Search results for: family systems theory
12901 Improvement of Heat Pipe Thermal Performance in H-VAC Systems Using CFD Modeling
Authors: H. Shokouhmand, A. Ghanami
Abstract:
Heat pipe is simple heat transfer device which combines the conduction and phase change phenomena to control the heat transfer without any need for external power source. At hot surface of heat pipe, the liquid phase absorbs heat and changes to vapor phase. The vapor phase flows to condenser region and with the loss of heat changes to liquid phase. Due to gravitational force the liquid phase flows to evaporator section. In HVAC systems the working fluid is chosen based on the operating temperature. The heat pipe has significant capability to reduce the humidity in HVAC systems. Each HVAC system which uses heater, humidifier or dryer is a suitable nominate for the utilization of heat pipes. Generally heat pipes have three main sections: condenser, adiabatic region and evaporator.Performance investigation and optimization of heat pipes operation in order to increase their efficiency is crucial. In present article, a parametric study is performed to improve the heat pipe performance. Therefore, the heat capacity of heat pipe with respect to geometrical and confining parameters is investigated. For the better observation of heat pipe operation in HVAC systems, a CFD simulation in Eulerian- Eulerian multiphase approach is also performed. The results show that heat pipe heat transfer capacity is higher for water as working fluid with the operating temperature of 340 K. It is also showed that the vertical orientation of heat pipe enhances it’s heat transfer capacity used in the abstract.Keywords: heat pipe, HVAC system, grooved heat pipe, CFD simulation
Procedia PDF Downloads 43312900 Using an Empathy Intervention Model to Enhance Empathy and Socially Shared Regulation in Youth with Autism Spectrum Disorder
Authors: Yu-Chi Chou
Abstract:
The purpose of this study was to establish a logical path of an instructional model of empathy and social regulation, providing feasibility evidence on the model implementation in students with autism spectrum disorder (ASD). This newly developed Emotional Bug-Out Bag (BoB) curriculum was designed to enhance the empathy and socially shared regulation of students with ASD. The BoB model encompassed three instructional phases of basic theory lessons (BTL), action plan practices (APP), and final theory practices (FTP) during implementation. Besides, a learning flow (teacher-directed instruction, student self-directed problem-solving, group-based task completion, group-based reflection) was infused into the progress of instructional phases to deliberately promote the social regulatory process in group-working activities. A total of 23 junior high school students with ASD were implemented with the BoB curriculum. To examine the logical path for model implementation, data was collected from the participating students’ self-report scores on the learning nodes and understanding questions. Path analysis using structural equation modeling (SEM) was utilized for analyzing scores on 10 learning nodes and 41 understanding questions through the three phases of the BoB model. Results showed (a) all participants progressed throughout the implementation of the BoB model, and (b) the models of learning nodes and phases were positive and significant as expected, confirming the hypothesized logic path of this curriculum.Keywords: autism spectrum disorder, empathy, regulation, socially shared regulation
Procedia PDF Downloads 7012899 Improvement of Heat Pipes Thermal Performance in H-VAC Systems Using CFD Modeling
Authors: H. Shokouhmand, A. Ghanami
Abstract:
Heat pipe is simple heat transfer device which combines the conduction and phase change phenomena to control the heat transfer without any need for external power source. At hot surface of heat pipe, the liquid phase absorbs heat and changes to vapor phase. The vapor phase flows to condenser region and with the loss of heat changes to liquid phase. Due to gravitational force the liquid phase flows to evaporator section.In HVAC systems the working fluid is chosen based on the operating temperature. The heat pipe has significant capability to reduce the humidity in HVAC systems. Each HVAC system which uses heater, humidifier or dryer is a suitable nominate for the utilization of heat pipes. Generally heat pipes have three main sections: condenser, adiabatic region and evaporator.Performance investigation and optimization of heat pipes operation in order to increase their efficiency is crucial. In present article, a parametric study is performed to improve the heat pipe performance. Therefore, the heat capacity of heat pipe with respect to geometrical and confining parameters is investigated. For the better observation of heat pipe operation in HVAC systems, a CFD simulation in Eulerian- Eulerian multiphase approach is also performed. The results show that heat pipe heat transfer capacity is higher for water as working fluid with the operating temperature of 340 K. It is also showed that the vertical orientation of heat pipe enhances it’s heat transfer capacity used in the abstract.Keywords: heat pipe, HVAC system, grooved heat pipe, heat pipe limits
Procedia PDF Downloads 36712898 Assessment of Environmental Implications of Rapid Population Growth on Land Use Dynamics: A Case Study of Eleme Local Government Area, Rivers State, Nigeria
Authors: Moses Obenade, Henry U. Okeke, Francis I. Okpiliya, Eugene J. Aniah
Abstract:
Population growth in Eleme has been rapid over the past 75 years with its attendant pressure on the natural resources of the area. Between 1937 and 2006 the population of Eleme grew from 2,528 to 190,194 and is projected to be above 265,707 in 2016 based on an annual growth rate of 3.4%. Using the combined technologies of Geographic Information Systems (GIS), remote sensing (RS) and Demography techniques as its methodology, this paper examines the environmental implications of rapid population growth on land use dynamics in Eleme between 1986 and 2015. The study reveals that between 1986 and 2006, Built-up area and Farmland increased by 72.67 and 12.77% respectively, while light and thick vegetation recorded a decrease of -6.92 and -61.64% respectively. Water body remains fairly constant with minimal changes. Also, between 2006 and 2015 covering a period of 9 years, Built-up area further increased by 53% with an annual growth rate of 2.32 km2 gaining more land area on the detriment of other land uses. Built-up area has an annual growth rate of 2.32km2 and is expected to increase from 18.67km2 in 2006 to 41.87km2 in 2016.The observed Land used/Land cover dynamics is derived by the demographic characteristics of the Study area. Eleme has a total area of 138km2 out of which the Federal Government of Nigeria compulsorily acquired an estimated area of 59.34km2 for industrial purposes excluding acquisitions by the Rivers State Government. It is evident from the findings of this study that the carrying capacity of Eleme ecosystem is under threat due to the current population growth and land consumption rates. Therefore, measures such as use of appropriate technologies in farming techniques, waste management; investment in family planning and female empowerment, maternal health and education, afforestation programs; and amendment of Land Use Act of 1978 are recommended.Keywords: population growth, Eleme, land use, GIS and remote sensing
