Search results for: computer mediated power point presentations
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13328

Search results for: computer mediated power point presentations

9368 Students' Perception of Virtual Learning Environment (VLE) Skills in Setting up the Simulator Welding Technology

Authors: Mohd Afif Md Nasir, Faizal Amin Nur Yunus, Jamaluddin Hashim, Abd Samad Hassan Basari, A. Halim Sahelan

Abstract:

The aim of this study is to identify the suitability of Virtual Learning Environment (VLE) in welding simulator application towards Computer-Based Training (CBT) in developing skills upon new students at the Advanced Technology Training Center (ADTEC), Batu Pahat, Johor, Malaysia and GIATMARA, Batu Pahat, Johor, Malaysia. The purpose of the study is to create a computer-based skills development approach in welding technology among new students in ADTEC and GIATMARA, as well as cultivating the elements of general skills among them. This study is also important in elevating the number of individual knowledge workers (K-workers) working in manufacturing industry in order to achieve a national vision which is to be an industrial nation in the year of 2020. The design of the study is a survey type of research which uses questionnaires as the instruments and 136 students from ADTEC and GIATMARA were interviewed. Descriptive analysis is used to identify the frequency and mean values. The findings of the study shows that the welding technology skills have developed in the students as a result of the application of VLE simulator at a high level and the respondents agreed that the skills could be embedded through the application of the VLE simulator. In summary, the VLE simulator is suitable in welding skills development training in terms of exposing new students with the relevant characteristics of welding skills and at the same time spurring the students’ interest towards learning more about the skills.

Keywords: computer-based training (CBT), knowledge workers (K-workers), virtual learning environment, welding simulator, welding technology

Procedia PDF Downloads 337
9367 Social Technology and Youth Justice: An Exploration of Ethical and Practical Challenges

Authors: Ravinder Barn, Balbir Barn

Abstract:

This paper outlines ethical and practical challenges in the building of social technology for use with socially excluded and marginalised groups. The primary aim of this study was to design, deploy and evaluate social technology that may help to promote better engagement between case workers and young people to help prevent recidivism, and support young people’s transition towards social inclusion in society. A total of 107 practitioners/managers (n=64), and young people (n=43) contributed to the data collection via surveys, focus groups and 1-1 interviews. Through a process of co-design where end-users are involved as key contributors to social technological design, this paper seeks to make an important contribution to the area of participatory methodologies by arguing that whilst giving ‘voice’ to key stakeholders in the research process is crucial, there is a risk that competing voices may lead to tensions and unintended outcomes. The paper is contextualized within a Foucauldian perspective to examine significant concepts including power, authority and surveillance. Implications for youth justice policy and practice are considered. The authors conclude that marginalized youth and over-stretched practitioners are better served when such social technology is perceived and adopted as a tool of empowerment within a framework of child welfare and child rights.

Keywords: youth justice, social technology, marginalization, participatory research, power

Procedia PDF Downloads 440
9366 Experimental and Numerical Performance Analysis for Steam Jet Ejectors

Authors: Abdellah Hanafi, G. M. Mostafa, Mohamed Mortada, Ahmed Hamed

Abstract:

The steam ejectors are the heart of most of the desalination systems that employ vacuum. The systems that employ low grade thermal energy sources like solar energy and geothermal energy use the ejector to drive the system instead of high grade electric energy. The jet-ejector is used to create vacuum employing the flow of steam or air and using the severe pressure drop at the outlet of the main nozzle. The present work involves developing a one dimensional mathematical model for designing jet-ejectors and transform it into computer code using Engineering Equation solver (EES) software. The model receives the required operating conditions at the inlets and outlet of the ejector as inputs and produces the corresponding dimensions required to reach these conditions. The one-dimensional model has been validated using an existed model working on Abu-Qir power station. A prototype has been designed according to the one-dimensional model and attached to a special test bench to be tested before using it in the solar desalination pilot plant. The tested ejector will be responsible for the startup evacuation of the system and adjusting the vacuum of the evaporating effects. The tested prototype has shown a good agreement with the results of the code. In addition a numerical analysis has been applied on one of the designed geometry to give an image of the pressure and velocity distribution inside the ejector from a side, and from other side, to show the difference in results between the two-dimensional ideal gas model and real prototype. The commercial edition of ANSYS Fluent v.14 software is used to solve the two-dimensional axisymmetric case.

Keywords: solar energy, jet ejector, vacuum, evaporating effects

Procedia PDF Downloads 602
9365 Voting Representation in Social Networks Using Rough Set Techniques

Authors: Yasser F. Hassan

Abstract:

Social networking involves use of an online platform or website that enables people to communicate, usually for a social purpose, through a variety of services, most of which are web-based and offer opportunities for people to interact over the internet, e.g. via e-mail and ‘instant messaging’, by analyzing the voting behavior and ratings of judges in a popular comments in social networks. While most of the party literature omits the electorate, this paper presents a model where elites and parties are emergent consequences of the behavior and preferences of voters. The research in artificial intelligence and psychology has provided powerful illustrations of the way in which the emergence of intelligent behavior depends on the development of representational structure. As opposed to the classical voting system (one person – one decision – one vote) a new voting system is designed where agents with opposed preferences are endowed with a given number of votes to freely distribute them among some issues. The paper uses ideas from machine learning, artificial intelligence and soft computing to provide a model of the development of voting system response in a simulated agent. The modeled development process involves (simulated) processes of evolution, learning and representation development. The main value of the model is that it provides an illustration of how simple learning processes may lead to the formation of structure. We employ agent-based computer simulation to demonstrate the formation and interaction of coalitions that arise from individual voter preferences. We are interested in coordinating the local behavior of individual agents to provide an appropriate system-level behavior.

