Search results for: competence in L2 communication
1298 Administration of Lactobacillus plantarum PS128 Improves Animal Behavior and Monoamine Neurotransmission in Germ-Free Mice
Authors: Liu Wei-Hsien, Chuang Hsiao-Li, Huang Yen-Te, Wu Chien-Chen, Chou Geng-Ting, Tsai Ying-Chieh
Abstract:
Intestinal microflora play an important role in communication along the gut-brain axis. Probiotics, defined as live bacteria or bacterial products, confer a significant health benefit to the host. Here we administered Lactobacillus plantarum PS128 (PS128) to the germ-free (GF) mouse to investigate the impact of the gut-brain axis on emotional behavior. Administration of live PS128 significantly increased the total distance traveled in the open field test; it decreased the time spent in the closed arm and increased the time spent and total entries into the open arm in the elevated plus maze. In contrast, heat-killed PS128 caused no significant changes in the GF mice. Treatment with live PS128 significantly increased levels of both serotonin and dopamine in the striatum, but not in the prefrontal cortex or hippocampus. However, live PS128 did not alter pro- or anti-inflammatory cytokine production by mitogen-stimulated splenocytes. The above data indicate that the normalization of emotional behavior correlated with monoamine neurotransmission, but not with immune activity. Our findings suggest that daily intake of the probiotic PS128 could ameliorate neuropsychiatric disorders such as anxiety and excessive psychological stress.Keywords: dopamine, hypothalamic-pituitary-adrenal axis, intestinal microflora, serotonin
Procedia PDF Downloads 4151297 Advanced Data Visualization Techniques for Effective Decision-making in Oil and Gas Exploration and Production
Authors: Deepak Singh, Rail Kuliev
Abstract:
This research article explores the significance of advanced data visualization techniques in enhancing decision-making processes within the oil and gas exploration and production domain. With the oil and gas industry facing numerous challenges, effective interpretation and analysis of vast and diverse datasets are crucial for optimizing exploration strategies, production operations, and risk assessment. The article highlights the importance of data visualization in managing big data, aiding the decision-making process, and facilitating communication with stakeholders. Various advanced data visualization techniques, including 3D visualization, augmented reality (AR), virtual reality (VR), interactive dashboards, and geospatial visualization, are discussed in detail, showcasing their applications and benefits in the oil and gas sector. The article presents case studies demonstrating the successful use of these techniques in optimizing well placement, real-time operations monitoring, and virtual reality training. Additionally, the article addresses the challenges of data integration and scalability, emphasizing the need for future developments in AI-driven visualization. In conclusion, this research emphasizes the immense potential of advanced data visualization in revolutionizing decision-making processes, fostering data-driven strategies, and promoting sustainable growth and improved operational efficiency within the oil and gas exploration and production industry.Keywords: augmented reality (AR), virtual reality (VR), interactive dashboards, real-time operations monitoring
Procedia PDF Downloads 861296 Constructions of Linear and Robust Codes Based on Wavelet Decompositions
Authors: Alla Levina, Sergey Taranov
Abstract:
The classical approach to the providing noise immunity and integrity of information that process in computing devices and communication channels is to use linear codes. Linear codes have fast and efficient algorithms of encoding and decoding information, but this codes concentrate their detect and correct abilities in certain error configurations. To protect against any configuration of errors at predetermined probability can robust codes. This is accomplished by the use of perfect nonlinear and almost perfect nonlinear functions to calculate the code redundancy. The paper presents the error-correcting coding scheme using biorthogonal wavelet transform. Wavelet transform applied in various fields of science. Some of the wavelet applications are cleaning of signal from noise, data compression, spectral analysis of the signal components. The article suggests methods for constructing linear codes based on wavelet decomposition. For developed constructions we build generator and check matrix that contain the scaling function coefficients of wavelet. Based on linear wavelet codes we develop robust codes that provide uniform protection against all errors. In article we propose two constructions of robust code. The first class of robust code is based on multiplicative inverse in finite field. In the second robust code construction the redundancy part is a cube of information part. Also, this paper investigates the characteristics of proposed robust and linear codes.Keywords: robust code, linear code, wavelet decomposition, scaling function, error masking probability
Procedia PDF Downloads 4891295 Impact of Behavioral Biases on Indian Investors: Case Analysis of a Mutual Fund Investment Company
Authors: Priyal Motwani, Garvit Goel
Abstract:
In this study, we have studied and analysed the transaction data of investors of a mutual fund investment company based in India. Based on the data available, we have identified the top four biases that affect the investors of the emerging market economies through regression analysis and three uniquely defined ratios. We found that the four most prominent biases that affected the investment making decisions in India are– Chauffer Knowledge, investors tend to make ambitious decisions about sectors they know little about; Bandwagon effect – the response of the market indices to macroeconomic events are more profound and seem to last longer compared to western markets; base-rate neglect – judgement about stocks are too much based on the most recent development ignoring the long-term fundamentals of the stock; availability bias – lack of proper communication channels of market information lead people to be too reliant on limited information they already have. After segregating the investors into six groups, the results have further been studied to identify a correlation among the demographics, gender and unique cultural identity of the derived groups and the corresponding prevalent biases. On the basis of the results obtained from the derived groups, our study recommends six methods, specific to each group, to educate the investors about the prevalent biases and their role in investment decision making.Keywords: Bandwagon effect, behavioural biases, Chauffeur knowledge, demographics, investor literacy, mutual funds
