Search results for: narrative techniques
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6953

Search results for: narrative techniques

6683 Patriotic Education through Private/Everyday Narratives: What We Can Learn from Young People

Authors: Yijie Wang, Hanwei Cheng

Abstract:

Under the Chinese educational context, the materials for patriotic education typically take the form of grand narratives. However, in post-modern times the younger members of society tend to welcome elements of more micro and personal nature. It is therefore important to explore how patriotism can be integrated into an ‘everyday’, private narrative that holds more attraction for the young. Based on semi-structured interviews of eight Chinese graduate students, this research examines how Chinese young people draw materials to establish national identity and develop love for the country from everyday-life details, as well as how they perceive, interpret and articulate their patriotism through private narratives. And implications for patriotic education are proposed accordingly. Several conclusions are drawn from the pre-interviews. Firstly, sensory experiences that remind people of their country—such as the taste of Chinese delicacies and the sound of a traditional instrument—are a major source of patriotic feelings. Secondly, the love for the country often stems from and is continued to be mediated by the emotional attachment with other people, typically significant others, and patriotism is articulated (or acknowledged) by the young as a kind of ‘sentiment’ rather than ‘faith’ or ‘belief’. Thirdly, for young people who are currently studying abroad, their birth country represents a kind of familiar, well-accustomed life or lifestyle, and any nostalgic realization of it leads to increased national belonging and sense of identity. Fourthly, the awareness of the country’s transformations—positive ones and neutral ones alike—triggers young people affections towards the country, and even negative transformations may result in promoted sense of self-involvement and therefore consolidate national identity. Implications for patriotic education can be drawn accordingly, and although the research is conducted under the Chinese context, it will hopefully contribute to the understanding of relevant fields.

Keywords: national identity, patriotic education, private narrative, young people

Procedia PDF Downloads 162
6682 Differential Effect of Technique Majors on Isokinetic Strength in Youth Judoka Athletes

Authors: Chungyu Chen, Yi-Cheng Chen, Po-Hsian Hsu, Hsin-Ying Chen, Yen-Po Hsiao

Abstract:

The purpose of this study was to assess the muscular strength performance of upper and lower extremity in isokinetic system for the youth judo players, and also to compare the strength difference between major techniques. Sixteen male and 20 female judo players (age: 16.7 ± 1.6 years old, training age: 4.5 ± 0.8 years) were served as the volunteers for this study. There were 21 players major hand techniques and 15 players major foot techniques. The Biodex S4 Pro was used to assess the strength performance of extensor and flexor of concentric action under the load condition of 30 degree/sec, 60 degree/sec, and 120 degree/sec for elbow joints and knee joints. The strength parameters were included the maximal torque, the normalized maximal torque, the average power, and the average maximal torque. A t test for independent groups was used to evaluate whether hand major and foot major differ significantly with an alpha level of .05. The result showed the maximal torque of left knee extensor in foot major players (243.5 ± 36.3 Nm) was higher significantly than hand major (210.7 ± 21.0 Nm) under the load of 30 degree/sec (p < .05). There were no differences in upper extremity strength between the hand and foot techniques major in three loads (ps < .05). It indicated that the judo player is required to develop the upper extremity strength overall to secure the execution of major techniques.

Keywords: knee, elbow, power, judo

Procedia PDF Downloads 418
6681 Comparative Analysis of Edge Detection Techniques for Extracting Characters

Authors: Rana Gill, Chandandeep Kaur

Abstract:

Segmentation of images can be implemented using different fundamental algorithms like edge detection (discontinuity based segmentation), region growing (similarity based segmentation), iterative thresholding method. A comprehensive literature review relevant to the study gives description of different techniques for vehicle number plate detection and edge detection techniques widely used on different types of images. This research work is based on edge detection techniques and calculating threshold on the basis of five edge operators. Five operators used are Prewitt, Roberts, Sobel, LoG and Canny. Segmentation of characters present in different type of images like vehicle number plate, name plate of house and characters on different sign boards are selected as a case study in this work. The proposed methodology has seven stages. The proposed system has been implemented using MATLAB R2010a. Comparison of all the five operators has been done on the basis of their performance. From the results it is found that Canny operators produce best results among the used operators and performance of different edge operators in decreasing order is: Canny>Log>Sobel>Prewitt>Roberts.

Keywords: segmentation, edge detection, text, extracting characters

Procedia PDF Downloads 400
6680 Enriched Education: The Classroom as a Learning Network through Video Game Narrative Development

Authors: Wayne DeFehr

Abstract:

This study is rooted in a pedagogical approach that emphasizes student engagement as fundamental to meaningful learning in the classroom. This approach creates a paradigmatic shift, from a teaching practice that reinforces the teacher’s central authority to a practice that disperses that authority among the students in the classroom through networks that they themselves develop. The methodology of this study about creating optimal conditions for learning in the classroom includes providing a conceptual framework within which the students work, as well as providing clearly stated expectations for work standards, content quality, group methodology, and learning outcomes. These learning conditions are nurtured in a variety of ways. First, nearly every class includes a lecture from the professor with key concepts that students need in order to complete their work successfully. Secondly, students build on this scholarly material by forming their own networks, where students face each other and engage with each other in order to collaborate their way to solving a particular problem relating to the course content. Thirdly, students are given short, medium, and long-term goals. Short term goals relate to the week’s topic and involve workshopping particular issues relating to that stage of the course. The medium-term goals involve students submitting term assignments that are evaluated according to a well-defined rubric. And finally, long-term goals are achieved by creating a capstone project, which is celebrated and shared with classmates and interested friends on the final day of the course. The essential conclusions of the study are drawn from courses that focus on video game narrative. Enthusiastic student engagement is created not only with the dynamic energy and expertise of the instructor, but also with the inter-dependence of the students on each other to build knowledge, acquire skills, and achieve successful results.

