Search results for: computing practices
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5173

Search results for: computing practices

4723 Viability of Irrigation Water Conservation Practices in the Low Desert of California

Authors: Ali Montazar

Abstract:

California and the Colorado River Basin are facing increasing uncertainty concerning water supplies. The Colorado River is the main source of irrigation water in the low desert of California. Currently, due to an increasing water-use competition and long-term drought at the Colorado River Basin, efficient use of irrigation water is one of the highest conservation priorities in the region. This study aims to present some of current irrigation technologies and management approaches in the low desert and assess the viability and potential of these water management practices. The results of several field experiments are used to assess five water conservation practices of sub-surface drip irrigation, automated surface irrigation, sprinkler irrigation, tail-water recovery system, and deficit irrigation strategy. The preliminary results of several ongoing studies at commercial fields are presented, particularly researches in alfalfa, sugar beets, kliengrass, sunflower, and spinach fields. The findings indicate that all these practices have significant potential to conserve water (an average of 1 ac-ft/ac) and enhance the efficiency of water use (15-25%). Further work is needed to better understand the feasibility of each of these applications and to help maintain profitable and sustainable agricultural production system in the low desert as water and labor costs, and environmental issues increase.

Keywords: automated surface irrigation, deficit irrigation, low desert of California, sprinkler irrigation, sub-surface drip irrigation, tail-water recovery system

Procedia PDF Downloads 130
4722 Smart Structures for Cost Effective Cultural Heritage Preservation

Authors: Tamara Trček Pečak, Andrej Mohar, Denis Trček

Abstract:

This article investigates the latest technological means, which deploy smart structures that are based on (advanced) wireless sensors technologies and ubiquitous computing in general in order to support the above mentioned decision making. Based on two years of in-field research experiences it gives their analysis for these kinds of purposes and provides appropriate architectures and architectural solutions. Moreover, the directions for future research are stated, because these technologies are currently the most promising ones to enable cost-effective preservation of cultural heritage not only in uncontrolled places, but also in general.

Keywords: smart structures, wireless sensors, sensors networks, green computing, cultural heritage preservation, monitoring, cost effectiveness

Procedia PDF Downloads 421
4721 Small-Scale Mining Policies in Ghana: Miners' Knowledge, Attitudes and Practices

Authors: Franklin Nantui Mabe, Robert Osei

Abstract:

Activities and operations of artisanal small scale mining (ASM) have recently appealed to the attention of policymakers, researchers, and the general public in Ghana. This stems from the negative impacts of ASM operations on the environment and livelihoods of local inhabitants, as well as the disregard for available ASM mining policies. This study, therefore, investigates whether or not artisanal small-scale miners have enough knowledge of the mining policies and their implementations. The study adopted the Knowledge, Attitudes, and Practices (KAP) framework approach to design the research, collect and analyze primary data. The most aware ASM policy provision is the one that mandates the government to reserve demarcated ASM areas for Ghanaians, whilst the least aware provision is the one that admonishes the government to promote co-operative saving among ASM. The awareness index is lower than the attitude index towards the policy provisions. In terms of practices, miners continued to use bad practices with the associated negative impacts on the environment and rural livelihoods. It is therefore important for the government through mineral commission, district, municipal and metropolitan assemblies to intensify the education on the ASM policies. These could be done with the help of ASM associations. The current systems where a cluster of districts have a single Mineral Commission Office should be restructured to make sure that each mining district has an office.

Keywords: mining policies, KAP, awareness, artisanal small-scale mining

Procedia PDF Downloads 160
4720 A Comparative Study on ANN, ANFIS and SVM Methods for Computing Resonant Frequency of A-Shaped Compact Microstrip Antennas

Authors: Ahmet Kayabasi, Ali Akdagli

Abstract:

In this study, three robust predicting methods, namely artificial neural network (ANN), adaptive neuro fuzzy inference system (ANFIS) and support vector machine (SVM) were used for computing the resonant frequency of A-shaped compact microstrip antennas (ACMAs) operating at UHF band. Firstly, the resonant frequencies of 144 ACMAs with various dimensions and electrical parameters were simulated with the help of IE3D™ based on method of moment (MoM). The ANN, ANFIS and SVM models for computing the resonant frequency were then built by considering the simulation data. 124 simulated ACMAs were utilized for training and the remaining 20 ACMAs were used for testing the ANN, ANFIS and SVM models. The performance of the ANN, ANFIS and SVM models are compared in the training and test process. The average percentage errors (APE) regarding the computed resonant frequencies for training of the ANN, ANFIS and SVM were obtained as 0.457%, 0.399% and 0.600%, respectively. The constructed models were then tested and APE values as 0.601% for ANN, 0.744% for ANFIS and 0.623% for SVM were achieved. The results obtained here show that ANN, ANFIS and SVM methods can be successfully applied to compute the resonant frequency of ACMAs, since they are useful and versatile methods that yield accurate results.

