Search results for: used personal computer
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4400

Search results for: used personal computer

3920 Analysis on South Korean Early Childhood Education Teachers’ Stage of Concerns about Software Education According to the Concern-Based Adoption Model

Authors: Sun-Mi Park, Ji-Hyun Jung, Min-Jung Kang

Abstract:

Software (SW) education is scheduled to be included in the National curriculum in South Korea by 2018. However, Korean national kindergarten curriculum has been excepted from the revision of the entire Korean national school curriculum including software education. Even though the SW education has not been considered a part of current national kindergarten curriculum, there is a growing interest of adopting software education into the ECE practice. Teachers might be a key element in introducing and implementing new educational change such as SW education. In preparation for the adoption of SW education in ECE, it might be necessary to figure out ECE teachers’ perception and attitudes toward early childhood software education. For this study, 219 ECE teachers’ concern level in SW education was surveyed by using the Stages of Concern Questionnaire (SoCQ). As a result, the teachers' concern level in SW education is the highest at stage 0-Unconcerned and is high level in stage 1-informational, stage 2-personal, and stage 3-management concern. Thus, a non-user pattern was mostly indicated. However, compared to a typical non-user pattern, the personal and informative concern level is slightly high. The 'tailing up' phenomenon toward stage 6-refocusing was shown. Therefore, the pattern aspect close to critical non-user ever appeared to some extent. In addition, a significant difference in concern level was shown at all stages depending on the awareness of necessity. Teachers with SW training experience showed higher intensity only at stage 0. There was statistically significant difference in stage 0 and 6 depending on the future implementation decision. These results will be utilized as a resource in building ECE teachers’ support system according to his or her concern level of SW education.

Keywords: concerns-based adoption model (CBAM), early childhood education teachers, software education, Stages of Concern (SoC)

Procedia PDF Downloads 189
3919 Alpha: A Groundbreaking Avatar Merging User Dialogue with OpenAI's GPT-3.5 for Enhanced Reflective Thinking

Authors: Jonas Colin

Abstract:

Standing at the vanguard of AI development, Alpha represents an unprecedented synthesis of logical rigor and human abstraction, meticulously crafted to mirror the user's unique persona and personality, a feat previously unattainable in AI development. Alpha, an avant-garde artefact in the realm of artificial intelligence, epitomizes a paradigmatic shift in personalized digital interaction, amalgamating user-specific dialogic patterns with the sophisticated algorithmic prowess of OpenAI's GPT-3.5 to engender a platform for enhanced metacognitive engagement and individualized user experience. Underpinned by a sophisticated algorithmic framework, Alpha integrates vast datasets through a complex interplay of neural network models and symbolic AI, facilitating a dynamic, adaptive learning process. This integration enables the system to construct a detailed user profile, encompassing linguistic preferences, emotional tendencies, and cognitive styles, tailoring interactions to align with individual characteristics and conversational contexts. Furthermore, Alpha incorporates advanced metacognitive elements, enabling real-time reflection and adaptation in communication strategies. This self-reflective capability ensures continuous refinement of its interaction model, positioning Alpha not just as a technological marvel but as a harbinger of a new era in human-computer interaction, where machines engage with us on a deeply personal and cognitive level, transforming our interaction with the digital world.

Keywords: chatbot, GPT 3.5, metacognition, symbiose

Procedia PDF Downloads 34
3918 The Size Effects of Keyboards (Keycaps) on Computer Typing Tasks

Authors: Chih-Chun Lai, Jun-Yu Wang

Abstract:

The keyboard is the most important equipment for computer tasks. However, improper design of keyboard would cause some symptoms like ulnar and/or radial deviations. The research goal of this study was to investigate the optimal size(s) of keycaps to increase efficiency. As shown in the questionnaire pre-study with 49 participants aged from 20 to 44, the most commonly used keyboards were 101-key standard keyboards. Most of the keycap sizes (W × L) were 1.3 × 1.5 cm and 1.5 × 1.5 cm. The fingertip breadths of most participants were 1.2 cm. Therefore, in the main study with 18 participants, a standard keyboard with each set of the 3-sized (1.2 × 1.4 cm, 1.3 × 1.5 cm, and 1.5 × 1.5 cm) keycaps was used to investigate their typing efficiency, respectively. The results revealed that the differences between the operating times for using 1.3 × 1.5 cm and 1.2 × 1.4 cm keycaps were insignificant while operating times for using 1.5 × 1.5 cm keycaps were significantly longer than for using 1.2 × 1.4 cm or 1.3 × 1.5 cm, respectively. As for the typing error rate, there was no significant difference.

Keywords: keyboard, keycap size, typing efficiency, computer tasks

Procedia PDF Downloads 358
3917 Reduction in Hospital Acquire Infections after Intervention of Hand Hygiene and Personal Protective Equipment at COVID Unit Indus Hospital Karachi

Authors: Aisha Maroof

Abstract:

Introduction: Coronavirus Disease 2019 (COVID-19) is spreading rapidly around the world with devastating consequences on patients, health care workers and health systems. Severe 2019 novel coronavirus infectious disease (COVID-19) with pneumonia is associated with high rates of admission to the intensive care unit (ICU) and they are at high risk to obtain the hospital acquire bloodstream infection (HAIs) such as central line associated bloodstream infection (CLABSI), catheter associated urinary tract infections (CAUTI) and laboratory confirm bloodstream infection (LCBSI). The chances of infection transmission increase when healthcare worker’s (HCWs) practice is inappropriate. Risk related to hand hygiene (HH) and personal protective equipment (PPE) as regards multidrug-resistant organism transmission: use of multiple gloving instead of HH and incorrect use of PPE can lead to a significant increase of device-related infections. As it reaches low- and middle-income countries, its effects could be even more, because it will be difficult for them to react aggressively to the pandemic. HAIs are one of the biggest medical concerns, resulting in increased mortality rates. Objective: To assess the effect of intervention on compliance of hand hygiene and PPE among HCWs reduce the rate of HAI in COVID-19 patients. Method: An interventional study was done between July to December, 2020. CLABSI, CAUTI and LCBSI data were collected from the medical record and direct observation. There were total of 50 Nurses, 18 doctors and all patients with laboratory-confirmed severe COVID-19 admitted to the hospital were included in this research study. Respiratory tract specimens were obtained after the first 48 h of ICU admission. Practices were observed after and before intervention. Education was provided based on WHO guidelines. Results: During the six months of study July to December, the rate of CLABSI, CAUTI and LCBSI pre and post intervention was reported. CLABSI rate decreasedd from 22.7 to 0, CAUTI rate was decreased from 1.6 to 0, LCBSI declined from 3.3 to 0 after implementation of intervention. Conclusion: HAIs are an important cause of morbidity and mortality. Most of the device related infections occurs due to lack of correct use of PPE and hand hygiene compliance. Hand hygiene and PPE is the most important measure to protect patients, through education it can be improved the correct use of PPE and hand hygiene compliance and can reduce the bacterial infection in COVID-19 patients.

Keywords: hospital acquire infection, healthcare workers, hand hygiene, personal protective equipment

Procedia PDF Downloads 110
3916 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 95
3915 Computer Aided Diagnostic System for Detection and Classification of a Brain Tumor through MRI Using Level Set Based Segmentation Technique and ANN Classifier

Authors: Atanu K Samanta, Asim Ali Khan

Abstract:

Due to the acquisition of huge amounts of brain tumor magnetic resonance images (MRI) in clinics, it is very difficult for radiologists to manually interpret and segment these images within a reasonable span of time. Computer-aided diagnosis (CAD) systems can enhance the diagnostic capabilities of radiologists and reduce the time required for accurate diagnosis. An intelligent computer-aided technique for automatic detection of a brain tumor through MRI is presented in this paper. The technique uses the following computational methods; the Level Set for segmentation of a brain tumor from other brain parts, extraction of features from this segmented tumor portion using gray level co-occurrence Matrix (GLCM), and the Artificial Neural Network (ANN) to classify brain tumor images according to their respective types. The entire work is carried out on 50 images having five types of brain tumor. The overall classification accuracy using this method is found to be 98% which is significantly good.

Keywords: brain tumor, computer-aided diagnostic (CAD) system, gray-level co-occurrence matrix (GLCM), tumor segmentation, level set method

Procedia PDF Downloads 478
3914 Coping with Incompatible Identities in Russia: Case of Orthodox Gays

Authors: Siuzan Uorner

Abstract:

The era of late modernity is characterized, on the one hand, by social disintegration, values of personal freedom, tolerance, and self-expression. Boundaries between the accessible and the elitist, normal and abnormal are blurring. On the other hand, traditional social institutions, such as religion (especially Russian Orthodox Church), exist, criticizing lifestyle and worldview other than conventionally structured canons. Despite the declared values and opportunities in late modern society, people's freedom is ambivalent. Personal identity and its aspects are becoming a subject of choice. Hence, combinations of identity aspects can be incompatible. Our theoretical framework is based on P. Ricoeur's concept of narrative identity and hermeneutics, E. Goffman’s theory of social stigma, self-presentation, discrepant roles and W. James lectures about varieties of religious experience. This paper aims to reconstruct ways of coping with incompatible identities of Orthodox gays (an extreme sampling of a combination of sexual orientation and religious identity in a heteronormative society). This study focuses on the discourse of Orthodox gay parishioners and ROC gay priests in Russia (sampling ‘hard to reach’ populations because of the secrecy of gay community in ROC and sensitivity of the topic itself). We conducted a qualitative research design, using in-depth personal semi-structured online-interviews. Recruiting of informants took place in 'Nuntiare et Recreare' (Russian movement of religious LGBT) page in VKontakte through the post with an invitation to participate in the research. In this work, we analyzed interview transcripts using axial coding. We chose the Grounded Theory methodology to construct a theory from empirical data and contribute to the growing body of knowledge in ways of harmonizing incompatible identities in late modern societies. The research has found that there are two types of conflicts Orthodox gays meet with: canonic contradictions (postulates of Scripture and its interpretations) and problems in social interaction, mainly with ROC priests and Orthodox parishioners. We have revealed semantic meanings of most commonly used words that appear in the narratives (words such as ‘love’, ‘sin’, ‘religion’ etc.). Finally, we have reconstructed biographical patterns of LGBT social movements’ involvement. This paper argues that all incompatibilities are harmonizing in the narrative itself. As Ricoeur has suggested, the narrative configuration allows the speaker to gather facts and events together and to compose causal relationships between them. Sexual orientation and religious identity are getting along and harmonizing in the narrative.

