Search results for: mobile game based learning
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32498

Search results for: mobile game based learning

28298 Big Data for Local Decision-Making: Indicators Identified at International Conference on Urban Health 2017

Authors: Dana R. Thomson, Catherine Linard, Sabine Vanhuysse, Jessica E. Steele, Michal Shimoni, Jose Siri, Waleska Caiaffa, Megumi Rosenberg, Eleonore Wolff, Tais Grippa, Stefanos Georganos, Helen Elsey

Abstract:

The Sustainable Development Goals (SDGs) and Urban Health Equity Assessment and Response Tool (Urban HEART) identify dozens of key indicators to help local decision-makers prioritize and track inequalities in health outcomes. However, presentations and discussions at the International Conference on Urban Health (ICUH) 2017 suggested that additional indicators are needed to make decisions and policies. A local decision-maker may realize that malaria or road accidents are a top priority. However, s/he needs additional health determinant indicators, for example about standing water or traffic, to address the priority and reduce inequalities. Health determinants reflect the physical and social environments that influence health outcomes often at community- and societal-levels and include such indicators as access to quality health facilities, access to safe parks, traffic density, location of slum areas, air pollution, social exclusion, and social networks. Indicator identification and disaggregation are necessarily constrained by available datasets – typically collected about households and individuals in surveys, censuses, and administrative records. Continued advancements in earth observation, data storage, computing and mobile technologies mean that new sources of health determinants indicators derived from 'big data' are becoming available at fine geographic scale. Big data includes high-resolution satellite imagery and aggregated, anonymized mobile phone data. While big data are themselves not representative of the population (e.g., satellite images depict the physical environment), they can provide information about population density, wealth, mobility, and social environments with tremendous detail and accuracy when combined with population-representative survey, census, administrative and health system data. The aim of this paper is to (1) flag to data scientists important indicators needed by health decision-makers at the city and sub-city scale - ideally free and publicly available, and (2) summarize for local decision-makers new datasets that can be generated from big data, with layperson descriptions of difficulties in generating them. We include SDGs and Urban HEART indicators, as well as indicators mentioned by decision-makers attending ICUH 2017.

Keywords: health determinant, health outcome, mobile phone, remote sensing, satellite imagery, SDG, urban HEART

Procedia PDF Downloads 193
28297 Digital Literacy Transformation and Implications in Institutions of Higher Learning in Kenya

Authors: Emily Cherono Sawe, Elisha Ondieki Makori

Abstract:

Knowledge and digital economies have brought challenges and potential opportunities for universities to innovate and improve the quality of learning. Disruption technologies and information dynamics continue to transform and change the landscape in teaching, scholarship, and research activities across universities. Digital literacy is a fundamental and imperative element in higher education and training, as witnessed during the new norm. COVID-19 caused unprecedented disruption in universities, where teaching and learning depended on digital innovations and applications. Academic services and activities were provided online, including library information services. Information professionals were forced to adopt various digital platforms in order to provide information services to patrons. University libraries’ roles in fulfilling educational responsibilities continue to evolve in response to changes in pedagogy, technology, economy, society, policies, and strategies of parent institutions. Libraries are currently undergoing considerable transformational change as a result of the inclusion of a digital environment. Academic libraries have been at the forefront of providing online learning resources and online information services, as well as supporting students and staff to develop digital literacy skills via online courses, tutorials, and workshops. Digital literacy transformation and information staff are crucial elements reminiscent of the prioritization of skills and knowledge for lifelong learning. The purpose of this baseline research is to assess the implications of digital literacy transformation in institutions of higher learning in Kenya and share appropriate strategies to leverage and sustain teaching and research. Objectives include examining the leverage and preparedness of the digital literacy environment in streamlining learning in the universities, exploring and benchmarking imperative digital competence for information professionals, establishing the perception of information professionals towards digital literacy skills, and determining lessons, best practices, and strategies to accelerate digital literacy transformation for effective research and learning in the universities. The study will adopt a descriptive research design using questionnaires and document analysis as the instruments for data collection. The targeted population is librarians and information professionals, as well as academics in public and private universities teaching information literacy programmes. Data and information are to be collected through an online structured questionnaire and digital face-to-face interviews. Findings and results will provide promising lessons together with best practices and strategies to transform and change digital literacies in university libraries in Kenya.

Keywords: digital literacy, digital innovations, information professionals, librarians, higher education, university libraries, digital information literacy

Procedia PDF Downloads 73
28296 Shark Detection and Classification with Deep Learning

Authors: Jeremy Jenrette, Z. Y. C. Liu, Pranav Chimote, Edward Fox, Trevor Hastie, Francesco Ferretti

Abstract:

Suitable shark conservation depends on well-informed population assessments. Direct methods such as scientific surveys and fisheries monitoring are adequate for defining population statuses, but species-specific indices of abundance and distribution coming from these sources are rare for most shark species. We can rapidly fill these information gaps by boosting media-based remote monitoring efforts with machine learning and automation. We created a database of shark images by sourcing 24,546 images covering 219 species of sharks from the web application spark pulse and the social network Instagram. We used object detection to extract shark features and inflate this database to 53,345 images. We packaged object-detection and image classification models into a Shark Detector bundle. We developed the Shark Detector to recognize and classify sharks from videos and images using transfer learning and convolutional neural networks (CNNs). We applied these models to common data-generation approaches of sharks: boosting training datasets, processing baited remote camera footage and online videos, and data-mining Instagram. We examined the accuracy of each model and tested genus and species prediction correctness as a result of training data quantity. The Shark Detector located sharks in baited remote footage and YouTube videos with an average accuracy of 89\%, and classified located subjects to the species level with 69\% accuracy (n =\ eight species). The Shark Detector sorted heterogeneous datasets of images sourced from Instagram with 91\% accuracy and classified species with 70\% accuracy (n =\ 17 species). Data-mining Instagram can inflate training datasets and increase the Shark Detector’s accuracy as well as facilitate archiving of historical and novel shark observations. Base accuracy of genus prediction was 68\% across 25 genera. The average base accuracy of species prediction within each genus class was 85\%. The Shark Detector can classify 45 species. All data-generation methods were processed without manual interaction. As media-based remote monitoring strives to dominate methods for observing sharks in nature, we developed an open-source Shark Detector to facilitate common identification applications. Prediction accuracy of the software pipeline increases as more images are added to the training dataset. We provide public access to the software on our GitHub page.