Keywords: a-shaped compact microstrip antenna, artificial neural network (ANN), adaptive neuro-fuzzy inference system (ANFIS), support vector machine (SVM)

Procedia PDF Downloads 417
4719 An Application Framework for Integrating Wireless Sensor and Actuator Networks for Precision Farmingas Web of Things to Cloud Interface Using PaaS

Authors: Sumaya Ismail, Aijaz Ahmad Reshi

Abstract:

The advances in sensor and embedded technologies have led to rapid developments in Wireless Sensor Networks (WSNs). Presently researchers focus on the integration of WSNs to the Internet for their pervasive availability to access these network resources as the interoperable subsystems. The recent computing technologies like cloud computing has made resource sharing as a converged infrastructure with required service interfaces for the shared resources over the Internet. This paper presents application architecture for wireless Sensor and Actuator Networks (WSANS) following web of things, which allows easy integration of each node to the Internet in order to provide them with web accessibility. The architecture enables the sensors and actuator nodes accessed and controlled using cloud interface on WWW. The application architecture was implemented using existing web and its emerging technologies. In particular, the Representational State Transfer protocol (REST) was extended for the specific requirements of the application. The Cloud computing environment has been used as a development platform for the application to assess the possibility of integrating the WSAN nodes to Cloud services. The mushroom farm environment monitoring and control using WSANs has been taken as a research use case.

Keywords: WSAN, REST, web of things, ZigBee, cloud interface, PaaS, sensor gateway

Procedia PDF Downloads 73
4718 High Input Driven Factors in Idea Campaigns in Large Organizations: A Case Depicting Best Practices

Authors: Babar Rasheed, Saad Ghafoor

Abstract:

Introduction: Idea campaigns are commonly held across organizations for generating employee engagement. The contribution is specifically designed to identify and solve prevalent issues. It is argued that numerous organizations fail to achieve their desired goals despite arranging for such campaigns and investing heavily in them. There are however practices that organizations use to achieve higher degree of effectiveness, and these practices may be up for exploration by research to make them usable for the other organizations. Purpose: The aim of this research is to surface the idea management practices of a leading electric company with global operations. The study involves a large sized, multi site organization that is attributed to have added challenges in terms of managing ideas from employees, in comparison to smaller organizations. The study aims to highlight the factors that are looked at as the idea management team strategies for the campaign, sets terms and rewards for it, makes follow up with the employees and lastly, evaluate and award ideas. Methodology: The study is conducted in a leading electric appliance corporation that has a large number of employees and is based in numerous regions of the world. A total of 7 interviews are carried out involving the chief innovation officer, innovation manager and members of idea management and evaluation teams. The interviews are carried out either on Skype or in-person based on the availability of the interviewee. Findings: While this being a working paper and while the study is under way, it is anticipated that valuable information is being achieved about specific details on how idea management systems are governed and how idea campaigns are carried out. The findings may be particularly useful for innovation consultants as resources they can use to promote idea campaigning. The usefulness of the best practices highlighted as a result is, in any case, the most valuable output of this study.

Keywords: employee engagement, motivation, idea campaigns, large organizations, best practices, employees input, organizational output

Procedia PDF Downloads 152
4717 Deep Reinforcement Learning Model Using Parameterised Quantum Circuits

Authors: Lokes Parvatha Kumaran S., Sakthi Jay Mahenthar C., Sathyaprakash P., Jayakumar V., Shobanadevi A.

Abstract:

With the evolution of technology, the need to solve complex computational problems like machine learning and deep learning has shot up. But even the most powerful classical supercomputers find it difficult to execute these tasks. With the recent development of quantum computing, researchers and tech-giants strive for new quantum circuits for machine learning tasks, as present works on Quantum Machine Learning (QML) ensure less memory consumption and reduced model parameters. But it is strenuous to simulate classical deep learning models on existing quantum computing platforms due to the inflexibility of deep quantum circuits. As a consequence, it is essential to design viable quantum algorithms for QML for noisy intermediate-scale quantum (NISQ) devices. The proposed work aims to explore Variational Quantum Circuits (VQC) for Deep Reinforcement Learning by remodeling the experience replay and target network into a representation of VQC. In addition, to reduce the number of model parameters, quantum information encoding schemes are used to achieve better results than the classical neural networks. VQCs are employed to approximate the deep Q-value function for decision-making and policy-selection reinforcement learning with experience replay and the target network.

