Search results for: false friends
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 732

Search results for: false friends

462 Fast and Accurate Model to Detect Ictal Waveforms in Electroencephalogram Signals

Authors: Piyush Swami, Bijaya Ketan Panigrahi, Sneh Anand, Manvir Bhatia, Tapan Gandhi

Abstract:

Visual inspection of electroencephalogram (EEG) signals to detect epileptic signals is very challenging and time-consuming task even for any expert neurophysiologist. This problem is most challenging in under-developed and developing countries due to shortage of skilled neurophysiologists. In the past, notable research efforts have gone in trying to automate the seizure detection process. However, due to high false alarm detections and complexity of the models developed so far, have vastly delimited their practical implementation. In this paper, we present a novel scheme for epileptic seizure detection using empirical mode decomposition technique. The intrinsic mode functions obtained were then used to calculate the standard deviations. This was followed by probability density based classifier to discriminate between non-ictal and ictal patterns in EEG signals. The model presented here demonstrated very high classification rates ( > 97%) without compromising the statistical performance. The computation timings for each testing phase were also very low ( < 0.029 s) which makes this model ideal for practical applications.

Keywords: electroencephalogram (EEG), epilepsy, ictal patterns, empirical mode decomposition

Procedia PDF Downloads 374
461 The Results of Research Based-Learning for Developing the Learning and Innovation Skills of Undergraduate Students

Authors: Jatuphum Ketchatturat

Abstract:

The objective of this research was to study the learning and innovation skills of undergraduate students after Research-Based Learning had been applied. Eighty research participants were selected from undergraduate students enrolled in Educational Research Program using the Purposive Sampling Method. Research Methodology was Descriptive Research, the research took one semester to complete. The research instruments consisted of (1) Research Skill Assessment Form, (2) Research Quality Assessment Form, (3) Scale of learning and innovation skills 25 items. The quantitative data were analysed using descriptive statistics including, frequency, percentage, average and standard deviation. The qualitative data were analyzed using content analysis. The research results were (1) The students were able to conduct research that focused on educational research, which has a fair to the excellent level of standards of a research learning outcome, research skills, and research quality. The student’s learning and innovation skills have relating to research skills and research quality. (2) The findings found that the students have been developed to be learning and innovation skills such as systematic thinking, analytical thinking, critical thinking, creative problem solving, collaborative, research-creation, communication, and knowledge and experience sharing to friends, community and society.

Keywords: learning and innovation skills, research based learning, research skills, undergraduate students

Procedia PDF Downloads 153
460 Volunteering and Social Integration of Ex-Soviet Immigrants in Israel

Authors: Natalia Khvorostianov, Larissa Remennick

Abstract:

Recent immigrants seldom join the ranks of volunteers for various social causes. This gap reflects both material reasons (immigrants’ lower income and lack of free time) and cultural differences (value systems, religiosity, language barrier, attitudes towards host society, etc.). Immigrants from the former socialist countries are particularly averse to organized forms of volunteering for a host of reasons rooted in their past, including the memories of false or forced forms of collectivism imposed by the state. In this qualitative study, based on 21 semi-structured interviews, we explored the perceptions and practices of volunteer work among FSU immigrants - participants in one volunteering project run by an Israeli NGO for the benefit of elderly ex-Soviet immigrants. Our goal was to understand the motivations of immigrant volunteers and the role of volunteering in the processes of their own social and economic integration in their adopted country – Israel. The results indicate that most volunteers chose causes targeting fellow immigrants, their resettlement and well-being, and were motivated by the wish to build co-ethnic support network and overcome marginalization in the Israeli society. Other volunteers were driven by the need for self-actualization in the context of underemployment and occupational downgrading.

Keywords: FSU immigrants, integration, volunteering, participation, social capital

Procedia PDF Downloads 365
459 Attendance Management System Implementation Using Face Recognition

Authors: Zainab S. Abdullahi, Zakariyya H. Abdullahi, Sahnun Dahiru

Abstract:

Student attendance in schools is a very important aspect in school management record. In recent years, security systems have become one of the most demanding systems in school. Every institute have its own method of taking attendance, many schools in Nigeria use the old fashion way of taking attendance. That is writing the students name and registration number in a paper and submitting it to the lecturer at the end of the lecture which is time-consuming and insecure, because some students can write for their friends without the lecturer’s knowledge. In this paper, we propose a system that takes attendance using face recognition. There are many automatic methods available for this purpose i.e. biometric attendance, but they all waste time, because the students have to follow a queue to put their thumbs on a scanner which is time-consuming. This attendance is recorded by using a camera attached in front of the class room and capturing the student images, detect the faces in the image and compare the detected faces with database and mark the attendance. The principle component analysis was used to recognize the faces detected with a high accuracy rate. The paper reviews the related work in the field of attendance system, then describe the system architecture, software algorithm and result.