Keywords: classification, data mining, Instagram, remote monitoring, sharks

Procedia PDF Downloads 99
28295 Probing Syntax Information in Word Representations with Deep Metric Learning

Authors: Bowen Ding, Yihao Kuang

Abstract:

In recent years, with the development of large-scale pre-trained lan-guage models, building vector representations of text through deep neural network models has become a standard practice for natural language processing tasks. From the performance on downstream tasks, we can know that the text representation constructed by these models contains linguistic information, but its encoding mode and extent are unclear. In this work, a structural probe is proposed to detect whether the vector representation produced by a deep neural network is embedded with a syntax tree. The probe is trained with the deep metric learning method, so that the distance between word vectors in the metric space it defines encodes the distance of words on the syntax tree, and the norm of word vectors encodes the depth of words on the syntax tree. The experiment results on ELMo and BERT show that the syntax tree is encoded in their parameters and the word representations they produce.

Keywords: deep metric learning, syntax tree probing, natural language processing, word representations

Procedia PDF Downloads 47
28294 Carbonation of Wollastonite (001) competing Hydration: Microscopic Insights from Ion Spectroscopy and Density Functional Theory

Authors: Peter Thissen

Abstract:

In this work, we report about the influence of the chemical potential of water on the carbonation reaction of wollastonite (CaSiO3) as model surface of cement and concrete. Total energy calculations based on density functional theory (DFT) combined with kinetic barrier predictions based on nudge elastic band (NEB) method show that the exposure of the water-free wollastonite surface to CO2 results in a barrier-less carbonation. CO2 reacts with the surface oxygen and forms carbonate (CO32-) complexes together with a major reconstruction of the surface. The reaction comes to a standstill after one carbonate monolayer has been formed. In case one water monolayer is covering the wollastonite surface, the carbonation is no more barrier-less, yet ending in a localized monolayer. Covered with multilayers of water, the thermodynamic ground state of the wollastonite completely changes due to a metal-proton exchange reaction (MPER, also called early stage hydration) and Ca2+ ions are partially removed from solid phase into the H2O/wollastonite interface. Mobile Ca2+ react again with CO2 and form carbonate complexes, ending in a delocalized layer. By means of high resolution time-of-flight secondary-ion mass-spectroscopy images (ToF-SIMS), we confirm that hydration can lead to a partially delocalization of Ca2+ ions on wollastonite surfaces. Finally, we evaluate the impact of our model surface results by means of Low Energy Ion Scattering (LEIS) spectroscopy combined with careful discussion about the competing reactions of carbonation vs. hydration.

Keywords: Calcium-silicate, carbonation, hydration, metal-proton exchange reaction

Procedia PDF Downloads 347
28293 Lessons Learned from Covid19 - Related ERT in Universities

Authors: Sean Gay, Cristina Tat

Abstract:

This presentation will detail how a university in Western Japan has implemented its English for Academic Purposes (EAP) program during the onset of CoViD-19 in the spring semester of 2020. In the spring semester of 2020, after a 2 week delay, all courses within the School of Policy Studies EAP Program at Kwansei Gakuin University were offered in an online asynchronous format. The rationale for this decision was not to disadvantage students who might not have access to devices necessary for taking part in synchronous online lessons. The course coordinators were tasked with consolidating the materials originally designed for face-to-face14 week courses for a 12 week asynchronous online semester and with uploading the modified course materials to Luna, the university’s network, which is a modified version of Blackboard. Based on research to determine the social and academic impacts of this CoViD-19 ERT approach on the students who took part in this EAP program, this presentation explains how future curriculum design and implementation can be managed in a post-CoViD world. There are a wide variety of lessons that were salient. The role of the classroom as a social institution was very prominent; however, awareness of cognitive burdens and strategies to mitigate that burden may be more valuable for teachers. The lessons learned during this period of ERT can help teachers moving forward.

Keywords: asynchronous online learning, emergency remote teaching (ERT), online curriculum design, synchronous online learning

Procedia PDF Downloads 188
28292 Assessing Performance of Data Augmentation Techniques for a Convolutional Network Trained for Recognizing Humans in Drone Images

Authors: Masood Varshosaz, Kamyar Hasanpour

Abstract:

In recent years, we have seen growing interest in recognizing humans in drone images for post-disaster search and rescue operations. Deep learning algorithms have shown great promise in this area, but they often require large amounts of labeled data to train the models. To keep the data acquisition cost low, augmentation techniques can be used to create additional data from existing images. There are many techniques of such that can help generate variations of an original image to improve the performance of deep learning algorithms. While data augmentation is potentially assumed to improve the accuracy and robustness of the models, it is important to ensure that the performance gains are not outweighed by the additional computational cost or complexity of implementing the techniques. To this end, it is important to evaluate the impact of data augmentation on the performance of the deep learning models. In this paper, we evaluated the most currently available 2D data augmentation techniques on a standard convolutional network which was trained for recognizing humans in drone images. The techniques include rotation, scaling, random cropping, flipping, shifting, and their combination. The results showed that the augmented models perform 1-3% better compared to a base network. However, as the augmented images only contain the human parts already visible in the original images, a new data augmentation approach is needed to include the invisible parts of the human body. Thus, we suggest a new method that employs simulated 3D human models to generate new data for training the network.

