Search results for: language learning model
18700 The Development of Nursing Model for Pregnant Women to Prevention of Early Postpartum Hemorrhage
Authors: Wadsana Sarakarn, Pimonpan Charoensri, Baliya Chaiyara
Abstract:
Objectives: To study the outcomes of the developed nursing model to prevent early postpartum hemorrhage (PPH). Materials and Methods: The analytical study was conducted in Sunpasitthiprasong Hospital during October 1st, 2015, until May 31st, 2017. After review the prevalence, risk factors, and outcomes of postpartum hemorrhage of the parturient who gave birth in Sunpasitthiprasong Hospital, the nursing model was developed under research regulation of Kemmis&McTaggart using 4 steps of operating procedures: 1) analyzing problem situation and gathering 2) creating the plan 3) noticing and performing 4) reflecting the result of the operation. The nursing model consisted of the screening tools for risk factors associated with PPH, the clinical nursing practice guideline (CNPG), and the collecting bag for measuring postpartum blood loss. Primary outcome was early postpartum hemorrhage. Secondary outcomes were postpartum hysterectomy, maternal mortality, personnel’s practice, knowledge, and satisfaction of the nursing model. The data were analyzed by using content analysis for qualitative data and descriptive statistics for quantitative data. Results: Before using the nursing model, the prevalence of early postpartum hemorrhage was under estimated (2.97%). There were 5 cases of postpartum hysterectomy and 2 cases of maternal death due to postpartum hemorrhage. During the study period, there was 22.7% prevalence of postpartum hemorrhage among 220 pregnant women who were vaginally delivered at Sunpasitthiprasong Hospital. No maternal death or postpartum hysterectomy was reported after using the nursing model. Among 16 registered nurses at the delivery room who evaluated using of the nursing model, they reported the high level of practice, knowledge, and satisfaction Conclusion: The nursing model for the prevention of early PPH is effective to decrease early PPH and other serious complications.Keywords: the development of a nursing model, prevention of postpartum hemorrhage, pregnant women, postpartum hemorrhage
Procedia PDF Downloads 9818699 Combined Automatic Speech Recognition and Machine Translation in Business Correspondence Domain for English-Croatian
Authors: Sanja Seljan, Ivan Dunđer
Abstract:
The paper presents combined automatic speech recognition (ASR) for English and machine translation (MT) for English and Croatian in the domain of business correspondence. The first part presents results of training the ASR commercial system on two English data sets, enriched by error analysis. The second part presents results of machine translation performed by online tool Google Translate for English and Croatian and Croatian-English language pairs. Human evaluation in terms of usability is conducted and internal consistency calculated by Cronbach's alpha coefficient, enriched by error analysis. Automatic evaluation is performed by WER (Word Error Rate) and PER (Position-independent word Error Rate) metrics, followed by investigation of Pearson’s correlation with human evaluation.Keywords: automatic machine translation, integrated language technologies, quality evaluation, speech recognition
Procedia PDF Downloads 48118698 Select Communicative Approaches and Speaking Skills of Junior High School Students
Authors: Sonia Arradaza-Pajaron
Abstract:
Speaking English, as a medium of instruction among students who are non-native English speakers poses a real challenge to achieve proficiency, especially so if it is a requirement in most communicative classroom instruction. It becomes a real burden among students whose English language orientation is not well facilitated and encouraged by teachers among national high schools. This study, which utilized a descriptive-correlational research, examined the relationship between the select communicative approaches commonly utilized in classroom instruction to the level of speaking skills among the identified high school students. Survey questionnaires, interview, and observations sheets were researcher instruments used to generate salient information. Data were analyzed and treated statistically utilizing weighted mean speaking skills levels and Pearson r to determine the relationship between the two identified variables of the study. Findings revealed that the level of English speaking skills of the high school students is just average. Further, among the identified speaking sub-skills, namely, grammar, pronunciation and fluency, the students were considered above average level. There was also a clear relationship of some communicative approaches to the respondents’ speaking skills. Most notable among the select approaches is that of role-playing, compared to storytelling, informal debate, brainstorming, oral reporting, and others. It may be because role-playing is the most commonly used approach in the classroom. This implies that when these high school students are given enough time and autonomy on how they could express their ideas or comprehension of some lessons, they are shown to have a spontaneous manner of expression, through the maximization of the second language. It can be concluded further that high school students have the capacity to express ideas even in the second language, only if they are encouraged and well-facilitated by teachers. Also, when a better communicative approach is identified and better implemented, thus, will level up students’ classroom engagement.Keywords: communicative approaches, comprehension, role playing, speaking skills
Procedia PDF Downloads 17618697 Nonlinear Porous Diffusion Modeling of Ionic Agrochemicals in Astomatous Plant Cuticle Aqueous Pores: A Mechanistic Approach
Authors: Eloise C. Tredenick, Troy W. Farrell, W. Alison Forster, Steven T. P. Psaltis
Abstract:
The agriculture industry requires improved efficacy of sprays being applied to crops. More efficacious sprays provide many environmental and financial benefits. The plant leaf cuticle is known to be the main barrier to diffusion of agrochemicals within the leaf. The importance of a mathematical model to simulate uptake of agrochemicals in plant cuticles has been noted, as the results of each uptake experiments are specific to each formulation of active ingredient and plant species. In this work we develop a mathematical model and numerical simulation for the uptake of ionic agrochemicals through aqueous pores in plant cuticles. We propose a nonlinear porous diffusion model of ionic agrochemicals in isolated cuticles, which provides additions to a simple diffusion model through the incorporation of parameters capable of simulating plant species' variations, evaporation of surface droplet solutions and swelling of the aqueous pores with water. The model could feasibly be adapted to other ionic active ingredients diffusing through other plant species' cuticles. We validate our theoretical results against appropriate experimental data, discuss the key sensitivities in the model and relate theoretical predictions to appropriate physical mechanisms.Keywords: aqueous pores, ionic active ingredient, mathematical model, plant cuticle, porous diffusion
Procedia PDF Downloads 26018696 Obstacle Avoidance Using Image-Based Visual Servoing Based on Deep Reinforcement Learning
Authors: Tong He, Long Chen, Irag Mantegh, Wen-Fang Xie
Abstract:
This paper proposes an image-based obstacle avoidance and tracking target identification strategy in GPS-degraded or GPS-denied environment for an Unmanned Aerial Vehicle (UAV). The traditional force algorithm for obstacle avoidance could produce local minima area, in which UAV cannot get away obstacle effectively. In order to eliminate it, an artificial potential approach based on harmonic potential is proposed to guide the UAV to avoid the obstacle by using the vision system. And image-based visual servoing scheme (IBVS) has been adopted to implement the proposed obstacle avoidance approach. In IBVS, the pixel accuracy is a key factor to realize the obstacle avoidance. In this paper, the deep reinforcement learning framework has been applied by reducing pixel errors through constant interaction between the environment and the agent. In addition, the combination of OpenTLD and Tensorflow based on neural network is used to identify the type of tracking target. Numerical simulation in Matlab and ROS GAZEBO show the satisfactory result in target identification and obstacle avoidance.Keywords: image-based visual servoing, obstacle avoidance, tracking target identification, deep reinforcement learning, artificial potential approach, neural network
Procedia PDF Downloads 14118695 Story Telling Method as a Bastion of Local Wisdom in the Frame of Education Technology Development in Medan, North Sumatra-Indonesia
Authors: Mardianto
Abstract:
Education and learning are now grown rapidly. Synergy of techonology especially instructional technology in the learning activities are very big influence on the effectiveness of learning and creativity to achieve optimal results. But on the other hand there is a education value that is difficult to be articulated through character-forming technology such as honesty, discipline, hard work, heroism, and so forth. Learning strategy and storytelling from the past until today is still an option for teachers to convey the message of character values. With the material was loaded from the local culture (stories folklore), the combination of learning objectives (build character child) strategy, and traditional methods (storytelling and story), and the preservation of local culture (dig tale folklore) is critical to maintaining the nation's culture. In the context of maintaining the nation's culture, then since the age of the child at the level of government elementary school a necessity. Globalization, the internet and technology sometimes feel can displace the role of the teacher in the learning activities. To the oral tradition is a mainstay of storytelling should be maintained and preserved. This research was conducted at the elementary school in the city of Medan, North Sumatra Indonesia, with a random sampling technique, the 27 class teachers were respondents who were randomly assigned to the Madrasah Ibtdaiyah (Islamic Elementary School) both public and private. Research conducted at the beginning of 2014 refers to a curriculum that is being transformed in the environment ministry Republic Religion Indonesia. The results of this study indicate that; the declining skills of teachers to develop storytelling this can be seen from; 74.07% of teachers have never attended a special training storytelling, 85.19% no longer nasakah new stories, only 22.22% are teachers who incorporate methods of stories in the learning plan. Most teachers are no longer concerned with storytelling, among those experiencing difficulty in developing methods because the story; 66.67% of children are more interested in children's cartoons like Bobo boy, Angrybirds and others, 59.26 children prefer other activities than listening to a story. The teachers hope, folklore books should be preserved, storytelling training should be provided by the government through the ministry of religion, race or competition of storytelling should be scheduled, writing a new script-based populist storytelling should be provided immediately. The teachers’ hope certainly not excessive, by realizing the story method becomes articulation as the efforts of child character development based populist, therefore the local knowledge can be a strong fortress facing society in the era of progress as at present, and future.Keywords: story telling, local wisdom, education, technology development
Procedia PDF Downloads 27818694 Alexa (Machine Learning) in Artificial Intelligence
Authors: Loulwah Bokhari, Jori Nazer, Hala Sultan
Abstract:
Nowadays, artificial intelligence (AI) is used as a foundation for many activities in modern computing applications at home, in vehicles, and in businesses. Many modern machines are built to carry out a specific activity or purpose. This is where the Amazon Alexa application comes in, as it is used as a virtual assistant. The purpose of this paper is to explore the use of Amazon Alexa among people and how it has improved and made simple daily tasks easier for many people. We gave our participants several questions regarding Amazon Alexa and if they had recently used or heard of it, as well as the different tasks it provides and whether it successfully satisfied their needs. Overall, we found that participants who have recently used Alexa have found it to be helpful in their daily tasks.Keywords: artificial intelligence, Echo system, machine learning, feature for feature match
Procedia PDF Downloads 11918693 Time/Temperature-Dependent Finite Element Model of Laminated Glass Beams
Authors: Alena Zemanová, Jan Zeman, Michal Šejnoha
Abstract:
The polymer foil used for manufacturing of laminated glass members behaves in a viscoelastic manner with temperature dependence. This contribution aims at incorporating the time/temperature-dependent behavior of interlayer to our earlier elastic finite element model for laminated glass beams. The model is based on a refined beam theory: each layer behaves according to the finite-strain shear deformable formulation by Reissner and the adjacent layers are connected via the Lagrange multipliers ensuring the inter-layer compatibility of a laminated unit. The time/temperature-dependent behavior of the interlayer is accounted for by the generalized Maxwell model and by the time-temperature superposition principle due to the Williams, Landel, and Ferry. The resulting system is solved by the Newton method with consistent linearization and the viscoelastic response is determined incrementally by the exponential algorithm. By comparing the model predictions against available experimental data, we demonstrate that the proposed formulation is reliable and accurately reproduces the behavior of the laminated glass units.Keywords: finite element method, finite-strain Reissner model, Lagrange multipliers, generalized Maxwell model, laminated glass, Newton method, Williams-Landel-Ferry equation
Procedia PDF Downloads 43018692 Model Predictive Control Using Thermal Inputs for Crystal Growth Dynamics
Authors: Takashi Shimizu, Tomoaki Hashimoto
Abstract:
Recently, crystal growth technologies have made progress by the requirement for the high quality of crystal materials. To control the crystal growth dynamics actively by external forces is useuful for reducing composition non-uniformity. In this study, a control method based on model predictive control using thermal inputs is proposed for crystal growth dynamics of semiconductor materials. The control system of crystal growth dynamics considered here is governed by the continuity, momentum, energy, and mass transport equations. To establish the control method for such thermal fluid systems, we adopt model predictive control known as a kind of optimal feedback control in which the control performance over a finite future is optimized with a performance index that has a moving initial time and terminal time. The objective of this study is to establish a model predictive control method for crystal growth dynamics of semiconductor materials.Keywords: model predictive control, optimal control, process control, crystal growth
Procedia PDF Downloads 35518691 Teacher Trainers’ Motivation in Transformation of Teaching and Learning: The Fun Way Approach
Authors: Malathi Balakrishnan, Gananthan M. Nadarajah, Noraini Abd Rahim, Amy Wong On Mei
Abstract:
The purpose of the study is to investigate the level of intrinsic motivation of trainers after attending a Continuous Professional Development Course (CPD) organized by Institute of Teacher Training Malaysia titled, ‘Transformation of Teaching and Learning the Fun Way’. This study employed a survey whereby 96 teacher trainers were given Situational Intrinsic Motivational Scale (SIMS) Instruments. Confirmatory factor analysis was carried out to get validity of this instrument in local setting. Data were analyzed with SPSS for descriptive statistic. Semi structured interviews were also administrated to collect qualitative data on participants experiences after participating in the two-day fun-filled program. The findings showed that the participants’ level of intrinsic motivation showed higher mean than the amotivation. The results revealed that the intrinsic motivation mean is 19.0 followed by Identified regulation with a mean of 17.4, external regulation 9.7 and amotivation 6.9. The interview data also revealed that the participants were motivated after attending this training program. It can be concluded that this program, which was organized by Institute of Teacher Training Malaysia, was able to enhance participants’ level of motivation. Self-Determination Theory (SDT) as a multidimensional approach to motivation was utilized. Therefore, teacher trainers may have more success using the ‘The fun way approach’ in conducting training program in future.Keywords: teaching and learning, motivation, teacher trainer, SDT
Procedia PDF Downloads 46018690 Improving Ride Comfort of a Bus Using Fuzzy Logic Controlled Suspension
Authors: Mujde Turkkan, Nurkan Yagiz
Abstract:
In this study an active controller is presented for vibration suppression of a full-bus model. The bus is modelled having seven degrees of freedom. Using the achieved model via Lagrange Equations the system equations of motion are derived. The suspensions of the bus model include air springs with two auxiliary chambers are used. Fuzzy logic controller is used to improve the ride comfort. The numerical results, verifies that the presented fuzzy logic controller improves the ride comfort.Keywords: ride comfort, air spring, bus, fuzzy logic controller
Procedia PDF Downloads 42918689 Selection of Variogram Model for Environmental Variables
Authors: Sheikh Samsuzzhan Alam
Abstract:
The present study investigates the selection of variogram model in analyzing spatial variations of environmental variables with the trend. Sometimes, the autofitted theoretical variogram does not really capture the true nature of the empirical semivariogram. So proper exploration and analysis are needed to select the best variogram model. For this study, an open source data collected from California Soil Resource Lab1 is used to explain the problems when fitting a theoretical variogram. Five most commonly used variogram models: Linear, Gaussian, Exponential, Matern, and Spherical were fitted to the experimental semivariogram. Ordinary kriging methods were considered to evaluate the accuracy of the selected variograms through cross-validation. This study is beneficial for selecting an appropriate theoretical variogram model for environmental variables.Keywords: anisotropy, cross-validation, environmental variables, kriging, variogram models
Procedia PDF Downloads 33118688 Bridge Health Monitoring: A Review
Authors: Mohammad Bakhshandeh
Abstract:
Structural Health Monitoring (SHM) is a crucial and necessary practice that plays a vital role in ensuring the safety and integrity of critical structures, and in particular, bridges. The continuous monitoring of bridges for signs of damage or degradation through Bridge Health Monitoring (BHM) enables early detection of potential problems, allowing for prompt corrective action to be taken before significant damage occurs. Although all monitoring techniques aim to provide accurate and decisive information regarding the remaining useful life, safety, integrity, and serviceability of bridges, understanding the development and propagation of damage is vital for maintaining uninterrupted bridge operation. Over the years, extensive research has been conducted on BHM methods, and experts in the field have increasingly adopted new methodologies. In this article, we provide a comprehensive exploration of the various BHM approaches, including sensor-based, non-destructive testing (NDT), model-based, and artificial intelligence (AI)-based methods. We also discuss the challenges associated with BHM, including sensor placement and data acquisition, data analysis and interpretation, cost and complexity, and environmental effects, through an extensive review of relevant literature and research studies. Additionally, we examine potential solutions to these challenges and propose future research ideas to address critical gaps in BHM.Keywords: structural health monitoring (SHM), bridge health monitoring (BHM), sensor-based methods, machine-learning algorithms, and model-based techniques, sensor placement, data acquisition, data analysis
Procedia PDF Downloads 8818687 Mathematical Modeling of Activated Sludge Process: Identification and Optimization of Key Design Parameters
Authors: Ujwal Kishor Zore, Shankar Balajirao Kausley, Aniruddha Bhalchandra Pandit
Abstract:
There are some important design parameters of activated sludge process (ASP) for wastewater treatment and they must be optimally defined to have the optimized plant working. To know them, developing a mathematical model is a way out as it is nearly commensurate the real world works. In this study, a mathematical model was developed for ASP, solved under activated sludge model no 1 (ASM 1) conditions and MATLAB tool was used to solve the mathematical equations. For its real-life validation, the developed model was tested for the inputs from the municipal wastewater treatment plant and the results were quite promising. Additionally, the most cardinal assumptions required to design the treatment plant are discussed in this paper. With the need for computerization and digitalization surging in every aspect of engineering, this mathematical model developed might prove to be a boon to many biological wastewater treatment plants as now they can in no time know the design parameters which are required for a particular type of wastewater treatment.Keywords: waste water treatment, activated sludge process, mathematical modeling, optimization
Procedia PDF Downloads 14218686 Nuclear Near Misses and Their Learning for Healthcare
Authors: Nick Woodier, Iain Moppett
Abstract:
Background: It is estimated that one in ten patients admitted to hospital will suffer an adverse event in their care. While the majority of these will result in low harm, patients are being significantly harmed by the processes meant to help them. Healthcare, therefore, seeks to make improvements in patient safety by taking learning from other industries that are perceived to be more mature in their management of safety events. Of particular interest to healthcare are ‘near misses,’ those events that almost happened but for an intervention. Healthcare does not have any guidance as to how best to manage and learn from near misses to reduce the chances of harm to patients. The authors, as part of a larger study of near-miss management in healthcare, sought to learn from the UK nuclear sector to develop principles for how healthcare can identify, report, and learn from near misses to improve patient safety. The nuclear sector was chosen as an exemplar due to its status as an ultra-safe industry. Methods: A Grounded Theory (GT) methodology, augmented by a scoping review, was used. Data collection included interviews, scenario discussion, field notes, and the literature. The review protocol is accessible online. The GT aimed to develop theories about how nuclear manages near misses with a focus on defining them and clarifying how best to support reporting and analysis to extract learning. Near misses related to radiation release or exposure were focused on. Results: Eightnuclear interviews contributed to the GT across nuclear power, decommissioning, weapons, and propulsion. The scoping review identified 83 articles across a range of safety-critical industries, with only six focused on nuclear. The GT identified that nuclear has a particular focus on precursors and low-level events, with regulation supporting their management. Exploration of definitions led to the recognition of the importance of several interventions in a sequence of events, but that do not solely rely on humans as these cannot be assumed to be robust barriers. Regarding reporting and analysis, no consistent methods were identified, but for learning, the role of operating experience learning groups was identified as an exemplar. The safety culture across nuclear, however, was heard to vary, which undermined reporting of near misses and other safety events. Some parts of the industry described that their focus on near misses is new and that despite potential risks existing, progress to mitigate hazards is slow. Conclusions: Healthcare often sees ‘nuclear,’ as well as other ultra-safe industries such as ‘aviation,’ as homogenous. However, the findings here suggest significant differences in safety culture and maturity across various parts of the nuclear sector. Healthcare can take learning from some aspects of management of near misses in nuclear, such as how they are defined and how learning is shared through operating experience networks. However, healthcare also needs to recognise that variability exists across industries, and comparably, it may be more mature in some areas of safety.Keywords: culture, definitions, near miss, nuclear safety, patient safety
Procedia PDF Downloads 10318685 Gender Recognition with Deep Belief Networks
Authors: Xiaoqi Jia, Qing Zhu, Hao Zhang, Su Yang
Abstract:
A gender recognition system is able to tell the gender of the given person through a few of frontal facial images. An effective gender recognition approach enables to improve the performance of many other applications, including security monitoring, human-computer interaction, image or video retrieval and so on. In this paper, we present an effective method for gender classification task in frontal facial images based on deep belief networks (DBNs), which can pre-train model and improve accuracy a little bit. Our experiments have shown that the pre-training method with DBNs for gender classification task is feasible and achieves a little improvement of accuracy on FERET and CAS-PEAL-R1 facial datasets.Keywords: gender recognition, beep belief net-works, semi-supervised learning, greedy-layer wise RBMs
