Search results for: communication constraint
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4496

Search results for: communication constraint

986 Deployment of Information and Communication Technology (ICT) to Reduce Occurrences of Terrorism in Nigeria

Authors: Okike Benjamin

Abstract:

Terrorism is the use of violence and threat to intimidate or coerce a person, group, society or even government especially for political purposes. Terrorism may be a way of resisting government by some group who may feel marginalized. It could also be a way of expressing displeasure over the activities of government. On 26th December, 2009, US placed Nigeria as a terrorist nation. Recently, the occurrences of terrorism in Nigeria have increased considerably. In Jos, Plateau state, Nigeria, there was a bomb blast which claimed many lives on the eve of 2010 Christmas. Similarly, there was another bomb blast in Mugadishi (Sani Abacha) Barracks Mammy market on the eve of 2011 New Year. For some time now, it is no longer news that bomb exploded in some Northern part of Nigeria. About 25 years ago, stopping terrorism in America by the Americans relied on old-fashioned tools such as strict physical security at vulnerable places, intelligence gathering by government agents, or individuals, vigilance on the part of all citizens, and a sense of community in which citizens do what could be done to protect each other. Just as technology has virtually been used to better the way many other things are done, so also this powerful new weapon called computer technology can be used to detect and prevent terrorism not only in Nigeria, but all over the world. This paper will x-ray the possible causes and effects of bomb blast, which is an act of terrorism and suggest ways in which Explosive Detection Devices (EDDs) and computer software technology could be deployed to reduce the occurrences of terrorism in Nigeria. This become necessary with the abduction of over 200 schoolgirls in Chibok, Borno State from their hostel by members of Boko Haram sect members on 14th April, 2014. Presently, Barrack Obama and other world leaders have sent some of their military personnel to help rescue those innocent schoolgirls whose offence is simply seeking to acquire western education which the sect strongly believe is forbidden.

Keywords: terrorism, bomb blast, computer technology, explosive detection devices, Nigeria

Procedia PDF Downloads 260
985 Revised Risk Priority Number in Failure Mode and Effects Analysis Model from the Perspective of Healthcare System

Authors: Fatemeh Rezaei, Mohammad H. Yarmohammadian, Masoud Ferdosi, Abbas Haghshnas

Abstract:

Background: Failure Modes and Effect Analysis is now having known as the main methods of risk assessment and the accreditation requirements for many organizations. The Risk Priority Number (RPN) approach is generally preferred, especially for its easiness of use. Indeed it does not require statistical data, but it is based on subjective evaluations given by the experts about the Occurrence (O i), the Severity (Si) and the Detectability (D i) of each cause of failure. Methods: This study is a quantitative – qualitative research. In terms of qualitative dimension, method of focus groups with inductive approach is used. To evaluate the results of the qualitative study, quantitative assessment was conducted to calculate RPN score. Results; We have studied patient’s journey process in surgery ward and the most important phase of the process determined Transport of the patient from the holding area to the operating room. Failures of the phase with the highest priority determined by defining inclusion criteria included severity (clinical effect, claim consequence, waste of time and financial loss), occurrence (time- unit occurrence and degree of exposure to risk) and preventability (degree of preventability and defensive barriers) and quantifying risks priority criteria in the context of RPN index. Ability of improved RPN reassess by root cause (RCA) analysis showed some variations. Conclusions: Finally, It could be concluded that understandable criteria should have been developed according to personnel specialized language and communication field. Therefore, participation of both technical and clinical groups is necessary to modify and apply these models.

Keywords: failure mode, effects analysis, risk priority number(RPN), health system, risk assessment

Procedia PDF Downloads 312
984 Design Thinking and Requirements Engineering in Application Development: Case Studies in Brazil

Authors: V. Prodocimo, A. Malucelli, S. Reinehr

Abstract:

Organizations, driven by business digitization, have in software the main core of value generation and the main channel of communication with their clients. The software, as well as responding to momentary market needs, spans an extensive product family, ranging from mobile applications to multilateral platforms. Thus, the software specification needs to represent solutions focused on consumer problems and market needs. However, requirements engineering, whose approach is strongly linked to technology, becomes deficient and ineffective when the problem is not well defined or when looking for an innovative solution, thus needing a complementary approach. Research has cited the combination of design thinking and requirements engineering, many correlating design thinking as a support technique for the elicitation step, however, little is known about the real benefits and challenges that this combination can bring. From the point of view of the development process, there is little empirical evidence of how Design Thinking interactions with requirements engineering occur. Given this scenario, this paper aims to understand how design thinking practices are applied in each of the requirements engineering stages in software projects. To elucidate these interactions, a qualitative and exploratory research was carried out through the application of the case study method in IT organizations in Brazil that work in the development of software projects. The results indicate that design thinking has aided requirements engineering, both in projects that adopt agile methods and those that adopt the waterfall process, bringing a complementary thought that seeks to build the best software solution design for business problems. It was also possible to conclude that organizations choose to use design thinking not based on a specific software family (e.g. mobile or desktop applications), but given the characteristics of the software projects, such as: vague nature of the problem, complex problems and/or need for innovative solutions.

Keywords: software engineering, requirements engineering, design thinking, innovative solutions

Procedia PDF Downloads 124
983 Gaming Mouse Redesign Based on Evaluation of Pragmatic and Hedonic Aspects of User Experience

Authors: Thedy Yogasara, Fredy Agus

Abstract:

In designing a product, it is currently crucial to focus not only on the product’s usability based on performance measures, but also on user experience (UX) that includes pragmatic and hedonic aspects of product use. These aspects play a significant role in fulfillment of user needs, both functionally and psychologically. Pragmatic quality refers to as product’s perceived ability to support the fulfillment of behavioral goals. It is closely linked to functionality and usability of the product. In contrast, hedonic quality is product’s perceived ability to support the fulfillment of psychological needs. Hedonic quality relates to the pleasure of ownership and use of the product, including stimulation for personal development and communication of user’s identity to others through the product. This study evaluates the pragmatic and hedonic aspects of gaming mice G600 and Razer Krait using AttrakDiff tool to create an improved design that is able to generate positive UX. AttrakDiff is a method that measures pragmatic and hedonic scores of a product with a scale between -3 to +3 through four attributes (i.e. Pragmatic Quality, Hedonic Quality-Identification, Hedonic Quality-Stimulation, and Attractiveness), represented by 28 pairs of opposite words. Based on data gathered from 15 participants, it is identified that gaming mouse G600 needs to be redesigned because of its low grades (pragmatic score: -0.838, hedonic score: 1, attractiveness score: 0.771). The redesign process focuses on the attributes with poor scores and takes into account improvement suggestions collected from interview with the participants. The redesigned mouse G600 is evaluated using the previous method. The result shows higher scores in pragmatic quality (1.929), hedonic quality (1.703), and attractiveness (1.667), indicating that the redesigned mouse is more capable of creating pleasurable experience of product use.