Procedia PDF Downloads 2301294 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities
Authors: Nazli Hardy
Abstract:
Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.Keywords: Internet of Things (IoT), authentication, protocols, survey
Procedia PDF Downloads 2991293 Life Stage Customer Segmentation by Fine-Tuning Large Language Models
Authors: Nikita Katyal, Shaurya Uppal
Abstract:
This paper tackles the significant challenge of accurately classifying customers within a retailer’s customer base. Accurate classification is essential for developing targeted marketing strategies that effectively engage this important demographic. To address this issue, we propose a method that utilizes Large Language Models (LLMs). By employing LLMs, we analyze the metadata associated with product purchases derived from historical data to identify key product categories that act as distinguishing factors. These categories, such as baby food, eldercare products, or family-sized packages, offer valuable insights into the likely household composition of customers, including families with babies, families with kids/teenagers, families with pets, households caring for elders, or mixed households. We segment high-confidence customers into distinct categories by integrating historical purchase behavior with LLM-powered product classification. This paper asserts that life stage segmentation can significantly enhance e-commerce businesses’ ability to target the appropriate customers with tailored products and campaigns, thereby augmenting sales and improving customer retention. Additionally, the paper details the data sources, model architecture, and evaluation metrics employed for the segmentation task.Keywords: LLMs, segmentation, product tags, fine-tuning, target segments, marketing communication
Procedia PDF Downloads 231292 Comparative Evaluation of Accuracy of Selected Machine Learning Classification Techniques for Diagnosis of Cancer: A Data Mining Approach
Authors: Rajvir Kaur, Jeewani Anupama Ginige
Abstract:
With recent trends in Big Data and advancements in Information and Communication Technologies, the healthcare industry is at the stage of its transition from clinician oriented to technology oriented. Many people around the world die of cancer because the diagnosis of disease was not done at an early stage. Nowadays, the computational methods in the form of Machine Learning (ML) are used to develop automated decision support systems that can diagnose cancer with high confidence in a timely manner. This paper aims to carry out the comparative evaluation of a selected set of ML classifiers on two existing datasets: breast cancer and cervical cancer. The ML classifiers compared in this study are Decision Tree (DT), Support Vector Machine (SVM), k-Nearest Neighbor (k-NN), Logistic Regression, Ensemble (Bagged Tree) and Artificial Neural Networks (ANN). The evaluation is carried out based on standard evaluation metrics Precision (P), Recall (R), F1-score and Accuracy. The experimental results based on the evaluation metrics show that ANN showed the highest-level accuracy (99.4%) when tested with breast cancer dataset. On the other hand, when these ML classifiers are tested with the cervical cancer dataset, Ensemble (Bagged Tree) technique gave better accuracy (93.1%) in comparison to other classifiers.Keywords: artificial neural networks, breast cancer, classifiers, cervical cancer, f-score, machine learning, precision, recall
Procedia PDF Downloads 2771291 Performance Comparison of Resource Allocation without Feedback in Wireless Body Area Networks by Various Pseudo Orthogonal Sequences
Authors: Ojin Kwon, Yong-Jin Yoon, Liu Xin, Zhang Hongbao
Abstract:
Wireless Body Area Network (WBAN) is a short-range wireless communication around human body for various applications such as wearable devices, entertainment, military, and especially medical devices. WBAN attracts the attention of continuous health monitoring system including diagnostic procedure, early detection of abnormal conditions, and prevention of emergency situations. Compared to cellular network, WBAN system is more difficult to control inter- and inner-cell interference due to the limited power, limited calculation capability, mobility of patient, and non-cooperation among WBANs. In this paper, we compare the performance of resource allocation scheme based on several Pseudo Orthogonal Codewords (POCs) to mitigate inter-WBAN interference. Previously, the POCs are widely exploited for a protocol sequence and optical orthogonal code. Each POCs have different properties of auto- and cross-correlation and spectral efficiency according to its construction of POCs. To identify different WBANs, several different pseudo orthogonal patterns based on POCs exploits for resource allocation of WBANs. By simulating these pseudo orthogonal resource allocations of WBANs on MATLAB, we obtain the performance of WBANs according to different POCs and can analyze and evaluate the suitability of POCs for the resource allocation in the WBANs system.Keywords: wireless body area network, body sensor network, resource allocation without feedback, interference mitigation, pseudo orthogonal pattern
Procedia PDF Downloads 3531290 Adaptation and Habituation to new Complete Dentures
Authors: Mohamed Khaled Ahmed Azzam
Abstract:
Complete dentures, a non biological appliance, were and are still used to replace missing teeth and surrounding structures. Its main objectives are esthetics, speech, function and psychological state improvement. Dentists must realize that, just as dentate patients vary in their dental treatment complexity; edentulous patients also vary in the difficulty of their treatment plan. There are two main problems facing the removable Prosthodontist which harden his/her task how to please his patient with their new dentures being: Denture construction which however its fabrication is at the highest standards still is an unpleasant experience to all patients in the beginning and improves by time. This varies from one to several years according to the patient’s attitude, age, gender, socio-economical level and culture. The second problem of edentulous patients is both physical and psychological. Good interview, communication and note how patients present themselves for the concerns of their appearance, overall attitude and expectations concerning treatment is very important physically. On the psychological aspect patients have great difficulty to cope with new dentures to the extent of not using them at all. Hence their mind preparation should be commenced from day one by more than one method. This had a great impact on the acceptance which led to habituation to their dentures and patients were appreciative and pleased. In conclusion to successfully treat edentulous patients a great deal of information is required to complete a proper diagnosis, including patient mental attitude, past and present medical and dental conditions, and extra and intra-oral examinations. In addition to the clinical experience and skill of the whole dental team.Keywords: complete dentures, edentulous patients, management of denture, psychological mind preparation
Procedia PDF Downloads 2521289 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks
Authors: Walid Abdallah, Noureddine Boudriga
Abstract:
Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based
Procedia PDF Downloads 6591288 Cultural Artifact, Sign Language and Perspectives of Meaning in Select-Nollywood Films
Authors: Aniekan James Akpan
Abstract:
The use of signs and symbols to represent cardinal information is inalienable among African communities. It has been the tenable instrument of cultural transmission for decades, but in the current transposal of Western values, a good number of communicating codes and symbolic images have been gradually relegated to the background. This paper discusses the regeneration of cultural artifacts and sign languages in Nigerian films using Johnpaul Rebecca and Ayamma as models in a qualitative research based on Charles Sanders Pierce's Semiotics as well as quantitative methods of survey using questionnaire and focus group discussion as instruments to obtain data. With a population of 2,343 viewers of the movies used for the study and a sample size of 322 respondents using Philip Meyer’s guide, findings show that cultural relics can stabilise the subject matter of a film. Artifacts can stimulate curiosity and invoke nostalgia. Sign languages encode deeper information that ordinary speech may not properly convey in films. It concludes that the use of non-verbal codes in filmmaking deserves deep research into the culture portrayed and that non-verbal cues communicate deeper information about a people's cosmos in a film than dialogue. It recommends that adequate research should be made before producing a film and the idea of cultural values represented in artifacts and sign language should be ingrained in the courses for students to acquaint themselves with.Keywords: cultural artifact, Nollywood films, non-verbal communication, sign language
Procedia PDF Downloads 431287 Non-Physician Medical Worker Experience during the COVID-19 Pandemic
Authors: William Mahony, L. Jacqueline Hirth, Richard Rupp, Sandra Gonzalez, Roger Zoorob
Abstract:
Background: The impact of the COVID-19 pandemic on physicians has been considered by many researchers, but less is known about non-physician healthcare workers. The aim of this study is to examine the association of COVID-19 safety training and communication with stress. Methods: A 91-item online survey was distributed, starting January 2, 2021, to non-physician healthcare workers, including physician assistants, nurse practitioners, and medical assistants (MAs) in the United States through email and social media. A $1 donation was made to the Red Cross for each completed survey. The survey consisted of demographics, occupational questions, and perceived stress (perceived stress scale, PSS). Items on the PSS were combined for an overall score and categorized according to the severity of perceived stress. Chi-square tests were performed for bivariate analyses of categorical variables. Results: Of the 284 participants consenting to complete the survey, 197 participants completed the full survey. MAs made up most of the sample at 79%. Among all respondents, 47% had moderate PSS scores (scored between 14 and 26), and 51% had severe PSS scores (scored between 27 and 40). Unvaccinated participants reported statistically significantly lower levels of perceived stress (p = 0.002). Performing tasks outside of typical job responsibilities was not associated with PSS scores (p = .667). Discussion: Non-physician healthcare workers demonstrated a high level of perceived stress overall. The association between vaccination status and perceived stress should be examined in order to evaluate whether vaccination levels could be improved with further education about the virus and associated risks.Keywords: COVID-19, SARS-Cov-2, nursing, public health
Procedia PDF Downloads 1741286 The Concerns and Recommendations of Informal and Professional Caregivers for COVID-19 Policy for Homecare and Long-Term Care For People with Dementia: A Qualitative Study
Authors: Hanneke J. A. Smaling, Mandy Visser
Abstract:
One way to reduce the risk of COVID-19 infection is by preventing close interpersonal contact with distancing measures. These social distancing measures presented challenges to the health and wellbeing of people with dementia and their informal and professional caregivers. This study describes the concerns and recommendations of informal and professional caregivers for COVID-19 policy for home care and long-term care for people with dementia during the first and second COVID-19 wave in the Netherlands. In this qualitative interview study, 20 informal caregivers and 20 professional caregivers from home care services and long-term care participated. Interviews were analyzed using an inductive thematic analysis approach. Both informal and professional caregivers worried about getting infected or infecting others with COVID-19, the consequences of the distancing measures, and quality of care. There was a general agreement that policy in the second wave was better informed compared to the first wave. At an organizational level, the policy was remarkably flexible. Recommendations were given for dementia care (need to offer meaningful activities, improve the organization of care, more support for informal caregivers), policy (national vs. locally organization, social isolation measures, visitor policy), and communication. Our study contributes to the foundation of future care decisions by (inter)national policymakers, politicians, and healthcare organizations during the course of the COVID-19 pandemic, underlining the need for balance between safety and autonomy for people with dementia.Keywords: covid-19, dementia, home care, long-term care, policy
Procedia PDF Downloads 1361285 Influence of Information Technology on Financial Management Practices in Secondary School: For National Transormation in Zone C Senatorional District of Benue State
Authors: Eru Ihie Joel
Abstract:
This study was carried out to investigate the influence of information technology on financial management practice in secondary schools for transformation. In Zone C Senatorial District of Benue state. The study answered four research questions and tested four hypotheses. Related literature was reviewed to show the gap to be filled in the study. The population was 196 respondents made up of principals and finance clerks of secondary schools. The descriptive survey was adopted for the study. A structured 20 item questionnaire (IITFMPSQ) was constructed and used to collect date for the study. Data obtained were analyzed using descriptive and inferential statistic. Mean and standard deviation were used to analyze the research question while the chi- square (x2) test of goodness of fit was used to test the hypothesis. The major findings revealed that the use of computer system significantly influences budgeting in secondary schools in zone senatorial district of Benue State for transformation. It was also established that the use of internet facilities influences the funding of secondary schools for transformation in the zone. Based on the findings of the study, it was recommended among other things that administrators and teachers in schools should be trained to make effective use of the computer in budgeting so as to facilitate delegations, control, evaluation, accountability for transformation. It was further suggested that the study be replicated on the effective use of information communication teaching (ITC) in teaching and learning in secondary school for transformation.Keywords: influence, finance, management, technology
Procedia PDF Downloads 3631284 Thermal Vacuum Chamber Test Result for CubeSat Transmitter
Authors: Fitri D. Jaswar, Tharek A. Rahman, Yasser A. Ahmad
Abstract:
CubeSat in low earth orbit (LEO) mainly uses ultra high frequency (UHF) transmitter with fixed radio frequency (RF) output power to download the telemetry and the payload data. The transmitter consumes large amount of electrical energy during the transmission considering the limited satellite size of a CubeSat. A transmitter with power control ability is designed to achieve optimize the signal to noise ratio (SNR) and efficient power consumption. In this paper, the thermal vacuum chamber (TVAC) test is performed to validate the performance of the UHF band transmitter with power control capability. The TVAC is used to simulate the satellite condition in the outer space environment. The TVAC test was conducted at the Laboratory of Spacecraft Environment Interaction Engineering, Kyushu Institute of Technology, Japan. The TVAC test used 4 thermal cycles starting from +60°C to -20°C for the temperature setting. The pressure condition inside chamber was less than 10-5Pa. During the test, the UHF transmitter is integrated in a CubeSat configuration with other CubeSat subsystem such as on board computer (OBC), power module, and satellite structure. The system is validated and verified through its performance in terms of its frequency stability and the RF output power. The UHF band transmitter output power is tested from 0.5W to 2W according the satellite mode of operations and the satellite power limitations. The frequency stability is measured and the performance obtained is less than 2 ppm in the tested operating temperature range. The test demonstrates the RF output power is adjustable in a thermal vacuum condition.Keywords: communication system, CubeSat, SNR, UHF transmitter
Procedia PDF Downloads 2641283 Risk Management in Industrial Supervision Projects
Authors: Érick Aragão Ribeiro, George André Pereira Thé, José Marques Soares
Abstract:
Several problems in industrial supervision software development projects may lead to the delay or cancellation of projects. These problems can be avoided or contained by using identification methods, analysis and control of risks. These procedures can give an overview of the possible problems that can happen in the projects and what are the immediate solutions. Therefore, we propose a risk management method applied to the teaching and development of industrial supervision software. The method is developed through a literature review and previous projects can be divided into phases of management and have basic features that are validated with experimental research carried out by mechatronics engineering students and professionals. The management is conducted through the stages of identification, analysis, planning, monitoring, control and communication of risks. Programmers use a method of prioritizing risks considering the gravity and the possibility of occurrence of the risk. The outputs of the method indicate which risks occurred or are about to happen. The first results indicate which risks occur at different stages of the project and what risks have a high probability of occurring. The results show the efficiency of the proposed method compared to other methods, showing the improvement of software quality and leading developers in their decisions. This new way of developing supervision software helps students identify design problems, evaluate software developed and propose effective solutions. We conclude that the risk management optimizes the development of the industrial process control software and provides higher quality to the product.Keywords: supervision software, risk management, industrial supervision, project management