Keywords: voting system, rough sets, multi-agent, social networks, emergence, power indices

Procedia PDF Downloads 382
9364 Bioinformatics Approach to Support Genetic Research in Autism in Mali

Authors: M. Kouyate, M. Sangare, S. Samake, S. Keita, H. G. Kim, D. H. Geschwind

Abstract:

Background & Objectives: Human genetic studies can be expensive, even unaffordable, in developing countries, partly due to the sequencing costs. Our aim is to pilot the use of bioinformatics tools to guide scientifically valid, locally relevant, and economically sound autism genetic research in Mali. Methods: The following databases, NCBI, HGMD, and LSDB, were used to identify hot point mutations. Phenotype, transmission pattern, theoretical protein expression in the brain, the impact of the mutation on the 3D structure of the protein) were used to prioritize selected autism genes. We used the protein database, Modeller, and clustal W. Results: We found Mef2c (Gly27Ala/Leu38Gln), Pten (Thr131IIle), Prodh (Leu289Met), Nme1 (Ser120Gly), and Dhcr7 (Pro227Thr/Glu224Lys). These mutations were associated with endonucleases BseRI, NspI, PfrJS2IV, BspGI, BsaBI, and SpoDI, respectively. Gly27Ala/Leu38Gln mutations impacted the 3D structure of the Mef2c protein. Mef2c protein sequences across species showed a high percentage of similarity with a highly conserved MADS domain. Discussion: Mef2c, Pten, Prodh, Nme1, and Dhcr 7 gene mutation frequencies in the Malian population will be very informative. PCR coupled with restriction enzyme digestion can be used to screen the targeted gene mutations. Sanger sequencing will be used for confirmation only. This will cut down considerably the sequencing cost for gene-to-gene mutation screening. The knowledge of the 3D structure and potential impact of the mutations on Mef2c protein informed the protein family and altered function (ex. Leu38Gln). Conclusion & Future Work: Bio-informatics will positively impact autism research in Mali. Our approach can be applied to another neuropsychiatric disorder.

Keywords: bioinformatics, endonucleases, autism, Sanger sequencing, point mutations

Procedia PDF Downloads 66
9363 Physiological and Psychological Influence on Office Workers during Demand Response

Authors: Megumi Nishida, Naoya Motegi, Takurou Kikuchi, Tomoko Tokumura

Abstract:

In recent years, power system has been changed and flexible power pricing system such as demand response has been sought in Japan. The demand response system is simple in the household sector and the owner, decision-maker, can gain the benefits of power saving. On the other hand, the execution of the demand response in the office building is more complex than household because various people such as owners, building administrators and occupants are involved in making decisions. While the owners benefit from the demand saving, the occupants are forced to be exposed to demand-saved environment certain benefits. One of the reasons is that building systems are usually centralized control and each occupant cannot choose either participate demand response event or not, and contribution of each occupant to demand response is unclear to provide incentives. However, the recent development of IT and building systems enables the personalized control of office environment where each occupant can control the lighting level or temperature around him or herself. Therefore, it can be possible to have a system which each occupant can make a decision of demand response participation in office building. This study investigates the personal behavior upon demand response requests, under the condition where each occupant can adjust their brightness individually in their workspace. Once workers participate in the demand response, their task lights are automatically turned off. The participation rates in the demand response events are compared between four groups which are divided by different motivation, the presence or absence of incentives and the way of participation. The result shows that there are the significant differences of participation rates in demand response event between four groups. The way of participation has a large effect on the participation rate. ‘Opt-out’ group, where the occupants are automatically enrolled in a demand response event if they don't express non-participation, will have the highest participation rate in the four groups. The incentive has also an effect on the participation rate. This study also reports that the impact of low illumination office environment on the occupants, such as stress or fatigue. The electrocardiogram and the questionnaire are used to investigate the autonomic nervous activity and subjective symptoms about the fatigue of the occupants. There is no big difference between dim workspace during demand response event and bright workspace in autonomic nervous activity and fatigue.

Keywords: demand response, illumination, questionnaire, electrocardiogram

Procedia PDF Downloads 339
9362 Phyto-Assisted Synthesis of Magnesium Oxide Nanoparticles: Characterization and Applications

Authors: Surendra Kumar Gautam, Mahesh Dhungana

Abstract:

Magnesium oxide nanoparticles (MgO NPs) are less toxic to humans and the environment as compared to other metal oxide nanoparticles. Various conventional chemical and physical methods are used for synthesis whose toxicity level is high and highly expensive. As the best alternative, phyto-assisted synthesis has emerged, which uses extracts from plant parts for the synthesis of nanoparticles. Here, we report the synthesis of MgO nanoparticles with the assistance of beetroot extract and leaf extract of P. guajava and A. adenophora. The synthesized MgO NPs were characterized by X-ray diffraction (XRD), Fourier transforms infrared spectroscopy (FTIR), and UV-visible spectroscopy. X-ray analysis for the broadening of peaks was used to evaluate the crystallite size and lattice strain using Debye-Scherer and Williamson–Hall method. The results of crystallite size obtained by both methods are in close proximity. The crystallite size obtained by the Williamson-Hall method seems more accurate, with values being 8.1 nm and 13.2 nm for beetroot MgO NPs and P. guajava MgO NPs, respectively. The FT-IR spectroscopy revealed the dominance of chemical bonds as well as functional groups on MgO NPs surfaces. The UV-visible absorption spectra of MgO NPs were found to be 310 nm, 315 nm, and 315 nm for beetroot, P. guajava, and A. adenophora leaf extract, respectively. Among the three samples, beetroot-mediated MgO NPs were effective antibacterial against both gram-positive and Gram-negative bacteria. In addition, synthesized MgO NPs also show significant antioxidant efficacy against 1,1-diphenyl-2-picrylhydrazyl radical. Further, beetroot MgO NPs showed the highest photocatalytic activity of about 91% in comparison with other samples.

Keywords: MgO NPs, XRD, FTIR, antibacterial, antioxidant and photocatalytic activity

Procedia PDF Downloads 68
9361 Musical Composition by Computer with Inspiration from Files of Different Media Types

Authors: Cassandra Pratt Romero, Andres Gomez de Silva Garza

Abstract:

This paper describes a computational system designed to imitate human inspiration during musical composition. The system is called MIS (Musical Inspiration Simulator). The MIS system is inspired by media to which human beings are exposed daily (visual, textual, or auditory) to create new musical compositions based on the emotions detected in said media. After building the system we carried out a series of evaluations with volunteer users who used MIS to compose music based on images, texts, and audio files. The volunteers were asked to judge the harmoniousness and innovation in the system's compositions. An analysis of the results points to the difficulty of computational analysis of the characteristics of the media to which we are exposed daily, as human emotions have a subjective character. This observation will direct future improvements in the system.