Keywords: quantum computing, quantum machine learning, variational quantum circuit, deep reinforcement learning, quantum information encoding scheme

Procedia PDF Downloads 99
4716 Assessing the Efficacy of Network Mapping, Vulnerability Scanning, and Penetration Testing in Enhancing Security for Academic Networks

Authors: Kenny Onayemi

Abstract:

In an era where academic institutions increasingly rely on information technology, the security of academic networks has emerged as a paramount concern. This comprehensive study delves into the effectiveness of security practices, including network mapping, vulnerability scanning, and penetration testing, within academic networks. Leveraging data from surveys administered to faculty, staff, IT professionals and IT students in the university, the study assesses their familiarity with these practices, perceived effectiveness, and frequency of implementation. The findings reveal that a significant portion of respondents exhibit a strong understanding of network mapping, vulnerability scanning, and penetration testing, highlighting the presence of knowledgeable professionals within academic institutions. Additionally, active scanning using network scanning tools and automated vulnerability scanning tools emerge as highly effective methods. However, concerns arise as the respondents show that the academic institutions conduct these practices rarely or never. Notably, many respondents have reported significant vulnerabilities or security incidents through these security measures within their institution. This study concludes with recommendations to enhance network security awareness and practices among faculty, staff, IT personnel, and students, ultimately fortifying the security posture of academic networks in the digital age.

Keywords: network security, academic networks, vulnerability scanning, penetration testing, information security

Procedia PDF Downloads 24
4715 'How to Change Things When Change is Hard' Motivating Libyan College Students to Play an Active Role in Their Learning Process

Authors: Hameda Suwaed

Abstract:

Group work, time management and accepting others' opinions are practices rooted in the socio-political culture of democratic nations. In Libya, a country transitioning towards democracy, what is the impact of encouraging college students to use such practices in the English language classroom? How to encourage teachers to use such practices in educational system characterized by using traditional methods of teaching? Using action research and classroom research gathered data; this study investigates how teachers can use education to change their students' understanding of their roles in their society by enhancing their belonging to it. This study adjusts a model of change that includes giving students clear directions, sufficient motivation and supportive environment. These steps were applied by encouraging students to participate actively in the classroom by using group work and variety of activities. The findings of the study showed that following the suggested model can broaden students' perception of their belonging to their environment starting with their classroom and ending with their country. In conclusion, although this was a small scale study, the students' participation in the classroom shows that they gained self confidence in using practices such as group work, how to present their ideas and accepting different opinions. What was remarkable is that most students were aware that is what we need in Libya nowadays.

Keywords: educational change, students' motivation, group work, foreign language teaching

Procedia PDF Downloads 395
4714 Police Mothers at Home: Police Work and Danger-Protection Parenting Practices

Authors: Tricia Agocs, Debra Langan, Carrie B. Sanders

Abstract:

Studies of the challenges faced by women in policing have paid little attention to the specific experiences of Policewomen who are mothers. Guided by critical theorizing on the gendered nature of the police culture and domestic labor, 16 police officer mothers in Ontario, Canada, were interviewed. Our qualitative analyses explore their experiences of the “lion’s share” of domestic labor; the organizational, cultural, and operational features of policing; and the challenges of child care, and examine how these combine to foster particular stresses. In contrast to intensive mothering approaches that rely on the advice of external experts, our participants work to protect children by carefully constructing stories and asking questions that are based on their own on-the-job experiences with dangerous and/or abhorrent situations. As such, they engage in danger-protection parenting practices to prevent their children from becoming victims or offenders. Our research extends the theorizing on intensive/extensive mothering practices, builds on the scholarship on policing, and adds to the literature on women in nonstandard occupations. This sociological analysis of police mothers’ experiences and practices underscores the importance of understanding and working to change the social contexts, at work and at home, that compromise the well-being of police mothers and other emergency-response workers.

Keywords: policewomen, mothers, parenting, danger, qualitative research

Procedia PDF Downloads 524
4713 Overview of Research Contexts about XR Technologies in Architectural Practice

Authors: Adeline Stals

Abstract:

The transformation of architectural design practices has been underway for almost forty years due to the development and democratization of computer technology. New and more efficient tools are constantly being proposed to architects, amplifying a technological wave that sometimes stimulates them, sometimes overwhelms them, depending essentially on their digital culture and the context (socio-economic, structural, organizational) in which they work on a daily basis. Our focus is on VR, AR, and MR technologies dedicated to architecture. The commercialization of affordable headsets like the Oculus Rift, the HTC Vive or more low-tech like the Google CardBoard, makes it more accessible to benefit from these technologies. In that regard, researchers report the growing interest of these tools for architects, given the new perspectives they open up in terms of workflow, representation, collaboration, and client’s involvement. However, studies rarely mention the consequences of the sample studied on results. Our research provides an overview of VR, AR, and MR researches among a corpus of papers selected from conferences and journals. A closer look at the sample of these research projects highlights the necessity to take into consideration the context of studies in order to develop tools truly dedicated to the real practices of specific architect profiles. This literature review formalizes milestones for future challenges to address. The methodology applied is based on a systematic review of two sources of publications. The first one is the Cumincad database, which regroups publications from conferences exclusively about digital in architecture. Additionally, the second part of the corpus is based on journal publications. Journals have been selected considering their ranking on Scimago. Among the journals in the predefined category ‘architecture’ and in Quartile 1 for 2018 (last update when consulted), we have retained the ones related to the architectural design process: Design Studies, CoDesign, Architectural Science Review, Frontiers of Architectural Research and Archnet-IJAR. Beside those journals, IJAC, not classified in the ‘architecture’ category, is selected by the author for its adequacy with architecture and computing. For all requests, the search terms were ‘virtual reality’, ‘augmented reality’, and ‘mixed reality’ in title and/or keywords for papers published between 2015 and 2019 (included). This frame time is defined considering the fast evolution of these technologies in the past few years. Accordingly, the systematic review covers 202 publications. The literature review on studies about XR technologies establishes the state of the art of the current situation. It highlights that studies are mostly based on experimental contexts with controlled conditions (pedagogical, e.g.) or on practices established in large architectural offices of international renown. However, few studies focus on the strategies and practices developed by offices of smaller size, which represent the largest part of the market. Indeed, a European survey studying the architectural profession in Europe in 2018 reveals that 99% of offices are composed of less than ten people, and 71% of only one person. The study also showed that the number of medium-sized offices is continuously decreasing in favour of smaller structures. In doing so, a frontier seems to remain between the worlds of research and practice, especially for the majority of small architectural practices having a modest use of technology. This paper constitutes a reference for the next step of the research and for further worldwide researches by facilitating their contextualization.

