CINXE.COM
Search results for: situational attribution training
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: situational attribution training</title> <meta name="description" content="Search results for: situational attribution training"> <meta name="keywords" content="situational attribution training"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="situational attribution training" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="situational attribution training"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 4144</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: situational attribution training</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4144</span> The Role of Situational Attribution Training in Reducing Automatic In-Group Stereotyping in Females</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olga%20Mironiuk">Olga Mironiuk</a>, <a href="https://publications.waset.org/abstracts/search?q=Ma%C5%82gorzata%20Kossowska"> Małgorzata Kossowska</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of the present study was to investigate the influence of Situational Attribution Training on reducing automatic in-group stereotyping in females. The experiment was conducted with the control of age and level of prejudice. 90 female participants were randomly assigned to two conditions: experimental and control group (each group was also divided into younger- and older-aged condition). Participants from the experimental condition were subjected to more extensive training. In the first part of the experiment, the experimental group took part in the first session of Situational Attribution Training while the control group participated in the Grammatical Training Control. In the second part of the research both groups took part in the Situational Attribution Training (which was considered as the second training session for the experimental group and the first one for the control condition). The training procedure was based on the descriptions of ambiguous situations which could be explained using situational or dispositional attributions. The participant’s task was to choose the situational explanation from two alternatives, out of which the second one presented the explanation based on neutral or stereotypically associated with women traits. Moreover, the experimental group took part in the third training session after two- day time delay, in order to check the persistence of the training effect. The main hypothesis stated that among participants taking part in the more extensive training, the automatic in-group stereotyping would be less frequent after having finished training sessions. The effectiveness of the training was tested by measuring the response time and the correctness of answers: the longer response time for the examples where one of two possible answers was based on the stereotype trait and higher correctness of answers was considered to be a proof of the training effectiveness. As the participants’ level of prejudice was controlled (using the Ambivalent Sexism Inventory), it was also assumed that the training effect would be weaker for participants revealing a higher level of prejudice. The obtained results did not confirm the hypothesis based on the response time: participants from the experimental group responded faster in case of situations where one of the possible explanations was based on stereotype trait. However, an interesting observation was made during the analysis of the answers’ correctness: regardless the condition and age group affiliation, participants made more mistakes while choosing the situational explanations when the alternative was based on stereotypical trait associated with the dimension of warmth. What is more, the correctness of answers was higher in the third training session for the experimental group in case when the alternative of situational explanation was based on the stereotype trait associated with the dimension of competence. The obtained results partially confirm the effectiveness of the training. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=female" title="female">female</a>, <a href="https://publications.waset.org/abstracts/search?q=in-group%20stereotyping" title=" in-group stereotyping"> in-group stereotyping</a>, <a href="https://publications.waset.org/abstracts/search?q=prejudice" title=" prejudice"> prejudice</a>, <a href="https://publications.waset.org/abstracts/search?q=situational%20attribution%20training" title=" situational attribution training"> situational attribution training</a> </p> <a href="https://publications.waset.org/abstracts/72813/the-role-of-situational-attribution-training-in-reducing-automatic-in-group-stereotyping-in-females" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72813.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">187</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4143</span> The Initiator Matters in Service Co-Recovery: Investigation on Attribution and Satisfaction</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chia-Ching%20Tsai">Chia-Ching Tsai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the literature, the positive effect of service co-recovery has been evidenced, and which customers’ attribution is the key successful factor has also been indicated. There is also literature investigating on initiation of co-recovery for finding out the superior way to co-recovery, and indicating co-recovery initiated by employees causes better effect of co-recovery. This research postulates the consequences of co-recovery by different initiators affect customers’ attribution and the resultant results. Thus, this research uses a 3x2 factorial design to investigate the impact of initiator of co-recovery and consequence of co-recovery on customers’ attribution and post-recovery satisfaction. The results show initiation of co-recovery has a significant influence on internal attribution, and the employee initiator causes the highest internal attribution. The consequences of co-recovery interact with initiators of co-recovery on internal attribution significantly. Moreover, internal attribution significantly affects post-recovery satisfaction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=service%20co-recovery" title="service co-recovery">service co-recovery</a>, <a href="https://publications.waset.org/abstracts/search?q=initiation%20of%20co-recovery" title=" initiation of co-recovery"> initiation of co-recovery</a>, <a href="https://publications.waset.org/abstracts/search?q=attribution" title=" attribution"> attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=post-recovery%20satisfaction" title=" post-recovery satisfaction"> post-recovery satisfaction</a> </p> <a href="https://publications.waset.org/abstracts/78185/the-initiator-matters-in-service-co-recovery-investigation-on-attribution-and-satisfaction" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/78185.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">263</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4142</span> Trace Network: A Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jian%20Xu">Jian Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiaochun%20Yun"> Xiaochun Yun</a>, <a href="https://publications.waset.org/abstracts/search?q=Yongzheng%20Zhang"> Yongzheng Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yafei%20Sang"> Yafei Sang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhenyu%20Cheng"> Zhenyu Cheng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Network attack prevention is a critical research area of information security. Network attack would be oppressed if attribution techniques are capable to trace back to the attackers after the hacking event. Therefore attributing these attacks to a particular identification becomes one of the important tasks when analysts attempt to differentiate and profile the attacker behind a piece of attack trace. To assist analysts in expose attackers behind the scenes, this paper researches on the connections between attribution traces and proposes probabilistic relevance based attribution patterns. This method facilitates the evaluation of the plausibility relevance between different traceable identifications. Furthermore, through analyzing the connections among traces, it could confirm the existence probability of a certain organization as well as discover its affinitive partners by the means of drawing relevance matrix from attribution traces. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attribution%20trace" title="attribution trace">attribution trace</a>, <a href="https://publications.waset.org/abstracts/search?q=probabilistic%20relevance" title=" probabilistic relevance"> probabilistic relevance</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20attack" title=" network attack"> network attack</a>, <a href="https://publications.waset.org/abstracts/search?q=attacker%20identification" title=" attacker identification"> attacker identification</a> </p> <a href="https://publications.waset.org/abstracts/61350/trace-network-a-probabilistic-relevant-pattern-recognition-approach-to-attribution-trace-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61350.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">366</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4141</span> A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Li%20Qiang">Li Qiang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yang%20Ze-Ming"> Yang Ze-Ming</a>, <a href="https://publications.waset.org/abstracts/search?q=Liu%20Bao-Xu"> Liu Bao-Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jiang%20Zheng-Wei"> Jiang Zheng-Wei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=reasoning" title="reasoning">reasoning</a>, <a href="https://publications.waset.org/abstracts/search?q=Bayesian%20networks" title=" Bayesian networks"> Bayesian networks</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-attack%20attribution" title=" cyber-attack attribution"> cyber-attack attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=Kill%20Chain" title=" Kill Chain"> Kill Chain</a>, <a href="https://publications.waset.org/abstracts/search?q=threat%20intelligence" title=" threat intelligence"> threat intelligence</a> </p> <a href="https://publications.waset.org/abstracts/50175/a-reasoning-method-of-cyber-attack-attribution-based-on-threat-intelligence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50175.