Procedia PDF Downloads 38312897 A New IFO Estimation Scheme for Orthogonal Frequency Division Multiplexing Systems
Authors: Keunhong Chae, Seokho Yoon
Abstract:
We address a new integer frequency offset (IFO) estimation scheme with an aid of a pilot for orthogonal frequency division multiplexing systems. After correlating each continual pilot with a predetermined scattered pilot, the correlation value is again correlated to alleviate the influence of the timing offset. From numerical results, it is demonstrated that the influence of the timing offset on the IFO estimation is significantly decreased.Keywords: estimation, integer frequency offset, OFDM, timing offset
Procedia PDF Downloads 57212896 Development and Optimization of German Diagnostical Tests in Mathematics for Vocational Training
Authors: J. Thiele
Abstract:
Teachers working at vocational Colleges are often confronted with the problem, that many students graduated from different schools and therefore each had a different education. Especially in mathematics many students lack fundamentals or had different priorities at their previous schools. Furthermore, these vocational Colleges have to provide Graduations for many different working-fields, with different core themes. The Colleges are interested in measuring the different Education levels of their students and providing assistance for those who need to catch up. The Project mathe-meistern was initiated to remedy this problem at vocational Colleges. For this purpose, online-tests were developed. The aim of these tests is to evaluate basic mathematical abilities of the students. The tests are online Multiple-Choice-Tests with a total of 65 Items. They are accessed online with a unique Transaction-Number (TAN) for each participant. The content is divided in several Categories (Arithmetic, Algebra, Fractions, Geometry, etc.). After each test, the student gets a personalized summary depicting their strengths and weaknesses in mathematical Basics. Teachers can visit a special website to examine the results of their classes or single students. In total 5830 students did participate so far. For standardization and optimization purposes the tests are being evaluated, using the classic and probabilistic Test-Theory regarding Objectivity, Reliability and Validity, annually since 2015. This Paper is about the Optimization process considering the Rasch-scaling and Standardization of the tests. Additionally, current results using standardized tests will be discussed. To achieve this Competence levels and Types of errors of students attending vocational Colleges in Nordrheinwestfalen, Germany, were determined, using descriptive Data and Distractorevaluations.Keywords: diagnostical tests in mathematics, distractor devaluation, test-optimization, test-theory
Procedia PDF Downloads 12912895 Men's Intimate Violence: Theory and Practice Relationship
Authors: Omer Zvi Shaked
Abstract:
Intimate Partner Violence (IPV) is a widespread social problem. Since the 1970's, and due to political changes resulting from the feminist movement, western society has been changing its attitude towards the phenomenon and has been taking an active approach to reduce its magnitude. Enterprises in the form of legislation, awareness and prevention campaigns, women's shelters, and community intervention programs became more prevalent as years progressed. Although many initiatives were found to be productive, the effectiveness of one, however, remained questionable throughout the years: intervention programs for men's intimate violence. Surveys outline two main intervention models for men's intimate violence. The first is the Duluth model, which argued that men are socialized to be dominant - while women are socialized to be subordinate - and men are therefore required by social imperative to enforce, physically if necessary, their dominance. The Duluth model became the chief authorized intervention program, and some states in the US even regulated it as the standard criminal justice program for men's intimate violence. However, meta-analysis findings demonstrated that based on a partner's reports, Duluth treatment completers have 44% recidivism rate, and between 40% and 85% dropout range. The second model is the Cognitive-Behavioral Model (CBT), which is a highly accepted intervention worldwide. The model argues that cognitive misrepresentations of intimate situations precede violent behaviors frequently when anger predisposition exists. Since anger dysregulation mediates between one's cognitive schemes and violent response, anger regulation became the chief purpose of the intervention. Yet, a meta-analysis found only a 56% risk reduction for CBT interventions. It is, therefore, crucial to understand the background behind the domination of both the Duluth model and CBT interventions. This presentation will discuss the ways in which theoretical conceptualizations of men's intimate violence, as well as ideologies, had contributed to the above-mentioned interventions' wide acceptance, despite known lack of scientific and evidential support. First, the presentation will review the prominent interventions for male intimate violence, the Duluth model, and CBT. Second, the presentation will review the prominent theoretical models explaining men's intimate violence: The Patriarchal model, the Abusive Personality model, and the Post-Traumatic Stress model. Third, the presentation will discuss the interrelation between theory and practice, and the nature of affinity between research and practice regarding men's intimate violence. Finally, the presentation will set new directions for further research, aiming to improve intervention's efficiency with men's intimate violence and advance social work practice in the field.Keywords: intimate partner violence, theory and practice relationship, Duluth, CBT, abusive personality, post-traumatic stress