Keywords: human inspiration, musical composition, musical composition by computer, theory of sensation and human perception

Procedia PDF Downloads 162
9360 Study on Co-Relation of Prostate Specific Antigen with Metastatic Bone Disease in Prostate Cancer on Skeletal Scintigraphy

Authors: Muhammad Waleed Asfandyar, Akhtar Ahmed, Syed Adib-ul-Hasan Rizvi

Abstract:

Objective: To evaluate the ability of serum concentration of prostate specific antigen between two cutting points considering it as a predictor of skeletal metastasis on bone scintigraphy in men with prostate cancer. Settings: This study was carried out in department of Nuclear Medicine at Sindh Institute of Urology and Transplantation (SIUT) Karachi, Pakistan. Materials and Method: From August 2013 to November 2013, forty two (42) consecutive patients with prostate cancer who underwent technetium-99m methylene diphosphonate (Tc-99mMDP) whole body bone scintigraphy were prospectively analyzed. The information was collected from the scintigraphic database at a Nuclear medicine department Sindh institute of urology and transplantation Karachi Pakistan. Patients who did not have a serum PSA concentration available within 1 month before or after the time of performing the Tc-99m MDP whole body bone scintigraphy were excluded from this study. A whole body bone scintigraphy scan (from the toes to top of the head) was performed using a whole-body Moving gamma camera technique (anterior and posterior) 2–4 hours after intravenous injection of 20 mCi of Tc-99m MDP. In addition, all patients necessarily have a pathological report available. Bony metastases were determined from the bone scan studies and no further correlation with histopathology or other imaging modalities were performed. To preserve patient confidentiality, direct patient identifiers were not collected. In all the patients, Prostate specific antigen values and skeletal scintigraphy were evaluated. Results: The mean age, mean PSA, and incidence of bone metastasis on bone scintigraphy were 68.35 years, 370.51 ng/mL and 19/42 (45.23%) respectively. According to PSA levels, patients were divided into 5 groups < 10ng/mL (10/42), 10-20 ng/mL (5/42), 20-50 ng/mL (2/42), 50-100 (3/42), 100- 500ng/mL (3/42) and more than 500ng/mL (0/42) presenting negative bone scan. The incidence of positive bone scan (%) for bone metastasis for each group were O1 patient (5.26%), 0%, 03 patients (15.78%), 01 patient (5.26%), 04 patients (21.05%), and 10 patients (52.63%) respectively. From the 42 patients 19 (45.23%) presented positive scintigraphic examination for the presence of bone metastasis. 1 patient presented bone metastasis on bone scintigraphy having PSA level less than 10ng/mL, and in only 1 patient (5.26%) with bone metastasis PSA concentration was less than 20 ng/mL. therefore, when the cutting point adopted for PSA serum concentration was 10ng/mL, a negative predictive value for bone metastasis was 95% with sensitivity rates 94.74% and the positive predictive value and specificities of the method were 56.53% and 43.48% respectively. When the cutting point of PSA serum concentration was 20ng/mL the observed results for Positive predictive value and specificity were (78.27% and 65.22% respectively) whereas negative predictive value and sensitivity stood (100% and 95%) respectively. Conclusion: Results of our study allow us to conclude that serum PSA concentration of higher than 20ng/mL was the most accurate cutting point than a serum concentration of PSA higher than 10ng/mL to predict metastasis in radionuclide bone scintigraphy. In this way, unnecessary cost can be avoided, since a considerable part of prostate adenocarcinomas present low serum PSA levels less than 20 ng/mL and for these cases radionuclide bone scintigraphy could be unnecessary.

Keywords: bone scan, cut off value, prostate specific antigen value, scintigraphy

Procedia PDF Downloads 303
9359 From Myth to Screen: A Cultural Criticism of the Adaptation of Nordic Mythology in Marvel Cinematic Universe’s Thor Trilogy

Authors: Vathya Anindita Putri, Henny Saptatia Drajati Nugrahani

Abstract:

This research aims to explore the representation of Nordic mythology in the commercial film titled “Thor” produced by the Marvel Cinematic Universe. First, the Nordic mythology adaptation and representation in “Thor” compared to other media. Second, the importance of using the mise en scene technique, the comprehensive portrayal of Nordic mythology and the audience's experiences in enjoying the film. This research is conducted using qualitative methods. The two research questions are analyzed using three theories: Adaptation theory by Robert Stam, Mise en Scene theory by Jean-Luc Godard, and Cultural Criticism theory by Michel Foucault. Robert Stam emphasizes the importance of social and historical in understanding film adaptations. Film adaptations always occur in a specific cultural and historical context; therefore, authors and producers must consider these factors when creating a successful adaptation. Jean-Luc Godard uses the “politiques des auteurs” approach to understand that films are not just cultural products made for entertainment, but they are works of art by authors and directors. It is important to explore how authors and directors convey their ideas and emotions in their films, in this case, a film set in Nordic mythology. Foucault takes an approach to analyzing power that considers how power operates and influences social relationships in a specific context. Foucault’s theory is used to analyze how the representation of Nordic mythology is used as an instrument of power by the Marvel Cinematic Universe to influence how the audience views Nordic mythology. The initial findings of this research are that the fusion of Nordic mythology with modern superhero storytelling in the film “Thor” produced by Marvel, is successful. The film contains conflicts in the modern world and represents the symbolism of Nordic mythology. The rich and interesting atmosphere of Nordic mythology is presented through epic battle scenes, captivating character roles, and the use of visual effects that make the film more vivid and real.

Keywords: adaptation theory, cultural criticism theory, film criticism, Marvel cinematic universe, Mise en Scene theory, Nordic mythology

Procedia PDF Downloads 70
9358 Three-Dimensional Carbon Foams for the Application as Electrode Material in Energy Storage Systems

Authors: H. Beisch, J. Marx, S. Garlof, R. Shvets, I. I. Grygorchak, A. Kityk, B. Fiedler

Abstract:

Carbon materials, especially three-dimensional carbon foams, show very high potential in the application as electrode material for energy storage systems such as batteries and supercapacitors with unique fast charging and discharging times. Regarding their high specific surface areas (SSA) high specific capacities can be reached. Globugraphite is a newly developed carbon foam with an interconnected globular carbon morphology. Especially, this foam has a statistically distributed hierarchical pore structure resulting from the manufacturing process based on sintered ceramic templates which are synthetized during a final chemical vapor deposition (CVD) process. For morphology characterization scanning electron (SEM) and transmission electron microscopy (TEM) is used. In addition, the SSA is carried out by nitrogen adsorption combined with the Brunauer–Emmett–Teller (BET) theory. Electrochemical measurements in organic and inorganic electrolyte provide high energy densities and power densities resulting from ion absorption by forming an electrochemical double layer. All values are summarized in a Ragone Diagram. Finally, power densities up to 833 W/kg and energy densities up to 48 Wh/kg could be achieved. The corresponding SSA is between 376 m²/g and 859 m²/g. For organic electrolyte a specific capacity of 71 F/g at a density of 20 mg/cm³ was achieved.