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">450</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4140</span> Overconfidence and Self-Attribution Bias: The Difference among Economic Students at Different Stage of the Study and Non-Economic Students</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vera%20Jancurova">Vera Jancurova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> People are, in general, exposed to behavioral biases, however, the degree and impact are affected by experience, knowledge, and other characteristics. The purpose of this article is to study two of defined behavioral biases, the overconfidence and self-attribution bias, and its impact on economic and non-economic students at different stage of the study. The research method used for the purpose of this study is a controlled field study that contains questions on perception of own confidence and self-attribution and estimation of limits to analyse actual abilities. The results of the research show that economic students seem to be more overconfident than their non–economic colleagues, which seems to be caused by the fact the questionnaire was asking for predicting economic indexes and own knowledge and abilities in financial environment. Surprisingly, the most overconfidence was detected by the students at the beginning of their study (1st-semester students). However, the estimations of real numbers do not point out, that economic students have better results by the prediction itself. The study confirmed the presence of self-attribution bias at all of the respondents. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=behavioral%20finance" title="behavioral finance">behavioral finance</a>, <a href="https://publications.waset.org/abstracts/search?q=overconfidence" title=" overconfidence"> overconfidence</a>, <a href="https://publications.waset.org/abstracts/search?q=self-attribution" title=" self-attribution"> self-attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=heuristics%20and%20biases" title=" heuristics and biases"> heuristics and biases</a> </p> <a href="https://publications.waset.org/abstracts/50982/overconfidence-and-self-attribution-bias-the-difference-among-economic-students-at-different-stage-of-the-study-and-non-economic-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50982.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">257</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4139</span> Comparison of Competitive State Anxiety among Elite and Non-Elite Futsal Players and Its Relationship with Situational Factors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hassan%20Habibi">Hassan Habibi</a>, <a href="https://publications.waset.org/abstracts/search?q=Hossein%20Soltani"> Hossein Soltani</a>, <a href="https://publications.waset.org/abstracts/search?q=Amir%20Moghadam"> Amir Moghadam</a>, <a href="https://publications.waset.org/abstracts/search?q=Najmeh%20Bakhshi"> Najmeh Bakhshi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this study was to compare competitive state anxiety among elite and non-elite futsal players and its relationship with situational factors. 130 non-elite and 70 elite male futsal players participated in the study. Competitive State Anxiety Inventory-2 and situational factors Inventory were applied. Data was analyzed using one-way ANOVA and product moment correlation. Results showed there was significant difference between competitive state anxiety subscales (cognitive anxiety somatic anxiety & self-confidence) and situational factors among elite and non-elite futsal players (P<0.05) but there was no significant correlations between situational factors subscales among elite and non-elite futsal players (P<0.05). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=competitive%20state%20anxiety" title="competitive state anxiety">competitive state anxiety</a>, <a href="https://publications.waset.org/abstracts/search?q=situational%20factors" title=" situational factors"> situational factors</a>, <a href="https://publications.waset.org/abstracts/search?q=elite%20players" title=" elite players"> elite players</a>, <a href="https://publications.waset.org/abstracts/search?q=non-elite%20players" title=" non-elite players"> non-elite players</a> </p> <a href="https://publications.waset.org/abstracts/32452/comparison-of-competitive-state-anxiety-among-elite-and-non-elite-futsal-players-and-its-relationship-with-situational-factors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32452.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">650</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4138</span> Exploring Syntactic and Semantic Features for Text-Based Authorship Attribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Haiyan%20Wu">Haiyan Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Ying%20Liu"> Ying Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Shaoyun%20Shi"> Shaoyun Shi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Authorship attribution is to extract features to identify authors of anonymous documents. Many previous works on authorship attribution focus on statistical style features (e.g., sentence/word length), content features (e.g., frequent words, n-grams). Modeling these features by regression or some transparent machine learning methods gives a portrait of the authors' writing style. But these methods do not capture the syntactic (e.g., dependency relationship) or semantic (e.g., topics) information. In recent years, some researchers model syntactic trees or latent semantic information by neural networks. However, few works take them together. Besides, predictions by neural networks are difficult to explain, which is vital in authorship attribution tasks. In this paper, we not only utilize the statistical style and content features but also take advantage of both syntactic and semantic features. Different from an end-to-end neural model, feature selection and prediction are two steps in our method. An attentive n-gram network is utilized to select useful features, and logistic regression is applied to give prediction and understandable representation of writing style. Experiments show that our extracted features can improve the state-of-the-art methods on three benchmark datasets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authorship%20attribution" title="authorship attribution">authorship attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=attention%20mechanism" title=" attention mechanism"> attention mechanism</a>, <a href="https://publications.waset.org/abstracts/search?q=syntactic%20feature" title=" syntactic feature"> syntactic feature</a>, <a href="https://publications.waset.org/abstracts/search?q=feature%20extraction" title=" feature extraction"> feature extraction</a> </p> <a href="https://publications.waset.org/abstracts/129270/exploring-syntactic-and-semantic-features-for-text-based-authorship-attribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129270.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4137</span> Estimating View-Through Ad Attribution from User Surveys Using Convex Optimization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yuhan%20Lin">Yuhan Lin</a>, <a href="https://publications.waset.org/abstracts/search?q=Rohan%20Kekatpure"> Rohan Kekatpure</a>, <a href="https://publications.waset.org/abstracts/search?q=Cassidy%20Yeung"> Cassidy Yeung</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Digital Marketing, robust quantification of View-through attribution (VTA) is necessary for evaluating channel effectiveness. VTA occurs when a product purchase is aided by an Ad but without an explicit click (e.g. a TV ad). A lack of a tracking mechanism makes VTA estimation challenging. Most prevalent VTA estimation techniques rely on post-purchase in-product user surveys. User surveys enable the calculation of channel multipliers, which are the ratio of the view-attributed to the click-attributed purchases of each marketing channel. Channel multipliers thus provide a way to estimate the unknown VTA for a channel from its known click attribution. In this work, we use Convex Optimization to compute channel multipliers in a way that enables a mathematical encoding of the expected channel behavior. Large fluctuations in channel attributions often result from overfitting the calculations to user surveys. Casting channel attribution as a Convex Optimization problem allows an introduction of constraints that limit such fluctuations. The result of our study is a distribution of channel multipliers across the entire marketing funnel, with important implications for marketing spend optimization. Our technique can be broadly applied to estimate Ad effectiveness in a privacy-centric world that increasingly limits user tracking. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20marketing" title="digital marketing">digital marketing</a>, <a href="https://publications.waset.org/abstracts/search?q=survey%20analysis" title=" survey analysis"> survey analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=operational%20research" title=" operational research"> operational research</a>, <a href="https://publications.waset.org/abstracts/search?q=convex%20optimization" title=" convex optimization"> convex optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=channel%20attribution" title=" channel attribution"> channel attribution</a> </p> <a href="https://publications.waset.org/abstracts/149140/estimating-view-through-ad-attribution-from-user-surveys-using-convex-optimization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149140.