Procedia PDF Downloads 12812894 Methodologies, Systems Development Life Cycle and Modeling Languages in Agile Software Development
Authors: I. D. Arroyo
Abstract:
This article seeks to integrate different concepts from contemporary software engineering with an agile development approach. We seek to clarify some definitions and uses, we make a difference between the Systems Development Life Cycle (SDLC) and the methodologies, we differentiate the types of frameworks such as methodological, philosophical and behavioral, standards and documentation. We define relationships based on the documentation of the development process through formal and ad hoc models, and we define the usefulness of using DevOps and Agile Modeling as integrative methodologies of principles and best practices.Keywords: methodologies, modeling languages, agile modeling, UML
Procedia PDF Downloads 19112893 Integration of Thermal Energy Storage and Electric Heating with Combined Heat and Power Plants
Authors: Erich Ryan, Benjamin McDaniel, Dragoljub Kosanovic
Abstract:
Combined heat and power (CHP) plants are an efficient technology for meeting the heating and electric needs of large campus energy systems, but have come under greater scrutiny as the world pushes for emissions reductions and lower consumption of fossil fuels. The electrification of heating and cooling systems offers a great deal of potential for carbon savings, but these systems can be costly endeavors due to increased electric consumption and peak demand. Thermal energy storage (TES) has been shown to be an effective means of improving the viability of electrified systems, by shifting heating and cooling load to off-peak hours and reducing peak demand charges. In this study, we analyze the integration of an electrified heating and cooling system with thermal energy storage into a campus CHP plant, to investigate the potential of leveraging existing infrastructure and technologies with the climate goals of the 21st century. A TRNSYS model was built to simulate a ground source heat pump (GSHP) system with TES using measured campus heating and cooling loads. The GSHP with TES system is modeled to follow the parameters of industry standards and sized to provide an optimal balance of capital and operating costs. Using known CHP production information, costs and emissions were investigated for a unique large energy user rate structure that operates a CHP plant. The results highlight the cost and emissions benefits of a targeted integration of heat pump technology within the framework of existing CHP systems, along with the performance impacts and value of TES capability within the combined system.Keywords: thermal energy storage, combined heat and power, heat pumps, electrification
Procedia PDF Downloads 9212892 IoT Based Information Processing and Computing
Authors: Mannan Ahmad Rasheed, Sawera Kanwal, Mansoor Ahmad Rasheed
Abstract:
The Internet of Things (IoT) has revolutionized the way we collect and process information, making it possible to gather data from a wide range of connected devices and sensors. This has led to the development of IoT-based information processing and computing systems that are capable of handling large amounts of data in real time. This paper provides a comprehensive overview of the current state of IoT-based information processing and computing, as well as the key challenges and gaps that need to be addressed. This paper discusses the potential benefits of IoT-based information processing and computing, such as improved efficiency, enhanced decision-making, and cost savings. Despite the numerous benefits of IoT-based information processing and computing, several challenges need to be addressed to realize the full potential of these systems. These challenges include security and privacy concerns, interoperability issues, scalability and reliability of IoT devices, and the need for standardization and regulation of IoT technologies. Moreover, this paper identifies several gaps in the current research related to IoT-based information processing and computing. One major gap is the lack of a comprehensive framework for designing and implementing IoT-based information processing and computing systems.Keywords: IoT, computing, information processing, Iot computing
Procedia PDF Downloads 19212891 A TgCNN-Based Surrogate Model for Subsurface Oil-Water Phase Flow under Multi-Well Conditions
Authors: Jian Li
Abstract:
The uncertainty quantification and inversion problems of subsurface oil-water phase flow usually require extensive repeated forward calculations for new runs with changed conditions. To reduce the computational time, various forms of surrogate models have been built. Related research shows that deep learning has emerged as an effective surrogate model, while most surrogate models with deep learning are purely data-driven, which always leads to poor robustness and abnormal results. To guarantee the model more consistent with the physical laws, a coupled theory-guided convolutional neural network (TgCNN) based surrogate model is built to facilitate computation efficiency under the premise of satisfactory accuracy. The model is a convolutional neural network based on multi-well reservoir simulation. The core notion of this proposed method is to bridge two separate blocks on top of an overall network. They underlie the TgCNN model in a coupled form, which reflects the coupling nature of pressure and water saturation in the two-phase flow equation. The model is driven by not only labeled data but also scientific theories, including governing equations, stochastic parameterization, boundary, and initial conditions, well conditions, and expert knowledge. The results show that the TgCNN-based surrogate model exhibits satisfactory accuracy and efficiency in subsurface oil-water phase flow under multi-well conditions.Keywords: coupled theory-guided convolutional neural network, multi-well conditions, surrogate model, subsurface oil-water phase
Procedia PDF Downloads 8912890 A Blending Analysis of Metaphors and Metonymies Used to Depict the Deal of the Century by Jordanian Cartoonists
Authors: Aseel Zibin, Abdel Rahman Altakhaineh
Abstract:
This study analyses 30 cartoons depicting THE DEAL OF THE CENTURY as envisaged by two Jordanian cartoonists, namely, EmadHajjaj and Osama Hajjaj. Conceptual Blending Theory (CBT) and Multimodal Metaphor Theory (MMT) are adopted as a theoretical framework to interpret the metaphors and metonymies used in the target cartoons. The results reveal that the target domain THE DEAL OF THE CENTURY was conceptualized mainly through layered metaphors that have metonymic basis and event metaphors\allegories. Specifically, 6 groups were identified: OBJECT or a situation involving OBJECTS, situations involving HUMANS\HYBRIDS of HUMANS and OBJECTS, an ANIMAL OR situation involving an ANIMAL, hybrids of WEAPONS and humans, and event metaphors used to build a story\allegory. The target domain was also depicted via event metaphors used to build a story; some of which are embedded in the Jordanian culture, while others could be perceivable cross-culturally. The results also demonstrate that the most widely used configurations to construe the metaphors was the pictorial source–verbal target in line with Lan and Zuo (2016); the motivation was probably the greater conceptual density and concreteness of visual representation since the target is better captured verbally because of its abstractness. The use of cross-modal mappings of this type was attributed to the abstractness of the target domain, THE DEAL OF THE CENTURY, which makes it more construable via verbal cues rather than visual ones. In contrast, the source domains used were mainly concrete and thus perceivable pictorially rather than verbally.Keywords: semiotics, cognitive semantics, metaphor, culture, blending, cartoon
Procedia PDF Downloads 18612889 Social Identification among Employees: A System Dynamic Approach
Authors: Muhammad Abdullah, Salman Iqbal, Mamoona Rasheed
Abstract:
Social identity among people is an important source of pride and self-esteem, consequently, people struggle to preserve a positive perception of their groups and collectives. The purpose of this paper is to explain the process of social identification and to highlight the underlying causal factors of social identity among employees. There is a little research about how the social identity of employees is shaped in Pakistan’s organizational culture. This study is based on social identity theory. This study uses Systems’ approach as a research methodology. The feedback loop approach is applied to explain the underlying key elements of employee behavior that collectively form social identity among social groups in corporate arena. The findings of this study reveal that effective, evaluative and cognitive components of an individual’s personality are associated with the social identification. The system dynamic feedback loop approach has revealed the underlying structure that is associated with social identity, social group formation, and effective component proved to be the most associated factor. This may also enable to understand how social groups become stable and individuals act according to the group requirements. The value of this paper lies in the understanding gained about the underlying key factors that play a crucial role in social group formation in organizations. It may help to understand the rationale behind how employees socially categorize themselves within organizations. It may also help to design effective and more cohesive teams for better operations and long-term results. This may help to share knowledge among employees as well. The underlying structure behind the social identification is highlighted with the help of system modeling.Keywords: affective commitment, cognitive commitment, evaluated commitment, system thinking
Procedia PDF Downloads 14012888 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems
Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos
Abstract:
Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system
Procedia PDF Downloads 18612887 New York’s Heat Pump Mandate: Doubling Annual Heating Costs to Achieve a 13% Reduction in New York’s CO₂ Gas Emissions
Authors: William Burdick
Abstract:
Manmade climate change is an existential threat that must be mitigated at the earliest opportunity. The role of government in climate change mitigation is enacting and enforcing law and policy to affect substantial reductions in greenhouse gasses, in the short and long term, without substantial increases in the cost of energy. To be optimally effective those laws and policies must be established and enforced based on peer reviewed evidence and scientific facts and result in substantial outcomes in years, not decades. Over the next fifty years, New York’s 2019 Climate Change and Community Protection Act and 2021 All Electric Building Act that mandate replacing natural gas heating systems with heat pumps will, immediately double annual heating costs and by 2075, yield less than 16.2% reduction in CO₂ emissions from heating systems in new housing units, less than a 13% reduction in total CO₂ emissions, and affect a $40B in cumulative additional heating cost, compared to natural gas fueled heating systems.Keywords: climate change, mandate, heat pump, natural gas
Procedia PDF Downloads 7312886 Multi-Agent System Based Solution for Operating Agile and Customizable Micro Manufacturing Systems
Authors: Dylan Santos De Pinho, Arnaud Gay De Combes, Matthieu Steuhlet, Claude Jeannerat, Nabil Ouerhani
Abstract:
The Industry 4.0 initiative has been launched to address huge challenges related to ever-smaller batch sizes. The end-user need for highly customized products requires highly adaptive production systems in order to keep the same efficiency of shop floors. Most of the classical Software solutions that operate the manufacturing processes in a shop floor are based on rigid Manufacturing Execution Systems (MES), which are not capable to adapt the production order on the fly depending on changing demands and or conditions. In this paper, we present a highly modular and flexible solution to orchestrate a set of production systems composed of a micro-milling machine-tool, a polishing station, a cleaning station, a part inspection station, and a rough material store. The different stations are installed according to a novel matrix configuration of a 3x3 vertical shelf. The different cells of the shelf are connected through horizontal and vertical rails on which a set of shuttles circulate to transport the machined parts from a station to another. Our software solution for orchestrating the tasks of each station is based on a Multi-Agent System. Each station and each shuttle is operated by an autonomous agent. All agents communicate with a central agent that holds all the information about the manufacturing order. The core innovation of this paper lies in the path planning of the different shuttles with two major objectives: 1) reduce the waiting time of stations and thus reduce the cycle time of the entire part, and 2) reduce the disturbances like vibration generated by the shuttles, which highly impacts the manufacturing process and thus the quality of the final part. Simulation results show that the cycle time of the parts is reduced by up to 50% compared with MES operated linear production lines while the disturbance is systematically avoided for the critical stations like the milling machine-tool.Keywords: multi-agent systems, micro-manufacturing, flexible manufacturing, transfer systems