Keywords: BET, CVD process, electron microscopy, Ragone diagram

Procedia PDF Downloads 163
9357 Improving the Performance of Deep Learning in Facial Emotion Recognition with Image Sharpening

Authors: Ksheeraj Sai Vepuri, Nada Attar

Abstract:

We as humans use words with accompanying visual and facial cues to communicate effectively. Classifying facial emotion using computer vision methodologies has been an active research area in the computer vision field. In this paper, we propose a simple method for facial expression recognition that enhances accuracy. We tested our method on the FER-2013 dataset that contains static images. Instead of using Histogram equalization to preprocess the dataset, we used Unsharp Mask to emphasize texture and details and sharpened the edges. We also used ImageDataGenerator from Keras library for data augmentation. Then we used Convolutional Neural Networks (CNN) model to classify the images into 7 different facial expressions, yielding an accuracy of 69.46% on the test set. Our results show that using image preprocessing such as the sharpening technique for a CNN model can improve the performance, even when the CNN model is relatively simple.

Keywords: facial expression recognittion, image preprocessing, deep learning, CNN

Procedia PDF Downloads 129
9356 Seafarers Safety, Watch-Keeping and Navigation

Authors: Sunday Moses Ojelabi

Abstract:

Safety is the protection of the crew, passenger and equipment itself, as well as those living and working near bodies of water, from hazardous situations. To assure safety, watch keeping is paramount because neglecting your watchkeeping can lead to hazardous situations. Navigation is the assignment of a sailor to a specific route on a vessel to operate. Navigation is the process of planning, managing, and directing a vessel safely to the desired destination with the aid of intense and efficient watch keeping. Safety, i,e, all measures done to preserve the welfare of marine life, maritime infrastructure, facilities, ships, offshore installations, crew, and passengers, as well as the preservation of navigation and the ease of maritime trade, are referred to as safety measures;. When it comes to health, the absence of a proper first aid kit will affect injured sailors and passengers. Not using goggles while shipping, ear muffs, etc., in the course of maintenance can be hazardous. Watchkeeping: i.e the specific dutiies assigned to a personnel in a vessel to see to its continous smooth functionality. Your lookout or watch officer [officer on navigational duty] must be active at all times in the course of duty. Navigation refers to the technique of precisely determining a craft or vehicle's position and directing its motion along a particular course. The seafarers are not being put through regular seminars, training, and orientations. In parts of West Africa, sailors go to school without being able to secure jobs until their papers expire. For that, they won’t go for another Standard Trainning Certification and Watch keeping for Seafarers to upgrade their certificate. In light of this, they are not familiar with the new vessels in the country, and for this, they can`t meet the safety, watch keeping, and navigation standards. Also, shipping companies and ship owners are being selfish by not putting the proper things needed onboard regarding safety, watchkeeping, and navigational equipment. The questions raised in these presentations are the breakdown of the safety activities, watch keeping effectiveness, and navigational accuracy. All safety and watch keeping regulations should be applied efficiently. The problem identified includes a lack of safety instruments onboard vessels in African waters. Also, inadequate proper watchkeeping due to the excess workload on the seafarers can lead to an improper lookout, which gives room to collision, hijacking, and piracy. The impact of this research is to inform African seafarers, shipping companies, and ship owners of the necessary information concerning the safety of their lives and that of their passengers, cargo, and equipment.

Keywords: standard of training, certification, watch keeping for seafarers, navigation, safety, watchkeeping

Procedia PDF Downloads 63
9355 Effect of Variation of Injection Timing on Performance and Emission Characteristics of Compression Ignition Engine: A CFD Approach

Authors: N. Balamurugan, N. V. Mahalakshmi

Abstract:

Compression ignition (CI) engines are known for their high thermal efficiency in comparison with spark-ignited (SI) engines. This makes CI engines a potential candidate for the future prime source of power for transportation sector to reduce greenhouse gas emissions and to shrink carbon footprint. However, CI engines produce high levels of NOx and soot emissions. Conventional methods to reduce NOx and soot emissions often result in the infamous NOx-soot trade-off. The injection parameters are one of the most important factors in the working of CI engines. The engine performance, power output, economy etc., is greatly dependent on the effectiveness of the injection parameters. The injection parameter has their direct impact on combustion process and pollutant formation. The injection parameter’s values are required to be optimised according to the application of the engine. Control of fuel injection mode is one method for reduction of NOx and soot emissions that is achievable. This study aims to assess, compare and analyse the influence of the effect of injection characteristics that is SOI timing studied on combustion and emissions in in-cylinder combustion processes with that of conventional DI Diesel Engine system using the commercial Computational Fluid Dynamic (CFD) package STAR- CD ES-ICE.

Keywords: variation of injection timing, compression ignition engine, spark-ignited, Computational Fluid Dynamic

Procedia PDF Downloads 278
9354 Knowledge Management in Public Sector Employees: A Case Study of Training Participants at National Institute of Management, Pakistan

Authors: Muhammad Arif Khan, Haroon Idrees, Imran Aziz, Sidra Mushtaq

Abstract:

The purpose of this study is to investigate the current level of knowledge mapping skills of the public sector employees in Pakistan. National Institute of Management is one of the premiere public sector training organization for mid-career public sector employees in Pakistan. This study is conducted on participants of fourteen weeks long training course called Mid-Career Management Course (MCMC) which is mandatory for public sector employees in order to ascertain how to enhance their knowledge mapping skills. Methodology: Researcher used both qualitative and quantitative approach to conduct this study. Primary data about current level of participants’ understanding of knowledge mapping was collected through structured questionnaire. Later on, Participant Observation method was used where researchers acted as part of the group to gathered data from the trainees during their performance in training activities and tasks. Findings: Respondents of the study were examined for skills and abilities to organizing ideas, helping groups to develop conceptual framework, identifying critical knowledge areas of an organization, study large networks and identifying the knowledge flow using nodes and vertices, visualizing information, represent organizational structure etc. Overall, the responses varied in different skills depending on the performance and presentations. However, generally all participants have demonstrated average level of using both the IT and Non-IT K-mapping tools and techniques during simulation exercises, analysis paper de-briefing, case study reports, post visit presentation, course review, current issue presentation, syndicate meetings, and daily synopsis. Research Limitations: This study is conducted on a small-scale population of 67 public sector employees nominated by federal government to undergo 14 weeks extensive training program called MCMC (Mid-Career Management Course) at National Institute of Management, Peshawar, Pakistan. Results, however, reflects only a specific class of public sector employees i.e. working in grade 18 and having more than 5 years of work. Practical Implications: Research findings are useful for trainers, training agencies, government functionaries, and organizations working for capacity building of public sector employees.