Keywords: gay priests, incompatible identities, narrative identity, Orthodox gays, religious identity, ROC, sexual orientation

Procedia PDF Downloads 113
3913 Examination of the Satisfaction Levels of Pre-Service Teachers Concerning E-Learning Process in Terms of Different Variables

Authors: Agah Tugrul Korucu

Abstract:

Significant changes have taken place for the better in the bulk of information and in the use of technology available in the field of education induced by technological changes in the 21st century. It is mainly the job of the teachers and pre-service teachers to integrate information and communication technologies into education by means of conveying the use of technology to individuals. While the pre-service teachers are conducting lessons by using technology, the methods they have developed are important factors for the requirements of the lesson and for the satisfaction levels of the students. The study of this study is to examine the satisfaction levels of pre-service teachers as regards e-learning in a technological environment in which there are lesson activities conducted through an online learning environment in terms of various variables. The study group of the research is composed of 156 pre-service teachers that were students in the departments of Computer and Teaching Technologies, Art Teaching and Pre-school Teaching in the academic year of 2014 - 2015. The qualitative research method was adopted for this study; the scanning model was employed in collecting the data. “The Satisfaction Scale regarding the E-learning Process”, developed by Gülbahar, and the personal information form, which was developed by the researcher, were used as means of collecting the data. Cronbach α reliability coefficient, which is the internal consistency coefficient of the scale, is 0.91. SPSS computerized statistical package program and the techniques of medium, standard deviation, percentage, correlation, t-test and variance analysis were used in the analysis of the data.

Keywords: online learning environment, integration of information technologies, e-learning, e-learning satisfaction, pre-service teachers

Procedia PDF Downloads 330
3912 Magnitude of Green Computing in Trending IT World

Authors: Raghul Vignesh Kumar, M. Vadivel

Abstract:

With the recent years many industries and companies have turned their attention in realizing how going 'green' can benefit public relations, lower cost, and reduce global emissions from industrial manufacturing. Green Computing has become an originative way on how technology and ecology converge together. It is a growing import subject that creates an urgent need to train next generation computer scientists or practitioners to think ‘green’. However, green computing has not yet been well taught in computer science or computer engineering courses as a subject. In this modern IT world it’s impossible for an organization or common man to work without hardware like servers, desktop, IT devices, smartphones etc. But it is also important to consider the harmful impact of those devices and steps to achieve energy saving and environmental protection. This paper presents the magnitude of green computing and steps to be followed to go green.

Keywords: green computing, carbon-dioxide, greenhouse gas, energy saving, environmental protection agency

Procedia PDF Downloads 379
3911 Integrating Wearable Devices in Real-Time Computer Applications of Petrochemical Systems

Authors: Paul B Stone, Subhashini Ganapathy, Mary E. Fendley, Layla Akilan

Abstract:

As notifications become more common through mobile devices, it is important to understand the impact of wearable devices on the improved user experience of man-machine interfaces. This study examined the use of a wearable device for a real-time system using a computer-simulated petrochemical system. The key research question was to determine how using the information provided by the wearable device can improve human performance through measures of situational awareness and decision making. Results indicate that there was a reduction in response time when using the watch, and there was no difference in situational awareness. Perception of using the watch was positive, with 83% of users finding value in using the watch and receiving haptic feedback.

Keywords: computer applications, haptic feedback, petrochemical systems, situational awareness, wearable technology

Procedia PDF Downloads 177
3910 Mental Imagery as an Auxiliary Tool to the Performance of Elite Competitive Swimmers of the University of the East Manila

Authors: Hillary Jo Muyalde

Abstract:

Introduction: Elite athletes train regularly to enhance their physical endurance, but sometimes, training sessions are not enough. When competition comes, these athletes struggle to find focus. Mental imagery is a psychological technique that helps condition the mind to focus and eventually help improve performance. This study aims to help elite competitive swimmers of the University of the East improve their performance with Mental Imagery as an auxiliary tool. Methodology: The study design used was quasi-experimental with a purposive sampling technique and a within-subject design. It was conducted with a total of 41 participants. The participants were given a Sport Imagery Ability Questionnaire (SIAQ) to measure imagery ability and the Mental Imagery Program. The study utilized a Paired T-test for data analysis where the participants underwent six weeks of no mental imagery training and were compared to six weeks with the Mental Imagery Program (MIP). The researcher recorded the personal best time of participants in their respective specialty stroke. Results: The results of the study showed a t-value of 17.804 for Butterfly stroke events, 9.922 for Backstroke events, 7.787 for Breaststroke events, and 17.440 in Freestyle. This indicated that MIP had a positive effect on participants’ performance. The SIAQ result also showed a big difference where -10.443 for Butterfly events, -5.363 for Backstroke, -7.244 for Breaststroke events, and -10.727 for Freestyle events, which meant the participants were able to image better than before MIP. Conclusion: In conclusion, the findings of this study showed that there is indeed an improvement in the performance of the participants after the application of the Mental Imagery Program. It is recommended from this study that the participants continue to use mental imagery as an auxiliary tool to their training regimen for continuous positive results.

Keywords: mental Imagery, personal best time, SIAQ, specialty stroke

Procedia PDF Downloads 50
3909 Brain Computer Interface Implementation for Affective Computing Sensing: Classifiers Comparison

Authors: Ramón Aparicio-García, Gustavo Juárez Gracia, Jesús Álvarez Cedillo

Abstract:

A research line of the computer science that involve the study of the Human-Computer Interaction (HCI), which search to recognize and interpret the user intent by the storage and the subsequent analysis of the electrical signals of the brain, for using them in the control of electronic devices. On the other hand, the affective computing research applies the human emotions in the HCI process helping to reduce the user frustration. This paper shows the results obtained during the hardware and software development of a Brain Computer Interface (BCI) capable of recognizing the human emotions through the association of the brain electrical activity patterns. The hardware involves the sensing stage and analogical-digital conversion. The interface software involves algorithms for pre-processing of the signal in time and frequency analysis and the classification of patterns associated with the electrical brain activity. The methods used for the analysis and classification of the signal have been tested separately, by using a database that is accessible to the public, besides to a comparison among classifiers in order to know the best performing.

