Search results for: TRIZ (Theory of Inventive Problem Solving)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11772

Search results for: TRIZ (Theory of Inventive Problem Solving)

8622 Effect of Problem Based Learning (PBL) Activities to Thai Undergraduate Student Teachers Attitude and Their Achievement

Authors: Thanawit Tongmai, Chatchawan Saewor

Abstract:

Learning management is very important for students’ development. To promote students’ potential, the teacher should design appropriate learning activity that brings their students potential out. Problem based learning has been using worldwide and it has presented numerous of success. This research aims to study third year students’ attitude and their achievement in scientific research course. To find the results, mix method was used to design research conduction. The researcher used PBL and reflection activity in the class. The students had to choose a topic, reviewed information, designed experimental, wrote academic report and presented their research by themselves. The researcher was only a facilitator. Reflection activity was used to progressing and consulting their research. The data was collected along with research conduction by questionnaire and test, including attitude, opinion and their achievement. The result of this study showed that 74.71% from all of students (n = 87) benefited from PBL and reflection activity, while 25.19% were just satisfied. 100% of students had a positive reflection toward PBL activity and they believed that PBL was the best pedagogy method for scientific research course. The achievements of these students were higher than the previous study (P < 0.05). The student’s learning achievement, A, B+ and B, was 48.28, 28.74 and 22.98% respectively. Therefore, it can conclude that PBL activity is appropriate for scientific research course and it can also promote student’s achievement.

Keywords: reflection, attitude, learning, achievement, PBL

Procedia PDF Downloads 279
8621 Blockchain Technology Security Evaluation: Voting System Based on Blockchain

Authors: Omid Amini

Abstract:

Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election.

Keywords: blockchain, technology, security, information, voting system, transparency

Procedia PDF Downloads 124
8620 AI-Based Information System for Hygiene and Safety Management of Shared Kitchens

Authors: Jongtae Rhee, Sangkwon Han, Seungbin Ji, Junhyeong Park, Byeonghun Kim, Taekyung Kim, Byeonghyeon Jeon, Jiwoo Yang

Abstract:

The shared kitchen is a concept that transfers the value of the sharing economy to the kitchen. It is a type of kitchen equipped with cooking facilities that allows multiple companies or chefs to share time and space and use it jointly. These shared kitchens provide economic benefits and convenience, such as reduced investment costs and rent, but also increase the risk of safety management, such as cross-contamination of food ingredients. Therefore, to manage the safety of food ingredients and finished products in a shared kitchen where several entities jointly use the kitchen and handle various types of food ingredients, it is critical to manage followings: the freshness of food ingredients, user hygiene and safety and cross-contamination of cooking equipment and facilities. In this study, it propose a machine learning-based system for hygiene safety and cross-contamination management, which are highly difficult to manage. User clothing management and user access management, which are most relevant to the hygiene and safety of shared kitchens, are solved through machine learning-based methodology, and cutting board usage management, which is most relevant to cross-contamination management, is implemented as an integrated safety management system based on artificial intelligence. First, to prevent cross-contamination of food ingredients, we use images collected through a real-time camera to determine whether the food ingredients match a given cutting board based on a real-time object detection model, YOLO v7. To manage the hygiene of user clothing, we use a camera-based facial recognition model to recognize the user, and real-time object detection model to determine whether a sanitary hat and mask are worn. In addition, to manage access for users qualified to enter the shared kitchen, we utilize machine learning based signature recognition module. By comparing the pairwise distance between the contract signature and the signature at the time of entrance to the shared kitchen, access permission is determined through a pre-trained signature verification model. These machine learning-based safety management tasks are integrated into a single information system, and each result is managed in an integrated database. Through this, users are warned of safety dangers through the tablet PC installed in the shared kitchen, and managers can track the cause of the sanitary and safety accidents. As a result of system integration analysis, real-time safety management services can be continuously provided by artificial intelligence, and machine learning-based methodologies are used for integrated safety management of shared kitchens that allows dynamic contracts among various users. By solving this problem, we were able to secure the feasibility and safety of the shared kitchen business.

Keywords: artificial intelligence, food safety, information system, safety management, shared kitchen

Procedia PDF Downloads 61
8619 Capitalizing on Differential Network Ties: Unpacking Individual Creativity from Social Capital Perspective

Authors: Yuanyuan Wang, Chun Hui

Abstract:

Drawing on social capital theory, this article discusses how individuals may utilize network ties to come up with creativity. Social capital theory elaborates how network ties enhances individual creativity from three dimensions: structural access, and relational and cognitive mechanisms. We categorize network ties into strong and weak in terms of tie strength. With less structural constraints, weak ties allow diverse and heterogeneous knowledge to prosper, further facilitating individuals to build up connections among diverse even distant ideas. On the other hand, strong ties with the relational mechanism of cooperation and trust may benefit the accumulation of psychological capital, ultimately to motivate and sustain creativity. We suggest that differential ties play different roles for individual creativity: Weak ties deliver informational benefit directly rifling individual creativity from informational resource aspect; strong ties offer solidarity benefits to reinforce psychological capital, which further inspires individual creativity engagement from a psychological viewpoint. Social capital embedded in network ties influence individuals’ informational acquisition, motivation, as well as cognitive ability to be creative. Besides, we also consider the moderating effects constraining the relatedness between network ties and creativity, such as knowledge articulability. We hypothesize that when the extent of knowledge articulability is low, that is, with low knowledge codifiability, and high dependency and ambiguity, weak ties previous serving as knowledge reservoir will not become ineffective on individual creativity. Two-wave survey will be employed in Mainland China to empirically test mentioned propositions.