Keywords: AttrakDiff, hedonic aspect, pragmatic aspect, product design, user experience

Procedia PDF Downloads 155
982 Insight into the Visual Attentional Correlates Underpinning Autistic-Like Traits in Fragile X and Down Syndrome

Authors: Jennifer M. Glennon, Hana D'Souza, Luke Mason, Annette Karmiloff-Smith, Michael S. C. Thomas

Abstract:

Genetic syndrome groups that feature high rates of autism comorbidity, like Down syndrome (DS) and fragile X syndrome (FXS), have been presented as useful models for understanding risk and protective factors involved in the emergence of autistic traits. Yet despite reaching clinical thresholds, these ‘syndromic’ forms of autism appear to differ in important ways from the idiopathic or ‘non-syndromic’ autism phenotype. To uncover the true nature of these comorbidities, it is necessary to extend definitions of autism to include the cognitive characteristics of the disorder and to then apply this broadened conceptualisation to the study of syndromic autism profiles. The current study employs a variety of well-established eye-tracking paradigms to assess visual attentional performance in children with DS and FXS who reach thresholds for autism on the Social Communication Questionnaire. It investigates whether autism profiles in these children are accompanied by visual orienting difficulties (‘sticky attention’), decreased social attention, and enhanced visual search performance, all of which are characteristic of the idiopathic autism phenotype. Data is collected from children with DS and FXS aged between 6 and 10 years, in addition to two control groups matched on age and intellectual ability (i.e., children with idiopathic autism and neurotypical controls). Cross-sectional developmental trajectory analyses are conducted to enable visuo-attentional profile comparisons. Significant differences in the visuo-attentional processes underpinning autism presentations in children with FXS and DS are hypothesised, supporting notions of syndrome specificity. The study provides insight into the complex heterogeneity associated with syndromic autism presentations and autism per se, with clinical implications for the utility of autism intervention programmes in DS and FXS populations.

Keywords: autism, down syndrome, fragile X syndrome, eye tracking

Procedia PDF Downloads 235
981 Stress and Rhythm in the Educated Nigerian Accent of English

Authors: Nkereke M. Essien

Abstract:

The intention of this paper is to examine stress in the Educated Nigerian Accent of English (ENAE) with the aim of analyzing stress and rhythmic patterns of Nigerian English. Our aim also is to isolate differences and similarities in the stress patterns studied and also know what forms the accent of these Educated Nigerian English (ENE) which marks them off from other groups or English’s of the world, to ascertain and characterize it and to provide documented evidence for its existence. Nigerian stress and rhythmic patterns are significantly different from the British English stress and rhythmic patterns consequently, the educated Nigerian English (ENE) features more stressed syllables than the native speakers’ varieties. The excessive stressed of syllables causes a contiguous “Ss” in the rhythmic flow of ENE, and this brings about a “jerky rhythm’ which distorts communication. To ascertain this claim, ten (10) Nigerian speakers who are educated in the English Language were selected by a stratified Random Sampling technique from two Federal Universities in Nigeria. This classification belongs to the education to the educated class or standard variety. Their performance was compared to that of a Briton (control). The Metrical system of analysis was used. The respondents were made to read some words and utterance which was recorded and analyzed perceptually, statistically and acoustically using the one-way Analysis of Variance (ANOVA). The Turky-Kramer Post Hoc test, the Wilcoxon Matched Pairs Signed Ranks test, and the Praat analysis software were used in the analysis. It was revealed from our findings that the Educated Nigerian English speakers feature more stressed syllables in their productions by spending more time in pronouncing stressed syllables and sometimes lesser time in pronouncing the unstressed syllables. Their overall tempo was faster. The ENE speakers used tone to mark prominence while the native speaker used stress to mark pronounce, typified by the control. We concluded that the stress pattern of the ENE speakers was significantly different from the native speaker’s variety represented by the control’s performance.

Keywords: accent, Nigerian English, rhythm, stress

Procedia PDF Downloads 238
980 Effects of Crisis-Induced Emotions on in-Crisis Protective Behavior and Post-Crisis Perception: An Analysis of Survey Data for the 2015 Middle East Respiratory Syndrome in South Korea

Authors: Myoungsoon You, Heejung Son

Abstract:

Background: In the current study, we investigated the effects of emotions induced by an infectious disease outbreak on the various protective behaviors taken during the crisis and on the perception after the crisis. The investigation was based on two psychological theories of appraisal tendency and action tendency. Methods: A total of 900 participants in South Korea who experienced the 2015 Middle East Respiratory Syndrome outbreak were sampled by a professional survey agency. To assess the influence of the emotions fear and anger, a regression approach was used. The effect of emotions on various protective behaviors and perceptions was observed using a hierarchical regression method. Results: Fear and anger induced by the infectious disease outbreak were both associated with increased protective behaviors during the crisis. However, the differences between the emotions were observed. While protective behaviors with avoidance tendency (adherence to recommendations, self-mitigation), were raised by both fear and anger, protective behaviors with approach tendency (information-seeking) were increased by anger, but not fear. Regarding the effect of emotion on the risk perception after the crisis, only fear was associated with a higher level of risk perception. Conclusions: This study confirmed the role of emotions in crisis protective behaviors and post-crisis perceptions regarding an infectious disease outbreak. These findings could enhance understanding of the public’s protective behaviors during infectious disease outbreaks and afterward risk perception corresponding to emotions. The results also suggested strategies for communicating with the public that takes into account emotions that are prominently induced by crises associated with disease outbreaks.