Keywords: knowledge management, km in public sector, knowledge management and professional development, knowledge management in training, knowledge mapping

Procedia PDF Downloads 239
9353 Learning from Dendrites: Improving the Point Neuron Model

Authors: Alexander Vandesompele, Joni Dambre

Abstract:

The diversity in dendritic arborization, as first illustrated by Santiago Ramon y Cajal, has always suggested a role for dendrites in the functionality of neurons. In the past decades, thanks to new recording techniques and optical stimulation methods, it has become clear that dendrites are not merely passive electrical components. They are observed to integrate inputs in a non-linear fashion and actively participate in computations. Regardless, in simulations of neural networks dendritic structure and functionality are often overlooked. Especially in a machine learning context, when designing artificial neural networks, point neuron models such as the leaky-integrate-and-fire (LIF) model are dominant. These models mimic the integration of inputs at the neuron soma, and ignore the existence of dendrites. In this work, the LIF point neuron model is extended with a simple form of dendritic computation. This gives the LIF neuron increased capacity to discriminate spatiotemporal input sequences, a dendritic functionality as observed in another study. Simulations of the spiking neurons are performed using the Bindsnet framework. In the common LIF model, incoming synapses are independent. Here, we introduce a dependency between incoming synapses such that the post-synaptic impact of a spike is not only determined by the weight of the synapse, but also by the activity of other synapses. This is a form of short term plasticity where synapses are potentiated or depressed by the preceding activity of neighbouring synapses. This is a straightforward way to prevent inputs from simply summing linearly at the soma. To implement this, each pair of synapses on a neuron is assigned a variable,representing the synaptic relation. This variable determines the magnitude ofthe short term plasticity. These variables can be chosen randomly or, more interestingly, can be learned using a form of Hebbian learning. We use Spike-Time-Dependent-Plasticity (STDP), commonly used to learn synaptic strength magnitudes. If all neurons in a layer receive the same input, they tend to learn the same through STDP. Adding inhibitory connections between the neurons creates a winner-take-all (WTA) network. This causes the different neurons to learn different input sequences. To illustrate the impact of the proposed dendritic mechanism, even without learning, we attach five input neurons to two output neurons. One output neuron isa regular LIF neuron, the other output neuron is a LIF neuron with dendritic relationships. Then, the five input neurons are allowed to fire in a particular order. The membrane potentials are reset and subsequently the five input neurons are fired in the reversed order. As the regular LIF neuron linearly integrates its inputs at the soma, the membrane potential response to both sequences is similar in magnitude. In the other output neuron, due to the dendritic mechanism, the membrane potential response is different for both sequences. Hence, the dendritic mechanism improves the neuron’s capacity for discriminating spa-tiotemporal sequences. Dendritic computations improve LIF neurons even if the relationships between synapses are established randomly. Ideally however, a learning rule is used to improve the dendritic relationships based on input data. It is possible to learn synaptic strength with STDP, to make a neuron more sensitive to its input. Similarly, it is possible to learn dendritic relationships with STDP, to make the neuron more sensitive to spatiotemporal input sequences. Feeding structured data to a WTA network with dendritic computation leads to a significantly higher number of discriminated input patterns. Without the dendritic computation, output neurons are less specific and may, for instance, be activated by a sequence in reverse order.

Keywords: dendritic computation, spiking neural networks, point neuron model

Procedia PDF Downloads 115
9352 From Research to Practice: Upcycling Cinema Icons

Authors: Mercedes Rodriguez Sanchez, Laura Luceño Casals

Abstract:

With the rise of social media, creative people and brands everywhere are constantly generating content. The students with Bachelor's Degrees in Fashion Design use platforms such as Instagram or TikTok to look for inspiration and entertainment, as well as a way to develop their own ideas and share them with a wide audience. Information and Communications Technologies (ICT) have become a central aspect of higher education, virtually affecting every aspect of the student experience. Following the current trend, during the first semester of the second year, a collaborative project across two subjects –Design Management and History of Fashion Design– was implemented. After an introductory class focused on the relationship between fashion and cinema, as well as a brief history of 20th-century fashion, the students freely chose a work team and an iconic look from a movie costume. They researched the selected movie and its sociocultural context, analyzed the costume and the work of the designer, and studied the style, fashion magazines and most popular films of the time. Students then redesigned and recreated the costume, for which they were compelled to recycle the materials they had available at home as an unavoidable requirement of the activity. Once completed the garment, students delivered in-class, team-based presentations supported by the final design, a project summary poster and a making-of video, which served as a documentation tool of the costume design process. The methodologies used include Challenge-Based Learning (CBL), debates, Internet research, application of Information and Communications Technologies, and viewing clips of classic films, among others. After finishing the projects, students were asked to complete two electronic surveys to measure the acquisition of transversal and specific competencies of each subject. Results reveal that this activity helped the students' knowledge acquisition, a deeper understanding of both subjects and their skills development. The classroom dynamic changed. The multidisciplinary approach encouraged students to collaborate with their peers, while educators were better able to keep students' interest and promote an engaging learning process. As a result, the activity discussed in this paper confirmed the research hypothesis: it is positive to propose innovative teaching projects that combine academic research with playful learning environments.

Keywords: cinema, cooperative learning, fashion design, higher education, upcycling

Procedia PDF Downloads 67
9351 A Two Server Poisson Queue Operating under FCFS Discipline with an ‘m’ Policy

Authors: R. Sivasamy, G. Paulraj, S. Kalaimani, N.Thillaigovindan

Abstract:

For profitable businesses, queues are double-edged swords and hence the pain of long wait times in a queue often frustrates customers. This paper suggests a technical way of reducing the pain of lines through a Poisson M/M1, M2/2 queueing system operated by two heterogeneous servers with an objective of minimising the mean sojourn time of customers served under the queue discipline ‘First Come First Served with an ‘m’ policy, i.e. FCFS-m policy’. Arrivals to the system form a Poisson process of rate λ and are served by two exponential servers. The service times of successive customers at server ‘j’ are independent and identically distributed (i.i.d.) random variables and each of it is exponentially distributed with rate parameter μj (j=1, 2). The primary condition for implementing the queue discipline ‘FCFS-m policy’ on these service rates μj (j=1, 2) is that either (m+1) µ2 > µ1> m µ2 or (m+1) µ1 > µ2> m µ1 must be satisfied. Further waiting customers prefer the server-1 whenever it becomes available for service, and the server-2 should be installed if and only if the queue length exceeds the value ‘m’ as a threshold. Steady-state results on queue length and waiting time distributions have been obtained. A simple way of tracing the optimal service rate μ*2 of the server-2 is illustrated in a specific numerical exercise to equalize the average queue length cost with that of the service cost. Assuming that the server-1 has to dynamically adjust the service rates as μ1 during the system size is strictly less than T=(m+2) while μ2=0, and as μ1 +μ2 where μ2>0 if the system size is more than or equal to T, corresponding steady state results of M/M1+M2/1 queues have been deduced from those of M/M1,M2/2 queues. To conclude this investigation has a viable application, results of M/M1+M2/1 queues have been used in processing of those waiting messages into a single computer node and to measure the power consumption by the node.

