Search results for: security methodology
4211 Implementation of Maqasid Syari'ah in the Concept of Reforming the Indonesian Marriage Law Based on Gender Equality: Study of the Counter Legal Draft Compilation of Islamic Law
Authors: Nirmalasanti Pramesi
Abstract:
In 2004 the CLD KHI Team offered several new ideas in the field of Islamic family law, such as marriage, inheritance (waris), and waqf. The new idea is based on six main principles; pluralism, nationality, human rights, democracy, maslahah, and gender equality. However, the existence of this has actually caused various criticisms, appreciations, and controversies. For this reason, CLD-KHI, as the idea of reforming family law, especially in the field of marriage, really needs to be studied academically with a comprehensive method as an unfinished problem. The main issues examined in this study are what are the ideas for reforming the law of marriage that have been formulated by the CLD KHI team, as well as how to implement Maqasid Sharia in legal reform. The methodology used in this research is a qualitative method with a normative-empirical-sociological approach. The results of this research show every substance of the idea considers aspects of locality, nationality, and global ethics. The Maqasid approach used in most of the legal provisions is moderate (wasati). Meanwhile, in matters of wali niqah and inheritance, it is adjusted to the context of Indonesian society.Keywords: Maqasid syari'ah, CLD KHI, marriage law reform, moderate
Procedia PDF Downloads 2004210 EFL Teacher Cognition and Learner Autonomy: An Exploratory Study into Algerian Teachers’ Understanding of Learner Autonomy
Authors: Linda Ghout
Abstract:
The main aim of the present case study was to explore EFL teachers’ understanding of learner autonomy. Thus, it sought to uncover how teachers at the de Department of English, University of Béjaia, Algeria view the process of language learning, their learners’ roles, their own roles and their practices to promote learner autonomy. For data collection, firstly, a questionnaire was designed and administered to all the teachers in the department. Secondly, interviews were conducted with some volunteers for the sake of clarifying emerging issues and digging deeper into some of the teachers’ answers to the questionnaire. The analysis revealed interesting data pertaining to the teachers’ cognition and its effects on their teaching practices. With regard to their views of language learning, it seems that the participants hold discrete views which are in opposition with the principles of learner autonomy. The teachers seemed to have a limited knowledge of the characteristics of autonomous learners and autonomy- based methodology. When it comes to teachers’ practices to promote autonomy in their classes, the majority reported that the most effective way is to ask students to search for information on their own. However, in defining their roles in the EFL learning process, most of the respondents claimed that teachers should play the role of facilitators.Keywords: English, learner autonomy, learning process, teacher cognition
Procedia PDF Downloads 3924209 Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking
Authors: Peter U. Eze, P. Udaya, Robin J. Evans
Abstract:
Data hiding can be achieved by Steganography or invisible digital watermarking. For digital watermarking, both accurate retrieval of the embedded watermark and the integrity of the cover image are important. Medical image security in Teleradiology is one of the applications where the embedded patient record needs to be extracted with accuracy as well as the medical image integrity verified. In this research paper, the Constant Correlation Spread Spectrum digital watermarking for medical image tamper detection and accurate embedded watermark retrieval is introduced. In the proposed method, a watermark bit from a patient record is spread in a medical image sub-block such that the correlation of all watermarked sub-blocks with a spreading code, W, would have a constant value, p. The constant correlation p, spreading code, W and the size of the sub-blocks constitute the secret key. Tamper detection is achieved by flagging any sub-block whose correlation value deviates by more than a small value, ℇ, from p. The major features of our new scheme include: (1) Improving watermark detection accuracy for high-pixel depth medical images by reducing the Bit Error Rate (BER) to Zero and (2) block-level tamper detection in a single computational process with simultaneous watermark detection, thereby increasing utility with the same computational cost.Keywords: Constant Correlation, Medical Image, Spread Spectrum, Tamper Detection, Watermarking
Procedia PDF Downloads 1994208 Group Boundaries against and Due to Identity Threat
Authors: Anna Siegler, Sara Bigazzi, Sara Serdult, Ildiko Bokretas
Abstract:
Social identity emerging from group membership defines the representational processes of our social reality. Based on our theoretical assumption the subjective perception of identity threat leads to an instable identity structure. The need to re-establish the positive identity will lead us to strengthen group boundaries. Prejudice in our perspective offer psychological security those who thinking in exclusive barriers, and we suggest that those who identify highly with their ingroup/national identity and less with superordinate identities take distance from others and this is related to their perception of threat. In our study we used a newly developed questionnaire, the Multiple Threat and Prejudice Questionnaire (MTPQ) which measure identity threat at different dimensions of identification (national, existential, gender, religious) and the distancing of different outgroups, over and above we worked with Social Dominance Orientation (SDO) and Identification with All Humanity Scale (IWAH). We conduct one data collection (N=1482) in a Hungarian sample to examine the connection between national threat and distance-taking, and this survey includes the investigation (N=218) of identification with different group categories. Our findings confirmed that those who feel themselves threatened in their national identity aspects are less likely to identify themselves with superordinate groups and this correlation is much stronger when they think about the nation as a bio-cultural unit, while if nation defined as a social-economy entity this connection is less powerful and has just the opposite direction.Keywords: group boundaries, identity threat, prejudice, superordinate groups