Keywords: crisis communication, emotion, infectious disease outbreak, protective behavior, risk perception

Procedia PDF Downloads 275
979 Design and Development of Fleet Management System for Multi-Agent Autonomous Surface Vessel

Authors: Zulkifli Zainal Abidin, Ahmad Shahril Mohd Ghani

Abstract:

Agent-based systems technology has been addressed as a new paradigm for conceptualizing, designing, and implementing software systems. Agents are sophisticated systems that act autonomously across open and distributed environments in solving problems. Nevertheless, it is impractical to rely on a single agent to do all computing processes in solving complex problems. An increasing number of applications lately require multiple agents to work together. A multi-agent system (MAS) is a loosely coupled network of agents that interact to solve problems that are beyond the individual capacities or knowledge of each problem solver. However, the network of MAS still requires a main system to govern or oversees the operation of the agents in order to achieve a unified goal. We had developed a fleet management system (FMS) in order to manage the fleet of agents, plan route for the agents, perform real-time data processing and analysis, and issue sets of general and specific instructions to the agents. This FMS should be able to perform real-time data processing, communicate with the autonomous surface vehicle (ASV) agents and generate bathymetric map according to the data received from each ASV unit. The first algorithm is developed to communicate with the ASV via radio communication using standard National Marine Electronics Association (NMEA) protocol sentences. Next, the second algorithm will take care of the path planning, formation and pattern generation is tested using various sample data. Lastly, the bathymetry map generation algorithm will make use of data collected by the agents to create bathymetry map in real-time. The outcome of this research is expected can be applied on various other multi-agent systems.

Keywords: autonomous surface vehicle, fleet management system, multi agent system, bathymetry

Procedia PDF Downloads 269
978 Conceptual Understanding for the Adoption of Energy Assessment Methods in the United Arab Emirates Built Environment

Authors: Amna I. Shibeika, Batoul Y. Hittini, Tasneem B. Abd Bakri

Abstract:

Regulation and integration of public policy, economy, insurance industry, education, and construction stakeholders are the main contributors to achieve sustainable development. Building environmental assessment methods were introduced in the field to address issues such as global warming and conservation of natural resources. In the UAE, Estidama framework with its associated Pearl Building Rating System (PBRS) has been introduced in 2010 to address and spread sustainability practices within the country’s fast-growing built environment. Based on literature review of relevant studies investigating different project characteristics that influence sustainability outcomes, this paper presents a conceptual framework for understanding the adoption of PBRS in UAE projects. The framework also draws on Diffusion of Innovations theory to address the questions of how the assessment method is chosen in the first place and what is the impact of PBRS on the multi-disciplinary design and construction processes. The study highlights the mandatory nature of the adoption of PBRS for government buildings as well as imbedding Estidama principles within Abu Dhabi building codes as key factors for raising awareness about sustainable practices. Moreover, several project-related elements are addressed to understand their relationship with the adoption process, including project team collaboration; communication and coordination; levels of commitment and engagement; and the involvement of key actors as sustainability champions. This conceptualization of the adoption of PBRS in UAE projects contributes to the growing literature on the adoption of energy assessment tools and addresses the UAE vision is to be at the forefront of innovative sustainable development by 2021.

Keywords: adoption, building assessment, design management, innovation, sustainability

Procedia PDF Downloads 147
977 A Review of Blog Assisted Language Learning Research: Based on Bibliometric Analysis

Authors: Bo Ning Lyu

Abstract:

Blog assisted language learning (BALL) has been trialed by educators in language teaching with the development of Web 2.0 technology. Understanding the development trend of related research helps grasp the whole picture of the use of blog in language education. This paper reviews current research related to blogs enhanced language learning based on bibliometric analysis, aiming at (1) identifying the most frequently used keywords and their co-occurrence, (2) clustering research topics based on co-citation analysis, (3) finding the most frequently cited studies and authors and (4) constructing the co-authorship network. 330 articles were searched out in Web of Science, 225 peer-viewed journal papers were finally collected according to selection criteria. Bibexcel and VOSviewer were used to visualize the results. Studies reviewed were published between 2005 to 2016, most in the year of 2014 and 2015 (35 papers respectively). The top 10 most frequently appeared keywords are learning, language, blog, teaching, writing, social, web 2.0, technology, English, communication. 8 research themes could be clustered by co-citation analysis: blogging for collaborative learning, blogging for writing skills, blogging in higher education, feedback via blogs, blogging for self-regulated learning, implementation of using blogs in classroom, comparative studies and audio/video blogs. Early studies focused on the introduction of the classroom implementation while recent studies moved to the audio/video blogs from their traditional usage. By reviewing the research related to BALL quantitatively and objectively, this paper reveals the evolution and development trends as well as identifies influential research, helping researchers and educators quickly grasp this field overall and conducting further studies.

Keywords: blog, bibliometric analysis, language learning, literature review

Procedia PDF Downloads 208
976 The Effect of a New Reimbursement Policy for Discharge Planning Service

Authors: Chueh Chi-An, Chan Hui-Ya

Abstract:

Background and Aim: National Health Insurance (NHI) Administration released a new reimbursement policy for hospital patients who received a superior discharge plan on April 1, 2016. Each case could be claimed 1,500 points for fee-of service with related documents. The policy is considered a solution to help reducing the crowding in the emergency department, the length of stay of hospital, unplanned readmission rate and unplanned ER visit. This study aim is to explore the effect of the new reimbursement policy for discharge planning service in a medical center. Methods: The discharge team explained to general wards the new policy and encouraged early assessment, communication and connecting to community care for patients. They stated the benefit from the policy and asked documenting for reimbursement claiming from April to May 2016. The imbursement fee of NHI declaration from June 2015 to October 2017 was collected. The indicators included hospital occupancy rate, hospital bed turnover rate, long-term hospitalization rate, and patients’ satisfaction were analyzed after the policy implemented. Results: The results showed that the amount of service declaration was increasing from 2 cases in February 2016 to 110 cases in October 2017, the application rate was increasing from 0.029% to 1.576% of all inpatient cases, and the average payment from NHI was around 148,500 NT dollars per month in 2017. There are no significant differences in the indicators among hospital occupancy rate, hospital bed turnover rate, long-term hospitalization rate, and patients’ satisfaction. Conclusion: To provide a good discharge plan require a specialized case manager, the new reimbursement policy is too complicated and the total fee-of-service hospital could claim is too limited to hiring one. The results suggest more strategies combine with the new reimbursement policy will be needed.