Keywords: human recognition, deep learning, drones, disaster mitigation

Procedia PDF Downloads 76
28291 Constructivist Design Approaches to Video Production for Distance Education in Business and Economics

Authors: C. von Essen

Abstract:

This study outlines and evaluates a constructivist design approach to the creation of educational video on postgraduate business degree programmes. Many online courses are tapping into the educational affordances of video, as this form of online learning has the potential to create rich, multimodal experiences. And yet, in many learning contexts video is still being used to transmit instruction to passive learners, rather than promote learner engagement and knowledge creation. Constructivism posits the notion that learning is shaped as students make connections between their experiences and ideas. This paper pivots on the following research question: how can we design educational video in ways which promote constructivist learning and stimulate analytic viewing? By exploring and categorizing over two thousand educational videos created since 2014 for over thirty postgraduate courses in business, economics, mathematics and statistics, this paper presents and critically reflects on a taxonomy of video styles and features. It links the pedagogical intent of video – be it concept explanation, skill demonstration, feedback, real-world application of ideas, community creation, or the cultivation of course narrative – to specific presentational characteristics such as visual effects including diagrammatic and real-life graphics and aminations, commentary and sound options, chronological sequencing, interactive elements, and presenter set-up. The findings of this study inform a framework which captures the pedagogical, technological and production considerations instructional designers and educational media specialists should be conscious of when planning and preparing the video. More broadly, the paper demonstrates how learning theory and technology can coalesce to produce informed and pedagogical grounded instructional design choices. This paper reveals how crafting video in a more conscious and critical manner can produce powerful, new educational design.

Keywords: educational video, constructivism, instructional design, business education

Procedia PDF Downloads 220
28290 Working with Interpreters: Using Role Play to Teach Social Work Students

Authors: Yuet Wah Echo Yeung

Abstract:

Working with people from minority ethnic groups, refugees and asylum seeking communities who have limited proficiency in the language of the host country often presents a major challenge for social workers. Because of language differences, social workers need to work with interpreters to ensure accurate information is collected for their assessment and intervention. Drawing from social learning theory, this paper discusses how role play was used as an experiential learning exercise in a training session to help social work students develop skills when working with interpreters. Social learning theory posits that learning is a cognitive process that takes place in a social context when people observe, imitate and model others’ behaviours. The roleplay also helped students understand the role of the interpreter and the challenges they may face when they rely on interpreters to communicate with service users and their family. The first part of the session involved role play. A tutor played the role of social worker and deliberately behaved in an unprofessional manner and used inappropriate body language when working alongside the interpreter during a home visit. The purpose of the roleplay is not to provide a positive role model for students to ‘imitate’ social worker’s behaviours. Rather it aims to active and provoke internal thinking process and encourages students to critically consider the impacts of poor practice on relationship building and the intervention process. Having critically reflected on the implications for poor practice, students were then asked to play the role of social worker and demonstrate what good practice should look like. At the end of the session, students remarked that they learnt a lot by observing the good and bad example; it showed them what not to do. The exercise served to remind students how practitioners can easily slip into bad habits and of the importance of respect for the cultural difference when working with people from different cultural backgrounds.

Keywords: role play, social learning theory, social work practice, working with interpreters

Procedia PDF Downloads 165
28289 Development of Strategic Cooperation in Managing Thailand-Myanmar Borders: Roles of Education in Enhancing Sustainability

Authors: Rungrot Trongsakul

Abstract:

This paper was aimed to study the strategic cooperation development of Thailand in accordance with the door open policy of Myanmar, by use of DIMES Model: Diplomacy, Information, Military and Economics, Socio-Culture. This research employed qualitative method, aiming to study, analyze and synthesize the content of laws, policies, relevant research papers and documents, and relevant theories, and to study external environment and national power based on DIMES Model. The five steps of strategic development utilized in this study included (1) conceptual framework and definition; (2) environmental scanning; (3) assessing; (4) determining; and (5) drafting strategic plan. The suggested strategies were based on the concept of 'Soft Power'. Therefore, the determination of measures, action plans or projects as strategic means of public and private organizations should be based on sincere participation among people and communities living on the borders shared by both countries. Adoption of education, learning and sharing process is a key to building sustainability of the countries’ strategic cooperation, while an application of 'Soft Power' in all dimensions of the cooperation between the two countries was suggested.

Keywords: education, strategic cooperation, Thailand-Myanmar borders, sustainability

Procedia PDF Downloads 338
28288 Environment Situation Analysis of Germany

Authors: K. Y. Chen, H. Chua, C. W. Kan

Abstract:

In this study, we will analyze Germany’s environmental situation such as water and air quality and review its environmental policy. In addition, we will collect the yearly environmental data as well as information concerning public environmental investment. Based on the data collect, we try to find out the relationship between public environmental investment and sustainable development in Germany. In addition, after comparing the trend of environmental quality and situation of environmental policy and investment, we may have some conclusions and learnable aspects to refer to. Based upon the data collected, it was revealed that Germany has established a well-developed institutionalization of environmental education. And the ecological culture at school is dynamic and continuous renewal. The booming of green markets in Germany is a very successful experience for learning. The green market not only creates a number of job opportunities, but also helps the government to improve and protect the environment. Acknowledgement: Authors would like to thank the financial support from the Hong Kong Polytechnic University for this work.