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">199</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4136</span> Place and Situational Management in Crime Prevention </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehdi%20Moghimi">Mehdi Moghimi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Doctrines associated with situational prevention considers 'place of committing crime' as one of the fundamental elements of a crime. Meanwhile, with regard to causing or having effect on a crime situation, 'place' can be one of the pivotal indices in situational prevention analyses. This study aims at examining the role of place in construction of a crime situation and explaining the relationship between 'place' and situational preventive measures and procedures. Also, how to identify high-crime places, types of high-crime places and the factors influencing their creation are among the most important secondary objectives of this article. Concerning the purpose, it is a practical study whose material has been written through a documentary method using original sources (English), books and written and translated articles etc. This article is written in two main parts. In the first section, cognitive-conceptual issues about 'place' as one of the main causes of crime situation, and its effective interaction with situational preventive measures will be reviewed. The second part of this paper will focus on criminological examination of places and critical locations of crime and provide situational preventive measures to deal with the situation. 'Crime displacement' and 'geographical distribution of benefits'are also considered as the possible consequences of implementing preventive strategies. The results of the study suggest that the inventory of offenses is distributed according to the spatial characteristics. Moreover, according to the criminological characteristics governing region or location, offenders choose the place of crime based on a logical calculation. Therefore, some locations, regions or neighborhoods are permanent places of occurring lots of crimes. As a result, considering "place", preventive measures and procedures can be systematically directed, and using the most effective ways, limited preventive resources are utilized in the most critical places. Finally, some suggestions for further research and application are provided in line with more favorable promotion of situational preventive measures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime%20prevention" title="crime prevention">crime prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=place" title=" place"> place</a>, <a href="https://publications.waset.org/abstracts/search?q=police%20crime" title=" police crime"> police crime</a>, <a href="https://publications.waset.org/abstracts/search?q=situational%20crime%20prevention" title=" situational crime prevention "> situational crime prevention </a> </p> <a href="https://publications.waset.org/abstracts/34398/place-and-situational-management-in-crime-prevention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34398.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">516</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4135</span> Authorship Attribution Using Sociolinguistic Profiling When Considering Civil and Criminal Cases</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Diana%20A.%20Sokolova">Diana A. Sokolova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article is devoted to one of the possibilities for identifying the author of an oral or written text - sociolinguistic profiling. Sociolinguistic profiling is utilized as a forensic linguistics technique to identify individuals through language patterns, particularly in criminal cases. It examines how social factors influence language use. This study aims to showcase the significance of linguistic profiling for attributing authorship in texts and emphasizes the necessity for its continuous enhancement while considering its strengths and weaknesses. The study employs semantic-syntactic, lexical-semantic, linguopragmatic, logical, presupposition, authorization, and content analysis methods to investigate linguistic profiling. The research highlights the relevance of sociolinguistic profiling in authorship attribution and underscores the importance of ongoing refinement of the technique, considering its limitations. This study emphasizes the practical application of linguistic profiling in legal settings and underscores the impact of social factors on language use, contributing to the field of forensic linguistics. Data collection involves collecting oral and written texts from criminal and civil court cases to analyze language patterns for authorship attribution. The collected data is analyzed using various linguistic analysis methods to identify individual characteristics and patterns that can aid in authorship attribution. The study addresses the effectiveness of sociolinguistic profiling in identifying authors of texts and explores the impact of social factors on language use in legal contexts. In spite of advantages challenges in linguistics profiling have spurred debates and controversies in academic circles, legal environments, and the public sphere. So, this research highlights the significance of sociolinguistic profiling in authorship attribution and emphasizes the need for further development of this method, considering its strengths and weaknesses. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authorship%20attribution" title="authorship attribution">authorship attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=detection%20of%20identifying" title=" detection of identifying"> detection of identifying</a>, <a href="https://publications.waset.org/abstracts/search?q=dialect" title=" dialect"> dialect</a>, <a href="https://publications.waset.org/abstracts/search?q=features" title=" features"> features</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20linguistics" title=" forensic linguistics"> forensic linguistics</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20influence" title=" social influence"> social influence</a>, <a href="https://publications.waset.org/abstracts/search?q=sociolinguistics" title=" sociolinguistics"> sociolinguistics</a>, <a href="https://publications.waset.org/abstracts/search?q=unique%20speech%20characteristics" title=" unique speech characteristics"> unique speech characteristics</a> </p> <a href="https://publications.waset.org/abstracts/188208/authorship-attribution-using-sociolinguistic-profiling-when-considering-civil-and-criminal-cases" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/188208.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">36</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4134</span> Neural Network Motion Control of VTAV by NARMA-L2 Controller for Enhanced Situational Awareness</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Igor%20Astrov">Igor Astrov</a>, <a href="https://publications.waset.org/abstracts/search?q=Natalya%20Berezovski"> Natalya Berezovski</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper focuses on a critical component of the situational awareness (SA), the control of autonomous vertical flight for vectored thrust aerial vehicle (VTAV). With the SA strategy, we proposed a neural network motion control procedure to address the dynamics variation and performance requirement difference of flight trajectory for a VTAV. This control strategy with using of NARMA-L2 neurocontroller for chosen model of VTAV has been verified by simulation of take-off and forward maneuvers using software package Simulink and demonstrated good performance for fast stabilization of motors, consequently, fast SA with economy in energy can be asserted during search-and-rescue operations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NARMA-L2%20neurocontroller" title="NARMA-L2 neurocontroller">NARMA-L2 neurocontroller</a>, <a href="https://publications.waset.org/abstracts/search?q=situational%20awareness" title=" situational awareness"> situational awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=vectored%20thrust%20aerial%20vehicle" title=" vectored thrust aerial vehicle"> vectored thrust aerial vehicle</a>, <a href="https://publications.waset.org/abstracts/search?q=aviation" title=" aviation"> aviation</a> </p> <a href="https://publications.waset.org/abstracts/33158/neural-network-motion-control-of-vtav-by-narma-l2-controller-for-enhanced-situational-awareness" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33158.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">420</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4133</span> Integrating Wearable Devices in Real-Time Computer Applications of Petrochemical Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Paul%20B%20Stone">Paul B Stone</a>, <a href="https://publications.waset.org/abstracts/search?q=Subhashini%20Ganapathy"> Subhashini Ganapathy</a>, <a href="https://publications.waset.org/abstracts/search?q=Mary%20E.%20Fendley"> Mary E. Fendley</a>, <a href="https://publications.waset.org/abstracts/search?q=Layla%20Akilan"> Layla Akilan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As notifications become more common through mobile devices, it is important to understand the impact of wearable devices on the improved user experience of man-machine interfaces. This study examined the use of a wearable device for a real-time system using a computer-simulated petrochemical system. The key research question was to determine how using the information provided by the wearable device can improve human performance through measures of situational awareness and decision making. Results indicate that there was a reduction in response time when using the watch, and there was no difference in situational awareness. Perception of using the watch was positive, with 83% of users finding value in using the watch and receiving haptic feedback. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer%20applications" title="computer applications">computer applications</a>, <a href="https://publications.waset.org/abstracts/search?q=haptic%20feedback" title=" haptic feedback"> haptic feedback</a>, <a href="https://publications.waset.org/abstracts/search?q=petrochemical%20systems" title=" petrochemical systems"> petrochemical systems</a>, <a href="https://publications.waset.org/abstracts/search?q=situational%20awareness" title=" situational awareness"> situational awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=wearable%20technology" title=" wearable technology"> wearable technology</a> </p> <a href="https://publications.waset.org/abstracts/139604/integrating-wearable-devices-in-real-time-computer-applications-of-petrochemical-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139604.