Search results for: general attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5538

Search results for: general attacks

5058 Thai Primary School Teachers’ Attitude and Preparedness to Teach Students with Autism in the General Education Classroom

Authors: Sunanta Klibthong

Abstract:

Inclusive education services for students with Autism remains in its early developmental stages in Thailand. Despite many more children with autism are attending schools since the Thai government introduced the Education Provision for People with Disabilities Act in 2008, the services students with autism and their families receive are generally lacking. This quantitative study used Attitude and Preparedness to Teach Students with Autism Scale (APTSAS) to investigate 110 primary school teachers’ attitude and preparedness to teach students with autism in the general education classroom. Descriptive statistical analysis of the data found that student behaviour was the most significant factor in building teachers’ negative attitudes students with autism. The majority of teachers also indicated that their pre-service education did not prepare them to meet the learning needs of children with autism in particular, those who are non-verbal. The study is significant and provides direction for enhancing teacher education for inclusivity in Thailand.

Keywords: attitude, autism, teachers, Thailand

Procedia PDF Downloads 263
5057 Perception of People with a Physical Disability towards Those with a Different Kind of Disability

Authors: Monika Skura

Abstract:

People with physical disabilities, as with other people with differences in appearance or style of functioning come under negative social mechanisms. Therefore, it is worth asking what the relationship of the group is, who experience psychosocial effects because of their physical disability, towards people with intellectual disabilities, hearing impairments, visual impairments, mental illnesses, and their own physically disabled group. To analyse the perception of people with a physical disability, the study explores three areas: the acceptance or rejection of society’s stigmatization towards persons with disabilities; the importance of their own experience regarding their disability, in relation to another kind of disability; their level of acceptance to social interactions, in relation to various types of disabilities. The research sample consisted of 90 people with physical disabilities, who suffer from damage to the locomotor system. The data was collected using a questionnaire and the Adjective Check List by H. B. Gough and A. B. Heilbrun. This study utilized focus interviews to develop survey items for the questionnaire. The findings highlight that the response from those who were physically disabled agreed with the opinions of general society, not only with the issue of promoting integrated solutions and offering assistance but also having the same preferences and opinions about specific types of disability. However, their perception regarding their own group was noticeably different from that of general society. In the light of the study, for people with physical disabilities, just as for able-bodied people, it can be challenging to develop a meaningful relationship with people who have disabilities. All forms of disability suffer from negative attitudes and opinions that exist in society. The majority of those who were researched were focused primarily on their own problems, this inevitably hinders the integrity of the entire group, making it more difficult for it to find a cohesive voice, in which to promote their place within society.

Keywords: general society’s opinions about disability, people with different kinds of disability, perception, physical disability

Procedia PDF Downloads 242
5056 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 277
5055 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 317
5054 Proficiency Testing of English for Specific Academic Purpose: Using a Pilot Test in a Taiwanese University as an Example

Authors: Wenli Tsou, Jessica Wu

Abstract:

Courses of English for specific academic purposes (ESAP) have become popular for higher education in Taiwan; however, no standardized tests have been developed for evaluating learners’ English proficiency in individual designated fields. Assuming a learner’s proficiency in a specific academic area is built up with one’s general proficiency in English with specific knowledge and vocabulary in the content areas, an adequate ESAP proficiency test may be constructed by some selected test items related to the designated academic areas. In this study, through collaboration between a language testing institution and a university in Taiwan, three sets of ESAP tests, covering three disciplinary areas of business and the workplace, science and engineering, and health and medicine majors, were developed and administered to sophomore students (N=1704) who were enrolled in ESAP courses at a university in southern Taiwan. For this study, the courses were grouped into the above-mentioned three disciplines, and students took the specialized proficiency test based on the ESAP course they were taking. Because students were free to select which ESAP course to take, each course had both major and non-major students. Toward the end of the one-semester course, ending in January, 2015, each student took two tests, one of general English (General English Proficiency Test, or GEPT) and the other ESAP. Following each test, students filled out a survey, reporting their test taking experiences. After comparing students’ two test scores, it was found that business majors and health and medical students performed better in ESAP than the non-majors in the class, whereas science and engineering majors did about the same as their non-major counterparts. In addition, test takers with CERF B2 (upper intermediate) level or above performed well in both tests, while students who are below B2 did slightly better in ESAP. The findings suggest that students’ test performance have been enhanced by their specialist content and vocabulary knowledge. Furthermore, results of the survey show that the difficulty levels reported by students are consistent with their test performances. Based on the item analysis, the findings can be used to develop proficiency tests for specific disciplines and to identify ability indicators for college students in their designated fields.

