDS techniques. The monitoring agent is responsible for detection inference engine, the audit data is collected from collecting agent by simulating the node attack and contrasted outputs with normal behaviors of the framework, whenever. In the event that there is any deviation from the ordinary behaviors then the monitoring agent is considered this event as an attack , in this article we are going to demonstrate the  signature-based IDS approach in a MANET by implementing the back propagation algorithm over ensemble-based Traffic Table (TT), thus the signature of malicious behaviors or undesirable activities are often significantly prognosticated and efficiently figured out, by increasing the parametric set-up of Back propagation algorithm during the experimental results which empirically shown its effectiveness  for the ratio of detection index up to 98.6 percentage. Consequently it is proved in empirical results in this article, the performance matrices are also being included in this article with Xgraph screen show by different through puts like Packet Delivery Ratio (PDR), Through Put(TP), and Average Delay(AD).

Keywords: Intrusion Detection System (IDS), Mobile Adhoc Networks (MANET), Back Propagation Algorithm (BPA), Neural Networks (NN)

Procedia PDF Downloads 164
4004 Risk of Disrupted Eating Attitudes in Disabled Athletes

Authors: Zehra Buyuktuncer, Aylin H. Büyükkaragöz, Tuğçe N. Balcı, Nevin Ergun

Abstract:

Background: Undergoing rigid dietary habits for enhancing athletic performance could lead to eating disorders. High prevalence of eating disorders among female athletes has been already reported. However, the risk of disordered eating among disabled athletes is not known. A better knowledge of the different eating behaviors and their prevalence in disabled athletes would be helpful to understand interactions between eating and health. This study aimed to examine the cognitive restraint, uncontrolled eating and emotional eating behaviors in a disabled athlete population. Method: A total of 70 disabled Turkish national athletes (33 female, 37 male) from 5 sport branches (soccer, weight lifting, shooting, table tennis and basketball) were involved in the study. The cognitive restraint, uncontrolled eating and emotional eating behaviors were assessed using the revised version of Three Factor Eating Questionnaire-R18 (TFEQ-R18). The questionnaires were conducted by dietitian during the preparation camps of athletes. Body weight, height and waist circumference (WC) were measured; and body composition was analyzed by bioelectrical impedance analysis method. Results: The TFEQ scales showed a cognitive dietary restraint score of 13.9±4.2, uncontrolled eating score of 17.7±5.8 and emotional eating score of 4.9±2.5. The mean score of total TFEQ-R18 was 36.5±8.62. Neither total TFEQ-R18 score nor subscale scores differed significantly by gender or sport branches (p>0.05, for each). The scores were also similar in BMI groups (n=63; p>0.05). Total TFEQ, uncontrolled eating and emotional eating scores were significantly higher among the athletes with congenital disabilities compared to the scores of the athletes with acquired disabilities (p<0.05, for each). Moreover, the cognitive dietary restraint score was significantly high in athletes who would like to lose weight (p=0.009). Conclusion: Disabled athletes might have a risk of disordered eating. The different eating behaviors among disabled athletes should be assessed using validated tools to develop personalized nutritional strategies for those athletes.

Keywords: disabled athletes, eating behaviour, three-factor eating questionnaire-r18, body composition

Procedia PDF Downloads 307
4003 Scheduling Flexibility and Employee Health Outcomes: A Meta-Analytic Review

Authors: Nicole V. Shifrin

Abstract:

Scheduling flexibility is becoming an increasingly available option for employees struggling to balance their work and life responsibilities, allowing employees to coordinate work schedules with their additional roles. The goal of such opportunities is to help employees manage the demands they face across domains of life by allowing employees to work from home, design their own work hours, take time off when necessary, along with various other scheduling accommodations. Organizations are also turning to utilizing scheduling flexibility to facilitate employee health and wellbeing through the reduction of stress and maximization of efficiency. The purpose of the present study is to investigate the effects of scheduling flexibility on employee health-related behaviors and outcomes through a synthesis of research. The current meta-analytic review of 19 samples within 16 studies with a total sample size of 20,707 employees examines the relationship between the degree of scheduling flexibility available to employees and the resulting health outcomes and exercise habits. The results demonstrate that reduced scheduling flexibility is associated with poorer health status, suggesting that schedule inflexibility can hinder employees’ ability to maintain and support their health. These findings hold practical implications for developing work schedules to promote employee health and health-related behaviors, such as eating well and exercising. Additionally, there was a positive association between increased scheduling flexibility and engagement in exercise, suggesting that employees with more flexible schedules exercise more frequently than those with less flexible schedules. A potential explanation for the resulting relationship is that flexible schedules leave employees more time due to shorter work days, shorter or eliminated commutes, etc. with which they can use to engage in healthy behaviors. These findings stress the importance of promoting job designs that facilitate employee engagement in healthy behaviors, which directly impact their overall health status. Implications for practice are discussed as well as future directions in examining the link between job design and employee health and well-being.

