Search results for: evolutionary cultural algorithm
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7434

Search results for: evolutionary cultural algorithm

7164 Transmission of Values among Polish Young Adults and Their Parents: Pseudo Dyad Analysis and Gender Differences

Authors: Karolina Pietras, Joanna Fryt, Aleksandra Gronostaj, Tomasz Smolen

Abstract:

Young women and men differ from their parents in preferred values. Those differences enable their adaptability to a new socio-cultural context and help with fulfilling developmental tasks specific to young adulthood. At the same time core values, with special importance to family members, are transmitted within families. Intergenerational similarities in values may thus be both an effect of value transmission within a family and a consequence of sharing the same socio-cultural context. These processes are difficult to separate. In our study we assessed similarities and differences in values within four intergenerational family dyads (mothers-daughters, fathers-daughters, mothers-sons, fathers-sons). Sixty Polish young adults (30 women and 30 men aged 19-25) along with their parents (a total of 180 participants) completed the Schwartz’ Portrait Value Questionnaire (PVQ-21). To determine which values may be transmitted within families, we used a correlation analysis and pseudo dyad analysis that allows for the estimation of a baseline likeness between all tested subjects and consequently makes it possible to determine if similarities between actual family members are greater than chance. We also assessed whether different strategies of measuring similarity between family members render different results, and checked whether resemblances in family dyads are influenced by child’s and parent’s gender. Reported similarities were interpreted in light of the evolutionary and the value salience perspective.

Keywords: intergenerational differences in values, gender differences, pseudo dyad analysis, transmission of values

Procedia PDF Downloads 480
7163 Block Based Imperial Competitive Algorithm with Greedy Search for Traveling Salesman Problem

Authors: Meng-Hui Chen, Chiao-Wei Yu, Pei-Chann Chang

Abstract:

Imperial competitive algorithm (ICA) simulates a multi-agent algorithm. Each agent is like a kingdom has its country, and the strongest country in each agent is called imperialist, others are colony. Countries are competitive with imperialist which in the same kingdom by evolving. So this country will move in the search space to find better solutions with higher fitness to be a new imperialist. The main idea in this paper is using the peculiarity of ICA to explore the search space to solve the kinds of combinational problems. Otherwise, we also study to use the greed search to increase the local search ability. To verify the proposed algorithm in this paper, the experimental results of traveling salesman problem (TSP) is according to the traveling salesman problem library (TSPLIB). The results show that the proposed algorithm has higher performance than the other known methods.

Keywords: traveling salesman problem, artificial chromosomes, greedy search, imperial competitive algorithm

Procedia PDF Downloads 422
7162 Dating Violence and Cultural Acceptance among Mexican High School Students

Authors: Libia Yanelli Yanez-Penunuri, Carlos Alejandro Hidalgo-Rasmussen, Cesar Armando Rey-Anacona

Abstract:

Cultural and social norms have a great influence on individual behavior, including the use of violence. In this way, culture can protect against violence, but it can also support and encourage the use of violence. The aim of this study was to analyze differences in cultural acceptance and dating violence among Mexican high school students. A Cross-sectional study was carried out with 867 adolescent Mexican students of high school aged 14 to 18 years old in a dating relationship for at least a month in Guzman City, Mexico. To measure cultural acceptance and dating violence, the questionnaire abuse in dating (CMO) was applied. Informed consent to parents and students was requested. Analyses of descriptive and inferential statistics were performed. Participants were adolescent girls (61.4%) and adolescent boys (38.6%). About 63.7% of adolescents reported cultural acceptance of dating violence in their dating relationships. Associations between physical, sexual, economical dating violence and cultural acceptance were found. No association was found between psychological dating violence and cultural acceptance. The effect size in all dimensions was small. For future research, it is very important to take into consideration the change and evaluation of culture norms to prevent dating violence among adolescents.