Keywords: english for specific academic purposes (ESAP), general english proficiency test (GEPT), higher education, proficiency test

Procedia PDF Downloads 516
5053 Analytical Description of Disordered Structures in Continuum Models of Pattern Formation

Authors: Gyula I. Tóth, Shaho Abdalla

Abstract:

Even though numerical simulations indeed have a significant precursory/supportive role in exploring the disordered phase displaying no long-range order in pattern formation models, studying the stability properties of this phase and determining the order of the ordered-disordered phase transition in these models necessitate an analytical description of the disordered phase. First, we will present the results of a comprehensive statistical analysis of a large number (1,000-10,000) of numerical simulations in the Swift-Hohenberg model, where the bulk disordered (or amorphous) phase is stable. We will show that the average free energy density (over configurations) converges, while the variance of the energy density vanishes with increasing system size in numerical simulations, which suggest that the disordered phase is a thermodynamic phase (i.e., its properties are independent of the configuration in the macroscopic limit). Furthermore, the structural analysis of this phase in the Fourier space suggests that the phase can be modeled by a colored isotropic Gaussian noise, where any instant of the noise describes a possible configuration. Based on these results, we developed the general mathematical framework of finding a pool of solutions to partial differential equations in the sense of continuous probability measure, which we will present briefly. Applying the general idea to the Swift-Hohenberg model we show, that the amorphous phase can be found, and its properties can be determined analytically. As the general mathematical framework is not restricted to continuum theories, we hope that the proposed methodology will open a new chapter in studying disordered phases.

Keywords: fundamental theory, mathematical physics, continuum models, analytical description

Procedia PDF Downloads 120
5052 Agegraphic Dark Energy with GUP

Authors: H. R. Fazlollahi

Abstract:

Dark Energy origin is unknown and so describing this mysterious component in large scale structure needs to manipulate our theories in general relativity. Although in most models, dark energy arises from extra terms through modifying Einstein-Hilbert action, maybe its origin traces back to fundamental aspects of ground energy of space-time given in quantum mechanics. Hence, diluting space-time in general relativity with quantum mechanics properties leads to the Karolyhazy relation corresponding energy density of quantum fluctuations of space-time. Through generalized uncertainty principle and an eye to Karolyhazy approach in this study we extend energy density of quantum fluctuations of space-time. Also, the application of this idea is considered in late time evolution and we have shown how extra term in generalized uncertainty principle plays as a plausible interaction term role in suggested model.

Keywords: generalized uncertainty principle, karolyhazy approach, agegraphic dark energy, cosmology

Procedia PDF Downloads 64
5051 Probabilistic-Based Design of Bridges under Multiple Hazards: Floods and Earthquakes

Authors: Kuo-Wei Liao, Jessica Gitomarsono

Abstract:

Bridge reliability against natural hazards such as floods or earthquakes is an interdisciplinary problem that involves a wide range of knowledge. Moreover, due to the global climate change, engineers have to design a structure against the multi-hazard threats. Currently, few of the practical design guideline has included such concept. The bridge foundation in Taiwan often does not have a uniform width. However, few of the researches have focused on safety evaluation of a bridge with a complex pier. Investigation of the scouring depth under such situation is very important. Thus, this study first focuses on investigating and improving the scour prediction formula for a bridge with complicated foundation via experiments and artificial intelligence. Secondly, a probabilistic design procedure is proposed using the established prediction formula for practical engineers under the multi-hazard attacks.

Keywords: bridge, reliability, multi-hazards, scour

Procedia PDF Downloads 360
5050 The Effect of the Organization of Mental Health Care on General Practitioners’ Prescription Behavior of Psychotropics for Adolescents in Belgium

Authors: Ellen Lagast, Melissa Ceuterick, Mark Leys

Abstract:

Although adolescence is a stressful period with an increased risk for mental illnesses such as anxiety and depression, little in-depth knowledge is available on the determinants of the use of psychotropic drugs (BZD/SSRIs) and the effects. A qualitative research with adolescents in Flanders was performed. Based on indepth interviews, the interviewees indicate feelings of ambiguity towards their medication use because on the one hand the medication helps to manage their mental vulnerability and disrupted lives, but on the other hand they experience a loss of control of their self and their environment. Undesired side-effects and stigma led to a negative pharmaceutical self. The interviewed youngsters also express dissatisfaction about the prescription behavior with regard to psychotropic drugs of their general practitioner (GP). They wished to have received more information about alternative non-pharmaceutical treatment options. Notwithstanding these comments, the majority of the interviewees maintained trust in their GP to act in their best interest. This paper will relate the prescription behavior in primary care to the organization of mental health care to better understand the “phamaceuticalization” and medicalization of mental health problems in Belgium. Belgium implemented fundamental mental health care reforms to collaborate, to integrate care and to optimize continuity of care. Children and adolescents still are confronted with long waiting lists to access (non-medicalized) mental health services. This access to mental health care partly explains general practitioners’ prescription behavior of psychotropics. Moreover, multidisciplinary practices have not pervaded primary health care yet. Medicalization and pharmaceuticalization of mental health vulnerabilities of youth are both a structural and cultural problem.