Keywords: exercise, health, meta-analysis, job design, scheduling flexibility

Procedia PDF Downloads 109
4002 An Improved OCR Algorithm on Appearance Recognition of Electronic Components Based on Self-adaptation of Multifont Template

Authors: Zhu-Qing Jia, Tao Lin, Tong Zhou

Abstract:

The recognition method of Optical Character Recognition has been expensively utilized, while it is rare to be employed specifically in recognition of electronic components. This paper suggests a high-effective algorithm on appearance identification of integrated circuit components based on the existing methods of character recognition, and analyze the pros and cons.

Keywords: optical character recognition, fuzzy page identification, mutual correlation matrix, confidence self-adaptation

Procedia PDF Downloads 509
4001 Identification of Stakeholders and Practices of Inclusive Education

Authors: Luis Javier Serrano-Tamayo

Abstract:

This paper focuses on the recent interest in the concept of inclusion from multiple areas of social sciences, but particularly from the academic studies on what do scholars mean when they refer to inclusive education. Therefore, this paper has been based on a three-year systematic review of near two hundred peer-reviewed documents in the last two decades. The results illustrate some of the use, misuse, and abuse of inclusive education as well as shed some light on the identification of the different stakeholders involved in the dynamic concept of inclusive education and their suggested practices.

Keywords: inclusion, inclusive education, inclusive practices, education stakeholders

Procedia PDF Downloads 194
4000 Violent Videogame Playing and Its Relations to Antisocial Behaviors

Authors: Martin Jelínek, Petr Květon

Abstract:

The presented study focuses on relations between violent videogames playing and various types of antisocial behavior, namely bullying (verbal, indirect, and physical), physical aggression and delinquency. Relevant relationships were also examined with respect to gender. Violent videogames exposure (VGV) was measured by respondents’ most favored games and self-evaluation of its level of violence and frequency of playing. Antisocial behaviors were assessed by self-report questionnaires. The research sample consisted of 333 (166 males, 167 females) primary and secondary school students at the age between 10 and 19 years (m=14.98, sd=1.77). It was found that violent videogames playing is associated with physical aggression (rho=0.288, 95% CI [0.169;0.400]) and bullying (rho=0.369, 95% CI [0.254;0.476]). By means of gender, these relations were slightly weaker in males (VGV - physical aggression: rho=0.104, 95% CI [-0.061;0.264], VGV – bullying: rho=.200, 95% CI [0.032;0.356]) than in females (VGV - physical aggression: rho=0.257, 95% CI [0.089;0.411], VGV – bullying: rho=0.279, 95% CI [0.110;0.432]).

Keywords: aggression, bullying, gender, violent video games

Procedia PDF Downloads 389
3999 Relationships between Screen Time, Internet Addiction and Other Lifestyle Behaviors with Obesity among Secondary School Students in the Turkish Republic of Northern Cyprus

Authors: Ozen Asut, Gulifeiya Abuduxike, Imge Begendi, Mustafa O. Canatan, Merve Colak, Gizem Ozturk, Lara Tasan, Ahmed Waraiet, Songul A. Vaizoglu, Sanda Cali

Abstract:

Obesity among children and adolescents is one of the critical public health problems worldwide. Internet addiction is one of the sedentary behaviors that cause obesity due to the excessive screen time and reduced physical activities. We aimed to examine the relationships between the screen time, internet addiction and other lifestyle behaviors with obesity among high school students in the Near East College in Nicosia, Northern Cyprus. A cross-sectional study conducted among 469 secondary school students, mean age 11.95 (SD, 0.81) years. A self-administrated questionnaire was applied to assess the screen time and lifestyle behaviors. The Turkish adopted version of short-form of internet addiction test was used to assess internet addiction problems. Height and weight were measured to calculate BMI and classified based on the BMI percentiles for sex and age. Descriptive analysis, Chi-Square test, and multivariate regression analysis were done. Of all, 17.2% of the participants were overweight and obese, and 18.1% had internet addictions, while 40.7% of them reported having screen time more than two hours. After adjusting the analysis for age and sex, eating snacks while watching television (OR, 3.04; 95% CI, 1.28-7.21), self- perceived body weight (OR, 24.9; 95% CI, 9.64-64.25) and having a play station in the room (OR, 4.6; 95% CI, 1.85 - 11.42) were significantly associated with obesity. Screen time (OR, 4.68; 95% CI, 2.61-8.38; p=0.000) and having a computer in bedroom (OR, 1.7; 95% CI, 1.01- 2.87; p=0.046) were significantly associated with internet addiction, whereas parent’s compliant regarding the lengthy technology use (OR, 0.23; 95% CI, 0.11-0.46; p=0.000) was found to be a protective factor against internet addiction. Prolonged screen time, internet addiction, sedentary lifestyles, and reduced physical and social activities are interrelated, multi-dimensional factors that lead to obesity among children and adolescents. A family - school-based integrated approach should be implemented to tackle obesity problems.