Keywords: Germany, public environmental investment, environment quality, sustainable development

Procedia PDF Downloads 235
28287 Prep: Pause, Reset, Establish Expectations, and Proceed. A Practical Approach for Classroom Transitions

Authors: Shane-Anthony Smith

Abstract:

Teachers across grade levels and content areas face a myriad of challenges in the classroom. From inconsistent attendance to disruptive behaviors, these challenges can have a dire impact on the educational space, untimely leading to a loss of instructional time and student disenfranchisement from learning. While these challenges are not new to the educational landscape, the post-COVID classroom has, in many instances, been more severely impacted by behaviors that are not conducive to learning. Despite the mounting challenges, the role of the teacher remains unchanged - that is, to create and maintain a safe environment that is conducive to learning and promotes successful learning outcomes. Accomplishing this feat is no easy task. Yet, there are steps teachers can - indeed, must - take to better set themselves and their students up for success. The key to achieving this success is effective classroom transitions. This paper presents a four-step approach for teachers to engage in successful classroom transitions to promote meaningful student engagement and active positive learning outcomes. The transition strategy I will explore is called PREP (Pause, Reset, Establish Expectations, and Proceed). I developed this strategy in my work as a Residency Director for my university’s teacher residency program. In this role, I am tasked with coaching emerging teachers and their in-service teaching mentors in the field, as well as providing mentorship to special education resident teachers pursuing teaching degrees in the program. As a teacher educator, being in Middle and High school classrooms provides an intricate and critical understanding of the challenges, opportunities, and possibilities in the classroom. For this paper, I will explore how teachers can optimize the opportunities PREP provides to keep students engaged and, thus, improve student achievement. I will describe the approach, explain its use, and provide case-study examples of its classroom application.

Keywords: classroom management, teaching strategies, student engagement, classroom transition

Procedia PDF Downloads 64
28286 The Reflections of the K-12 English Language Teachers on the Implementation of the K-12 Basic Education Program in the Philippines

Authors: Dennis Infante

Abstract:

This paper examined the reflections of teachers on curriculum reforms, the implementation of the K-12 Basic Education Program in the Philippines. The results revealed that problems and concerns raised by teachers could be classified into curriculum materials and design; competence, readiness and motivation of the teachers; the learning environment, and support systems; readiness, competence and motivation of students; and other relevant factors. The best features of the K-12 curriculum reforms included (1) the components, curriculum materials; (2) the design, structure and delivery of the lessons; (3) the framework and theoretical approach; (3) the qualities of the teaching-learning activities; (4) and other relevant features. With the demanding task of implementing the new curriculum, the teachers expressed their needs which included (1) making the curriculum materials available to achieve the goals of the curriculum reforms; (2) enrichment of the learning environments; (3) motivating and encouraging the teachers to embrace change; (4) providing appropriate support systems; (5) re-tooling, and empowering teachers to implement the curriculum reforms; and (6) other relevant factors. The research concluded with a synthesis that provided a paradigm for implementing curriculum reforms which recognizes the needs of the teachers and the features of the new curriculum.

Keywords: curriculum reforms, K-12, teachers' reflections, implementing curriculum change

Procedia PDF Downloads 261
28285 Profiling Risky Code Using Machine Learning

Authors: Zunaira Zaman, David Bohannon

Abstract:

This study explores the application of machine learning (ML) for detecting security vulnerabilities in source code. The research aims to assist organizations with large application portfolios and limited security testing capabilities in prioritizing security activities. ML-based approaches offer benefits such as increased confidence scores, false positives and negatives tuning, and automated feedback. The initial approach using natural language processing techniques to extract features achieved 86% accuracy during the training phase but suffered from overfitting and performed poorly on unseen datasets during testing. To address these issues, the study proposes using the abstract syntax tree (AST) for Java and C++ codebases to capture code semantics and structure and generate path-context representations for each function. The Code2Vec model architecture is used to learn distributed representations of source code snippets for training a machine-learning classifier for vulnerability prediction. The study evaluates the performance of the proposed methodology using two datasets and compares the results with existing approaches. The Devign dataset yielded 60% accuracy in predicting vulnerable code snippets and helped resist overfitting, while the Juliet Test Suite predicted specific vulnerabilities such as OS-Command Injection, Cryptographic, and Cross-Site Scripting vulnerabilities. The Code2Vec model achieved 75% accuracy and a 98% recall rate in predicting OS-Command Injection vulnerabilities. The study concludes that even partial AST representations of source code can be useful for vulnerability prediction. The approach has the potential for automated intelligent analysis of source code, including vulnerability prediction on unseen source code. State-of-the-art models using natural language processing techniques and CNN models with ensemble modelling techniques did not generalize well on unseen data and faced overfitting issues. However, predicting vulnerabilities in source code using machine learning poses challenges such as high dimensionality and complexity of source code, imbalanced datasets, and identifying specific types of vulnerabilities. Future work will address these challenges and expand the scope of the research.