Keywords: affective computing, interface, brain, intelligent interaction

Procedia PDF Downloads 359
3908 The Use of Manipulative Strategies: Machiavellianism among the University Students

Authors: Karla Hrbackova, Anna Petr Safrankova, Jakub Hladik

Abstract:

Machiavellianism as social phenomenon reveals certain methods of communication that man puts in contact with other people in both personal and working life (and work with clients). Especially at the helping-profession students is honesty, openness or low motivation for personal benefit important part of the profession. The aim of a study is to expose intercultural differences influence of Machiavellianism between Czech and Slovak university students and to determine whether these differences manifest themselves differently among students focusing on management and social profession (by helping degrees). The research involved 1120 university students from the Czech Republic and the Slovak Republic. The measurement of Machiavellianism used a test Mach IV. The test contained 20 statements divided into four central dimensions of Machiavellianism: flattery, deception and falsehood, immorality and cynicism. We found out, that Czech and Slovak's student expressed a similar attitude toward Machiavellianism as a means of manipulation in the interpersonal relationship, but this is not true in all dimensions. Czech and Slovak's students perceive differently flattery, deception and falsehood and cynicism too. In addition to specific features of cultural conditionality, we found out differences depending on the helping profession. Students focusing on managerial occupation (lower level of helping) tend towards greater acceptance of the use flattery as a means of communication than students specializing in the social profession (high-grade assisting). If they are an intercultural and interdisciplinary influences combined and effect on the perception of Machiavellianism together, then their significant importance for the perception of flattery and cynicism. The result will help us to reveal certain specific traits that students apply communication and with whom we can continue to work during their training.

Keywords: use of manipulative strategies, Machiavellianism, helping-profession students, professional training of students

Procedia PDF Downloads 354
3907 An Analysis of Humanitarian Data Management of Polish Non-Governmental Organizations in Ukraine Since February 2022 and Its Relevance for Ukrainian Humanitarian Data Ecosystem

Authors: Renata Kurpiewska-Korbut

Abstract:

Making an assumption that the use and sharing of data generated in humanitarian action constitute a core function of humanitarian organizations, the paper analyzes the position of the largest Polish humanitarian non-governmental organizations in the humanitarian data ecosystem in Ukraine and their approach to non-personal and personal data management since February of 2022. Both expert interviews and document analysis of non-profit organizations providing a direct response in the Ukrainian crisis context, i.e., the Polish Humanitarian Action, Caritas, Polish Medical Mission, Polish Red Cross, and the Polish Center for International Aid and the applicability of theoretical perspective of contingency theory – with its central point that the context or specific set of conditions determining the way of behavior and the choice of methods of action – help to examine the significance of data complexity and adaptive approach to data management by relief organizations in the humanitarian supply chain network. The purpose of this study is to determine how the existence of well-established and accurate internal procedures and good practices of using and sharing data (including safeguards for sensitive data) by the surveyed organizations with comparable human and technological capabilities are implemented and adjusted to Ukrainian humanitarian settings and data infrastructure. The study also poses a fundamental question of whether this crisis experience will have a determining effect on their future performance. The obtained finding indicate that Polish humanitarian organizations in Ukraine, which have their own unique code of conduct and effective managerial data practices determined by contingencies, have limited influence on improving the situational awareness of other assistance providers in the data ecosystem despite their attempts to undertake interagency work in the area of data sharing.

Keywords: humanitarian data ecosystem, humanitarian data management, polish NGOs, Ukraine

Procedia PDF Downloads 69
3906 A Design Framework for an Open Market Platform of Enriched Card-Based Transactional Data for Big Data Analytics and Open Banking

Authors: Trevor Toy, Josef Langerman

Abstract:

Around a quarter of the world’s data is generated by financial with an estimated 708.5 billion global non-cash transactions reached between 2018 and. And with Open Banking still a rapidly developing concept within the financial industry, there is an opportunity to create a secure mechanism for connecting its stakeholders to openly, legitimately and consensually share the data required to enable it. Integration and data sharing of anonymised transactional data are still operated in silos and centralised between the large corporate entities in the ecosystem that have the resources to do so. Smaller fintechs generating data and businesses looking to consume data are largely excluded from the process. Therefore there is a growing demand for accessible transactional data for analytical purposes and also to support the rapid global adoption of Open Banking. The following research has provided a solution framework that aims to provide a secure decentralised marketplace for 1.) data providers to list their transactional data, 2.) data consumers to find and access that data, and 3.) data subjects (the individuals making the transactions that generate the data) to manage and sell the data that relates to themselves. The platform also provides an integrated system for downstream transactional-related data from merchants, enriching the data product available to build a comprehensive view of a data subject’s spending habits. A robust and sustainable data market can be developed by providing a more accessible mechanism for data producers to monetise their data investments and encouraging data subjects to share their data through the same financial incentives. At the centre of the platform is the market mechanism that connects the data providers and their data subjects to the data consumers. This core component of the platform is developed on a decentralised blockchain contract with a market layer that manages transaction, user, pricing, payment, tagging, contract, control, and lineage features that pertain to the user interactions on the platform. One of the platform’s key features is enabling the participation and management of personal data by the individuals from whom the data is being generated. This framework developed a proof-of-concept on the Etheruem blockchain base where an individual can securely manage access to their own personal data and that individual’s identifiable relationship to the card-based transaction data provided by financial institutions. This gives data consumers access to a complete view of transactional spending behaviour in correlation to key demographic information. This platform solution can ultimately support the growth, prosperity, and development of economies, businesses, communities, and individuals by providing accessible and relevant transactional data for big data analytics and open banking.