Keywords: two heterogeneous servers, M/M1, M2/2 queue, service cost and queue length cost, M/M1+M2/1 queue

Procedia PDF Downloads 352
9350 The Interactions of Attentional Bias for Food, Trait Self-Control, and Motivation: A Model Testing Study

Authors: Hamish Love, Navjot Bhullar, Nicola Schutte

Abstract:

Self-control and related psychological constructs have been shown to have a large role in the improvement and maintenance of healthful dietary behaviour. However, self-control for diet, and related constructs such as motivation, level of conflict between tempting desires and dietary goals, and attentional bias for tempting food, have not been studied together to establish their relationships, to the author’s best knowledge. Therefore the aim of this paper was to conduct model testing on these constructs and evaluate how they relate to affect dietary outcomes. 400 Australian adult participants will be recruited via the Qualtrics platform and will be representative across age and gender. They will complete survey and reaction timing surveys to gather data on the five target constructs: Trait Self-control, Attentional Bias for Food, Dietary Goal-Desire Incongruence, Motivation for Dietary Self-control, and Satisfaction with Dietary Behaviour. A model of moderated mediation is predicted, whereby the initial predictor (Dietary Goal-Desire Incongruence) predicts the level of the outcome variable, Satisfaction with Dietary Behaviour. We hypothesise that the relationship between these two variables will be mediated by Trait Self-Control and that the extent that Trait Self-control is allowed to mediate dietary outcome is moderated by both Attentional Bias for Food and Motivation for Dietary Self-control. The analysis will be conducted using the PROCESS module in SPSS 23. The results of model testing in this current study will be valuable to direct future research and inform which constructs could be important targets for intervention to improve dietary outcomes.

Keywords: self-control, diet, model testing, attentional bias, motivation

Procedia PDF Downloads 158
9349 Predicting Match Outcomes in Team Sport via Machine Learning: Evidence from National Basketball Association

Authors: Jacky Liu

Abstract:

This paper develops a team sports outcome prediction system with potential for wide-ranging applications across various disciplines. Despite significant advancements in predictive analytics, existing studies in sports outcome predictions possess considerable limitations, including insufficient feature engineering and underutilization of advanced machine learning techniques, among others. To address these issues, we extend the Sports Cross Industry Standard Process for Data Mining (SRP-CRISP-DM) framework and propose a unique, comprehensive predictive system, using National Basketball Association (NBA) data as an example to test this extended framework. Our approach follows a holistic methodology in feature engineering, employing both Time Series and Non-Time Series Data, as well as conducting Explanatory Data Analysis and Feature Selection. Furthermore, we contribute to the discourse on target variable choice in team sports outcome prediction, asserting that point spread prediction yields higher profits as opposed to game-winner predictions. Using machine learning algorithms, particularly XGBoost, results in a significant improvement in predictive accuracy of team sports outcomes. Applied to point spread betting strategies, it offers an astounding annual return of approximately 900% on an initial investment of $100. Our findings not only contribute to academic literature, but have critical practical implications for sports betting. Our study advances the understanding of team sports outcome prediction a burgeoning are in complex system predictions and pave the way for potential profitability and more informed decision making in sports betting markets.

Keywords: machine learning, team sports, game outcome prediction, sports betting, profits simulation

Procedia PDF Downloads 83
9348 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 93
9347 Enabling Oral Communication and Accelerating Recovery: The Creation of a Novel Low-Cost Electroencephalography-Based Brain-Computer Interface for the Differently Abled

Authors: Rishabh Ambavanekar

Abstract:

Expressive Aphasia (EA) is an oral disability, common among stroke victims, in which the Broca’s area of the brain is damaged, interfering with verbal communication abilities. EA currently has no technological solutions and its only current viable solutions are inefficient or only available to the affluent. This prompts the need for an affordable, innovative solution to facilitate recovery and assist in speech generation. This project proposes a novel concept: using a wearable low-cost electroencephalography (EEG) device-based brain-computer interface (BCI) to translate a user’s inner dialogue into words. A low-cost EEG device was developed and found to be 10 to 100 times less expensive than any current EEG device on the market. As part of the BCI, a machine learning (ML) model was developed and trained using the EEG data. Two stages of testing were conducted to analyze the effectiveness of the device: a proof-of-concept and a final solution test. The proof-of-concept test demonstrated an average accuracy of above 90% and the final solution test demonstrated an average accuracy of above 75%. These two successful tests were used as a basis to demonstrate the viability of BCI research in developing lower-cost verbal communication devices. Additionally, the device proved to not only enable users to verbally communicate but has the potential to also assist in accelerated recovery from the disorder.

Keywords: neurotechnology, brain-computer interface, neuroscience, human-machine interface, BCI, HMI, aphasia, verbal disability, stroke, low-cost, machine learning, ML, image recognition, EEG, signal analysis

Procedia PDF Downloads 107
9346 Transforming ESL Teaching and Learning with ICT

Authors: Helena Sit

Abstract:

Developing skills in using ICT in the language classroom has been discussed at all educational levels. Digital tools and learning management systems enable teachers to transform their instructional activities while giving learners the opportunity to engage with virtual communities. In the field of English as a second language (ESL) teaching and learning, the use of technology-enhanced learning and diverse pedagogical practices continues to grow. Whilst technology and multimodal learning is a way of the future for education, second language teachers now face the predicament as to whether implementing these newer ways of learning is, in fact, beneficial or disadvantageous to learners. Research has shown that integrating multimodality and technology can improve students’ engagement and participation in their English language learning. However, students can experience anxiety or misunderstanding when engaging with E-learning or digital-mediated learning. This paper aims to explore how ESL teaching and learning are transformed via the use of educational technology and what impact it has had on student teachers. Case study is employed in this research. The study reviews the growing presence of technology and multimodality in university language classrooms, discusses their impact on teachers’ pedagogical practices, and proposes scaffolding strategies to help design effective English language courses in the Australian education context. The study sheds light on how pedagogical integration today may offer a way forward for language teachers of tomorrow and provides implications to implement an evidence-informed approach that blends knowledge from research, practice and people experiencing the practice in the digital era.