Keywords: adolescents, culture, social norms, dating violence, students

Procedia PDF Downloads 160
7161 Genetic Algorithm for Bi-Objective Hub Covering Problem

Authors: Abbas Mirakhorli

Abstract:

A hub covering problem is a type of hub location problem that tries to maximize the coverage area with the least amount of installed hubs. There have not been many studies in the literature about multi-objective hubs covering location problems. Thus, in this paper, a bi-objective model for the hub covering problem is presented. The two objectives that are considered in this paper are the minimization of total transportation costs and the maximization of coverage of origin-destination nodes. A genetic algorithm is presented to solve the model when the number of nodes is increased. The genetic algorithm is capable of solving the model when the number of nodes increases by more than 20. Moreover, the genetic algorithm solves the model in less amount of time.

Keywords: facility location, hub covering, multi-objective optimization, genetic algorithm

Procedia PDF Downloads 20
7160 Gene Prediction in DNA Sequences Using an Ensemble Algorithm Based on Goertzel Algorithm and Anti-Notch Filter

Authors: Hamidreza Saberkari, Mousa Shamsi, Hossein Ahmadi, Saeed Vaali, , MohammadHossein Sedaaghi

Abstract:

In the recent years, using signal processing tools for accurate identification of the protein coding regions has become a challenge in bioinformatics. Most of the genomic signal processing methods is based on the period-3 characteristics of the nucleoids in DNA strands and consequently, spectral analysis is applied to the numerical sequences of DNA to find the location of periodical components. In this paper, a novel ensemble algorithm for gene selection in DNA sequences has been presented which is based on the combination of Goertzel algorithm and anti-notch filter (ANF). The proposed algorithm has many advantages when compared to other conventional methods. Firstly, it leads to identify the coding protein regions more accurate due to using the Goertzel algorithm which is tuned at the desired frequency. Secondly, faster detection time is achieved. The proposed algorithm is applied on several genes, including genes available in databases BG570 and HMR195 and their results are compared to other methods based on the nucleotide level evaluation criteria. Implementation results show the excellent performance of the proposed algorithm in identifying protein coding regions, specifically in identification of small-scale gene areas.

Keywords: protein coding regions, period-3, anti-notch filter, Goertzel algorithm

Procedia PDF Downloads 360
7159 SMART: Solution Methods with Ants Running by Types

Authors: Nicolas Zufferey

Abstract:

Ant algorithms are well-known metaheuristics which have been widely used since two decades. In most of the literature, an ant is a constructive heuristic able to build a solution from scratch. However, other types of ant algorithms have recently emerged: the discussion is thus not limited by the common framework of the constructive ant algorithms. Generally, at each generation of an ant algorithm, each ant builds a solution step by step by adding an element to it. Each choice is based on the greedy force (also called the visibility, the short term profit or the heuristic information) and the trail system (central memory which collects historical information of the search process). Usually, all the ants of the population have the same characteristics and behaviors. In contrast in this paper, a new type of ant metaheuristic is proposed, namely SMART (for Solution Methods with Ants Running by Types). It relies on the use of different population of ants, where each population has its own personality.

Keywords: ant algorithms, evolutionary procedures, metaheuristics, optimization, population-based methods

Procedia PDF Downloads 329
7158 Historico-Cultural Study of the Royal Palace Architecture of the Former Buddhist Kingdom of Mustang, Nepal

Authors: Umesh Regmi

Abstract:

This research briefly covers the historical, cultural, and religious significance of the palaces of Mustang. The research forwards an introduction of the five palaces of Mustang located in Lo Monthang, Tsarang, Thinkar, Ghami, and Dhagmar. These five palaces have survived for centuries till date in different forms of physical condition, though there were originally eight palaces as recorded in the historical sources. The palaces of Mustang are deeply connected to the Buddhist religious practices exhibited through the intangible cultural practices taking place in and around the palaces. The architectural plan and location of religious shrines and halls in certain sections of the palaces are common in all the palaces of the Mustang. The palace of Lo Monthang works as the center of rule, and the other four palaces function as satellite palaces located in the surrounding areas of Lo Monthang. The architectural ensemble of the Palace of Mustang is the symbol of the cultural, administrative, social, and religious authority of the royal family of Mustang. The palace performed the role of unifier of the political and cultural geography of the former independent Buddhist Kingdom of Lo (Mustang).