Keywords: adolescents, antidepressants, benzodiazepines, mental health system, psychotropic drugs

Procedia PDF Downloads 94
5049 Analysis of Cracked Beams with Spalling Having Different Arrangements of the Reinforcement Bars Using Finite Element Analysis (FEA)

Authors: Rishabh Shukla, Achin Agrawal, Anupam Saxena, S. Mandal

Abstract:

The existence of a crack, affects the mechanical behaviour and various properties of a structure to a great degree. This paper focuses on recognizing the parameters that gets changed due to the formation of cracks and have a great impact on the performance of the structure. Spalling is a major concern as it leaves the reinforcement bars more susceptible to environmental attacks. Beams of cross section 300 mm × 500 mm are designed and for a calculated area of steel, two different arrangements of reinforced bars are analysed. Results are prepared for different stages of cracking for each arrangement of rebars. The parameters for both arrangements are then compared. The Finite Element Analysis (FEA) is carried out and changes in the properties like flexural strength, Elasticity and modal frequency are reported. The conclusions have been drawn by comparing the results.

Keywords: cracks, elasticity, spalling, FEA

Procedia PDF Downloads 263
5048 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm

Authors: Fairouz Beggas

Abstract:

Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.

Keywords: arabic data, encryption, playfair, symmetric algorithm

Procedia PDF Downloads 74
5047 The Importance of Effectively Communicating Science and Economics to the Public (Layman)

Authors: Puran Prasad Adhikari

Abstract:

Considering the fact that when we are able to communicate science and economics effectively to broader nonprofessional audiences, it promotes a great understanding of its wider relevance to society and encourages more informed and confident decision-making at all levels, from the government to communities to individuals. The study has been conducted. This study is aimed to examine the understanding of the general public of economics and the basic sciences functioning in our surroundings in our day-to-day life. Data was gathered through historical documents related to science communication and through interviews with the public. The statistical result shows that there is a great lack of knowledge in the general public about the basic sciences and how economics impacts their life daily. The difficulties faced by the public include the view that these things can only be understood by professionals and it is beyond their capacity to grasp these concepts, the use of technical words and jargon by the professionals, and the lack of the medium to understand even if they want to learn it. The result further indicates that the lack of this basic knowledge also leads to bad decision-making, which causes frustration and anxiety. The result shows the great correlation between the confidence level of a person and the knowledge of basic science and economics. The factor behind this was the right decision-making capacity of the individual, which boosts the happy hormones of the individual. So indirectly, we found the correlation between mental health and the understanding of science and economics. The public wants to have a basic understanding and concepts of these topics, but they complain that there is no effective medium through which they can gain the understanding; the medium which is available is full of jargon and technical terms directed to professional and highly educated which they consider is beyond their reach. So, communicating the basic concepts to the general public is of great importance in the 21st century for the overall progress of society. The professional one can make this possible by considering the level of public understanding and making the communication and the programs comprehensible to the layman. Various means can be used to make this successful and effective, e.g., cartoon guide books, Q&A with the layman, animations use, and daily life examples. This study’s implication will help educators of high-level institutions and policymakers improve general public [layman] access to comprehensible knowledge.

Keywords: layman, comprehensible, decision making, frustration, confidence

Procedia PDF Downloads 64
5046 Benign Recurrent Unilateral Abducens (6th) Nerve Palsy in 14 Months Old Girl: A Case Report

Authors: Khaled Alabduljabbar

Abstract:

Background: Benign, isolated, recurrent sixth nerve palsy is very rare in children. Here we report a case of recurrent abducens nerve palsy with no obvious etiology. It is a diagnosis of exclusion. A recurrent benign form of 6th nerve palsy, a rarer still palsy, has been described in the literature, and it is of most likely secondary to inflammatory causes, e.g, following viral and bacterial infections. Purpose: To present a case of 14 months old girl with recurrent attacks of isolated left sixth cranial nerve palsy following upper respiratory tract infection. Observation: The patient presented to opthalmology clinic with sudden onset of inward deviation (esotropia) of the left eye with a compensatory left face turn one week following signs of upper respiratory tract infection. Ophthalmological examination revealed large angle esotropia of the left eye in primary position, with complete limitation of abduction of the left eye, no palpebral fissure changes, and abnormal position of the head (left face turn). Visual acuity was normal, and no significant refractive error on cycloplegic refraction for her age. Fundus examination was normal with no evidence of papilledema. There was no relative afferent pupillary defect (RAPD) and no anisocoria. Past medical history and family history were unremarkable, with no history of convulsion attacks or head trauma. Additional workout include CBC. Erythrocyte sedimentation rate, Urgent magnetic resonance imaging (MRI), and angiography of the brain were performed and demonstrated the absence of intracranial and orbital lesions. Referral to pediatric neurologist was also done and concluded no significant finding. The patient showed improvement of the left sixth cranial nerve palsy and left face turn over a period of two months. Seven months since the first attack, she experienced a recurrent attack of left eye esotropia with left face turn concurrent with URTI. The rest of eye examination was again unremarkable. CT scan and MRI scan of brain and orbit were performed and showed only signs of sinusitis with no intracranial pathology. The palsy resolved spontaneously within two months. A third episode of left 6th nerve palsy occurred 6 months later, whichrecovered over one month. Examination and neuroimagingwere unremarkable. A diagnosis of benign recurrent left 6th cranial nerve palsy was made. Conclusion: Benign sixth cranial nerve palsy is always a diagnosis of exclusion given the more serious and life-threatening alternative causes. It seems to have a good prognosis with only supportive measures. The likelihood of benign 6th cranial nerve palsy to resolve completely and spontaneously is high. Observation for at least 6 months without intervention is advisable.

Keywords: 6th nerve pasy, abducens nerve pasy, recurrent nerve palsy, cranial nerve palsy

Procedia PDF Downloads 82
5045 Concealed Objects Detection in Visible, Infrared and Terahertz Ranges

Authors: M. Kowalski, M. Kastek, M. Szustakowski

Abstract:

Multispectral screening systems are becoming more popular because of their very interesting properties and applications. One of the most significant applications of multispectral screening systems is prevention of terrorist attacks. There are many kinds of threats and many methods of detection. Visual detection of objects hidden under clothing of a person is one of the most challenging problems of threats detection. There are various solutions of the problem; however, the most effective utilize multispectral surveillance imagers. The development of imaging devices and exploration of new spectral bands is a chance to introduce new equipment for assuring public safety. We investigate the possibility of long lasting detection of potentially dangerous objects covered with various types of clothing. In the article we present the results of comparative studies of passive imaging in three spectrums – visible, infrared and terahertz

Keywords: terahertz, infrared, object detection, screening camera, image processing

Procedia PDF Downloads 345
5044 The Winning Possibility of Female Candidate in Korea

Authors: Minjeoung Kim

Abstract:

The majority of Korean female members of parliament(MPs) had been elected from the proportional representation till the 19th assemblies but in the 20th general election women MPs of the district representation is slightly more than women MPs of the proportional representation. The chance of women candidates to win is not as low as we assume. Therefore this study aims to reveal which factors influence the election of women candidates, other factors except the political party, because the effect of political party is already well known. Gangnam Eul is selected because female candidate was elected in spite of the low percentage of vote won by her political party. According to the survey, the female candidate was elected thanks to her policies and election pledges. Therefore, women candidates can be elected when they are nominated as candidates by their party in a safe constituency but also they can be elected with their good policies and election pledges in an unsafe constituency. And also the degree of the education, the age and the profession of voters influenced the support of female candidate.

Keywords: women candidates, 20th general election, winning in the district representation, policies and election pledges

Procedia PDF Downloads 239
5043 Students’ Perceptions Regarding Homosexuality at Sefako Makgatho Health Sciences University

Authors: Deborah O. Okusanya, Chris Vanrooyen, Stefan de Jager

Abstract:

Introduction: Homosexuality has been and continues to be a controversial subject across many disciplines; it has generated many debates around religious, academic institutions, political, socio-cultural as well as medical domains. The current study investigated students from a previously disadvantaged African university’s perception regarding homosexuality. Method: This qualitative study utilized two focus groups to collect data, which then was analyzed using thematic content analysis. Result: The study revealed that students’ level of awareness with regard to homosexuality is very high and their perceptions largely negative. Students predominantly found the practice unethical, and un-African. Discussion: Students tend to show a lot of stereotypical prejudicial responses and there seems to be a general lack of willingness to discuss this in a public discourse. In conclusion, there seems to be a tension between cultural values and the open environment such as academic institutions. Students’ perceptions go a long way in shaping public discourse and the larger population’s general attitude toward homosexuality.