Procedia PDF Downloads 13312885 Niftiness of the COLME to Promote Shared Decision-Making in Organizations
Authors: Prakash Singh
Abstract:
The question that arises is whether a theory such as the Collegial Leadership Model of Emancipation (COLME) has the potency to introduce leadership change by empowering and emancipating their employees. It is a fallacy to simply assume that experience alone, in the absence of theory, will contribute to this knowledge base to develop collegial leaders. The focus of this study is to therefore ascertain whether the COLME can serve as a conceptual framework to transform traditional bureaucratic management practices (TBMPs) in order to promote shared decision-making in organizations such as schools. All the respondents in this exploratory qualitative study embraced collegiality to transform TBMPs in their organizations. For the positive effects to be sustained, the collegial practices need to be evolutionary and emancipatory in order to evoke the values of collegial leadership as elucidated by the findings of this study. Interviewees affirmed that the COLME provides an astute framework to develop commendable collegial leadership practices as it clearly outlines procedures to develop and use the leadership potential of all the employees in order to foster joint accountability. They acknowledged that when the principles of collegiality are flexibly applied, they contribute to the creation of a holistic milieu in which all employees are able to express themselves freely, without fear of failure, and thus feel that they are part of the democratic decision-making process. Evidently, a conceptual framework such as the COLME can serve as a benchmark for leadership effectiveness because organizational outcomes need to be measured against standards of excellence in meeting both employee and customer expectations.Keywords: collegial leadership model, employee empowerment, shared decision-making, traditional bureaucratic management practices
Procedia PDF Downloads 49612884 A Case Study in Montreal: Strategies Implemented by Immigrant Parents to Support Their Child's Educational and Academic Success: Managing Distance between School in the Country of Origin and School in the Host Society
Authors: Josée Charette
Abstract:
The academic and educational success of immigrant students is a current issue in education, especially in western societies such in the province of Quebec, in Canada. For people who immigrate with school-age children, the success of the family’s migratory project is often measured by the benefits drawn by children from the educational institutions of their host society. In order to support the academic achievement of their children, immigrant parents try to develop practices that derive from their representations of school and related challenges inspired by the socio-cultural context of their country of origin. These findings lead us to the following question: How does strategies implemented by immigrant parents to manage the representational distance between school of their country of origin and school of the host society support or not the academic and educational success of their child? In the context of a qualitative exploratory approach, we have made interviews in the French-, English- and Spanish-languages with 32 newly immigrated parents and 10 of their children. Parents were invited to complete a network of free associations about «School in Quebec» as a premise for the interview. The objective of this communication is to present strategies implemented by immigrant parents to manage the distance between their representations of schools in their country of origin and in the host society, and to explore the influence of this management on their child’s academic and educational trajectories. Data analysis led us to develop various types of strategies, such as continuity, adaptation, resources mobilization, compensation and "return to basics" strategies. These strategies seem to be part of a continuum from oppositional-conflict scenario, in which parental strategies act as a risk factor, to conciliator-integrator scenario, in which parental strategies act as a protective factor for immigrant students’ academic and educational success. In conclusion, we believe that our research helps in providing a more efficient support to immigrant parents and contributes to develop a wider portrait of immigrant students’ academic achievement. In addition, we think that by improving the experience of immigrant families in Quebec schools, a greater number of migratory projects will be effective.Keywords: immigrant students, family’s migratory project, school of origin and school of host society, immigrants parental strategies
Procedia PDF Downloads 44712883 Exclusive Breast Feeding Practices in Bangladesh
Authors: Md. Ashikur Rahman
Abstract:
Optimal breastfeeding practice is essential to reducing childhood morbidity and mortality and helps to achieve Millennium Development Goal (MDG). A cross-sectional study was conducted in a rural area in Dhaka district to explore the barrier to optimal breastfeeding practices. The population of this study constitutes all nursing mothers having children aged 0-6 months, and they were selected purposively. The study adopted a structured and in-depth interview procedure consisting of open and closed-ended questions. Four hundred rural nursing mothers constituted the sample of the structured interview, while 15 were involved in the in-depth interview. Among the respondent's majority (67%) were in the age group 17-25 years, with a mean age of 24.44 years. Most (39.5%) of the mothers were housewives with a secondary level of education (46.5%). About 32% of mothers started breastfeeding within one hour after birth. But delayed initiation was reported in 31.5% of mothers, whereas 36.8% of mothers forgot the exact time of initiation of breastfeeding. The main reason not to practice colostrum was mothers tried to breastfeed, but there was no milk, stated 13.8% of mothers. In addition, about one-third (34.3%) of the respondents