Keywords: discharge planning, reimbursement, unplanned ER visit, readmission rate

Procedia PDF Downloads 173
975 The Importance of Parental Involvement in Special Education: Enhancing Student Success through Family Engagement

Authors: Adel Al Hashlan

Abstract:

Parent and family engagement plays a crucial role in supporting the success of students with special needs in educational settings. This paper explores the significance of parental involvement in special education, examining its impact on academic achievement, social-emotional development, and overall well-being. Meaningful collaboration between educators, parents, and families can promote positive outcomes for students with diverse learning needs. The study employs a mixed-methods approach, incorporating both qualitative and quantitative techniques. Data were collected through structured interviews, focus groups, and surveys involving students with special needs, their parents, and educators across diverse educational settings. The analysis identifies patterns, themes, and correlations to understand the impact of parent and family engagement on student outcomes. Major findings reveal that effective parent and family involvement initiatives, characterized by strong communication strategies, collaboration frameworks, and partnership-building approaches, significantly enhance students’ academic performance, social-emotional development, and overall well-being. The study also identifies common barriers to parental involvement, such as cultural differences and accessibility issues, and suggests strategies for overcoming these challenges. In conclusion, the study underscores the importance of systemic support and resource allocation to facilitate meaningful partnerships between schools and families. Ongoing research and professional development are crucial to enhancing the effectiveness of parent and family engagement initiatives in special education, ultimately maximizing student achievement and well-being.

Keywords: parental involvement, special education, student success, collaborative partnerships

Procedia PDF Downloads 39
974 Wearable Heart Rate Sensor Based on Wireless System for Heart Health Monitoring

Authors: Murtadha Kareem, Oliver Faust

Abstract:

Wearable biosensor systems can be designed and developed for health monitoring. There is much interest in both scientific and industrial communities established since 2007. Fundamentally, the cost of healthcare has increased dramatically and the world population is aging. That creates the need to harvest technological improvements with small bio-sensing devices, wireless-communication, microelectronics and smart textiles, that leads to non-stop developments of wearable sensor based systems. There has been a significant demand to monitor patient's health status while the patient leaves the hospital in his/her personal environment. To address this need, there are numerous system prototypes which has been launched in the medical market recently, the aim of that is to provide real time information feedback about patient's health status, either to the patient himself/herself or direct to the supervising medical centre station, while being capable to give a notification for the patient in case of possible imminent health threatening conditions. Furthermore, wearable health monitoring systems comprise new techniques to address the problem of managing and monitoring chronic heart diseases for elderly people. Wearable sensor systems for health monitoring include various types of miniature sensors, either wearable or implantable. To be specific, our proposed system able to measure essential physiological parameter, such as heart rate signal which could be transmitted through Bluetooth to the cloud server in order to store, process, analysis and visualise the data acquisition. The acquired measurements are connected through internet of things to a central node, for instance an android smart phone or tablet used for visualising the collected information on application or transmit it to a medical centre.

Keywords: Wearable sensor, Heart rate, Internet of things, Chronic heart disease

Procedia PDF Downloads 161
973 Linguistics and Islamic Studies in Historical Perspective: The Case of Interdisciplinary Communication

Authors: Olga Bernikova, Oleg Redkin

Abstract:

Islamic Studies and the Arabic language are indivisible from each other starting from the appearance of Islam and formation of the Classical language. The present paper demonstrates correlation among linguistics and religion in historical perspective with regard to peculiarities of the Arabic language which distinguish it from the other prophetic languages. Islamic Studies and Linguistics are indivisible from each other starting from the invent of Islam and formation of the Classical language. In historical perspective, the Arabic language has been and remains a tool for the expression of Islamic rhetoric being a prophetic language. No other language in the world has preserved its stability for more than 14 centuries. Islam is considered to be one of the most important factors which secure this stability. The analysis and study of the text of Qurʾān are of special importance for those who study Islamic civilization, its role in the destinies of the mankind, its values and virtues. Without understanding of the polyphony of this sacred text, indivisible unity of its form and content it is impossible to understand social developments both in the present and the past. Since the first years of Islam Qurʾān had been in the center of attention of Muslim scholars, and in the center of attention of theologians, historians, philologists, jurists, mathematicians. Only quite recently it has become an object of analysis of the specialists of computer technologies. In Arabic and Islamic studies mediaeval texts i.e. textual documents are considered the main source of information. Hence the analysis of the multiplicity of various texts and finding of interconnections between them help to set scattered fragments of the riddle into a common and eloquent picture of the past, which reflects the state of the society on certain stages of its development. The text of the Qurʾān like any other phenomenon is a multifaceted object that should be studied from different points of view. As a result, this complex study will allow obtaining a three-dimensional image rather than a flat picture alone.

Keywords: Arabic, Islamic studies, linguistics, religion

Procedia PDF Downloads 221
972 Navigating Shadows: Examining a Moderation Mediation model of Punitive supervision, Innovative Work Behavior and Employee’s Knowledge Hiding

Authors: Sadia Anwara, Weng Qingxionga, Jahan Zeb Aslamb

Abstract:

Drawing on the Conservation of Resources Theory and Theory of Displaced Aggression, current research study aims to explore the impact of an emerging destructive leadership style i.e., Punitive Supervision on the Employees’ Innovative Work Behavior (IWB) and Employee’s Knowledge Hiding (EKH) within the hospitality sector of Pakistan. This paper further elaborates the underlying mechanism by introducing job security as the mediator and Perceived Organisational Support (POS) as the coping mechanism to manage the deteriorating effects of Punitive supervision on the IWS and EKH. Two wave data (N=267) was obtained from the frontline employees of the hospitality sector of Pakistan in order to test the hypothesized moderation mediation model. Study findings unveiled that, punitive supervision negatively affects employees' innovative work behavior (IWB) and increases employee’s knowledge hiding (EKH), with job insecurity serving as a significant mediator in these relationships. Specifically, punitive supervision increases employees' perceptions of job insecurity, decreasing their innovative work behaviors and increasing their tendencies to engage in knowledge hiding. From a managerial perspective, this research study suggests that managers must evaluate their behavior and leadership style to prevent the drastic effect of dark leadership on the employee’s IWB and EKH. In addition, organizations must strive to foster an organizational culture of trust and open communication to reduce job insecurity. Employees should receive sufficient training and development opportunities to reduce job insecurity, while clear performance expectations and constructive feedback should be encouraged to help them excel.