Keywords: cultural heritage, royal palace, mustang, buddhist kingdom, palace architecture

Procedia PDF Downloads 83
7157 ICanny: CNN Modulation Recognition Algorithm

Authors: Jingpeng Gao, Xinrui Mao, Zhibin Deng

Abstract:

Aiming at the low recognition rate on the composite signal modulation in low signal to noise ratio (SNR), this paper proposes a modulation recognition algorithm based on ICanny-CNN. Firstly, the radar signal is transformed into the time-frequency image by Choi-Williams Distribution (CWD). Secondly, we propose an image processing algorithm using the Guided Filter and the threshold selection method, which is combined with the hole filling and the mask operation. Finally, the shallow convolutional neural network (CNN) is combined with the idea of the depth-wise convolution (Dw Conv) and the point-wise convolution (Pw Conv). The proposed CNN is designed to complete image classification and realize modulation recognition of radar signal. The simulation results show that the proposed algorithm can reach 90.83% at 0dB and 71.52% at -8dB. Therefore, the proposed algorithm has a good classification and anti-noise performance in radar signal modulation recognition and other fields.

Keywords: modulation recognition, image processing, composite signal, improved Canny algorithm

Procedia PDF Downloads 161
7156 Influence of Language Hybridization on the Environmental Friendliness of Cross-Cultural Communication Parameters

Authors: Elena Kovalevich, Irina Tomasheva

Abstract:

The research relevance is caused by the importance of studying features of cross-cultural communication in the system of intensive language contacts, on the one hand, and on the other – by the need of control over the language situation as cross-cultural contacts often reflect emotionally intense reality, destructive for national culture and language and also for health and mentality of the individual. The objective consists in systematization of requirements imposed by the globalized society on ethics, aesthetics and emotive component of cross-cultural communication under conditions of language hybridization of modern Russian-speaking society. Problems connected with establishing the criteria differentiating eco-friendly and eco-unfriendly communication; identifying the specifics of the eco-unfriendly communication containing language hybrids; justifying the negative impact of language hybridization on ethics and esthetics of cross-cultural communication are considered, taking into account the category of emotivity. The study makes a contribution to the development of key problems of modern linguistics connected with exploration of basics in the theory of language personality, ecology of language, emotive linguistics. The results can be used by specialists in the fields of sociolinguistics, cross-cultural communication, the national language policy.

Keywords: cross-cultural communication, eco-linguistics, ethics and aesthetics, emotivity, language hybrids

Procedia PDF Downloads 145
7155 Intangible Cultural Heritage as a Strategic Place Branding Tool

Authors: L. Ozoliņa

Abstract:

Place branding as a strategic marketing tool is applied in Latvia since 2000. The main objective of the study is to find unique connecting aspects of the intangible cultural heritage elements on the development of sustainable place branding. The study is based on in-depth semi-structured interviews with Latvian place branding experts and content analysis of Latvia's place brand identities. The study indicates place branding as an internal co-creational and educational process of all involved stakeholders of the place and highlights a critical view on the local place branding practices on the notability of the in-depth research of the intangible cultural heritage.

Keywords: belonging, identity, intangible cultural heritage, narrative, self-image, place branding

Procedia PDF Downloads 110
7154 The Integration Challenges of Women Refugees in Sweden from Socio-Cultural Perspective

Authors: Khadijah Saeed Khan

Abstract:

One of the major current societal issues of Swedish society is to integrate newcomer refugees well into the host society. The cultural integration issue is one of the under debated topic in the literature, and this study intends to meet this gap from the Swedish perspective. The purpose of this study is to explore the role and types of cultural landscapes of refugee women in Sweden and how these landscapes help or hinder the settlement process. The cultural landscapes are referred to as a set of multiple cultural activities or practices which refugees perform in a specific context and circumstances (i.e., being in a new country) to seek, share or use relevant information for their settlement. Information plays a vital role in various aspects of newcomers' lives in a new country. This article has an intention to highlight the importance of multiple cultural landscapes as a source of information (regarding employment, language learning, finding accommodation, immigration matters, health concerns, school and education, family matters, and other everyday matters) for refugees to settle down in Sweden. Some relevant theories, such as information landscapes and socio-cultural theories, are considered in this study. A qualitative research design is employed, including semi-structured deep interviews and participatory observation with 20 participants. The initial findings show that the refugee women encounter many information-related and integration-related challenges in Sweden and have built a network of cultural landscapes in which they practice various co-ethnic cultural and religious activities at different times of the year. These landscapes help them to build a sense of belonging with people from their own or similar land and assist them to seek and share relevant information in everyday life in Sweden.