Keywords: collaboration, education, learning networks, video games

Procedia PDF Downloads 85
6679 Passive Retrofitting Strategies for Windows in Hot and Humid Climate Vijayawada

Authors: Monica Anumula

Abstract:

Nowadays human beings attain comfort zone artificially for heating, cooling and lighting the spaces they live, and their main importance is given to aesthetics of building and they are not designed to protect themselves from climate. They depend on artificial sources of energy resulting in energy wastage. In order to reduce the amount of energy being spent in the construction industry and Energy Package goals by 2020, new ways of constructing houses is required. The larger part of energy consumption of a building is directly related to architectural aspects hence nature has to be integrated into the building design to attain comfort zone and reduce the dependency on artificial source of energy. The research is to develop bioclimatic design strategies and techniques for the walls and roofs of Vijayawada houses. Study and analysis of design strategies and techniques of various cases like Kerala, Mangalore etc. for similar kind of climate is examined in this paper. Understanding the vernacular architecture and modern techniques of that various cases and implementing in the housing of Vijayawada not only decreases energy consumption but also enhances socio cultural values of Vijayawada. This study focuses on the comparison of vernacular techniques and modern building bio climatic strategies to attain thermal comfort and energy reduction in hot and humid climate. This research provides further thinking of new strategies which include both vernacular and modern bioclimatic techniques.

Keywords: bioclimatic design, energy consumption, hot and humid climates, thermal comfort

Procedia PDF Downloads 138
6678 Enhancing Experiential Education in Teacher Education Classes Through Simulated Person Methodology

Authors: Karen Armstrong

Abstract:

This study is a narrative inquiry into the use of simulated person methodology (SPM) in teacher education classes. This methodology -often used in medical schools- has tremendous benefits in terms of enhancing experiential education in teacher education classes. Literacy education is a major focus in elementary schools. New teachers must work with parents to ensure that children learn to read and expand their literacy horizons. The classes used in this narrative inquiry research consist of one graduate class on family literacy and two pre-service teacher education classes: literacy and culture and early and family literacy. Two scenarios were devised, both of which simulated a parent-teacher interview. In the first scenario, the parent is a reluctant father who is ashamed of his lack of reading ability and does not understand why literacy is important. His seven-year-old son, wanting to emulate his father, has suddenly transformed from an eager student to one who rejects the value of reading in loyalty to his father who cannot read. In the second scenario, a father is called in by the teacher because his son has started acting out in class. The mother in this scenario is temporarily absent from the home, and the father is now the sole caregiver. In each of the scenarios, students are the teachers who are problem-solving these dilemmas in a safe environment with the 'parent' who is a specially trained simulated person. Teacher candidates enact, with the trained simulated person, their strategies for encouraging parents to engage in the literacy development of their children. Teacher candidates attempt to offer support and encouragement to parents. This simulation strategy offers both beginning and more experienced teachers the opportunity to practice an interview with two distinct and contrasting family situations with regard to the literacy of young children. The paper discusses the details of the scenarios enacted in class and the reflective discussion through which students learn from the simulation.

Keywords: experiential education, literacy, simulated person methodology, teacher education

Procedia PDF Downloads 80
6677 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 701
6676 Aerobic Bioprocess Control Using Artificial Intelligence Techniques

Authors: M. Caramihai, Irina Severin

Abstract:

This paper deals with the design of an intelligent control structure for a bioprocess of Hansenula polymorpha yeast cultivation. The objective of the process control is to produce biomass in a desired physiological state. The work demonstrates that the designed Hybrid Control Techniques (HCT) are able to recognize specific evolution bioprocess trajectories using neural networks trained specifically for this purpose, in order to estimate the model parameters and to adjust the overall bioprocess evolution through an expert system and a fuzzy structure. The design of the control algorithm as well as its tuning through realistic simulations is presented. Taking into consideration the synergism of different paradigms like fuzzy logic, neural network, and symbolic artificial intelligence (AI), in this paper we present a real and fulfilled intelligent control architecture with application in bioprocess control.

