Search results for: language & communication
1653 Advanced Data Visualization Techniques for Effective Decision-making in Oil and Gas Exploration and Production
Authors: Deepak Singh, Rail Kuliev
Abstract:
This research article explores the significance of advanced data visualization techniques in enhancing decision-making processes within the oil and gas exploration and production domain. With the oil and gas industry facing numerous challenges, effective interpretation and analysis of vast and diverse datasets are crucial for optimizing exploration strategies, production operations, and risk assessment. The article highlights the importance of data visualization in managing big data, aiding the decision-making process, and facilitating communication with stakeholders. Various advanced data visualization techniques, including 3D visualization, augmented reality (AR), virtual reality (VR), interactive dashboards, and geospatial visualization, are discussed in detail, showcasing their applications and benefits in the oil and gas sector. The article presents case studies demonstrating the successful use of these techniques in optimizing well placement, real-time operations monitoring, and virtual reality training. Additionally, the article addresses the challenges of data integration and scalability, emphasizing the need for future developments in AI-driven visualization. In conclusion, this research emphasizes the immense potential of advanced data visualization in revolutionizing decision-making processes, fostering data-driven strategies, and promoting sustainable growth and improved operational efficiency within the oil and gas exploration and production industry.Keywords: augmented reality (AR), virtual reality (VR), interactive dashboards, real-time operations monitoring
Procedia PDF Downloads 841652 Constructions of Linear and Robust Codes Based on Wavelet Decompositions
Authors: Alla Levina, Sergey Taranov
Abstract:
The classical approach to the providing noise immunity and integrity of information that process in computing devices and communication channels is to use linear codes. Linear codes have fast and efficient algorithms of encoding and decoding information, but this codes concentrate their detect and correct abilities in certain error configurations. To protect against any configuration of errors at predetermined probability can robust codes. This is accomplished by the use of perfect nonlinear and almost perfect nonlinear functions to calculate the code redundancy. The paper presents the error-correcting coding scheme using biorthogonal wavelet transform. Wavelet transform applied in various fields of science. Some of the wavelet applications are cleaning of signal from noise, data compression, spectral analysis of the signal components. The article suggests methods for constructing linear codes based on wavelet decomposition. For developed constructions we build generator and check matrix that contain the scaling function coefficients of wavelet. Based on linear wavelet codes we develop robust codes that provide uniform protection against all errors. In article we propose two constructions of robust code. The first class of robust code is based on multiplicative inverse in finite field. In the second robust code construction the redundancy part is a cube of information part. Also, this paper investigates the characteristics of proposed robust and linear codes.Keywords: robust code, linear code, wavelet decomposition, scaling function, error masking probability
Procedia PDF Downloads 4881651 Impact of Behavioral Biases on Indian Investors: Case Analysis of a Mutual Fund Investment Company
Authors: Priyal Motwani, Garvit Goel
Abstract:
In this study, we have studied and analysed the transaction data of investors of a mutual fund investment company based in India. Based on the data available, we have identified the top four biases that affect the investors of the emerging market economies through regression analysis and three uniquely defined ratios. We found that the four most prominent biases that affected the investment making decisions in India are– Chauffer Knowledge, investors tend to make ambitious decisions about sectors they know little about; Bandwagon effect – the response of the market indices to macroeconomic events are more profound and seem to last longer compared to western markets; base-rate neglect – judgement about stocks are too much based on the most recent development ignoring the long-term fundamentals of the stock; availability bias – lack of proper communication channels of market information lead people to be too reliant on limited information they already have. After segregating the investors into six groups, the results have further been studied to identify a correlation among the demographics, gender and unique cultural identity of the derived groups and the corresponding prevalent biases. On the basis of the results obtained from the derived groups, our study recommends six methods, specific to each group, to educate the investors about the prevalent biases and their role in investment decision making.Keywords: Bandwagon effect, behavioural biases, Chauffeur knowledge, demographics, investor literacy, mutual funds
Procedia PDF Downloads 2301650 An Analysis on the Hidden Transcripts and Power: A Cultural Study on Confliction between Mother and Daughter-in-Law in Contemporary Chinese Television Dramas
Authors: Xiaohui Pan
Abstract:
As the most influential media for the dissemination of Chinese culture, films and television dramas have played cognitive orientation in guiding young audience to understand its cultural value. Taking a retrospective overview of the Chinese domestic film and television dramas in the last decade, it is tangible to notice that Westernization has become irresistible force in the presentation of Chinese youth culture, such as the rise of sensibility, publicity of subjectivity, and the resistance to mainstream discourse. However, the process of deconstruction and transition of these film and television works on Western youth culture brought about more comprehensive conflicts and integration rather than providing a panoramic interpretation to young Chinese. Issues of tradition and modernization, oriental and Western, and serious thinking and the spirit of entertainment overwhelmed those Chinese works. This study attempts to examine the mechanism of young Chinese’s resistance, compromise and re-construction in their marriages during the dynamic cultural intergration between traditional Chinese culture and Western culture. To investigate such a mechanism, this study analyzed four Chinese television dramas themed on family ethics to reveal the conflictions between two generations, mother-in-law and daughter-in-law, aiming to identify their strategies of their struggles. Incorporating the theory of Scott's weapons of the weak, this study examines the dynamic model of the struggles content analysis on their hidden language and the power. The finding shows that young Chinese identified their self-awakening during the resistance. The study also finds out that the external factors might have the functions of switching the power from the strong end to the weak end. The finding of this study can provide useful insights for researchers in this area and for those in the process of exploring cultural integration issues.Keywords: intergration, integration, resistance, youth culture