Keywords: cultural integration, cultural landscapes, information, women refugees

Procedia PDF Downloads 99
7153 Robotic Arm Control with Neural Networks Using Genetic Algorithm Optimization Approach

Authors: Arbnor Pajaziti, Hasan Cana

Abstract:

In this paper, the structural genetic algorithm is used to optimize the neural network to control the joint movements of robotic arm. The robotic arm has also been modeled in 3D and simulated in real-time in MATLAB. It is found that Neural Networks provide a simple and effective way to control the robot tasks. Computer simulation examples are given to illustrate the significance of this method. By combining Genetic Algorithm optimization method and Neural Networks for the given robotic arm with 5 D.O.F. the obtained the results shown that the base joint movements overshooting time without controller was about 0.5 seconds, while with Neural Network controller (optimized with Genetic Algorithm) was about 0.2 seconds, and the population size of 150 gave best results.

Keywords: robotic arm, neural network, genetic algorithm, optimization

Procedia PDF Downloads 481
7152 A Hybrid Method for Determination of Effective Poles Using Clustering Dominant Pole Algorithm

Authors: Anuj Abraham, N. Pappa, Daniel Honc, Rahul Sharma

Abstract:

In this paper, an analysis of some model order reduction techniques is presented. A new hybrid algorithm for model order reduction of linear time invariant systems is compared with the conventional techniques namely Balanced Truncation, Hankel Norm reduction and Dominant Pole Algorithm (DPA). The proposed hybrid algorithm is known as Clustering Dominant Pole Algorithm (CDPA) is able to compute the full set of dominant poles and its cluster center efficiently. The dominant poles of a transfer function are specific eigenvalues of the state space matrix of the corresponding dynamical system. The effectiveness of this novel technique is shown through the simulation results.

Keywords: balanced truncation, clustering, dominant pole, Hankel norm, model reduction

Procedia PDF Downloads 570
7151 Influence Maximization in Dynamic Social Networks and Graphs

Authors: Gkolfo I. Smani, Vasileios Megalooikonomou

Abstract:

Social influence and influence diffusion have been studied in social networks. However, most existing tasks on this subject focus on static networks. In this paper, the problem of maximizing influence diffusion in dynamic social networks, i.e., the case of networks that change over time, is studied. The DM algorithm is an extension of the MATI algorithm and solves the influence maximization (IM) problem in dynamic networks and is proposed under the linear threshold (LT) and independent cascade (IC) models. Experimental results show that our proposed algorithm achieves a diffusion performance better by 1.5 times than several state-of-the-art algorithms and comparable results in diffusion scale with the Greedy algorithm. Also, the proposed algorithm is 2.4 times faster than previous methods.

Keywords: influence maximization, dynamic social networks, diffusion, social influence, graphs

Procedia PDF Downloads 204
7150 Automatic Facial Skin Segmentation Using Possibilistic C-Means Algorithm for Evaluation of Facial Surgeries

Authors: Elham Alaee, Mousa Shamsi, Hossein Ahmadi, Soroosh Nazem, Mohammad Hossein Sedaaghi

Abstract:

Human face has a fundamental role in the appearance of individuals. So the importance of facial surgeries is undeniable. Thus, there is a need for the appropriate and accurate facial skin segmentation in order to extract different features. Since Fuzzy C-Means (FCM) clustering algorithm doesn’t work appropriately for noisy images and outliers, in this paper we exploit Possibilistic C-Means (PCM) algorithm in order to segment the facial skin. For this purpose, first, we convert facial images from RGB to YCbCr color space. To evaluate performance of the proposed algorithm, the database of Sahand University of Technology, Tabriz, Iran was used. In order to have a better understanding from the proposed algorithm; FCM and Expectation-Maximization (EM) algorithms are also used for facial skin segmentation. The proposed method shows better results than the other segmentation methods. Results include misclassification error (0.032) and the region’s area error (0.045) for the proposed algorithm.