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">200</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4132</span> Memorabilia of Suan Sunandha through Interactive User Interface</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nalinee%20Sophatsathit">Nalinee Sophatsathit</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The objectives of memorabilia of Suan Sunandha are to develop a general knowledge presentation about the historical royal garden through interactive graphic simulation technique and to employ high-functionality context in enhancing interactive user navigation. The approach infers non-intrusive display of relevant history in response to situational context. User’s navigation runs through the virtual reality campus, consisting of new and restored buildings. A flash back presentation of information pertaining to the history in the form of photos, paintings, and textual descriptions are displayed along each passing-by building. To keep the presentation lively, graphical simulation is created in a serendipity game play so that the user can both learn and enjoy the educational tour. The benefits of this human-computer interaction development are two folds. First, lively presentation technique and situational context modeling are developed that entail a usable paradigm of knowledge and information presentation combinations. Second, cost effective training and promotion for both internal personnel and public visitors to learn and keep informed of this historical royal garden can be furnished without the need for a dedicated public relations service. Future improvement on graphic simulation and ability based display can extend this work to be more realistic, user-friendly, and informative for all. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=interactive%20user%20navigation" title="interactive user navigation">interactive user navigation</a>, <a href="https://publications.waset.org/abstracts/search?q=high-functionality%20context" title=" high-functionality context"> high-functionality context</a>, <a href="https://publications.waset.org/abstracts/search?q=situational%20context" title=" situational context"> situational context</a>, <a href="https://publications.waset.org/abstracts/search?q=human-computer%20interaction" title=" human-computer interaction"> human-computer interaction</a> </p> <a href="https://publications.waset.org/abstracts/4369/memorabilia-of-suan-sunandha-through-interactive-user-interface" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4369.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">356</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4131</span> As Evolved Mechanisms and Cultural Modeling Affect Child Gender Attribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Stefano%20Federici">Stefano Federici</a>, <a href="https://publications.waset.org/abstracts/search?q=Alessandro%20Lepri"> Alessandro Lepri</a>, <a href="https://publications.waset.org/abstracts/search?q=Antonella%20Carrera"> Antonella Carrera</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Kessler and McKenna in the seventies, and recently Federici and Lepri investigated how an individual attributes gender to a person. By administering nudes of human figures, the scholars have found that the penis more than the vagina and the male sexual characteristics more than the female ones are significantly more salient in the gender attribution process. Federici and Lepri suggested that the asymmetrical salience of sexual characteristics is attributable to evolved decision-making processes for the solution of gender attribution problems to avoid the greatest danger of an (angry) adult male. The present study has observed the behaviour of 60 children, aged between 3 and 6 years, and their parents verifying whether the child gender attribution mechanisms are permeable to cultural stereotypes. The participating children were asked to make a male or a female on a tablet by combining 12 human physical characteristics (long hair, short hair, wide hips, narrow hips, breasts, flat chest, body hair, hairless body, penis, vagina, male face, and female face) and four cloths (male t-shirt, female t-shirt, pants, and skirt) by superimposing one or more of them on a sexually neutral manikin. On the tablet was installed an App, created by authors, to replicate the Kessler and McKenna and Federici and Lepri previous studies. One of the parents of each of the participating children was asked to make a male or a female using the same apparatus used by children. In addition, the participating parents were asked to complete a test, as proposed by Federici and Lepri in their previous study, to compare adult and child processes of gender attribution. The results suggested that children are affected both by evolved mechanisms as adults were (e.g., taking less time to make a male than a female, using the penis more often than the vagina), and by cultural modeling of parental and environmental gender stereotypes (e.g., the genitals were often covered with pants in case the delivery was to make a male and a skirt in the case was to make a female). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biological%20sex" title="biological sex">biological sex</a>, <a href="https://publications.waset.org/abstracts/search?q=cognitive%20biases" title=" cognitive biases"> cognitive biases</a>, <a href="https://publications.waset.org/abstracts/search?q=cultural%20modeling" title=" cultural modeling"> cultural modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=gender%20attribution" title=" gender attribution"> gender attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=evolved%20decision-making%20processes" title=" evolved decision-making processes"> evolved decision-making processes</a> </p> <a href="https://publications.waset.org/abstracts/129663/as-evolved-mechanisms-and-cultural-modeling-affect-child-gender-attribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129663.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">130</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4130</span> Pay Per Click Attribution: Effects on Direct Search Traffic and Purchases</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Toni%20Raurich-Marcet">Toni Raurich-Marcet</a>, <a href="https://publications.waset.org/abstracts/search?q=Joan%20Llonch-Andreu"> Joan Llonch-Andreu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research is focused on the relationship between Search Engine Marketing (SEM) and traditional advertising. The dominant assumption is that SEM does not help brand awareness and only does it in session as if it were the cost of manufacturing the product being sold. The study is methodologically developed using an experiment where the effects were determined to analyze the billboard effect. The research allowed the cross-linking of theoretical and empirical knowledge on digital marketing. This paper has validated this marketing generates retention as traditional advertising would by measuring brand awareness and its improvements. This changes the way performance and brand campaigns are split within marketing departments, effectively rebalancing budgets moving forward. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attribution" title="attribution">attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=performance%20marketing" title=" performance marketing"> performance marketing</a>, <a href="https://publications.waset.org/abstracts/search?q=SEM" title=" SEM"> SEM</a>, <a href="https://publications.waset.org/abstracts/search?q=marketplaces" title=" marketplaces"> marketplaces</a> </p> <a href="https://publications.waset.org/abstracts/147427/pay-per-click-attribution-effects-on-direct-search-traffic-and-purchases" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147427.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">130</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4129</span> A Systematic Review of Situational Awareness and Cognitive Load Measurement in Driving</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aly%20Elshafei">Aly Elshafei</a>, <a href="https://publications.waset.org/abstracts/search?q=Daniela%20Romano"> Daniela Romano</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the development of autonomous vehicles, a human-machine interaction (HMI) system is needed for a safe transition of control when a takeover request (TOR) is required. An important part of the HMI system is the ability to monitor the level of situational awareness (SA) of any driver in real-time, in different scenarios, and without any pre-calibration. Presenting state-of-the-art machine learning models used to measure SA is the purpose of this systematic review. Investigating the limitations of each type of sensor, the gaps, and the most suited sensor and computational model that can be used in driving applications. To the author’s best knowledge this is the first literature review identifying online and offline classification methods used to measure SA, explaining which measurements are subject or session-specific, and how many classifications can be done with each classification model. This information can be very useful for researchers measuring SA to identify the most suited model to measure SA for different applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=situational%20awareness" title="situational awareness">situational awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=autonomous%20driving" title=" autonomous driving"> autonomous driving</a>, <a href="https://publications.waset.org/abstracts/search?q=gaze%20metrics" title=" gaze metrics"> gaze metrics</a>, <a href="https://publications.waset.org/abstracts/search?q=EEG" title=" EEG"> EEG</a>, <a href="https://publications.waset.org/abstracts/search?q=ECG" title=" ECG"> ECG</a> </p> <a href="https://publications.waset.org/abstracts/157210/a-systematic-review-of-situational-awareness-and-cognitive-load-measurement-in-driving" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157210.