Procedia PDF Downloads 4174207 Using Data-Driven Model on Online Customer Journey
Authors: Ing-Jen Hung, Tzu-Chien Wang
Abstract:
Nowadays, customers can interact with firms through miscellaneous online ads on different channels easily. In other words, customer now has innumerable options and limitless time to accomplish their commercial activities with firms, individualizing their own online customer journey. This kind of convenience emphasizes the importance of online advertisement allocation on different channels. Therefore, profound understanding of customer behavior can make considerable benefit from optimizing fund allocation on diverse ad channels. To achieve this objective, multiple firms utilize numerical methodology to create data-driven advertisement policy. In our research, we aim to exploit online customer click data to discover the correlations between each channel and their sequential relations. We use LSTM to deal with sequential property of our data and compare its accuracy with other non-sequential methods, such as CART decision tree, logistic regression, etc. Besides, we also classify our customers into several groups by their behavioral characteristics to perceive the differences between all groups as customer portrait. As a result, we discover distinct customer journey under each customer portrait. Our article provides some insights into marketing research and can help firm to formulate online advertising criteria.Keywords: LSTM, customer journey, marketing, channel ads
Procedia PDF Downloads 1244206 Identification of a Novel Maize Dehydration-Responsive Gene with a Potential Role in Improving Maize Drought Tolerance
Authors: Kyle Phillips, Ndiko Ludidi
Abstract:
Global climate change has resulted in altered rainfall patterns, which has resulted in annual losses in maize crop yields due to drought. Therefore it is important to produce maize cultivars that are more drought-tolerant, which is not an easily accomplished task as plants have a plethora of physical and biochemical adaptation methods. One such mechanism is the drought-induced expression of enzymatic and non-enzymatic proteins which assist plants to resist the effects of drought on their growth and development. One of these proteins is AtRD22 which has been identified in Arabidopsis thaliana. Using an in silico approach, a maize protein with 48% sequence homology to AtRD22 has been identified. This protein appears to be localized in the extracellular matrix, similarly to AtRD22. Promoter analysis of the encoding gene reveals cis-acting elements suggestive of induction of the gene’s expression by abscisic acid (ABA). Semi-quantitative transcriptomic analysis of the putative maize RD22 has revealed an increase in transcript levels after the exposure to drought. Current work elucidates the effect of up-regulation and silencing of the maize RD22 gene on the tolerance of maize to drought. The potential role of the maize RD22 gene in maize drought tolerance can be used as a tool to improve food security.Keywords: abscisic acid, drought-responsive cis-acting elements, maize drought tolerance, RD22
Procedia PDF Downloads 4734205 Meeting India's Energy Demand: U.S.-India Energy Cooperation under Trump
Authors: Merieleen Engtipi
Abstract:
India's total share of global population is nearly 18%; however, its per capita energy consumption is only one-third of global average. The demand and supply of electricity are uneven in the country; around 240 million of the population have no access to electricity. However, with India's trajectory for modernisation and economic growth, the demand for energy is only expected to increase. India is at a crossroad, on the one hand facing the increasing demand for energy and on the other hand meeting the Paris climate policy commitments, and further the struggle to provide efficient energy. This paper analyses the policies to meet India’s need for energy, as the per capita energy consumption is likely to be double in 6-7 years period. Simultaneously, India's Paris commitment requires curbing of carbon emission from fossil fuels. There is an increasing need for renewables to be cheaply and efficiently available in the market and for clean technology to extract fossil fuels to meet climate policy goals. Fossil fuels are the most significant generator of energy in India; with the Paris agreement, the demand for clean energy technology is increasing. Finally, the U.S. decided to withdraw from the Paris Agreement; however, the two countries plan to continue engaging bilaterally on energy issues. The U.S. energy cooperation under Trump administration is significantly vital for greater energy security, transfer of technology and efficiency in energy supply and demand.Keywords: energy demand, energy cooperation, fossil fuels, technology transfer
Procedia PDF Downloads 2574204 Comprehensive Review of Adversarial Machine Learning in PDF Malware
Authors: Preston Nabors, Nasseh Tabrizi
Abstract:
Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion
Procedia PDF Downloads 444203 Religiosity and Social Factors on Alcohol Use among South African University Students