Keywords: attendance system, face detection, face recognition, PCA

Procedia PDF Downloads 329
458 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine

Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour

Abstract:

Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.

Keywords: decision tree, feature selection, intrusion detection system, support vector machine

Procedia PDF Downloads 232
457 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection

Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim

Abstract:

As internet continues to expand its usage with an enormous number of applications, cyber-threats have significantly increased accordingly. Thus, accurate detection of malicious traffic in a timely manner is a critical concern in today’s Internet for security. One approach for intrusion detection is to use Machine Learning (ML) techniques. Several methods based on ML algorithms have been introduced over the past years, but they are largely limited in terms of detection accuracy and/or time and space complexity to run. In this work, we present a novel method for intrusion detection that incorporates a set of supervised learning algorithms. The proposed technique provides high accuracy and outperforms existing techniques that simply utilizes a single learning method. In addition, our technique relies on partial flow information (rather than full information) for detection, and thus, it is light-weight and desirable for online operations with the property of early identification. With the mid-Atlantic CCDC intrusion dataset publicly available, we show that our proposed technique yields a high degree of detection rate over 99% with a very low false alarm rate (0.4%).

Keywords: intrusion detection, supervised learning, traffic classification, computer networks

Procedia PDF Downloads 316
456 An Overview of Privacy and Security Issues in Social Networks

Authors: Mohamad Ibrahim Al Ladan

Abstract:

Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 272
455 Providing Emotional Support to Children under Long-Term Health Treatments

Authors: Ramón Cruzat, Sergio F. Ochoa, Ignacio Casas, Luis A. Guerrero, José Bravo

Abstract:

Patients under health treatments that involve long stays at a hospital or health centre (e.g. cancer, organ transplants and severe burns), tend to get bored or depressed because of the lack of social interaction with family and friends. Such a situation also affects the evolution and effectiveness of their treatments. In many cases, the solution to this problem involves extra challenges, since many patients need to rest quietly (or remain in bed) to their being contagious. Considering the weak health condition in which usually are these kinds, keeping them motivated and quiet represents an important challenge for nurses and caregivers. This article presents a mobile ubiquitous game called MagicRace, which allows hospitalized kinds to interact socially with one another without putting to risk their sensitive health conditions. The game does not require a communication infrastructure at the hospital, but instead, it uses a mobile ad hoc network composed of the handheld devices used by the kids to play. The usability and performance of this application was tested in two different sessions. The preliminary results show that users experienced positive feelings from this experience.

Keywords: ubiquitous game, children's emotional support, social isolation, mobile collaborative interactions

Procedia PDF Downloads 404
454 Teaching in the Post Truth Era: A Narrative Analysis of Modern Anti-Scientific Discourses in the Classroom

Authors: Jason T. Hilton

Abstract:

The ‘post-truth era’ is marked by a shift toward a period in which objective facts are less influential in shaping public opinion than appeals to emotion and personal belief. Applying narrative analysis techniques to current public discourses in education that run counter to scientific findings, it becomes possible to identify weakness in modern pedagogy and suggest ways to counter false narratives in the classroom. Results of this study indicate that a failure to engage with popular narratives lessens teachers’ ability to be convincing in the classroom, even when presenting information supported by scientific evidence. This study seeks to empower teachers by illustrating the influence of story within the post-truth era and the ways in which narrative and rhetorical elements take hold in social media contexts. Equipped with this knowledge, teachers can create a shift in pedagogy, away from transmission of knowledge toward the crafting of powerful narratives, built upon evidence, and connected to the lives of modern learners.

Keywords: 21st century learner, critical pedagogy, culture, narrative, post-truth era, social media

Procedia PDF Downloads 235
453 Hate Speech Detection Using Machine Learning: A Survey

Authors: Edemealem Desalegn Kingawa, Kafte Tasew Timkete, Mekashaw Girmaw Abebe, Terefe Feyisa, Abiyot Bitew Mihretie, Senait Teklemarkos Haile

Abstract:

Currently, hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers and provide an online forum for debate about specific issues of community life, culture, politics, and others. Despite this, research on identifying and detecting hate speech is not satisfactory performance, and this is why future research on this issue is constantly called for. This paper provides a systematic review of the literature in this field, with a focus on approaches like word embedding techniques, machine learning, deep learning technologies, hate speech terminology, and other state-of-the-art technologies with challenges. In this paper, we have made a systematic review of the last six years of literature from Research Gate and Google Scholar. Furthermore, limitations, along with algorithm selection and use challenges, data collection, and cleaning challenges, and future research directions, are discussed in detail.