Keywords: punitive supervision, job insecurity, perceived organisational support, innovative work behavior, knowledge hiding

Procedia PDF Downloads 20
971 Category-Base Theory of the Optimum Signal Approximation Clarifying the Importance of Parallel Worlds in the Recognition of Human and Application to Secure Signal Communication with Feedback

Authors: Takuro Kida, Yuichi Kida

Abstract:

We show a base of the new trend of algorithm mathematically that treats a historical reason of continuous discrimination in the world as well as its solution by introducing new concepts of parallel world that includes an invisible set of errors as its companion. With respect to a matrix operator-filter bank that the matrix operator-analysis-filter bank H and the matrix operator-sampling-filter bank S are given, firstly, we introduce the detailed algorithm to derive the optimum matrix operator-synthesis-filter bank Z that minimizes all the worst-case measures of the matrix operator-error-signals E(ω) = F(ω) − Y(ω) between the matrix operator-input-signals F(ω) and the matrix operator-output signals Y(ω) of the matrix operator-filter bank at the same time. Further, feedback is introduced to the above approximation theory and it is indicated that introducing conversations with feedback does not superior automatically to the accumulation of existing knowledge of signal prediction. Secondly, the concept of category in the field of mathematics is applied to the above optimum signal approximation and is indicated that the category-based approximation theory is applied to the set-theoretic consideration of the recognition of humans. Based on this discussion, it is shown naturally why the narrow perception that tends to create isolation shows an apparent advantage in the short term and, often, why such narrow thinking becomes intimate with discriminatory action in a human group. Throughout these considerations, it is presented that, in order to abolish easy and intimate discriminatory behavior, it is important to create a parallel world of conception where we share the set of invisible error signals, including the words and the consciousness of both worlds.

Keywords: signal prediction, pseudo inverse matrix, artificial intelligence, conditional optimization

Procedia PDF Downloads 154
970 Prototype Development of ARM-7 Based Embedded Controller for Packaging Machine

Authors: Jeelka Ray

Abstract:

Survey of the papers revealed that there is no practical design available for packaging machine based on Embedded system, so the need arose for the development of the prototype model. In this paper, author has worked on the development of an ARM7 based Embedded Controller for controlling the sequence of packaging machine. The unit is made user friendly with TFT and Touch Screen implementing human machine interface (HMI). The different system components are briefly discussed, followed by a description of the overall design. The major functions which involve bag forming, sealing temperature control, fault detection, alarm, animated view on the home screen when the machine is working as per different parameters set makes the machine performance more successful. LPC2478 ARM 7 Embedded Microcontroller controls the coordination of individual control function modules. In back gone days, these machines were manufactured with mechanical fittings. Later on, the electronic system replaced them. With the help of ongoing technologies, these mechanical systems were controlled electronically using Microprocessors. These became the backbone of the system which became a cause for the updating technologies in which the control was handed over to the Microcontrollers with Servo drives for accurate positioning of the material. This helped to maintain the quality of the products. Including all, RS 485 MODBUS Communication technology is used for synchronizing AC Drive & Servo Drive. These all concepts are operated either manually or through a Graphical User Interface. Automatic tuning of heaters, sealers and their temperature is controlled using Proportional, Integral and Derivation loops. In the upcoming latest technological world, the practical implementation of the above mentioned concepts is really important to be in the user friendly environment. Real time model is implemented and tested on the actual machine and received fruitful results.

Keywords: packaging machine, embedded system, ARM 7, micro controller, HMI, TFT, touch screen, PID

Procedia PDF Downloads 274
969 Simulation-Based Learning in the Exercise Science Curriculum: Peer Role Play vs Professional Simulated Patient

Authors: Nathan Reeves

Abstract:

Aim: The aim of this study was to evaluate if there was an impact on student learning when peer role play was substituted for a professional actor in the role of simulated patient in a simulation-based scenario. Method: Third-year exercise science students enrolled in a field project course in 2015 (n=24), and 2016 (n=20) participated in a simulation-based case scenario designed to develop their client-centred exercise prescription skills. During the simulation, students were provided with feedback from the simulated patients. In 2015, three professional actors played the part of the simulated patient, and in 2016 one of the simulated patients was a student from another exercise science cohort (peer role play). The student learning experience, consistency in case fidelity and feedback provided by the simulated patients was evaluated using a 5-point Likert scale survey and collecting phenomenological data. Results: Improvements to student pre and post confidence remained constant between the 2015 and 2016 cohorts (1.04 and 0.85). The perceived usefulness and enjoyability also remained high across the two cohorts (4.96 and 4.71). The feedback provided by all three simulated patients in 2016 was seen to strongly support student learning experience (4.82), and was of a consistent level (4.47). Significance of the findings to allied health: Simulation-based education is rapidly expanding in the curricula across the allied health professions. The simulated patient methodology continues to receive support as a pedagogy to develop a range of clinical skills including communication, engagement and client-centeredness. Upskilling students to peer role play can be a reasonable alternative to engaging paid actors.

Keywords: exercise science, simulation-based learning, simulated patient, peer role play

Procedia PDF Downloads 291
968 Reimagining the Management of Telco Supply Chain with Blockchain

Authors: Jeaha Yang, Ahmed Khan, Donna L. Rodela, Mohammed A. Qaudeer

Abstract:

Traditional supply chain silos still exist today due to the difficulty of establishing trust between various partners and technological barriers across industries. Companies lose opportunities and revenue and inadvertently make poor business decisions resulting in further challenges. Blockchain technology can bring a new level of transparency through sharing information with a distributed ledger in a decentralized manner that creates a basis of trust for business. Blockchain is a loosely coupled, hub-style communication network in which trading partners can work indirectly with each other for simpler integration, but they work together through the orchestration of their supply chain operations under a coherent process that is developed jointly. A Blockchain increases efficiencies, lowers costs, and improves interoperability to strengthen and automate the supply chain management process while all partners share the risk. Blockchain ledger is built to track inventory lifecycle for supply chain transparency and keeps a journal of inventory movement for real-time reconciliation. State design patterns are used to capture the life cycle (behavior) of inventory management as a state machine for a common, transparent and coherent process which creates an opportunity for trading partners to become more responsive in terms of changes or improvements in process, reconcile discrepancies, and comply with internal governance and external regulations. It enables end-to-end, inter-company visibility at the unit level for more accurate demand planning with better insight into order fulfillment and replenishment.