Authors: Godswill Nwabuisi Osuafor, Sonto Maria Maputle
Abstract:
Background: Abounding studies found that religiosity and social factors modulate alcohol use among university students. However, there is a scarcity of empirical studies examining the protective effects of religiosity and other social factors on alcohol use and abuse in South African universities. The aim of this study was therefore to assess the protective effects of religiosity and roles of social factors on alcohol use among university students. Methodology: A survey on the use of alcohol among 416 university students was conducted using structured questionnaire in 2014. Data were sourced on religiosity and contextual variables. Students were classified as practicing intrinsic religiosity or extrinsic religiosity based on the response to the measures of religiosity. Descriptive, chi square and binary logistic analyses were used in processing the data. Result: Results revealed that alcohol use was associated with religiosity, religion, sex, family history of alcohol use and experimenting with alcohol. Reporting alcohol abuse was significantly predicted by sex, family history of alcohol use and experimenting with alcohol. Religiosity mediated lower alcohol use whereas family history of alcohol use and experimenting with alcohol promoted alcohol use and abuse. Conclusion: Families, religious groups and societal factors may be the specific niches for intervention on alcohol use among university students.Keywords: religiosity, alcohol use, protective factors, university students
Procedia PDF Downloads 4044202 Complementary Child-Care by Grandparents: Comparisons of Zambia and the Netherlands
Authors: Francis Sichimba
Abstract:
Literature has increasingly acknowledged the important role that grandparents play in child care with evidence highlighting differences in grand-parental investment between countries and cultures. However, there are very few systematic cross cultural studies on grandparents’ participation in child care. Thus, we decided to conduct this study in Zambia and the Netherlands because the two countries differ rather drastically socially and culturally. The objective of this study was to investigate grand-parental involvement in child care in Zambia and the Netherlands. In line with the general objective, four hypotheses were formulated using nationality, family size, social economic status (SES), attachment security as independent variables. The study sample consisted of 411 undergraduate students from the University of Zambia and the University of Leiden. A questionnaire was used to measure grand-parental involvement in child care. Results indicated that grandparent involvement in child care was prevalent in both Zambia and Netherlands. However, as predicted it was found that Zambian grandparents (M = 9.69, SD=2.40) provided more care for their grandchildren compared to their Dutch counterparts (M = 7.80, SD=3.31) even after controlling for parents being alive. Using hierarchical logistic regression analysis the study revealed that nationality and attachment-related avoidance were significant predictors of grand-parental involvement in child care. It was concluded that grand-parental care is a great resource in offering complementary care in both countries.Keywords: attachment, care, grand-parenting involvement, social economic status
Procedia PDF Downloads 7214201 Construction Contractor Pre-Qualification Using Multi-Attribute Utility Theory: A Multiplicative Approach
Authors: B. Vikram, Y. Anu Leena, Y. Anu Neena, M. V. Krishna Rao, V. S. S. Kumar
Abstract:
The industry is often criticized for inefficiencies in outcomes such as time and cost overruns, low productivity, poor quality and inadequate customer satisfaction. To enhance the chances for construction projects to be successful, selecting an able contractor is one of the fundamental decisions to be made by clients. The selection of the most appropriate contractor is a multi-criteria decision making (MCDM) process. In this paper, multi-attribute utility theory (MAUT) is employed utilizing the multiplicative form of utility function for ranking the prequalified contractors. Performance assessment criteria covering contracting company attributes, experience record, past performance, performance potential, financial stability and project specific criteria are considered for contractor evaluation. A case study of multistoried building for which four contractors submitted bids is considered to illustrate the applicability of multiplicative approach of MAUT to rank the prequalified contractors. The proposed MAUT decision making methodology can also be employed to other decision making situations.Keywords: multi-attribute utility theory, construction industry, prequalification, contractor
Procedia PDF Downloads 4404200 An Analysis of Urban Institutional Arrangements and Their Implications on Wetlands Allocation for Development Purposes: A Case of Harare, Zimbabwe
Authors: Effort M. Magoso
Abstract:
This study analyses urban institutional arrangements and their implications on allocation of wetlands for development purposes in Zimbabwe using a case study of Harare. It was driven by the need to get to the root of the current urban assault on wetlands. The study sought to analyse institutions that influence wetlands governance in Harare, to ascertain level of wetlands loss and to determine the adequacy of the legal and regulatory framework for governing wetlands. Theories of common property resources and of institutions are the paradigms that undergird this study. A qualitative research methodology was employed, while in-depth interviews, observations and document review were used to gather data. The study found out that unchecked infrastructure developments are taking place in the city’s wetlands. Urban institutional arrangements in Harare were exposed as having negative implications on the protection of wetlands. It is the key argument of this study that good institutional arrangements are priceless in the protection of commons such as wetlands. This study also recommends a new framework that has environmentalists and technocrats as the final decision maker in land allocation as the solution to protect wetlands from undue anthropogenic activities.Keywords: institutional arrangements, common property resources, wetlands, institutions