Keywords: facial image, segmentation, PCM, FCM, skin error, facial surgery

Procedia PDF Downloads 549
7149 Optimizing the Probabilistic Neural Network Training Algorithm for Multi-Class Identification

Authors: Abdelhadi Lotfi, Abdelkader Benyettou

Abstract:

In this work, a training algorithm for probabilistic neural networks (PNN) is presented. The algorithm addresses one of the major drawbacks of PNN, which is the size of the hidden layer in the network. By using a cross-validation training algorithm, the number of hidden neurons is shrunk to a smaller number consisting of the most representative samples of the training set. This is done without affecting the overall architecture of the network. Performance of the network is compared against performance of standard PNN for different databases from the UCI database repository. Results show an important gain in network size and performance.

Keywords: classification, probabilistic neural networks, network optimization, pattern recognition

Procedia PDF Downloads 223
7148 Hexagonal Honeycomb Sandwich Plate Optimization Using Gravitational Search Algorithm

Authors: A. Boudjemai, A. Zafrane, R. Hocine

Abstract:

Honeycomb sandwich panels are increasingly used in the construction of space vehicles because of their outstanding strength, stiffness and light weight properties. However, the use of honeycomb sandwich plates comes with difficulties in the design process as a result of the large number of design variables involved, including composite material design, shape and geometry. Hence, this work deals with the presentation of an optimal design of hexagonal honeycomb sandwich structures subjected to space environment. The optimization process is performed using a set of algorithms including the gravitational search algorithm (GSA). Numerical results are obtained and presented for a set of algorithms. The results obtained by the GSA algorithm are much better compared to other algorithms used in this study.

Keywords: optimization, gravitational search algorithm, genetic algorithm, honeycomb plate

Procedia PDF Downloads 350
7147 Least Support Orthogonal Matching Pursuit (LS-OMP) Recovery Method for Invisible Watermarking Image

Authors: Israa Sh. Tawfic, Sema Koc Kayhan

Abstract:

In this paper, first, we propose least support orthogonal matching pursuit (LS-OMP) algorithm to improve the performance, of the OMP (orthogonal matching pursuit) algorithm. LS-OMP algorithm adaptively chooses optimum L (least part of support), at each iteration. This modification helps to reduce the computational complexity significantly and performs better than OMP algorithm. Second, we give the procedure for the invisible image watermarking in the presence of compressive sampling. The image reconstruction based on a set of watermarked measurements is performed using LS-OMP.

Keywords: compressed sensing, orthogonal matching pursuit, restricted isometry property, signal reconstruction, least support orthogonal matching pursuit, watermark

Procedia PDF Downloads 308
7146 Predictive Analysis of Personnel Relationship in Graph Database

Authors: Kay Thi Yar, Khin Mar Lar Tun

Abstract:

Nowadays, social networks are so popular and widely used in all over the world. In addition, searching personal information of each person and searching connection between them (peoples’ relation in real world) becomes interesting issue in our society. In this paper, we propose a framework with three portions for exploring peoples’ relations from their connected information. The first portion focuses on the Graph database structure to store the connected data of peoples’ information. The second one proposes the graph database searching algorithm, the Modified-SoS-ACO (Sense of Smell-Ant Colony Optimization). The last portion proposes the Deductive Reasoning Algorithm to define two persons’ relationship. This study reveals the proper storage structure for connected information, graph searching algorithm and deductive reasoning algorithm to predict and analyze the personnel relationship from peoples’ relation in their connected information.

Keywords: personnel information, graph storage structure, graph searching algorithm, deductive reasoning algorithm

Procedia PDF Downloads 414
7145 Sparse Signal Restoration Algorithm Based on Piecewise Adaptive Backtracking Orthogonal Least Squares

Authors: Linyu Wang, Jiahui Ma, Jianhong Xiang, Hanyu Jiang

Abstract:

the traditional greedy compressed sensing algorithm needs to know the signal sparsity when recovering the signal, but the signal sparsity in the practical application can not be obtained as a priori information, and the recovery accuracy is low, which does not meet the needs of practical application. To solve this problem, this paper puts forward Piecewise adaptive backtracking orthogonal least squares algorithm. The algorithm is divided into two stages. In the first stage, the sparsity pre-estimation strategy is adopted, which can quickly approach the real sparsity and reduce time consumption. In the second stage iteration, the correction strategy and adaptive step size are used to accurately estimate the sparsity, and the backtracking idea is introduced to improve the accuracy of signal recovery. Through experimental simulation, the algorithm can accurately recover the estimated signal with fewer iterations when the sparsity is unknown.