Keywords: bioprocess, intelligent control, neural nets, fuzzy structure, hybrid techniques

Procedia PDF Downloads 369
6675 Teaching, Learning and Evaluation Enhancement of Information Communication Technology Education in Schools through Pedagogical and E-Learning Techniques in the Sri Lankan Context

Authors: M. G. N. A. S. Fernando

Abstract:

This study uses a researchable framework to improve the quality of ICT education and the Teaching Learning Assessment/ Evaluation (TLA/TLE) process. It utilizes existing resources while improving the methodologies along with pedagogical techniques and e-Learning approaches used in the secondary schools of Sri Lanka. The study was carried out in two phases. Phase I focused on investigating the factors which affect the quality of ICT education. Based on the key factors of phase I, the Phase II focused on the design of an Experimental Application Model with 6 activity levels. Each Level in the Activity Model covers one or more levels in the Revised Bloom’s Taxonomy. Towards further enhancement of activity levels, other pedagogical techniques (activity based learning, e-learning techniques, problem solving activities and peer discussions etc.) were incorporated to each level in the activity model as appropriate. The application model was validated by a panel of teachers including a domain expert and was tested in the school environment too. The validity of performance was proved using 6 hypotheses testing and other methodologies. The analysis shows that student performance with problem solving activities increased by 19.5% due to the different treatment levels used. Compared to existing process it was also proved that the embedded techniques (mixture of traditional and modern pedagogical methods and their applications) are more effective with skills development of teachers and students.

Keywords: activity models, Bloom’s taxonomy, ICT education, pedagogies

Procedia PDF Downloads 135
6674 Digital Cinema Watermarking State of Art and Comparison

Authors: H. Kelkoul, Y. Zaz

Abstract:

Nowadays, the vigorous popularity of video processing techniques has resulted in an explosive growth of multimedia data illegal use. So, watermarking security has received much more attention. The purpose of this paper is to explore some watermarking techniques in order to observe their specificities and select the finest methods to apply in digital cinema domain against movie piracy by creating an invisible watermark that includes the date, time and the place where the hacking was done. We have studied three principal watermarking techniques in the frequency domain: Spread spectrum, Wavelet transform domain and finally the digital cinema watermarking transform domain. In this paper, a detailed technique is presented where embedding is performed using direct sequence spread spectrum technique in DWT transform domain. Experiment results shows that the algorithm provides high robustness and good imperceptibility.

Keywords: digital cinema, watermarking, wavelet DWT, spread spectrum, JPEG2000 MPEG4

Procedia PDF Downloads 221
6673 The New Far-Right: The Social Construction of Hatred against the Contemporary Islamic Community in Multicultural Australia

Authors: Angel Adams

Abstract:

In Australia, the contemporary social construction of hatred against the Islamic community was facilitated through the mainstream media. Australian public figures who have depicted Muslims and Islam not only as potential terrorists but also as incompatible with the country’s values and identities have helped to increase the level of fear against the Islamic community, leading sympathetic far-right movements to shift discussions towards anti-Islamic and anti-Muslim rhetoric. Political opportunities combined with a socially constructed narrative of fear of the ‘other’, introduced during the White Australia Policy of 1901, has allowed extreme and radical far-right movements to justify hate against the contemporary Australian Islamic community. This study aims to answer the following question: How does Australia’s founding provide a fertile environment to the spread of hatred against the contemporary Islamic community? The paper demonstrates that a forged social construct of grievances concerning the Islamic community in Australia has led to a surge in supply of far-right activism to combat what has become a perceived ‘national threat’. In essence, Australia’s history of a fear of the ‘other’ brings challenges to a multicultural society, and can potentially lead to a more unstable socio-political environment where abuse and violence are normalized and more likely to develop. Furthermore, the paper aims to bring a more nuanced understanding of what is considered ‘new far-right’ discourses with shared anti-Islam and anti-Muslim agendas in Australia. The political opportunity structures theory was the mechanism used to determine how new forms of far-right groups have become more mainstream in Australia. Previous studies on far-right groups in Australia have relied on qualitative data, but further empirical research in this area is sorely needed. Above all, this paper clarifies how hatred against minorities can have a negative impact on wider communities and allow a global narrative of ‘us’ versus ‘them’ to erupt from the fringes of society in Australia.

Keywords: Australia, Islamophobia, far-right, nationalism, political opportunity structures, political violence, social construction

Procedia PDF Downloads 96
6672 Importance of Flexibility Training for Older Adults: A Narrative Review

Authors: Andrej Kocjan

Abstract:

Introduction: Mobility has been shown to play an important role of health and quality of life among older adults. Falls, which are often related to decreased mobility, as well as to neuromuscular deficits, represent the most common injury among older adults. Fall risk has been shown to increase with reduced lower extremity flexibility. The aim of the paper is to assess the importance of flexibility training on joint range of motion and functional performance among elderly population. Methods: We performed literature research on PubMed and evaluated articles published until 2000. The articles found in the search strategy were also added. The population of interest included older adults (≥ 65 years of age). Results: Flexibility training programs still represent an important part of several rehabilitation programs. Static stretching and proprioceptive neuromuscular facilitation are the most frequently used techniques to improve the length of the muscle-tendon complex. Although the effectiveness of type of stretching seems to be related to age and gender, static stretching is a more appropriate technique to enhance shoulder, hip, and ankle range of motion in older adults. Stretching should be performed in multiple sets with holds of more than 60 seconds for a single muscle group. Conclusion: The literature suggests that flexibility training is an effective method to increase joint range of motion in older adults. In the light of increased functional outcome, activities such as strengthening, balance, and aerobic exercises should be incorporated into a training program for older people. Due to relatively little published literature, it is still not possible to prescribe detailed recommendations regarding flexibility training for older adults.