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">119</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4128</span> Recent Policy Changes in Israeli Early Childhood Frameworks: Hope for the Future</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yaara%20Shilo">Yaara Shilo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Early childhood education and care (ECEC)in Israel has undergone extensive reform and now requires daycare centers to meet internationally recognized professional standards. Since 1948, one of the aims of childcare facilities was to enable women’s participation in the workforce.A 1965 law grouped daycare centers for young children with facilities for the elderly and for disabled persons under the same authority. In the 1970’s, ECEC leaders sought to change childcare from proprietary to educational facilities. From 1976 deliberations in the Knesset regarding appropriate attribution of ECEC frameworks resulted in their being moved to various authorities that supported women’s employment: Ministries of Finance, Industry, and Commerce, as well as the Welfare Department. Prior to 2018, 75% of infants and toddlers in institutional care were in unlicensed and unsupervised settings. Legislative processes accompanied the conceptual change to an eventual appropriate attribution of ECEC frameworks. Position papers over the past two decades resulted in recommendations for standards conforming to OECD regulations. Simultaneous incidents of child abuse, some resulting in death, riveted public attention to the need for adequate government supervision, accelerating the legislative process. Appropriate care for very young children must center on quality interactions with caregivers, thus requiring adequate staff training. Finally, in 2018 a law was passed stipulating standards for staff training, proper facilities, child-adult ratios, and safety measures. The Ariav commission expanded training to caregivers for ages 0-3. Transfer of the ECEC to the Ministry of Education ensured establishment of basic training. Groundwork created by new legislation initiated professional development of EC educators for ages 0-3. This process should raise salaries and bolster the system’s ability to attract quality employees. In 2022 responsibility for ECEC ages 0-3 was transferred from the Ministry of Finance to the Ministry of Education, shifting emphasis from proprietary care to professional considerations focusing on wellbeing and early childhood education. The recent revolutionary changes in ECEC point to a new age in the care and education of Israel’s youngest citizens. Implementation of international standards, adequate training, and professionalization of the workforce focus on the child’s needs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=policy" title="policy">policy</a>, <a href="https://publications.waset.org/abstracts/search?q=early%20childhood" title=" early childhood"> early childhood</a>, <a href="https://publications.waset.org/abstracts/search?q=care%20and%20education" title=" care and education"> care and education</a>, <a href="https://publications.waset.org/abstracts/search?q=daycare" title=" daycare"> daycare</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a> </p> <a href="https://publications.waset.org/abstracts/157655/recent-policy-changes-in-israeli-early-childhood-frameworks-hope-for-the-future" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157655.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">115</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4127</span> The Role of Context in Interpreting Emotional Body Language in Robots</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jekaterina%20Novikova">Jekaterina Novikova</a>, <a href="https://publications.waset.org/abstracts/search?q=Leon%20Watts"> Leon Watts</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the emerging world of human-robot interaction, people and robots will interact socially in real-world situations. This paper presents the results of an experimental study probing the interaction between situational context and emotional body language in robots. 34 people rated video clips of robots performing expressive behaviours in different situational contexts both for emotional expressivity on Valence-Arousal-Dominance dimensions and by selecting a specific emotional term from a list of suggestions. Results showed that a contextual information enhanced a recognition of emotional body language of a robot, although it did not override emotional signals provided by robot expressions. Results are discussed in terms of design guidelines on how an emotional body language of a robot can be used by roboticists developing social robots. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20robotics" title="social robotics">social robotics</a>, <a href="https://publications.waset.org/abstracts/search?q=non-verbal%20communication" title=" non-verbal communication"> non-verbal communication</a>, <a href="https://publications.waset.org/abstracts/search?q=situational%20context" title=" situational context"> situational context</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20emotions" title=" artificial emotions"> artificial emotions</a>, <a href="https://publications.waset.org/abstracts/search?q=body%20language" title=" body language"> body language</a> </p> <a href="https://publications.waset.org/abstracts/20696/the-role-of-context-in-interpreting-emotional-body-language-in-robots" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20696.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">289</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4126</span> Attribution Theory and Perceived Reliability of Cellphones for Teaching and Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mayowa%20A.%20Sofowora">Mayowa A. Sofowora</a>, <a href="https://publications.waset.org/abstracts/search?q=Seraphin%20D.%20Eyono%20Obono"> Seraphin D. Eyono Obono</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The use of information and communication technologies such as computers, mobile phones and the internet is becoming prevalent in today’s world; and it is facilitating access to a vast amount of data, services, and applications for the improvement of people’s lives. However, this prevalence of ICTs is hampered by the problem of low income levels in developing countries to the point where people cannot timeously replace or repair their ICT devices when damaged or lost; and this problem serves as a motivation for this study whose aim is to examine the perceptions of teachers on the reliability of cellphones when used for teaching and learning purposes. The research objectives unfolding this aim are of two types: objectives on the selection and design of theories and models, and objectives on the empirical testing of these theories and models. The first type of objectives is achieved using content analysis in an extensive literature survey, and the second type of objectives is achieved through a survey of high school teachers from the ILembe and Umgungudlovu districts in the KwaZuluNatal province of South Africa. Data collected from this questionnaire based survey is analysed in SPSS using descriptive statistics and Pearson correlations after checking the reliability and validity of the questionnaire. The main hypothesis driving this study is that there is a relationship between the demographics and the attribution identity of teachers on one hand, and their perceptions on the reliability of cellphones on the other hand, as suggested by existing literature; except that attribution identities are considered in this study under three angles: intention, knowledge and ability, and action. The results of this study confirm that the perceptions of teachers on the reliability of cellphones for teaching and learning are affected by the school location of these teachers, and by their perceptions on learners’ cellphones usage intentions and actual use. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attribution" title="attribution">attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=cellphones" title=" cellphones"> cellphones</a>, <a href="https://publications.waset.org/abstracts/search?q=e-learning" title=" e-learning"> e-learning</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability "> reliability </a> </p> <a href="https://publications.waset.org/abstracts/14971/attribution-theory-and-perceived-reliability-of-cellphones-for-teaching-and-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14971.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">401</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4125</span> Investigating the Dimensions of Perceived Attributions in Making Sense of Failure: An Exploratory Study of Lebanese Entrepreneurs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ghiwa%20Dandach">Ghiwa Dandach</a> </p> <p class="card-text"><strong>Abstract:</strong></p> By challenging the anti-failure bias and contributing to the theoretical territory of the attribution theory, this thesis develops a comprehensive process for entrepreneurial learning from failure. The practical implication of the findings suggests assisting entrepreneurs (current, failing, and nascent) in effectively anticipating and reflecting upon failure. Additionally, the process is suggested to enhance the level of institutional and private (accelerators and financers) support provided to entrepreneurs, the implications of which may improve future opportunities for entrepreneurial success. Henceforth, exploring learning from failure is argued to impact the potential survival of future ventures, subsequently revitalizing the economic contribution of entrepreneurship. This learning process can be enhanced with the cognitive development of causal ascriptions for failure, which eventually impacts learning outcomes. However, the mechanism with which entrepreneurs make sense of failure, reflect on the journey, and transform experience into knowledge is still under-researched. More specifically, the cognitive process of failure attribution is under-explored, majorly in the context of developing economies, calling for a more insightful understanding on how entrepreneurs