Procedia PDF Downloads 4251649 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities
Authors: Nazli Hardy
Abstract:
Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.Keywords: Internet of Things (IoT), authentication, protocols, survey
Procedia PDF Downloads 2991648 Sensitivity Parameter Analysis of Negative Moment Dynamic Load Allowance of Continuous T-Girder Bridge
Authors: Fan Yang, Ye-Lu Wang, Yang Zhao
Abstract:
The dynamic load allowance, as an application result of the vehicle-bridge coupled vibration theory, is an important parameter for bridge design and evaluation. Based on the coupled vehicle-bridge vibration theory, the current work establishes a full girder model of a dynamic load allowance, selects a planar five-degree-of-freedom three-axis vehicle model, solves the coupled vehicle-bridge dynamic response using the APDL language in the spatial finite element program ANSYS, selects the pivot point 2 sections as the representative of the negative moment section, and analyzes the effects of parameters such as travel speed, unevenness, vehicle frequency, span diameter, span number and forced displacement of the support on the negative moment dynamic load allowance through orthogonal tests. The influence of parameters such as vehicle speed, unevenness, vehicle frequency, span diameter, span number, and forced displacement of the support on the negative moment dynamic load allowance is analyzed by orthogonal tests, and the influence law of each influencing parameter is summarized. It is found that the effects of vehicle frequency, unevenness, and speed on the negative moment dynamic load allowance are significant, among which vehicle frequency has the greatest effect on the negative moment dynamic load allowance; the effects of span number and span diameter on the negative moment dynamic load allowance are relatively small; the effects of forced displacement of the support on the negative moment dynamic load allowance are negligible.Keywords: continuous T-girder bridge, dynamic load allowance, sensitivity analysis, vehicle-bridge coupling
Procedia PDF Downloads 1571647 A Discourse Completion Test Analysis of Email Request Strategies as Used by Tunisian Postgraduate Students
Authors: Imen Aribi Ben Amor
Abstract:
The aim of the present study is to analyze the performance of requests in emails among a group of Tunisian postgraduate students. It also seeks to determine the influence of the social factors on the participants’ requests performance. For this purpose, the data were collected using a discourse completion test (DCT). Accordingly, 42 Tunisian postgraduate students were asked to respond in English to eight different situations in which they carried out the speech act of request in emails. The data were analyzed based on the degree of directness. A detailed analysis of the head acts found in the DCT revealed that Tunisian Postgraduate students use a varied repertoire of request strategies (direct, conventionally indirect and non-conventionally indirect) but at the same time rely heavily on direct request strategies. They tended to address their requestees directly except for distant superiors. DCT results suggest that the participants are to some extent aware of the influence of the ranking of imposition and social distance but fail to acknowledge the weight of social power when performing requests in emails. The preference of the participants to use direct strategies may be the result of the effect of Tunisian culture and the negative transfer of Tunisian communicative strategies. Accordingly, this study suggests some pedagogical implications and suggestions for Tunisian EFL (English as a Foreign Language) instructors. They are required to pay closer attention to the pragmalinguistic nuances of the ways in which requests in emails are realized. Teachers can also help students understand academic email etiquettes by explicitly explaining what they expect in the student email. Thus, EFL teachers and syllabus designers should devote more attention to developing EFL learners’ pragmatic competence through teaching L2 pragmatics.Keywords: directness, ranking of imposition, request strategies, social distance, social power
Procedia PDF Downloads 2301646 Optimizing Parallel Computing Systems: A Java-Based Approach to Modeling and Performance Analysis
Authors: Maher Ali Rusho, Sudipta Halder
Abstract:
The purpose of the study is to develop optimal solutions for models of parallel computing systems using the Java language. During the study, programmes were written for the examined models of parallel computing systems. The result of the parallel sorting code is the output of a sorted array of random numbers. When processing data in parallel, the time spent on processing and the first elements of the list of squared numbers are displayed. When processing requests asynchronously, processing completion messages are displayed for each task with a slight delay. The main results include the development of optimisation methods for algorithms and processes, such as the division of tasks into subtasks, the use of non-blocking algorithms, effective memory management, and load balancing, as well as the construction of diagrams and comparison of these methods by characteristics, including descriptions, implementation examples, and advantages. In addition, various specialised libraries were analysed to improve the performance and scalability of the models. The results of the work performed showed a substantial improvement in response time, bandwidth, and resource efficiency in parallel computing systems. Scalability and load analysis assessments were conducted, demonstrating how the system responds to an increase in data volume or the number of threads. Profiling tools were used to analyse performance in detail and identify bottlenecks in models, which improved the architecture and implementation of parallel computing systems. The obtained results emphasise the importance of choosing the right methods and tools for optimising parallel computing systems, which can substantially improve their performance and efficiency.Keywords: algorithm optimisation, memory management, load balancing, performance profiling, asynchronous programming.