Keywords: code embeddings, neural networks, natural language processing, OS command injection, software security, code properties

Procedia PDF Downloads 92
28284 Assessing the Corporate Identity of Malaysia Universities in the East Coast Region with the Market Conditions in Ensuring Self-Sustainability: A Study on Universiti Sultan Zainal Abidin

Authors: Suffian Hadi Ayub, Mohammad Rezal Hamzah, Nor Hafizah Abdullah, Sharipah Nur Mursalina Syed Azmy, Hishamuddin Salim

Abstract:

The liberalisation of the education industry has exposed the institute of higher learning (IHL) in Malaysia to the financial challenges. Without good financial standing, public institution will rely on the government funding. Ostensibly, this contradicts with the government’s aspiration to make universities self-sufficient. With stiff competition from private institutes of higher learning, IHL need to be prepared at the forefront level. The corporate identity itself is the entrance to the world of higher learning and it is in this uniqueness, it will be able to distinguish itself from competitors. This paper examined the perception of the stakeholders at one of the public universities in the east coast region in Malaysia on the perceived reputation and how the university communicate its preparedness for self-sustainability through corporate identity. The findings indicated while the stakeholders embraced the challenges in facing the stiff competition and struggling market conditions, most of them felt the university should put more efforts in mobilising the corporate identity to its constituencies.

Keywords: communication, corporate identity, market conditions, universities

Procedia PDF Downloads 295
28283 Land Cover Remote Sensing Classification Advanced Neural Networks Supervised Learning

Authors: Eiman Kattan

Abstract:

This study aims to evaluate the impact of classifying labelled remote sensing images conventional neural network (CNN) architecture, i.e., AlexNet on different land cover scenarios based on two remotely sensed datasets from different point of views such as the computational time and performance. Thus, a set of experiments were conducted to specify the effectiveness of the selected convolutional neural network using two implementing approaches, named fully trained and fine-tuned. For validation purposes, two remote sensing datasets, AID, and RSSCN7 which are publicly available and have different land covers features were used in the experiments. These datasets have a wide diversity of input data, number of classes, amount of labelled data, and texture patterns. A specifically designed interactive deep learning GPU training platform for image classification (Nvidia Digit) was employed in the experiments. It has shown efficiency in training, validation, and testing. As a result, the fully trained approach has achieved a trivial result for both of the two data sets, AID and RSSCN7 by 73.346% and 71.857% within 24 min, 1 sec and 8 min, 3 sec respectively. However, dramatic improvement of the classification performance using the fine-tuning approach has been recorded by 92.5% and 91% respectively within 24min, 44 secs and 8 min 41 sec respectively. The represented conclusion opens the opportunities for a better classification performance in various applications such as agriculture and crops remote sensing.

Keywords: conventional neural network, remote sensing, land cover, land use

Procedia PDF Downloads 349
28282 Real-Time Online Tracking Platform

Authors: Denis Obrul, Borut Žalik

Abstract:

We present an extendable online real-time tracking platform that can be used to track a wide variety of location-aware devices. These can range from GPS devices mounted inside a vehicle, closed and secure systems such as Teltonika and to mobile phones running multiple platforms. Special consideration is given to decentralized approach, security and flexibility. A number of different use cases are presented as a proof of concept.

Keywords: real-time, online, gps, tracking, web application

Procedia PDF Downloads 337
28281 Comparing Deep Architectures for Selecting Optimal Machine Translation

Authors: Despoina Mouratidis, Katia Lida Kermanidis

Abstract:

Machine translation (MT) is a very important task in Natural Language Processing (NLP). MT evaluation is crucial in MT development, as it constitutes the means to assess the success of an MT system, and also helps improve its performance. Several methods have been proposed for the evaluation of (MT) systems. Some of the most popular ones in automatic MT evaluation are score-based, such as the BLEU score, and others are based on lexical similarity or syntactic similarity between the MT outputs and the reference involving higher-level information like part of speech tagging (POS). This paper presents a language-independent machine learning framework for classifying pairwise translations. This framework uses vector representations of two machine-produced translations, one from a statistical machine translation model (SMT) and one from a neural machine translation model (NMT). The vector representations consist of automatically extracted word embeddings and string-like language-independent features. These vector representations used as an input to a multi-layer neural network (NN) that models the similarity between each MT output and the reference, as well as between the two MT outputs. To evaluate the proposed approach, a professional translation and a "ground-truth" annotation are used. The parallel corpora used are English-Greek (EN-GR) and English-Italian (EN-IT), in the educational domain and of informal genres (video lecture subtitles, course forum text, etc.) that are difficult to be reliably translated. They have tested three basic deep learning (DL) architectures to this schema: (i) fully-connected dense, (ii) Convolutional Neural Network (CNN), and (iii) Long Short-Term Memory (LSTM). Experiments show that all tested architectures achieved better results when compared against those of some of the well-known basic approaches, such as Random Forest (RF) and Support Vector Machine (SVM). Better accuracy results are obtained when LSTM layers are used in our schema. In terms of a balance between the results, better accuracy results are obtained when dense layers are used. The reason for this is that the model correctly classifies more sentences of the minority class (SMT). For a more integrated analysis of the accuracy results, a qualitative linguistic analysis is carried out. In this context, problems have been identified about some figures of speech, as the metaphors, or about certain linguistic phenomena, such as per etymology: paronyms. It is quite interesting to find out why all the classifiers led to worse accuracy results in Italian as compared to Greek, taking into account that the linguistic features employed are language independent.

Keywords: machine learning, machine translation evaluation, neural network architecture, pairwise classification

Procedia PDF Downloads 114
28280 Machine Learning Invariants to Detect Anomalies in Secure Water Treatment

Authors: Jonathan Heng, Yoong Cheah Huei

Abstract:

A strategic model that does not trigger any false alarms to detect anomalies in Secure Water Treatment (SWaT) test bed is presented. This model uses machine learning invariants formulated from streamlining the general form of Auto-Regressive models with eXogenous input. A creative generalized CUSUM algorithm to integrate the invariants and the detection strategy technique is successfully developed and tested in the SWaT Programmable Logic Controllers (PLCs). Three steps to fine-tune parameters, b and τ in the generalized algorithm are stated and an example used to demonstrate the tuning process is discussed. This approach can swiftly and effectively detect various scopes of cyber-attacks such as multiple points single stage and multiple points multiple stages in SWaT. This technique can be applied in water treatment plants and other cyber physical systems like power and gas plants too.

