Search results for: functional communication
2134 Written Grammatical Errors of Arabic as Second Language (ASL) Learners: An Evaluative Study
Authors: Sadeq Al Yaari, Fayza Al Hammadi, Ayman Al Yaari, Adham Al Yaari, Montaha Al Yaari, Aayah Al Yaari, Sajedah Al Yaari, Salah Al Yami
Abstract:
Background: In recent years, the number of non-native speakers of the Arabic language has exponentially increased. Aims: This analytical study aims to investigate written grammatical errors committed by Arabic as a Second Language (ASL) learners. More specifically, it explores the reasons behind committing these errors and their effects on the daily communication of ASL learners. Methods: Ten (10) ASL senior learners of the Arabic Language Institute (ALI), College of Arts, King Saud University (KSU), Riyadh, Kingdom of Saudi Arabia (KSA) were randomly selected in this study. The participants were asked to write paragraphs about themselves and then their written work was linguistically analyzed and evaluated by the researchers and some Arabic Language experts before it was statistically analyzed. Conclusions: Results outline that written grammatical errors of ASL learners are characterized by the misuse of many grammatical items. Mainly, these items are proper nouns (PN), common nouns (CN), main verbs (MV), adjectives (adj.), time adverbs (T. Adv.), manner adverbs (M. Adv.), objective pronouns (OP), and central determiners (C Det.) including demonstratives (Dem.) and articles (Artic.), pronouns (Pron.) and prepositions (Prep.).Keywords: written, grammatical errors, Arabic, second language, non-native learners, analysis.
Procedia PDF Downloads 442133 Gestalt in Music and Brain: A Non-Linear Chaos Based Study with Detrended/Adaptive Fractal Analysis
Authors: Shankha Sanyal, Archi Banerjee, Sayan Biswas, Sourya Sengupta, Sayan Nag, Ranjan Sengupta, Dipak Ghosh
Abstract:
The term ‘gestalt’ has been widely used in the field of psychology which defined the perception of human mind to group any object not in part but as a 'unified' whole. Music, in general, is polyphonic - i.e. a combination of a number of pure tones (frequencies) mixed together in a manner that sounds harmonious. The study of human brain response due to different frequency groups of the acoustic signal can give us an excellent insight regarding the neural and functional architecture of brain functions. Hence, the study of music cognition using neuro-biosensors is becoming a rapidly emerging field of research. In this work, we have tried to analyze the effect of different frequency bands of music on the various frequency rhythms of human brain obtained from EEG data. Four widely popular Rabindrasangeet clips were subjected to Wavelet Transform method for extracting five resonant frequency bands from the original music signal. These frequency bands were initially analyzed with Detrended/Adaptive Fractal analysis (DFA/AFA) methods. A listening test was conducted on a pool of 100 respondents to assess the frequency band in which the music becomes non-recognizable. Next, these resonant frequency bands were presented to 20 subjects as auditory stimulus and EEG signals recorded simultaneously in 19 different locations of the brain. The recorded EEG signals were noise cleaned and subjected again to DFA/AFA technique on the alpha, theta and gamma frequency range. Thus, we obtained the scaling exponents from the two methods in alpha, theta and gamma EEG rhythms corresponding to different frequency bands of music. From the analysis of music signal, it is seen that loss of recognition is proportional to the loss of long range correlation in the signal. From the EEG signal analysis, we obtain frequency specific arousal based response in different lobes of brain as well as in specific EEG bands corresponding to musical stimuli. In this way, we look to identify a specific frequency band beyond which the music becomes non-recognizable and below which in spite of the absence of other bands the music is perceivable to the audience. This revelation can be of immense importance when it comes to the field of cognitive music therapy and researchers of creativity.Keywords: AFA, DFA, EEG, gestalt in music, Hurst exponent
Procedia PDF Downloads 3322132 Adopting Flocks of Birds Approach to Predator for Anomalies Detection on Industrial Control Systems
Abstract:
Industrial Control Systems (ICS) such as Supervisory Control And Data Acquisition (SCADA) can be seen in many different critical infrastructures, from nuclear management to utility, medical equipment, power, waste and engine management on ships and planes. The role SCADA plays in critical infrastructure has resulted in a call to secure them. Many lives depend on it for daily activities and the attack vectors are becoming more sophisticated. Hence, the security of ICS is vital as malfunction of it might result in huge risk. This paper describes how the application of Prey Predator (PP) approach in flocks of birds could enhance the detection of malicious activities on ICS. The PP approach explains how these animals in groups or flocks detect predators by following some simple rules. They are not necessarily very intelligent animals but their approach in solving complex issues such as detection through corporation, coordination and communication worth emulating. This paper will emulate flocking behavior seen in birds in detecting predators. The PP approach will adopt six nearest bird approach in detecting any predator. Their local and global bests are based on the individual detection as well as group detection. The PP algorithm was designed following MapReduce methodology that follows a Split Detection Convergence (SDC) approach.Keywords: artificial life, industrial control system (ICS), IDS, prey predator (PP), SCADA, SDC
Procedia PDF Downloads 3022131 Internet Optimization by Negotiating Traffic Times
Authors: Carlos Gonzalez
Abstract:
This paper describes a system to optimize the use of the internet by clients requiring downloading of videos at peak hours. The system consists of a web server belonging to a provider of video contents, a provider of internet communications and a software application running on a client’s computer. The client using the application software will communicate to the video provider a list of the client’s future video demands. The video provider calculates which videos are going to be more in demand for download in the immediate future, and proceeds to request the internet provider the most optimal hours to do the downloading. The times of the downloading will be sent to the application software, which will use the information of pre-established hours negotiated between the video provider and the internet provider to download those videos. The videos will be saved in a special protected section of the user’s hard disk, which will only be accessed by the application software in the client’s computer. When the client is ready to see a video, the application will search the list of current existent videos in the area of the hard disk; if it does exist, it will use this video directly without the need for internet access. We found that the best way to optimize the download traffic of videos is by negotiation between the internet communication provider and the video content provider.Keywords: internet optimization, video download, future demands, secure storage
Procedia PDF Downloads 1362130 Cross-Cultural Competence Development through 'Learning by Reflection': A Case Study of Chinese International Students Learning through Taking Part-Time Jobs in the UK
Authors: Xin Zhao
Abstract:
The project aims to expand the notion of narrative learning and address the importance of learning by reflection in our learning and teaching context at a British university. Drawing on the key concepts such as development ZPD, transition and reflection-in and –on-action, this project analyses the learning experiences of a small sample of Chinese postgraduate students in a British University, who use part-time job experience to develop cross-cultural communication skills. The project adopts a mixed methods approach. Questionnaires and focus group interviews are used to examine the way in which students adapt (or not adapt) to the culture of learning in a British university and develop a renewed sense of self in transitions from one culture to the other. The project also looks at how the students appropriate opportunities for learning not just from classrooms but outside classrooms from everyday encounters. The project aims to address the implication of learning by reflection as development in transition. Time in and for learning, or duration, is taken for granted in theorising narrative learning. The project shall explore this very issue of time in relation to learning by reflection in considering time in/of/for learning as duration.Keywords: cross-cultural competence, learning by refection, international student transition, part-time work experience
Procedia PDF Downloads 1852129 A Soft System Approach to Explore Ill-Defined Issues in Distance Education System - A Case of Saudi Arabia
Authors: Sulafah Basahel
Abstract:
Nowadays, Higher Education Institutions (HEIs) around the world are attempting to utilize Information and Communication Technologies (ICTs) to enhance learning process and strategies of knowledge delivery for students through Distance Education (DE) system. Stakeholders in DE system face a complex situation of different ill-defined and related issues that influence decision making process. In this study system thinking as a body of knowledge is used to explore the emergent properties that produced from these connections between issues and could have either positive or negative outcomes for the DE development. Checkland Soft System Methodology (SSM) - Mode 2 is employed in a cultural context of Saudi Arabia for more knowledge acquisition purposes among multiple stakeholders in DE rather than solving problems to achieve an overall development of DE system. This paper will discuss some political, cultural issues and connections between them that impact on effectiveness of stakeholders’ activities and relations. This study will significantly contribute to both system thinking and education fields by leading decision makers in DE to reconsider future plans, strategies and right actions for more successful educational practices.Keywords: distance education, higher education institutions, ill-defined issues, soft system methodology-Mode 2
Procedia PDF Downloads 2702128 The Challenges Faced in Learning English as a Second Language in Sri Lanka: A Case Study of Ordinary Level Students in Kurunegala District
Authors: H. L. M. Fawzan
Abstract:
Undoubtedly, learning English as a second language (ESL) is considered a challenging task. It is more difficult for students in far-away districts when compared with the students in the capital cities, where learning resources are easily available and where the environment is conducive to learning. Thus, this study is an analysis of the challenges faced by learners in learning English as the second language within kurunegala district in Sri Lanka. Even though various efforts have been taken by the Sri Lankan Educationalists for improving the situation of English language teaching for the past few decades, a disappointing situation still exist in the achievements of English learning among Sri Lankan students. So, it is necessary to explore real reasons behind the poor achievements of the students in the English Language. It is also an attempt to highlight what can be done to improve the situation significantly. Kurunegala is far away from the capital city of Sri Lanka and is a densely populated district. In the year 2020, state university admission was 45.87% from the Kurunegala district (Department of Examinations). The researcher strived to examine some of the likely challenges faced when teaching English in secondary schools in Kurunegala. The data was collected using a questionnaire from 35 students from schools within the Kurunegala education division. The result of the study reveals that students were highly motivated to learn English for their prospects and expectations such as local and international communication, academic advancement, and employment prospects.Keywords: english, teaching, Kurunegala, Sri Lanka, challenges
Procedia PDF Downloads 1512127 Creativity in the Use of Sinhala and English in Advertisements in Sri Lanka: A Morphological Analysis
Authors: Chamindi Dilkushi Senaratne
Abstract:
Sri Lanka has lived with the English language for more than 200 years. Although officially considered a link language, the phenomenal usage of English by the Sinhala-English bilingual has given rise to a mixed code with identifiable structural characteristics. The extensive use of the mixed language by the average Sri Lankan bilingual has resulted in it being used as a medium of communication by creative writers of bilingual advertisements in Sri Lanka. This study analyses the way in which English is used in bilingual advertisements in both print and electronic media in Sri Lanka. The theoretical framework for the study is based on Kachru’s analysis of the use of English by the bilingual, Muysken’s typology on code mixing theories in colonial settings and Myers-Scotton’s theory on the Matrix Language Framework Model. The study will look at a selection of Sinhala-English advertisements published in newspapers from 2015 to 2016. Only advertisements using both Sinhala and English are used for the analysis. To substantiate data collected from the newspapers, the study will select bilingual advertisements from television advertisements. The objective of the study is to analyze the mixed patterns used for creative purposes by advertisers. The results of the study will reveal the creativity used by the Sinhala –English bilingual and the morphological processes used by the creators of Sinhala-English bilingual advertisements to attract the masses.Keywords: bilingual, code mixing, morphological processes, mixed code
Procedia PDF Downloads 2862126 A Follow–Up Study of Bachelor of Science Graduates in Applied Statistics from Suan Sunandha Rajabhat University during the 1999-2012 Academic Years
Authors: Somruedee Pongsena
Abstract:
The purpose of this study is to follow up on the graduated students of Bachelor of Science in Applied Statistics from Suan Sunandha Rajabhat University (SSRU) during the 1999 – 2012 academic years and to provide the fundamental guideline for developing the current curriculum according to Thai Qualifications Framework for Higher Education (TQF: HEd). The sample was collected from 75 graduates by interview and online questionnaire. The content covered 5 subjects: ethics and moral, knowledge, cognitive skills, interpersonal skills and responsibility, numerical analysis as well as communication and information technology skills. Data were analyzed by using statistical methods as percentiles, means, standard deviation, t-tests, and F-tests. The findings showed that samples were mostly females younger than 26 years old. The majority of graduates had income in the range of 10,001-20,000 Baht and their experience range was 2-5 years. In addition, overall opinions from receiving knowledge to apply to work were at agree; mean score was 3.97 and standard deviation was 0.40. In terms of opinion difference, the hypothesis' testing results indicate gender only had different opinion at a significant level of 0.05.Keywords: follow-up, graduates, knowledge, opinion, work performance.