practiced pre-lacteal feeding, and among them, 12.8% introduced sugar with water. Reasons given by the mothers for bottle-feeding was that baby was not satisfied with breast milk only; 22.0% of mothers indicated this cause. The main influence to take formula milk by their mother and mothers-in-law was stated by 18.8% of mothers. Some mothers stated that major constraints to EBF were the perception of not having enough milk (25.5 %) and babies crying seems to be hungry (8.8%). One-third of the mothers (31.5%) felt uncomfortable during breastfeeding. Access to antenatal and postnatal counseling in the study area also was a key obstacle to optimal breastfeeding practices. In a qualitative survey, some mothers believed that there was no difference between breast milk and formula milk. Colostrum feeding, pre-lacteal feeding, early initiation of breastfeeding, and exclusive breastfeeding were strongly associated with family type, family member, birth order, religion, husbands' occupation, delivery attendants and delivery type, postnatal care, and health care facilities. To reduce the barriers to the successful practice of exclusive breastfeeding, there is a need for a grass-roots approach to educating and counseling nursing mothers with identifying factors influencing or discouraging the optimal practice.Keywords: exclusive, breast feeding, practices, Bangladesh
Procedia PDF Downloads 9812882 Simplifying the Migration of Architectures in Embedded Applications Introducing a Pattern Language to Support the Workforce
Authors: Farha Lakhani, Michael J. Pont
Abstract:
There are two main architectures used to develop software for modern embedded systems: these can be labelled as “event-triggered” (ET) and “time-triggered” (TT). The research presented in this paper is concerned with the issues involved in migration between these two architectures. Although TT architectures are widely used in safety-critical applications they are less familiar to developers of mainstream embedded systems. The research presented in this paper began from the premise that–for a broad class of systems that have been implemented using an ET architecture–migration to a TT architecture would improve reliability. It may be tempting to assume that conversion between ET and TT designs will simply involve converting all event-handling software routines into periodic activities. However, the required changes to the software architecture are, in many cases rather more profound. The main contribution of the work presented in this paper is to identify ways in which the significant effort involved in migrating between existing ET architectures and “equivalent” (and effective) TT architectures could be reduced. The research described in this paper has taken an innovative step in this regard by introducing the use of ‘Design patterns’ for this purpose for the first time.Keywords: embedded applications, software architectures, reliability, pattern
Procedia PDF Downloads 33012881 Language Learning Motivation in Mozambique: A Quantitative Study of University Students
Authors: Simao E. Luis
Abstract:
From the 1960s to the 1990s, the social-psychological framework of language attitudes that emerged from the Canadian research tradition was very influential. Integrativeness was one of the main variables in Gardner’s theory because refugees and immigrants were motivated to learn English and French to integrate into the Canadian community. Second language (L2) scholars have expressed concerns over integrativeness because it cannot explain the motivation of L2 learners in global contexts. This study aims to investigate student motivation to learn English as a foreign language in Mozambique, and to contribute to the ongoing validation of the L2 Motivational Self System theory in an under-researched country. One hundred thirty-seven (N=137) university students completed a well-established motivation questionnaire. The data were analyzed with SPSS, and descriptive statistics, correlations, multiple regressions, and MANOVA were conducted. Results show that many variables contribute to motivated learning behavior, particularly the L2 learning experience and attitudes towards the English language. Statistically significant differences were found between males and females, with males expressing more motivation to learn the English language for personal interests. Statistically significant differences were found between older and younger students, with older students reporting more vivid images of themselves as future English language users. These findings have pedagogical implications because motivational strategies are positively correlated with student motivated learning behavior. Therefore, teachers should design L2 tasks that can help students to develop their future L2 selves.Keywords: English as a foreign language, L2 motivational self system, Mozambique, university students
Procedia PDF Downloads 12512880 Improve Heat Pipes Thermal Performance In H-VAC Systems Using CFD Modeling
Authors: A. Ghanami, M.Heydari
Abstract:
Heat pipe is simple heat transfer device which combines the conduction and phase change phenomena to control the heat transfer without any need for external power source. At hot surface of heat pipe, the liquid phase absorbs heat and changes to vapor phase. The vapor phase flows to condenser region and with the loss of heat changes to liquid phase. Due to gravitational force the liquid phase flows to evaporator section. In HVAC systems the working fluid is chosen based on the operating temperature. The heat pipe has significant capability to reduce the humidity in HVAC systems. Each HVAC system which uses heater, humidifier or dryer is a suitable nominate for the utilization of heat pipes. Generally heat pipes have three main sections: condenser, adiabatic region and evaporator. Performance investigation and optimization of heat pipes operation in order to increase their efficiency is crucial. In present article, a parametric study is performed to improve the heat pipe performance. Therefore, the heat capacity of heat pipe with respect to geometrical and confining parameters is investigated. For the better observation of heat pipe operation in HVAC systems, a CFD simulation in Eulerian- Eulerian multiphase approach is also performed. The results show that heat pipe heat transfer capacity is higher for water as working fluid with the operating temperature of 340 K. It is also showed that the vertical orientation of heat pipe enhances it’s heat transfer capacity.used in the abstract.Keywords: Heat pipe, HVAC system, Grooved Heat pipe, Heat pipe limits.