Procedia PDF Downloads 45118684 Using Q Methodology to Capture Attitudes about Academic Resilience in an Online Postgraduate Psychology Course
Authors: Eleanor F. Willard
Abstract:
The attrition rate on distance learning courses can be high. This research examines how online students often react when faced with poor results. Using q methodology, it was found that the emotional response level and the type of social support sought by students were key influences on their attitude to failure. As educational and psychological researchers, we are adept at measuring learning and achievement, but examining attitudes towards barriers to learning are not so well researched. The distance learning student has differing needs from onsite learners and, as the attrition rate is notoriously high in the online student population, examining learners’ attitude towards adversity and barriers is important. Self-report measures such as questionnaires are useful in terms of ascertaining levels of constructs such as resilience and academic confidence. Interviewing, too, can gain in depth detail of the opinions of such a population, but only in individuals. The aim of this research was to ascertain what the feelings and attitudes of online students were when faced with a setback. This was achieved using q methodology due to its use of both quantitative and qualitative methodology and its suitability for exploratory research. The emphasis with this methodology is the attitudes, not the individuals. The work was focused upon a population of distance learning students who attended a school on site for one week as part of their studies. They were engaged in a psychology masters conversion course and, as such, were graduate students. The Q sort had 30 items taken from the Academic Resilience Scale (ARS-30). The scale items represent three constructs; perseverance, reflecting (including adaptive help-seeking) and negative affect. These are widely acknowledged as being relevant concepts underpinning psychological resilience. The q sort was conducted with 19 students in total. This is done by participants arranging statement cards regarding how similar to themselves they believe each statement to be. This was done after reading a vignette describing an experience of academic failure. Commonalities and differences between the sorts from all participants are then analyzed in terms of correlations and response patterns. Following data collection, the participants' responses were initially analyzed and the key perspectives (factors) to emerge were labelled ‘persevering individuals’ and ‘emotional networkers’. The differences between the two perspectives centre around the level of emotion felt when faced with barriers and the extent that students enlist the help of others inside and outside of the university. The dominant factor to emerge from the sorts of ‘persevering individuals’ demonstrated that many distance learners are tenacious. However, for other students, the level of emotional and social support is pivotal in helping them complete their studies when facing adversity. This was demonstrated by the ‘emotional networkers’ perspective. This research forms a starting point for further work on engaging and retaining online students at university and can potentially provide insight into how universities can lower attrition rates on distance learning courses.Keywords: academic resilience, distance learning, online learning, q methodology
Procedia PDF Downloads 12618683 Exploring Social Emotional Learning in Diverse Academic Settings
Authors: Regina Rahimi, Delores Liston
Abstract:
The advent of COVID-19 has heightened awareness of the need for social emotional learning (SEL) throughout all educational contexts. Given this, schools (most often p12 settings) have begun to embrace practices for addressing social-emotional learning. While there is a growing body of research and literature on common practices of SEL, there is no ‘standard’ for its implementation. Our work proposed here recognizes there is no universal approach for addressing SEL and rather, seeks to explore how SEL can be approached in and through diverse contexts. We assert that left unrecognized and unaddressed by teachers, issues with social and emotional well-being profoundly negatively affect students’ academic performance and exacerbate teacher stress. They contribute to negative student-teacher relationships, poor classroom management outcomes, and compromised academic outcomes. Therefore, teachers and administrators have increasingly turned to developing pedagogical and classroom practices that support the social and emotional dimensions of students. Substantive quantitative evidence indicates professional development training to improve awareness and foster positive teacher-student relationships can provide a protective function for psycho-social outcomes and a promotive factor for improved learning outcomes for students. Our work aims to add to the growing body of literature on improving student well-being by providing a unique examination of SEL through a lens of diverse contexts. Methodology: This presentation hopes to present findings from an edited volume that will seek to highlight works that examine SEL practices in a variety of academic settings. The studies contained within the work represent varied forms of qualitative research. Conclusion: This work provides examples of SEL in higher education/postsecondary settings, a variety of P12 academic settings (public; private; rural, urban; charter, etc.), and international contexts. This work demonstrates the variety of ways educational institutions and educators have used SEL to address the needs of students, providing examples for others to adapt to their own diverse contexts. This presentation will bring together exemplar models of SEL in diverse practice settings.Keywords: social emotional learning, teachers, classrooms, diversity
Procedia PDF Downloads 6318682 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology
Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar
Abstract:
The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology
Procedia PDF Downloads 11318681 Geovisualisation for Defense Based on a Deep Learning Monocular Depth Reconstruction Approach
Authors: Daniel R. dos Santos, Mateus S. Maldonado, Estevão J. R. Batista
Abstract:
The military commanders increasingly dependent on spatial awareness, as knowing where enemy are, understanding how war battle scenarios change over time, and visualizing these trends in ways that offer insights for decision-making. Thanks to advancements in geospatial technologies and artificial intelligence algorithms, the commanders are now able to modernize military operations on a universal scale. Thus, geovisualisation has become an essential asset in the defense sector. It has become indispensable for better decisionmaking in dynamic/temporal scenarios, operation planning and management for the war field, situational awareness, effective planning, monitoring, and others. For example, a 3D visualization of war field data contributes to intelligence analysis, evaluation of postmission outcomes, and creation of predictive models to enhance decision-making and strategic planning capabilities. However, old-school visualization methods are slow, expensive, and unscalable. Despite modern technologies in generating 3D point clouds, such as LIDAR and stereo sensors, monocular depth values based on deep learning can offer a faster and more detailed view of the environment, transforming single images into visual information for valuable insights. We propose a dedicated monocular depth reconstruction approach via deep learning techniques for 3D geovisualisation of satellite images. It introduces scalability in terrain reconstruction and data visualization. First, a dataset with more than 7,000 satellite images and associated digital elevation model (DEM) is created. It is based on high resolution optical and radar imageries collected from Planet and Copernicus, on which we fuse highresolution topographic data obtained using technologies such as LiDAR and the associated geographic coordinates. Second, we developed an imagery-DEM fusion strategy that combine feature maps from two encoder-decoder networks. One network is trained with radar and optical bands, while the other is trained with DEM features to compute dense 3D depth. Finally, we constructed a benchmark with sparse depth annotations to facilitate future research. To demonstrate the proposed method's versatility, we evaluated its performance on no annotated satellite images and implemented an enclosed environment useful for Geovisualisation applications. The algorithms were developed in Python 3.0, employing open-source computing libraries, i.e., Open3D, TensorFlow, and Pythorch3D. The proposed method provides fast and accurate decision-making with GIS for localization of troops, position of the enemy, terrain and climate conditions. This analysis enhances situational consciousness, enabling commanders to fine-tune the strategies and distribute the resources proficiently.Keywords: depth, deep learning, geovisualisation, satellite images
Procedia PDF Downloads 318680 Conceptual Model for Knowledge Sharing Model in Creating Idea for Mobile Application
Authors: Hanafizan Hussain
Abstract:
This study shows that several projects will be conducted at the workshop in which using the conceptual model for knowledge sharing approach to create an idea for mobile application. The sharing idea has been done through the collaborative activity in which a group of different field sought to define the mobile application which will lead to new media approach of using social media platform. The collaborative activity will be provided and implemented in the form of one day workshop to determine the approach towards the theme given. The activity later will be continued for four weeks for the participant to prepare for the pitch day workshop. This paper shows the pitch of idea including the interface and prototype for the said products. The collaboration between the members with different field of study shows that social media influenced the knowledge sharing model and its creation or innovations. One of the projects supported a collaborative activity in which a group of young designers sought to define the knowledge sharing model of their ability in creating idea for mobile applications.Keywords: mobile application, collaborative activity, conceptual knowledge sharing model, social media platform
Procedia PDF Downloads 14118679 The Experiences of Secondary School Students in History Lessons in Distance and Formal Education
Authors: Osman Okumuş
Abstract:
The pandemic has significantly affected every aspect of life. Especially in recenttimes, as a result of this effect, we have come closer to technology. Distance education has taken the place of formal education rather than supporting formal education. Thiscreatednewexperiencesforbothteachersandstudents. This research focused on revealing the experiences of the same students in distance and formal education, especially in history lessons. In the study, which was designed as a case study, 20 students were interviewed through a semi-structured interview form prepared by the researcher. The results show that both learning environments provide students with important experiences. However, despite the fact that the students developed their digital competencies and experienced different learning environments, they focused on formal education in the name of socialization.Keywords: history lessons, distance education, pandemic., formal education
Procedia PDF Downloads 9818678 Emoji, the Language of the Future: An Analysis of the Usage and Understanding of Emoji across User-Groups
Authors: Sakshi Bhalla
Abstract:
On the one hand, given their seemingly simplistic, near universal usage and understanding, emoji are discarded as a potential step back in the evolution of communication. On the other, their effectiveness, pervasiveness, and adaptability across and within contexts are undeniable. In this study, the responses of 40 people (categorized by age) were recorded based on a uniform two-part questionnaire where they were required to a) identify the meaning of 15 emoji when placed in isolation, and b) interpret the meaning of the same 15 emoji when placed in a context-defining posting on Twitter. Their responses were studied on the basis of deviation from their responses that identified the emoji in isolation, as well as the originally intended meaning ascribed to the emoji. Based on an analysis of these results, it was discovered that each of the five age categories uses, understands and perceives emoji differently, which could be attributed to the degree of exposure they have undergone. For example, in the case of the youngest category (aged < 20), it was observed that they were the least accurate at correctly identifying emoji in isolation (~55%). Further, their proclivity to change their response with respect to the context was also the least (~31%). However, an analysis of each of their individual responses showed that these first-borns of social media seem to have reached a point where emojis no longer inspire their most