Procedia PDF Downloads 3934199 The Mentoring in Professional Development of University Teachers
Authors: Nagore Guerra Bilbao, Clemente Lobato Fraile
Abstract:
Mentoring is provided by professionals with a higher level of experience and competence as part of the professional development of a university faculty. This paper explores the characteristics of the mentoring provided by those teachers participating in the development of an active methodology program run at the University of the Basque Country: to examine and to analyze mentors’ performance with the aim of providing empirical evidence regarding its value as a lifelong learning strategy for teaching staff. A total of 183 teachers were trained during the first three programs. The analysis method uses a coding technique and is based on flexible, systematic guidelines for gathering and analyzing qualitative data. The results have confirmed the conception of mentoring as a methodological innovation in higher education. In short, university teachers in general assessed the mentoring they received positively, considering it to be a valid, useful strategy in their professional development. They highlighted the methodological expertise of their mentor and underscored how they monitored the learning process of the active method and provided guidance and advice when necessary. Finally, they also drew attention to traits such as availability, personal commitment and flexibility in. However, a minority critique is pointed to some aspects of the performance of some mentors.Keywords: higher education, mentoring, professional development, university teachers
Procedia PDF Downloads 2454198 Mathematical Games with RPG and Sci-Fi Elements to Enhance Motivation
Authors: Santiago Moll Lopez, Erica Vega Fleitas, Dolors Rosello Ferragud, Luis Manuel Sanchez Ruiz, Jose Antonio Moraño Fernandez
Abstract:
Game-based learning (GBL) is becoming popular in education. Learning through games offers students a motivating experience related to the social aspect of games. Among the significant positive outcomes are promoting positive emotions and collaboration, improving the assimilation of concepts, and creating an attractive and dynamic environment standout. This work presents a study of the design and implementation of games created with RPG Maker MZ software with a Sci-Fi storytelling environment for developing specific and transversal skills in a Mathematics subject at the Beng in Aerospace Engineering. Games were applied during regular classes and as a part of a Flip-Teaching methodology to increase the motivation and the assimilation of mathematical concepts in an engaging way. The key features of the games were the introduction of avatar design and the promotion of collaboration among students. Students' opinions and grades obtained in the activities and exams showed increased motivation and a significant improvement in their performance compared with other groups or past students' performances.Keywords: game-based learning, rol games, mathematics, science fiction
Procedia PDF Downloads 994197 Cointegration Dynamics in Asian Stock Markets: Implications for Long-Term Portfolio Management
Authors: Xinyi Xu
Abstract:
This study conducts a detailed examination of Asian stock markets over the period from 2008 to 2023, with a focus on the dynamics of cointegration and their relevance for long-term investment strategies. Specifically, we assess the co-movement and potential for pairs trading—a strategy where investors take opposing positions on two stocks, indices, or financial instruments that historically move together. For example, we explore the relationship between the Nikkei 225 (N225), Japan’s benchmark stock index, and the Straits Times Index (STI) of Singapore, as well as the relationship between the Korea Composite Stock Price Index (KS11) and the STI. The methodology includes tests for normality, stationarity, cointegration, and the application of Vector Error Correction Modeling (VECM). Our findings reveal significant long-term relationships between these pairs, indicating opportunities for pairs trading strategies. Furthermore, the research underscores the challenges posed by model instability and the influence of major global incidents, which are identified as structural breaks. These findings pave the way for further exploration into the intricacies of financial market dynamics.Keywords: normality tests, stationarity, cointegration, VECM, pairs trading
Procedia PDF Downloads 594196 Supporting 'vulnerable' Students to Complete Their Studies During the Economic Crisis in Greece: The Umbrella Program of International Hellenic University
Authors: Rigas Kotsakis, Nikolaos Tsigilis, Vasilis Grammatikopoulos, Evridiki Zachopoulou
Abstract:
During the last decade, Greece has faced an unprecedented financial crisis, affecting various aspects and functionalities of Higher Education. Besides the restricted funding of academic institutions, the students and their families encountered economical difficulties that undoubtedly influenced the effective completion of their studies. In this context, a fairly large number of students in Alexander campus of International Hellenic University (IHU) delay, interrupt, or even abandon their studies, especially when they come from low-income families, belong to sensitive social or special needs groups, they have different cultural origins, etc. For this reason, a European project, named “Umbrella”, was initiated aiming at providing the necessary psychological support and counseling, especially to disadvantaged students, towards the completion of their studies. To this end, a network of various academic members (academic staff and students) from IHU, namely iMentor, were implicated in different roles. Specifically, experienced academic staff trained students to serve as intermediate links for the integration and educational support of students that fall into the aforementioned sensitive social groups and face problems for the completion of their studies. The main idea of the project is held upon its person-centered character, which facilitates direct student-to-student communication without the intervention of the teaching staff. The backbone of the iMentors network are senior students that face no problem in their academic life and volunteered for this project. It should be noted that there is a provision from the Umbrella structure for substantial and ethical rewards for their engagement. In this context, a well-defined, stringent methodology was implemented for the evaluation of the extent of the problem in IHU and the detection of the profile of the “candidate” disadvantaged students. The first phase included two steps, (a) data collection and (b) data cleansing/ preprocessing. The first step involved the data collection process from the Secretary Services of all Schools in IHU, from 1980 to 2019, which resulted in 96.418 records. The data set included the School name, the semester of studies, a student enrolling criteria, the nationality, the graduation year or the current, up-to-date academic state (still studying, delayed, dropped off, etc.). The second step of the employed methodology involved the data cleansing/preprocessing because of the existence of “noisy” data, missing and erroneous values, etc. Furthermore, several assumptions and grouping actions were imposed to achieve data homogeneity and an easy-to-interpret subsequent statistical analysis. Specifically, the duration of 40 years recording was limited to the last 15 years (2004-2019). In 2004 the Greek Technological Institutions were evolved into Higher Education Universities, leading into a stable and unified frame of graduate studies. In addition, the data concerning active students were excluded from the analysis since the initial processing effort was focused on the detection of factors/variables that differentiated graduate and deleted students. The final working dataset included 21.432 records with only two categories of students, those that have a degree and those who abandoned their studies. Findings of the first phase are presented across faculties and further discussed.Keywords: higher education, students support, economic crisis, mentoring
Procedia PDF Downloads 1194195 Vision-Based Collision Avoidance for Unmanned Aerial Vehicles by Recurrent Neural Networks
Authors: Yao-Hong Tsai
Abstract:
Due to the sensor technology, video surveillance has become the main way for security control in every big city in the world. Surveillance is usually used by governments for intelligence gathering, the prevention of crime, the protection of a process, person, group or object, or the investigation of crime. Many surveillance systems based on computer vision technology have been developed in recent years. Moving target tracking is the most common task for Unmanned Aerial Vehicle (UAV) to find and track objects of interest in mobile aerial surveillance for civilian applications. The paper is focused on vision-based collision avoidance for UAVs by recurrent neural networks. First, images from cameras on UAV were fused based on deep convolutional neural network. Then, a recurrent neural network was constructed to obtain high-level image features for object tracking and extracting low-level image features for noise reducing. The system distributed the calculation of the whole system to local and cloud platform to efficiently perform object detection, tracking and collision avoidance based on multiple UAVs. The experiments on several challenging datasets showed that the proposed algorithm outperforms the state-of-the-art methods.Keywords: unmanned aerial vehicle, object tracking, deep learning, collision avoidance
Procedia PDF Downloads 1684194 Dynamic Model Conception of Improving Services Quality in Railway Transport
Authors: Eva Nedeliakova, Jaroslav Masek, Juraj Camaj
Abstract:
This article describes the results of research focused on quality of railway freight transport services. Improvement of these services has a crucial importance in customer considering on the future use of railway transport. Processes filling the customer demands and output quality assessment were defined as a part of the research. In this, contribution is introduced the map of quality planning and the algorithm of applied methodology. It characterises a model which takes into account characters of transportation with linking a perception services quality in ordinary and extraordinary operation. Despite the fact that rail freight transport has its solid position in the transport market, lots of carriers worldwide have been experiencing a stagnation for a couple of years. Therefore, specific results of the research have a significant importance and belong to numerous initiatives aimed to develop and support railway transport not only by creating a single railway area or reducing noise but also by promoting railway services. This contribution is focused also on the application of dynamic quality models which represent an innovative method of evaluation quality services. Through this conception, time factor, expected and perceived quality in each moment of the transportation process can be taken into account.Keywords: quality, railway, transport, service