Keywords: elderly, exercise, flexibility, falls

Procedia PDF Downloads 152
6671 Scientific Development as Diffusion on a Social Network: An Empirical Case Study

Authors: Anna Keuchenius

Abstract:

Broadly speaking, scientific development is studied in either a qualitative manner with a focus on the behavior and interpretations of academics, such as the sociology of science and science studies or in a quantitative manner with a focus on the analysis of publications, such as scientometrics and bibliometrics. Both come with a different set of methodologies and few cross-references. This paper contributes to the bridging of this divide, by on the on hand approaching the process of scientific progress from a qualitative sociological angle and using on the other hand quantitative and computational techniques. As a case study, we analyze the diffusion of Granovetter's hypothesis from his 1973 paper 'On The Strength of Weak Ties.' A network is constructed of all scientists that have referenced this particular paper, with directed edges to all other researchers that are concurrently referenced with Granovetter's 1973 paper. Studying the structure and growth of this network over time, it is found that Granovetter's hypothesis is used by distinct communities of scientists, each with their own key-narrative into which the hypothesis is fit. The diffusion within the communities shares similarities with the diffusion of an innovation in which innovators, early adopters, and an early-late majority can clearly be distinguished. Furthermore, the network structure shows that each community is clustered around one or few hub scientists that are disproportionately often referenced and seem largely responsible for carrying the hypothesis into their scientific subfield. The larger implication of this case study is that the diffusion of scientific hypotheses and ideas are not the spreading of well-defined objects over a network. Rather, the diffusion is a process in which the object itself dynamically changes in concurrence with its spread. Therefore it is argued that the methodology presented in this paper has potential beyond the scientific domain, in the study of diffusion of other not well-defined objects, such as opinions, behavior, and ideas.

Keywords: diffusion of innovations, network analysis, scientific development, sociology of science

Procedia PDF Downloads 286
6670 Data Mining Techniques for Anti-Money Laundering

Authors: M. Sai Veerendra

Abstract:

Today, money laundering (ML) poses a serious threat not only to financial institutions but also to the nation. This criminal activity is becoming more and more sophisticated and seems to have moved from the cliché of drug trafficking to financing terrorism and surely not forgetting personal gain. Most of the financial institutions internationally have been implementing anti-money laundering solutions (AML) to fight investment fraud activities. However, traditional investigative techniques consume numerous man-hours. Recently, data mining approaches have been developed and are considered as well-suited techniques for detecting ML activities. Within the scope of a collaboration project on developing a new data mining solution for AML Units in an international investment bank in Ireland, we survey recent data mining approaches for AML. In this paper, we present not only these approaches but also give an overview on the important factors in building data mining solutions for AML activities.

Keywords: data mining, clustering, money laundering, anti-money laundering solutions

Procedia PDF Downloads 509
6669 Multi-Scaled Non-Local Means Filter for Medical Images Denoising: Empirical Mode Decomposition vs. Wavelet Transform

Authors: Hana Rabbouch

Abstract:

In recent years, there has been considerable growth of denoising techniques mainly devoted to medical imaging. This important evolution is not only due to the progress of computing techniques, but also to the emergence of multi-resolution analysis (MRA) on both mathematical and algorithmic bases. In this paper, a comparative study is conducted between the two best-known MRA-based decomposition techniques: the Empirical Mode Decomposition (EMD) and the Discrete Wavelet Transform (DWT). The comparison is carried out in a framework of multi-scale denoising, where a Non-Local Means (NLM) filter is performed scale-by-scale to a sample of benchmark medical images. The results prove the effectiveness of the multiscaled denoising, especially when the NLM filtering is coupled with the EMD.

Keywords: medical imaging, non local means, denoising, multiscaled analysis, empirical mode decomposition, wavelets

Procedia PDF Downloads 112
6668 Recovery through Shattered Life: The Life World of Illness after Being Diagnosed with Breast Cancer in Taiwan

Authors: Min-Tao Hsu

Abstract:

This study aims to explore the lived experiences of women with breast cancer, including their life world of illness and their adaptation to breast cancer. Breast cancer is not only a potentially lethal disease, but also a disease that may lead to many irreversible changes for female patients. Especially, in a culture where the wholeness is pursuit as an essential value, the sickness and/or broken body bring great challenge of life. Based on holism and symbolic interactionism, this study used interpretive ethnography including in-depth interviews and participant observations to collect the narrative of women with breast cancer concerning their illness experience. In addition, this study used Agar’s hermeneutic cycle to analyze data. The average age of 35 participants was 54.2. A total of 15 patients were within 2 years of onset, 5 patients were within 2-5 years of the treatment observation period, and 15 patients suffered from breast cancer for more than 5 years. The average age of onset was 50.4. Result: The main storyline of the life world of illness is ‘breast cancer is a turning point of life.’ Loss of breast was in terms of ‘no more a woman’ in Taiwanese culture. Two young women, one in her newly wedded and another right before marry, were divorced and cancelled wedding right after being diagnosed. All of them addressed that they have a ‘broken body.’ Single women accounted that they won’t marry for not being humiliated and most of married women said they never show female body in front of her husband or partner even in intimacy encounter. Three common themes were discovered: 1) new self and new identity; 2) new social relationships and new me; 3) new body and new life. The intertwining bodies, illness, selves, suffering, and medical treatments of female patients were observed. More, the recovery, of cause, was happened when new self, relationship, and new body were generated. Their identity to be a woman and a wife is shattered and their life is urged into another facet. For helping them to recovery from such situation, building a new identity and new social fabric on the new body need to be included in nursing care plan.