Procedia PDF Downloads 3551282 Transmission Line Matrix (TLM) Modelling of Microstrip Circular Antenna
Authors: Jugoslav Jokovic, Tijana Dimitrijevic, Nebojsa Doncov
Abstract:
The goal of this paper is to investigate the possibilities and effectiveness of the TLM (Transmission Line Matrix) method for modelling of up-to-date microstrip antennas with circular geometry that have significant application in modern wireless communication systems. The coaxially fed microstrip antenna configurations with circular patch are analyzed by using the in-house 3DTLMcyl_cw solver based on computational electromagnetic TLM method adapted to the cylindrical grid and enhanced with the compact wire model. Opposed to the widely used rectangular TLM mesh, where a staircase approximation has to be used to describe curved boundaries, precise modelling of circular boundaries can be accomplished in the cylindrical grid irrespective of the mesh resolution. Using the compact wire model incorporated in cylindrical mesh, it is possible to model coaxial feed and include the influence of the real excitation in the antenna model. The conventional and inverted configuration of a coaxially fed circular patch antenna are considered, comparing the resonances obtained using TLM cylindrical model with results reached by the corresponding model in a rectangular grid as well as with experimental ones. Bearing in mind that accuracy of simulated results depends on a relevantly created model, besides structure geometry and dimensions, it is important to consider additional modelling issues, regarding appropriate mesh resolution and a relevant extension of a mesh around the considered structure that would provide convergence of the results.Keywords: computational electromagnetic, coaxial feed, microstrip antenna, TLM modelling
Procedia PDF Downloads 2801281 Resource Orchestration Based on Two-Sides Scheduling in Computing Network Control Sytems
Authors: Li Guo, Jianhong Wang, Dian Huang, Shengzhong Feng
Abstract:
Computing networks as a new network architecture has shown great promise in boosting the utilization of different resources, such as computing, caching, and communications. To maximise the efficiency of resource orchestration in computing network control systems (CNCSs), this work proposes a dynamic orchestration strategy of a different resource based on task requirements from computing power requestors (CPRs). Specifically, computing power providers (CPPs) in CNCSs could share information with each other through communication channels on the basis of blockchain technology, especially their current idle resources. This dynamic process is modeled as a cooperative game in which CPPs have the same target of maximising long-term rewards by improving the resource utilization ratio. Meanwhile, the task requirements from CPRs, including size, deadline, and calculation, are simultaneously considered in this paper. According to task requirements, the proposed orchestration strategy could schedule the best-fitting resource in CNCSs, achieving the maximum long-term rewards of CPPs and the best quality of experience (QoE) of CRRs at the same time. Based on the EdgeCloudSim simulation platform, the efficiency of the proposed strategy is achieved from both sides of CPRs and CPPs. Besides, experimental results show that the proposed strategy outperforms the other comparisons in all cases.Keywords: computing network control systems, resource orchestration, dynamic scheduling, blockchain, cooperative game
Procedia PDF Downloads 1141280 Inclusive Cultural Heritage Tourism Project
Authors: L. Cruz-Lopes, M. Sell, P. Escudeiro, B. Esteves
Abstract:
It might be difficult for deaf people to communicate since spoken and written languages are different from sign language. When it comes to getting information, going to places of cultural heritage, or using services and infrastructure, there is a clear lack of inclusiveness. By creating assistive technology that enables deaf individuals to get around communication hurdles and encourage inclusive tourism, the ICHT- Inclusive Cultural Heritage Tourism initiative hopes to increase knowledge of sign language. The purpose of the Inclusive Cultural Heritage Tourism (ICHT) project is to develop online and on-site sign language tools and material for usage at popular tourist destinations in the northern region of Portugal, including Torre dos Clérigos, the Lello bookstore, Maia Zoo, Porto wine cellars, and São Pedro do Sul (Viseu) thermae. The ICHT system consists of an application using holography, a mobile game, an online platform for collaboration with deaf and hearing users, and a collection of International Sign training courses. The project also offers a prospect for a more inclusive society by introducing a method of teaching sign languages to tourism industry professionals. As a result, the teaching and learning of sign language along with the assistive technology tools created by the project sets up an inclusive environment for the deaf community, producing results in the area of automatic sign language translation and aiding in the global recognition of the Portuguese tourism industry.Keywords: inclusive tourism, games, international sign training, deaf community
Procedia PDF Downloads 1161279 Interdisciplinarity as a Regular Pedagogical Practice in the Classrooms
Authors: Catarina Maria Neto Da Cruz, Ana Maria Reis D’Azevedo Breda
Abstract:
The world is changing and, consequently, the young people need more sophisticated tools and skills to lead with the world’s complexity. The Organisation for Economic Co-operation and Development Learning Framework 2030 suggests an interdisciplinary knowledge as a principle for the future of education systems. In the curricular document Portuguese about the profile of students leaving compulsory education, the critical thinking and creative thinking are pointed out as skills to be developed, which imply the interconnection of different knowledge, applying it in different contexts and learning areas. Unlike primary school teachers, teachers specialized in a specific area lead to more difficulties in the implementation of interdisciplinary approaches in the classrooms and, despite the effort, the interdisciplinarity is not a common practice in schools. Statement like "Mathematics is everywhere" is unquestionable, however, many math teachers show difficulties in presenting such evidence in their classes. Mathematical modelling and problems in real contexts are promising in the development of interdisciplinary pedagogical practices and in Portugal there is a continuous training offer to contribute to the development of teachers in terms of their pedagogical approaches. But when teachers find themselves in the classroom, without a support, do they feel able to implement interdisciplinary practices? In this communication we will try to approach this issue through a case study involving a group of Mathematics teachers, who attended a training aimed at stimulating interdisciplinary practices in real contexts, namely related to the COVID-19 pandemic.Keywords: education, mathematics, teacher training, interdisciplinarity
Procedia PDF Downloads 921278 An Anthropometric and Postural Risk Assessment of Students in Computer Laboratories of a State University
Authors: Sarah Louise Cruz, Jemille Venturina
Abstract:
Ergonomics considers the capabilities and limitations of a person as they interact with tools, equipment, facilities and tasks in their work environment. Workplace is one example of physical work environment, be it a workbench or a desk. In school laboratories, sitting is the most common working posture of the students. Students maintain static sitting posture as they perform different computer-aided activities. The College of Engineering and College of Information and Communication Technology of a State University consist of twenty-two computer laboratories. Normally, students aren’t usually aware of the importance of sustaining proper sitting posture while doing their long hour computer laboratory activities. The study evaluates the perceived discomfort and working postures of students as they are exposed on current workplace design of computer laboratories. The current study utilizes Rapid Upper Limb Assessment (RULA), Body Discomfort Chart using Borg’s CR-10 Scale Rating and Quick Exposure Checklist in order to assess the posture and the current working condition. The result of the study may possibly minimize the body discomfort experienced by the students. The researchers redesign the individual workstations which includes working desk, sitting stool and other workplace design components. Also, the economic variability of each alternative was considered given that the study focused on improvement of facilities of a state university.Keywords: computer workstation, ergonomics, posture, students, workplace
Procedia PDF Downloads 3101277 Professional Competences of E-Learning Lecturers: Case of Russian National Platforms of Open Education
Authors: Polina Pekker
Abstract:
This work analyzes the role of lecturers in e-learning in Russia. It is based on qualitative research of lecturers who conduct courses on Russian national platforms of open education. The platform is based on edx software (provider of massive open online courses). The interviews with e-learning lecturers were conducted: from December 2015 till January 2016 and from April 2016 till May 2016. The results of interviews (face-to-face, telephone, skype) show, firstly, the difference between the role of lecturers in e-learning and in traditional education and, secondly, that the competition between lecturers is high in Russia. The results of interviews in Russia show that e-learning lecturer should have several special professional competences: the ability to keep attention of audiences without real contact, the ability to work on camera and competences related with e-learning course support (test, forum, communication on forum and etc.) It is concluded that lecturers need special course on acting and speech skills and on conducting and organizing of e-learning course in Russia. It is planned to conduct French study. When results from French research will be totally ready, they will be compared to Russian. As well French platform, France Universite Numerique, was launched earlier, in January 2014, so Russian lecturers should get best practice from the French colleagues.Keywords: e-courses lecturer, e-learning, professional competences of lecturers, national Russian and French platforms of open education
Procedia PDF Downloads 1921276 Client Hacked Server
Authors: Bagul Abhijeet
Abstract:
Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring
Procedia PDF Downloads 2511275 Improving the Quality of Staff Performance with a Talent-Driven Approach: Case Study of SAIPA Automotive Manufacturing Company in Iran
Authors: Abdolmajid Mosleh, Afzal Ghasimi
Abstract:
The purpose of this research is to investigate and identify effective factors that can improve the quality of personal performance in industrial companies. In the present study, it was assumed that the hidden variables of talent management could be explained by an important part of the variance in improving the quality of employee performance. This research is targeted in terms of applied research. The statistical population of the research is SAIPA automobile company with a number (N=10291); the sample of 380 people was selected based on the Cochran formula in a random sampling method among employed people. The measurement tool in this research was a questionnaire of 33 items with a control questionnaire that included two talent management departments (talent identification and talent exploitation) and improvements in staff performance (enhancement of technical and specialized capabilities, managerial capability, organizational interaction, and communication). The reliability of the internal consistency method was confirmed by the Cronbach's alpha coefficient and the two half-ways. In order to determine the validity of the questionnaire structure, confirmatory factor analysis was used. Based on the results of the data analysis, the effect of talent management on improving the quality of staff performance was confirmed. Based on the results of inferential statistics and structural equations of the proposed model, it had high fitness.Keywords: employee performance, talent management, performance improvement, SAIPA automobile manufacturing company