Keywords: network ties, social capital, psychological capital, knowledge articulability, individual creativity

Procedia PDF Downloads 398
8618 Empowering 21st Century Students with Self-Employability Skill Competencies in an Era of Uncertainties of Paid Employment Jobs

Authors: Pac Ordu

Abstract:

The paper was conceived on the premise that employment of tertiary education graduates has become an endemic problem in Nigeria. Recognizing the objective of current education as schooling for paid employment, the paper identified that the basic objective of present-day education should be schooling to become self-employed. While schooling to become a successful employee was identified as the focus for the older generation, schooling to become self-employed was defined as the focus for 21st-century teaching and learning. Hence, the paper condemned the inability of curriculum implementers to teach creative trends to enable students to acquire practical skills and small business operation-oriented competencies. A review of some disciplines was made to show the new trend of education that would empower Nigerian students with small business enterprise operation skills for self-employment on graduation. This was further made to draw the attention of institutions and curriculum designers to the need for our curriculum to be functional in line with demands of the innovative economic environment. The paper also noted that at periods of recession with its attendant effects, was the best period for students of entrepreneurship to dream and create their small business enterprises. It highlighted the role of Federal College of Education (Technical) Omoku, Rivers State, Nigeria and the national recognition it has received for developing an innovative, practical model of teaching entrepreneurship education in Nigeria Colleges of Education system. In order to equip students for economic survival on graduation, the introduction of innovative teaching can only be successful if lecturers shift their focus away from the conventional emphasis on theory to students’ energy quotients. While the paper obviously recommended that lecturers should be creative and teach outside the curriculum box, it further recommended that students should use this period of their studentship to dream, create and operate their own small business enterprises.

Keywords: 21st century students, curriculum, entrepreneurship, hands-on-training, innovative

Procedia PDF Downloads 111
8617 Governance of Inter-Organizational Research Cooperation

Authors: Guenther Schuh, Sebastian Woelk

Abstract:

Companies face increasing challenges in research due to higher costs and risks. The intensifying technology complexity and interdisciplinarity require unique know-how. Therefore, companies need to decide whether research shall be conducted internally or externally with partners. On the other hand, research institutes meet increasing efforts to achieve good financing and to maintain high research reputation. Therefore, relevant research topics need to be identified and specialization of competency is necessary. However, additional competences for solving interdisciplinary research projects are also often required. Secured financing can be achieved by bonding industry partners as well as public fundings. The realization of faster and better research drives companies and research institutes to cooperate in organized research networks, which are managed by an administrative organization. For an effective and efficient cooperation, necessary processes, roles, tools and a set of rules need to be determined. The goal of this paper is to show the state-of-art research and to propose a governance framework for organized research networks.

Keywords: interorganizational cooperation, design of network governance, research network

Procedia PDF Downloads 364
8616 Feasibility of Small Hydropower Plants Odisha

Authors: Sanoj Sahu, Ramakar Jha

Abstract:

Odisha (India) is in need of reliable, cost-effective power generation. A prolonged electricity crisis and increasing power demand have left over thousands of citizens without access to electricity, and much of the population suffers from sporadic outages. The purpose of this project is to build a methodology to evaluate small hydropower potential, which can be used to alleviate the Odisha’s energy problem among rural communities. This project has three major tasks: the design of a simple SHEP for a single location along a river in the Odisha; the development of water flow prediction equations through a linear regression analysis; and the design of an ArcGIS toolset to estimate the flow duration curves (FDCs) at locations where data do not exist. An explanation of the inputs to the tool, as well has how it produces a suitable output for SHEP evaluation will be presented. The paper also gives an explanation of hydroelectric power generation in the Odisha, SHEPs, and the technical and practical aspects of hydroelectric power. Till now, based on topographical and rainfall analysis we have located hundreds of sites. Further work on more number of site location and accuracy of location is to be done.

Keywords: small hydropower, ArcGIS, rainfall analysis, Odisha’s energy problem

Procedia PDF Downloads 444
8615 From Plate to Self-Perception: Unravelling the Interplay Between Food Security and Self-Esteem Among Malaysian University Students

Authors: Amiraa Ali Mansor, Haslinda Abdullah, Angela Chan Nguk Fong, Norhaida Hanim Binti Ahmad Tajudin, Asnarulkhadi Abu Samah

Abstract:

Obesity has risen sharply over the past three decades, posing a grave public health concern globally. In Malaysia, it has also emerged as a significant health threat. While the second Sustainable Development Goal, "Zero Hunger", aims to ensure equitable access to nutritious food for all, a key challenge lies in addressing food insecurity. Food insecurity not only pertains to the quantity but also the quality of food, with both dimensions playing a pivotal role in health outcomes. To date, much of the research on food security has focused on household levels. There remains a research gap concerning university students, a population transitioning to independence from parental support and grappling with limited resources. This study seeks to bridge this gap by extending the Food Security Theory to incorporate the psychological dimension of self-esteem. Using a quantitative approach, data was collected from 452 public university students in Malaysia through a cross-sectional research design and a multi-stage cluster sampling technique. The anticipated findings will provide novel insights by linking food security with self-esteem. Such insights have implications for healthcare policy and the framing of preventive strategies against obesity. It is hoped that this research will not only contribute to the academic discourse on Food Security Theory but also serve as a foundation for refining national health policies and programs aimed at fostering a healthier lifestyle.