Keywords: educational technology, ICT in higher education, curriculum design and innovation, teacher education, multiliteracies pedagogy

Procedia PDF Downloads 58
9345 Public Participation in Political Transformation: From the Coup D’etat in 2014 to the Events Leading up to the Proposed Election in 2018 in Thailand

Authors: Pataramon Satalak, Sakrit Isariyanon, Teerapong Puripanik

Abstract:

This article uses the recent events in Thailand as a case study for examining why democratic transition is necessary during political upheaval to ensure that the people’s power remains unaffected. After seizing power in May 2014, the military, backed by anti-government protestors, selected and established their own system to govern the country. They set up the National Council for Peace and Order (NCPO) which established a People’s Assembly, aiming to reach a compromise between the conflicting opinions of former, pro-government and anti-government protesters. It plans to achieve this through political reform before returning sovereign power to the people via an election in 2018. If a governmental authority is not representative of the people (e.g. a military government) it does not count as a legitimate government. During the last four years of military government, from May 2014 to January 2018, their rule of Thailand has been widely controversial, specifically regarding their commitment to democracy, human rights violations and their manipulation of the rule of law. Democratic legitimacy relies not only on established mechanisms for public participation (like referendums or elections) but also public participation based on accessible and educational reform (often via NGOs) to ensure that the free and fair will of the people can be expressed. Through their actions over the last three years, the Thai military government has damaged both of these components, impacting future public participation in politics. The authors make some observations about the specific actions the military government has taken to erode the democratic legitimacy of future public participation: the increasing dominance of military courts over civil courts; civil society’s limited involvement in political activities; the drafting of a new constitution and their attempt to master support through referenda and its consequence for delaying organic law-making process; the structure of the legislative powers (Senate and the members of parliament); and the control of people’s basic freedoms of expression, movement and assembly in political activities. One clear consequence of the military government’s specific actions over the last three years is the increased uncertainty amongst Thai people that their fundamental freedoms and political rights will be respected in the future. This will directly affect their participation in future democratic processes. The military government’s actions (e.g. their response to the UN representatives) will also have influenced potential international engagement in Thai civil society to help educate disadvantaged people about their rights, and their participation in the political arena. These actions challenge the democratic idea that there should be a checking and balancing of power between people and government. These examples provide evidence that a democratic transition is crucial during any process of political transformation.

Keywords: political tranformation, public participation, Thailand coup d'etat 2014, election 2018

Procedia PDF Downloads 134
9344 Technical and Economic Evaluation of Harmonic Mitigation from Offshore Wind Power Plants by Transmission Owners

Authors: A. Prajapati, K. L. Koo, F. Ghassemi, M. Mulimakwenda

Abstract:

In the UK, as the volume of non-linear loads connected to transmission grid continues to rise steeply, the harmonic distortion levels on transmission network are becoming a serious concern for the network owners and system operators. This paper outlines the findings of the study conducted to verify the proposal that the harmonic mitigation could be optimized and can be managed economically and effectively at the transmission network level by the Transmission Owner (TO) instead of the individual polluter connected to the grid. Harmonic mitigation studies were conducted on selected regions of the transmission network in England for recently connected offshore wind power plants to strategize and optimize selected harmonic filter options. The results – filter volume and capacity – were then compared against the mitigation measures adopted by the individual connections. Estimation ratios were developed based on the actual installed and optimal proposed filters. These estimation ratios were then used to derive harmonic filter requirements for future contracted connections. The study has concluded that a saving of 37% in the filter volume/capacity could be achieved if the TO is to centrally manage the harmonic mitigation instead of individual polluter installing their own mitigation solution.

Keywords: C-type filter, harmonics, optimization, offshore wind farms, interconnectors, HVDC, renewable energy, transmission owner

Procedia PDF Downloads 149
9343 Nucleophile Mediated Addition-Fragmentation Generation of Aryl Radicals from Aryl Diazonium Salts

Authors: Elene Tatunashvili, Bun Chan, Philippe E. Nashar, Christopher S. P. McErlean

Abstract:

The reduction of aryl diazonium salts is one of the most efficient ways to generate aryl radicals for use in a wide range of transformations, including Sandmeyer-type reactions, Meerwein arylations of olefins and Gomberg-Bachmann-Hey arylations of heteroaromatic systems. The aryl diazonium species can be reduced electrochemically, by UV irradiation, inner-sphere and outer-sphere single electron transfer processes (SET) from metal salts, SET from photo-excited organic catalysts or fragmentation of adducts with weak bases (acetate, hydroxide, etc.). This paper details an approach for the metal-free reduction of aryl diazonium salts, which facilitates the efficient synthesis of various aromatic compounds under exceedingly mild reaction conditions. By measuring the oxidation potential of a number of organic molecules, a series of nucleophiles were identified that reduce aryl diazonium salts via the addition-fragmentation mechanism. This approach leads to unprecedented operational simplicity: The reactions are very rapid and proceed in the open air; there is no need for external irradiation or heating, and the process is compatible with a large number of radical reactions. We illustrate these advantages by using the addition-fragmentation strategy to regioselectively arylate a series of heterocyclic compounds, to synthesize ketones by arylation of silyl enol ethers, and to synthesize benzothiophene and phenanthrene derivatives by radical annulation reactions.

Keywords: diazonium salts, hantzsch esters, oxygen, radical reactions, synthetic methods

Procedia PDF Downloads 138
9342 Implementation of Fuzzy Version of Block Backward Differentiation Formulas for Solving Fuzzy Differential Equations

Authors: Z. B. Ibrahim, N. Ismail, K. I. Othman

Abstract:

Fuzzy Differential Equations (FDEs) play an important role in modelling many real life phenomena. The FDEs are used to model the behaviour of the problems that are subjected to uncertainty, vague or imprecise information that constantly arise in mathematical models in various branches of science and engineering. These uncertainties have to be taken into account in order to obtain a more realistic model and many of these models are often difficult and sometimes impossible to obtain the analytic solutions. Thus, many authors have attempted to extend or modified the existing numerical methods developed for solving Ordinary Differential Equations (ODEs) into fuzzy version in order to suit for solving the FDEs. Therefore, in this paper, we proposed the development of a fuzzy version of three-point block method based on Block Backward Differentiation Formulas (FBBDF) for the numerical solution of first order FDEs. The three-point block FBBDF method are implemented in uniform step size produces three new approximations simultaneously at each integration step using the same back values. Newton iteration of the FBBDF is formulated and the implementation is based on the predictor and corrector formulas in the PECE mode. For greater efficiency of the block method, the coefficients of the FBBDF are stored at the start of the program. The proposed FBBDF is validated through numerical results on some standard problems found in the literature and comparisons are made with the existing fuzzy version of the Modified Simpson and Euler methods in terms of the accuracy of the approximated solutions. The numerical results show that the FBBDF method performs better in terms of accuracy when compared to the Euler method when solving the FDEs.