Keywords: Amharic hate speech, deep learning approach, hate speech detection review, Afaan Oromo hate speech detection

Procedia PDF Downloads 140
452 Perception of the Frequency and Importance of Peer Social Support by Students with Special Educational Needs in Inclusive Education

Authors: Lucia Hrebeňárová, Jarmila Žolnová, Veronika Palková

Abstract:

Inclusive education of students with special educational needs has been on the increase in the Slovak Republic, facing many challenges. Preparedness of teachers for inclusive education is one of the most frequent issues; teachers lack skills when it comes to the use of effective instruction depending on the individual needs of students, improvement of classroom management and social skills, and support of inclusion within the classroom. Social support is crucial for the school success of students within inclusive settings. The aim of the paper is to analyse perception of the frequency and importance of peer social support by students with special educational needs in inclusive education. The data collection tool used was the Child and Adolescent Social Support Scale (CASSS). The research sample consisted of 953 fourth grade students – 141 students with special educational needs educated in an inclusive setting and 812 students of the standard population. No significant differences were found between the students with special educational needs and the students without special educational needs in an inclusive setting when it comes to the perception of frequency and importance of social support of schoolmates and friends. However, the perception of frequency and importance of a friend’s social support was higher than the perception of frequency and importance of a classmate’s social support in both groups of students.

Keywords: inclusive education, peer social support, peer, student with special eEducational needs

Procedia PDF Downloads 388
451 Strabismus Detection Using Eye Alignment Stability

Authors: Anoop T. R., Otman Basir, Robert F. Hess, Ben Thompson

Abstract:

Strabismus refers to a misalignment of the eyes. Early detection and treatment of strabismus in childhood can prevent the development of permanent vision loss due to abnormal development of visual brain areas. Currently, many children with strabismus remain undiagnosed until school entry because current automated screening methods have limited success in the preschool age range. A method for strabismus detection using eye alignment stability (EAS) is proposed. This method starts with face detection, followed by facial landmark detection, eye region segmentation, eye gaze extraction, and eye alignment stability estimation. Binarization and morphological operations are performed for segmenting the pupil region from the eye. After finding the EAS, its absolute value is used to differentiate the strabismic eye from the non-strabismic eye. If the value of the eye alignment stability is greater than a particular threshold, then the eyes are misaligned, and if its value is less than the threshold, the eyes are aligned. The method was tested on 175 strabismic and non-strabismic images obtained from Kaggle and Google Photos. The strabismic eye is taken as a positive class, and the non-strabismic eye is taken as a negative class. The test produced a true positive rate of 100% and a false positive rate of 7.69%.

Keywords: strabismus, face detection, facial landmarks, eye segmentation, eye gaze, binarization

Procedia PDF Downloads 47
450 Multi-Generational Analysis of Perception and Acceptance of Mental Illnesses: Current Indian Context

Authors: Anvi Kumar

Abstract:

This paper explores the attitudes and awareness of multiple generations ranging from Boomers I to GenZ (i.e. from 1954 to 2012) towards mental health issues. A convenient sample of 191 people was gathered in India aged 11-77. 20 people each were considered from 5 generational cohorts, namely- Boomers I, Boomers II, Gen X, Millennials, and Gen Z. The study tool comprised a survey that included demographic questions and the Community Attitude towards Mental Illness (CAMI) scale by Taylor & Dear (1981). Descriptive statistics, ANOVA, and Bonferonni’s post-hoc analysis have been used to perform the analysis. The findings reveal that the level of kindness towards those who struggle with mental health varies through certain age groups. An overall sense of exclusion of those struggling with mental health is prevalent among all age groups. GenZ’s awareness of mental health issues is primarily via social media, as against the rest of the generations seeking it from close relatives and friends. The study’s findings suggest a need to investigate further the quality of mental health knowledge content and its consumption pattern. Understanding the dynamics of information sharing and the potential for biases requires further discovery.