Keywords: machine learning invariants, generalized CUSUM algorithm with invariants and detection strategy, scope of cyber attacks, strategic model, tuning parameters

Procedia PDF Downloads 166
28279 Effects of in silico (Virtual Lab) And in vitro (inside the Classroom) Labs in the Academic Performance of Senior High School Students in General Biology

Authors: Mark Archei O. Javier

Abstract:

The Fourth Industrial Revolution (FIR) is a major industrial era characterized by the fusion of technologies that is blurring the lines between the physical, digital, and biological spheres. Since this era teaches us how to thrive in the fast-paced developing world, it is important to be able to adapt. With this, there is a need to make learning and teaching in the bioscience laboratory more challenging and engaging. The goal of the research is to find out if using in silico and in vitro laboratory activities compared to the conventional conduct laboratory activities would have positive impacts on the academic performance of the learners. The potential contribution of the research is that it would improve the teachers’ methods in delivering the content to the students when it comes to topics that need laboratory activities. This study will develop a method by which teachers can provide learning materials to the students. A one-tailed t-Test for independent samples was used to determine the significant difference in the pre- and post-test scores of students. The tests of hypotheses were done at a 0.05 level of significance. Based on the results of the study, the gain scores of the experimental group are greater than the gain scores of the control group. This implies that using in silico and in vitro labs for the experimental group is more effective than the conventional method of doing laboratory activities.

Keywords: academic performance, general biology, in silico laboratory, in vivo laboratory, virtual laboratory

Procedia PDF Downloads 181
28278 Meditation-Based Interventions in the Workplace

Authors: Louise Fitzgerald, John Allman

Abstract:

Introduction: Having previously engaged in a meditation-based programme (MBP) for staff in general practice, we explore the evidence and extent to which MBPs are employed in the workplace. Aim of the study: We aim to understand the current workplace MBP intervention literature, which will help inform the suitability of these interventions within the workplace domain. Objectives: Uptake of MBPs in the workplace has grown as organizations look to support employee health, wellbeing, and performance. We will discuss the current MBP literature, including the large variability across MBPs and the associated difficulties in evaluating their efficacy. Learning points: 1) MBPs have a positive impact on cognitive function including concentration and memory and as such job performance. MBPs appear to have a positive impact on objective and subjective job satisfaction, productivity, motivation and work engagement. Meditation in the workplace may have positive impacts on mental health issues - including stress reduction and depression. 2) From our review MBPs appear to be implementable in a wide range of professions and work contexts - regardless of individual factors. Given many companies are focusing on health and wellbeing of employees, this could be included in employee wellbeing programmes. 3) Despite the benefits of mindfulness and meditation interventions in psychosocial workplace health and work performance the long-term efficacy has yet to be fully determined.

Keywords: meditation-based programmes, mindfulness, meditation, well-being

Procedia PDF Downloads 127
28277 Intelligent Control of Agricultural Farms, Gardens, Greenhouses, Livestock

Authors: Vahid Bairami Rad

Abstract:

The intelligentization of agricultural fields can control the temperature, humidity, and variables affecting the growth of agricultural products online and on a mobile phone or computer. Smarting agricultural fields and gardens is one of the best and best ways to optimize agricultural equipment and has a 100 percent direct effect on the growth of plants and agricultural products and farms. Smart farms are the topic that we are going to discuss today, the Internet of Things and artificial intelligence. Agriculture is becoming smarter every day. From large industrial operations to individuals growing organic produce locally, technology is at the forefront of reducing costs, improving results and ensuring optimal delivery to market. A key element to having a smart agriculture is the use of useful data. Modern farmers have more tools to collect intelligent data than in previous years. Data related to soil chemistry also allows people to make informed decisions about fertilizing farmland. Moisture meter sensors and accurate irrigation controllers have made the irrigation processes to be optimized and at the same time reduce the cost of water consumption. Drones can apply pesticides precisely on the desired point. Automated harvesting machines navigate crop fields based on position and capacity sensors. The list goes on. Almost any process related to agriculture can use sensors that collect data to optimize existing processes and make informed decisions. The Internet of Things (IoT) is at the center of this great transformation. Internet of Things hardware has grown and developed rapidly to provide low-cost sensors for people's needs. These sensors are embedded in IoT devices with a battery and can be evaluated over the years and have access to a low-power and cost-effective mobile network. IoT device management platforms have also evolved rapidly and can now be used securely and manage existing devices at scale. IoT cloud services also provide a set of application enablement services that can be easily used by developers and allow them to build application business logic. Focus on yourself. These development processes have created powerful and new applications in the field of Internet of Things, and these programs can be used in various industries such as agriculture and building smart farms. But the question is, what makes today's farms truly smart farms? Let us put this question in another way. When will the technologies associated with smart farms reach the point where the range of intelligence they provide can exceed the intelligence of experienced and professional farmers?