Procedia PDF Downloads 101645 Comparative Evaluation of Accuracy of Selected Machine Learning Classification Techniques for Diagnosis of Cancer: A Data Mining Approach
Authors: Rajvir Kaur, Jeewani Anupama Ginige
Abstract:
With recent trends in Big Data and advancements in Information and Communication Technologies, the healthcare industry is at the stage of its transition from clinician oriented to technology oriented. Many people around the world die of cancer because the diagnosis of disease was not done at an early stage. Nowadays, the computational methods in the form of Machine Learning (ML) are used to develop automated decision support systems that can diagnose cancer with high confidence in a timely manner. This paper aims to carry out the comparative evaluation of a selected set of ML classifiers on two existing datasets: breast cancer and cervical cancer. The ML classifiers compared in this study are Decision Tree (DT), Support Vector Machine (SVM), k-Nearest Neighbor (k-NN), Logistic Regression, Ensemble (Bagged Tree) and Artificial Neural Networks (ANN). The evaluation is carried out based on standard evaluation metrics Precision (P), Recall (R), F1-score and Accuracy. The experimental results based on the evaluation metrics show that ANN showed the highest-level accuracy (99.4%) when tested with breast cancer dataset. On the other hand, when these ML classifiers are tested with the cervical cancer dataset, Ensemble (Bagged Tree) technique gave better accuracy (93.1%) in comparison to other classifiers.Keywords: artificial neural networks, breast cancer, classifiers, cervical cancer, f-score, machine learning, precision, recall
Procedia PDF Downloads 2751644 Performance Comparison of Resource Allocation without Feedback in Wireless Body Area Networks by Various Pseudo Orthogonal Sequences
Authors: Ojin Kwon, Yong-Jin Yoon, Liu Xin, Zhang Hongbao
Abstract:
Wireless Body Area Network (WBAN) is a short-range wireless communication around human body for various applications such as wearable devices, entertainment, military, and especially medical devices. WBAN attracts the attention of continuous health monitoring system including diagnostic procedure, early detection of abnormal conditions, and prevention of emergency situations. Compared to cellular network, WBAN system is more difficult to control inter- and inner-cell interference due to the limited power, limited calculation capability, mobility of patient, and non-cooperation among WBANs. In this paper, we compare the performance of resource allocation scheme based on several Pseudo Orthogonal Codewords (POCs) to mitigate inter-WBAN interference. Previously, the POCs are widely exploited for a protocol sequence and optical orthogonal code. Each POCs have different properties of auto- and cross-correlation and spectral efficiency according to its construction of POCs. To identify different WBANs, several different pseudo orthogonal patterns based on POCs exploits for resource allocation of WBANs. By simulating these pseudo orthogonal resource allocations of WBANs on MATLAB, we obtain the performance of WBANs according to different POCs and can analyze and evaluate the suitability of POCs for the resource allocation in the WBANs system.Keywords: wireless body area network, body sensor network, resource allocation without feedback, interference mitigation, pseudo orthogonal pattern
Procedia PDF Downloads 3531643 An Investigation of the Science Process Skills of 48-66 Months Old Children
Authors: Nilüfer Kuru, Berrin Akman
Abstract:
In this study, science process skills of children with ages varying between 48-months and 66-months are analyzed. Science process skills of children are investigated in terms of factors including gender of children, attendance of children to the previous educational institution and duration of their attendance, educational background of their parents, ages of children and teachers, professional experience of teachers, educational background, and department of graduation of teachers, type of pre-school education institution of teachers and children. Sample of research consists of 250 children aged between 48-months and 66-months who attend state and private kindergartens under the Ministry of National Education, nursery classes of elementary schools and kindergartens of establishments in central districts of Ankara and 50 teachers who serve in these children’s classes. Science Observation Form, reached from the website of Alaska Department of Education & Early, are analyzed in terms of language, content, construct validity, and reliability by the researchers. Additionally, Personal Information Form is also developed by the researchers. Data obtained in the study are analyzed with SPSS 16.0 package program to obtain percentage and frequency, Kruskal Wallis H-test, and Mann- Whitney U test, which are one of the non-parametric tests, are used. Within the context of this study it has been seen that independent variables of age, type of school attending and status of attendance to pre-school education, educational background of children’s father are meaningful expositive in gaining science process skills for children. It has been seen that period of service of teachers, duration of attendance to pre-school education for children, gender of children and educational background of children’s mother are not meaningful expositive in gaining science process skills for children.Keywords: preschool, science process skills, early childhood education, science
