Search results for: structured query language (SQL)
2163 Integrated Risk Management in The Supply Chain of Essential Medicines in Zambia
Authors: Mario M. J. Musonda
Abstract:
Access to health care is a human right, which includes having timely access to affordable and quality essential medicines at the right place and in sufficient quantity. However, inefficient public sector supply chain management contributes to constant shortages of essential medicines at health facilities. Literature review involved a desktop study of published research studies and reports on risk management, supply chain management of essential medicines and their integration to increase the efficiency of the latter. The research was conducted on a sample population of offices under Ministry of Health Headquarters, Lusaka Provincial and District Offices, selected health facilities in Lusaka, Medical Stores Limited, Zambia Medicines Regulatory Authority and Cooperating Partners. Individuals involved in study were selected judgmentally by their functions under selection and quantification, regulation, procurement, storage, distribution, quality assurance, and dispensing of essential medicines. Structured interviews and discussions were held with selected experts and self-administered questionnaires were distributed. Collected and analysed data of 35 returned and usable questionnaires from the 50 distributed. The highest prioritised risks were; inadequate and inconsistent fund disbursements, weak information management systems, weak quality management systems and insufficient resources (HR and infrastructure) among others. The results for this research can be used to increase the efficiency of the public sector supply chain of essential medicines and other pharmaceuticals. The results of the study showed that there is need to implement effective risk management systems by participating institutions and organisations to increase the efficiency of the entire supply chain in order to avoid and/or reduce shortages of essential medicines at health facilities.Keywords: essential medicine, risk assessment, risk management, supply chain, supply chain risk management
Procedia PDF Downloads 4432162 Use of Oral Communication Strategies: A Study of Bangladeshi EFL Learners at the Graduate Level
Authors: Afroza Akhter Tina
Abstract:
This paper reports on an investigation into the use of specific types of oral communication strategies, namely ‘topic avoidance’, ‘message abandonment’, ‘code-switching’, ‘paraphrasing’, ‘restructuring’, and ‘stalling’ by Bangladeshi EFL learners at the graduate level. It chiefly considers the frequency of using these strategies as well as the students and teachers attitudes toward such uses. The participants of this study are 66 EFL students and 12 EFL teachers of Jahangirnagar University. Data was collected through questionnaire, oral interview, and classroom observation form. The findings reveal that the EFL students tried to employ all the strategies to various extents due to the language difficulties they encountered in their oral English performance. Among them, the mostly used strategy was ‘stalling’ or the use of fillers, followed by ‘code-switching’. The least used strategies were ‘topic avoidance’, ‘restructuring’, and ‘paraphrasing’. The findings indicate that the use of such strategies was related to the contexts of situation and data-elicitation tasks. It also reveals that the students were not formally trained to use the strategies though the majority of the teachers and students acknowledge them as helpful in communication. Finally the study suggests that an awareness of the nature and functions of these strategies can contribute to the overall improvement of the learners’ communicative competence in spoken English.Keywords: communicative strategies, competency, attitude, frequency
Procedia PDF Downloads 4082161 Harnessing Artificial Intelligence and Machine Learning for Advanced Fraud Detection and Prevention
Authors: Avinash Malladhi
Abstract:
Forensic accounting is a specialized field that involves the application of accounting principles, investigative skills, and legal knowledge to detect and prevent fraud. With the rise of big data and technological advancements, artificial intelligence (AI) and machine learning (ML) algorithms have emerged as powerful tools for forensic accountants to enhance their fraud detection capabilities. In this paper, we review and analyze various AI/ML algorithms that are commonly used in forensic accounting, including supervised and unsupervised learning, deep learning, natural language processing Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), Support Vector Machines (SVMs), Decision Trees, and Random Forests. We discuss their underlying principles, strengths, and limitations and provide empirical evidence from existing research studies demonstrating their effectiveness in detecting financial fraud. We also highlight potential ethical considerations and challenges associated with using AI/ML in forensic accounting. Furthermore, we highlight the benefits of these technologies in improving fraud detection and prevention in forensic accounting.Keywords: AI, machine learning, forensic accounting & fraud detection, anti money laundering, Benford's law, fraud triangle theory
Procedia PDF Downloads 932160 Exploring the Barriers Regarding Safe Discussions about Menopausal Symptom Management, as Perceived or Experienced by Pre-menopausal and Menopausal Women.