Procedia PDF Downloads 4514193 The Study of the Quality of Dissertation in Humanities and Social Sciences between 2007-2013 in Thai Private Universities
Authors: Thanyasinee Laosum, Sirichai Kanjanawasee, Taweewat Pitayanon
Abstract:
The purpose of this study was to investigate the quality of dissertation in humanities and social sciences in Thai private universities.Seven hundred and fifty dissertations of students graduating between 2007-2013 from 12 private universities were randomly sampled. The 5-point rating scale for the evaluation of the dissertations was developed. The rubric method was used in scoring. The overall content validity of the scale was .92. The individual content validities of the scale were ranged from .71 to 1.00. The concurrent validities were significant at the .01 level with the value from .849 to .959. The inter-rater reliabilities were significant related at the .01 level with the value from .810 to .959. The test-retest method was used to find the reliabilities and significant related at the .01 level with the value from .944 to .966. The descriptive statistics was used in the analysis of the collected data. The study found that, among 750 dissertations, those that were rated as excellent, above average, average standard, below standard, and need to be improved were, 0.1 %, 13.3 %, 74.7 %, 11.7 %, and 0.1 % respectively. It was, therefore, concluded that the overall quality of the dissertations was in accordance with the principle of the research methodology and the quality of the majority of the dissertations is closely related.Keywords: quality of dissertation, quality of dissertation in humanities and social sciences, private university, reliability
Procedia PDF Downloads 5164192 Internal Assessment of Satisfaction with the Quality of the Learning Process
Authors: Bulatbayeva A. A., Maxutova I. O., Ergalieva A. N.
Abstract:
This article presents a study of the practice of self-assessment of the quality of training cadets in a military higher specialized educational institution. The research was carried out by means of a questionnaire survey aimed at identifying the degree of satisfaction of cadets with the organization of the educational process, quality of teaching, the quality of the organization of independent work, and the system of their assessment. In general, the results of the study are of an intermediate nature. Proven tools will be incorporated into the planning and effective management of the learning process. The results of the study can be useful for the administrators and managers of the military education system for teachers of military higher educational institutions for adjusting the content and technologies of training future specialists. The publication was prepared as part of applied grant research for 2020-2022 by order of the Ministry of Education and Science of the Republic of Kazakhstan on the topic "Development of a comprehensive methodology for assessing the quality of education of graduates of military special educational institutions."Keywords: teaching quality, quality satisfaction, learning management, quality management, process approach, classroom learning, interactive technologies, teaching quality
Procedia PDF Downloads 1294191 Quality Assurance in Cardiac Disorder Detection Images
Authors: Anam Naveed, Asma Andleeb, Mehreen Sirshar
Abstract:
In the article, Image processing techniques have been applied on cardiac images for enhancing the image quality. Two types of methodologies considers for survey, invasive techniques and non-invasive techniques. Different image processes for improvement of cardiac image quality and reduce the amount of radiation exposure for invasive techniques are explored. Different image processing algorithms for enhancing the noninvasive cardiac image qualities are described. Beside these two methodologies, third methodology has applied on live streaming of heart rate on ECG window for extracting necessary information, removing noise and enhancing quality. Sensitivity analyses have been carried out to investigate the impacts of cardiac images for diagnosis of cardiac arteries disease and how the enhancement on images will help the cardiologist to diagnoses disease. The paper evaluates strengths and weaknesses of different techniques applied for improved the image quality and draw a conclusion. Some specific limitations must be considered for whole survey, like the patient heart beat must be 70-75 beats/minute while doing the angiography, similarly patient weight and exposure radiation amount has some limitation.Keywords: cardiac images, CT angiography, critical analysis, exposure radiation, invasive techniques, invasive techniques, non-invasive techniques
Procedia PDF Downloads 3534190 Verification of Space System Dynamics Using the MATLAB Identification Toolbox in Space Qualification Test
Authors: Yuri V. Kim
Abstract:
This article presents a new approach to the Functional Testing of Space Systems (SS). It can be considered as a generic test and used for a wide class of SS that from the point of view of System Dynamics and Control may be described by the ordinary differential equations. Suggested methodology is based on using semi-natural experiment- laboratory stand that doesn’t require complicated, precise and expensive technological control-verification equipment. However, it allows for testing system as a whole totally assembled unit during Assembling, Integration and Testing (AIT) activities, involving system hardware (HW) and software (SW). The test physically activates system input (sensors) and output (actuators) and requires recording their outputs in real time. The data is then inserted in laboratory PC where it is post-experiment processed by Matlab/Simulink Identification Toolbox. It allows for estimating system dynamics in form of estimation of system differential equations by the experimental way and comparing them with expected mathematical model prematurely verified by mathematical simulation during the design process.Keywords: system dynamics, space system ground tests and space qualification, system dynamics identification, satellite attitude control, assembling, integration and testing