Procedia PDF Downloads 901274 Barriers to Teachers' Use of Technology in Nigeria and Its Implications in the Academic Performance of Students of Higher Learning: A Case Study of Adeniran Ogunsanya College of Education, Lagos
Authors: Iyabo Aremu
Abstract:
The role of the teacher in stirring a qualitative and distinctive knowledge-driven and value-laden environment with modern teaching practices cannot be over accentuated. In spite of the myriad advantages the use of Information and Communication Technology (ICT) promises, many teachers are still at the rear of this archetypical transition. These teachers; notable forces needed to elicit positive academic performances of students of higher learning are ill-equipped for the task. In view of this, the research work sought to assess how teachers have been able to effectively apply ICT tools to improve students’ academic performance in the higher institution and to evaluate the challenges faced by teachers in using these tools. Thus, the research adopted descriptive survey research design and involved a sample of 25 lecturers from five schools in the study area: Adeniran Ogunsanya College of Education (AOCOED). The barrier to Teachers’ Use of ICT Questionnaire (BTUICTQ) was used to gather data from these respondents. The data gathered was tested with chi-square at 0.05 level of significance. The results revealed that the perception and attitude of teachers towards the use of ICT is not favourable. It was also discovered that teachers suffer from gaps in ICT knowledge and skills. Finally, the research showed that lack of training and inadequate support is a major challenge teacher contend with. The study recommended that teachers should be given adequate training and support and that teachers’ unrestricted access to ICT gadgets should be ensured by schools.Keywords: ICT, teachers, AOCOED, academic performance
Procedia PDF Downloads 1601273 The Role of the University of Zululand in Documenting and Disseminating Indigenous Knowledge, in KwaZulu-Natal, South Africa
Authors: Smiso Buthelezi, Petros Dlamini, Dennis Ocholla
Abstract:
The study assesses the University of Zululand's practices for documenting, sharing, and accessing indigenous knowledge. Two research objectives guided it: to determine how indigenous knowledge (IK) is developed at the University of Zululand and how indigenous knowledge (IK) is documented at the University of Zululand. The study adopted both interpretive and positivist research paradigms. Ultimately, qualitative and quantitative research methods were used. The qualitative research approach collected data from academic and non-academic staff members. Interviews were conducted with 18 academic staff members and 5 with support staff members. The quantitative research approach was used to collect data from indigenous knowledge (IK) theses and dissertations from the University of Zululand Institutional Repository between 2009-2019. The study results revealed that many departments across the University of Zululand were involved in creating indigenous knowledge (IK)-related content. The department of African Languages was noted to be more involved in creating IK-related content. Moreover, the documentation of the content related to indigenous knowledge (IK) at the University of Zululand is done frequently but is not readily known. It was found that the creation and documentation of indigenous knowledge by different departments faced several challenges. The common challenges are a lack of interest among indigenous knowledge (IK) owners in sharing their knowledge, the local language as a barrier, and a shortage of proper tools for recording and capturing indigenous knowledge (IK). One of the study recommendations is the need for an indigenous knowledge systems (IKS) policy to be in place at the University of Zululand.Keywords: knowledge creation, SECI model, information and communication technology., indigenous knowledge
Procedia PDF Downloads 1121272 On the Effectiveness of Educational Technology on the Promotion of Exceptional Children or Children with Special Needs
Authors: Nasrin Badrkhani
Abstract:
The increasing use of educational technologies has created a tremendous transformation in all fields and most importantly, in the field of education and learning. In recent decades, traditional learning approaches have undergone fundamental changes with the emergence of new learning technologies. Research shows that suitable educational tools play an effective role in the transmission, comprehension, and impact of educational concepts. These tools provide a tangible basis for thinking and constructing concepts, resulting in an increased interest in learning. They provide real and true experiences to students and convey educational meanings and concepts more quickly and clearly. It can be said that educational technology, as an active and modern teaching method, with capabilities such as engaging multiple senses in the educational process and involving the learner, makes the learning environment more flexible. It effectively impacts the skills of children with special needs by addressing their specific needs. Teachers are no longer the sole source of information, and students are not mere recipients of information. They are considered the main actors in the field of education and learning. Since education is one of the basic rights of every human being and children with special needs face unique challenges and obstacles in education, these challenges can negatively affect their abilities and learning. To combat these challenges, one of the ways is to use educational technologies for more diverse, effective learning. Also, the use of educational technology for students with special needs has increasingly proven effective in boosting their self-confidence and helping them overcome learning challenges, enhancing their learning outcomes.Keywords: communication technology, students with special needs, self-confidence, raising the expectations and progress