Keywords: supply chain management, inventory trace-ability, perpetual inventory system, inventory lifecycle, blockchain, inventory consignment, supply chain transparency, digital thread, demand planning, hyper ledger fabric

Procedia PDF Downloads 89
967 Programmatic Actions of Social Welfare State in Service to Justice: Law, Society and the Third Sector

Authors: Bruno Valverde Chahaira, Matheus Jeronimo Low Lopes, Marta Beatriz Tanaka Ferdinandi

Abstract:

This paper proposes to dissect the meanings and / or directions of the State, in order, to present the State models to elaborate a conceptual framework about its function in the legal scope. To do so, it points out the possible contracts established between the State and the Society, since the general principles immanent in them can guide the models of society in force. From this orientation arise the contracts, whose purpose is by the effect to modify the status (the being and / or the opinion) of each of the subjects in presence - State and Society. In this logic, this paper announces the fiduciary contracts and “veredicção”(portuguese word) contracts, from the perspective of semiotics discourse (or greimasian). Therefore, studies focus on the issue of manifest language in unilateral and bilateral or reciprocal relations between the State and Society. Thus, under the biases of the model of the communicative situation and discourse, the guidelines of these contractual relations will be analyzed in order to see if there is a pragmatic sanction: positive when the contract is signed between the subjects (reward), or negative when the contract between they are broken (punishment). In this way, a third path emerges which, in this specific case, passes through the subject-third sector. In other words, the proposal, which is systemic in nature, is to analyze whether, since the contract of the welfare state is not carried out in the constitutional program on fundamental rights: education, health, housing, an others. Therefore, in the structure of the exchange demanded by the society according to its contractual obligations (others), the third way (Third Sector) advances in the empty space left by the State. In this line, it presents the modalities of action of the third sector in the social scope. Finally, the normative communication organization of these three subjects is sought in the pragmatic model of discourse, namely: State, Society and Third Sector, in an attempt to understand the constant dynamics in the Law and in the language of the relations established between them.

Keywords: access to justice, state, social rights, third sector

Procedia PDF Downloads 143
966 Data Mining Spatial: Unsupervised Classification of Geographic Data

Authors: Chahrazed Zouaoui

Abstract:

In recent years, the volume of geospatial information is increasing due to the evolution of communication technologies and information, this information is presented often by geographic information systems (GIS) and stored on of spatial databases (BDS). The classical data mining revealed a weakness in knowledge extraction at these enormous amounts of data due to the particularity of these spatial entities, which are characterized by the interdependence between them (1st law of geography). This gave rise to spatial data mining. Spatial data mining is a process of analyzing geographic data, which allows the extraction of knowledge and spatial relationships from geospatial data, including methods of this process we distinguish the monothematic and thematic, geo- Clustering is one of the main tasks of spatial data mining, which is registered in the part of the monothematic method. It includes geo-spatial entities similar in the same class and it affects more dissimilar to the different classes. In other words, maximize intra-class similarity and minimize inter similarity classes. Taking account of the particularity of geo-spatial data. Two approaches to geo-clustering exist, the dynamic processing of data involves applying algorithms designed for the direct treatment of spatial data, and the approach based on the spatial data pre-processing, which consists of applying clustering algorithms classic pre-processed data (by integration of spatial relationships). This approach (based on pre-treatment) is quite complex in different cases, so the search for approximate solutions involves the use of approximation algorithms, including the algorithms we are interested in dedicated approaches (clustering methods for partitioning and methods for density) and approaching bees (biomimetic approach), our study is proposed to design very significant to this problem, using different algorithms for automatically detecting geo-spatial neighborhood in order to implement the method of geo- clustering by pre-treatment, and the application of the bees algorithm to this problem for the first time in the field of geo-spatial.

Keywords: mining, GIS, geo-clustering, neighborhood

Procedia PDF Downloads 374
965 The Influence of Green Supply Chain Management Practices' Implementation on Organizational Performance: An Empirical Case Study in Spain

Authors: Keivan Amirbagheri, Ana Nuñez-Carballosa, Laura Guitart-Tarrés

Abstract:

Over the last couple of decades, enterprises have begun to accept the need for environmental management and have started to implement environmental management programs to compete in the markets. The implementation of green supply chain management (GSCM) practices can provide valuable opportunities to improve firm performance. Through the prior investigations, the ascending tendency of the numbers of published papers in the field of green supply chain management practices has been reported and it shows the high interest level of the authors to work in this area. Besides, there is still a gap to study more about the relationship of GSCM to the organizational performance (OP). So, the purpose of this research is to study the practices related to green supply chain management that influence the results of the company as an organizational performance. Based on our previous works, from one part we have collected these GSCM practices (planning, operational, and communication practices) and classified them through conducting some literature reviews to analyze their effects on the OP’s factors (balanced scorecard’s perspectives). To do so we design a case study methodology through semi-structured interviews and secondary data from some multinational well-known companies based in Spain. The cases have been selected with the criterion of trying to collect members of the entire supply chain to have a vision as global as possible. The results report the considerable influence of green supply chain management practices on the organizational performance of the companies of the study. In addition, they represent that the implementation of green supply chain management practices especially in a long-term perspective can be economically justified. From the point of view of the personal, they feel better about being a member of this type of company that has been structured on environmental issues. Also, for these companies, the image that has been created by the implementation of these practices helps them to facilitate their marketing program.

Keywords: green supply chain management, organizational performance, case study, Spain

Procedia PDF Downloads 189
964 Shifting to Electronic Operative Notes in Plastic surgery

Authors: Samar Mousa, Galini Mavromatidou, Rebecca Shirley

Abstract:

Surgeons carry out numerous operations in the busy burns and plastic surgery department daily. Writing an accurate operation note with all the essential information is crucial for communication not only within the plastics team but also to the multi-disciplinary team looking after the patient, including other specialties, nurses and GPs. The Royal college of surgeons of England, in its guidelines of good surgical practice, mentioned that the surgeon should ensure that there are clear (preferably typed) operative notes for every procedure. The notes should accompany the patient into recovery and to the ward and should give sufficient detail to enable continuity of care by another doctor. The notes should include the Date and time, Elective/emergency procedure, Names of the operating surgeon and assistant, Name of the theatre anesthetist, Operative procedure carried out, Incision, Operative diagnosis, Operative findings, Any problems/complications, Any extra procedure performed and the reason why it was performed, Details of tissue removed, added or altered, Identification of any prosthesis used, including the serial numbers of prostheses and other implanted materials, Details of closure technique, Anticipated blood loss, Antibiotic prophylaxis (where applicable), DVT prophylaxis (where applicable), Detailed postoperative care instructions and Signature. Fourteen random days were chosen in December 2021 to assess the accuracy of operative notes and post-operative care. A total of 163 operative notes were examined. The average completion rates in all domains were 85.4%. An electronic operative note template was designed to cover all domains mentioned in the Royal College of surgeons' good surgical practice. It is kept in the hospital drive for all surgeons to use.