Authors: Karish Thavabalan, Alistair Ovenell, Aman Sutaria, Annabelle Parkhouse, Numan Baydemir, Theodore Lally
Abstract:
Background: Open discussions surrounding menopause are often associated with stigma, with many women feeling uncomfortable to engage in them with friends, colleagues, and healthcare professionals. Though the barriers regarding safe discussions of symptom management experienced by menopausal women are well documented, existing research offers little insight into whether these were shared by pre-menopausal women. This study aimed to explore the barriers regarding safe discussions about menopausal symptom management as perceived or experienced by pre-menopausal and menopausal women. Methods: This qualitative study was conducted over a 2-month period (March 2022 - April 2022) under the auspices of Imperial College Business School, London, UK. Snowball sampling was used to recruit both menopausal (age 45-70) and pre-menopausal participants (age <45), and sampling continued until data saturation was achieved. 16 semi-structured online interviews were conducted, and transcripts were thematically analyzed following Braun and Clarke’s six-step methodology. Results: A total of 7 higher themes regarding safe discussion of menopausal symptom management were identified by both pre-menopausal and menopausal women, including: “ineffective coping mechanisms”, “perceived onus to self-endure”, “lack of workplace support”, “poor knowledge of management approaches”, “poor healthcare infrastructure”, “poor support from friends and family”, “lack of knowledge and interest from a young age”. Conclusion: Identifying the barriers regarding safe discussion helped to highlight which areas require most significant intervention. Alongside tackling the barriers, menopausal women face, ultimately, there is a pertinent need to and address the lack of insight into menopause from a younger age and to encourage earlier discussions so as to not propagate the cycle of stigma.Keywords: menopause, stigma, safe discussions, symptom management
Procedia PDF Downloads 1112159 Authorship Profiling of Unidentified Corpora in Saudi Social Media
Authors: Abdulaziz Fageeh
Abstract:
In the bustling digital landscape of Saudi Arabia, a chilling wave of cybercrime has swept across the nation. Among the most nefarious acts are financial blackmail schemes, perpetrated by anonymous actors lurking within the shadows of social media platforms. This chilling reality necessitates the utilization of forensic linguistic techniques to unravel the identities of these virtual villains. This research delves into the complex world of authorship profiling, investigating the effectiveness of various linguistic features in identifying the perpetrators of malicious messages within the Saudi social media environment. By meticulously analyzing patterns of language, vocabulary choice, and stylistic nuances, the study endeavors to uncover the hidden characteristics of the individuals responsible for these heinous acts. Through this linguistic detective work, the research aims to provide valuable insights to investigators and policymakers in the ongoing battle against cybercrime and to shed light on the evolution of malicious online behavior within the Saudi context.Keywords: authorship profiling, arabic linguistics, saudi social media, cybercrime, financial blackmail, linguistic features, forensic linguistics, online threats
Procedia PDF Downloads 122158 Derivatives Balance Method for Linear and Nonlinear Control Systems
Authors: Musaab Mohammed Ahmed Ali, Vladimir Vodichev
Abstract:
work deals with an universal control technique or single controller for linear and nonlinear stabilization and tracing control systems. These systems may be structured as SISO and MIMO. Parameters of controlled plants can vary over a wide range. Introduced a novel control systems design method, construction of stable platform orbits using derivative balance, solved transfer function stability preservation problem of linear system under partial substitution of a rational function. Universal controller is proposed as a polar system with the multiple orbits to simplify design procedure, where each orbit represent single order of controller transfer function. Designed controller consist of proportional, integral, derivative terms and multiple feedback and feedforward loops. The controller parameters synthesis method is presented. In generally, controller parameters depend on new polynomial equation where all parameters have a relationship with each other and have fixed values without requirements of retuning. The simulation results show that the proposed universal controller can stabilize infinity number of linear and nonlinear plants and shaping desired previously ordered performance. It has been proven that sensor errors and poor performance will be completely compensated and cannot affect system performance. Disturbances and noises effect on the controller loop will be fully rejected. Technical and economic effect of using proposed controller has been investigated and compared to adaptive, predictive, and robust controllers. The economic analysis shows the advantage of single controller with fixed parameters to drive infinity numbers of plants compared to above mentioned control techniques.Keywords: derivative balance, fixed parameters, stable platform, universal control
Procedia PDF Downloads 1362157 English Learning Speech Assistant Speak Application in Artificial Intelligence
Authors: Albatool Al Abdulwahid, Bayan Shakally, Mariam Mohamed, Wed Almokri
Abstract:
Artificial intelligence has infiltrated every part of our life and every field we can think of. With technical developments, artificial intelligence applications are becoming more prevalent. We chose ELSA speak because it is a magnificent example of Artificial intelligent applications, ELSA speak is a smartphone application that is free to download on both IOS and Android smartphones. ELSA speak utilizes artificial intelligence to help non-native English speakers pronounce words and phrases similar to a native speaker, as well as enhance their English skills. It employs speech-recognition technology that aids the application to excel the pronunciation of its users. This remarkable feature distinguishes ELSA from other voice recognition algorithms and increase the efficiency of the application. This study focused on evaluating ELSA speak application, by testing the degree of effectiveness based on survey questions. The results of the questionnaire were variable. The generality of the participants strongly agreed that ELSA has helped them enhance their pronunciation skills. However, a few participants were unconfident about the application’s ability to assist them in their learning journey.Keywords: ELSA speak application, artificial intelligence, speech-recognition technology, language learning, english pronunciation
Procedia PDF Downloads 1062156 The Nimbārka School of Vedānta and the Indian Classical Dance: The Philosophical Relevance through Rasa Theory
Authors: Shubham Arora
Abstract:
This paper illustrates a relationship between the Dvaitādvaita (dualistic non-dualistic) doctrine of Nimbārka school of Vedānta and philosophy of Indian classical dance, through the Rasa theory. There would be a separate focus on the philosophies of both the disciplines and then analyzing Rasa theory as a connexion between them. The paper presents ideas regarding the similarity between the Brahman and the dancer, manifestation of enacting character and the Jīva (soul), the existence of the phenomenal world and the imaginary world classification of rasa on the basis of three modes of nature, and the feelings and expressions depicting the Dvaita and Advaita. The reason behind choosing such a topic is an intention to explore the relativity of the Vedantic philosophy of this school in real manner. It is really important to study the practical implications and relevance of the doctrine with other disciplines for perceiving it cogently. In our daily lives, we use various forms of facial expressions and bodily gestures in order to communicate, along with the oral and written means of communication. What if, when gestures and expressions mingle with the music beats, in order to present an idea? Indian Classical dance is highly rich in expressing the emotions using extraordinary expressions, unconventional bodily gestures and mesmerizing music beats. Ancient scriptures like Nāṭyaśāstra of Bharata Muni and Abhinava Bhārati by Abhinavaguptā recount aesthetics in a well-defined and structured way of acting and dancing and also reveal the grammar of rasa theory. Indian Classical dance is not only for entertainment but it is deeply in contact with divinity. During the period of Bhakti movement in India, this art form was used as a means to narrate the vignettes from epics like Rāmāyana and Mahābhārata and Purānas. Even in present era, this art has a deep rooted philosophy within.Keywords: Advaita, Brahman, Dvaita, Jiva, Nimbarka, Rasa, Vedanta
Procedia PDF Downloads 2992155 Evaluating the Administrative Buildings from the Perspective of Democratic Architecture
Authors: Tajuddin Mohamad Rasdi, Chung Ming Zhe, Nurul Anida Mohamad
Abstract:
This research paper aims to examine the lack of the idea of democracy and its concept among Malaysia’s citizens. In fact, all civil servants, whether federal or state departments, are the machinery of citizens. The objective of this research is to evaluate the administrative buildings in Selangor from the perspective of democratic architecture. The methodology used in this research is by reviewing and evaluating the selected administrative building, Majlis Bandaraya Petaling Jaya, as a case study, and the interview was conducted. The data collection was recorded based on a few criteria of the following architectural characteristic and management principles (public square, town hall, meeting rooms, convenient parking space, humanitarian spaces, public spaces) and architectural design elements (scale and massing, ornament, elevational language, accessibility, and spatial hierarchy). The analysis result shows that the administrative building elements which show the idea of democracy are not reflected well in some of the criteria that restrict the public, but those setbacks could be improved.Keywords: democratic architecture, case study, design elements, administrative buildings
Procedia PDF Downloads 1172154 A Preliminary Comparative Study Between the United Kingdom and Taiwan: Public Private Collaboration and Cooperation in Tackling Large Scale Cyberattacks
Authors: Chi-Hsuan Cheng
Abstract:
This research aims to evaluate public-private partnerships against cyberattacks by comparing the UK and Taiwan. First, the study analyses major cyberattacks and factors influencing cybersecurity in both countries. Second, it assesses the effectiveness of current cyber defence strategies in combating cyberattacks by comparing the approaches taken in the UK and Taiwan, while also evaluating the cyber resilience of both nations. Lastly, the research evaluates existing public-private partnerships by comparing those in the UK and Taiwan, and proposes recommendations for enhancing cooperation and collaboration mechanisms in tackling cyberattacks. Grounded theory serves as the core research method. Theoretical sampling is used to recruit participants in both the UK and Taiwan, including investigators, police officers, and professionals from cybersecurity firms. Semi-structured interviews are conducted in English in the UK and Mandarin in Taiwan, recorded with consent, and pseudonymised for privacy. Data analysis involves open coding, grouping excerpts into codes, and categorising codes. Axial coding connects codes into categories, leading to the development of a codebook. The process continues iteratively until theoretical saturation is reached. Finally, selective coding identifies the core topic, evaluating public-private cooperation against cyberattacks and its implications for social and policing strategies in the UK and Taiwan, which highlights the current status of the cybersecurity industry, governmental plans for cybersecurity, and contributions to cybersecurity from both government sectors and cybersecurity firms, with a particular focus on public-private partnerships. In summary, this research aims to offer practical recommendations to law enforcement, private sectors, and academia for reflecting on current strategies and tailoring future approaches in cybersecurityKeywords: cybersecurity, cybercrime, public private partnerships, cyberattack
Procedia PDF Downloads 752153 Academic Success, Problem-Based Learning and the Middleman: The Community Voice
Authors: Isabel Medina, Mario Duran
Abstract:
Although Problem-based learning provides students with multiple opportunities for rigorous instructional experiences in which students are challenged to address problems in the community; there are still gaps in connecting community leaders to the PBL process. At a south Texas high school, community participation serves as an integral component of the PBL process. Problem-based learning (PBL) has recently gained momentum due to the increase in global communities that value collaboration and critical thinking. As an instructional approach, PBL engages high school students in meaningful learning experiences. Furthermore, PBL focuses on providing students with a connection to real-world situations that require effective peer collaboration. For PBL leaders, providing students with a meaningful process is as important as the final PBL outcome. To achieve this goal, STEM high school strategically created a space for community involvement to be woven within the PBL fabric. This study examines the impact community members had on PBL students attending a STEM high school in South Texas. At STEM High School, community members represent a support system that works through the PBL process to ensure students receive real-life mentoring from business and industry leaders situated in the community. A phenomenological study using a semi-structured approach was used to collect data about students’ perception of community involvement within the PBL process for one South Texas high school. In our proposed presentation, we will discuss how community involvement in the PBL process academically impacted the educational experience of high school students at STEM high school. We address the instructional concerns PBL critics have with the lack of direct instruction, by providing a representation of how STEM high school utilizes community members to assist in impacting the academic experience of students.Keywords: phenomenological, STEM education, student engagement, community involvement