Keywords: architectural design, literature review, SME, XR technologies

Procedia PDF Downloads 90
4712 A Survey on the Status of Test Automation

Authors: Andrei Contan, Richard Torkar

Abstract:

Aim: The process of test automation and its practices in industry have to be better understood, both for the industry itself and for the research community. Method: We conducted a quantitative industry survey by asking IT professionals to answer questions related to the area of test automation. Results: Test automation needs and practices vary greatly between organizations at different stages of the software development life cycle. Conclusions: Most of the findings are general test automation challenges and are specific to small- to medium-sized companies, developing software applications in the web, desktop or mobile domain.

Keywords: survey, testing, test automation, status of test automation

Procedia PDF Downloads 622
4711 Reviewing Special Education Preservice Teachers' Reflective Practices over Two Field Experiences: Topics and Changes in Reflection

Authors: Laurie U. deBettencourt

Abstract:

During pre-service field experiences teacher candidates are often asked to reflect as part of their training and in this investigation candidates’ reflective journal entries were reviewed, coded and analyzed with results suggesting teacher candidates need more direct instruction on how to describe, analyze, and make judgements on their instructional practices so that their practices improve over time. Teacher education programs often incorporate reflective-based activities during field experiences. The purpose of this investigation was to determine if special education teacher candidate’s reflective practices changed as they completed their two supervised field experiences and to determine what topics the candidates focused on in their reflections. The six females graduate students were completing two field experiences in special education classrooms within one academic year as part of their coursework leading to a master’s degree and special education teacher state certification. Each candidate wrote 15 reflection journal entries (approximately 200 words each) per field experience. Each of the journal entries were reviewed sentence by sentence to determine a reflective practice score and to determine the topics discussed. The reflective practice score was calculated using four dimensions of reflection (describe, analyze, judge, and apply) in order to create a continuous variable representing their reflective practice across four points of time. A One-way Repeated Measures Analysis of Variance (ANOVA) suggested that special education teacher candidates did not change their reflective practices over time (i.e., at time-point one the practitioner’s mean score was 56.0 out of 100 (SD = 7.6), 53.8 (SD = 4.3) at time-point two, 51.2 (SD = 4.5) at time-point three, and 57.7 (SD = 8.2) at time-point four). Qualitative findings suggest candidates focused mostly on themselves in their reflections. Conclusions suggest the need for teacher preparation programs to provide more direct instruction on how a teacher should reflect. Specific implications are provided for teacher training and future research.

Keywords: field experiences, reflective practices, special educators, teacher preparation

Procedia PDF Downloads 328
4710 Parallel Computation of the Covariance-Matrix

Authors: Claude Tadonki

Abstract:

We address the issues related to the computation of the covariance matrix. This matrix is likely to be ill conditioned following its canonical expression, thus consequently raises serious numerical issues. The underlying linear system, which therefore should be solved by means of iterative approaches, becomes computationally challenging. A huge number of iterations is expected in order to reach an acceptable level of convergence, necessary to meet the required accuracy of the computation. In addition, this linear system needs to be solved at each iteration following the general form of the covariance matrix. Putting all together, its comes that we need to compute as fast as possible the associated matrix-vector product. This is our purpose in the work, where we consider and discuss skillful formulations of the problem, then propose a parallel implementation of the matrix-vector product involved. Numerical and performance oriented discussions are provided based on experimental evaluations.

Keywords: covariance-matrix, multicore, numerical computing, parallel computing

Procedia PDF Downloads 288
4709 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 340
4708 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.

Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates

Procedia PDF Downloads 284
4707 An Application Framework for Integrating Wireless Sensor and Actuator Networks for Precision Farming as Web of Things to Cloud Interface Using Platform as a Service

Authors: Sumaya Iqbal, Aijaz Ahmad Reshi

Abstract:

The advances in sensor and embedded technologies have led to rapid developments in Wireless Sensor Networks (WSNs). Presently researchers focus on the integration of WSNs to Internet for their pervasive availability to access these network resources as the interoperable subsystems. The recent computing technologies like cloud computing has made the resource sharing as a converged infrastructure with required service interfaces for the shared resources over the Internet. This paper presents application architecture for wireless Sensor and Actuator Networks (WSANS) following web of things, which allows easy integration of each node to the Internet in order to provide them web accessibility. The architecture enables the sensors and actuator nodes accessed and controlled using cloud interface on WWW. The application architecture was implemented using existing web and its emerging technologies. In particular Representational State Transfer protocol (REST) was extended for the specific requirements of the application. Cloud computing environment has been used as a development platform for the application to assess the possibility of integrating the WSAN nodes to Cloud services. The mushroom farm environment monitoring and control using WSANs has been taken as a research use case.

Keywords: WSAN, REST, web of things, ZigBee, cloud interface, PaaS, sensor gateway

Procedia PDF Downloads 98
4706 Determining the Constituents of the Sunnah of Prophet Muhammad (pbuh) in the Light of the Quran: A Clinical Approach

Authors: Aamir I. Yazdani, Dr. Muhammad Nasir J. Qureshi

Abstract:

The term Sunnah has been used both, for Allah Himself and for his messengers in the Quran. The way Allah dealt with people where the messengers (rasuls) were sent is called Sunnatullāh by the Quran. Likewise, the same term is used in the Quran, for Prophet Muhammad (pbuh) as in following the trodden path (Sunnah) of his forefather Prophet Abraham, Alaihissalam. It implies; therefore, the word Sunnah cannot be applied to things which relates to theoretical knowledge like faith etc. Its ambit remains the practices, actions linked to practical things only. In the case of the Quran, we find that there is complete agreement among all Muslims on what constitutes the book of Allah, based on ijma (unanimity, total agreement, consensus) and tawatur (uninterrupted continuity, without any gap). There seems to be no unanimity on the question on what constitutes Sunnah of Prophet Muhammad (pbuh). There are, therefore, several approaches towards Sunnah adopted by Muslims. This paper is based on Qualitative Methodology to determine the criterion of what constitutes the Sunnah of the Prophet Muhammad (pbuh) and which practices constitute the precincts of the Sunnah of the Prophet Muhammad (pbuh).

Keywords: Al-hikmah, Hereafter, practices, Tazkiya

Procedia PDF Downloads 108
4705 Exploring Knowledge, Attitudes, and Practices toward the Preventive Aspect of the COVID-19 among University Nursing Students at the University of Sunderland 2021, in the United Kingdom: A Cross-Sectional Study

Authors: Sasalanka Chamara Karunanayaka Pathirannehelage, Sarah Connelly

Abstract:

Background: Knowledge, attitudes, and practices (KAP) toward the preventive aspect of COVID-19 are crucial for effective control and prevention of the disease. Sociodemographic factors can associate with KAP. This study aims to investigate KAP towards the preventive aspect of COVID-19 and associate sociodemographic factors among university nursing students at the University of Sunderland, 2021, United Kingdom. Methods: A cross-sectional online survey was conducted among 63 university nursing students between the 1st of July and the 13th of August 2021. A previously used, validated, self-administered questionnaire was applied to assess nursing students' KAP levels. Cross tabulation and chi-square were used to identify the associated sociodemographic factors with KAP. Results: Good knowledge was shown by 98.4% of respondents. 84.1 % of respondents reported positive attitudes, while 90.5% of respondents reported good practices toward the preventive aspect of COVID-19. The knowledge score of the students was significantly associated (p = 0.03) with the ethnicity of the respondents. Students' attitudes were significantly associated (p<0.05) with students' sex, student status (home student, international student), and course type (undergraduate student, postgraduate student). Student's age, student status, and course type were significantly associated (p < 0.05) with practices toward the preventive aspect of COVID-19. Conclusion: The finding of the study suggested that the university nursing student at the University of Sunderland demonstrate good knowledge, positive attitude, and good practice level towards the preventive aspect of COVID-19. Associated factors like age, sex, student status, and course type should be considered for effective strategies against COVID-19 as well as for future outbreaks.