Procedia PDF Downloads 2112125 Adsorptive Media Selection for Bilirubin Removal: An Adsorption Equilibrium Study
Authors: Vincenzo Piemonte
Abstract:
The liver is a complex, large-scale biochemical reactor which plays a unique role in the human physiology. When liver ceases to perform its physiological activity, a functional replacement is required. Actually, liver transplantation is the only clinically effective method of treating severe liver disease. Anyway, the aforementioned therapeutic approach is hampered by the disparity between organ availability and the number of patients on the waiting list. In order to overcome this critical issue, research activities focused on liver support device systems (LSDs) designed to bridging patients to transplantation or to keep them alive until the recovery of native liver function. In recirculating albumin dialysis devices, such as MARS (Molecular Adsorbed Recirculating System), adsorption is one of the fundamental steps in albumin-dialysate regeneration. Among the albumin-bound toxins that must be removed from blood during liver-failure therapy, bilirubin and tryptophan can be considered as representative of two different toxin classes. The first one, not water soluble at physiological blood pH and strongly bounded to albumin, the second one, loosely albumin bound and partially water soluble at pH 7.4. Fixed bed units are normally used for this task, and the design of such units requires information both on toxin adsorption equilibrium and kinetics. The most common adsorptive media used in LSDs are activated carbon, non-ionic polymeric resins and anionic resins. In this paper, bilirubin adsorption isotherms on different adsorptive media, such as polymeric resin, albumin-coated resin, anionic resin, activated carbon and alginate beads with entrapped albumin are presented. By comparing all the results, it can be stated that the adsorption capacity for bilirubin of the five different media increases in the following order: Alginate beads < Polymeric resin < Albumin-coated resin < Activated carbon < Anionic resin. The main focus of this paper is to provide useful guidelines for the optimization of liver support devices which implement adsorption columns to remove albumin-bound toxins from albumin dialysate solutions.Keywords: adsorptive media, adsorption equilibrium, artificial liver devices, bilirubin, mathematical modelling
Procedia PDF Downloads 2562124 Definite Article Errors and Effect of L1 Transfer
Authors: Bimrisha Mali
Abstract:
The present study investigates the type of errors English as a second language (ESL) learners produce using the definite article ‘the’. The participants were provided a questionnaire on the learner's ability test. The questionnaire consists of three cloze tests and two free composition tests. Each participant's response was received in the form of written data. A total of 78 participants from three government schools participated in the study. The participants are high-school students from Rural Assam. Assam is a north-eastern state of India. Their age ranged between 14-15. The medium of instruction and the communication among the students take place in the local language, i.e., Assamese. Pit Corder’s steps for conducting error analysis have been followed for the analysis procedure. Four types of errors were found (1) deletion of the definite article, (2) use of the definite article as modifiers as adjectives, (3) incorrect use of the definite article with singular proper nouns, (4) substitution of the definite article by the indefinite article ‘a’. Classifiers in Assamese that express definiteness is used with nouns, adjectives, and numerals. It is found that native language (L1) transfer plays a pivotal role in the learners’ errors. The analysis reveals the learners' inability to acquire the semantic connotation of definiteness in English due to native language (L1) interference.Keywords: definite article error, l1 transfer, error analysis, ESL
Procedia PDF Downloads 1222123 Migration, Violent Extremism and Gang Violence in Trinidad and Tobago
Authors: Raghunath Mahabir
Abstract:
This paper provides an analysis of the existing evidence on the relationships between the migration of Venezuelans into Trinidad and Tobago, violent extremism and gang violence. Arguing that there is a dearth of reliable data on the subject matter, the paper fills the gap by providing relevant definitions of terms used, discusses the sources of data and identifies the causes for this migration and the subsequent ramifications for Trinidad and Tobago and for the migrants themselves. A simple but clear classification pointing to the nexus between migration gang violence and violent extremism is developed, following the logic of migration of criminals(gang members), the need to link with local gangs and the view that certain elements within the TnT society has become radicalized to the point where violent extremism is being displayed in different ways. The paper highlights implications for further policy debate:the imperatives for more effective communication between government officials responsible for migration and those personnel who are tasked with countering violent extremism and gang violence: promoting and executing better integration and social inclusion policies which are necessary to minimize social exclusion, and the threat of violent extremist agendas emanating from both Venezuelans and Trinidadians and generally to establish strong analytical framework grounded in stronger definitions, more reliable data and other evidence which can guide further research and analysis and contribute to policy formation.Keywords: migration, violent extremism, gangs, Venezuela
Procedia PDF Downloads 542122 Aspectual Verbs in Modern Standard Arabic
Authors: Yasir Alotaibi
Abstract:
The aim of this paper is to discuss the syntactic analysis of aspectual or phasal verbs in Modern Standard Arabic (MSA). Aspectual or phasal verbs refer to a class of verbs that require a verbal complement and denote the inception, duration, termination ...etc. of a state or event. This paper will discuss two groups of aspectual verbs in MSA. The first group includes verbs such as ̆gacala, tafiqa, ?akhatha, ?ansha?a, sharaca and bada?a and these verbs are used to denote the inception of an event. The second group includes verbs such as ?awshaka, kaada and karaba and the meaning of these verbs is equivalent to be near/almost . The following examples illustrate the use of the verb bada?a ‘begin’ which is from the first group: a. saalim-un bada?a yuthaakiru. Salem-NOM begin.PFV.3SGM study.IPFV.3SGM ‘Salem began to study’ b.*saalim-un bada?a ?an yuthaakiru. Salem-NOM begin.PFV.3SGM COMP study.IPFV.3SGM ‘Salem began to study’ The example in (1a) is grammatical because the aspectual verb is used with a verbal complement that is not introduced by a complementizer. In contrast, example (1b) is not grammatical because the verbal complement is introduced by the complementizer ?an ‘that’. In contrast, the following examples illustrate the use of the verb kaada ‘be almost’ which is from the second group. However, the two examples are grammatical and this means that the verbal complement of this verb can be without (as in example (2a)) or with ( as in example (2b)) a complementizer. (2) a. saalim-un kaada yuthaakiru. Salem-NOM be.almost.PFV.3SGM study.IPFV.3SGM ‘Salem was almost to study’ b. saalim-un kaada ?an yuthaakiru. Salem-NOM be.almost.PFV.3SGM COMP study.IPFV.3SGM ‘Salem was almost to study’ The salient properties of this class of verbs are that they require a verbal complement, there is no a complementizer that can introduce the complement with the first group while it is possible with the second and the aspectual verb and the embedded verb share and agree with the same subject. To the best of knowledge, aspectual verbs in MSA are discussed in traditional grammar only and have not been studied in modern syntactic theories. This paper will consider the analysis of aspectual verbs in MSA within the Lexical Functional Grammar (LFG) framework. It will use some evidence such as modifier or negation to find out whether these verbs have PRED values and head their f-structures or they form complex predicates with their complements. If aspectual verbs show the properties of heads, then the paper will explore what kind of heads they are. In particular, they should be raising or control verbs. The paper will use some tests such as agreement, selectional restrictions...etc. to find out what kind of verbs they are.Keywords: aspectual verbs, biclausal, monoclausal, raising
Procedia PDF Downloads 552121 Minimum Vertices Dominating Set Algorithm for Secret Sharing Scheme
Authors: N. M. G. Al-Saidi, K. A. Kadhim, N. A. Rajab
Abstract:
Over the past decades, computer networks and data communication system has been developing fast, so, the necessity to protect a transmitted data is a challenging issue, and data security becomes a serious problem nowadays. A secret sharing scheme is a method which allows a master key to be distributed among a finite set of participants, in such a way that only certain authorized subsets of participants to reconstruct the original master key. To create a secret sharing scheme, many mathematical structures have been used; the most widely used structure is the one that is based on graph theory (graph access structure). Subsequently, many researchers tried to find efficient schemes based on graph access structures. In this paper, we propose a novel efficient construction of a perfect secret sharing scheme for uniform access structure. The dominating set of vertices in a regular graph is used for this construction in the following way; each vertex represents a participant and each minimum independent dominating subset represents a minimal qualified subset. Some relations between dominating set, graph order and regularity are achieved, and can be used to demonstrate the possibility of using dominating set to construct a secret sharing scheme. The information rate that is used as a measure for the efficiency of such systems is calculated to show that the proposed method has some improved values.Keywords: secret sharing scheme, dominating set, information rate, access structure, rank
Procedia PDF Downloads 3932120 Characterization of Kevlar 29 for Multifunction Applications
Authors: Doaa H. Elgohary, Dina M. Hamoda, S. Yahia
Abstract:
Technical textiles refer to textile materials that are engineered and designed to have specific functionalities and performance characteristics beyond their traditional use as apparel or upholstery fabrics. These textiles are usually developed for their unique properties such as strength, durability, flame retardancy, chemical resistance, waterproofing, insulation and other special properties. The development and use of technical textiles are constantly evolving, driven by advances in materials science, manufacturing technologies and the demand for innovative solutions in various industries. Kevlar 29 is a type of aramid fiber developed by DuPont. It is a high-performance material known for its exceptional strength and resistance to impact, abrasion, and heat. Kevlar 29 belongs to the Kevlar family, which includes different types of aramid fibers. Kevlar 29 is primarily used in applications that require strength and durability, such as ballistic protection, body armor, and body armor for military and law enforcement personnel. It is also used in the aerospace and automotive industries to reinforce composite materials, as well as in various industrial applications. Two different Kevlar samples were used coated with cooper lithium silicate (CLS); ten different mechanical and physical properties (weight, thickness, tensile strength, elongation, stiffness, air permeability, puncture resistance, thermal conductivity, stiffness, and spray test) were conducted to approve its functional performance efficiency. The influence of different mechanical properties was statistically analyzed using an independent t-test with a significant difference at P-value = 0.05. The radar plot was calculated and evaluated to determine the best-performing samples. The results of the independent t-test observed that all variables were significantly affected by yarn counts except water permeability, which has no significant effect. All properties were evaluated for samples 1 and 2, a radar chart was used to determine the best attitude for samples. The radar chart area was calculated, which shows that sample 1 recorded the best performance, followed by sample 2. The surface morphology of all samples and the coating materials was determined using a scanning electron microscope (SEM), also Fourier Transform Infrared Spectroscopy Measurement for the two samples.Keywords: cooper lithium silicate, independent t-test, kevlar, technical textiles.