Procedia PDF Downloads 912152 Developing Rice Disease Analysis System on Mobile via iOS Operating System
Authors: Rujijan Vichivanives, Kittiya Poonsilp, Canasanan Wanavijit
Abstract:
This research aims to create mobile tools to analyze rice disease quickly and easily. The principle of object-oriented software engineering and objective-C language were used for software development methodology and the principle of decision tree technique was used for analysis method. Application users can select the features of rice disease or the color appears on the rice leaves for recognition analysis results on iOS mobile screen. After completing the software development, unit testing and integrating testing method were used to check for program validity. In addition, three plant experts and forty farmers have been assessed for usability and benefit of this system. The overall of users’ satisfaction was found in a good level, 57%. The plant experts give a comment on the addition of various disease symptoms in the database for more precise results of the analysis. For further research, it is suggested that image processing system should be developed as a tool that allows users search and analyze for rice diseases more convenient with great accuracy.Keywords: rice disease, data analysis system, mobile application, iOS operating system
Procedia PDF Downloads 2872151 Migrant Youth: Trauma-Informed Interventions
Authors: Nancy Daly
Abstract:
Migrant youth who have experienced traumatic events in their home countries or in their passage to the United States may require interventions or formal services to support varying levels and types of needs. The manner in which such youth are engaged and evaluated, as well as the framework of evaluation, can impact their educational services and placement. Evidenced-based trauma-informed practices that engage and support migrant youth serve as an important bridge to stabilization; however, ensuring long-term growth may require a range of integrated services, including special education and mental health services. Special education evaluations which consider the eligibility of Emotional Disturbance for migrant youth must carefully weigh issues of mental health needs against the exclusionary criteria of lack of access to education, limited language skills, as well as other environmental factors. Case studies of recently arrived migrant youth reveal both commonalities and differences in types and levels of need which underscores the importance of adept evaluation and case management to ensure the provision of services that support growth and resiliency.Keywords: migrant youth, trauma-informed care, mental health services, special education
Procedia PDF Downloads 1252150 A Neuron Model of Facial Recognition and Detection of an Authorized Entity Using Machine Learning System
Authors: J. K. Adedeji, M. O. Oyekanmi
Abstract:
This paper has critically examined the use of Machine Learning procedures in curbing unauthorized access into valuable areas of an organization. The use of passwords, pin codes, user’s identification in recent times has been partially successful in curbing crimes involving identities, hence the need for the design of a system which incorporates biometric characteristics such as DNA and pattern recognition of variations in facial expressions. The facial model used is the OpenCV library which is based on the use of certain physiological features, the Raspberry Pi 3 module is used to compile the OpenCV library, which extracts and stores the detected faces into the datasets directory through the use of camera. The model is trained with 50 epoch run in the database and recognized by the Local Binary Pattern Histogram (LBPH) recognizer contained in the OpenCV. The training algorithm used by the neural network is back propagation coded using python algorithmic language with 200 epoch runs to identify specific resemblance in the exclusive OR (XOR) output neurons. The research however confirmed that physiological parameters are better effective measures to curb crimes relating to identities.Keywords: biometric characters, facial recognition, neural network, OpenCV
Procedia PDF Downloads 2562149 Mapping of Urban Green Spaces Towards a Balanced Planning in a Coastal Landscape
Authors: Rania Ajmi, Faiza Allouche Khebour, Aude Nuscia Taibi, Sirine Essasi
Abstract:
Urban green spaces (UGS) as an important contributor can be a significant part of sustainable development. A spatial method was employed to assess and map the spatial distribution of UGS in five districts in Sousse, Tunisia. Ecological management of UGS is an essential factor for the sustainable development of the city; hence the municipality of Sousse has decided to support the districts according to different green spaces characters. And to implement this policy, (1) a new GIS web application was developed, (2) then the implementation of the various green spaces was carried out, (3) a spatial mapping of UGS using Quantum GIS was realized, and (4) finally a data processing and statistical analysis with RStudio programming language was executed. The intersection of the results of the spatial and statistical analyzes highlighted the presence of an imbalance in terms of the spatial UGS distribution in the study area. The discontinuity between the coast and the city's green spaces was not designed in a spirit of network and connection, hence the lack of a greenway that connects these spaces to the city. Finally, this GIS support will be used to assess and monitor green spaces in the city of Sousse by decision-makers and will contribute to improve the well-being of the local population.Keywords: distributions, GIS, green space, imbalance, spatial analysis
Procedia PDF Downloads 2042148 Digital Female Entrepreneurs in South Africa: Drivers and Relationship to Economic Development
Authors: C. van den Berg, C. Pokpas
Abstract:
Popular discourse touts entrepreneurship as a universal solution for underdevelopment, unemployment, and poverty. Moreover, claims are made that women and other disadvantaged groups can achieve material and personal success through digital entrepreneurship. This paper examines the potential of digital technology in entrepreneurial ventures to stimulate economic growth for marginalized groups and communities. Although digital entrepreneurship is hailed as a means to empower under-resourced and socially marginalized people, these opportunities still exist within the confines of existing social and cultural practices. The perspectives of female digital entrepreneurs in developing countries are sorely understudied, particularly concerning an understanding of the complex underlying socio-cultural factors impeding women’s entrepreneurial behaviors. This qualitative study, guided by a feminist phenomenological perspective, focused on the experiences of digital female entrepreneurs in the Western Cape of South Africa. Data were collected via semi-structured interviews and analyzed through the interpretative phenomenological analysis (IPA) approach to determine the relationships between digital entrepreneurship and structural and agential enabling conditions. Findings show that digital entrepreneurship is not a panacea for economic growth in marginalized groups and communities and highlight the importance of addressing socio-cultural gender inequality to enable successful entrepreneurial activity. The paper concludes with recommendations for specialized training initiatives aimed at female entrepreneurs that address internalized constraints and barriers that keep women subservient and measures to shift gender and power beliefs. The outcome will benefit the stimulation of gender-specific public policies to develop a successful digital start-up ecosystem further.Keywords: digital innovation, female digital entrepreneurs, feminist phenomenology, gender, marginalised communities