Keywords: big data markets, open banking, blockchain, personal data management

Procedia PDF Downloads 49
3905 Experiences and Coping of Adults with Death of Siblings during Childhood in Chinese Context: Implications for Therapeutic Interventions

Authors: Sze Yee Lee

Abstract:

The death of a sibling in childhood leads to significant impacts on both the personal and family development of the surviving siblings. Yet, the effects of sibling loss in Chinese societies such as Hong Kong have been inadequately documented in the literature. In particular, there is a gap in the literature about the long term impacts on surviving siblings. This paper explores the experience of adult siblings encountering siblings’ death during childhood with the use of in-depth interviews. Through thematic analysis and in-depth interviews, the author explores the impacts on surviving siblings’ emotions, coping styles, struggles and challenges, and personal development. Furthermore, the influences on family dynamics are explored thoroughly, including the changes in a family atmosphere, family roles, family relationships, family communication, and parenting styles. More importantly, the author identifies (i) existing continuing bonds, (ii) crying, (iii) adequate social support, (iv) hiding own emotions as a gesture of protecting parents as the crucial elements pertinent to surviving siblings’ successful adaptation in the face of sibling loss. In addition, 'child-centered' and 'family-centered' interventions for families with siblings' death in a Chinese context are discussed. With the use of age-appropriate language and children’s participation in the preparation of death and after-death arrangements, surviving siblings could be assisted in transforming bereavement into opportunities for growth. In addition, the bereaved family could better cope with grief with open communication platforms, adequate social support, and family education resources. Meanwhile, life-and-death education at both school and community levels could enhance the public’s awareness and understanding of the bereaved individuals to prevent creating further harm to them.

Keywords: children and adolescent bereavement, children-centered, family-centered, sibling’s death

Procedia PDF Downloads 86
3904 Comparative Analysis of Spectral Estimation Methods for Brain-Computer Interfaces

Authors: Rafik Djemili, Hocine Bourouba, M. C. Amara Korba

Abstract:

In this paper, we present a method in order to classify EEG signals for Brain-Computer Interfaces (BCI). EEG signals are first processed by means of spectral estimation methods to derive reliable features before classification step. Spectral estimation methods used are standard periodogram and the periodogram calculated by the Welch method; both methods are compared with Logarithm of Band Power (logBP) features. In the method proposed, we apply Linear Discriminant Analysis (LDA) followed by Support Vector Machine (SVM). Classification accuracy reached could be as high as 85%, which proves the effectiveness of classification of EEG signals based BCI using spectral methods.

Keywords: brain-computer interface, motor imagery, electroencephalogram, linear discriminant analysis, support vector machine

Procedia PDF Downloads 477
3903 Comparative Study of Computer Assisted Instruction and Conventional Method in Attaining and Retaining Mathematical Concepts

Authors: Nirupma Bhatti

Abstract:

This empirical study was aimed to compare the effectiveness of Computer Assisted Instruction (CAI) and Conventional Method (CM) in attaining and retaining mathematical concepts. Instructional and measuring tools were developed for five units of Matrix Algebra, two of Calculus and five of Numerical Analysis. Reliability and validity of these tools were also examined in pilot study. Ninety undergraduates participated in this study. Pre-test – post-test equivalent – groups research design was used. SPSS v.16 was used for data analysis. Findings supported CAI as better mode of instruction for attainment and retention of basic mathematical concepts. Administrators should motivate faculty members to develop Computer Assisted Instructional Material (CAIM) in mathematics for higher education.

Keywords: attainment, CAI, CAIM, conventional method, retention

Procedia PDF Downloads 160
3902 Solid Health Care Waste Management Practice in Ethiopia

Authors: Yeshanew Ayele Tiruneh, L. M. Modiba, S. M. Zuma

Abstract:

Introduction- Healthcare waste is any waste generated by health care facilities, considered potentially hazardous to health. Solid health care waste is categorised into infectious and non-infectious wastes. Infectious waste is material suspected to contain pathogens. The non-infectious waste includes wastes that have not been in contact with infectious agents, hazardous chemicals, or radioactive substances. The purpose is to assess solid health care waste (SHCW) management practice toward developing guidelines. The setting is all health facilities found in Hossaena town. A mixed-method study design used. For the qualitative part, small purposeful samples were considered and large samples for the quantitative phase. Both samples were taken from the same population. Result - 17(3.1%) of health facility workers have hand washing facilities. 392 (72.6%) of the participants agree on the availability of one or more of personal protective equipment (PPE) in the facility ‘’the reason for the absence of some of the PPEs like boots, goggles, and shortage of disposable gloves are owing to cost inflation from time to time and sometimes absent from the market’’. The observational finding shows that colour coded waste bins are available at 23 (9.6%) of the rooms. Majority of the sharp container used in the health facility are reusable in the contrary to the health care waste management standards and most of them are plastic buckets and easily cleanable. All of the health facility infectious waste are collected transported and deposed daily. Regarding the preventive vaccination nearly half of the the fahealth facility workers wer vaccinated for Hep B virus. Conclusion- Hand washing facilities, personal protective equipment’s and preventive vaccinations are not easily available for health workers. Solid waste segregation practices are poor and these practices showed that SWMP is below the acceptable level.

Keywords: health care waste, waste management, disposal, private health facilities

Procedia PDF Downloads 41
3901 Implementation of the Outputs of Computer Simulation to Support Decision-Making Processes

Authors: Jiri Barta

Abstract:

At the present time, awareness, education, computer simulation and information systems protection are very serious and relevant topics. The article deals with perspectives and possibilities of implementation of emergence or natural hazard threats into the system which is developed for communication among members of crisis management staffs. The Czech Hydro-Meteorological Institute with its System of Integrated Warning Service resents the largest usable base of information. National information systems are connected to foreign systems, especially to flooding emergency systems of neighboring countries, systems of European Union and international organizations where the Czech Republic is a member. Use of outputs of particular information systems and computer simulations on a single communication interface of information system for communication among members of crisis management staff and setting the site interoperability in the net will lead to time savings in decision-making processes in solving extraordinary events and crisis situations. Faster managing of an extraordinary event or a crisis situation will bring positive effects and minimize the impact of negative effects on the environment.