Keywords: operative notes, plastic surgery, documentation, electronic

Procedia PDF Downloads 78
963 Selection of New Business in Brazilian Companies Incubators through Hierarchical Methodology

Authors: Izabel Cristina Zattar, Gilberto Passos Lima, Guilherme Schünemann de Oliveira

Abstract:

In Brazil, there are several institutions committed to the development of new businesses based on product innovation. Among them are business incubators, universities and science institutes. Business incubators can be defined as nurseries for new companies, which may be in the technology segment, discussed in this article. Business incubators provide services related to infrastructure, such as physical space and meeting rooms. Besides these services, incubators also offer assistance in the form of information and communication, access to finance, relationship networks and business monitoring and mentoring processes. Business incubators support not all technology companies. One of the business incubators tasks is to assess the nature and feasibility of new business proposals. To assist this goal, this paper proposes a methodology for evaluating new business using the Analytic Hierarchy Process (AHP). This paper presents the concepts used in the assessing methodology application for new business, concepts that have been tested with positive results in practice. This study counts on three main steps: first, a hierarchy was built, based on new business manuals used by the business incubators. These books and manuals relate business selection requirements, such as the innovation status and other technological aspects. Then, a questionnaire was generated, in order to guide incubator experts in the parity comparisons at all hierarchy levels. The weights of each requirement are calculated from information obtained from the questionnaire responses. Finally, the proposed method was applied to evaluate five new business proposals, which were applying to be part of a company incubator. The main result is the classification of these new businesses, which helped the incubator experts to decide what companies were more eligible to work with. This classification may also be helpful to the decision-making process of business incubators in future selection processes.

Keywords: Analytic Hierarchy Process (AHP), Brazilian companies incubators, technology companies, incubator

Procedia PDF Downloads 373
962 Forestalling Heritage: Photography inside the Narrative of Catastrophe

Authors: Claudia Pimentel, Nuno Resende, Maria Fatima Lambert

Abstract:

In the present time, catastrophe seems to be inevitable, and individuals are permanently overwhelmed with challenges that test one’s ability to cope with reality. Undoubtedly, photography surpassed the barrier of efficient communication in a world filled with omnifarious narratives. It wandered an outing shorter than words and younger than other sciences but became, nowadays, imperative in the context of several fields of knowledge, namely Heritage studies. Heritage and photography thus emerge as unapologetically related concepts, a fact that makes them equally relevant in today's society. Political, economic, social and humanitarian challenges alter the way in which the relationship with the past is managed and the way in which identities and ideas for the future are constructed. Ruins and destruction have become part of aesthetics discourse since the 18th century and are an area of interest when we discuss cultural heritage preservation. The image proves to be a unique way of revealing the event details when we refer to a catastrophic situation, whether it be anthropic, social or climatic. Like poetry, which has a challenging connection with silence, image is capable of creating spaces of sound and silence, and it is often these “pseudo-voids” that capture the attention of the spectator, of the one who sees/observes/contacts with the photography. The way we look at the catastrophe, how we describe it, and the images we keep in our memory will determine the record/capture/news of the event. We, thus, have a visual record, a document that will contribute to the creation of individual and collective identity, in a jigsaw puzzle of memories, pseudo memories and post memories. Based on photographic records in the Portuguese press, we intend to rethink the earthquake at Angra do Heroísmo – Azores in 1980, exploring the viewer´s perspective on the catastrophe’s iconography under the perspective of aesthetics and genealogy of the catastrophe.

Keywords: photography, aesthetics, catastrophe, Portugal

Procedia PDF Downloads 75
961 Research on Health Emergency Management Based on the Bibliometrics

Authors: Meng-Na Dai, Bao-Fang Wen, Gao-Pei Zhu, Chen-Xi Zhang, Jing Sun, Chang-Hai Tang, Zhi-Qiang Feng, Wen-Qiang Yin

Abstract:

Based on the analysis of literature in the health emergency management in China with recent 10 years, this paper discusses the Chinese current research hotspots, development trends and shortcomings in this field, and provides references for scholars to conduct follow-up research. CNKI(China National Knowledge Infrastructure), Weipu, and Wanfang were the databases of this literature. The key words during the database search were health, emergency, and management with the time from 2009 to 2018. The duplicate, non-academic, and unrelated documents were excluded. 901 articles were included in the literature review database. The main indicators of abstraction were, the number of articles published every year, authors, institutions, periodicals, etc. There are some research findings through the analysis of the literature. Overall, the number of literature in the health emergency management in China has shown a fluctuating downward trend in recent 10 years. Specifically, there is a lack of close cooperation between authors, which has not constituted the core team among them yet. Meanwhile, in this field, the number of high-level periodicals and quality literature is scarce. In addition, there are a lot of research hotspots, such as emergency management system, mechanism research, capacity evaluation index system research, plans and capacity-building research, etc. In the future, we should increase the scientific research funding of the health emergency management, encourage collaborative innovation among authors in multi-disciplinary fields, and create high-quality and high-impact journals in this field. The states should encourage scholars in this field to carry out more academic cooperation and communication with the whole world and improve the research in breadth and depth. Generally speaking, the research in health emergency management in China is still insufficient and needs to be improved.