Keywords: adolescents, internet addiction, lifestyle, Northern Cyprus, obesity, screen time

Procedia PDF Downloads 114
3998 A Study of Evolutional Control Systems

Authors: Ti-Jun Xiao, Zhe Xu

Abstract:

Controllability is one of the fundamental issues in control systems. In this paper, we study the controllability of second order evolutional control systems in Hilbert spaces with memory and boundary controls, which model dynamic behaviors of some viscoelastic materials. Transferring the control problem into a moment problem and showing the Riesz property of a family of functions related to Cauchy problems for some integrodifferential equations, we obtain a general boundary controllability theorem for these second order evolutional control systems. This controllability theorem is applicable to various concrete 1D viscoelastic systems and recovers some previous related results. It is worth noting that Riesz sequences can be used for numerical computations of the control functions and the identification of new Riesz sequence is of independent interest for the basis-function theory. Moreover, using the Riesz sequences, we obtain the existence and uniqueness of (weak) solutions to these second order evolutional control systems in Hilbert spaces. Finally, we derive the exact boundary controllability of a viscoelastic beam equation, as an application of our abstract theorem.

Keywords: evolutional control system, controllability, boundary control, existence and uniqueness

Procedia PDF Downloads 191
3997 Design of Bacterial Pathogens Identification System Based on Scattering of Laser Beam Light and Classification of Binned Plots

Authors: Mubashir Hussain, Mu Lv, Xiaohan Dong, Zhiyang Li, Bin Liu, Nongyue He

Abstract:

Detection and classification of microbes have a vast range of applications in biomedical engineering especially in detection, characterization, and quantification of bacterial contaminants. For identification of pathogens, different techniques are emerging in the field of biomedical engineering. Latest technology uses light scattering, capable of identifying different pathogens without any need for biochemical processing. Bacterial Pathogens Identification System (BPIS) which uses a laser beam, passes through the sample and light scatters off. An assembly of photodetectors surrounded by the sample at different angles to detect the scattering of light. The algorithm of the system consists of two parts: (a) Library files, and (b) Comparator. Library files contain data of known species of bacterial microbes in the form of binned plots, while comparator compares data of unknown sample with library files. Using collected data of unknown bacterial species, highest voltage values stored in the form of peaks and arranged in 3D histograms to find the frequency of occurrence. Resulting data compared with library files of known bacterial species. If sample data matching with any library file of known bacterial species, sample identified as a matched microbe. An experiment performed to identify three different bacteria particles: Enterococcus faecalis, Pseudomonas aeruginosa, and Escherichia coli. By applying algorithm using library files of given samples, results were compromising. This system is potentially applicable to several biomedical areas, especially those related to cell morphology.

Keywords: microbial identification, laser scattering, peak identification, binned plots classification

Procedia PDF Downloads 122
3996 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)

Authors: Reham Al-Zahrani, Noura Aleisa

Abstract:

The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.

Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols

Procedia PDF Downloads 34
3995 Cyber Bullying, Online Risks and Parental Mediation: A Comparison between Adolescent Reports and Parent Perceptions in South Africa

Authors: Masa Popovac, Philip Fine

Abstract:

Information and Communication Technologies (ICTs) have altered our social environments, and young people in particular have immersed themselves in the digital age. Despite countless benefits, younger ICT users are being exposed to various online risks such as contact with strangers, viewing of risky content, sending or receiving sexually themed images or comments (i.e. ‘sexting’) as well as cyber bullying. Parents may not be fully aware of the online spaces their children inhabit and often struggle to implement effective mediation strategies. This quantitative study explored (i) three types of online risks (contact risks, content risks and conduct risks), (ii) cyber bullying victimization and perpetration, and (iii) parental mediation among a sample of 689 South African adolescents aged between 12-17 years. Survey data was also collected for 227 of their parents relating to their perceptions of their child’s online experiences. A comparison between adolescent behaviors and parental perceptions was examined on the three variables in the study. Findings reveal various online risk taking behaviors. In terms of contact risks, 56% of adolescents reported having contact with at least one online stranger, with many meeting these strangers in person. Content risks included exposure to harmful information such as websites promoting extreme diets or self-harm as well as inappropriate content: 84% of adolescents had seen violent content and 75% had seen sexual content online. Almost 60% of adolescents engaged in conduct risks such as sexting. Eight online victimization behaviors were examined in the study and 79% of adolescents had at least one of these negative experiences, with a third (34%) defining this experience as cyber bullying. A strong connection between victimization and perpetration was found, with 63% of adolescents being both a victim and perpetrator. Very little parental mediation of ICT use was reported. Inferential statistics revealed that parents consistently underestimated their child’s online risk taking behaviors as well as their cyber bullying victimization and perpetration. Parents also overestimated mediation strategies in the home. The generational gap in the knowledge and use of ICTs is a barrier to effective parental mediation and online safety, since many negative online experiences by adolescents go undetected and can continue for extended periods of time thereby exacerbating the potential psychological and emotional distress. The study highlights the importance of including parents in online safety efforts.

Keywords: cyber bullying, online risk behaviors, parental mediation, South Africa

Procedia PDF Downloads 454