Keywords: breast cancer, illness narrative, world of illness, self-healing, interpretive ethnography

Procedia PDF Downloads 308
6667 Review of Malaria Diagnosis Techniques

Authors: Lubabatu Sada Sodangu

Abstract:

Malaria is a major cause of death in tropical and subtropical nations. Malaria cases are continually rising as a result of a number of factors, despite the fact that the condition is now treatable using effective methods. In this situation, quick and effective diagnostic methods are essential for the management and control of malaria. Malaria diagnosis using conventional methods is still troublesome, hence new technologies have been created and implemented to get around the drawbacks. The review describes the currently known malaria diagnostic techniques, their strengths and shortcomings.

Keywords: malaria, technique, diagnosis, Africa

Procedia PDF Downloads 19
6666 Review of Malaria Diagnosis Techniques

Authors: Lubabatu Sada Sodangi

Abstract:

Malaria is a major cause of death in tropical and subtropical nations. Malaria cases are continually rising as a result of a number of factors, despite the fact that the condition is now treatable using effective methods. In this situation, quick and effective diagnostic methods are essential for the management and control of malaria. Malaria diagnosis using conventional methods is still troublesome; hence, new technologies have been created and implemented to get around the drawbacks. The review describes the currently known malaria diagnostic techniques, their strengths, and shortcomings.

Keywords: malaria, technique, diagnosis, Africa

Procedia PDF Downloads 31
6665 Cost Reduction Techniques for Provision of Shelter to Homeless

Authors: Mukul Anand

Abstract:

Quality oriented affordable shelter for all has always been the key issue in the housing sector of our country. Homelessness is the acute form of housing need. It is a paradox that in spite of innumerable government initiated programmes for affordable housing, certain section of society is still devoid of shelter. About nineteen million (18.78 million) households grapple with housing shortage in Urban India in 2012. In Indian scenario there is major mismatch between the people for whom the houses are being built and those who need them. The prime force faced by public authorities in facilitation of quality housing for all is high cost of construction. The present paper will comprehend executable techniques for dilution of cost factor in housing the homeless. The key actors responsible for delivery of cheap housing stock such as capacity building, resource optimization, innovative low cost building material and indigenous skeleton housing system will also be incorporated in developing these techniques. Time performance, which is an important angle of above actors, will also be explored so as to increase the effectiveness of low cost housing. Along with this best practices will be taken up as case studies where both conventional techniques of housing and innovative low cost housing techniques would be cited. Transportation consists of approximately 30% of total construction budget. Thus use of alternative local solutions depending upon the region would be covered so as to highlight major components of low cost housing. Government is laid back regarding base line information on use of innovative low cost method and technique of resource optimization. Therefore, the paper would be an attempt to bring to light simpler solutions for achieving low cost housing.

Keywords: construction, cost, housing, optimization, shelter

Procedia PDF Downloads 411
6664 Integration of Immigrant Students into Local Education System

Authors: Suheyla Demi̇rkol Orak

Abstract:

The requirement of inclusive education is one of the utmost important results of both regular and irregular immigration. The matter in the case of Syrian immigrants is even worse than the other immigrants cases in world history since a massive immigration wave has affected all world countries' socio-economic profiles. When Syrians immigrated from Syria all over the world, they aimed to survive and left behind the war, but surviving is not optional occasion without handling language-related problems. Humans exist and preserve their existence with their language. That is a matter of concern for the integration of Syrians into the hosting countries. Many countries are proceeding with various programs to integrate Syrians into the majority groups by either assimilation or adaptation policies. Turkey has got the lion's share of the Syrian immigration apple, and in the same vein with this situation, its language education system should be analyzed severely in order to come up with a perfect match program for the integration of Syrians. It aimed to generate an inclusive education model for catalyzing the integration process of immigrant Syrian students into the majority socio-economic group via overcoming the language barrier. The identity of the immigrants is prioritized. The study follows a narrative literature review, which aims to review and critique relevant literature and offers a new conceptualization derived from the previous literature. The study derives a critical localized bilingual education model. As the outcome of the narrative literature review, a bilingual education model which prioritized the identity of the target community was designed. In the present study, main bilingual education programs and most of the countries' bilingual education policies were reviewed critically and suggestions were listed for the Syrian immigrants dominantly in Turkey and suggested to be benefitted by the other countries through localizing the practices.