Procedia PDF Downloads 802119 PEINS: A Generic Compression Scheme Using Probabilistic Encoding and Irrational Number Storage
Authors: P. Jayashree, S. Rajkumar
Abstract:
With social networks and smart devices generating a multitude of data, effective data management is the need of the hour for networks and cloud applications. Some applications need effective storage while some other applications need effective communication over networks and data reduction comes as a handy solution to meet out both requirements. Most of the data compression techniques are based on data statistics and may result in either lossy or lossless data reductions. Though lossy reductions produce better compression ratios compared to lossless methods, many applications require data accuracy and miniature details to be preserved. A variety of data compression algorithms does exist in the literature for different forms of data like text, image, and multimedia data. In the proposed work, a generic progressive compression algorithm, based on probabilistic encoding, called PEINS is projected as an enhancement over irrational number stored coding technique to cater to storage issues of increasing data volumes as a cost effective solution, which also offers data security as a secondary outcome to some extent. The proposed work reveals cost effectiveness in terms of better compression ratio with no deterioration in compression time.Keywords: compression ratio, generic compression, irrational number storage, probabilistic encoding
Procedia PDF Downloads 2952118 Performance Analysis of a Combined Ordered Successive and Interference Cancellation Using Zero-Forcing Detection over Rayleigh Fading Channels in Mimo Systems
Authors: Jamal R. Elbergali
Abstract:
Multiple Input Multiple Output (MIMO) systems are wireless systems with multiple antenna elements at both ends of the link. Wireless communication systems demand high data rate and spectral efficiency with increased reliability. MIMO systems have been popular techniques to achieve these goals because increased data rate is possible through spatial multiplexing scheme and diversity. Spatial Multiplexing (SM) is used to achieve higher possible throughput than diversity. In this paper, we propose a Zero-Forcing (ZF) detection using a combination of Ordered Successive Interference Cancellation (OSIC) and Zero Forcing using Interference Cancellation (ZF-IC). The proposed method used an OSIC based on Signal to Noise Ratio (SNR) ordering to get the estimation of last symbol (x ̃_(N_T )), then the estimated last symbol is considered to be an input to the ZF-IC. We analyze the Bit Error Rate (BER) performance of the proposed MIMO system over Rayleigh Fading Channel, using Binary Phase Shift Keying (BPSK) modulation scheme. The results show better performance than the previous methods.Keywords: SNR, BER, BPSK, MIMO, modulation, zero forcing (ZF), OSIC, ZF-IC, spatial multiplexing (SM)
Procedia PDF Downloads 4232117 Real Time Monitoring and Control of Proton Exchange Membrane Fuel Cell in Cognitive Radio Environment
Authors: Prakash Thapa, Gye Choon Park, Sung Gi Kwon, Jin Lee
Abstract:
The generation of electric power from a proton exchange membrane (PEM) fuel cell is influenced by temperature, pressure, humidity, flow rate of reactant gaseous and partial flooding of membrane electrode assembly (MEA). Among these factors, temperature and cathode flooding are the most affecting parameters on the performance of fuel cell. This paper describes the detail design and effect of these parameters on PEM fuel cell. Performance of all parameters was monitored, analyzed and controlled by using 5KWatt PEM fuel cell. In the real-time data communication for remote monitoring and control of PEM fuel cell, a normalized least mean square algorithm in cognitive radio environment is used. By the use of this method, probability of energy signal detection will be maximum which solved the frequency shortage problem. So the monitoring system hanging out and slow speed problem will be solved. Also from the control unit, all parameters are controlled as per the system requirement. As a result, PEM fuel cell generates maximum electricity with better performance.Keywords: proton exchange membrane (PEM) fuel cell, pressure, temperature and humidity sensor (PTH), efficiency curve, cognitive radio network (CRN)
Procedia PDF Downloads 4592116 The Development of Competency with a Training Curriculum via Electronic Media for Condominium Managers
Authors: Chisakan Papapankiad
Abstract:
The purposes of this research were 1) to study the competency of condominium managers, 2) to create the training curriculum via electronic media for condominium managers, and 3) to evaluate the training curriculum for condominium managers. The research methods included document analysis, interview, questionnaire, and a try-out. A total of 20 experts were selected to collect data by using Delphi technique. The designed curriculum was tried out with 30 condominium managers. The important steps of conducting this research included analyzing and synthesizing, creating interview questions, conducting factor analysis and developing the training curriculum, editing by experts, and trying out with sample groups. The findings revealed that there were five core competencies: leadership, human resources management, management, communication, and self-development. The training curriculum was designed and all the learning materials were put into a CD. The evaluation of the training curriculum was performed by five experts and the training curriculum was found to be cohesive and suitable for use in the real world. Moreover, the findings also revealed three important issues: 1) the competencies of the respondents after the experiment were higher than before the experiment and this had a level of significance of 0.01, 2) the competencies remained with the respondents at least 12 weeks and this also had a level of significance of 0.01, and 3) the overall level of satisfaction from the respondents were 'the highest level'.Keywords: competency training curriculum, condominium managers, electronic media
Procedia PDF Downloads 2862115 A Smartphone-Based Real-Time Activity Recognition and Fall Detection System
Authors: Manutchanok Jongprasithporn, Rawiphorn Srivilai, Paweena Pongsopha
Abstract:
Fall is the most serious accident leading to increased unintentional injuries and mortality. Falls are not only the cause of suffering and functional impairments to the individuals, but also the cause of increasing medical cost and days away from work. The early detection of falls could be an advantage to reduce fall-related injuries and consequences of falls. Smartphones, embedded accelerometer, have become a common device in everyday life due to decreasing technology cost. This paper explores a physical activity monitoring and fall detection application in smartphones which is a non-invasive biomedical device to determine physical activities and fall event. The combination of application and sensors could perform as a biomedical sensor to monitor physical activities and recognize a fall. We have chosen Android-based smartphone in this study since android operating system is an open-source and no cost. Moreover, android phone users become a majority of Thai’s smartphone users. We developed Thai 3 Axis (TH3AX) as a physical activities and fall detection application which included command, manual, results in Thai language. The smartphone was attached to right hip of 10 young, healthy adult subjects (5 males, 5 females; aged< 35y) to collect accelerometer and gyroscope data during performing physical activities (e.g., walking, running, sitting, and lying down) and falling to determine threshold for each activity. Dependent variables are including accelerometer data (acceleration, peak acceleration, average resultant acceleration, and time between peak acceleration). A repeated measures ANOVA was performed to test whether there are any differences between DVs’ means. Statistical analyses were considered significant at p<0.05. After finding threshold, the results were used as training data for a predictive model of activity recognition. In the future, accuracies of activity recognition will be performed to assess the overall performance of the classifier. Moreover, to help improve the quality of life, our system will be implemented with patients and elderly people who need intensive care in hospitals and nursing homes in Thailand.Keywords: activity recognition, accelerometer, fall, gyroscope, smartphone