Keywords: computer simulation, communication, continuity, critical infrastructure, information systems, safety

Procedia PDF Downloads 311
3900 Structure and Dimensions Of Teacher Professional Identity

Authors: Vilma Zydziunaite, Gitana Balezentiene, Vilma Zydziunaite

Abstract:

Teaching is one of most responsible profession, and it is not only a job of an artisan. This profes-sion needs a developed ability to identify oneself with the chosen teaching profession. Research questions: How teachers characterize their authentic individual professional identity? What factors teachers exclude, which support and limit the professional identity? Aim was to develop the grounded theory (GT) about teacher’s professional identity (TPI). Research methodology is based on Charmaz GT version. Data were collected via semi-structured interviews with the he sample of 12 teachers. Findings. 15 extracted categories revealed that the core of TPI is teacher’s professional calling. Premises of TPI are family support, motives for choos-ing teacher’s profession, teacher’s didactic competence. Context of TPI consists of teacher compli-ance with the profession, purposeful preparation for pedagogical studies, professional growth. The strategy of TPI is based on teacher relationship with school community strengthening. The profes-sional frustration limits the TPI. TPI outcome includes teacher recognition, authority; professional mastership, professionalism, professional satisfaction. Dimensions of TPI GT the past (reaching teacher’s profession), present (teacher’s commitment to professional activity) and future (teacher’s profession reconsideration). Conclusions. The substantive GT describes professional identity as complex, changing and life-long process, which develops together with teacher’s personal identity and is connected to professional activity. The professional decision "to be a teacher" is determined by the interaction of internal (professional vocation, personal characteristics, values, self-image, talents, abilities) and external (family, friends, school community, labor market, working condi-tions) factors. The dimensions of the TPI development includes: the past (the pursuit of the teaching profession), the present (the teacher's commitment to professional activity) and the future (the revi-sion of the teaching profession). A significant connection emerged - as the teacher's professional commitment strengthens (creating a self-image, growing the teacher's professional experience, recognition, professionalism, mastery, satisfaction with pedagogical activity), the dimension of re-thinking the teacher's profession weakens. This proves that professional identity occupies an im-portant place in a teacher's life and it affects his professional success and job satisfaction. Teachers singled out the main factors supporting a teacher's professional identity: their own self-image per-ception, professional vocation, positive personal qualities, internal motivation, teacher recognition, confidence in choosing a teaching profession, job satisfaction, professional knowledge, professional growth, good relations with the school community, pleasant experiences, quality education process, excellent student achievements.

Keywords: grounded theory, teacher professional identity, semi-structured interview, school, students, school community, family

Procedia PDF Downloads 40
3899 Differences in Assessing Hand-Written and Typed Student Exams: A Corpus-Linguistic Study

Authors: Jutta Ransmayr

Abstract:

The digital age has long arrived at Austrian schools, so both society and educationalists demand that digital means should be integrated accordingly to day-to-day school routines. Therefore, the Austrian school-leaving exam (A-levels) can now be written either by hand or by using a computer. However, the choice of writing medium (pen and paper or computer) for written examination papers, which are considered 'high-stakes' exams, raises a number of questions that have not yet been adequately investigated and answered until recently, such as: What effects do the different conditions of text production in the written German A-levels have on the component of normative linguistic accuracy? How do the spelling skills of German A-level papers written with a pen differ from those that the students wrote on the computer? And how is the teacher's assessment related to this? Which practical desiderata for German didactics can be derived from this? In a trilateral pilot project of the Austrian Center for Digital Humanities (ACDH) of the Austrian Academy of Sciences and the University of Vienna in cooperation with the Austrian Ministry of Education and the Council for German Orthography, these questions were investigated. A representative Austrian learner corpus, consisting of around 530 German A-level papers from all over Austria (pen and computer written), was set up in order to subject it to a quantitative (corpus-linguistic and statistical) and qualitative investigation with regard to the spelling and punctuation performance of the high school graduates and the differences between pen- and computer-written papers and their assessments. Relevant studies are currently available mainly from the Anglophone world. These have shown that writing on the computer increases the motivation to write, has positive effects on the length of the text, and, in some cases, also on the quality of the text. Depending on the writing situation and other technical aids, better results in terms of spelling and punctuation could also be found in the computer-written texts as compared to the handwritten ones. Studies also point towards a tendency among teachers to rate handwritten texts better than computer-written texts. In this paper, the first comparable results from the German-speaking area are to be presented. Research results have shown that, on the one hand, there are significant differences between handwritten and computer-written work with regard to performance in orthography and punctuation. On the other hand, the corpus linguistic investigation and the subsequent statistical analysis made it clear that not only the teachers' assessments of the students’ spelling performance vary enormously but also the overall assessments of the exam papers – the factor of the production medium (pen and paper or computer) also seems to play a decisive role.