Keywords: bi/multilingual education, sheltered education, immigrants, glocalization, submersion program, immersion program

Procedia PDF Downloads 43
6663 Analysis of Expression Data Using Unsupervised Techniques

Authors: M. A. I Perera, C. R. Wijesinghe, A. R. Weerasinghe

Abstract:

his study was conducted to review and identify the unsupervised techniques that can be employed to analyze gene expression data in order to identify better subtypes of tumors. Identifying subtypes of cancer help in improving the efficacy and reducing the toxicity of the treatments by identifying clues to find target therapeutics. Process of gene expression data analysis described under three steps as preprocessing, clustering, and cluster validation. Feature selection is important since the genomic data are high dimensional with a large number of features compared to samples. Hierarchical clustering and K Means are often used in the analysis of gene expression data. There are several cluster validation techniques used in validating the clusters. Heatmaps are an effective external validation method that allows comparing the identified classes with clinical variables and visual analysis of the classes.

Keywords: cancer subtypes, gene expression data analysis, clustering, cluster validation

Procedia PDF Downloads 110
6662 Fake News Detection for Korean News Using Machine Learning Techniques

Authors: Tae-Uk Yun, Pullip Chung, Kee-Young Kwahk, Hyunchul Ahn

Abstract:

Fake news is defined as the news articles that are intentionally and verifiably false, and could mislead readers. Spread of fake news may provoke anxiety, chaos, fear, or irrational decisions of the public. Thus, detecting fake news and preventing its spread has become very important issue in our society. However, due to the huge amount of fake news produced every day, it is almost impossible to identify it by a human. Under this context, researchers have tried to develop automated fake news detection using machine learning techniques over the past years. But, there have been no prior studies proposed an automated fake news detection method for Korean news to our best knowledge. In this study, we aim to detect Korean fake news using text mining and machine learning techniques. Our proposed method consists of two steps. In the first step, the news contents to be analyzed is convert to quantified values using various text mining techniques (topic modeling, TF-IDF, and so on). After that, in step 2, classifiers are trained using the values produced in step 1. As the classifiers, machine learning techniques such as logistic regression, backpropagation network, support vector machine, and deep neural network can be applied. To validate the effectiveness of the proposed method, we collected about 200 short Korean news from Seoul National University’s FactCheck. which provides with detailed analysis reports from 20 media outlets and links to source documents for each case. Using this dataset, we will identify which text features are important as well as which classifiers are effective in detecting Korean fake news.

Keywords: fake news detection, Korean news, machine learning, text mining

Procedia PDF Downloads 241
6661 A Comparative Analysis of Various Companding Techniques Used to Reduce PAPR in VLC Systems

Authors: Arushi Singh, Anjana Jain, Prakash Vyavahare

Abstract:

Recently, Li-Fi(light-fiedelity) has been launched based on VLC(visible light communication) technique, 100 times faster than WiFi. Now 5G mobile communication system is proposed to use VLC-OFDM as the transmission technique. The VLC system focused on visible rays, is considered for efficient spectrum use and easy intensity modulation through LEDs. The reason of high speed in VLC is LED, as they flicker incredibly fast(order of MHz). Another advantage of employing LED is-it acts as low pass filter results no out-of-band emission. The VLC system falls under the category of ‘green technology’ for utilizing LEDs. In present scenario, OFDM is used for high data-rates, interference immunity and high spectral efficiency. Inspite of the advantages OFDM suffers from large PAPR, ICI among carriers and frequency offset errors. Since, the data transmission technique used in VLC system is OFDM, the system suffers the drawbacks of OFDM as well as VLC, the non-linearity dues to non-linear characteristics of LED and PAPR of OFDM due to which the high power amplifier enters in non-linear region. The proposed paper focuses on reduction of PAPR in VLC-OFDM systems. Many techniques are applied to reduce PAPR such as-clipping-introduces distortion in the carrier; selective mapping technique-suffers wastage of bandwidth; partial transmit sequence-very complex due to exponentially increased number of sub-blocks. The paper discusses three companding techniques namely- µ-law, A-law and advance A-law companding technique. The analysis shows that the advance A-law companding techniques reduces the PAPR of the signal by adjusting the companding parameter within the range. VLC-OFDM systems are the future of the wireless communication but non-linearity in VLC-OFDM is a severe issue. The proposed paper discusses the techniques to reduce PAPR, one of the non-linearities of the system. The companding techniques mentioned in this paper provides better results without increasing the complexity of the system.

Keywords: non-linear companding techniques, peak to average power ratio (PAPR), visible light communication (VLC), VLC-OFDM

Procedia PDF Downloads 257
6660 On Space Narrative and American Dream in Martin Eden

Authors: Yangyang Zhang

Abstract:

Martin Eden tells about the tragedy of the protagonist Martin Eden’s suicide after his disillusion about American dream. The author Jack London presents various spatial routines of Martin Eden and reveals the involvement of space in realizing American dream: on the one hand, the Berkeley and Oakland cities contribute to Martin’s material success, making his American dream practical, and on the other hand, the two cities involve in the oppression of bourgeoisie ideology to Martin, promoting the domestic imperialization of bourgeoisie ideology represented by American dream. Molded by bourgeoisie ideology in the city, Martin constructed the oriental South Sea, revealing the oversea imperialization of bourgeoisie ideology behind American dream. By exploring the social, historical and political aspects of space, Martin Eden tries to demonstrate the mere material success and imperialism represented by American dream, revealing the fact of the involvement of American dreamin ideological oppression. When Jack London wrote Martin Eden, he had become a famous writer and realized his personal "American dream". He integrated his struggle experience into the protagonist Martin Eden, and also put his critique of the nature of "American dream" in the novel. The concept of the "American Dream" made the United States the land of dreams, and it also made many Americans believe that through personal struggle, they could climb the social ladder. Under the context of rapid growth in economy in the late 19 th century, American dream was reduced to the satisfaction on a material level. When material wealth was fulfilled, many people felt shattered for a variety of reasons, and such a phenomenon was reflected in the literature of disillusionment in 19th-century America.Martin Eden is such a work about disillusion, in which the geographical space becomes the witness of the realization and disillusionment of the protagonist Martin's "American dream". By analyzing the spatial narrative in Martin Eden, this paper reveals that the "American dream" only represents material success for individuals and the imperialization of capitalist ideology, and exposes the ideological nature of the "American Dream".

Keywords: Martin Eden, space, American dream, ideology of imperialism

Procedia PDF Downloads 90
6659 Gradient Boosted Trees on Spark Platform for Supervised Learning in Health Care Big Data

Authors: Gayathri Nagarajan, L. D. Dhinesh Babu

Abstract:

Health care is one of the prominent industries that generate voluminous data thereby finding the need of machine learning techniques with big data solutions for efficient processing and prediction. Missing data, incomplete data, real time streaming data, sensitive data, privacy, heterogeneity are few of the common challenges to be addressed for efficient processing and mining of health care data. In comparison with other applications, accuracy and fast processing are of higher importance for health care applications as they are related to the human life directly. Though there are many machine learning techniques and big data solutions used for efficient processing and prediction in health care data, different techniques and different frameworks are proved to be effective for different applications largely depending on the characteristics of the datasets. In this paper, we present a framework that uses ensemble machine learning technique gradient boosted trees for data classification in health care big data. The framework is built on Spark platform which is fast in comparison with other traditional frameworks. Unlike other works that focus on a single technique, our work presents a comparison of six different machine learning techniques along with gradient boosted trees on datasets of different characteristics. Five benchmark health care datasets are considered for experimentation, and the results of different machine learning techniques are discussed in comparison with gradient boosted trees. The metric chosen for comparison is misclassification error rate and the run time of the algorithms. The goal of this paper is to i) Compare the performance of gradient boosted trees with other machine learning techniques in Spark platform specifically for health care big data and ii) Discuss the results from the experiments conducted on datasets of different characteristics thereby drawing inference and conclusion. The experimental results show that the accuracy is largely dependent on the characteristics of the datasets for other machine learning techniques whereas gradient boosting trees yields reasonably stable results in terms of accuracy without largely depending on the dataset characteristics.

Keywords: big data analytics, ensemble machine learning, gradient boosted trees, Spark platform

Procedia PDF Downloads 210
6658 Analysis of Spamming Threats and Some Possible Solutions for Online Social Networking Sites (OSNS)

Authors: Dilip Singh Sisodia, Shrish Verma

Abstract:

Spamming is the most common issue seen nowadays in the Internet especially in Online Social Networking Sites (like Facebook, Twitter, and Google+ etc.). Spam messages keep wasting Internet bandwidth and the storage space of servers. On social network sites; spammers often disguise themselves by creating fake accounts and hijacking user’s accounts for personal gains. They behave like normal user and they continue to change their spamming strategy. To prevent this, most modern spam-filtering solutions are deployed on the receiver side; they are good at filtering spam for end users. In this paper we are presenting some spamming techniques their behaviour and possible solutions. We have analyzed how Spammers enters into online social networking sites (OSNSs) and how they target it and the techniques they use for it. The five discussed techniques of spamming techniques which are clickjacking, social engineered attacks, cross site scripting, URL shortening, and drive by download. We have used elgg framework for demonstration of some of spamming threats and respective implementation of solutions.

Keywords: online social networking sites, spam, attacks, internet, clickjacking / likejacking, drive-by-download, URL shortening, networking, socially engineered attacks, elgg framework

Procedia PDF Downloads 299
6657 Multidrug Therapies For HIV: Hybrid On-Off, Hysteresis On-Off Control and Simple STI

Authors: Magno Enrique Mendoza Meza

Abstract:

This paper deals with the comparison of three control techniques: the hysteresis on-off control (HyOOC), the hybrid on-off control (HOOC) and the simple Structured Treatment Interruptions (sSTI). These techniques are applied to the mathematical model developed by Kirschner and Webb. To compare these techniques we use a cost functional that minimize the wild-type virus population and the mutant virus population, but the main objective is to minimize the systemic cost of treatment and maximize levels of healthy CD4+ T cells. HyOOC, HOOC, and sSTI are applied to the drug therapies using a reverse transcriptase and protease inhibitors; simulations show that these controls maintain the uninfected cells in a small, bounded neighborhood of a pre-specified level. The controller HyOOC and HOOC are designed by appropriate choice of virtual equilibrium points.