Keywords: obesity, food security, body image, self-esteem

Procedia PDF Downloads 71
8614 Heat Transfer Enhancement through Hybrid Metallic Nanofluids Flow with Viscous Dissipation and Joule Heating Effect

Authors: Khawar Ali

Abstract:

We present the numerical study of unsteady hydromagnetic (MHD) flow and heat transfer characteristics of a viscous incompressible electrically conducting water-based hybrid metallic nanofluid (containing Cu-Au/ H₂O nanoparticles) between two orthogonally moving porous coaxial disks with suction. Different from the classical shooting methodology, we employ a combination of a direct and an iterative method (SOR with optimal relaxation parameter) for solving the sparse systems of linear algebraic equations arising from the FD discretization of the linearized self similar nonlinear ODEs. Effects of the governing parameters on the flow and heat transfer are discussed and presented through tables and graphs. The findings of the present investigation may be beneficial for the electronic industry in maintaining the electronic components under effectiveand safe operational conditions.

Keywords: heat transfer enhancement, hybrid metallic nanofluid, viscous dissipation and joule heating effect , Two dimensional flow

Procedia PDF Downloads 225
8613 Saliency Detection Using a Background Probability Model

Authors: Junling Li, Fang Meng, Yichun Zhang

Abstract:

Image saliency detection has been long studied, while several challenging problems are still unsolved, such as detecting saliency inaccurately in complex scenes or suppressing salient objects in the image borders. In this paper, we propose a new saliency detection algorithm in order to solving these problems. We represent the image as a graph with superixels as nodes. By considering appearance similarity between the boundary and the background, the proposed method chooses non-saliency boundary nodes as background priors to construct the background probability model. The probability that each node belongs to the model is computed, which measures its similarity with backgrounds. Thus we can calculate saliency by the transformed probability as a metric. We compare our algorithm with ten-state-of-the-art salient detection methods on the public database. Experimental results show that our simple and effective approach can attack those challenging problems that had been baffling in image saliency detection.

Keywords: visual saliency, background probability, boundary knowledge, background priors

Procedia PDF Downloads 423
8612 Person-Led Organizations Nurture Bullying Behavior: A Qualitative Study

Authors: Shreya Mishra, Manosi Chaudhuri, Ajoy K. Dey

Abstract:

Workplace bullying is a social phenomenon which has proved to be hazardous not only for employees’ well-being but also organizations. Despite being prevalent across geographical boundaries, Indian organizations have failed to acknowledge its vices. This paper aims to understand targets’ perception on what makes bullying nurture in organizations. The paper suggests that person-led Indian work settings give birth to bullying behavior as it lacks professional acumen and systems. An analysis of 13 in-depth interviews of employees from the organized sector suggests that organizations, where decision making lies with single individual, may be a hub of hostile behavior due to the culture which promotes ‘yesmanship’, ‘authoritarianism’ and/or blind belief of leaders on certain set of employees. The study used constructivist grounded theory approach, and the data was analyzed using R Based Qualitative Data Analysis (RQDA) software. Respondents reported that bullying behavior is taken lightly by the management with 'just ignore it' attitude. According to the respondents, the behavior prolong as the perpetrator have a direct approach to the top authority. The study concludes that person-led organizations may create a family-like environment which is favored by employees; however, authoritative leaders are unable to gain the trust of employees. Also, employees who are close to the leader may either be a perpetrator or a target of bullying. It is recommended that leaders in such organizations need to acknowledge the presence of bullying which affects an employees’ commitment towards their job and/or organization. They need to have an assertive check on individuals who hide behind ‘yesman’ attitude. This may help employees feel safe in such work settings.

Keywords: constructivist grounded theory, person-led organization, RQDA, workplace bullying

Procedia PDF Downloads 201
8611 Concrete Sewer Pipe Corrosion Induced by Sulphuric Acid Environment

Authors: Anna Romanova, Mojtaba Mahmoodian, Upul Chandrasekara, Morteza A. Alani

Abstract:

Corrosion of concrete sewer pipes induced by sulphuric acid attack is a recognised problem worldwide, which is not only an attribute of countries with hot climate conditions as thought before. The significance of this problem is by far only realised when the pipe collapses causing surface flooding and other severe consequences. To change the existing post-reactive attitude of managing companies, easy to use and robust models are required to be developed which currently lack reliable data to be correctly calibrated. This paper focuses on laboratory experiments of establishing concrete pipe corrosion rate by submerging samples in to 0.5 pH sulphuric acid solution for 56 days under 10ºC, 20ºC and 30ºC temperature regimes. The result showed that at very early stage of the corrosion process the samples gained overall mass, at 30ºC the corrosion progressed quicker than for other temperature regimes, however with time the corrosion level for 10ºC and 20ºC regimes tended towards those at 30ºC. Overall, at these conditions the corrosion rates of 10 mm/year, 13,5 mm/year, and 17 mm/year were observed.