Keywords: compressed sensing, greedy algorithm, least square method, adaptive reconstruction

Procedia PDF Downloads 110
7144 Cultural Embeddedness of E-Participation Methods in Hungary

Authors: Hajnalka Szarvas

Abstract:

The research examines the effectiveness of e-participation tools and methods from a point of view of cultural fitting to the Hungarian community traditions. Participation can have very different meanings depending on the local cultural and historical traditions, experiences of the certain societies. Generally when it is about e-democracy or e-participation tools most of the researches are dealing with its technological sides and novelties, but there is not much said about the cultural and social context of the different platforms. However from the perspective of their success it would be essential to look at the human factor too, the actual users, how the certain DMS or any online platform is fitting to the way of thought, the way of functioning of the certain society. Therefore the paper will explore that to what extent the different online platforms like Loomio, Democracy OS, Your Priorities EVoks, Populus, miutcank.hu, Liquid Democracy, Brain Bar Budapest Lab are compatible with the Hungarian mental structures and community traditions, the contents of collective mind about community functioning. As a result the influence of cultural embeddedness of the logic of e-participation development tools on success of these methods will be clearly seen. Furthermore the most crucial factors in general which determine the efficiency of e-participation development tools in Hungary will be demonstrated.

Keywords: cultural embeddedness, e-participation, local community traditions, mental structures

Procedia PDF Downloads 269
7143 The Load Balancing Algorithm for the Star Interconnection Network

Authors: Ahmad M. Awwad, Jehad Al-Sadi

Abstract:

The star network is one of the promising interconnection networks for future high speed parallel computers, it is expected to be one of the future-generation networks. The star network is both edge and vertex symmetry, it was shown to have many gorgeous topological proprieties also it is owns hierarchical structure framework. Although much of the research work has been done on this promising network in literature, it still suffers from having enough algorithms for load balancing problem. In this paper we try to work on this issue by investigating and proposing an efficient algorithm for load balancing problem for the star network. The proposed algorithm is called Star Clustered Dimension Exchange Method SCDEM to be implemented on the star network. The proposed algorithm is based on the Clustered Dimension Exchange Method (CDEM). The SCDEM algorithm is shown to be efficient in redistributing the load balancing as evenly as possible among all nodes of different factor networks.

Keywords: load balancing, star network, interconnection networks, algorithm

Procedia PDF Downloads 288
7142 An Enhanced Floor Estimation Algorithm for Indoor Wireless Localization Systems Using Confidence Interval Approach

Authors: Kriangkrai Maneerat, Chutima Prommak

Abstract:

Indoor wireless localization systems have played an important role to enhance context-aware services. Determining the position of mobile objects in complex indoor environments, such as those in multi-floor buildings, is very challenging problems. This paper presents an effective floor estimation algorithm, which can accurately determine the floor where mobile objects located. The proposed algorithm is based on the confidence interval of the summation of online Received Signal Strength (RSS) obtained from the IEEE 802.15.4 Wireless Sensor Networks (WSN). We compare the performance of the proposed algorithm with those of other floor estimation algorithms in literature by conducting a real implementation of WSN in our facility. The experimental results and analysis showed that the proposed floor estimation algorithm outperformed the other algorithms and provided highest percentage of floor accuracy up to 100% with 95-percent confidence interval.

Keywords: floor estimation algorithm, floor determination, multi-floor building, indoor wireless systems

Procedia PDF Downloads 394
7141 Research on Dynamic Practical Byzantine Fault Tolerance Consensus Algorithm

Authors: Cao Xiaopeng, Shi Linkai

Abstract:

The practical Byzantine fault-tolerant algorithm does not add nodes dynamically. It is limited in practical application. In order to add nodes dynamically, Dynamic Practical Byzantine Fault Tolerance Algorithm (DPBFT) was proposed. Firstly, a new node sends request information to other nodes in the network. The nodes in the network decide their identities and requests. Then the nodes in the network reverse connect to the new node and send block information of the current network. The new node updates information. Finally, the new node participates in the next round of consensus, changes the view and selects the master node. This paper abstracts the decision of nodes into the undirected connected graph. The final consistency of the graph is used to prove that the proposed algorithm can adapt to the network dynamically. Compared with the PBFT algorithm, DPBFT has better fault tolerance and lower network bandwidth.