Keywords: discourse, homosexuality, stereotypical, un-African

Procedia PDF Downloads 208
5042 Ethereum Based Smart Contracts for Trade and Finance

Authors: Rishabh Garg

Abstract:

Traditionally, business parties build trust with a centralized operating mechanism, such as payment by letter of credit. However, the increase in cyber-attacks and malicious hacking has jeopardized business operations and finance practices. Emerging markets, owing to their higher banking risks and bigger presence of digital financing, are looking forward to technology-driven solutions, financial inclusion and innovative working paradigms. Blockchain has the potential to enhance transaction transparency and supply chain traceability. It has captured a vast landscape with 200 million crypto users worldwide. Fintech and blockchain products are popping up across brokerage, digital wallets, exchanges, post-trade clearance, settlement, middleware, infrastructure, and base protocols.

Keywords: blockchain, distributed ledger technology, decentralized applications, ethereum, smart contracts, trade finance

Procedia PDF Downloads 140
5041 Computational Fluid Dynamics Analysis of an RC Airplane Wing Using a NACA 2412 Profile at Different Angle of Attacks

Authors: Huseyin Gokberk, Shian Gao

Abstract:

CFD analysis of the relationship between the coefficients of lift and drag with respect to the angle of attack on a NACA 2412 wing section of an RC plane is conducted. Both the 2D and 3D models are investigated with the turbulence model. The 2D analysis has a free stream velocity of 10m/s at different AoA of 0°, 2°, 5°, 10°, 12°, and 15°. The induced drag and drag coefficient increased throughout the changes in angles even after the critical angle had been exceeded, whereas the lift force and coefficient of lift increased but had a limit at the critical stall angle, which results in values to reduce sharply. Turbulence flow characteristics are analysed around the aerofoil with the additions caused due to a finite 3D model. 3D results highlight how wing tip vortexes develop and alter the flow around the wing with the effects of the tapered configuration.

Keywords: CFD, turbulence modelling, aerofoil, angle of attack

Procedia PDF Downloads 200
5040 The Incidental Linguistic Information Processing and Its Relation to General Intellectual Abilities

Authors: Evgeniya V. Gavrilova, Sofya S. Belova

Abstract:

The present study was aimed at clarifying the relationship between general intellectual abilities and efficiency in free recall and rhymed words generation task after incidental exposure to linguistic stimuli. The theoretical frameworks stress that general intellectual abilities are based on intentional mental strategies. In this context, it seems to be crucial to examine the efficiency of incidentally presented information processing in cognitive task and its relation to general intellectual abilities. The sample consisted of 32 Russian students. Participants were exposed to pairs of words. Each pair consisted of two common nouns or two city names. Participants had to decide whether a city name was presented in each pair. Thus words’ semantics was processed intentionally. The city names were considered to be focal stimuli, whereas common nouns were considered to be peripheral stimuli. Along with that each pair of words could be rhymed or not be rhymed, but this phonemic aspect of stimuli’s characteristic (rhymed and non-rhymed words) was processed incidentally. Then participants were asked to produce as many rhymes as they could to new words. The stimuli presented earlier could be used as well. After that, participants had to retrieve all words presented earlier. In the end, verbal and non-verbal abilities were measured with number of special psychometric tests. As for free recall task intentionally processed focal stimuli had an advantage in recall compared to peripheral stimuli. In addition all the rhymed stimuli were recalled more effectively than non-rhymed ones. The inverse effect was found in words generation task where participants tended to use mainly peripheral stimuli compared to focal ones. Furthermore peripheral rhymed stimuli were most popular target category of stimuli that was used in this task. Thus the information that was processed incidentally had a supplemental influence on efficiency of stimuli processing as well in free recall as in word generation task. Different patterns of correlations between intellectual abilities and efficiency in different stimuli processing in both tasks were revealed. Non-verbal reasoning ability correlated positively with free recall of peripheral rhymed stimuli, but it was not related to performance on rhymed words’ generation task. Verbal reasoning ability correlated positively with free recall of focal stimuli. As for rhymed words generation task, verbal intelligence correlated negatively with generation of focal stimuli and correlated positively with generation of all peripheral stimuli. The present findings lead to two key conclusions. First, incidentally processed stimuli had an advantage in free recall and word generation task. Thus incidental information processing appeared to be crucial for subsequent cognitive performance. Secondly, it was demonstrated that incidentally processed stimuli were recalled more frequently by participants with high nonverbal reasoning ability and were more effectively used by participants with high verbal reasoning ability in subsequent cognitive tasks. That implies that general intellectual abilities could benefit from operating by different levels of information processing while cognitive problem solving. This research was supported by the “Grant of President of RF for young PhD scientists” (contract № is 14.Z56.17.2980- MK) and the Grant № 15-36-01348a2 of Russian Foundation for Humanities.