Keywords: sewer pipes, concrete corrosion, sulphuric acid, concrete coupons, corrosion rate

Procedia PDF Downloads 327
8610 Short-Range and Long-Range Ferrimagnetic Order in Fe(Te₁.₅Se₀.₅)O₅Cl

Authors: E. S. Kozlyakova, A. A. Eliseev, A. V. Moskin, A. Y. Akhrorov, P. S. Berdonosov, V. A. Dolgikh, K. N. Denisova, P. Lemmens, B. Rahaman, S. Das, T. Saha-Dasgupta, A. N. Vasiliev, O. S. Volkova

Abstract:

Considerable attention has been paid recently to FeTe₂O₅Cl due to reduced dimensionality and frustration in the magnetic subsystem, succession of phase transitions, and multiferroicity. The efforts to grow its selenite sibling resulted in mixed halide compound, Fe(Te₁.₅Se₀.₅)O₅Cl, which was found crystallizing in a new structural type and possessing properties drastically different from those of a parent system. Hereby we report the studies of magnetization M and specific heat Cₚ, combined with Raman spectroscopy and density functional theory calculations in Fe(Te₁.₅Se₀.₅)O₅Cl. Its magnetic subsystem features weakly coupled Fe³⁺ - Fe³⁺ dimers showing the regime of short-range correlations at TM ~ 70 K and long-range order at TN = 22 K. In a magnetically ordered state, sizable spin-orbital interactions lead to a small canting of Fe³⁺ moments. The density functional theory calculations of leading exchange interactions were found in agreement with measurements of thermodynamic properties and Raman spectroscopy. Besides, because of the relatively large magnetic moment of the Fe³⁺ ion, we found that magnetic dipole-dipole interactions contribute significantly to experimentally observed orientation of magnetization easy axis in ac-plane. As a conclusion, we suggest a model of magnetic subsystem in magnetically ordered state of Fe(Te₁.₅Se₀.₅)O₅Cl based on a model of interacting dimers.

Keywords: dipole-dipole interactions, low dimensional magnetism, selenite, spin canting

Procedia PDF Downloads 157
8609 Worst-Case Load Shedding in Electric Power Networks

Authors: Fu Lin

Abstract:

We consider the worst-case load-shedding problem in electric power networks where a number of transmission lines are to be taken out of service. The objective is to identify a prespecified number of line outages that lead to the maximum interruption of power generation and load at the transmission level, subject to the active power-flow model, the load and generation capacity of the buses, and the phase-angle limit across the transmission lines. For this nonlinear model with binary constraints, we show that all decision variables are separable except for the nonlinear power-flow equations. We develop an iterative decomposition algorithm, which converts the worst-case load shedding problem into a sequence of small subproblems. We show that the subproblems are either convex problems that can be solved efficiently or nonconvex problems that have closed-form solutions. Consequently, our approach is scalable for large networks. Furthermore, we prove the convergence of our algorithm to a critical point, and the objective value is guaranteed to decrease throughout the iterations. Numerical experiments with IEEE test cases demonstrate the effectiveness of the developed approach.

Keywords: load shedding, power system, proximal alternating linearization method, vulnerability analysis

Procedia PDF Downloads 136
8608 Digital Watermarking Based on Visual Cryptography and Histogram

Authors: R. Rama Kishore, Sunesh

Abstract:

Nowadays, robust and secure watermarking algorithm and its optimization have been need of the hour. A watermarking algorithm is presented to achieve the copy right protection of the owner based on visual cryptography, histogram shape property and entropy. In this, both host image and watermark are preprocessed. Host image is preprocessed by using Butterworth filter, and watermark is with visual cryptography. Applying visual cryptography on water mark generates two shares. One share is used for embedding the watermark, and the other one is used for solving any dispute with the aid of trusted authority. Usage of histogram shape makes the process more robust against geometric and signal processing attacks. The combination of visual cryptography, Butterworth filter, histogram, and entropy can make the algorithm more robust, imperceptible, and copy right protection of the owner.

Keywords: digital watermarking, visual cryptography, histogram, butter worth filter

Procedia PDF Downloads 351
8607 Rubbish to Rupees: The Story of Bishanpur Tzeco Panchayat, Bhagalpur District, State- Bihar, India

Authors: Arvind Kumar

Abstract:

Bishanpur Tzecho Panchayat presents exemplary evidence of community efforts backed by convergent action by the district water and sanitation mission in management of solid waste enhancing prosperity in the area and improvement in the quality of life. BishanpurTzeco Panchayat faced a major problem of waste management with garbage, cow dung piling up in public places leading to protests by residents. To address this problem, in collaboration with the Agriculture University and support of district administration, PHED ( Public Health & Engineering Department) and the district and block coordinators of SBM ( Swachh Bharat Mission), communities decided to go for vermicomposting to get rid of the menace of cow dung and other solid home and farm waste. Today, Bishanpur is largely garbage free, as the people realize the value of waste and how can it contribute to their well-being and prosperity. The people of the Panchayat have demonstrated that waste is a resource. Bishanpur Tzecho is a panchayat of Goradih Block of Bhagalpur district, the silk city of Bihar, India.

Keywords: solid waste management in Bishanpur Tzeco Panchayat, Bhagalpur district, State- Bihar, India

Procedia PDF Downloads 408
8606 A Computational Framework for Decoding Hierarchical Interlocking Structures with SL Blocks

Authors: Yuxi Liu, Boris Belousov, Mehrzad Esmaeili Charkhab, Oliver Tessmann

Abstract:

This paper presents a computational solution for designing reconfigurable interlocking structures that are fully assembled with SL Blocks. Formed by S-shaped and L-shaped tetracubes, SL Block is a specific type of interlocking puzzle. Analogous to molecular self-assembly, the aggregation of SL blocks will build a reversible hierarchical and discrete system where a single module can be numerously replicated to compose semi-interlocking components that further align, wrap, and braid around each other to form complex high-order aggregations. These aggregations can be disassembled and reassembled, responding dynamically to design inputs and changes with a unique capacity for reconfiguration. To use these aggregations as architectural structures, we developed computational tools that automate the configuration of SL blocks based on architectural design objectives. There are three critical phases in our work. First, we revisit the hierarchy of the SL block system and devise a top-down-type design strategy. From this, we propose two key questions: 1) How to translate 3D polyominoes into SL block assembly? 2) How to decompose the desired voxelized shapes into a set of 3D polyominoes with interlocking joints? These two questions can be considered the Hamiltonian path problem and the 3D polyomino tiling problem. Then, we derive our solution to each of them based on two methods. The first method is to construct the optimal closed path from an undirected graph built from the voxelized shape and translate the node sequence of the resulting path into the assembly sequence of SL blocks. The second approach describes interlocking relationships of 3D polyominoes as a joint connection graph. Lastly, we formulate the desired shapes and leverage our methods to achieve their reconfiguration within different levels. We show that our computational strategy will facilitate the efficient design of hierarchical interlocking structures with a self-replicating geometric module.

Keywords: computational design, SL-blocks, 3D polyomino puzzle, combinatorial problem

Procedia PDF Downloads 124
8605 Movement of the Viscous Elastic Fixed Vertically Located Cylinder in Liquid with the Free Surface Under the Influence of Waves

Authors: T. J. Hasanova, C. N. Imamalieva

Abstract:

The problem about the movement of the rigid cylinder keeping the vertical position under the influence of running superficial waves in a liquid is considered. The indignation of a falling wave caused by the presence of the cylinder which moves is thus considered. Special decomposition on a falling harmonious wave is used. The problem dares an operational method. For a finding of the original decision, Considering that the image denominator represents a tabular function, Voltaire's integrated equation of the first sort which dares a numerical method is used. Cylinder movement in the continuous environment under the influence of waves is considered in work. Problems are solved by an operational method, thus originals of required functions are looked for by the numerical definition of poles of combinations of transcendental functions and calculation of not own integrals. Using specificity of a task below, Decisions are under construction the numerical solution of the integrated equation of Volter of the first sort that does not create computing problems of the complex roots of transcendental functions connected with search.

Keywords: rigid cylinder, linear interpolation, fluctuations, Voltaire's integrated equation, harmonious wave

Procedia PDF Downloads 316
8604 Scenario-Based Scales and Situational Judgment Tasks to Measure the Social and Emotional Skills

Authors: Alena Kulikova, Leonid Parmaksiz, Ekaterina Orel

Abstract:

Social and emotional skills are considered by modern researchers as predictors of a person's success both in specific areas of activity and in the life of a person as a whole. The popularity of this scientific direction ensures the emergence of a large number of practices aimed at developing and evaluating socio-emotional skills. Assessment of social and emotional development is carried out at the national level, as well as at the level of individual regions and institutions. Despite the fact that many of the already existing social and emotional skills assessment tools are quite convenient and reliable, there are now more and more new technologies and task formats which improve the basic characteristics of the tools. Thus, the goal of the current study is to develop a tool for assessing social and emotional skills such as emotion recognition, emotion regulation, empathy and a culture of self-care. To develop a tool assessing social and emotional skills, Rasch-Gutman scenario-based approach was used. This approach has shown its reliability and merit for measuring various complex constructs: parental involvement; teacher practices that support cultural diversity and equity; willingness to participate in the life of the community after psychiatric rehabilitation; educational motivation and others. To assess emotion recognition, we used a situational judgment task based on OCC (Ortony, Clore, and Collins) emotions theory. The main advantage of these two approaches compare to classical Likert scales is that it reduces social desirability in answers. A field test to check the psychometric properties of the developed instrument was conducted. The instrument was developed for the presidential autonomous non-profit organization “Russia - Land of Opportunity” for nationwide soft skills assessment among higher education students. The sample for the field test consisted of 500 people, students aged from 18 to 25 (mean = 20; standard deviation 1.8), 71% female. 67% of students are only studying and are not currently working and 500 employed adults aged from 26 to 65 (mean = 42.5; SD 9), 57% female. Analysis of the psychometric characteristics of the scales was carried out using the methods of IRT (Item Response Theory). A one-parameter rating scale model RSM (Rating scale model) and Graded Response model (GRM) of the modern testing theory were applied. GRM is a polyatomic extension of the dichotomous two-parameter model of modern testing theory (2PL) based on the cumulative logit function for modeling the probability of a correct answer. The validity of the developed scales was assessed using correlation analysis and MTMM (multitrait-multimethod matrix). The developed instrument showed good psychometric quality and can be used by HR specialists or educational management. The detailed results of a psychometric study of the quality of the instrument, including the functioning of the tasks of each scale, will be presented. Also, the results of the validity study by MTMM analysis will be discussed.

Keywords: social and emotional skills, psychometrics, MTMM, IRT

Procedia PDF Downloads 69
8603 Optimization of Groundwater Utilization in Fish Aquaculture

Authors: M. Ahmed Eldesouky, S. Nasr, A. Beltagy

Abstract:

Groundwater is generally considered as the best source for aquaculture as it is well protected from contamination. The most common problem limiting the use of groundwater in Egypt is its high iron, manganese and ammonia content. This problem is often overcome by applying the treatment before use. Aeration in many cases is not enough to oxidize iron and manganese in complex forms with organics. Most of the treatment we use potassium permanganate as an oxidizer followed by a pressurized closed green sand filter. The aim of present study is to investigate the optimum characteristics of groundwater to give lowest iron, manganese and ammonia, maximum production and quality of fish in aquaculture in El-Max Research Station. The major design goal of the system was determined the optimum time for harvesting the treated water, pH, and Glauconite weight to use it for aquaculture process in the research site and achieve the Egyptian law (48/1982) and EPA level required for aquaculture. The water characteristics are [Fe = 0.116 mg/L, Mn = 1.36 mg/L,TN = 0.44 mg/L , TP = 0.07 mg/L , Ammonia = 0.386 mg/L] by using the glauconite filter we obtained high efficiency for removal for [(Fe, Mn and Ammonia] ,but in the Lab we obtained result for (Fe, 43-97), ( Mn,92-99 ), and ( Ammonia, 66-88 )]. We summarized the results to show the optimum time, pH, Glauconite weight, and the best model for design in the region.