Keywords: practical byzantine, fault tolerance, blockchain, consensus algorithm, consistency analysis

Procedia PDF Downloads 101
7140 Migration and Identity Erosion: An Exploratory Study of First Generation Nigerian-Americans

Authors: Lolade Siyonbola

Abstract:

Nigerians are often celebrated as being the most educated cultural group in America. The cultural values and history that have led to this reality are particular to a generation that came of age post colonialism. Many of these cultural values have been passed down from post-colonial parent to millennial child, but most have not. This study, based on interviews and surveys of Nigerian millennials and their parents in the United States, explores the degree to which identity has been eroded in the millennial generation due to a lack of imparted cultural values and knowledge from the previous generation. Most of the subjects do not speak their native language or identify with their cultural heritage sufficiently to build ties with their native land. Most are experiencing some degree of identity crisis, and therefore limited self-actualization, with little to no support; as there are few successful tools available to this population. If governmental programs to reverse these trends are not implemented within this generation, the implications to the individual, family and home nation (Nigeria), will be felt for generations to come.

Keywords: identity, culture, self-actualization, social identity theory, migration, transnationalism, value systems

Procedia PDF Downloads 345
7139 Addressing Cultural Discrimination in Research Design: The Responsibilities of Ethics Committees

Authors: Elspeth McInnes

Abstract:

Research design is central to ethical research. Discriminatory research design is a key risk for researchers examining diverse cultural groups without conscious commitment to anti-discrimination values or knowledge of their culture. Culturally discriminatory research design is defined here as research proceeding from negative assumptions about people on the basis of race, colour, ethnicity, nationality or religion. Such discrimination can be direct or indirect. Direct discrimination is the uncritical mobilization of dominant group negative stereotypes of cultural minorities. Indirect discrimination is the examination of policies or programs grounded in dominant culture negative stereotypes that have been uncritically accepted by the researchers. This paper draws on anonymized elements of planned research projects and considers both direct and indirect cultural discrimination in research design and the responsibilities of ethics committees. Human research ethics committees provide a point of scrutiny with responsibility to alert researchers to risks of basing research on negative cultural stereotypes, as well as protecting participants from being subjected to negative discourses about them. This issue has become an increasing concern in a globalizing world of human displacement and migration creating a rise in the presence of minority cultures in host countries. As a nation established through colonization and immigration Australia has a long history of negative cultural stereotypes of Indigenous Australians as well as a legacy of the White Australia policy, which still echoes in attitudes to each wave of non-European immigration. The task of eliminating cultural discrimination in research design is vital to sustaining research integrity and ensuring that research is not used to reinforce or justify cultural discrimination.

Keywords: cultural discrimination, cultural stereotypes, participant risk, research design

Procedia PDF Downloads 107
7138 Arabic Lexicon Learning to Analyze Sentiment in Microblogs

Authors: Mahmoud B. Rokaya

Abstract:

The study of opinion mining and sentiment analysis includes analysis of opinions, sentiments, evaluations, attitudes, and emotions. The rapid growth of social media, social networks, reviews, forum discussions, microblogs, and Twitter, leads to a parallel growth in the field of sentiment analysis. The field of sentiment analysis tries to develop effective tools to make it possible to capture the trends of people. There are two approaches in the field, lexicon-based and corpus-based methods. A lexicon-based method uses a sentiment lexicon which includes sentiment words and phrases with assigned numeric scores. These scores reveal if sentiment phrases are positive or negative, their intensity, and/or their emotional orientations. Creation of manual lexicons is hard. This brings the need for adaptive automated methods for generating a lexicon. The proposed method generates dynamic lexicons based on the corpus and then classifies text using these lexicons. In the proposed method, different approaches are combined to generate lexicons from text. The proposed method classifies the tweets into 5 classes instead of +ve or –ve classes. The sentiment classification problem is written as an optimization problem, finding optimum sentiment lexicons are the goal of the optimization process. The solution was produced based on mathematical programming approaches to find the best lexicon to classify texts. A genetic algorithm was written to find the optimal lexicon. Then, extraction of a meta-level feature was done based on the optimal lexicon. The experiments were conducted on several datasets. Results, in terms of accuracy, recall and F measure, outperformed the state-of-the-art methods proposed in the literature in some of the datasets. A better understanding of the Arabic language and culture of Arab Twitter users and sentiment orientation of words in different contexts can be achieved based on the sentiment lexicons proposed by the algorithm.