Keywords: knowledge, attitudes, practices, nursing students

Procedia PDF Downloads 61
4704 Enhancing Teachers’ Professional Development Programmes by the Implementation of Flipped Learning Instruction: A Qualitative Study

Authors: Badriah Algarni

Abstract:

The pedagogy of ‘flipped learning’ is a form of blended instruction which is gaining widespread attention throughout the world. However, there is a lack of research concerning teachers’ professional development (TPD) in teachers who use flipping. The aim of this study was, therefore, to identify teachers’ perspectives on their experience of flipped PD. The study used a qualitative approach. Purposive sampling recruited nineteen teachers who participated in semi-structured, in-depth interviews. Thematic analysis was used to analyse the interview data. Overall, the teachers reported feeling more confident in their knowledge and skills after participating in flipped TPD. The analysis of the interview data revealed five overarching themes:1) increased engagement with the content; 2) better use of resources; 3) a social, collaborative environment; 4) exchange of practices and experiences; and 5) valuable online activities. These findings can encourage educators, policymakers, and trainers to consider flipped TPD as a form of PD to promote the building of teachers’ knowledge and stimulate reflective practices to improve teaching and learning practices.

Keywords: engagement, flipped learning, teachers’ professional development, collaboration

Procedia PDF Downloads 76
4703 Revolutionizing Traditional Farming Using Big Data/Cloud Computing: A Review on Vertical Farming

Authors: Milind Chaudhari, Suhail Balasinor

Abstract:

Due to massive deforestation and an ever-increasing population, the organic content of the soil is depleting at a much faster rate. Due to this, there is a big chance that the entire food production in the world will drop by 40% in the next two decades. Vertical farming can help in aiding food production by leveraging big data and cloud computing to ensure plants are grown naturally by providing the optimum nutrients sunlight by analyzing millions of data points. This paper outlines the most important parameters in vertical farming and how a combination of big data and AI helps in calculating and analyzing these millions of data points. Finally, the paper outlines how different organizations are controlling the indoor environment by leveraging big data in enhancing food quantity and quality.

Keywords: big data, IoT, vertical farming, indoor farming

Procedia PDF Downloads 147
4702 Magnitude and Factors of Risky Sexual Practice among Day Laborers in Ethiopia: A Systematic Review and Meta-Analysis, 2023

Authors: Kalkidan Worku, Eniyew Tegegne, Menichil Amsalu, Samuel Derbie Habtegiorgis

Abstract:

Introduction: Because of the seasonal nature of the work, day laborers are exposed to risky sexual practices. Since the majority of them are living far away from their birthplace and family, they engage in unplanned and multiple sexual practices. These unplanned and unprotected sexual experiences are a risk for different types of sexual-related health crises. This study aimed to assess the pooled prevalence of risky sexual practices and its determinants among day laborers in Ethiopia. Methods: Online databases, including PubMed, Google Scholar, Science Direct, African Journal of Online, Academia Edu, Semantic Scholar, and university repository sites, were searched from database inception until March 2023. PRISMA 2020 guideline was used to conduct the review. Among 851 extracted studies, ten articles were retained for the final quantitative analysis. To identify the source of heterogeneity, a sub-group analysis and I² test were performed. Publication bias was assessed by using a funnel plot and the Egger and Beg test. The pooled prevalence of risky sexual practices was calculated. Besides, the association between determinant factors and risky sexual practice was determined using a pooled odds ratio (OR) with a 95% confidence interval. Result: The pooled prevalence of risky sexual practices among day laborers was 46.00% (95% CI: 32.96, 59.03). Being single (OR: 2.49; 95% CI: 1.29 to 4.83), substance use (OR: 1.79; 95% CI: 1.40 to 2.29), alcohol intake (OR: 4.19; 95% CI: 2.19 to 8.04), watching pornographic (OR: 5.49; 95% CI: 2.99 to 10.09), discussion about SRH (OR: 4.21; 95% CI: 1.34 to 13.21), visiting night clubs (OR: 2.86 95% CI: 1.79 to 4.57) and risk perception (OR: 0.37 95% CI: 0.20 to 0.70) were the possible factors for risky sexual practice of day laborers in Ethiopia. Conclusions: A large proportion of day laborers engaged in risky sexual practices. Interventions targeting creating awareness of sexual and reproductive health for day laborers should be implemented. Continuous peer education on sexual health should be given to day laborers. Sexual and reproductive health services should be accessible in their workplaces to maximize condom utilization and to facilitate sexual health education for all day laborers.

Keywords: day laborers, sexual health, risky sexual practice, unsafe sex, multiple sexual partners

Procedia PDF Downloads 50
4701 Effects of Poor Job Performance Practices on the Job Satisfaction of Workers

Authors: Prakash Singh, Thembinkosi Twalo

Abstract:

The sustainability of the Buffalo City Metropolitan Municipality (BCMM), in South Africa, is being threatened by the reported cases of poor administration, weak management of resources, inappropriate job performance, and inappropriate job behaviour of some of the workers. Since the structural-functionalists assume that formal education is a solution to societal challenges, it therefore means that the BCMM should not be experiencing this threat since many of its workers have various levels of formal education. Consequently, this study using the mixed method research approach, set out to investigate the paradoxical co-existence of inappropriate job behaviour and performance with formal education at the BCMM. Considering the impact of human factors in the labour process, this study draws attention to the divergent objectives of skill and skill bearer, with the application of knowledge subject to the knowledge bearer’s motives, will, attitudes, ethics and values. Consequently, inappropriate job behaviour and performance practices could be due to numerous factors such as lack of the necessary capabilities or refusal to apply what has been learnt due to racial or other prejudices. The role of the human factor in the labour process is a serious omission in human capital theory, which regards schooling as the only factor contributing to the ability to do a job. For this reason this study’s theoretical framework is an amalgamation of the four theories - human capital, social capital, cultural capital, and reputation capital – in an effort to obtain a broader view of the factors that shape job behaviour and performance. Since it has been established that human nature plays a crucial role in how workers undertake their responsibilities, it is important that this be taken into consideration in the BCMM’s monitoring and evaluation of the workers’ job performance practices. Hence, this exploratory study brings to the fore, the effects of poor job performance practices on the job satisfaction of workers.

Keywords: human capital, poor job performance practices, service delivery, workers’ job satisfaction

Procedia PDF Downloads 268
4700 The Impact of HRM Practices and Brand Performance on Financial Institution Performance: An Empirical Study

Authors: M. Khasro Miah, Chowdhury Hossan Golam, Muhammed Siddique Hossain

Abstract:

Recently, financial institution brand image is turning out to be pretty weak due to the presence of strong local competitors and this in term is affecting their firm performance also. In this study, four major HR practices, namely employee commitment, empowerment, loyalty, and engagement are considered in order to measure its effects on the brand and financial performance of banking organization. This study finds that the banking institutions of Bangladesh are more customer oriented rather than internal employee oriented, which makes it quite obvious that the internal HR practices will have little or no effect on the banks brand performance. Employee Commitment has emerged out to be the most important predictor, followed by employee loyalty and empowerment. The employees are well-empowered, engaged, and shows loyalty towards the organization, but their activities are not well linked with the brand. Firms should concentrate to create a congenial working atmosphere and employees should feel like a part of the organization.

Keywords: HR in bank, employee commitment, empowerment, finance, employee commitment, loyalty and engagement

Procedia PDF Downloads 449
4699 A Review on Big Data Movement with Different Approaches

Authors: Nay Myo Sandar

Abstract:

With the growth of technologies and applications, a large amount of data has been producing at increasing rate from various resources such as social media networks, sensor devices, and other information serving devices. This large collection of massive, complex and exponential growth of dataset is called big data. The traditional database systems cannot store and process such data due to large and complexity. Consequently, cloud computing is a potential solution for data storage and processing since it can provide a pool of resources for servers and storage. However, moving large amount of data to and from is a challenging issue since it can encounter a high latency due to large data size. With respect to big data movement problem, this paper reviews the literature of previous works, discusses about research issues, finds out approaches for dealing with big data movement problem.

Keywords: Big Data, Cloud Computing, Big Data Movement, Network Techniques

Procedia PDF Downloads 57
4698 A Soft Computing Approach Monitoring of Heavy Metals in Soil and Vegetables in the Republic of Macedonia

Authors: Vesna Karapetkovska Hristova, M. Ayaz Ahmad, Julijana Tomovska, Biljana Bogdanova Popov, Blagojce Najdovski

Abstract:

The average total concentrations of heavy metals; (cadmium [Cd], copper [Cu], nickel [Ni], lead [Pb], and zinc [Zn]) were analyzed in soil and vegetables samples collected from the different region of Macedonia during the years 2010-2012. Basic soil properties such as pH, organic matter and clay content were also included in the study. The average concentrations of Cd, Cu, Ni, Pb, Zn in the A horizon (0-30 cm) of agricultural soils were as follows, respectively: 0.25, 5.3, 6.9, 15.2, 26.3 mg kg-1 of soil. We have found that neural networking model can be considered as a tool for prediction and spatial analysis of the processes controlling the metal transfer within the soil-and vegetables. The predictive ability of such models is well over 80% as compared to 20% for typical regression models. A radial basic function network reflects good predicting accuracy and correlation coefficients between soil properties and metal content in vegetables much better than the back-propagation method. Neural Networking / soft computing can support the decision-making processes at different levels, including agro ecology, to improve crop management based on monitoring data and risk assessment of metal transfer from soils to vegetables.

Keywords: soft computing approach, total concentrations, heavy metals, agricultural soils

Procedia PDF Downloads 336
4697 Youth Branches of the Ruling Political Party as an Intersection Point: An Examination in Context of Capital Type

Authors: Merve Ak Efe

Abstract:

Youth branches in Turkey are one of the sub-fields where political ideologies are intersected with daily life practices. When the youth branches are examined within the framework of daily life practices, a social area can be defined where many types of capital turn into gains. The relationship between politics and capital is not only financial but can also be observed in the form of social, cultural, or emotional capital. This paper examines the political mobilization of young people who are members of the Youth Branch of the Justice and Development Party. The reason why JDP (Adalet ve Kalkınma Partisi) was chosen is that they have been the ruling party for twenty years, and there is a considerable number of young members within the party. Since Bayrampaşa is a district where JDP is politically active, This study is based on Bayrampaşa youth branches. The study examines how young people who are members of the party are mobilized and the everyday life practices and emotions underlying this mobilization. The data was collected through in-depth interviews with 13 young people, and the participant observation method was applied at the weekly meetings of the Justice and Development Party Bayrampaşa Youth Branch. Youth Branches represent a political space in which emotions turn into action for the young people who are involved in the party. During the field study at the micro level, it has been observed that the Bayrampaşa JDP Youth Branch hosted a transformation that incorporates political and social practices into modern tactics. One of the other results shows that being a member of youth branches causes a significant rise in social capital for young people. On the other hand, for the members with low cultural capital, there is an increase in social capital; however, an increase in cultural capital is not prominent.