Keywords: attitude, behaviour, mental illness, Gen Z, millennials, Gen Y, multi-generations, generational differences

Procedia PDF Downloads 45
449 Investigation of Diseases and Enemies of Bees of Breeding Apis mellifera intermissa (Buttel-Reepen, 1906)

Authors: S. Zenia, L. Bitta, O. Bouhamam, H. Brines, M. Boudriaa, F. Haddadj, F. Marniche, A. Milla, H. Saadi, A. Smai

Abstract:

The bee Apis mellifera intermissa is a major social insect, in addition to its honey production, it is a pillar of our biodiversity. Several living organisms can come into contact with it: bacteria, viruses, protozoa, fungi, mites, and insects. In Algeria, many beekeepers have reported unusual mortality of local bees, loss of foragers and significant losses of their livestock. Despite the presence of a varied honey-bearing flora and a favourable Mediterranean climate, honey production remains low. This phenomenon can be attributed to the excess winter mortality, but also to the increasing difficulties that beekeepers face in maintaining healthy bee colonies, particularly bee diseases and their transmission facilitated by trade and beekeeping practices. Our survey is based on a questionnaire composed of several parts. The results obtained show that the disease that most affects bees according to beekeepers is varroa mite with 93% followed by fungi with 26%. The most replied enemy of bees is the false ringworm with 73%, followed by the bee-eater with 63%. Our goal is to determine the causes of this low production in two areas: Bejaia and Tizi-Ouzou.

Keywords: diseases, Apis mellifera L., varroa, European foulbrood

Procedia PDF Downloads 136
448 The Behavior and Satisfaction of Tourists Affecting the Sustainable Tourism at the Amphawa Floating Market in Samut Songkhram Province

Authors: Chanpen Meenakorn

Abstract:

This research aims to study; (1) behavior of the tourists affecting the satisfaction level of tourism at the Amphawa floating market in Samut Songkhram province, (2) to study the satisfaction level of tourism at the Amphawa floating market. The research method will use quantitative research; data was collected by questionnaires distributed to the tourist who visits the Amphawa floating market for 480 samples. Data was analyzed by SPSS software to process descriptive statistic including frequency, percentage, mean, standard deviation and inferential statistic is t-test, F-test, and chi-square. The results showed that the behavior of tourists had known tourist attractions in the province comes from the mouth of relatives and friends suggested that he come here before and the reasons to visit is to want to pay homage to the various temples for the frequency to visit travel an average of 2-4 times and  the satisfaction of the tourists in the province found that the satisfaction level of tourists in the province at the significant level of the place, convenient  and services have a high level of satisfaction.

Keywords: amphawa floating market behavior of the tourists, satisfaction level, sustainable tourism, Samut Songkhram province

Procedia PDF Downloads 339
447 Attitude of Youth Farmers to Climate Change Adaptation and Mitigation in Benue State, Nigeria

Authors: Cynthia E. Nwobodo, A. E. Agwu

Abstract:

The study was carried out in Benue State, Nigeria. Multi-stage sampling technique was used to select 120 respondents from two agricultural zones in the State. Data was collected using interview schedule. Descriptive statistics was used in data analysis. Findings showed that youth farmers in the area had positive attitude to climate change adaptation and mitigation as shown by their response to a set of positive and negative statement including: the youth are very important stakeholders in climate change issues (M= 2.91), youths should be encouraged to be climate change conscious (2.90), everybody should be involved in planting trees not just the government (M= 2.89), I will be glad to participate in climate change seminars (M= 2.89) among others. Findings on information seeking behavior indicate that majority (80.8 %) of the respondents sought climate change information from radio at an average of 19.78 times per month, 53.3 % sought from friends and neighbours at an average of 12.55 times per month and 42.5 % sought from family members at an average of 12.55 times per month among others. It was recommended that Youth farmers should be made important stakeholders in climate change policies and programmes since they have a very positive attitude to climate change adaptation and mitigation.

Keywords: adaptation, mitigation, attitude, climate change, youth farmers

Procedia PDF Downloads 610
446 A Thematic Analysis of Aging in Blue Zone Regions: Lessons from Okinawa and the Nicoya Peninsula

Authors: Theresa MacNeil-Kelly

Abstract:

Blue Zones are particular regions of the world with a high prevalence of centenarians who share common characteristics, lifestyles and environments. There are currently only five recognized Blue Zones, two of which include Okinawa, Japan and the Nicoya Peninsula in Costa Rica. Individuals living in these areas tend to have positive outlooks on life, utilize daily movement, rely on strong social support groups, and eat little to no processed foods. The current research sought to further understand how centenarians living in Okinawa and in the Nicoya Peninsula utilize Blue Zone lifestyle elements in their daily living habits. To accomplish this, the author traveled to both Okinawa and the Nicoya Peninsula, Costa Rica, and interviewed several centenarians, paying particular attention to lifestyle choices and their effects on the aging process. Thematic analysis was used to analyze interview responses, and several themes emerged, such as the importance of family, friends, faith/spirituality, mindfulness, nutrition and daily movement as key foundations to aging in healthy and productive ways. Suggestions for ways to implement these habits globally was also discussed.