Keywords: social media, Twitter sentiment, sentiment analysis, lexicon, genetic algorithm, evolutionary computation

Procedia PDF Downloads 149
7137 EnumTree: An Enumerative Biclustering Algorithm for DNA Microarray Data

Authors: Haifa Ben Saber, Mourad Elloumi

Abstract:

In a number of domains, like in DNA microarray data analysis, we need to cluster simultaneously rows (genes) and columns (conditions) of a data matrix to identify groups of constant rows with a group of columns. This kind of clustering is called biclustering. Biclustering algorithms are extensively used in DNA microarray data analysis. More effective biclustering algorithms are highly desirable and needed. We introduce a new algorithm called, Enumerative tree (EnumTree) for biclustering of binary microarray data. is an algorithm adopting the approach of enumerating biclusters. This algorithm extracts all biclusters consistent good quality. The main idea of ​​EnumLat is the construction of a new tree structure to represent adequately different biclusters discovered during the process of enumeration. This algorithm adopts the strategy of all biclusters at a time. The performance of the proposed algorithm is assessed using both synthetic and real DNA micryarray data, our algorithm outperforms other biclustering algorithms for binary microarray data. Biclusters with different numbers of rows. Moreover, we test the biological significance using a gene annotation web tool to show that our proposed method is able to produce biologically relevent biclusters.

Keywords: DNA microarray, biclustering, gene expression data, tree, datamining.

Procedia PDF Downloads 342
7136 Collective Strategies Dominate in Spatial Iterated Prisoners Dilemma

Authors: Jiawei Li

Abstract:

How cooperation emerges and persists in a population of selfish agents is a fundamental question in evolutionary game theory. Our research shows that Collective Strategies with Master-Slave Mechanism (CSMSM) defeat Tit-for-Tat and other well-known strategies in spatial iterated prisoner’s dilemma. A CSMSM identifies kin members by means of a handshaking mechanism. If the opponent is identified as non-kin, a CSMSM will always defect. Once two CSMSMs meet, they play master and slave roles. A mater defects and a slave cooperates in order to maximize the master’s payoff. CSMSM outperforms non-collective strategies in spatial IPD even if there is only a small cluster of CSMSMs in the population. The existence and performance of CSMSM in spatial iterated prisoner’s dilemma suggests that cooperation first appears and persists in a group of collective agents.

Keywords: Evolutionary game theory, spatial prisoners dilemma, collective strategy, master-slave mechanism

Procedia PDF Downloads 113
7135 Elimination of Low Order Harmonics in Multilevel Inverter Using Nature-Inspired Metaheuristic Algorithm

Authors: N. Ould Cherchali, A. Tlemçani, M. S. Boucherit, A. Morsli

Abstract:

Nature-inspired metaheuristic algorithms, particularly those founded on swarm intelligence, have attracted much attention over the past decade. Firefly algorithm has appeared in approximately seven years ago, its literature has enlarged considerably with different applications. It is inspired by the behavior of fireflies. The aim of this paper is the application of firefly algorithm for solving a nonlinear algebraic system. This resolution is needed to study the Selective Harmonic Eliminated Pulse Width Modulation strategy (SHEPWM) to eliminate the low order harmonics; results have been applied on multilevel inverters. The final results from simulations indicate the elimination of the low order harmonics as desired. Finally, experimental results are presented to confirm the simulation results and validate the efficaciousness of the proposed approach.

Keywords: firefly algorithm, metaheuristic algorithm, multilevel inverter, SHEPWM

Procedia PDF Downloads 119