ascribe failure. Responding to the call for more thorough research in such cultural contexts, this study expands the understanding of the dimensions of failure attributions as perceived by entrepreneurs and the impact of these dimensions on learning outcomes in the Lebanese context. The research adopted the exploratory interpretivism paradigm and collected data from interviews with industry experts first, followed by narratives of entrepreneurs using the qualitative multimethod approach. The holistic and categorical content analysis of narratives, preceded by the thematic analysis of interviews, unveiled how entrepreneurs ascribe failure by developing minor and major dimensions of each failure attribution. The findings have also revealed how each dimension impacts the learning from failure when accompanied by emotional resilience. The thesis concludes that exploring in-depth the dimensions of failure attributions significantly determines the level of learning generated. They are moving beyond the simple categorisation of ascriptions as primary internal or external unveiled how learning may occur with each attribution at the individual, venture, and ecosystem levels. This has further accentuated that a major internal attribution of failure combined with a minor external attribution generated the highest levels of transformative and double-loop learning, emphasizing the role of personal blame and responsibility on enhancing learning outcomes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attribution" title="attribution">attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=entrepreneurship" title=" entrepreneurship"> entrepreneurship</a>, <a href="https://publications.waset.org/abstracts/search?q=reflection" title=" reflection"> reflection</a>, <a href="https://publications.waset.org/abstracts/search?q=sense-making" title=" sense-making"> sense-making</a>, <a href="https://publications.waset.org/abstracts/search?q=emotions" title=" emotions"> emotions</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20outcomes" title=" learning outcomes"> learning outcomes</a>, <a href="https://publications.waset.org/abstracts/search?q=failure" title=" failure"> failure</a>, <a href="https://publications.waset.org/abstracts/search?q=exit" title=" exit"> exit</a> </p> <a href="https://publications.waset.org/abstracts/144087/investigating-the-dimensions-of-perceived-attributions-in-making-sense-of-failure-an-exploratory-study-of-lebanese-entrepreneurs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144087.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">227</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4124</span> Teacher Trainers’ Motivation in Transformation of Teaching and Learning: The Fun Way Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Malathi%20Balakrishnan">Malathi Balakrishnan</a>, <a href="https://publications.waset.org/abstracts/search?q=Gananthan%20M.%20Nadarajah"> Gananthan M. Nadarajah</a>, <a href="https://publications.waset.org/abstracts/search?q=Noraini%20Abd%20Rahim"> Noraini Abd Rahim</a>, <a href="https://publications.waset.org/abstracts/search?q=Amy%20Wong%20On%20Mei"> Amy Wong On Mei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of the study is to investigate the level of intrinsic motivation of trainers after attending a Continuous Professional Development Course (CPD) organized by Institute of Teacher Training Malaysia titled, ‘Transformation of Teaching and Learning the Fun Way’. This study employed a survey whereby 96 teacher trainers were given Situational Intrinsic Motivational Scale (SIMS) Instruments. Confirmatory factor analysis was carried out to get validity of this instrument in local setting. Data were analyzed with SPSS for descriptive statistic. Semi structured interviews were also administrated to collect qualitative data on participants experiences after participating in the two-day fun-filled program. The findings showed that the participants’ level of intrinsic motivation showed higher mean than the amotivation. The results revealed that the intrinsic motivation mean is 19.0 followed by Identified regulation with a mean of 17.4, external regulation 9.7 and amotivation 6.9. The interview data also revealed that the participants were motivated after attending this training program. It can be concluded that this program, which was organized by Institute of Teacher Training Malaysia, was able to enhance participants’ level of motivation. Self-Determination Theory (SDT) as a multidimensional approach to motivation was utilized. Therefore, teacher trainers may have more success using the ‘The fun way approach’ in conducting training program in future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=teaching%20and%20learning" title="teaching and learning">teaching and learning</a>, <a href="https://publications.waset.org/abstracts/search?q=motivation" title=" motivation"> motivation</a>, <a href="https://publications.waset.org/abstracts/search?q=teacher%20trainer" title=" teacher trainer"> teacher trainer</a>, <a href="https://publications.waset.org/abstracts/search?q=SDT" title=" SDT"> SDT</a> </p> <a href="https://publications.waset.org/abstracts/37347/teacher-trainers-motivation-in-transformation-of-teaching-and-learning-the-fun-way-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37347.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">461</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4123</span> Real-Time Multi-Vehicle Tracking Application at Intersections Based on Feature Selection in Combination with Color Attribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Qiang%20Zhang">Qiang Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiaojian%20Hu"> Xiaojian Hu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In multi-vehicle tracking, based on feature selection, the tracking system efficiently tracks vehicles in a video with minimal error in combination with color attribution, which focuses on presenting a simple and fast, yet accurate and robust solution to the problem such as inaccurately and untimely responses of statistics-based adaptive traffic control system in the intersection scenario. In this study, a real-time tracking system is proposed for multi-vehicle tracking in the intersection scene. Considering the complexity and application feasibility of the algorithm, in the object detection step, the detection result provided by virtual loops were post-processed and then used as the input for the tracker. For the tracker, lightweight methods were designed to extract and select features and incorporate them into the adaptive color tracking (ACT) framework. And the approbatory online feature selection algorithms are integrated on the mature ACT system with good compatibility. The proposed feature selection methods and multi-vehicle tracking method are evaluated on KITTI datasets and show efficient vehicle tracking performance when compared to the other state-of-the-art approaches in the same category. And the system performs excellently on the video sequences recorded at the intersection. Furthermore, the presented vehicle tracking system is suitable for surveillance applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=real-time" title="real-time">real-time</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-vehicle%20tracking" title=" multi-vehicle tracking"> multi-vehicle tracking</a>, <a href="https://publications.waset.org/abstracts/search?q=feature%20selection" title=" feature selection"> feature selection</a>, <a href="https://publications.waset.org/abstracts/search?q=color%20attribution" title=" color attribution"> color attribution</a> </p> <a href="https://publications.waset.org/abstracts/136438/real-time-multi-vehicle-tracking-application-at-intersections-based-on-feature-selection-in-combination-with-color-attribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/136438.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">163</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4122</span> Examination of Wall Art in Slums to Prevent Crime Case Study: Jabal Al-Natheef</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dana%20Jaber">Dana Jaber</a>, <a href="https://publications.waset.org/abstracts/search?q=Lilian%20Mansor"> Lilian Mansor</a>, <a href="https://publications.waset.org/abstracts/search?q=Lilan%20Al-Nablsi"> Lilan Al-Nablsi</a>, <a href="https://publications.waset.org/abstracts/search?q=Lujain%20Arabiat"> Lujain Arabiat</a>, <a href="https://publications.waset.org/abstracts/search?q=Mariam%20Attoun"> Mariam Attoun</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Preventing crime through environmental designs (CPTED) and situational crime prevention methods (SCP) are used to prevent crimes before they occur by anticipating people's actions and behavior in social situations. Many theories focused on wall art in preventing crimes, Graffiti, and situational crime prevention. The main aim of this research is to assess the wall art in slums and how it could avoid crimes by increasing surveillance by studying Jabal Al-Natheef—using a quantitative methodology to study the social life in the site and accumulate the intended actions to prevent crimes by using art. It was shown that the crimes in the area are severe, and they occur in slums due to the bad conditions, maintenance, and lack of surveillance. A finding of how people in the area would react to the art was a positive conclusion to how it could prevent the crimes. The research findings revealed that implementing wall art in slums would decrease the crimes in the area. This research concluded with a proposal to recommend implementing such skills to deter crimes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CPTED" title="CPTED">CPTED</a>, <a href="https://publications.waset.org/abstracts/search?q=situational%20crime%20prevention" title=" situational crime prevention"> situational crime prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=wall%20art" title=" wall art"> wall art</a>, <a href="https://publications.waset.org/abstracts/search?q=slums" title=" slums"> slums</a> </p> <a href="https://publications.waset.org/abstracts/161807/examination-of-wall-art-in-slums-to-prevent-crime-case-study-jabal-al-natheef" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161807.