Keywords: exam paper assessment, pen and paper or computer, learner corpora, linguistics

Procedia PDF Downloads 142
3898 Impact Analysis of Quality Control Practices in Veterinary Diagnostic Labs in Lahore, Pakistan

Authors: Faiza Marrium, Masood Rabbani, Ali Ahmad Sheikh, Muhammad Yasin Tipu Javed Muhammad, Sohail Raza

Abstract:

More than 75% diseases spreading in the past 10 years in human population globally are linked to veterinary sector. Veterinary diagnostic labs are the powerful ally for diagnosis, prevention and monitoring of animal diseases in any country. In order to avoid detrimental effects of errors in disease diagnostic and biorisk management, there is a dire need to establish quality control system. In current study, 3 private and 6 public sectors veterinary diagnostic labs were selected for survey. A questionnaire survey in biorisk management guidelines of CWA 15793 was designed to find quality control breaches in lab design, personal, equipment and consumable, quality control measures adopted in lab, waste management, environmental monitoring and customer care. The data was analyzed through frequency distribution statistically by using (SPSS) version 18.0. A non-significant difference was found in all parameters of lab design, personal, equipment and consumable, quality control measures adopted in lab, waste management, environmental monitoring and customer care with an average percentage of 46.6, 57.77, 52.7, 55.5, 54.44, 48.88 and 60, respectively. A non-significant difference among all nine labs were found, with highest average compliance percentage of all parameters are lab 2 (78.13), Lab 3 (70.56), Lab 5 (57.51), Lab 6 (56.37), Lab 4 (55.02), Lab 9 (49.58), Lab 7 (47.76), Lab 1 (41.01) and Lab 8 (36.09). This study shows that in Lahore district veterinary diagnostic labs are not giving proper attention to quality of their system and there is no significant difference between setups of private and public sector laboratories. These results show that most of parameters are between 50 and 80 percent, which needs some work and improvement as per WHO criteria.

Keywords: veterinary lab, quality management system, accreditation, regulatory body, disease identification

Procedia PDF Downloads 122
3897 Drugstore Control System Design and Realization Based on Programmable Logic Controller (PLC)

Authors: Muhammad Faheem Khakhi, Jian Yu Wang, Salman Muhammad, Muhammad Faisal Shabir

Abstract:

Population growth and Chinese two-child policy will boost pharmaceutical market, and it will continue to maintain the growth for a period of time in the future, the traditional pharmacy dispensary has been unable to meet the growing medical needs of the peoples. Under the strong support of the national policy, the automatic transformation of traditional pharmacies is the inclination of the Times, the new type of intelligent pharmacy system will continue to promote the development of the pharmaceutical industry. Under this background, based on PLC control, the paper proposed an intelligent storage and automatic drug delivery system; complete design of the lower computer's control system and the host computer's software system has been present. The system can be applied to dispensing work for Chinese herbal medicinal and Western medicines. Firstly, the essential of intelligent control system for pharmacy is discussed. After the analysis of the requirements, the overall scheme of the system design is presented. Secondly, introduces the software and hardware design of the lower computer's control system, including the selection of PLC and the selection of motion control system, the problem of the human-computer interaction module and the communication between PC and PLC solves, the program design and development of the PLC control system is completed. The design of the upper computer software management system is described in detail. By analyzing of E-R diagram, built the establish data, the communication protocol between systems is customize, C++ Builder is adopted to realize interface module, supply module, main control module, etc. The paper also gives the implementations of the multi-threaded system and communication method. Lastly, each module of the lower computer control system is tested. Then, after building a test environment, the function test of the upper computer software management system is completed. On this basis, the entire control system accepts the overall test.

Keywords: automatic pharmacy, PLC, control system, management system, communication

Procedia PDF Downloads 280
3896 Video Based Ambient Smoke Detection By Detecting Directional Contrast Decrease

Authors: Omair Ghori, Anton Stadler, Stefan Wilk, Wolfgang Effelsberg

Abstract:

Fire-related incidents account for extensive loss of life and material damage. Quick and reliable detection of occurring fires has high real world implications. Whereas a major research focus lies on the detection of outdoor fires, indoor camera-based fire detection is still an open issue. Cameras in combination with computer vision helps to detect flames and smoke more quickly than conventional fire detectors. In this work, we present a computer vision-based smoke detection algorithm based on contrast changes and a multi-step classification. This work accelerates computer vision-based fire detection considerably in comparison with classical indoor-fire detection.

Keywords: contrast analysis, early fire detection, video smoke detection, video surveillance

Procedia PDF Downloads 411
3895 The Application and Applicability of Computer System to Financial Management: A Case Study of College of Education, Oju, Benue State, Nigeria

Authors: Agih Ukuru Agih

Abstract:

This work is an appraisal of the application and applicability of computer system to financial management in improving the speed, performance, accuracy, and efficiency of the College of Education, Oju. The computerization of financial management, which is a recent development that has authentic and dedicated balancing of accounting records, would be of enormous benefits to the college. The core objective of this project is to recommend the software that typically matches a computerized institution, making for improved service, reduced fraud, mishandled funds, and financial records in the College of Education, Oju. Considering major globalization impacts in computerized financial management of the college, the study recommends among other things that the College of Education, Oju should endeavor to be positive towards computerized financial management in the institution.

Keywords: computer system, balancing, accounting records, computerized financial management

Procedia PDF Downloads 355
3894 FEM and Experimental Modal Analysis of Computer Mount

Authors: Vishwajit Ghatge, David Looper

Abstract:

Over the last few decades, oilfield service rolling equipment has significantly increased in weight, primarily because of emissions regulations, which require larger/heavier engines, larger cooling systems, and emissions after-treatment systems, in some cases, etc. Larger engines cause more vibration and shock loads, leading to failure of electronics and control systems. If the vibrating frequency of the engine matches the system frequency, high resonance is observed on structural parts and mounts. One such existing automated control equipment system comprising wire rope mounts used for mounting computers was designed approximately 12 years ago. This includes the use of an industrial- grade computer to control the system operation. The original computer had a smaller, lighter enclosure. After a few years, a newer computer version was introduced, which was 10 lbm heavier. Some failures of internal computer parts have been documented for cases in which the old mounts were used. Because of the added weight, there is a possibility of having the two brackets impact each other under off-road conditions, which causes a high shock input to the computer parts. This added failure mode requires validating the existing mount design to suit the new heavy-weight computer. This paper discusses the modal finite element method (FEM) analysis and experimental modal analysis conducted to study the effects of vibration on the wire rope mounts and the computer. The existing mount was modelled in ANSYS software, and resultant mode shapes and frequencies were obtained. The experimental modal analysis was conducted, and actual frequency responses were observed and recorded. Results clearly revealed that at resonance frequency, the brackets were colliding and potentially causing damage to computer parts. To solve this issue, spring mounts of different stiffness were modeled in ANSYS software, and the resonant frequency was determined. Increasing the stiffness of the system increased the resonant frequency zone away from the frequency window at which the engine showed heavy vibrations or resonance. After multiple iterations in ANSYS software, the stiffness of the spring mount was finalized, which was again experimentally validated.