Procedia PDF Downloads 1352147 Hate Speech Detection in Tunisian Dialect
Authors: Helmi Baazaoui, Mounir Zrigui
Abstract:
This study addresses the challenge of hate speech detection in Tunisian Arabic text, a critical issue for online safety and moderation. Leveraging the strengths of the AraBERT model, we fine-tuned and evaluated its performance against the Bi-LSTM model across four distinct datasets: T-HSAB, TNHS, TUNIZI-Dataset, and a newly compiled dataset with diverse labels such as Offensive Language, Racism, and Religious Intolerance. Our experimental results demonstrate that AraBERT significantly outperforms Bi-LSTM in terms of Recall, Precision, F1-Score, and Accuracy across all datasets. The findings underline the robustness of AraBERT in capturing the nuanced features of Tunisian Arabic and its superior capability in classification tasks. This research not only advances the technology for hate speech detection but also provides practical implications for social media moderation and policy-making in Tunisia. Future work will focus on expanding the datasets and exploring more sophisticated architectures to further enhance detection accuracy, thus promoting safer online interactions.Keywords: hate speech detection, Tunisian Arabic, AraBERT, Bi-LSTM, Gemini annotation tool, social media moderation
Procedia PDF Downloads 112146 Utilization of Family Planning Methods and Associated Factors among Women of Reproductive Age Group in Sunsari, Nepal
Authors: Punam Kumari Mandal, Namita Yangden, Bhumika Rai, Achala Niraula, Sabitra Subedi
Abstract:
introduction: Family planning not only improves women’s health but also promotes gender equality, better child health, and improved education outcomes, including poverty reduction. The objective of this study is to assess the utilization of family planning methods and associated factors in Sunsari, Nepal. methodology: A cross-sectional analytical study was conducted among women of the reproductive age group (15-49 years) in Sunsari in 2020. Nonprobability purposive sampling was used to collect information from 212 respondents through face-to-face interviews using a Semi-structured interview schedule from ward no 1 of Barju rural municipality. Data processing was done by using SPSS “statistics for windows, version 17.0(SPSS Inc., Chicago, III.USA”). Descriptive analysis and inferential analysis (binary logistic regression) were used to find the association of the utilization of family planning methods with selected demographic variables. All the variables with P-value <0.1 in bivariate analysis were included in multivariate analysis. A P-value of <0.05 was considered to indicate statistical significance at a level of significance of 5%. results: This study showed that the mean age and standard deviation of the respondents were 26±7.03, and 91.5 % of respondent’s age at marriage was less than 20 years. Likewise, 67.5% of respondents use any methods of family planning, and 55.2% of respondents use family planning services from the government health facility. Furthermore, education (AOR 1.579, CI 1.013-2.462)., husband’s occupation (AOR 1.095, CI 0.744-1.610)., type of family (AOR 2.741, CI 1.210-6.210)., and no of living son (AOR 0.259 CI 0.077-0.872)are the factors associated with the utilization of family planning methods. conclusion: This study concludes that two-thirds of reproductive-age women utilize family planning methods. Furthermore, education, the husband’s occupation, the type of family, and no of living sons are the factors associated with the utilization of family planning methods. This reflects that awareness through mass media, including behavioral communication, is needed to increase the utilization of family planning methods.Keywords: family planning methods, utilization. factors, women, community
Procedia PDF Downloads 1372145 Neuropsychology of Dyslexia and Rehabilitation Approaches: A Research Study Applied to School Aged Children with Reading Disorders in Greece
Authors: Rozi Laskaraki, Argyris Karapetsas, Aikaterini Karapetsa
Abstract:
This paper is focused on the efficacy of a rehabilitation program based on musical activities, implied to a group of school-aged dyslexic children. Objective: The purpose of this study was to investigate the efficacy of auditory training including musical exercises in children with developmental dyslexia (DD). Participants and Methods: 45 third-, and fourth-grade students with DD and a matched control group (n=45) were involved in this study. In the beginning, students participated in a clinical assessment, including both electrophysiological (i.e., event related potentials (ERPs) esp.P300 waveform) and neuropsychological tests, being conducted in Laboratory of Neuropsychology, at University of Thessaly, in Volos, Greece. Initial assessment’s results confirmed statistically significant lower performance for children with DD, compared to that of the typical readers. After clinical assessment, a subgroup of children with dyslexia was submitted to a music auditory training program, conducted in 45-minute training sessions, once a week, for twenty weeks. The program included structured and digitized musical activities involving pitch, rhythm, melody and tempo perception and discrimination as well as auditory sequencing. After the intervention period, children underwent a new recording of ERPs. Results: The electrophysiological results revealed that children had similar P300 latency values to that of the controls, after the remediation program; thus children overcame their deficits. Conclusion: The outcomes of the current study suggest that ERPs is a valid clinical tool in neuropsychological assessment settings and dyslexia can be ameliorated through music auditory training.Keywords: dyslexia, event related potentials, learning disabilities, music, rehabilitation
Procedia PDF Downloads 1472144 Design and Field Programmable Gate Array Implementation of Radio Frequency Identification for Boosting up Tag Data Processing
Authors: G. Rajeshwari, V. D. M. Jabez Daniel
Abstract:
Radio Frequency Identification systems are used for automated identification in various applications such as automobiles, health care and security. It is also called as the automated data collection technology. RFID readers are placed in any area to scan large number of tags to cover a wide distance. The placement of the RFID elements may result in several types of collisions. A major challenge in RFID system is collision avoidance. In the previous works the collision was avoided by using algorithms such as ALOHA and tree algorithm. This work proposes collision reduction and increased throughput through reading enhancement method with tree algorithm. The reading enhancement is done by improving interrogation procedure and increasing the data handling capacity of RFID reader with parallel processing. The work is simulated using Xilinx ISE 14.5 verilog language. By implementing this in the RFID system, we can able to achieve high throughput and avoid collision in the reader at a same instant of time. The overall system efficiency will be increased by implementing this.Keywords: antenna, anti-collision protocols, data management system, reader, reading enhancement, tag
Procedia PDF Downloads 3062143 Analysis of Access to Credit among Rural Farmers in Giwa Local Government Area of Kaduna State, Nigeria
Authors: S. Ibrahim, Bashir Umar
Abstract:
Agricultural credit is very important for sustainable agricultural development to be achieved in any country of the world. Rural credit has proven to be a powerful instrument against poverty reduction and development in rural area. Agricultural credit enhances productivity and promotes standard of living by breaking vicious cycle of poverty of small scale farmers. This study examined access to credit among rural farmers in Giwa local government area of Kaduna state. Two stages sampling procedure was employed to select forty-two (42) respondents for the study. Primary data were collected using structured questionnaire with the help of well-trained enumerators. Data were analyzed using simple descriptive statistics. The results revealed that farmers were predominantly male (57.1%) and most (54.7%), were married with one level of education or another (66.5.%). Majority of the households’ head were between the ages of 31 to 50. majority of the farmers (68.2%) had more than 2ha of farmlands with at least 5 years of farming experience and an annual farm income of N 61,000 to 100,000 (61.9%). The Various sources of credit by the farmers in the study area were commercial banks (38.1%), Co-operative banks (47.6%), Development banks (14.2%) (formal) and Relatives (26.1%), Personal Savings (Adashi scheme) (52.3%), Moneylenders (21.4%) (informal). As regard to the amount of credit obtained by the farmers 38.1% received N 50,000-100,000, 50 % obtained N 100,001-500,000 while 11.9% obtained N 500,001-1,000,000. High interest Inadequate collateral, Complicated Procedures, lack of guarantor were the major constrains encountered by the farmers in accessing loans. The study therefore recommends that Rural farmers should be encouraged to form credit and thrift cooperative societies from which they can access much cheaper credits, Moreover, to ensure that any credit obtained may be manageable for the farmers, financial institutions should provide loans with low interest rates and government and non-governmental organizations should simplify procedures associated with accessing loans.Keywords: analysis, access, credit, farmers
Procedia PDF Downloads 622142 Motor Controller Implementation Using Model Based Design
Authors: Cau Tran, Tu Nguyen, Tien Pham
Abstract:
Model-based design (MBD) is a mathematical and visual technique for addressing design issues in the fields of communications, signal processing, and complicated control systems. It is utilized in several automotive, aerospace, industrial, and motion control applications. Virtual models are at the center of the software development process with model based design. A method used in the creation of embedded software is model-based design. In this study, the LAT motor is modeled in a simulation environment, and the LAT motor control is designed with a cascade structure, a speed and current control loop, and a controller that is used in the next part. A PID structure serves as this controller. Based on techniques and motor parameters that match the design goals, the PID controller is created for the model using traditional design principles. The MBD approach will be used to build embedded software for motor control. The paper will be divided into three distinct sections. The first section will introduce the design process and the benefits and drawbacks of the MBD technique. The design of control software for LAT motors will be the main topic of the next section. The experiment's results are the subject of the last section.Keywords: model based design, limited angle torque, intellectual property core, hardware description language, controller area network, user datagram protocol
Procedia PDF Downloads 942141 Testifying in Court as a Victim of Crime for Persons with Little or No Functional Speech: Vocabulary Implications
Authors: Robyn White, Juan Bornman, Ensa Johnson
Abstract:
People with disabilities are at a high risk of becoming victims of crime. Individuals with little or no functional speech (LNFS) face an even higher risk. One way of reducing the risk of remaining a victim of crime is to face the alleged perpetrator in court as a witness – therefore it is important for a person with LNFS who has been a victim of crime to have the required vocabulary to testify in court. The aim of this study was to identify and describe the core and fringe legal vocabulary required by illiterate victims of crime, who have little or no functional speech, to testify in court as witnesses. A mixed-method, the exploratory sequential design consisting of two distinct phases was used to address the aim of the research. The first phase was of a qualitative nature and included two different data sources, namely in-depth semi-structured interviews and focus group discussions. The overall aim of this phase was to identify and describe core and fringe legal vocabulary and to develop a measurement instrument based on these results. Results from Phase 1 were used in Phase 2, the quantitative phase, during which the measurement instrument (a custom-designed questionnaire) was socially validated. The results produced six distinct vocabulary categories that represent the legal core vocabulary and 99 words that represent the legal fringe vocabulary. The findings suggested that communication boards should be individualised to the individual and the specific crime. It is believed that the vocabulary lists developed in this study act as a valid and reliable springboard from which communication boards can be developed. Recommendations were therefore made to develop an Alternative and Augmentative Communication Resource Tool Kit to assist the legal justice system.Keywords: augmentative and alternative communication, person with little or no functional speech, sexual crimes, testifying in court, victim of crime, witness competency
Procedia PDF Downloads 4802140 Engaging Students in Spatial Thinking through Design Education: Case Study of a Biomimicry Design Project in the Primary Classroom
Authors: Caiwei Zhu, Remke Klapwijk
Abstract:
Spatial thinking, a way of thinking based on the understanding and reasoning of spatial concepts and representations, is embedded in science, technology, engineering, arts, and mathematics (STEAM) learning. Aside from many studies that successfully used targeted training to improve students’ spatial thinking skills, few have closely examined how spatial thinking can be trained in classroom settings. Design and technology education, which receives increasing attention towards its integration into formal curriculums, inherently encompasses a wide range of spatial activities, such as constructing mental representations of design ideas, mentally transforming objects and materials to form designs, visually communicating design plans through annotated drawings, and creating 2D and 3D design artifacts. Among different design topics, biomimicry offers a unique avenue for students to recognize and analyze the shapes and structures in nature. By mapping the forms of plants and animals onto functions, students gain inspiration to solve human design challenges. This study is one of the first to highlight opportunities for training spatial thinking in a biomimicry design project for primary school students. Embracing methodological principles of educational design-based research, this case study is conducted along with iterations in the design of the intervention and collaboration with teachers. Data are harvested from small groups of 10- to 12-year-olds at an international school in the Netherlands. Classroom videos, semi-structured interviews with students, design drawings and artifacts, formative assessment, and the pre- and post-intervention spatial test triangulate evidence for students' spatial thinking. In addition to contributing to a theory of integrating spatial thinking in the primary curriculum, mechanisms underlying such improvement in spatial thinking are explored and discussed.Keywords: biomimicry, design and technology education, primary education, spatial thinking
Procedia PDF Downloads 762139 Case Study of Sexual Violence Victim Assessment in Semarang Regency
Authors: Sujana T, Kurniasari MD, Ayakeding AM
Abstract:
Background: Sexual violence is one of the violence with high incidence in Indonesia. Purpose: This research aims to describe the implementation of sexual violence victim assessment in Semarang Regency. Method: This research is a qualitative research with embeded single case study design. Data is analized with two units of analysis. The first unit of analysis is victim’s examiner with minimum one year of work experience. Semi-structured interview method is used to obtain the data. The second unit of analysis is document related. The data is taken by observing the pathway and description of every document and how it supported each implementation of assessment. Results: This study is resulted with three themes, which are: The first theme is assessments of sexual violence in Semarang regency has been standardized. The laws of the Republic of Indonesia have regulated the handling of victims of sexual violence in outline. Victims of sexual violence can be dealt with by the police, the Integrated Service Center for Women and Children Empowerment and the Regional General Hospital. Each examination site has different operational procedures standards for dealing with victims of sexual violence. Cooperation with family and witnesses is also required in the review process to obtain accurate results and evidence; The second idea that resulted from this study is there are inhibits factors in the assessments process. Victims sometimes feel embarrassed and reluctant to recount the chronological events during reporting. The examining officer should be able to approach and build a trust to convince the victim to be able to cooperate. The third theme is there are other things to consider in the process of assessing victims of sexual violence. Ensuring implementation in accordance with applicable operational procedures standards, providing exclusive examination rooms, counseling and safeguarding the privacy of victims are important to be considered in the assessment.Keywords: assessment, case study, Semarang regency, sexual violence
Procedia PDF Downloads 1402138 Gender and Sustainable Rural Tourism: A Study into the Experiences and the Roles of Local Women in the Sundarbans Area of Bangladesh
Authors: Jakia Rajoana
Abstract:
The key aim of this research is to achieve Sustainable Rural Tourism (SRT) through women’s empowerment in the Sundarbans area of Bangladesh. Women in rural areas in developing countries depend on biomass for their survival and that of their family. Yet they have an unequal access to resources as well as decision making, thus making them more vulnerable to any changes in the environment. Women in the developing countries experience gender inequality which is culturally embedded resulting into women having less access to and control over financial and material resources, information, and also a lack of recognition of their contribution as compared to men. Their disadvantaged social position is augmented by their extreme poverty, little or no power they have over their own lives vis-à-vis the disproportionate burden they bear in reproduction and child-raising. Despite the significance of the need to pay attention to gender related issues in sustainable rural tourism (SRT), research remains rather scant. For instance, there is very little research that illustrates the role of women in tourism in the Sundarbans area. Thus empirically, this research seeks to fill a significant gap by focusing on rural areas and in particular focus on considerably under-researched area, namely the Sundarbans women’s role in tourism. In order to fully comprehend their experiences and life stories, this research will apply the empowerment theory and consider it along with the research on sustainable rural tourism. Since, women’s empowerment can act as a potential tool for SRT development and also examine the role tourism plays in the lives of Sundarbans’ women. Methodologically, this study will follow a qualitative research design using an ethnographic approach. Participant observation, semi- structured interviews, and documentation will be the primary data collection instruments in four communities – Shayamnagar, Koyra, Mongla and Sarankhola – in the Sundarbans area. It is hoped that by focusing on the life stories of these invisible women, research is better able to engage with nuances inherent in marginal and significantly under-researched communities.Keywords: gender, sustainable rural tourism, women empowerment, Sundarbans
Procedia PDF Downloads 2992137 Sustainable Accommodation Design: Improving Residential Property Shortage for Low-Income People in Nigeria
Authors: Paulinus W. Ihuah, Iyenemi Ibimina Kakulu, Victor A. Akujuru
Abstract:
The development of the residential property is very expensive in Nigeria, especially as it is observed in Port Harcourt, although it is also investment costly in the other cities of Nigeria. The costly development nature incidentally reasons to the high deficits in residential property availability and affordability for the low-income people. Therefore, the main purpose of this paper is to provide sustainable accommodation design, which should improve residential property expensiveness and shortages for the low-income people. This is achieved through investigation of the tangible requirements and needs of the end-user of the property (low-income people), which thereafter would enhance sustainable and affordable residential property accommodation design for the end-users. Both the quantitative and qualitative instruments of data collection were utilised. The quantitative instrument via questionnaires was designed to examine the real needs and r requirement of the low-income people. However, the qualitative instrument via structured interview was espoused for the gathering of professionals’ opinions on the three predicted sustainable accommodation design alternatives. The analysis employed content analysis parameters, which offered a sustainable accommodation design and designed alternatives minimises costs and environmental impacts whereas exploiting the social satisfaction in residential accommodation developments. The finding underscores that sustainable accommodation design and development is practicable in Nigeria, so that cost of residential accommodation provided through this system is cheap to the low-income people. Further, erection of multi-storey residential accommodation units such as bedsit structure by utilising the concrete frame structure and building the internal and external walls with hollow concrete blocks within areas 60-130 square meters is encouraged. This paper philosophy indicates that by using sustainable accommodation design practices in Nigeria, improvements in the costs and shortages of residential accommodation can be attained for low-income people. However, policies support the government cannot be overemphasised for proper implementation of the suggested scheme.Keywords: sustainable accommodation, housing design, residential property, low-income people
Procedia PDF Downloads 2702136 Using a Strength Based Approach to Teaching Children with Special Needs
Authors: Eunice Tan
Abstract:
The purpose of this presentation is to look at an alternative to the approach and methodologies of working with a child with special needs. The strength-based approach to education embodies a paradigm shift. It is a strategy to move away from a deficit-based methodology which inadvertently may lead to an extensive list of things that the child cannot do or is unable to do. Today, many parents of individuals with special needs are focused on the individual’s deficits rather than on his or her strengths. Even when parents recognise and identify their child’s savant strengths to be valuable and wish to develop their abilities, they face the challenge that there are insufficient programs committed to supporting the development and improvement of such abilities. What is a strength-based approach in education? A strength-based approach in education focuses on students' positive qualities and contributions to class instead of the skills and abilities they may not have. Many schools are focused on the child’s special educational needs rather than the whole child. Parents interviewed have said that they have to engage external tutors to help hone in on their child’s interests and strengths. The strength-based approach to writing statements encourages educators to find out: • What a child can do • What a child can do when he or she is given educational support • Learning more about children with special needs and their strengths and talents will broaden our understanding of how we can help them with language acquisition, social skills, as well as self-help and independence skills.Keywords: special needs, strengths, and talents, alternative educational approach, strength based approach
Procedia PDF Downloads 2892135 Seroprevalence Study of Cystic Echinococcosis and Its Associated Risk Factors in Fars Province, Southern Iran
Authors: Mahmoud Reza Tahamtan, Mohammad Saleh Bahreini
Abstract:
Background and Purpose: Cystic echinococcosis, caused by the larval stage of Echinococcus granulosus, is a common parasitic infection of humans and is endemic in many parts of the world, including Iran. So that, one percent of those admitted to surgery departments are hydatid cyst patients, and using the ELISA method, the infection rate has been reported in different regions of Iran from 1.2% to 21.4%. Therefore, the aim of this study was to investigate the seroepidemiology of human hydatid cysts in Fars province, southern Iran, by ELISA method. Methods: In this cross-sectional study, 600 serum samples of persons who were referred to the laboratory of Nemazi Hospital in Shiraz for normal tests were examined for the presence of specific Anti-IgG antibodies to hydatid cysts by ELISA method. During the sampling, a structured questionnaire was used to obtain social data of individuals with determinants of risk factors for Cystic echinococcosis. Finally, the results of the ELISA test, along with demographic information completed by individuals, were analyzed using SPSS software. Results: The average age of the subjects in this study was 40.01 ± 9.166. The prevalence of hydatidosis was reported as 5.66% (34/600). The disease was more in the age group of 21-30, people living in villages, working in rural areas, and people with a history of other parasitic diseases. Statistically, a significant difference was observed between the prevalence of the disease and two risk factors, contact with dogs (OR= 0.042; 95%CI: 0.014-0.12; P= 0.001) and washing vegetables with water (OR= 0.08; 95%CI: 0.011-0.56; P= 0.012). Conclusion: The present study showed that hydatid cyst disease has a significant prevalence in this area. Also, based on the results, contact with dogs and not properly washing vegetables are two important factors of disease transmission.Keywords: Echinococcus granulosus, Cystic echinococcosis, hydatid cyst, Fars province
Procedia PDF Downloads 972134 Framework for Detecting External Plagiarism from Monolingual Documents: Use of Shallow NLP and N-Gram Frequency Comparison
Authors: Saugata Bose, Ritambhra Korpal
Abstract:
The internet has increased the copy-paste scenarios amongst students as well as amongst researchers leading to different levels of plagiarized documents. For this reason, much of research is focused on for detecting plagiarism automatically. In this paper, an initiative is discussed where Natural Language Processing (NLP) techniques as well as supervised machine learning algorithms have been combined to detect plagiarized texts. Here, the major emphasis is on to construct a framework which detects external plagiarism from monolingual texts successfully. For successfully detecting the plagiarism, n-gram frequency comparison approach has been implemented to construct the model framework. The framework is based on 120 characteristics which have been extracted during pre-processing the documents using NLP approach. Afterwards, filter metrics has been applied to select most relevant characteristics and then supervised classification learning algorithm has been used to classify the documents in four levels of plagiarism. Confusion matrix was built to estimate the false positives and false negatives. Our plagiarism framework achieved a very high the accuracy score.Keywords: lexical matching, shallow NLP, supervised machine learning algorithm, word n-gram
Procedia PDF Downloads 357