Keywords: health emergency management, research situation, bibliometrics, literature

Procedia PDF Downloads 135
960 Performance Comparison of Droop Control Methods for Parallel Inverters in Microgrid

Authors: Ahmed Ismail, Mustafa Baysal

Abstract:

Although the energy source in the world is mainly based on fossil fuels today, there is a need for alternative energy generation systems, which are more economic and environmentally friendly, due to continuously increasing demand of electric energy and lacking power resources and networks. Distributed Energy Resources (DERs) such as fuel cells, wind and solar power have recently become widespread as alternative generation. In order to solve several problems that might be encountered when integrating DERs to power system, the microgrid concept has been proposed. A microgrid can operate both grid connected and island mode to benefit both utility and customers. For most distributed energy resources (DER) which are connected in parallel in LV-grid like micro-turbines, wind plants, fuel cells and PV cells electrical power is generated as a direct current (DC) and converted to an alternative currents (AC) by inverters. So the inverters are assumed to be primary components in a microgrid. There are many control techniques of parallel inverters to manage active and reactive sharing of the loads. Some of them are based on droop method. In literature, the studies are usually focused on improving the transient performance of inverters. In this study, the performance of two different controllers based on droop control method is compared for the inverters operated in parallel without any communication feedback. For this aim, a microgrid in which inverters are controlled by conventional droop controller and modified droop controller is designed. Modified controller is obtained by adding PID into conventional droop control. Active and reactive power sharing performance, voltage and frequency responses of those control methods are measured in several operational cases. Study cases have been simulated by MATLAB-SIMULINK.

Keywords: active and reactive power sharing, distributed generation, droop control, microgrid

Procedia PDF Downloads 592
959 Efficacy of the Use of Different Teaching Approaches of Math Teachers

Authors: Nilda San Miguel, Elymar Pascual

Abstract:

The main focus of this study is exploring the effective approaches in teaching Mathematics that is being applied in public schools, s.y. 2018-2019. This research was written as connected output to the district-wide School Learning Action Cell (DISLAC) on Math teaching approaches which was recently conducted in Victoria, Laguna. Fifty-four math teachers coming from 17 schools in Victoria became the respondents of this study. Qualitative method of doing research was applied. Teachers’ responses to the following concerns were gathered, analyzed and interpreted: (1) evaluation of the recently conducted DISLAC, (2) status of the use of different approaches, (3) perception on the effective use of approaches, (4) preference of approach to explore in classroom sessions, (5) factors affecting the choice of approach, (6) difficulties encountered, (7) and perceived benefit to learners. Results showed that the conduct of DISLAC was very highly satisfactory (mean 4.41). Teachers looked at collaborative approach as very highly effective (mean 4.74). Fifty-two percent of the teachers is using collaborative approach, 17% constructivist, 11% integrative, 11% inquiry-based, and 9% reflective. Reflective approach was chosen to be explored by most of the respondents (29%) in future sessions. The difficulties encountered by teachers in using the different approaches are: (1) learners’ difficulty in following instructions, (2) lack of focus, (3) lack of willingness and cooperation, (4) teachers’ lack of mastery in using different approaches, and (5) lack of time of doing visual aids because of time mismanagement. Teachers deemed the use of various teaching approaches can help the learners to have (1) mastery of competency, (2) increased communication, (3) improved confidence, (4) facility in comprehension, and (5) better academic output. The result obtained from this study can be used as an input for SLACs. Recommendations at the end of the study were given to school/district heads and future researchers.

Keywords: approaches, collaborative, constructivism, inquiry-based, integrative, reflective

Procedia PDF Downloads 277
958 A Machine Learning Approach for Detecting and Locating Hardware Trojans

Authors: Kaiwen Zheng, Wanting Zhou, Nan Tang, Lei Li, Yuanhang He

Abstract:

The integrated circuit industry has become a cornerstone of the information society, finding widespread application in areas such as industry, communication, medicine, and aerospace. However, with the increasing complexity of integrated circuits, Hardware Trojans (HTs) implanted by attackers have become a significant threat to their security. In this paper, we proposed a hardware trojan detection method for large-scale circuits. As HTs introduce physical characteristic changes such as structure, area, and power consumption as additional redundant circuits, we proposed a machine-learning-based hardware trojan detection method based on the physical characteristics of gate-level netlists. This method transforms the hardware trojan detection problem into a machine-learning binary classification problem based on physical characteristics, greatly improving detection speed. To address the problem of imbalanced data, where the number of pure circuit samples is far less than that of HTs circuit samples, we used the SMOTETomek algorithm to expand the dataset and further improve the performance of the classifier. We used three machine learning algorithms, K-Nearest Neighbors, Random Forest, and Support Vector Machine, to train and validate benchmark circuits on Trust-Hub, and all achieved good results. In our case studies based on AES encryption circuits provided by trust-hub, the test results showed the effectiveness of the proposed method. To further validate the method’s effectiveness for detecting variant HTs, we designed variant HTs using open-source HTs. The proposed method can guarantee robust detection accuracy in the millisecond level detection time for IC, and FPGA design flows and has good detection performance for library variant HTs.

Keywords: hardware trojans, physical properties, machine learning, hardware security

Procedia PDF Downloads 145
957 Exploring the Visual Representations of Neon Signs and Its Vernacular Tacit Knowledge of Neon Making

Authors: Brian Kwok

Abstract:

Hong Kong is well-known for its name as "the Pearl of the Orient", due to its spectacular night-view with vast amount of decorative neon lights on the streets. Neon signs are first used as the pervasive media of communication for all kinds of commercial advertising, ranging from movie theatres to nightclubs and department stores, and later appropriated by artists as medium of artwork. As a well-established visual language, it displays texts in bilingual format due to British's colonial influence, which are sometimes arranged in an opposite reading order. Research on neon signs as a visual representation is rare but significant because they are part of people’s collective memories of the unique cityscapes which associate the shifting values of people's daily lives and culture identity. Nevertheless, with the current policy to remove abandoned neon signs, their total number dramatically declines recently. The Buildings Department found an estimation of 120,000 unauthorized signboards (including neon signs) in Hong Kong in 2013, and the removal of such is at a rate of estimated 1,600 per year since 2006. In other words, the vernacular cultural values and historical continuity of neon signs will gradually be vanished if no immediate action is taken in documenting them for the purpose of research and cultural preservation. Therefore, the Hong Kong Neon Signs Archive project was established in June of 2015, and over 100 neon signs are photo-documented so far. By content analysis, this project will explore the two components of neon signs – the use of visual languages and vernacular tacit knowledge of neon makers. It attempts to answer these questions about Hong Kong's neon signs: 'What are the ways in which visual representations are used to produce our cityscapes and streetscapes?'; 'What are the visual languages and conventions of usage in different business types?'; 'What the intact knowledge are applied when producing these visual forms of neon signs?'

Keywords: cityscapes, neon signs, tacit knowledge, visual representation

Procedia PDF Downloads 301