Keywords: food security, IoT automation, wireless communication, hybrid lifestyle, arduino Uno

Procedia PDF Downloads 40
28276 Partial Knowledge Transfer Between the Source Problem and the Target Problem in Genetic Algorithms

Authors: Terence Soule, Tami Al Ghamdi

Abstract:

To study how the partial knowledge transfer may affect the Genetic Algorithm (GA) performance, we model the Transfer Learning (TL) process using GA as the model solver. The objective of the TL is to transfer the knowledge from one problem to another related problem. This process imitates how humans think in their daily life. In this paper, we proposed to study a case where the knowledge transferred from the S problem has less information than what the T problem needs. We sampled the transferred population using different strategies of TL. The results showed transfer part of the knowledge is helpful and speeds the GA process of finding a solution to the problem.

Keywords: transfer learning, partial transfer, evolutionary computation, genetic algorithm

Procedia PDF Downloads 116
28275 The Opinions of Nursing Students Regarding Humanized Care through Volunteer Activities at Boromrajonani College of Nursing, Chonburi

Authors: P. Phenpun, S. Wareewan

Abstract:

This qualitative study aimed to describe the opinions in relation to humanized care emerging from the volunteer activities of nursing students at Boromarajonani College of Nursing, Chonburi, Thailand. One hundred and twenty-seven second-year nursing students participated in this study. The volunteer activity model was composed of preparation, implementation, and evaluation through a learning log, in which students were encouraged to write their daily activities after completing practical training at the healthcare center. The preparation content included three main categories: service minded, analytical thinking, and client participation. The preparation process took over three days that accumulates up to 20 hours only. The implementation process was held over 10 days, but with a total of 70 hours only, with participants taking part in volunteer work activities at a healthcare center. A learning log was used for evaluation and data were analyzed using content analysis. The findings were as follows. With service minded, there were two subcategories that emerged from volunteer activities, which were service minded towards patients and within themselves. There were three categories under service minded towards patients, which were rapport, compassion, and empathy service behaviors, and there were four categories under service minded within themselves, which were self-esteem, self-value, management potential, and preparedness in providing good healthcare services. In line with analytical thinking, there were two components of analytical thinking, which were analytical skill for their works and analytical thinking for themselves. There were four subcategories under analytical thinking for their works, which were evidence based thinking, real situational thinking, cause analysis thinking, and systematic thinking, respectively. There were four subcategories under analytical thinking for themselves, which were comparative between themselves, towards their clients that leads to the changing of their service behaviors, open-minded thinking, modernized thinking, and verifying both verbal and non-verbal cues. Lastly, there were three categories under participation, which were mutual rapport relationship; reconsidering client’s needs services and providing useful health care information.

Keywords: humanized care service, volunteer activity, nursing student, learning log

Procedia PDF Downloads 295
28274 Analyzing Perceptions of Leadership Capacities After a Year-Long Leadership Development Training: An Exploratory Study of School Leaders in South Africa

Authors: Norma Kok, Diemo Masuko, Thandokazi Dlongwana, Komala Pillay

Abstract:

CONTEXT: While many school principals have been outstanding teachers and have inherent leadership potential, many have not had access to the quality of leadership development or support that empowers them to produce high-quality education outcomes in extremely challenging circumstances. Further, school leaders in under-served communities face formidable challenges arising from insufficient infrastructure, overcrowded classrooms, socio-economic challenges within the community, and insufficient parental involvement, all of which put a strain on principals’ ability to lead their schools effectively. In addition few school leaders have access to other supportive networks, and many do not know how to build and leverage social capital to create opportunities for their schools and learners. Moreover, we know that fostering parental involvement in their children’s learning improves a child’s morale, attitude, and academic achievement across all subject areas, and promotes better behaviour and social adjustment. Citizen Leader Lab facilitates the Partners for Possibility (PfP) programme to provide leadership development and support to school leaders serving under-resourced communities in South Africa to create effective environments of learning. This is done by creating partnerships between school leaders and private-sector business leaders over a 12-month period. (185) OBJECTIVES: To explore school leaders’ perceptions of their leadership capacities and changes at their schools after being exposed to a year-long leadership development training programme. METHODS: School leaders gained new leadership capacities e.g. resilience, improved confidence, communication and conflict resolution skills - catalysing into improved cultures of collaborative decision-making and environments for enhanced teaching and learningprogramme based on the 70:20:10 model whereby: 10% of learning comes from workshops, 20% of learning takes place through peer learning and 70% of learning occurs through experiential learning as partnerships work together to identify and tackle challenges in targeted schools. Participants completed a post-programme questionnaire consisting of structured and unstructured questions and semi-structured interviews were conducted with them and their business leader. The interviews were audio-recorded, transcribed and thematic content analysis was undertaken. The analysis was inductive and emerging themes were identified. A code list was generated after coding was undertaken using computer software (Dedoose). Quantitative data gathered from surveys was aggregated and analysed. RESULTS: School leadership found the programme interesting and rewarding. They gained new leadership capacities such as resilience, improved confidence, communication and conflict resolution skills - catalyzing into improved cultures of collaborative decision-making and environments for enhanced teaching and learning. New networks resulted in tangible outcomes such as upgrades to school infrastructure, water and sanitation, vegetable gardens at schools resulting in nutrition for learners and/or intangible outcomes such as skills for members of school management teams (SMTs). Collaborative leadership led to SMTs being more aligned, efficient, and cohesive; and teachers being more engaged and motivated. Notable positive changes at the school inspired parents and community members to become more actively involved in the school and in their children’s education. CONCLUSION: The PfP programme leads to improved leadership capacities and improved school culture which leads to improved teaching and learning and new resources for schools.

Keywords: collaborative decision-making, collaborative leadership, community involvement, confidence

Procedia PDF Downloads 72
28273 An Authentication Protocol for Quantum Enabled Mobile Devices

Authors: Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel

Abstract:

The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutions for symmetric key exchange issues. An important part of this work is to propose a secure mutual authentication protocol over the quantum channel. We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads.