Procedia PDF Downloads 1654189 Impoliteness Principle in Online Chatroom Discourses
Authors: Christiana Darkoah
Abstract:
This study investigated impolite behaviour in online chatroom conversations, looking at its expressions, origins, online chatroom participant responses, impacts, and possible interventions. Online impoliteness has become a major worry as technology improvements move public conversation online, causing communication breakdowns and escalating conflict. The study used a qualitative methodology, including observation and thematic analysis to examine interactions from Facebook, Instagram, and WhatsApp. The findings showed that in online chatrooms, face-threatening behaviours and disputes can be sparked by political remarks, conversational humour, picture interpretations, and personal disclosures. Depending on the situation, the interpreter's job, and the accepted standards, the same statement could be interpreted as disrespectful or courteous. Impolite behaviour in online chatrooms and the possibility of misinterpretation are evident in the furious reactions that can arise from seemingly harmless posts. According to the study's findings, impoliteness is common in online chat rooms, where disputes over politics and personal grievances frequently turn into written attacks. Creating unambiguous community norms in partnership with social media businesses and putting digital literacy campaigns into action are among the recommendations.Keywords: impoliteness, online chatroom, discourses, conflicts
Procedia PDF Downloads 304188 A Process to Support Multidisciplinary Teams to Design Serious Games
Authors: Naza Djafarova, Tony Bates, Margaret Verkuyl, Leonora Zefi, Ozgur Turetken, Alex Ferworn, Mastrilli Paula, Daria Romaniuk, Kosha Bramesfeld, Anastasia Dimitriadou, Cheryl To
Abstract:
Designing serious games for education is a challenging and resource-intensive effort. If a well-designed process that balances pedagogical principles with game mechanics is in place, it can help to simplify the design process of serious games and increase efficiency. Multidisciplinary teams involved in designing serious games can benefit tremendously from such a process in their endeavours to develop and implement these games at undergraduate and graduate levels. This paper presentation will outline research results on identified gaps within existing processes and frameworks and present an adapted process that emerged from the research. The research methodology was based on a survey, semi-structured interviews and workshops for testing the adapted process for game design. Based on the findings, the authors propose a simple process for the pre-production stage of serious game design that may help guide multidisciplinary teams in their work. This process was used to facilitate team brainstorming, and is currently being tested to assess if multidisciplinary teams find value in using it in their process of designing serious games.Keywords: serious game-design, multidisciplinary team, game design framework, learning games, multidisciplinary game design process
Procedia PDF Downloads 4354187 Nurse Schedule Problem in Mubarak Al Kabeer Hospital
Authors: Khaled Al-Mansour, Nawaf Esmael, Abdulaziz Al-Zaid, Mohammed Al Ateeqi, Ali Al-Yousfi, Sayed Al-Zalzalah
Abstract:
In this project we will create the new schedule of nurse according to the preference of them. We did our project in Mubarak Al Kabeer Hospital (in Kuwait). The project aims to optimize the schedule of nurses in Mubarak Al Kabeer Hospital. The schedule of the nurses was studied and understood well to do any modification for their schedule to make the nurses feel as much comfort as they are. First constraints were found to know what things we can change and what things we can’t, the hard constraints are the hospital and ministry policies where we can’t change anything about, and the soft constraints are things that make nurses more comfortable. Data were collected and nurses were interviewed to know what is more better for them. All these constraints and date have been formulated to mathematical equations. This report will first contain an introduction to the topic which includes details of the problem definition. It will also contain information regarding the optimization of a nurse schedule and its contents and importance; furthermore, the report will contain information about the data needed to solve the problem and how it was collected. The problem requires formulation and that is also to be shown. The methodology will be explained which will state what has already been done. We used the lingo software to find the best schedule for the nurse. The schedule has been made according to what the nurses prefer, and also took consideration of the hospital policy when we make the schedule.Keywords: nurse schedule problem, Kuwait, hospital policy, optimization of schedules
Procedia PDF Downloads 2724186 Bringing Design Science Research Methodology into Real World Applications
Authors: Maya Jaber
Abstract:
In today's ever-changing world, organizational leaders will need to transform their organizations to meet the demands they face from employees, consumers, local and federal governments, and the global market. Change agents and leaders will need a new paradigm of thinking for creative problem solving and innovation in a time of uncertainty. A new framework that is developed from Design Science Research foundations with holistic design thinking methodologies (HTDM) and action research approaches has been developed through Dr. Jaber’s research. It combines these philosophies into a three-step process that can be utilized in practice for any sustainability, change, or project management applications. This framework was developed to assist in the pedagogy for the implementation of her holistic strategy formalized framework Integral Design Thinking (IDT). Her work focuses on real world application for the streamlining and adoption of initiatives into organizational culture transformation. This paper will discuss the foundations of this philosophy and the methods for utilization in practice developed in Dr. Jaber's research.Keywords: design science research, action research, critical thinking, design thinking, organizational transformation, sustainability management, organizational culture change
Procedia PDF Downloads 1844185 Exploring Visual Methodologies for Measuring Public Perception of Sex Offenders
Authors: Sasha Goodwin
Abstract:
Sex offenders are often viewed as a homogenous group, but they encompass a diverse range of individuals with varying characteristics and offenses. The principal aim of this study was to ascertain how members of the Australian public perceive and define a sex offender while also investigating the emotional underpinnings associated with these attitudes and definitions. To assess public attitude, this study used the innovative utilization of visual methodologies to assess the public's perception of sex offenders. The study employed the iSquare approach, a visual methodology framework that offers unique viewpoints and insights into public attitudes toward sex offenders. Through the utilization of this approach, this study established an academic foundation for a deeper understanding of the public's perception of sex offenders. The data analysis revealed that most participants associated sex offenders with strong negative emotions, primarily disgust and anger. The findings of this research point towards the potential for fostering a social environment characterized by evidence-based discussions instead of reactionary punitive responses. Promoting a comprehensive understanding of the diverse nature of sexual offenders aims to broaden perceptions, fostering constructive attitudes.Keywords: visual methodologies, public perception, sex offenders, offender characteristics, emotional attitudes, isquare approach, attitudes
Procedia PDF Downloads 704184 Spatial Disparity in Education and Medical Facilities: A Case Study of Barddhaman District, West Bengal, India
Authors: Amit Bhattacharyya
Abstract:
The economic scenario of any region does not show the real picture for the measurement of overall development. Therefore, economic development must be accompanied by social development to be able to make an assessment to measure the level of development. The spatial variation with respect to social development has been discussed taking into account the quality of functioning of a social system in a specific area. In this paper, an attempt has been made to study the spatial distribution of social infrastructural facilities and analyze the magnitude of regional disparities at inter- block level in Barddhman district. It starts with the detailed account of the selection process of social infrastructure indicators and describes the methodology employed in the empirical analysis. Analyzing the block level data, this paper tries to identify the disparity among the blocks in the levels of social development. The results have been subsequently explained using both statistical analysis and geo spatial technique. The paper reveals that the social development is not going on at the same rate in every part of the district. Health facilities and educational facilities are concentrated at some selected point. So overall development activities come to be concentrated in a few centres and the disparity is seen over the blocks.Keywords: disparity, inter-block, social development, spatial variation
Procedia PDF Downloads 1714183 Effect of Interest-Based Debt Financing Upon Sustainable Development of Residents of Pakistan
Authors: Gul Ghutai, Nouman Khan Kakar
Abstract:
Interest-Based Debt Disturbs The Financial, Social And Economic Structure Of The Country, Due To Which Sustainable Development Of The Masses Is Undermined. Such As, In Pakistan, The State’s Reliance Upon Interest-Based Debt (Both Foreign And National Levels) Affects The Socio-Economic Fabrication Of The Country, Thus Undermining The Sustainable Development Of Its Residents. The Objective Of The Study Is To Analyze The Effect Of Interest-Based Debt Financing On The Well-Being Of The Masses In Pakistan. The Question Arises Whether Interest-Based Debt Financing Undermines The Sustainable Development Of The Masses Of Pakistan Or Not. Moreover, Qualitative Research Methodology Is Pursued Towards Building A Conceptual Framework By Applying An Inductive Paradigm. It Is Expected That Interest-Based Debt, Whether Acquired From Foreign Or National Institutions By The Government Of Pakistan, Undermines The Sustainable Economic Growth Of The Country. However, The State Of Pakistan Is Under A Constitutional Obligation To Attain Sustainable Development Of Its Residents In Compliance With Islamic Shariah So That Eradication Of Interest From The Economy Of Pakistan Can Be Witnessed So That The Residents Of Pakistan Can Be Served To Attain Socio-Economic Well-Being Both Tangibly And Intangibly.Keywords: socio-economic wellbeing, residents, sustainable development, interest-based debt
Procedia PDF Downloads 1324182 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'
Authors: Larry Lai, Evans Leung
Abstract:
Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China
Procedia PDF Downloads 149