Keywords: virus dynamics, on-off control, hysteresis, multi-drug therapies

Procedia PDF Downloads 359
6656 Contrast Enhancement of Masses in Mammograms Using Multiscale Morphology

Authors: Amit Kamra, V. K. Jain, Pragya

Abstract:

Mammography is widely used technique for breast cancer screening. There are various other techniques for breast cancer screening but mammography is the most reliable and effective technique. The images obtained through mammography are of low contrast which causes problem for the radiologists to interpret. Hence, a high quality image is mandatory for the processing of the image for extracting any kind of information from it. Many contrast enhancement algorithms have been developed over the years. In the present work, an efficient morphology based technique is proposed for contrast enhancement of masses in mammographic images. The proposed method is based on Multiscale Morphology and it takes into consideration the scale of the structuring element. The proposed method is compared with other state-of-the-art techniques. The experimental results show that the proposed method is better both qualitatively and quantitatively than the other standard contrast enhancement techniques.

Keywords: enhancement, mammography, multi-scale, mathematical morphology

Procedia PDF Downloads 390
6655 Reconceptualizing Evidence and Evidence Types for Digital Journalism Studies

Authors: Hai L. Tran

Abstract:

In the digital age, evidence-based reporting is touted as a best practice for seeking the truth and keeping the public well-informed. Journalists are expected to rely on evidence to demonstrate the validity of a factual statement and lend credence to an individual account. Evidence can be obtained from various sources, and due to a rich supply of evidence types available, the definition of this important concept varies semantically. To promote clarity and understanding, it is necessary to break down the various types of evidence and categorize them in a more coherent, systematic way. There is a wide array of devices that digital journalists deploy as proof to back up or refute a truth claim. Evidence can take various formats, including verbal and visual materials. Verbal evidence encompasses quotes, soundbites, talking heads, testimonies, voice recordings, anecdotes, and statistics communicated through written or spoken language. There are instances where evidence is simply non-verbal, such as when natural sounds are provided without any verbalized words. On the other hand, other language-free items exhibited in photos, video footage, data visualizations, infographics, and illustrations can serve as visual evidence. Moreover, there are different sources from which evidence can be cited. Supporting materials, such as public or leaked records and documents, data, research studies, surveys, polls, or reports compiled by governments, organizations, and other entities, are frequently included as informational evidence. Proof can also come from human sources via interviews, recorded conversations, public and private gatherings, or press conferences. Expert opinions, eye-witness insights, insider observations, and official statements are some of the common examples of testimonial evidence. Digital journalism studies tend to make broad references when comparing qualitative versus quantitative forms of evidence. Meanwhile, limited efforts are being undertaken to distinguish between sister terms, such as “data,” “statistical,” and “base-rate” on one side of the spectrum and “narrative,” “anecdotal,” and “exemplar” on the other. The present study seeks to develop the evidence taxonomy, which classifies evidence through the quantitative-qualitative juxtaposition and in a hierarchical order from broad to specific. According to this scheme, data, statistics, and base rate belong to the quantitative evidence group, whereas narrative, anecdote, and exemplar fall into the qualitative evidence group. Subsequently, the taxonomical classification arranges data versus narrative at the top of the hierarchy of types of evidence, followed by statistics versus anecdote and base rate versus exemplar. This research reiterates the central role of evidence in how journalists describe and explain social phenomena and issues. By defining the various types of evidence and delineating their logical connections it helps remove a significant degree of conceptual inconsistency, ambiguity, and confusion in digital journalism studies.

Keywords: evidence, evidence forms, evidence types, taxonomy

Procedia PDF Downloads 34
6654 Innovative Teaching Learning Techniques and Learning Difficulties of Adult Learners in Literacy Education Programmes in Calabar Metropolis, Cross River State, Nigeria

Authors: Simon Ibor Akpama

Abstract:

The study investigated the extent to which innovative teaching-learning techniques can influence and attenuate learning difficulties among adult learners participating in different literacy education programmes in Calabar Metropolis, Cross River State, Nigeria. A quasi-experimental design was adopted to collect data from a sample size of 150 participants of the programme. The sample was drawn using the simple random sampling method. As an experimental study, the 150 participants were divided into two equal groups –the first was the experimental group while the second was the control. A pre-test was administered to the two groups which were later exposed to a post-test after treatment. Two instruments were used for data collection. The first was the guide for the Literacy Learning Difficulties Inventory (LLDI). Three hypotheses were postulated and tested as .05 level of significance using Analysis of Covariance (ANOVA) test statistics. Results of the analysis firstly showed that the two groups (treatment and control) did not differ in the pre-test regarding their literacy learning difficulties. Secondly, the result showed that for each hypothesis, innovative teaching-learning techniques significantly influenced adult learners’ (participants) literacy learning difficulties. Based on these findings, the study recommends the use of innovative teaching-learning techniques in adult literacy education centres to mitigate the learning difficulties of adult learners in literacy education programmes in Calabar Metropolis.

Keywords: teaching, learning, techniques, innovative, difficulties, programme

Procedia PDF Downloads 95