literal meanings to them. The meaning and implication of these emoji have evolved to imply their context-derived meanings, even when placed in isolation. These trends carry forward meaningfully for the other four groups as well. In the case of the oldest category (aged > 35), however, the trends indicated inaccuracy and therefore, a higher incidence of a proclivity to change their responses. When studied in a continuum, the responses indicate that slowly and steadily, emoji are evolving from pictograms to ideograms. That is to suggest that they do not just indicate a one-to-one relation between a singular form and singular meaning. In fact, they communicate increasingly complicated ideas. This is much like the evolution of ancient hieroglyphics on papyrus reed or cuneiform on Sumerian clay tablets, which evolved from simple pictograms to progressively more complex ideograms. This evolution within communication is parallel to and contingent on the simultaneous evolution of communication. What’s astounding is the capacity of humans to leverage different platforms to facilitate such changes. Twiterese, as it is now called, is one of the instances where language is adapting to the demands of the digital world. That it does not have a spoken component, an ostensible grammar, and lacks standardization of use and meaning, as some might suggest, may seem like impediments in qualifying it as the 'language' of the digital world. However, that kind of a declarative remains a function of time, and time alone.Keywords: communication, emoji, language, Twitter
Procedia PDF Downloads 9418677 Applications of Evolutionary Optimization Methods in Reinforcement Learning
Authors: Rahul Paul, Kedar Nath Das
Abstract:
The paradigm of Reinforcement Learning (RL) has become prominent in training intelligent agents to make decisions in environments that are both dynamic and uncertain. The primary objective of RL is to optimize the policy of an agent in order to maximize the cumulative reward it receives throughout a given period. Nevertheless, the process of optimization presents notable difficulties as a result of the inherent trade-off between exploration and exploitation, the presence of extensive state-action spaces, and the intricate nature of the dynamics involved. Evolutionary Optimization Methods (EOMs) have garnered considerable attention as a supplementary approach to tackle these challenges, providing distinct capabilities for optimizing RL policies and value functions. The ongoing advancement of research in both RL and EOMs presents an opportunity for significant advancements in autonomous decision-making systems. The convergence of these two fields has the potential to have a transformative impact on various domains of artificial intelligence (AI) applications. This article highlights the considerable influence of EOMs in enhancing the capabilities of RL. Taking advantage of evolutionary principles enables RL algorithms to effectively traverse extensive action spaces and discover optimal solutions within intricate environments. Moreover, this paper emphasizes the practical implementations of EOMs in the field of RL, specifically in areas such as robotic control, autonomous systems, inventory problems, and multi-agent scenarios. The article highlights the utilization of EOMs in facilitating RL agents to effectively adapt, evolve, and uncover proficient strategies for complex tasks that may pose challenges for conventional RL approaches.Keywords: machine learning, reinforcement learning, loss function, optimization techniques, evolutionary optimization methods
Procedia PDF Downloads 7918676 Using Synonymy in Translation of Hemingway’s 'A Farewell to Arms' from English into Albanian
Authors: Miranda Enesi, Helena Grillo Mukli
Abstract:
The English word-stock is extremely rich in synonyms which can be largely accounted for by the abundant borrowing. Translation problems encountered by translators in general are usually ‘transfer problems’. They face more difficulties in the interpretation of meaning from the source language text than lexical differences between languages. The aim of the study is to inspect the various strategies used in translating from English into Albanian specific words in the ‘A Farwell to arms’ novel. For this purpose, examples translated from English into Albanian were examined. The Albanian equivalents have shown that various strategies were used in order to overcome the problem of rendering words and expressions into the target language. Employed strategies were synonymy, modulation, transposition, calque and word for word translation. In addition, this paper shows that the strategy of translating using synonymy is mostly used. In this paper, an attempt is made to examine the nature of contextual synonymy in order to investigate its problematic nature regarding translation. Types of synonymy are analyzed and then examples from English and Albanian versions are provided to examine the overlap between them.Keywords: equivalence, literal translation, paraphrasing, transfer problems, synonymy
Procedia PDF Downloads 17318675 Serious Game as a Performance Assessment Tool that Reduces Examination Anxiety
Authors: R. Ajith, Kamal Bijlani
Abstract:
Over the past few years, tremendous evolutions have happened in the educational discipline. Serious game, which is regarded as one of the most important inventions is being widely for learning purposes. Serious games can be used to negate the various drawbacks that the current evaluation and assessment methods have, like examination anxiety and the lack of proper feedback given to the learners. This paper proposes serious game as a tool for conducting evaluations and assessments. The examination anxiety faced by learners can be reduced, as they are provided with a game as an examination. The serious game also tracks learner’s actions, records them and provide feedback based on the predefined set of actions according to the course objectives. The appropriate feedback given to the learner will help in developmental activities in the learning process.Keywords: serious games, evaluation, performance assessment, examination anxiety, performance feedback
Procedia PDF Downloads 59318674 The Social Enterprise Model And Its Beneficiaries
Authors: Lorryn Williams
Abstract:
This study will explore how the introduction of the for-profit social enterprise model affects the real lives of the individuals and communities that this model aims to help in South Africa. The congruence between organisational need construction and the real needs of beneficiaries, and whether the adoption of a profit driven model, such as social entrepreneurship, supports or discards these needs is key to answering the former question. By making use of qualitative methods, the study aims to collect empirical evidence that either supports the social entrepreneurship approach when compared to other programs such as vocational training programs or rejects it as less beneficial. It is the objective of this research to provide an answer to the question of whether the social enterprise model of conducting charity leaves the beneficiaries of non-profit organisations in a generally better or worse off position. The study will specifically explore the underlying assumptions the social entrepreneurship model makes, since the assumptions made concerning the uplifting effects it has on its beneficiaries may produce either real or assumed change for beneficiaries. The meaning of social cohesion and social capital for these organisations, the construction of beneficiary dependence and independence, the consideration of formal and informal economies beneficiaries engage in, and the extent to which sustainability is used as a brand, will be investigated. Through engaging the relevant literature, experts in the field of non-profit donorship and need implementation, organisations who have both adopted social enterprise programs and not, and most importantly, the beneficiaries themselves, it will be possible to provide answers to questions this study aims to answer.Keywords: social enterprise, beneficiaries, profit driven model, non-profit organizations
Procedia PDF Downloads 14018673 An Effective Preventive Program of HIV/AIDS among Hill Tribe Youth, Thailand
Authors: Tawatchai Apidechkul
Abstract:
This operational research was conducted and divided into two phases: the first phase aimed to determine the risk behaviors used a cross-sectional study design, following by the community participatory research design to develop the HIV/AIDS preventive model among the Akha youths. The instruments were composed of completed questionnaires and assessment forms that were tested for validity and reliability before use. Study setting was Jor Pa Ka and Saen Suk Akha villages, Mae Chan District, Chiang Rai, Thailand. Study sample were the Akha youths lived in the villages. Means and chi-square test were used for the statistical testing. Results: Akha youths in the population mobilization villages live in agricultural families with low income and circumstance of narcotic drugs. The average age was 16 (50.00%), 51.52% Christian, 48.80% completed secondary school, 43.94% had annual family income of 30,000-40,000 baht. Among males, 54.54% drank, 39.39% smoked, 7.57% used amphetamine, first sexual intercourse reported at 14 years old, 50.00% had 2-5 partners, 62.50% had unprotected sex (no-condom). Reasons of unprotected sex included not being able to find condom, unawareness of need to use condoms, and dislike. 28.79% never been received STI related information, 6.06% had STI. Among females, 15.15% drank, 28.79% had sexual intercourse and had first sexual intercourse less than 15 year old. 40.00% unprotected sex (no-condom), 10.61% never been received STI related information, and 4.54% had STI. The HIV/AIDS preventive model contained two components. Peer groups among the youths were built around interests in sports. Improving knowledge would empower their capability and lead to choices that would result in HIV/AIDS prevention. The empowering model consisted of 4 courses: a. human reproductive system and its hygiene, b. risk-avoid skills, family planning, and counseling techniques, c. HIV/AIDS and other STIs, d. drugs and related laws and regulations. The results of the activities found that youths had a greater of knowledge and attitude levels for HIV/AIDS prevention with statistical significance (χ2-τεστ= 12.87, p-value= 0.032 and χ2-τεστ= 9.31, p-value<0.001 respectively). A continuous and initiative youths capability development program is the appropriate process to reduce the spread of HIV/AIDS in youths, particularly in the population who have the specific of language and culture.Keywords: AIV/AIDS, preventive program, effective, hill tribe
Procedia PDF Downloads 36918672 On Four Models of a Three Server Queue with Optional Server Vacations
Authors: Kailash C. Madan
Abstract:
We study four models of a three server queueing system with Bernoulli schedule optional server vacations. Customers arriving at the system one by one in a Poisson process are provided identical exponential service by three parallel servers according to a first-come, first served queue discipline. In model A, all three servers may be allowed a vacation at one time, in Model B at the most two of the three servers may be allowed a vacation at one time, in model C at the most one server is allowed a vacation, and in model D no server is allowed a vacation. We study steady the state behavior of the four models and obtain steady state probability generating functions for the queue size at a random point of time for all states of the system. In model D, a known result for a three server queueing system without server vacations is derived.Keywords: a three server queue, Bernoulli schedule server vacations, queue size distribution at a random epoch, steady state
Procedia PDF Downloads 29418671 A Novel Algorithm for Parsing IFC Models
Authors: Raninder Kaur Dhillon, Mayur Jethwa, Hardeep Singh Rai
Abstract:
Information technology has made a pivotal progress across disparate disciplines, one of which is AEC (Architecture, Engineering and Construction) industry. CAD is a form of computer-aided building modulation that architects, engineers and contractors use to create and view two- and three-dimensional models. The AEC industry also uses building information modeling (BIM), a newer computerized modeling system that can create four-dimensional models; this software can greatly increase productivity in the AEC industry. BIM models generate open source IFC (Industry Foundation Classes) files which aim for interoperability for exchanging information throughout the project lifecycle among various disciplines. The methods developed in previous studies require either an IFC schema or MVD and software applications, such as an IFC model server or a Building Information Modeling (BIM) authoring tool, to extract a partial or complete IFC instance model. This paper proposes an efficient algorithm for extracting a partial and total model from an Industry Foundation Classes (IFC) instance model without an IFC schema or a complete IFC model view definition (MVD). Procedia PDF Downloads 298