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">83</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4121</span> Constructivism and Situational Analysis as Background for Researching Complex Phenomena: Example of Inclusion</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Radim%20Sip">Radim Sip</a>, <a href="https://publications.waset.org/abstracts/search?q=Denisa%20Denglerova"> Denisa Denglerova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It’s impossible to capture complex phenomena, such as inclusion, with reductionism. The most common form of reductionism is the objectivist approach, where processes and relationships are reduced to entities and clearly outlined phases, with a consequent search for relationships between them. Constructivism as a paradigm and situational analysis as a methodological research portfolio represent a way to avoid the dominant objectivist approach. They work with a situation, i.e. with the essential blending of actors and their environment. Primary transactions are taking place between actors and their surroundings. Researchers create constructs based on their need to solve a problem. Concepts therefore do not describe reality, but rather a complex of real needs in relation to the available options how such needs can be met. For examination of a complex problem, corresponding methodological tools and overall design of the research are necessary. Using an original research on inclusion in the Czech Republic as an example, this contribution demonstrates that inclusion is not a substance easily described, but rather a relationship field changing its forms in response to its actors’ behaviour and current circumstances. Inclusion consists of dynamic relationship between an ideal, real circumstances and ways to achieve such ideal under the given circumstances. Such achievement has many shapes and thus cannot be captured by description of objects. It can be expressed in relationships in the situation defined by time and space. Situational analysis offers tools to examine such phenomena. It understands a situation as a complex of dynamically changing aspects and prefers relationships and positions in the given situation over a clear and final definition of actors, entities, etc. Situational analysis assumes creation of constructs as a tool for solving a problem at hand. It emphasizes the meanings that arise in the process of coordinating human actions, and the discourses through which these meanings are negotiated. Finally, it offers “cartographic tools” (situational maps, socials worlds / arenas maps, positional maps) that are able to capture the complexity in other than linear-analytical ways. This approach allows for inclusion to be described as a complex of phenomena taking place with a certain historical preference, a complex that can be overlooked if analyzed with a more traditional approach. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=constructivism" title="constructivism">constructivism</a>, <a href="https://publications.waset.org/abstracts/search?q=situational%20analysis" title=" situational analysis"> situational analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=objective%20realism" title=" objective realism"> objective realism</a>, <a href="https://publications.waset.org/abstracts/search?q=reductionism" title=" reductionism"> reductionism</a>, <a href="https://publications.waset.org/abstracts/search?q=inclusion" title=" inclusion"> inclusion</a> </p> <a href="https://publications.waset.org/abstracts/135156/constructivism-and-situational-analysis-as-background-for-researching-complex-phenomena-example-of-inclusion" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135156.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">148</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4120</span> The Effectiveness of Implementing Interactive Training for Teaching Kazakh Language</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samal%20Abzhanova">Samal Abzhanova</a>, <a href="https://publications.waset.org/abstracts/search?q=Saule%20Mussabekova"> Saule Mussabekova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today, a new system of education is being created in Kazakhstan in order to develop the system of education and to satisfy the world class standards. For this purpose, there have been established new requirements and responsibilities to the instructors. Students should not be limited with providing only theoretical knowledge. Also, they should be encouraged to be competitive, to think creatively and critically. Moreover, students should be able to implement these skills into practice. These issues could be resolved through the permanent improvement of teaching methods. Therefore, a specialist who teaches the languages should use up-to-date methods and introduce new technologies. The result of the investigation suggests that an interactive teaching method is one of the new technologies in this field. This paper aims to provide information about implementing new technologies in the process of teaching language. The paper will discuss about necessity of introducing innovative technologies and the techniques of organizing interactive lessons. At the same time, the structure of the interactive lesson, conditions, principles, discussions, small group works and role-playing games will be considered. Interactive methods are carried out with the help of several types of activities, such as working in a team (with two or more group of people), playing situational or role-playing games, working with different sources of information, discussions, presentations, creative works and learning through solving situational tasks and etc. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=interactive%20education" title="interactive education">interactive education</a>, <a href="https://publications.waset.org/abstracts/search?q=interactive%20methods" title=" interactive methods"> interactive methods</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20of%20education" title=" system of education"> system of education</a>, <a href="https://publications.waset.org/abstracts/search?q=teaching%20a%20language" title=" teaching a language"> teaching a language</a> </p> <a href="https://publications.waset.org/abstracts/46245/the-effectiveness-of-implementing-interactive-training-for-teaching-kazakh-language" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46245.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">294</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4119</span> Changes in Vocational Teacher Training in Hungary: Challenges and Possibilities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anetta%20Bacsa-B%C3%A1n">Anetta Bacsa-Bán</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The training of vocational education teachers in Hungary was a special training system before the Bologna system, but under the influence of the Bologna system, the structure and content of the training changed significantly. The training of vocational teachers, including engineering teachers and vocational trainers, is considerably different when compared to the training of public education teachers. This study aims to present these differences and peculiarities, problems and issues of the training as well as to outline the possibilities of further development. During the study, the following methods were implemented: empirical research among students and graduates of vocational teacher training, as well as analysis of the relevant literature. The study summarizes the research and theoretical results related to vocational education and training (VET) teacher training over the past 15 years, with the aim of developing the training and mapping new directions in the field. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=vocational%20teacher" title="vocational teacher">vocational teacher</a>, <a href="https://publications.waset.org/abstracts/search?q=technical%20instructors" title=" technical instructors"> technical instructors</a>, <a href="https://publications.waset.org/abstracts/search?q=technical%20vocational%20instructors" title=" technical vocational instructors"> technical vocational instructors</a>, <a href="https://publications.waset.org/abstracts/search?q=theoretical%20aspects" title=" theoretical aspects"> theoretical aspects</a> </p> <a href="https://publications.waset.org/abstracts/142608/changes-in-vocational-teacher-training-in-hungary-challenges-and-possibilities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142608.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">257</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4118</span> Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shaila%20Rana">Shaila Rana</a>, <a href="https://publications.waset.org/abstracts/search?q=Wasim%20Alhamdani"> Wasim Alhamdani </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Effective cybersecurity training is of the utmost importance, given the plethora of attacks that continue to increase in complexity and ubiquity. VR cybersecurity training remains a starkly understudied discipline. Studies that evaluated the effectiveness of VR cybersecurity training over traditional methods are required. An engaging and interactive platform can support knowledge retention of the training material. Consequently, an effective form of cybersecurity training is required to support a culture of cybersecurity awareness. Measurements of effectiveness varied throughout the studies, with surveys and observations being the two most utilized forms of evaluating effectiveness. Further research is needed to evaluate the effectiveness of VR cybersecurity training and traditional training. Additionally, research for evaluating if VR cybersecurity training is more effective than traditional methods is vital. This paper proposes a methodology to compare the two cybersecurity training methods and their effectiveness. The proposed framework includes developing both VR and traditional cybersecurity training methods and delivering them to at least 100 users. A quiz along with a survey will be administered and statistically analyzed to determine if there is a difference in knowledge retention and user satisfaction. The aim of this paper is to bring attention to the need to study VR cybersecurity training and its effectiveness compared to traditional training methods. This paper hopes to contribute to the cybersecurity training field by providing an effective way to train users for security awareness. If VR training is deemed more effective, this could create a new direction for cybersecurity training practices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=virtual%20reality%20cybersecurity%20training" title="virtual reality cybersecurity training">virtual reality cybersecurity training</a>, <a href="https://publications.waset.org/abstracts/search?q=VR%20cybersecurity%20training" title=" VR cybersecurity training"> VR cybersecurity training</a>, <a href="https://publications.waset.org/abstracts/search?q=traditional%20cybersecurity%20training" title=" traditional cybersecurity training"> traditional cybersecurity training</a> </p> <a href="https://publications.waset.org/abstracts/132319/exploring-the-need-to-study-the-efficacy-of-vr-training-compared-to-traditional-cybersecurity-training" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/132319.