Keywords: block, backward differentiation formulas, first order, fuzzy differential equations

Procedia PDF Downloads 304
9341 Hybrid Strategies of Crisis Intervention for Sexualized Violence Using Digital Media

Authors: Katharina Kargel, Frederic Vobbe

Abstract:

Sexualized violence against children and adolescents using digital media poses particular challenges for practitioners with a focus on crisis intervention (social work, psychotherapy, law enforcement). The technical delimitation of violence increases the burden on those affected and increases the complexity of interdisciplinary cooperation. Urgently needed recommendations for practical action do not yet exist in Germany. Funded by the Federal Ministry of Education and Research, these recommendations for action are being developed in the HUMAN project together with science and practice. The presentation introduces the participatory approach of the HUMAN project. We discuss the application-oriented, casuistic approach of the project and present its results using the example of concrete case-based recommendations for Action. The participants will be presented with concrete prototypical case studies from the project, which will be used to illustrate quality criteria for crisis intervention in cases of sexualized violence using digital media. On the basis of case analyses, focus group interviews and interviews with victims of violence, we present the six central challenges of sexualized violence with the use of digital media, namely: • Diffusion (Ambiguities regarding the extent and significance of violence) , • Transcendence (Space and time independence of the dynamics of violence, omnipresence), • omnipresent anxiety (considering diffusion and transcendence), • being haunted (repeated confrontation with digital memories of violence or the perpetrator), • disparity (conflicts of interpretative power between those affected and the social environment) • simultaneity (of all other factors). We point out generalizable principles with which these challenges can be dealt with professionally. Dealing professionally with sexualized violence using digital media requires a stronger networking of professional actors. A clear distinction must be made between their own mission and the mission of the network partners. Those affected by violence must be shown options for crisis intervention in the context of the aid networks. The different competencies and the professional mission of the offers of help are to be made transparent. The necessity of technical possibilities for deleting abuse images beyond criminal prosecution will be discussed. Those affected are stabilized by multimodal strategies such as a combination of rational emotive therapy, legal support and technical assistance.

Keywords: sexualized violence, intervention, digital media, children and youth

Procedia PDF Downloads 218
9340 A Framework for Teaching the Intracranial Pressure Measurement through an Experimental Model

Authors: Christina Klippel, Lucia Pezzi, Silvio Neto, Rafael Bertani, Priscila Mendes, Flavio Machado, Aline Szeliga, Maria Cosendey, Adilson Mariz, Raquel Santos, Lys Bendett, Pedro Velasco, Thalita Rolleigh, Bruna Bellote, Daria Coelho, Bruna Martins, Julia Almeida, Juliana Cerqueira

Abstract:

This project presents a framework for teaching intracranial pressure monitoring (ICP) concepts using a low-cost experimental model in a neurointensive care education program. Data concerning ICP monitoring contribute to the patient's clinical assessment and may dictate the course of action of a health team (nursing, medical staff) and influence decisions to determine the appropriate intervention. This study aims to present a safe method for teaching ICP monitoring to medical students in a Simulation Center. Methodology: Medical school teachers, along with students from the 4th year, built an experimental model for teaching ICP measurement. The model consists of a mannequin's head with a plastic bag inside simulating the cerebral ventricle and an inserted ventricular catheter connected to the ICP monitoring system. The bag simulating the ventricle can also be changed for others containing bloody or infected simulated cerebrospinal fluid. On the mannequin's ear, there is a blue point indicating the right place to set the "zero point" for accurate pressure reading. The educational program includes four steps: 1st - Students receive a script on ICP measurement for reading before training; 2nd - Students watch a video about the subject created in the Simulation Center demonstrating each step of the ICP monitoring and the proper care, such as: correct positioning of the patient, anatomical structures to establish the zero point for ICP measurement and a secure range of ICP; 3rd - Students train the procedure in the model. Teachers help students during training; 4th - Student assessment based on a checklist form. Feedback and correction of wrong actions. Results: Students expressed interest in learning ICP monitoring. Tests concerning the hit rate are still being performed. ICP's final results and video will be shown at the event. Conclusion: The study of intracranial pressure measurement based on an experimental model consists of an effective and controlled method of learning and research, more appropriate for teaching neurointensive care practices. Assessment based on a checklist form helps teachers keep track of student learning progress. This project offers medical students a safe method to develop intensive neurological monitoring skills for clinical assessment of patients with neurological disorders.

Keywords: neurology, intracranial pressure, medical education, simulation

Procedia PDF Downloads 152
9339 Discrepant Views of Social Competence and Links with Social Phobia

Authors: Pamela-Zoe Topalli, Niina Junttila, Päivi M. Niemi, Klaus Ranta

Abstract:

Adolescents’ biased perceptions about their social competence (SC), whether negatively or positively, serve to influence their socioemotional adjustment such as early feelings of social phobia (nowadays referred to as Social Anxiety Disorder-SAD). Despite the importance of biased self-perceptions in adolescents’ psychosocial adjustment, the extent to which discrepancies between self- and others’ evaluations of one’s SC are linked to social phobic symptoms remains unclear in the literature. This study examined the perceptual discrepancy profiles between self- and peers’ as well as between self- and teachers’ evaluations of adolescents’ SC and the interrelations of these profiles with self-reported social phobic symptoms. The participants were 390 3rd graders (15 years old) of Finnish lower secondary school (50.8% boys, 49.2% girls). In contrast with variable-centered approaches that have mainly been used by previous studies when focusing on this subject, this study used latent profile analysis (LPA), a person-centered approach which can provide information regarding risk profiles by capturing the heterogeneity within a population and classifying individuals into groups. LPA revealed the following five classes of discrepancy profiles: i) extremely negatively biased perceptions of SC, ii) negatively biased perceptions of SC, iii) quite realistic perceptions of SC, iv) positively biased perceptions of SC, and v) extremely positively biased perceptions of SC. Adolescents with extremely negatively biased perceptions and negatively biased perceptions of their own SC reported the highest number of social phobic symptoms. Adolescents with quite realistic, positively biased and extremely positively biased perceptions reported the lowest number of socio-phobic symptoms. The results point out the negatively and the extremely negatively biased perceptions as possible contributors to social phobic symptoms. Moreover, the association of quite realistic perceptions with low number of social phobic symptoms indicates its potential protective power against social phobia. Finally, positively and extremely positively biased perceptions of SC are negatively associated with social phobic symptoms in this study. However, the profile of extremely positively biased perceptions might be linked as well with the existence of externalizing problems such as antisocial behavior (e.g. disruptive impulsivity). The current findings highlight the importance of considering discrepancies between self- and others’ perceptions of one’s SC in clinical and research efforts. Interventions designed to prevent or moderate social phobic symptoms need to take into account individual needs rather than aiming for uniform treatment. Implications and future directions are discussed.

Keywords: adolescence, latent profile analysis, perceptual discrepancies, social competence, social phobia

Procedia PDF Downloads 224