Keywords: aquaculture, ammonia in groundwater, groundwater, iron and manganese in water, groundwater treatment

Procedia PDF Downloads 228
8602 Technological Affordances of a Mobile Fitness Application- A Role of Escapism and Social Outcome Expectation

Authors: Inje Cho

Abstract:

The leading health risks threatening the world today are associated with a modern lifestyle characterized by sedentary behavior, stress, anxiety, and an obesogenic food environment. To counter this alarming trend, the Centers for Disease Control and Prevention have proffered Physical Activity guidelines to bolster physical engagement. Concurrently, the burgeon of smartphones and mobile applications has witnessed a proliferation of fitness applications aimed at invigorating exercise adherence and real-time activity monitoring. Grounded in the Uses and gratification theory, this study delves into the technological affordances of mobile fitness applications, discerning the mediating influences of escapism and social outcome expectations on attitudes and exercise intention. The theory explains how individuals employ distinct communication mediums to satiate their exigencies and desires. Technological affordances manifest as attributes of emerging technologies that galvanize personal engagement in physical activities. Several features of mobile fitness applications include affordances for goal setting, virtual rewards, peer support, and exercise information. Escapism, denoting the inclination to disengage from normal routines, has emerged as a salient motivator for the consumption of new media. This study postulates that individual’s perceptions technological affordances within mobile fitness applications, can affect escapism and social outcome expectations, potentially influencing attitude, and behavior formation. Thus, the integrated model has been developed to empirically examine the interrelationships between technological affordances, escapism, social outcome expectations, and exercise intention. Structural Equation Modelling serves as the methodological tool, and a cohort of 400 Fitbit users shall be enlisted from the Prolific, data collection platform. A sequence of multivariate data analyses will scrutinize both the measurement and hypothesized structural models. By delving into the effects of mobile fitness applications, this study contributes to the growing of new media studies in sport management. Moreover, the novel integration of the uses and gratification theory, technological affordances, via the prism of escapism, illustrates the dynamics that underlies mobile fitness user’s attitudes and behavioral intentions. Therefore, the findings from this study contribute to theoretical understanding and provide pragmatic insights to developers and practitioners in optimizing the impact of mobile fitness applications.

Keywords: technological affordances, uses and gratification, mobile fitness apps, escapism, physical activity

Procedia PDF Downloads 73
8601 Electrochemical Study of Ti-O Modified Electrode towards Tyrosinase Catalytic Activity

Authors: Riya Thomas, Denis Music, Tautgirdas Ruzgas

Abstract:

The detection of tyrosinase holds considerable interest in the domains of food nutrition and human health due to its significant role in causing a detrimental effect on the colour, flavour, and nutritional value of food as well as in the synthesis of melanin causing skin melanoma. Compared to other conventional analytical techniques, electrochemical (EC) sensors are highly promising owing to their quick response, great sensitivity, ease of use, and low cost. Particularly, titania nanoparticle-based electrochemical sensors have drawn special attention in identifying several biomolecules including enzymes, antibodies, and receptors, owing to their enhanced electrocatalytic activity and electron-accepting properties. In this study, Ti-O film-modified electrode is fabricated using reactive magnetron sputtering, and its affinity towards tyrosinase is examined via electrochemical methods. To comprehend the physiochemical and surface properties-governed electrocatalytic activity of modified electrodes, Ti-O films are grown under various compositional ranges and deposition temperature, and their corresponding electrochemical activity towards tyrosinase is studied. Further, to understand the underlying atomistic mechanisms and electronic-scale electrochemical characteristics, density functional theory (DFT) is employed. The main goal of the current work is to determine the correlation between macroscopic measurements and the underlying atomic properties to improve the tyrosinase activity on Ti-O surfaces. Moreover, this work offers an intriguing new perspective on the use of Ti-O-modified electrodes to detect tyrosinase in the areas of clinical diagnosis, skincare, and food science.

Keywords: density functional theory, electrochemical sensor, Ti-O film, tyrosinase

Procedia PDF Downloads 1
8600 Improving Monitoring and Fault Detection of Solar Panels Using Arduino Mega in WSN

Authors: Ali Al-Dahoud, Mohamed Fezari, Thamer Al-Rawashdeh, Ismail Jannoud

Abstract:

Monitoring and detecting faults on a set of Solar panels, using a wireless sensor network (WNS) is our contribution in this paper, This work is part of the project we are working on at Al-Zaytoonah University. The research problem has been exposed by engineers and technicians or operators dealing with PV panels maintenance, in order to monitor and detect faults within solar panels which affect considerably the energy produced by the solar panels. The proposed solution is based on installing WSN nodes with appropriate sensors for more often occurred faults on the 45 solar panels installed on the roof of IT faculty. A simulation has been done on nodes distribution and a study for the design of a node with appropriate sensors taking into account the priorities of the processing faults. Finally, a graphic user interface is designed and adapted to telemonitoring panels using WSN. The primary tests of hardware implementation gave interesting results, the sensors calibration and interference transmission problem have been solved. A friendly GUI using high level language Visial Basic was developed to carry out the monitoring process and to save data on Exel File.