Keywords: aging, blue zones, centenarians, nicoya peninsula, okinawa

Procedia PDF Downloads 229
445 The Impact of Emoticons in the Workplace: Legal Challenges and Regulatory Change

Authors: Jacques C. Duvenhage

Abstract:

The use of emoticons or so-called ‘emojis’ has gained much attention, not only in the daily use thereof with friends or family but also within the workplace amongst co-workers and employers. Even though emojis may be seen as a way to express feelings or even ideas, it may present legal challenges in the workplace. With new emojis being created on a daily basis, communicating through emojis, whether via phone, email or social media platforms, can become convoluted, especially within the working environment. The question to be addressed is how and/or whether Australian legislators will regulate the use of emojis (as a form of technology) in the workplace to prevent harassment, discrimination and other forms of prejudice. The emojis sent to co-workers may be interpreted by employees and even employers in different ways depending on their age, sexual orientation, and cultural background. Therefore, Australian courts will need to interpret an emoji’s meaning on a case-by-case basis. This paper will explore the use of emojis in the workplace (drawing on a desktop study), the impact emojis have on the employer-employee relationship as well as co-worker relationships, its legal application through case studies and whether a legal framework should be adopted by Australian legislators on this issue. Furthermore, this paper will reflect on the legal framework and application of emojis in the workplace considering foreign jurisdictions such as the United Kingdom and the United States of America and whether Australia should adopt similar legal approaches to these jurisdictions.

Keywords: emoticons, legal approaches, regulation, workplace

Procedia PDF Downloads 120
444 Bicycle Tourism and Sharing Economy (C2C-Tourism): Analysis of the Reciprocity Behavior in the Case of Warmshowers

Authors: Jana Heimel, Franziska Drescher, Lauren Ugur, Graciela Kuchle

Abstract:

Sharing platforms are a widely investigated field. However, there is a research gap with a lack of focus on ‘real’ (non-profit-orientated) sharing platforms. The research project addresses this gap by conducting an empirical study on a private peer-to-peer (P2P) network to investigate cooperative behavior from a socio-psychological perspective. In recent years the conversion from possession to accessing is increasingly influencing different sectors, particularly the traveling industry. The number of people participating in hospitality exchange platforms like Airbnb, Couchsurfing, and Warmshowers (WS) is rapidly growing. WS is an increasingly popular online community that is linking cycling tourists and locals. It builds on the idea of the “sharing economy” as a not-for-profit hospitality network for bicycle tourists. Hosts not only provide a sleeping berth and warm shower free of charge but also offer additional services to their guests, such as cooking and washing clothes for them. According to previous studies, they are motivated by the idea of promoting cultural experience and forming new friendships. Trust and reciprocity are supposed to play major roles in the success of such platforms. The objective of this research project is to analyze the reciprocity behavior within the WS community. Reciprocity is the act of giving and taking among each other. Individuals feel obligated to return a favor and often expect to increase their own chances of receiving future benefits for themselves. Consequently, the drivers that incite giving and taking, as well as the motivation for hosts and guests, are examined. Thus, the project investigates a particular tourism offer that contributes to sustainable tourism by analyzing P2P resp. cyclist-to-cyclist, C2C) tourism. C2C tourism is characterized by special hospitality and generosity. To find out what motivations drive the hosts and which determinants drive the sharing cycling economy, an empirical study has been conducted globally through an online survey. The data was gathered through the WS community and comprised responses from more than 10,000 cyclists around the globe. Next to general information mostly comprising quantitative data on bicycle tourism (year/tour distance, duration and budget), qualitative information on traveling with WS as well as hosting was collected. The most important motivations for a traveler is to explore the local culture, to save money, and to make friends. The main reasons to host a guest are to promote the use of bicycles and to make friends, but also to give back and pay forward. WS members prefer to stay with/host cyclists. The results indicate that C2C tourists share homogenous characteristics and a similar philosophy, which is crucial for building mutual trust. Members of WS are generally extremely trustful. The study promotes an ecological form of tourism by combining sustainability, regionality, health, experience and the local communities' cultures. The empirical evidence found and analyzed, despite evident limitations, enabled us to shed light, especially on the issue of motivations and social capital, and on the functioning of ‘sharing’ platforms. Final research results are intended to promote C2C tourism around the globe to further replace conventional by sustainable tourism.