Keywords: political mobilization, everyday practices, emotional capital, social capital, cultural capital

Procedia PDF Downloads 99
4696 Stage-Gate Framework Application for Innovation Assessment among Small and Medium-Sized Enterprises

Authors: Indre Brazauskaite, Vilte Auruskeviciene

Abstract:

The paper explores the Stage-Gate framework application for innovation maturity among small and medium-sized enterprises (SMEs). Innovation management becomes an essential business survival process for all sizes of organizations that can be evaluated and audited systemically. This research systemically defines and assesses the innovation process from the perspective of the company’s top management. Empirical research explores attitudes and existing practices of innovation management in SMEs in Baltic countries. It structurally investigates the current innovation management practices, level of standardization, and potential challenges in the area. Findings allow to structure of existing practices based on an institutionalized model and contribute to a more advanced understanding of the innovation process among SMEs. Practically, findings contribute to advanced decision-making and business planning in the process.

Keywords: innovation measure, innovation process, SMEs, stage-gate framework

Procedia PDF Downloads 77
4695 Malaria Management among Dispensers in Drug Retail Outlets in Buea Community: An Assessment of Knowledge of Malaria and Antimalarial Drug Prescription and Dispensing Practices

Authors: Marcelus U. Ajonina, Deodata B. Ngonga, Kenric B. Ware, Carine K. Nfor

Abstract:

Background: Lack of knowledge of rational use of antimalarial drugs among dispensers is a serious problem, especially in areas of intense transmission, thus increasing the risk of resistance and adverse drug reactions. This study was aimed at assessing the knowledge of malaria as well as perception and dispensing practices of antimalarials among vendors in Buea community. Methods: A community-based cross-sectional survey of a random sample of 140 drug vendors living within the Buea community was conducted between March and June 2017. A questionnaire was designed to obtain information from drug vendors on the general knowledge of malaria as well as dispensing practices. Data were analyzed using SPSS Statistics 20.0 and were considered significant at p ≤ 0.05. Results: Knowledge of malaria symptoms, transmission, and prevention was reasonable among 55.8% (77) of the respondents. Only 33.6% (47) of the respondents could attribute the cause of malaria to protozoan of genus Plasmodium species. Of the 140 vendors, 115 (82.7%) prescribe antimalarial drugs. The knowledge of the national protocol was malaria case management among dispensers was 35.0%. Vendors in hospital/community pharmacies were 2.4 times (OR = 3.14, 95% CI: 4.14 - 8.74, p < 0.001) more knowledgeable about malaria treatment protocol than those of in drugstores. The prevalence of self-prescription of antimalarials was 39.3%. Self-prescription was significantly higher in drugstores than hospital/community pharmacies (p=0.004). In all, 56 (40.6%) of vendors showed good practices regarding antimalarial drug dispensing with the majority (51.7%) from community pharmacies (OR=2.27,95% CI: 1.13-4.56). Conclusion: Findings reveal moderate knowledge of malaria but poor prescription and dispensing practices of antimalarial drugs among vendors, thus indicating a need for routine monitoring and evaluation to prevent the emergence of resistant strains to current efficacious antimalarials.

Keywords: antimalarials, drug retail outlets, dispensing, drug resistance, prescription

Procedia PDF Downloads 109
4694 Emerging Technology for Business Intelligence Applications

Authors: Hsien-Tsen Wang

Abstract:

Business Intelligence (BI) has long helped organizations make informed decisions based on data-driven insights and gain competitive advantages in the marketplace. In the past two decades, businesses witnessed not only the dramatically increasing volume and heterogeneity of business data but also the emergence of new technologies, such as Artificial Intelligence (AI), Semantic Web (SW), Cloud Computing, and Big Data. It is plausible that the convergence of these technologies would bring more value out of business data by establishing linked data frameworks and connecting in ways that enable advanced analytics and improved data utilization. In this paper, we first review and summarize current BI applications and methodology. Emerging technologies that can be integrated into BI applications are then discussed. Finally, we conclude with a proposed synergy framework that aims at achieving a more flexible, scalable, and intelligent BI solution.

Keywords: business intelligence, artificial intelligence, semantic web, big data, cloud computing

Procedia PDF Downloads 72