Keywords: Arduino Mega microcnotroller, solar panels, fault-detection, simulation, node design

Procedia PDF Downloads 459
8599 Significant Aspects and Drivers of Germany and Australia's Energy Policy from a Political Economy Perspective

Authors: Sarah Niklas, Lynne Chester, Mark Diesendorf

Abstract:

Geopolitical tensions, climate change and recent movements favouring a transformative shift in institutional power structures have influenced the economics of conventional energy supply for decades. This study takes a multi-dimensional approach to illustrate the potential of renewable energy (RE) technology to provide a pathway to a low-carbon economy driven by ecologically sustainable, independent and socially just energy. This comparative analysis identifies economic, political and social drivers that shaped the adoption of RE policy in two significantly different economies, Germany and Australia, with strong and weak commitments to RE respectively. Two complementary political-economy theories frame the document-based analysis. Régulation Theory, inspired by Marxist ideas and strongly influenced by contemporary economic problems, provides the background to explore the social relationships contributing the adoption of RE within the macro-economy. Varieties of Capitalism theory, a more recently developed micro-economic approach, examines the nature of state-firm relationships. Together these approaches provide a comprehensive lens of analysis. Germany’s energy policy transformed substantially over the second half of the last century. The development is characterised by the coordination of societal, environmental and industrial demands throughout the advancement of capitalist regimes. In the Fordist regime, mass production based on coal drove Germany’s astounding economic recovery during the post-war period. Economic depression and the instability of institutional arrangements necessitated the impulsive seeking of national security and energy independence. During the postwar Flexi-Fordist period, quality-based production, innovation and technology-based competition schemes, particularly with regard to political power structures in and across Europe, favoured the adoption of RE. Innovation, knowledge and education were institutionalized, leading to the legislation of environmental concerns. Lastly the establishment of government-industry-based coordinative programs supported the phase out of nuclear power and the increased adoption of RE during the last decade. Australia’s energy policy is shaped by the country’s richness in mineral resources. Energy policy largely served coal mining, historically and currently one of the most capital-intense industry. Assisted by the macro-economic dimensions of institutional arrangements, social and financial capital is orientated towards the export-led and strongly demand-oriented economy. Here energy policy serves the maintenance of capital accumulation in the mining sector and the emerging Asian economies. The adoption of supportive renewable energy policy would challenge the distinct role of the mining industry within the (neo)-liberal market economy. The state’s protective role of the mining sector has resulted in weak commitment to RE policy and investment uncertainty in the energy sector. Recent developments, driven by strong public support for RE, emphasize the sense of community in urban and rural areas and the emergence of a bottom-up approach to adopt renewables. Thus, political economy frameworks on both the macro-economic (Regulation Theory) and micro-economic (Varieties of Capitalism theory) scales can together explain the strong commitment to RE in Germany vis-à-vis the weak commitment in Australia.

Keywords: political economy, regulation theory, renewable energy, social relationships, energy transitions

Procedia PDF Downloads 376
8598 Admission Control Policy for Remanufacturing Activities with Quality Variation of Returns

Authors: Sajjad Farahani, Wilkistar Otieno, Xiaohang Yue

Abstract:

This paper develops a model for the optimal disposition decision for product returns in a remanufacturing system with limited recoverable inventory capacity. In this model, a constant demand is satisfied by remanufacturing returned products which are up to the minimum required quality grade. The quality grade of returned products is uncertain and remanufacturing cost increases as the quality level decreases, and remanufacturer wishes to determine which returned product to accept to be remanufactured for reselling, and any unaccepted returns may be salvaged at a value that increases with their quality level. Accepted returns can be stocked for remanufacturing upon demand requests, but incur a holding cost. A Markov decision problem is formulated in order to evaluate various performance measures for this system and obtain the optimal remanufacturing policy. A detailed numerical study reveals that our approach to the disposition problem outperforms the current industrial practice ignoring quality grade of returned products. In addition, we identify conditions under which this improvement is the highest.

Keywords: green supply chain management, matrix geometric method, production recovery, reverse supply chains

Procedia PDF Downloads 305
8597 Secularization of Europe and the Rise of Nationalism

Authors: Sterling C. DeVerter

Abstract:

In recent decades, there has been continually growing concern amongst scholars and political leaders towards the global resurgence of nationalism, particularly in Europe, the United States, and China. However, very few studies have attempted to empirically examine the relationship between religion and nationalism at the level of the individual, and none are known to have done so quantitatively. Building on Tajfel's and Turner's (1978) Social Identity Theory (SIT), and Anderson (1991) and Marx (2003), this study will employ SIT and regression analysis to compare the sources and patterns of nationalistic sentiment among European respondents in eight countries to the average levels of self-reported religiosity, religious participation, age, education, and income levels. Survey reports from the International Social Survey Programme were the primary quantitative data sources. It was hypothesized that the increase in nationalism across Europe follows this same evolution as first identified by Anderson, and is positively correlated to the reduction in reported religiosity. However, this study failed to reject the null, there was no substantial ( < .035) correlation between nationalistic sentiment and any of the measures of religiosity, nor were there any substantial correlations between nationalistic sentiment and either of the three control variables ( < .008). Across all countries examined, it was discovered that inclusionary nationalism has slightly declined (-5.08%), while exclusionary nationalism had increased substantially (+17.25%). The combined trend reflected an overall rise in nationalism across the time period and a forecast that suggests the current levels are also elevated. The primary implications include the demand to readdress the notion of religion and nationalism, and the correlation between the two, as well as the current nationalism trends in terms of support or non-support for future political and social movements.