Keywords: experimental modal analysis, FEM Modal Analysis, frequency, modal analysis, resonance, vibration

Procedia PDF Downloads 303
3893 Multimedia Technologies Utilisation as Predictors of Lecturers’ Teaching Effectiveness in Colleges of Education in South-West, Nigeria

Authors: Abel Olusegun Egunjobi, Olusegun Oyeleye Adesanya

Abstract:

Teaching effectiveness of lecturers in a tertiary institution in Nigeria is one of the determinants of the lecturer’s productivity. In this study, therefore, lecturers’ teaching effectiveness was examined vis-à-vis their multimedia technologies utilisation in Colleges of Education (CoE) in South-West, Nigeria. This is for the purpose of ascertaining the relationship and contribution of multimedia technologies utilisation to lecturers’ teaching effectiveness in Nigerian colleges of education. The descriptive survey research design was adopted in the study, while a multi-stage sampling procedure was used in the study. A stratified sampling technique was used to select colleges of education, and a simple random sampling method was employed to select lecturers from the selected colleges of education. A total of 862 lecturers (627 males and 235 females) were selected from the colleges of education used for the study. The instrument used was lecturers’ questionnaire on multimedia technologies utilisation and teaching effectiveness with a reliability coefficient of 0.85 at 0.05 level of significance. The data collected were analysed using descriptive statistics, multiple regression, and t-test. The findings showed that the level of multimedia technologies utilisation in colleges of education was low, whereas lecturers’ teaching effectiveness was high. Findings also revealed that the lecturers used multimedia technologies purposely for personal and professional developments, so also for up to date news on economic and political matters. Also, findings indicated that laptop, Ipad, CD-ROMs, and computer instructional software were the multimedia technologies frequently utilised by the lecturers. There was also a significant difference in the teaching effectiveness between lecturers in the Federal and State COE. The government should, therefore, make adequate provision for multimedia technologies in the COE in Nigeria for lecturers’ utilisation in their instructions so as to boost their students’ learning outcomes.

Keywords: colleges of education, lecturers’ teaching effectiveness, multimedia technologies utilisation, Southwest Nigeria

Procedia PDF Downloads 114
3892 Narrative Therapy as a Way of Terrorist Rehabilitation at Mohammad Bin Naif Counselling and Care Center: A Case Study

Authors: Yasser Almazrua

Abstract:

Terrorism is a multidimensional phenomenon that has increased recently. Many countries started combating terrorism through security forces; however, there has been relatively little attention given to rehabilitation programs for people involved in such terrorism acts. In Saudi Arabia, after facing so many terrorist attacks, they started understanding and countering terrorism differently by establishing Mohammad bin Naif Counselling and Care Center in 2006. The center now is considered one of the top experience centers in the world for terrorist rehabilitation and ideology correction. The center offers different programs such as training, educational, social, art and psychological programs. One of the approaches that have been used by psychological experts at the center is Narrative Therapy. It is a therapeutic approach that focuses on the ability of the client to identify their personal life story. The client during therapy works as a storyteller where he or she gets insight, meaning and better understanding of their own lives. Because each client at the center had a story, it can be better fit method for rehabilitation towards healing and personal development. The case describes a 34-years-old man who was involved in some terrorism activities locally by technically and financially supporting a terrorist group related to Al-Qaida. The beneficiary joined Mohammad bin Naif Counseling and Care Center after serving his sentence. Informed of consent has been given to the beneficiary before starting the therapeutic program. Both qualitative and quantitative data on the beneficiary are collected by self-reporting during the initial session, and by using a psychological measurement. The result found that the beneficiary was not insightful about himself, and he had a high level of repression which relatedly moved him to be targeted for recruitment in the terrorist group. With rehabilitation and by using the therapeutic approach, the beneficiary improved on the level of insight, specifically about himself and also about the experience. This case illustrates the importance of considering the effect of Narrative Therapy in terrorist rehabilitation programs.

Keywords: narrative therapy, rehabilitation, Saudi Arabia, terrorism

Procedia PDF Downloads 268
3891 Development and Application of the Proctoring System with Face Recognition for User Registration on the Educational Information Portal

Authors: Meruyert Serik, Nassipzhan Duisegaliyeva, Danara Tleumagambetova, Madina Ermaganbetova

Abstract:

This research paper explores the process of creating a proctoring system by evaluating the implementation of practical face recognition algorithms. Students of educational programs reviewed the research work "6B01511-Computer Science", "7M01511-Computer Science", "7M01525- STEM Education," and "8D01511-Computer Science" of Eurasian National University named after L.N. Gumilyov. As an outcome, a proctoring system will be created, enabling the conduction of tests and ensuring academic integrity checks within the system. Due to the correct operation of the system, test works are carried out. The result of the creation of the proctoring system will be the basis for the automation of the informational, educational portal developed by machine learning.

Keywords: artificial intelligence, education portal, face recognition, machine learning, proctoring

Procedia PDF Downloads 83