Procedia PDF Downloads 6922114 Barriers Facing the Implementation of Lean Manufacturing in Libyan Manufacturing Companies
Authors: Mohamed Abduelmula, Martin Birkett, Chris Connor
Abstract:
Lean Manufacturing has developed from being a set of tools and methods to becoming a management philosophy which can be used to remove or reduce waste in manufacturing processes and so enhance the operational productivity of an enterprise. Several enterprises around the world have applied the lean manufacturing system and gained great improvements. This paper investigates the barriers and obstacles that face Libyan manufacturing companies to implement lean manufacturing. A mixed-method approach is suggested, starting with conducting a questionnaire to get quantitative data then using this to develop semi-structured interviews to collect qualitative data. The findings of the questionnaire results and how these can be used further develop the semi-structured interviews are then discussed. The survey was distributed to 65 manufacturing companies in Libya, and a response rate of 64.6% was obtained. The results showed that these are five main barriers to implementing lean in Libya, namely organizational culture, skills and expertise, and training program, financial capability, top management, and communication. These barriers were also identified from the literature as being significant obstacles to implementing Lean in other countries industries. Having an understanding of the difficulties that face the implementation of lean manufacturing systems, as a new and modern system and using this to develop a suitable framework will help to improve the manufacturing sector in Libya.Keywords: lean manufacturing, barriers, questionnaire, Libyan manufacturing companies
Procedia PDF Downloads 2472113 Political Discourse and Linguistic Manipulation in Nigerian Politics
Authors: Kunle Oparinde, Ernestina Maleshoane Rapeane-Mathonsi, Gift Mheta
Abstract:
Using Critical Discourse Analysis (CDA) and Multimodal Discourse Analysis (MDA), the research seeks to deconstruct politically-motivated discourse as observed from Nigerian politics. This is intended to be achieved by analysing linguistic (mis)representation and manipulation in Nigerian political settings, drawing from instances of language use as observed from different political campaigns. Since language in itself is generally meaningless without context, it is therefore paramount to analyse the (mis)representation and manipulation in Nigerian political sceneries within their contextual basis. The study focuses on political language used by Nigerian politicians emanating from printed and social media forms such as posters, pamphlets, speeches, billboards, and internet sources purposely selected across Nigeria. The research further aims at investigating the discursive strategies used by politicians to gain more audience, and, as a result, shape opinions that result in votes. The study employs a qualitative approach. Two parties are intentionally selected because they have been essentially strong at the national level namely: All Progressive Congress (APC) and the People’s Democratic Party (PDP). The study finds out that politicians in Nigeria, as in many parts of the world, use language to manipulate the electorate. Comprehensive discussion of these instances of political manipulation remains the thrust of this paper.Keywords: communication, discourse, manipulation, misrepresentation
Procedia PDF Downloads 2512112 Defence Ethics : A Performance Measurement Framework for the Defence Ethics Program
Authors: Allyson Dale, Max Hlywa
Abstract:
The Canadian public expects the highest moral standards from Canadian Armed Forces (CAF) members and Department of National Defence (DND) employees. The Chief, Professional Conduct and Culture (CPCC) stood up in April 2021 with the mission of ensuring that the defence culture and members’ conduct are aligned with the ethical principles and values that the organization aspires towards. The Defence Ethics Program (DEP), which stood up in 1997, is a values-based ethics program for individuals and organizations within the DND/CAF and now falls under CPCC. The DEP is divided into five key functional areas, including policy, communications, collaboration, training and education, and advice and guidance. The main focus of the DEP is to foster an ethical culture within defence so that members and organizations perform to the highest ethical standards. The measurement of organizational ethics is often complex and challenging. In order to monitor whether the DEP is achieving its intended outcomes, a performance measurement framework (PMF) was developed using the Director General Military Personnel Research and Analysis (DGMPRA) PMF development process. This evidence-based process is based on subject-matter expertise from the defence team. The goal of this presentation is to describe each stage of the DGMPRA PMF development process and to present and discuss the products of the DEP PMF (e.g., logic model). Specifically, first, a strategic framework was developed to provide a high-level overview of the strategic objectives, mission, and vision of the DEP. Next, Key Performance Questions were created based on the objectives in the strategic framework. A logic model detailing the activities, outputs (what is produced by the program activities), and intended outcomes of the program were developed to demonstrate how the program works. Finally, Key Performance Indicators were developed based on both the intended outcomes in the logic model and the Key Performance Questions in order to monitor program effectiveness. The Key Performance Indicators measure aspects of organizational ethics such as ethical conduct and decision-making, DEP collaborations, and knowledge and awareness of the Defence Ethics Code while leveraging ethics-related items from multiple DGMPRA surveys where appropriate.Keywords: defence ethics, ethical culture, organizational performance, performance measurement framework
Procedia PDF Downloads 1052111 Preliminary Study of Gold Nanostars/Enhanced Filter for Keratitis Microorganism Raman Fingerprint Analysis
Authors: Chi-Chang Lin, Jian-Rong Wu, Jiun-Yan Chiu
Abstract:
Myopia, ubiquitous symptom that is necessary to correct the eyesight by optical lens struggles many people for their daily life. Recent years, younger people raise interesting on using contact lens because of its convenience and aesthetics. In clinical, the risk of eye infections increases owing to the behavior of incorrectly using contact lens unsupervised cleaning which raising the infection risk of cornea, named ocular keratitis. In order to overcome the identification needs, new detection or analysis method with rapid and more accurate identification for clinical microorganism is importantly needed. In our study, we take advantage of Raman spectroscopy having unique fingerprint for different functional groups as the distinct and fast examination tool on microorganism. As we know, Raman scatting signals are normally too weak for the detection, especially in biological field. Here, we applied special SERS enhancement substrates to generate higher Raman signals. SERS filter we designed in this article that prepared by deposition of silver nanoparticles directly onto cellulose filter surface and suspension nanoparticles - gold nanostars (AuNSs) also be introduced together to achieve better enhancement for lower concentration analyte (i.e., various bacteria). Research targets also focusing on studying the shape effect of synthetic AuNSs, needle-like surface morphology may possible creates more hot-spot for getting higher SERS enhance ability. We utilized new designed SERS technology to distinguish the bacteria from ocular keratitis under strain level, and specific Raman and SERS fingerprint were grouped under pattern recognition process. We reported a new method combined different SERS substrates can be applied for clinical microorganism detection under strain level with simple, rapid preparation and low cost. Our presenting SERS technology not only shows the great potential for clinical bacteria detection but also can be used for environmental pollution and food safety analysis.Keywords: bacteria, gold nanostars, Raman spectroscopy surface-enhanced Raman scattering filter