Procedia PDF Downloads 48612879 Online Bakery Management System Proposal
Authors: Alexander Musyoki, Collins Odour
Abstract:
Over the past few years, the bakery industry in Kenya has experienced significant growth largely in part to the increased adoption of technology and automation in their processes; more specifically due to the adoption of bakery management systems to help in running bakeries. While they have been largely responsible for the improved productivity and efficiency in bakeries, most of them are now outdated and pose more challenges than benefits. The proposed online bakery management system mentioned in this paper aims to address this by allowing bakery owners to track inventory, budget, job progress, and data analytics on each job and in doing so, promote the Sustainable Development Goals 3 and 12, which aim to ensure healthy lives and promote sustainable economic growth as the proposed benefits of these features include scalability, easy accessibility, reduced acquisition costs, better reliability, and improved functionality that will allow bakeries to become more competitive, reduce waste and track inventory more efficiently. To better understand the challenges, a comprehensive study has been performed to assess these traditional systems and try to understand if an online bakery management system can prove to be advantageous to bakery owners. The study conducted gathered feedback from bakery owners and employees in Nairobi County, Kenya using an online survey with a response rate of about 86% from the target population. The responses cited complex and hard to use bakery management systems (59.7%), lack of portability from one device to the other (58.1%) and high acquisition costs (51.6%) as the top challenges of traditional bakery management systems. On the other hand, some of the top benefits that most of the respondents would realize from the online bakery management system was better reliability (58.1%) and reduced acquisition costs (58.1%). Overall, the findings suggest that an online bakery management system has a lot of advantages over traditional systems and is likely to be well-received in the market. In conclusion, the proposed online bakery management system has the potential to improve the efficiency and competitiveness of small-sized bakeries in Nairobi County. Further research is recommended to expand the sample size and diversity of respondents and to conduct more in-depth analyses of the data collected.Keywords: ICT, technology and automation, bakery management systems, food innovation
Procedia PDF Downloads 8612878 Capitalizing on Differential Network Ties: Unpacking Individual Creativity from Social Capital Perspective
Authors: Yuanyuan Wang, Chun Hui
Abstract:
Drawing on social capital theory, this article discusses how individuals may utilize network ties to come up with creativity. Social capital theory elaborates how network ties enhances individual creativity from three dimensions: structural access, and relational and cognitive mechanisms. We categorize network ties into strong and weak in terms of tie strength. With less structural constraints, weak ties allow diverse and heterogeneous knowledge to prosper, further facilitating individuals to build up connections among diverse even distant ideas. On the other hand, strong ties with the relational mechanism of cooperation and trust may benefit the accumulation of psychological capital, ultimately to motivate and sustain creativity. We suggest that differential ties play different roles for individual creativity: Weak ties deliver informational benefit directly rifling individual creativity from informational resource aspect; strong ties offer solidarity benefits to reinforce psychological capital, which further inspires individual creativity engagement from a psychological viewpoint. Social capital embedded in network ties influence individuals’ informational acquisition, motivation, as well as cognitive ability to be creative. Besides, we also consider the moderating effects constraining the relatedness between network ties and creativity, such as knowledge articulability. We hypothesize that when the extent of knowledge articulability is low, that is, with low knowledge codifiability, and high dependency and ambiguity, weak ties previous serving as knowledge reservoir will not become ineffective on individual creativity. Two-wave survey will be employed in Mainland China to empirically test mentioned propositions.Keywords: network ties, social capital, psychological capital, knowledge articulability, individual creativity
Procedia PDF Downloads 41212877 Towards a Simulation Model to Ensure the Availability of Machines in Maintenance Activities
Authors: Maryam Gallab, Hafida Bouloiz, Youness Chater, Mohamed Tkiouat
Abstract:
The aim of this paper is to present a model based on multi-agent systems in order to manage the maintenance activities and to ensure the reliability and availability of machines just with the required resources (operators, tools). The interest of the simulation is to solve the complexity of the system and to find results without cost or wasting time. An implementation of the model is carried out on the AnyLogic platform to display the defined performance indicators.Keywords: maintenance, complexity, simulation, multi-agent systems, AnyLogic platform
Procedia PDF Downloads 30612876 Toward a Characteristic Optimal Power Flow Model for Temporal Constraints
Authors: Zongjie Wang, Zhizhong Guo
Abstract:
While the regular optimal power flow model focuses on a single time scan, the optimization of power systems is typically intended for a time duration with respect to a desired objective function. In this paper, a temporal optimal power flow model for a time period is proposed. To reduce the computation burden needed for calculating temporal optimal power flow, a characteristic optimal power flow model is proposed, which employs different characteristic load patterns to represent the objective function and security constraints. A numerical method based on the interior point method is also proposed for solving the characteristic optimal power flow model. Both the temporal optimal power flow model and characteristic optimal power flow model can improve the systems’ desired objective function for the entire time period. Numerical studies are conducted on the IEEE 14 and 118-bus test systems to demonstrate the effectiveness of the proposed characteristic optimal power flow model.Keywords: optimal power flow, time period, security, economy
Procedia PDF Downloads 45412875 From Plate to Self-Perception: Unravelling the Interplay Between Food Security and Self-Esteem Among Malaysian University Students
Authors: Amiraa Ali Mansor, Haslinda Abdullah, Angela Chan Nguk Fong, Norhaida Hanim Binti Ahmad Tajudin, Asnarulkhadi Abu Samah
Abstract:
Obesity has risen sharply over the past three decades, posing a grave public health concern globally. In Malaysia, it has also emerged as a significant health threat. While the second Sustainable Development Goal, "Zero Hunger", aims to ensure equitable access to nutritious food for all, a key challenge lies in addressing food insecurity. Food insecurity not only pertains to the quantity but also the quality of food, with both dimensions playing a pivotal role in health outcomes. To date, much of the research on food security has focused on household levels. There remains a research gap concerning university students, a population transitioning to independence from parental support and grappling with limited resources. This study seeks to bridge this gap by extending the Food Security Theory to incorporate the psychological dimension of self-esteem. Using a quantitative approach, data was collected from 452 public university students in Malaysia through a cross-sectional research design and a multi-stage cluster sampling technique. The anticipated findings will provide novel insights by linking food security with self-esteem. Such insights have implications for healthcare policy and the framing of preventive strategies against obesity. It is hoped that this research will not only contribute to the academic discourse on Food Security Theory but also serve as a foundation for refining national health policies and programs aimed at fostering a healthier lifestyle.Keywords: obesity, food security, body image, self-esteem
Procedia PDF Downloads 8112874 Welcome to 'Almanya': Effects of Displacement among Refugee Women
Authors: Carmen Nechita
Abstract:
This research explores the world of Syrian refugee women living in Dresden and their efforts to reconstruct their lives in the state of Saxony in Germany. The focus is on the initial period of adjustment and understanding how refugee women use culture, family ties, and tradition to contest and rebuild new relationships with the host country. Faced with a new status as “the refugee”, women have to re-imagine their ethno-cultural identity in order to cope with life in Diaspora. In order to understand the coping mechanism and the displacement effects on Syrian women, interviews with twelve refugee women were conducted. Traumatic experiences of loss and oppression are at the core of their confessions. While gender violence, abuse and patriarchal framework shape their narratives, this research argues that there is a need to look at this from a cultural perspective and try to distance ourselves from the western paradigm. The way Syrian women refute and rebuild their national and ethno-cultural identity in order to negotiate for themselves new space within German borders is explored. Two discourses are bridged: one of multiculturalism and one of tradition in order to explain how Syrian women experience western notions of family, womanhood and spousal dynamics. The process is painful, traumatic and marked by feelings of low self-worth, but in the end, new codes emerge and these women come out more empowered. The paper includes the migration experience and explores the ways in which Syrian refugee women tend to tell their complex stories, and how they reconstruct their identity in a new territory while faced with a different culture that discriminates against them. During the research, four distinct phases in the acculturation period were identified: “the survival”, “the honeymoon period”, “the isolation period” and “the anger period”. Each phase is analyzed in order to understand what triggers them, how women migrate from one phase to another and what can be done to make the process easier. This paper contributes to the field of refugee studies by offering a thorough understanding of the initial phases of the acculturation process in the case of Syrian refugee women. The study examines the fleeing and settlement experience in order to understand the complex ways that refugee women cope with the traumatic experience of settlement in another country and in a different culture. *Almanya: The Arabic word for Germany.Keywords: displacement, migration, refugee women, Syria
Procedia PDF Downloads 26012873 Model Order Reduction of Continuous LTI Large Descriptor System Using LRCF-ADI and Square Root Balanced Truncation
Authors: Mohammad Sahadet Hossain, Shamsil Arifeen, Mehrab Hossian Likhon
Abstract:
In this paper, we analyze a linear time invariant (LTI) descriptor system of large dimension. Since these systems are difficult to simulate, compute and store, we attempt to reduce this large system using Low Rank Cholesky Factorized Alternating Directions Implicit (LRCF-ADI) iteration followed by Square Root Balanced Truncation. LRCF-ADI solves the dual Lyapunov equations of the large system and gives low-rank Cholesky factors of the gramians as the solution. Using these cholesky factors, we compute the Hankel singular values via singular value decomposition. Later, implementing square root balanced truncation, the reduced system is obtained. The bode plots of original and lower order systems are used to show that the magnitude and phase responses are same for both the systems.Keywords: low-rank cholesky factor alternating directions implicit iteration, LTI Descriptor system, Lyapunov equations, Square-root balanced truncation
Procedia PDF Downloads 42012872 Short-Range and Long-Range Ferrimagnetic Order in Fe(Te₁.₅Se₀.₅)O₅Cl
Authors: E. S. Kozlyakova, A. A. Eliseev, A. V. Moskin, A. Y. Akhrorov, P. S. Berdonosov, V. A. Dolgikh, K. N. Denisova, P. Lemmens, B. Rahaman, S. Das, T. Saha-Dasgupta, A. N. Vasiliev, O. S. Volkova
Abstract:
Considerable attention has been paid recently to FeTe₂O₅Cl due to reduced dimensionality and frustration in the magnetic subsystem, succession of phase transitions, and multiferroicity. The efforts to grow its selenite sibling resulted in mixed halide compound, Fe(Te₁.₅Se₀.₅)O₅Cl, which was found crystallizing in a new structural type and possessing properties drastically different from those of a parent system. Hereby we report the studies of magnetization M and specific heat Cₚ, combined with Raman spectroscopy and density functional theory calculations in Fe(Te₁.₅Se₀.₅)O₅Cl. Its magnetic subsystem features weakly coupled Fe³⁺ - Fe³⁺ dimers showing the regime of short-range correlations at TM ~ 70 K and long-range order at TN = 22 K. In a magnetically ordered state, sizable spin-orbital interactions lead to a small canting of Fe³⁺ moments. The density functional theory calculations of leading exchange interactions were found in agreement with measurements of thermodynamic properties and Raman spectroscopy. Besides, because of the relatively large magnetic moment of the Fe³⁺ ion, we found that magnetic dipole-dipole interactions contribute significantly to experimentally observed orientation of magnetization easy axis in ac-plane. As a conclusion, we suggest a model of magnetic subsystem in magnetically ordered state of Fe(Te₁.₅Se₀.₅)O₅Cl based on a model of interacting dimers.Keywords: dipole-dipole interactions, low dimensional magnetism, selenite, spin canting
Procedia PDF Downloads 170