Procedia PDF Downloads 131271 Alpha: A Groundbreaking Avatar Merging User Dialogue with OpenAI's GPT-3.5 for Enhanced Reflective Thinking
Authors: Jonas Colin
Abstract:
Standing at the vanguard of AI development, Alpha represents an unprecedented synthesis of logical rigor and human abstraction, meticulously crafted to mirror the user's unique persona and personality, a feat previously unattainable in AI development. Alpha, an avant-garde artefact in the realm of artificial intelligence, epitomizes a paradigmatic shift in personalized digital interaction, amalgamating user-specific dialogic patterns with the sophisticated algorithmic prowess of OpenAI's GPT-3.5 to engender a platform for enhanced metacognitive engagement and individualized user experience. Underpinned by a sophisticated algorithmic framework, Alpha integrates vast datasets through a complex interplay of neural network models and symbolic AI, facilitating a dynamic, adaptive learning process. This integration enables the system to construct a detailed user profile, encompassing linguistic preferences, emotional tendencies, and cognitive styles, tailoring interactions to align with individual characteristics and conversational contexts. Furthermore, Alpha incorporates advanced metacognitive elements, enabling real-time reflection and adaptation in communication strategies. This self-reflective capability ensures continuous refinement of its interaction model, positioning Alpha not just as a technological marvel but as a harbinger of a new era in human-computer interaction, where machines engage with us on a deeply personal and cognitive level, transforming our interaction with the digital world.Keywords: chatbot, GPT 3.5, metacognition, symbiose
Procedia PDF Downloads 701270 Comparative Analysis of the Psychosocial Impact of Skin Diseases in India
Authors: Priyanka Jain, Sushila Pareek
Abstract:
Skin disease is often considered to be ‘only cosmetic’ by many medical professionals and lay-people alike but unlike most internal illnesses, skin disease is often immediately visible to others and therefore people suffering from dermatological conditions may suffer serious social and emotional consequences. The purpose of this research was to compare patients suffering from acne, alopecia areata (AA) and melanosis on perceived stress, social appearance anxiety and coping. The study included 120 patients (acne = 40 AA = 40 melanosis = 40) ages ranged from 15 to 25 years. Perceived Stress Scale (PSS), Social Appearance Anxiety Scale (SAAS), and The Brief COPE were administered to the patients. Analytical evaluation was done by Kruskal Wallis and ANOVA-tests. The results of the present study clearly revealed that perceived stress and social appearance anxiety were highest in patients with AA followed by acne patients and found least in patients with melanosis. With regard to coping, self-distraction as a coping technique was found highest in patients suffering from AA followed by acne and then melanosis. Denial was highest in acne patients followed by AA and experienced least by patients with melanosis. Behavioural disengagement was almost equal in patients with melanosis and acne and a little less in patients suffering from AA Acceptance was highest in patients with melanosis, followed by AA and least in acne patients. Self-blame was found highest in patients with acne, followed by AA patients further followed by patients suffering from melanosis. This study is an attempt to stimulate professionals working in the field of dermatology and mental health to explore their supportive communication and increase awareness regarding the difficulties that patients with skin disease can face.Keywords: coping, dermatology, perceived stress, psychosocial impact, social appearance anxiety
Procedia PDF Downloads 4721269 Using Social Media to Amplify Social Entrepreneurial Message
Authors: Irfan Khairi
Abstract:
It is arguable that today's social media has dramatically redefined human contact, and chiefly because the platforms enable communication opportunities unprecedented. Without question, billions of individuals globally engage in the media, a reality by no means lost on businesses and social entrepreneurs desirous of generating interest in a cause, movement, or other social effort. If, however, the opportunities are immense, so too is the competition. Private persons and entrepreneurial concerns alike virtually saturate the popular sites of Facebook, Twitter, and Instagram, and most are intent on capturing as much external interest as possible. At the same time, however, the social entrepreneur possesses an advantage over the individual concerned only the social aspects of the sites, as they express interests in, and measures applicable to, important causes of which the public at large may be unaware. There is, unfortunately, no single means of assuring success in using the media outlets to generate interest. Nonetheless, a general awareness of how social media sites function, as well as the psychological elements relevant to the functioning, is necessary. It is as important to comprehend basic realities of the platforms and approaches that fail as it is to develop strategy, for the latter relies on knowledge of the former. This awareness in place, the social entrepreneur is then better enabled to determine strategy, in terms of which sites to focus upon and how to most effectively convey their message. What is required is familiarity with the online communities, with attention to the specific advantages each provides. Ultimately, today's social entrepreneur may establish a highly effective platform of promotion and engagement, provided they fully comprehend the social investment necessary for success.Keywords: social media, marketing, e-commerce, internet business
Procedia PDF Downloads 212