Keywords: bicycle tourism, homogeneity, reciprocity, sharing economy, trust

Procedia PDF Downloads 90
443 Analyse of User Interface Design in Mobile Teaching Apps

Authors: Asma Ashoul

Abstract:

Nowadays, smartphones are playing a major role in our lives, by communicating with family, friends or using them to learn different things in life. Using smartphones to learn and teach today is something common to see in places like schools or colleges. Therefore, thinking about developing an app that teaches Arabic language may help some categories in society to learn a second language. For example, kids under the age of five or older would learn fast by using smartphones. The problem is based on the Arabic language, which is most like to be not used anymore. The developer assumed to develop an app that would help the younger generation on their learning the Arabic language. A research was completed about user interface design to help the developer choose appropriate layouts and designs. Developing the artefact contained different stages. First, analyzing the requirements with the client, which is needed to be developed. Secondly, designing the user interface design based on the literature review. Thirdly, developing and testing the application after it is completed contacting all the tools that have been used. Lastly, evaluation and future recommendation, which contained the overall view about the application followed by the client’s feedback. Gathering the requirements after having client meetings based on the interface design. The project was done following an agile development methodology. Therefore, this methodology helped the developer to manage to finish the work on time.

Keywords: developer, application, interface design, layout, Agile, client

Procedia PDF Downloads 87
442 Students' Perceptions of Social Media as a Means to Improve Their Language Skills

Authors: Bahia Braktia, Ana Marcela Montenegro Sanchez

Abstract:

Social media, such as Facebook, Twitter, and YouTube, has been used for teaching and learning for quite some time. These platforms have been proven to be a good tool to improve various language skills, students’ performance of the English language, motivation as well as trigger the authentic language interaction. However, little is known about the potential effects of social media usage on the learning performance of Arabic language learners. The present study explores the potential role that the social media technologies play in learning Arabic as a foreign language at a university in Southeast of United States. In order to investigate this issue, an online survey was administered to examine the perceptions and attitudes of American students learning Arabic. The research questions were: How does social media, specifically Facebook and Twitter, impact the students' Arabic language skills, and what is their attitude toward it? The preliminary findings of the study showed that students had a positive attitude toward the use of social media to enhance their Arabic language skills, and that they used a range of social media features to expose themselves to the Arabic language and communicate in Arabic with native Arabic speaking friends. More detailed findings will be shared in the light data analysis with the audience during the presentation.

Keywords: foreign language learning, social media, students’ perceptions, survey

Procedia PDF Downloads 171
441 Thai Perception on Litecoin Value

Authors: Toby Gibbs, Suwaree Yordchim

Abstract:

This research analyzes factors affecting the success of Litecoin Value within Thailand and develops a guideline for self-reliance for effective business implementation. Samples in this study included 119 people through surveys. The results revealed four main factors affecting the success as follows: 1) Future Career training should be pursued in applied Litecoin development. 2) Didn't grasp the concept of a digital currency or see the benefit of a digital currency. 3) There is a great need to educate the next generation of learners on the benefits of Litecoin within the community. 4) A great majority didn't know what Litecoin was. The guideline for self-reliance planning consisted of 4 aspects: 1) Development planning: by arranging meet up groups to conduct further education on Litecoin and share solutions on adoption into every day usage. Local communities need to develop awareness of the usefulness of Litecoin and share the value of Litecoin among friends and family. 2) Computer Science and Business Management staff should develop skills to expand on the benefits of Litecoin within their departments. 3) Further research should be pursued on how Litecoin Value can improve business and tourism within Thailand. 4) Local communities should focus on developing Litecoin awareness by encouraging street vendors to accept Litecoin as another form of payment for services rendered.

Keywords: litecoin, mining, confirmations, payment method

Procedia PDF Downloads 162
440 Challenges of Women Leadership in a Patriarchy Society: Implications for Development of African Women

Authors: Catherine Oluyemo

Abstract:

In Africa, patriarchy has manifested itself in the socio-cultural, political, economic and legal institutions. The decree of the father as the male head of the family has contributed to the powerlessness of women in African nations. To buttress this perception, in his work Meno, Plato made a declaration in the platonic dialogue that the desirable quality of a man should be the capacity to administer the state, and in the administration of it to benefit his friends and harm his enemies; and he must also be careful not to suffer harm himself. Furthermore, he said: a woman's good worth may also be easily described as ordering her house, keep what is indoors, and obey her husband. The works of Aristotle portrayed women as morally, intellectually, and physically inferior to men; they saw women as the property of men; claimed that women's role in society was to reproduce and serve men in the household; and saw male domination of women as natural and virtuous. This has been sustained for ages and is incessantly impinging on the involvement of women in African leadership positions. The purpose of this paper is to make sense of the concept of patriarchy in relations to women participation in Africa leadership, and its challenges in the participation of women in the leadership positions of Africa. It seeks to discover what women should do to make their voices heard, to participate in leadership arrangements so as to actualize their potentials in contributing to the development of Africa.