Keywords: focal and peripheral stimuli, general intellectual abilities, incidental information processing

Procedia PDF Downloads 225
5039 A Global Perspective on Neuropsychology: The Multicultural Neuropsychological Scale

Authors: Tünde Tifordiána Simonyi, Tímea Harmath-Tánczos

Abstract:

The primary aim of the current research is to present the significance of a multicultural perspective in clinical neuropsychology and to present the test battery of the Multicultural Neuropsychological Scale (MUNS). The method includes the MUNS screening tool that involves stimuli common to most cultures in the world. The test battery measures general cognitive functioning focusing on five cognitive domains (memory, executive function, language, visual construction, and attention) tested with seven subtests that can be utilized within a wide age range (15-89), and lower and higher education participants. It is a scale that is sensitive to mild cognitive impairments. Our study presents the first results with the Hungarian translation of MUNS on a healthy sample. The education range was 4-25 years of schooling. The Hungarian sample was recruited by snowball sampling. Within the investigated population (N=151) the age curve follows an inverted U-shaped curve regarding cognitive performance with a high load on memory. Age, reading fluency, and years of education significantly influenced test scores. The sample was tested twice within a 14-49 days interval to determine test-retest reliability, which is satisfactory. Besides the findings of the study and the introduction of the test battery, the article also highlights its potential benefits for both research and clinical neuropsychological practice. The importance of adapting, validating and standardizing the test in other languages besides the Hungarian language context is also stressed. This test battery could serve as a helpful tool in mapping general cognitive functions in psychiatric and neurological disorders regardless of the cultural background of the patients.

Keywords: general cognitive functioning, multicultural, MUNS, neuropsychological test battery

Procedia PDF Downloads 94
5038 Atmospheric Full Scale Testing of a Morphing Trailing Edge Flap System for Wind Turbine Blades

Authors: Thanasis K. Barlas, Helge A. Madsen

Abstract:

A novel Active Flap System (AFS) has been developed at DTU Wind Energy, as a result of a 3-year R\&D project following almost 10 years of innovative research in this field. The full-scale AFS comprises an active deformable trailing edge has been tested at the unique rotating test facility at the Risoe Campus of DTU Wind Energy in Denmark. The design and instrumentation of the wing section and the active flap system (AFS) are described. The general description and objectives of the rotating test rig at the Risoe campus of DTU are presented, as used for the aeroelastic testing of the AFS in the recently finalized INDUFLAP project. The general description and objectives are presented, along with an overview of sensors on the setup and the test cases. The post-processing of data is discussed and results of steady flap step and azimuth control flap cases are presented.

Keywords: morphing, adaptive, flap, smart blade, wind turbine

Procedia PDF Downloads 390
5037 Study of Treatment Plant of The City Chlef Study of Environmental Impact

Authors: Houmame Benbouali, Aboubakr Gribi

Abstract:

The risks, in general, exist in any project, one can hardly carry out a project without taking risks. The hydraulic works are rather complex projects in their design, realization and exploitation and are often subjected at the multiple risks being able to influence with their good performance and can have a negative impact on their environment. The present study was carried out to quote the impacts caused by purification plant STEP Chlef on the environment, it aims has studied the environmental impacts during construction and when designing this STEP, it is divided into two parts: The first part results from a research task bibliographer which contain three chapters (- cleansing of water-worn- general information on water worn-proceed of purification of waste water). The second part is an experimental part which is divided into four chapters (detailed state initial description of the station of purification-evaluation of the impacts of the project analyzes measurements and recommendations).

Keywords: treatment plant, waste water, waste water treatment, Chlef

Procedia PDF Downloads 323
5036 The Moderating Effects of Attachment Style on the Relationship between the Psychological Symptoms and Well-Being of Mental Health Practitioners in Rehabilitation Centers: A Preliminary Study

Authors: Amaba, Marinela C., Espino, Gianne Ericka S. J. Valencia, Zeia Beatriz C.

Abstract:

This study aims to determine the moderating role of attachment style on the relationship between psychological symptoms and well-being of mental health practitioners in rehabilitation centers that are accredited of the Department of Health in Pampanga. Using the data gathered from 46 mental health practitioners, multiple regression models were conducted to test the main and moderating effects of attachment styles. The findings show that all three psychological symptoms namely depression, anxiety, and stress have main effects on their general well-being on a negative direction. However, attachment style did not moderate the relationship between the psychological symptoms and general well-being. On one hand, results about the relationship of psychological symptoms and well-being are consistent to previous findings of other studies while on the other hand, results in moderation were contradicting.