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">215</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4117</span> A Virtual Reality Cybersecurity Training Knowledge-Based Ontology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shaila%20Rana">Shaila Rana</a>, <a href="https://publications.waset.org/abstracts/search?q=Wasim%20Alhamdani"> Wasim Alhamdani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Effective cybersecurity learning relies on an engaging, interactive, and entertaining activity that fosters positive learning outcomes. VR cybersecurity training may promote these aforementioned variables. However, a methodological approach and framework have not yet been created to allow trainers and educators to employ VR cybersecurity training methods to promote positive learning outcomes to the author’s best knowledge. Thus, this paper aims to create an approach that cybersecurity trainers can follow to create a VR cybersecurity training module. This methodology utilizes concepts from other cybersecurity training frameworks, such as NICE and CyTrONE. Other cybersecurity training frameworks do not incorporate the use of VR. VR training proposes unique challenges that cannot be addressed in current cybersecurity training frameworks. Subsequently, this ontology utilizes concepts unique to developing VR training to create a relevant methodology for creating VR cybersecurity training modules. The outcome of this research is to create a methodology that is relevant and useful for designing VR cybersecurity training modules. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=virtual%20reality%20cybersecurity%20training" title="virtual reality cybersecurity training">virtual reality cybersecurity training</a>, <a href="https://publications.waset.org/abstracts/search?q=VR%20cybersecurity%20training" title=" VR cybersecurity training"> VR cybersecurity training</a>, <a href="https://publications.waset.org/abstracts/search?q=traditional%20cybersecurity%20training" title=" traditional cybersecurity training"> traditional cybersecurity training</a>, <a href="https://publications.waset.org/abstracts/search?q=ontology" title=" ontology"> ontology</a> </p> <a href="https://publications.waset.org/abstracts/138790/a-virtual-reality-cybersecurity-training-knowledge-based-ontology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/138790.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">289</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4116</span> The Effect of Resistance and Progressive Training on Hsp 70 and Glucose</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=F.%20Nameni">F. Nameni</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Poursadra"> H. Poursadra</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The present study investigated resistance and progressive training alters the expression of chaperone proteins. These proteins function to maintain homeostasis, facilitate repair from injury, and provide protection. Nineteen training female in 2 groups taking part in the intervention volunteered to give blood samples. Levels of chaperone proteins were measured in response to resistance and progressive training. Hsp 70 levels were increased immediately after 2 h progressive training but decreased after resistance training. The data showed that human skeletal muscle responds to the stress of a single period of progressive training by up-regulating and resistance training by down-regulating expression of HSP70. Physical exercise can elevate core temperature and muscle temperatures and the expression pattern of HSP70 due to training status may be attributed to adaptive mechanisms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=resistance%20training" title="resistance training">resistance training</a>, <a href="https://publications.waset.org/abstracts/search?q=heat%20shock%20proteins" title=" heat shock proteins"> heat shock proteins</a>, <a href="https://publications.waset.org/abstracts/search?q=leukocytes" title=" leukocytes"> leukocytes</a>, <a href="https://publications.waset.org/abstracts/search?q=Hsp%2070" title=" Hsp 70"> Hsp 70</a> </p> <a href="https://publications.waset.org/abstracts/12855/the-effect-of-resistance-and-progressive-training-on-hsp-70-and-glucose" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12855.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">458</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4115</span> The Computational Psycholinguistic Situational-Fuzzy Self-Controlled Brain and Mind System Under Uncertainty</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ben%20Khayut">Ben Khayut</a>, <a href="https://publications.waset.org/abstracts/search?q=Lina%20Fabri"> Lina Fabri</a>, <a href="https://publications.waset.org/abstracts/search?q=Maya%20Avikhana"> Maya Avikhana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The models of the modern Artificial Narrow Intelligence (ANI) cannot: a) independently and continuously function without of human intelligence, used for retraining and reprogramming the ANI’s models, and b) think, understand, be conscious, cognize, infer, and more in state of Uncertainty, and changes in situations, and environmental objects. To eliminate these shortcomings and build a new generation of Artificial Intelligence systems, the paper proposes a Conception, Model, and Method of Computational Psycholinguistic Cognitive Situational-Fuzzy Self-Controlled Brain and Mind System (CPCSFSCBMSUU) using a neural network as its computational memory, operating under uncertainty, and activating its functions by perception, identification of real objects, fuzzy situational control, forming images of these objects, modeling their psychological, linguistic, cognitive, and neural values of properties and features, the meanings of which are identified, interpreted, generated, and formed taking into account the identified subject area, using the data, information, knowledge, and images, accumulated in the Memory. The functioning of the CPCSFSCBMSUU is carried out by its subsystems of the: fuzzy situational control of all processes, computational perception, identifying of reactions and actions, Psycholinguistic Cognitive Fuzzy Logical Inference, Decision making, Reasoning, Systems Thinking, Planning, Awareness, Consciousness, Cognition, Intuition, Wisdom, analysis and processing of the psycholinguistic, subject, visual, signal, sound and other objects, accumulation and using the data, information and knowledge in the Memory, communication, and interaction with other computing systems, robots and humans in order of solving the joint tasks. To investigate the functional processes of the proposed system, the principles of Situational Control, Fuzzy Logic, Psycholinguistics, Informatics, and modern possibilities of Data Science were applied. The proposed self-controlled System of Brain and Mind is oriented on use as a plug-in in multilingual subject Applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computational%20brain" title="computational brain">computational brain</a>, <a href="https://publications.waset.org/abstracts/search?q=mind" title=" mind"> mind</a>, <a href="https://publications.waset.org/abstracts/search?q=psycholinguistic" title=" psycholinguistic"> psycholinguistic</a>, <a href="https://publications.waset.org/abstracts/search?q=system" title=" system"> system</a>, <a href="https://publications.waset.org/abstracts/search?q=under%20uncertainty" title=" under uncertainty"> under uncertainty</a> </p> <a href="https://publications.waset.org/abstracts/152054/the-computational-psycholinguistic-situational-fuzzy-self-controlled-brain-and-mind-system-under-uncertainty" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152054.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">177</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=situational%20attribution%20training&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=situational%20attribution%20training&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=situational%20attribution%20training&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=situational%20attribution%20training&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=situational%20attribution%20training&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=situational%20attribution%20training&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=situational%20attribution%20training&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=situational%20attribution%20training&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=situational%20attribution%20training&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=situational%20attribution%20training&page=138">138</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=situational%20attribution%20training&page=139">139</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=situational%20attribution%20training&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>