Keywords: women, leadership, patriarchy, development, actualize, potentials

Procedia PDF Downloads 320
439 The Parental Involvement as Predictor of Happiness in School-Aged Children

Authors: Giedre Sirvinskiene, Kastytis Smigelskas

Abstract:

Quality of family relations is an important factor of child development, however, the role of joint family activities on adolescent happiness still needs investigation. The aim of this study is to analyze associations between happiness of school-aged children and parental involvement. The analysis involves Lithuanian data from the cross-sectional Health Behaviour in School Aged Children (HBSC) study. The sample comprised 5730 children aged 11–15 years. Results: The odds of happiness was 2.38 times higher if children were living together with mother (95% CI: 1.81–3.13) and 1.81 times – with father (95% CI: 1.53–2.15). However, the likelihood of happiness was 7.21 times lower if adolescent had difficulties to talk with mother (95% CI: 5.42–9.61) and 6.40 times – with father (95% CI: 4.80–8.56). The joint daily adolescents-parents activities also predict the odds for happiness: joint TV watching by 5.96 times (95% CI: 4.21–8.43), having meals together by 7.02 times (95% CI: 4.77–10.32), going for a walk together 4.30 times (95% CI: 2.96–6.26), visiting places by 6.85 times (95% CI: 4.74–9.90), visiting friends and relatives by 7.13 times (95% CI: 4.87–10.43), sporting by 2.76 (95% CI: 1.83–4.18) as well as discussing various things by 7.35 times (95% CI: 5.50–9.82). Conclusions: Joint parents-adolescents activities and communication are related with greater happiness of adolescent. Though adolescence is a period when the relationships with peers get more importance, the communication and joint activities with parents remain a significant factor of adolescent happiness.

Keywords: adolescent, family, happiness, school-age

Procedia PDF Downloads 221
438 Maximising the Therapeutic Value of the Mental Capacity Act of Singapore for People Who Lack Legal Capacity

Authors: Kenji Gwee

Abstract:

The Mental Capacity Act is a new legislation that allows for lasting powers of attorney and court-appointed deputies, in respect of people who lack legal capacity. While the UK Act, after which the Singapore Act is modeled, has been shown to be therapeutic to donors, the Singapore Act differs from its UK counterpart and it is unclear if the Singapore Act can be beneficial to donors as purported. The purpose of this study was to determine what the perceptions of three groups of stakeholders (patients, caregivers and psychiatrists) are about the aspects of the Mental Capacity Act that are therapeutic to donors. In addition, ways to increase the therapeutic value of the Act to donors are sought. A qualitative methodology was used and the research was guided by two theoretical frameworks: therapeutic jurisprudence and an interpretive constructive framework. Interviews with 12 psychiatrists, and focus groups with twenty three patients and seven caregivers showed agreement that, allowing donors to nominate more than one decision- maker, and whistle-blowing mechanisms for recourse for abuse, were therapeutic to donors. To further increase the therapeutic value of the Act, 2 suggestions were made: the Act should provide for (i) advanced healthcare directives- allowing donors to make advance decisions to refuse treatment, or cease existing treatment, and (ii) independent advocacy services- to have a case worker to represent people who have no family or friends and are thus unable to find suitable donees.

Keywords: Mental Capacity Act, therapeutic jurisprudence, qualitative methodology, the UK Act

Procedia PDF Downloads 380
437 Generalization of Clustering Coefficient on Lattice Networks Applied to Criminal Networks

Authors: Christian H. Sanabria-Montaña, Rodrigo Huerta-Quintanilla

Abstract:

A lattice network is a special type of network in which all nodes have the same number of links, and its boundary conditions are periodic. The most basic lattice network is the ring, a one-dimensional network with periodic border conditions. In contrast, the Cartesian product of d rings forms a d-dimensional lattice network. An analytical expression currently exists for the clustering coefficient in this type of network, but the theoretical value is valid only up to certain connectivity value; in other words, the analytical expression is incomplete. Here we obtain analytically the clustering coefficient expression in d-dimensional lattice networks for any link density. Our analytical results show that the clustering coefficient for a lattice network with density of links that tend to 1, leads to the value of the clustering coefficient of a fully connected network. We developed a model on criminology in which the generalized clustering coefficient expression is applied. The model states that delinquents learn the know-how of crime business by sharing knowledge, directly or indirectly, with their friends of the gang. This generalization shed light on the network properties, which is important to develop new models in different fields where network structure plays an important role in the system dynamic, such as criminology, evolutionary game theory, econophysics, among others.