Keywords: attachment style, psychological symptoms, well-being, mental health practitioners, rehabilitation centers

Procedia PDF Downloads 540
5035 Prediction of Terrorist Activities in Nigeria using Bayesian Neural Network with Heterogeneous Transfer Functions

Authors: Tayo P. Ogundunmade, Adedayo A. Adepoju

Abstract:

Terrorist attacks in liberal democracies bring about a few pessimistic results, for example, sabotaged public support in the governments they target, disturbing the peace of a protected environment underwritten by the state, and a limitation of individuals from adding to the advancement of the country, among others. Hence, seeking for techniques to understand the different factors involved in terrorism and how to deal with those factors in order to completely stop or reduce terrorist activities is the topmost priority of the government in every country. This research aim is to develop an efficient deep learning-based predictive model for the prediction of future terrorist activities in Nigeria, addressing low-quality prediction accuracy problems associated with the existing solution methods. The proposed predictive AI-based model as a counterterrorism tool will be useful by governments and law enforcement agencies to protect the lives of individuals in society and to improve the quality of life in general. A Heterogeneous Bayesian Neural Network (HETBNN) model was derived with Gaussian error normal distribution. Three primary transfer functions (HOTTFs), as well as two derived transfer functions (HETTFs) arising from the convolution of the HOTTFs, are namely; Symmetric Saturated Linear transfer function (SATLINS ), Hyperbolic Tangent transfer function (TANH), Hyperbolic Tangent sigmoid transfer function (TANSIG), Symmetric Saturated Linear and Hyperbolic Tangent transfer function (SATLINS-TANH) and Symmetric Saturated Linear and Hyperbolic Tangent Sigmoid transfer function (SATLINS-TANSIG). Data on the Terrorist activities in Nigeria gathered through questionnaires for the purpose of this study were used. Mean Square Error (MSE), Mean Absolute Error (MAE) and Test Error are the forecast prediction criteria. The results showed that the HETFs performed better in terms of prediction and factors associated with terrorist activities in Nigeria were determined. The proposed predictive deep learning-based model will be useful to governments and law enforcement agencies as an effective counterterrorism mechanism to understand the parameters of terrorism and to design strategies to deal with terrorism before an incident actually happens and potentially causes the loss of precious lives. The proposed predictive AI-based model will reduce the chances of terrorist activities and is particularly helpful for security agencies to predict future terrorist activities.

Keywords: activation functions, Bayesian neural network, mean square error, test error, terrorism

Procedia PDF Downloads 152
5034 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network

Authors: Kimaya Subhash Gaikwad, S. B. Waykar

Abstract:

The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.

Keywords: communication, MANET, OLSR, QoS

Procedia PDF Downloads 439
5033 A General Overview on Izadis Children's Right Situation in Iraqi Kurdistan

Authors: Shabnam Dadparvar, Laijin Shen

Abstract:

Undoubtedly, children are one of the biggest assets of any society and it is the duty of all officials to have a systematic plan to educate the next generation and make a better life for children so that they can progress and be effective for their communities. In an effort, Kurdistan Regional Government (KRG) has adopted standards to improve the condition for Izadis children; however, there are challenges that remain; such as: Izadis child abuse, Izadis child labor, Izadis children right’s law, orphans, Izadis street children and etc. In this paper, by a descriptive-analytical method the authors try to discuss the general situation of Izadis children in today s Iraqi Kurdistan and the issues such as drug abuse, Izadis child labor, orphans and Izadis street children. The questions are: How is the situation of Izadis children in Iraqi Kurdistan and what are their challenges? Also, what is the KRG’s strategy and through which ways, they can make a better life for minority children and change their current status? The authors believe that nowadays, the KRG is trying to crack down on problems against Izadis children; however, their effort is not adequate and some other activities should be performed; one of which is passing the Izadis children s law against violence.

Keywords: children right, Iraqi Kurdistan, Izadis children, Kurdistan Regional Government

Procedia PDF Downloads 245
5032 The Role of Social Media in the Rise of Islamic State in India: An Analytical Overview

Authors: Yasmeen Cheema, Parvinder Singh

Abstract:

The evolution of Islamic State (acronym IS) has an ultimate goal of restoring the caliphate. IS threat to the global security is main concern of international community but has also raised a factual concern for India about the regular radicalization of IS ideology among Indian youth. The incident of joining Arif Ejaz Majeed, an Indian as ‘jihadist’ in IS has set strident alarm in law & enforcement agencies. On 07.03.2017, many people were injured in an Improvised Explosive Device (IED) blast on-board of Bhopal Ujjain Express. One perpetrator of this incident was killed in encounter with police. But, the biggest shock is that the conspiracy was pre-planned and the assailants who carried out the blast were influenced by the ideology perpetrated by the Islamic State. This is the first time name of IS has cropped up in a terror attack in India. It is a red indicator of violent presence of IS in India, which is spreading through social media. The IS have the capacity to influence the younger Muslim generation in India through its brutal and aggressive propaganda videos, social media apps and hatred speeches. It is a well known fact that India is on the radar of IS, as well on its ‘Caliphate Map’. IS uses Twitter, Facebook and other social media platforms constantly. Islamic State has used enticing videos, graphics, and articles on social media and try to influence persons from India & globally that their jihad is worthy. According to arrested perpetrator of IS in different cases in India, the most of Indian youths are victims to the daydreams which are fondly shown by IS. The dreams that the Muslim empire as it was before 1920 can come back with all its power and also that the Caliph and its caliphate can be re-established are shown by the IS. Indian Muslim Youth gets attracted towards these euphemistic ideologies. Islamic State has used social media for disseminating its poisonous ideology, recruitment, operational activities and for future direction of attacks. IS through social media inspired its recruits & lone wolfs to continue to rely on local networks to identify targets and access weaponry and explosives. Recently, a pro-IS media group on its Telegram platform shows Taj Mahal as the target and suggested mode of attack as a Vehicle Born Improvised Explosive Attack (VBIED). Islamic State definitely has the potential to destroy the Indian national security & peace, if timely steps are not taken. No doubt, IS has used social media as a critical mechanism for recruitment, planning and executing of terror attacks. This paper will therefore examine the specific characteristics of social media that have made it such a successful weapon for Islamic State. The rise of IS in India should be viewed as a national crisis and handled at the central level with efficient use of modern technology.

Keywords: ideology, India, Islamic State, national security, recruitment, social media, terror attack

Procedia PDF Downloads 215
5031 A Survey on Smart Security Mechanism Using Graphical Passwords

Authors: Aboli Dhanavade, Shweta Bhimnath, Rutuja Jumale, Ajay Nadargi

Abstract:

Security to any of our personal thing is our most basic need. It is not possible to directly apply that standard Human-computer—interaction approaches. Important usability goal for authentication system is to support users in selecting best passwords. Users often select text-passwords that are easy to remember, but they are more open for attackers to guess. The human brain is good in remembering pictures rather than textual characters. So the best alternative is being designed that is Graphical passwords. However, Graphical passwords are still immature. Conventional password schemes are also vulnerable to Shoulder-surfing attacks, many shoulder-surfing resistant graphical passwords schemes have been proposed. Next, we have analyzed the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder-surfing and different accidental logins.

Keywords: shoulder-surfing, security, authentication, text-passwords

Procedia PDF Downloads 352
5030 A Survey on Genetic Algorithm for Intrusion Detection System

Authors: Prikhil Agrawal, N. Priyanka

Abstract:

With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.

Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security

Procedia PDF Downloads 281
5029 Using Action Based Research to Examine the Effects of Co-Teaching on Middle School and High School Student Achievement in Math and Language Arts

Authors: Kathleen L. Seifert

Abstract:

Students with special needs are expected to achieve the same academic standards as their general education peers, yet many students with special needs are pulled-out of general content instruction. Because of this, many students with special needs are denied content knowledge from a content expert and instead receive content instruction in a more restrictive setting. Collaborative teaching, where a general education and special education teacher work alongside each other in the same classroom, has become increasingly popular as a means to meet the diverse needs of students in America’s public schools. The idea behind co-teaching is noble; to ensure students with special needs receive content area instruction from a content expert while also receiving the necessary supports to be successful. However, in spite of this noble effort, the effects of co-teaching are not always positive. The reasons why have produced several hypotheses, one of which has to do with lack of proper training and implementation of effective evidence-based co-teaching practices. In order to examine the effects of co-teacher training, eleven teaching pairs from a small mid-western school district in the United States participated in a study. The purpose of the study was to examine the effects of co-teacher training on middle and high school student achievement in Math and Language Arts. A local university instructor provided teachers with training in co-teaching via a three-day workshop. In addition, co-teaching pairs were given the opportunity for direct observation and feedback using the Co-teaching Core Competencies Observation Checklist throughout the academic year. Data are in the process of being collected on both the students enrolled in the co-taught classes as well as on the teachers themselves. Student data compared achievement on standardized assessments and classroom performance across three domains: 1. General education students compared to students with special needs in co-taught classrooms, 2. Students with special needs in classrooms with and without co-teaching, 3. Students in classrooms where teachers were given observation and feedback compared to teachers who refused the observation and feedback. Teacher data compared the perceptions of the co-teaching initiative between teacher pairs who received direct observation and feedback from those who did not. The findings from the study will be shared with the school district and used for program improvement.

Keywords: collabortive teaching, collaboration, co-teaching, professional development

Procedia PDF Downloads 107