Procedia PDF Downloads 1682110 Internet of Assets: A Blockchain-Inspired Academic Program
Authors: Benjamin Arazi
Abstract:
Blockchain is the technology behind cryptocurrencies like Bitcoin. It revolutionizes the meaning of trust in the sense of offering total reliability without relying on any central entity that controls or supervises the system. The Wall Street Journal states: “Blockchain Marks the Next Step in the Internet’s Evolution”. Blockchain was listed as #1 in Linkedin – The Learning Blog “most in-demand hard skills needed in 2020”. As stated there: “Blockchain’s novel way to store, validate, authorize, and move data across the internet has evolved to securely store and send any digital asset”. GSMA, a leading Telco organization of mobile communications operators, declared that “Blockchain has the potential to be for value what the Internet has been for information”. Motivated by these seminal observations, this paper presents the foundations of a Blockchain-based “Internet of Assets” academic program that joins under one roof leading application areas that are characterized by the transfer of assets over communication lines. Two such areas, which are pillars of our economy, are Fintech – Financial Technology and mobile communications services. The next application in line is Healthcare. These challenges are met based on available extensive professional literature. Blockchain-based assets communication is based on extending the principle of Bitcoin, starting with the basic question: If digital money that travels across the universe can ‘prove its own validity’, can this principle be applied to digital content. A groundbreaking positive answer here led to the concept of “smart contract” and consequently to DLT - Distributed Ledger Technology, where the word ‘distributed’ relates to the non-existence of reliable central entities or trusted third parties. The terms Blockchain and DLT are frequently used interchangeably in various application areas. The World Bank Group compiled comprehensive reports, analyzing the contribution of DLT/Blockchain to Fintech. The European Central Bank and Bank of Japan are engaged in Project Stella, “Balancing confidentiality and auditability in a distributed ledger environment”. 130 DLT/Blockchain focused Fintech startups are now operating in Switzerland. Blockchain impact on mobile communications services is treated in detail by leading organizations. The TM Forum is a global industry association in the telecom industry, with over 850 member companies, mainly mobile operators, that generate US$2 trillion in revenue and serve five billion customers across 180 countries. From their perspective: “Blockchain is considered one of the digital economy’s most disruptive technologies”. Samples of Blockchain contributions to Fintech (taken from a World Bank document): Decentralization and disintermediation; Greater transparency and easier auditability; Automation & programmability; Immutability & verifiability; Gains in speed and efficiency; Cost reductions; Enhanced cyber security resilience. Samples of Blockchain contributions to the Telco industry. Establishing identity verification; Record of transactions for easy cost settlement; Automatic triggering of roaming contract which enables near-instantaneous charging and reduction in roaming fraud; Decentralized roaming agreements; Settling accounts per costs incurred in accordance with agreement tariffs. This clearly demonstrates an academic education structure where fundamental technologies are studied in classes together with these two application areas. Advanced courses, treating specific implementations then follow separately. All are under the roof of “Internet of Assets”.Keywords: blockchain, education, financial technology, mobile telecommunications services
Procedia PDF Downloads 1802109 Identification and Optimisation of South Africa's Basic Access Road Network
Authors: Diogo Prosdocimi, Don Ross, Matthew Townshend
Abstract:
Road authorities are mandated within limited budgets to both deliver improved access to basic services and facilitate economic growth. This responsibility is further complicated if maintenance backlogs and funding shortfalls exist, as evident in many countries including South Africa. These conditions require authorities to make difficult prioritisation decisions, with the effect that Road Asset Management Systems with a one-dimensional focus on traffic volumes may overlook the maintenance of low-volume roads that provide isolated communities with vital access to basic services. Given these challenges, this paper overlays the full South African road network with geo-referenced information for population, primary and secondary schools, and healthcare facilities to identify the network of connective roads between communities and basic service centres. This connective network is then rationalised according to the Gross Value Added and number of jobs per mesozone, administrative and functional road classifications, speed limit, and road length, location, and name to estimate the Basic Access Road Network. A two-step floating catchment area (2SFCA) method, capturing a weighted assessment of drive-time to service centres and the ratio of people within a catchment area to teachers and healthcare workers, is subsequently applied to generate a Multivariate Road Index. This Index is used to assign higher maintenance priority to roads within the Basic Access Road Network that provide more people with better access to services. The relatively limited incidence of Basic Access Roads indicates that authorities could maintain the entire estimated network without exhausting the available road budget before practical economic considerations get any purchase. Despite this fact, a final case study modelling exercise is performed for the Namakwa District Municipality to demonstrate the extent to which optimal relocation of schools and healthcare facilities could minimise the Basic Access Road Network and thereby release budget for investment in roads that best promote GDP growth.Keywords: basic access roads, multivariate road index, road prioritisation, two-step floating catchment area method
Procedia PDF Downloads 2322108 Comparison of Physical and Chemical Effects on Senescent Cells
Authors: Svetlana Guryeva, Inna Kornienko, Andrey Usanov, Dmitry Usanov, Elena Petersen
Abstract:
Every day cells in our organism are exposed to various factors: chemical agents, reactive oxygen species, ionizing radiation, and others. These factors can cause damage to DNA, cellular membrane, intracellular compartments, and proteins. The fate of cells depends on the exposure intensity and duration. The prolonged and intense exposure causes the irreversible damage accumulation, which triggers the permanent cell cycle arrest (cellular senescence) or cell death programs. In the case of low dose of impacts, it can lead to cell renovation and to cell functional state improvement. Therefore, it is a pivotal question to investigate the factors and doses that result in described positive effects. In order to estimate the influence of different agents, the proliferation index and levels of cell death markers (annexin V/propidium iodide), senescence-associated β-galactosidase, and lipofuscin were measured. The experiments were conducted on primary human fibroblasts of the 8th passage. According to the levels of mentioned markers, these cells were defined as senescent cells. The effect of low-frequency magnetic field was investigated. Different modes of magnetic field exposure were tested. The physical agents were compared with chemical agents: metformin (10 mM) and taurine (0.8 mM and 1.6 mM). Cells were incubating with chemicals for 5 days. The highest decrease in the level of senescence-associated β-galactosidase (21%) and lipofuscin (17%) was observed in the primary senescent fibroblasts after 5 days after double treatments with 48 h intervals with low-frequency magnetic field. There were no significant changes in the proliferation index after magnetic field application. The cytotoxic effect of magnetic field was not observed. The chemical agent taurine (1.6 mM) decreased the level of senescence-associated β-galactosidase (23%) and lipofuscin (22%). Metformin improved the activity of senescence-associated β-galactosidase on 15% and the level of lipofuscin on 19% in this experiment. According to these results, the effect of double treatment with 48 h interval with low-frequency magnetic field and the effect of taurine (1.6 mM) were comparable to the effect of metformin, for which anti-aging properties are proved. In conclusion, this study can become the first step towards creation of the standardized system for the investigation of different effects on senescent cells.Keywords: biomarkers, magnetic field, metformin, primary fibroblasts, senescence, taurine
Procedia PDF Downloads 2802107 Women's Cyber Intimate Partner Violence Victimization
Authors: Mylène Fernet, Geneviève Brodeur, Martine Hébert
Abstract:
Background: The growth of information and communication technologies has led to an increase in the prevalence of cyber intimate partner violence among women in early adulthood. However, there is a lack of research addressing the intervention needs of women who have been victims of cyber intimate partner violence. This qualitative study aimed to identify the knowledge, resources, and tools that women require to better respond to such violence. Methodology: Semi-structured individual interviews and four online discussion groups were conducted with 28 Canadian women aged 18 to 29 who had experienced cyber intimate partner violence by a romantic or intimate partner or an ex-partner. The data were analyzed using thematic analysis. Findings: The key elements identified suggest that women need information to help them recognize the signs and varied forms of cyber intimate partner violence, particularly those that are more nuanced and harder to detect. Furthermore, participants emphasized the importance of having access to both online and offline support to aid in their recovery from cyber intimate partner violence. Additionally, the women's narratives also highlighted their need for resources on how to protect themselves from cyber intimate partner violence. Conclusion: Based on the findings from this study, it is essential to develop prevention and intervention strategies for cyber intimate partner violence that address these knowledge gaps, provide support options, and offer prevention tools tailored to adult women.Keywords: women, cyberviolence, intimate partner violence, prevention strategies
Procedia PDF Downloads 212106 Let-7 Mirnas Regulate Inflammatory Cytokine Production in Bovine Endometrial Cells after Lipopolysaccharide Challenge by Targeting TNFα
Authors: S. Ibrahim, D. Salilew-Wondim, M. Hoelker, C. Looft, E. Tholen, C. Grosse-Brinkhaus, K. Schellander, C. Neuhoff, D. Tesfaye
Abstract:
Bovine endometrial cells appear to have a key role in innate immune defense of the female genital tract. A better understanding of molecular changes in microRNAs (miRNAs) and their target genes expression may identify reliable prognostic indicators for cows that will resolve inflammation and resume cyclicity. In the current study, we hypothesized that let-7 miRNAs family has a primary role in the innate immune defence of the endometrium tissue against bacterial infection, which is partly achieved via regulating mRNA stability of pro-inflammatory cytokines at the post-transcriptional level. Therefore, we conducted two experiments. In the first experiment, primary bovine endometrial cells were challenged with clinical (3.0 μg/ml) and sub-clinical (0.5 μg/ml) doses of lipopolysaccharide (LPS) for 24h. In the 2nd experiment, we have investigated the potential role of let-7 miRNAs (let-7a and let-7f) using gain and loss of function approaches. Additionally, tumor necrosis factor alpha (TNFα), transforming growth factor beta 1 induced transcript 1 (TGFB1I1) and serum deprivation response (SDPR) genes were validated using reporter assay. Here we addressed for the first time that let-7 miRNAs have a precise role in bovine endometrium, where LPS dysregulated let-7 miRNAs family expression was associated with an increased pro-inflammatory cytokine level by directly/indirectly targeting the TNFα, interleukin 6 (IL6), nuclear factor kappa-light-chain enhancer of activated B cells (NFκB), TGFβ1I1 and SDPR genes. To our knowledge, this is the first study showing that TNFα, TGFβ1I1 and SDPR were identified and validated as novel let-7 miRNAs targets and could have a distinct role in inflammatory immune response of LPS challenged bovine endometrial cells. Our data represent a new finding by which uterine homeostasis is maintained through functional regulation of let-7a by down-regulation of pro-inflammatory cytokines expression (TNFα and IL6) at the mRNA and protein levels. These findings suggest that LPS serves as a negative regulator of let-7 miRNAs expression and provides a mechanism for the persistent pro-inflammatory phenotype, which is a hallmark of bovine subclinical endometritis.Keywords: bovine endometrial cells, let-7, lipopolysaccharide, pro-inflammatory cytokines
Procedia PDF Downloads 3802105 Addressing Differentiation Using Mobile-Assisted Language Learning
Authors: Ajda Osifo, Fatma Elshafie
Abstract:
Mobile-assisted language learning favors social-constructivist and connectivist theories to learning and adaptive approaches to teaching. It offers many opportunities to differentiated instruction in meaningful ways as it enables learners to become more collaborative, engaged and independent through additional dimensions such as web-based media, virtual learning environments, online publishing to an imagined audience and digitally mediated communication. MALL applications can be a tool for the teacher to personalize and adjust instruction according to the learners’ needs and give continuous feedback to improve learning and performance in the process, which support differentiated instruction practices. This paper explores the utilization of Mobile Assisted Language Learning applications as a supporting tool for effective differentiation in the language classroom. It reports overall experience in terms of implementing MALL to shape and apply differentiated instruction and expand learning options. This session is structured in three main parts: first, a review of literature and effective practice of academically responsive instruction will be discussed. Second, samples of differentiated tasks, activities, projects and learner work will be demonstrated with relevant learning outcomes and learners’ survey results. Finally, project findings and conclusions will be given.Keywords: academically responsive instruction, differentiation, mobile learning, mobile-assisted language learning
Procedia PDF Downloads 417