Keywords: clustering coefficient, criminology, generalized, regular network d-dimensional

Procedia PDF Downloads 377
436 Machine Learning Invariants to Detect Anomalies in Secure Water Treatment

Authors: Jonathan Heng, Yoong Cheah Huei

Abstract:

A strategic model that does not trigger any false alarms to detect anomalies in Secure Water Treatment (SWaT) test bed is presented. This model uses machine learning invariants formulated from streamlining the general form of Auto-Regressive models with eXogenous input. A creative generalized CUSUM algorithm to integrate the invariants and the detection strategy technique is successfully developed and tested in the SWaT Programmable Logic Controllers (PLCs). Three steps to fine-tune parameters, b and τ in the generalized algorithm are stated and an example used to demonstrate the tuning process is discussed. This approach can swiftly and effectively detect various scopes of cyber-attacks such as multiple points single stage and multiple points multiple stages in SWaT. This technique can be applied in water treatment plants and other cyber physical systems like power and gas plants too.

Keywords: machine learning invariants, generalized CUSUM algorithm with invariants and detection strategy, scope of cyber attacks, strategic model, tuning parameters

Procedia PDF Downloads 155
435 The Sociocultural Adaptation, Openness, and Success of Sojourn of Foreign Students in Tarlac City, Philippines

Authors: Maria Sheila S. Garcia

Abstract:

A good number of researches indicate that living in another country may create different and unexpected adjustment problems, and foreign students are not exempted from this. To provide an understanding of this process, 30 foreign college students studying English in Tarlac City were asked to answer questionnaires. This is to determine their sociocultural adaptation, openness to the host culture and success of sojourn. Through statistical analysis, it was found that the students experience greater difficulty in the academic area. Moderate difficulty was attributed to everyday life and social interactions. Albeit difficult, what they like best is the school’s methods of teaching English while the areas that need improvement are the libraries and internet connection. The only significant relationship was found between sociocultural adaptation and success of sojourn. Negatively correlated, if students experience greater difficulties in their host country, they are likely to regret their stay and will not recommend it to anyone. Openness to the host culture did not have an effect on the adaptation and success of sojourn. The short period of time that the students have are spent in studying rather than making friends. Nonetheless, this indicates the need to look deeper into the academic, extra-curricular activities and facilities provided by learning institutions.

Keywords: foreign students, sociocultural adaptation, success of sojourn, Tarlac Philippines

Procedia PDF Downloads 561
434 A Dynamic Ensemble Learning Approach for Online Anomaly Detection in Alibaba Datacenters

Authors: Wanyi Zhu, Xia Ming, Huafeng Wang, Junda Chen, Lu Liu, Jiangwei Jiang, Guohua Liu

Abstract:

Anomaly detection is a first and imperative step needed to respond to unexpected problems and to assure high performance and security in large data center management. This paper presents an online anomaly detection system through an innovative approach of ensemble machine learning and adaptive differentiation algorithms, and applies them to performance data collected from a continuous monitoring system for multi-tier web applications running in Alibaba data centers. We evaluate the effectiveness and efficiency of this algorithm with production traffic data and compare with the traditional anomaly detection approaches such as a static threshold and other deviation-based detection techniques. The experiment results show that our algorithm correctly identifies the unexpected performance variances of any running application, with an acceptable false positive rate. This proposed approach has already been deployed in real-time production environments to enhance the efficiency and stability in daily data center operations.

Keywords: Alibaba data centers, anomaly detection, big data computation, dynamic ensemble learning

Procedia PDF Downloads 169
433 Flood Monitoring in the Vietnamese Mekong Delta Using Sentinel-1 SAR with Global Flood Mapper

Authors: Ahmed S. Afifi, Ahmed Magdy

Abstract:

Satellite monitoring is an essential tool to study, understand, and map large-scale environmental changes that affect humans, climate, and biodiversity. The Sentinel-1 Synthetic Aperture Radar (SAR) instrument provides a high collection of data in all-weather, short revisit time, and high spatial resolution that can be used effectively in flood management. Floods occur when an overflow of water submerges dry land that requires to be distinguished from flooded areas. In this study, we use global flood mapper (GFM), a new google earth engine application that allows users to quickly map floods using Sentinel-1 SAR. The GFM enables the users to adjust manually the flood map parameters, e.g., the threshold for Z-value for VV and VH bands and the elevation and slope mask threshold. The composite R:G:B image results by coupling the bands of Sentinel-1 (VH:VV:VH) reduces false classification to a large extent compared to using one separate band (e.g., VH polarization band). The flood mapping algorithm in the GFM and the Otsu thresholding are compared with Sentinel-2 optical data. And the results show that the GFM algorithm can overcome the misclassification of a flooded area in An Giang, Vietnam.

Keywords: SAR backscattering, Sentinel-1, flood mapping, disaster

Procedia PDF Downloads 69