Keywords: quantum cryptography, quantum key distribution, wireless quantum communication, authentication protocol, quantum enabled device, trusted third party

Procedia PDF Downloads 158
28272 Life Stories of Adult Amateur Cellists That Inspire Them to Take Individual Lessons: A Narrative Inquiry

Authors: A. Marais

Abstract:

A challenging aspect of teaching cello to novice adult learners is finding adequate lesson material and applying relevant teaching methodologies. It could play a crucial role in adult learners' decision to commence or stop taking music lessons. This study contributes to the theory and practises of continuing education. This study is important to lifelong learning, especially with the focus on adult teaching and learning and the difficulties concerning these themes. The research problem identified for this study is we are not aware of adults' life stories; thus, cello lesson material is not always relevant for adult's specific needs for motivation and goals for starting cello lessons. In my experience, an adult does not necessarily want to play children songs when they learn a new instrument. They want material and lessons fitted to adult learners. Adults also learn differently from younger beginners. Adults ask questions such as how and why, while children more readily accept what is being taught. This research creates awareness of adults' musical needs and learning methods. If every adult shares their own story for commencing and continuing with cello lessons, material should be created, revised, or adapted for more individually appropriate lessons. A number of studies show that adults taking music lessons experience a decrease in feelings of loneliness and isolation. It gives adults a sense of wellbeing and can help improve immune systems. The purpose of this research study will be to discover the life stories of adult amateur cellists. At this stage in the research, the life stories of amateur cellists can generally be defined as personal reflections of their motivations for and experiences of commencing and continuing with individual lessons. The findings of this study will contribute to the development of cello lesson material for adult beginners based on their stories. This research could also encourage adults to commence with music lessons and could, in that way, contribute to their quality of life. Music learners become aware of deep spiritual, emotional, and social values incorporated or experienced through musical learning. This will be a qualitative study with a narrative approach making use of oral history. The chosen method will encapsulate the stories of amateur individual adults starting and continuing with cello lessons. The narrative method entails experiences as expressed in lived and told stories of individuals. Oral history is used as part of the narrative method and entails gathering of personal reflections of events and their cause and effects from an individual or several individuals. These findings from this study will contribute to adult amateur cellists' motivations to continue with music lessons and inspire others to commence. The inspiring life stories of the amateur cellists would provide insight into finding and creating new cello lesson material and enhance existing teaching methodologies for adult amateur cellists.

Keywords: adult, amateur, cello, education, learning, music, stories

Procedia PDF Downloads 119
28271 Opinions of Pre-Service Teachers on Online Language Teaching: COVID-19 Pandemic Perspective

Authors: Neha J. Nandaniya

Abstract:

In the present research paper researcher put focuses on the opinions of pre-service teachers have been taken regarding online language teaching, which was held during the COVID-19 pandemic and is still going on. The researcher developed a three-point rating scale in Google Forms to find out the views of trainees on online language learning, in which 167 B. Ed. trainees having language content and method gave their responses. After scoring the responses obtained by the investigator, the chi-square value was calculated, and the findings were concluded. The major finding of the study is language learning is not as effective as offline teaching mode.

Keywords: online language teaching, ICT competency, B. Ed. trainees, COVID-19 pandemic

Procedia PDF Downloads 69
28270 Modelling the Impact of Installation of Heat Cost Allocators in District Heating Systems Using Machine Learning

Authors: Danica Maljkovic, Igor Balen, Bojana Dalbelo Basic

Abstract:

Following the regulation of EU Directive on Energy Efficiency, specifically Article 9, individual metering in district heating systems has to be introduced by the end of 2016. These directions have been implemented in member state’s legal framework, Croatia is one of these states. The directive allows installation of both heat metering devices and heat cost allocators. Mainly due to bad communication and PR, the general public false image was created that the heat cost allocators are devices that save energy. Although this notion is wrong, the aim of this work is to develop a model that would precisely express the influence of installation heat cost allocators on potential energy savings in each unit within multifamily buildings. At the same time, in recent years, a science of machine learning has gain larger application in various fields, as it is proven to give good results in cases where large amounts of data are to be processed with an aim to recognize a pattern and correlation of each of the relevant parameter as well as in the cases where the problem is too complex for a human intelligence to solve. A special method of machine learning, decision tree method, has proven an accuracy of over 92% in prediction general building consumption. In this paper, a machine learning algorithms will be used to isolate the sole impact of installation of heat cost allocators on a single building in multifamily houses connected to district heating systems. Special emphasises will be given regression analysis, logistic regression, support vector machines, decision trees and random forest method.

Keywords: district heating, heat cost allocator, energy efficiency, machine learning, decision tree model, regression analysis, logistic regression, support vector machines, decision trees and random forest method

Procedia PDF Downloads 232
28269 A Survey of Novel Opportunistic Routing Protocols in Mobile Ad Hoc Networks

Authors: R. Poonkuzhali, M. Y. Sanavullah, M. R. Gurupriya

Abstract:

Opportunistic routing is used, where the network has the features like dynamic topology changes and intermittent network connectivity. In Delay Tolerant network or Disruption tolerant network opportunistic forwarding technique is widely used. The key idea of opportunistic routing is selecting forwarding nodes to forward data and coordination among these nodes to avoid duplicate transmissions. This paper gives the analysis of pros and cons of various opportunistic routing techniques used in MANET.

Keywords: ETX, opportunistic routing, PSR, throughput

Procedia PDF Downloads 477