Keywords: European Union, secularization, nationalism, social identity theory

Procedia PDF Downloads 120
8596 Bring Your Own Device Security Model in a Financial Institution of South Africa

Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren

Abstract:

This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.

Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis

Procedia PDF Downloads 24
8595 A QoE-driven Cross-layer Resource Allocation Scheme for High Traffic Service over Open Wireless Network Downlink

Authors: Liya Shan, Qing Liao, Qinyue Hu, Shantao Jiang, Tao Wang

Abstract:

In this paper, a Quality of Experience (QoE)-driven cross-layer resource allocation scheme for high traffic service over Open Wireless Network (OWN) downlink is proposed, and the related problem about the users in the whole cell including the users in overlap region of different cells has been solved.A method, in which assess models of the BestEffort service and the no-reference assess algorithm for video service are adopted, to calculate the Mean Opinion Score (MOS) value for high traffic service has been introduced. The cross-layer architecture considers the parameters in application layer, media access control layer and physical layer jointly. Based on this architecture and the MOS value, the Binary Constrained Particle Swarm Optimization (B_CPSO) algorithm is used to solve the cross-layer resource allocation problem. In addition,simulationresults show that the proposed scheme significantly outperforms other schemes in terms of maximizing average users’ MOS value for the whole system as well as maintaining fairness among users.

Keywords: high traffic service, cross-layer resource allocation, QoE, B_CPSO, OWN

Procedia PDF Downloads 536
8594 The Dynamics of Unsteady Squeezing Flow between Parallel Plates (Two-Dimensional)

Authors: Jiya Mohammed, Ibrahim Ismail Giwa

Abstract:

Unsteady squeezing flow of a viscous fluid between parallel plates is considered. The two plates are considered to be approaching each other symmetrically, causing the squeezing flow. Two-dimensional rectangular Cartesian coordinate is considered. The Navier-Stokes equation was reduced using similarity transformation to a single fourth order non-linear ordinary differential equation. The energy equation was transformed to a second order coupled differential equation. We obtained solution to the resulting ordinary differential equations via Homotopy Perturbation Method (HPM). HPM deforms a differential problem into a set of problem that are easier to solve and it produces analytic approximate expression in the form of an infinite power series by using only sixth and fifth terms for the velocity and temperature respectively. The results reveal that the proposed method is very effective and simple. Comparisons among present and existing solutions were provided and it is shown that the proposed method is in good agreement with Variation of Parameter Method (VPM). The effects of appropriate dimensionless parameters on the velocity profiles and temperature field are demonstrated with the aid of comprehensive graphs and tables.

Keywords: coupled differential equation, Homotopy Perturbation Method, plates, squeezing flow

Procedia PDF Downloads 469
8593 Comparison between Two Software Packages GSTARS4 and HEC-6 about Prediction of the Sedimentation Amount in Dam Reservoirs and to Estimate Its Efficient Life Time in the South of Iran

Authors: Fatemeh Faramarzi, Hosein Mahjoob

Abstract:

Building dams on rivers for utilization of water resources causes problems in hydrodynamic equilibrium and results in leaving all or part of the sediments carried by water in dam reservoir. This phenomenon has also significant impacts on water and sediment flow regime and in the long term can cause morphological changes in the environment surrounding the river, reducing the useful life of the reservoir which threatens sustainable development through inefficient management of water resources. In the past, empirical methods were used to predict the sedimentation amount in dam reservoirs and to estimate its efficient lifetime. But recently the mathematical and computational models are widely used in sedimentation studies in dam reservoirs as a suitable tool. These models usually solve the equations using finite element method. This study compares the results from tow software packages, GSTARS4 & HEC-6, in the prediction of the sedimentation amount in Dez dam, southern Iran. The model provides a one-dimensional, steady-state simulation of sediment deposition and erosion by solving the equations of momentum, flow and sediment continuity and sediment transport. GSTARS4 (Generalized Sediment Transport Model for Alluvial River Simulation) which is based on a one-dimensional mathematical model that simulates bed changes in both longitudinal and transverse directions by using flow tubes in a quasi-two-dimensional scheme to calibrate a period of 47 years and forecast the next 47 years of sedimentation in Dez Dam, Southern Iran. This dam is among the highest dams all over the world (with its 203 m height), and irrigates more than 125000 square hectares of downstream lands and plays a major role in flood control in the region. The input data including geometry, hydraulic and sedimentary data, starts from 1955 to 2003 on a daily basis. To predict future river discharge, in this research, the time series data were assumed to be repeated after 47 years. Finally, the obtained result was very satisfactory in the delta region so that the output from GSTARS4 was almost identical to the hydrographic profile in 2003. In the Dez dam due to the long (65 km) and a large tank, the vertical currents are dominant causing the calculations by the above-mentioned method to be inaccurate. To solve this problem, we used the empirical reduction method to calculate the sedimentation in the downstream area which led to very good answers. Thus, we demonstrated that by combining these two methods a very suitable model for sedimentation in Dez dam for the study period can be obtained. The present study demonstrated successfully that the outputs of both methods are the same.

Keywords: Dez Dam, prediction, sedimentation, water resources, computational models, finite element method, GSTARS4, HEC-6

Procedia PDF Downloads 309