Procedia PDF Downloads 3661642 Adaptation and Habituation to new Complete Dentures
Authors: Mohamed Khaled Ahmed Azzam
Abstract:
Complete dentures, a non biological appliance, were and are still used to replace missing teeth and surrounding structures. Its main objectives are esthetics, speech, function and psychological state improvement. Dentists must realize that, just as dentate patients vary in their dental treatment complexity; edentulous patients also vary in the difficulty of their treatment plan. There are two main problems facing the removable Prosthodontist which harden his/her task how to please his patient with their new dentures being: Denture construction which however its fabrication is at the highest standards still is an unpleasant experience to all patients in the beginning and improves by time. This varies from one to several years according to the patient’s attitude, age, gender, socio-economical level and culture. The second problem of edentulous patients is both physical and psychological. Good interview, communication and note how patients present themselves for the concerns of their appearance, overall attitude and expectations concerning treatment is very important physically. On the psychological aspect patients have great difficulty to cope with new dentures to the extent of not using them at all. Hence their mind preparation should be commenced from day one by more than one method. This had a great impact on the acceptance which led to habituation to their dentures and patients were appreciative and pleased. In conclusion to successfully treat edentulous patients a great deal of information is required to complete a proper diagnosis, including patient mental attitude, past and present medical and dental conditions, and extra and intra-oral examinations. In addition to the clinical experience and skill of the whole dental team.Keywords: complete dentures, edentulous patients, management of denture, psychological mind preparation
Procedia PDF Downloads 2511641 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks
Authors: Walid Abdallah, Noureddine Boudriga
Abstract:
Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based
Procedia PDF Downloads 6581640 Non-Physician Medical Worker Experience during the COVID-19 Pandemic
Authors: William Mahony, L. Jacqueline Hirth, Richard Rupp, Sandra Gonzalez, Roger Zoorob
Abstract:
Background: The impact of the COVID-19 pandemic on physicians has been considered by many researchers, but less is known about non-physician healthcare workers. The aim of this study is to examine the association of COVID-19 safety training and communication with stress. Methods: A 91-item online survey was distributed, starting January 2, 2021, to non-physician healthcare workers, including physician assistants, nurse practitioners, and medical assistants (MAs) in the United States through email and social media. A $1 donation was made to the Red Cross for each completed survey. The survey consisted of demographics, occupational questions, and perceived stress (perceived stress scale, PSS). Items on the PSS were combined for an overall score and categorized according to the severity of perceived stress. Chi-square tests were performed for bivariate analyses of categorical variables. Results: Of the 284 participants consenting to complete the survey, 197 participants completed the full survey. MAs made up most of the sample at 79%. Among all respondents, 47% had moderate PSS scores (scored between 14 and 26), and 51% had severe PSS scores (scored between 27 and 40). Unvaccinated participants reported statistically significantly lower levels of perceived stress (p = 0.002). Performing tasks outside of typical job responsibilities was not associated with PSS scores (p = .667). Discussion: Non-physician healthcare workers demonstrated a high level of perceived stress overall. The association between vaccination status and perceived stress should be examined in order to evaluate whether vaccination levels could be improved with further education about the virus and associated risks.Keywords: COVID-19, SARS-Cov-2, nursing, public health
Procedia PDF Downloads 1741639 The Concerns and Recommendations of Informal and Professional Caregivers for COVID-19 Policy for Homecare and Long-Term Care For People with Dementia: A Qualitative Study
Authors: Hanneke J. A. Smaling, Mandy Visser
Abstract:
One way to reduce the risk of COVID-19 infection is by preventing close interpersonal contact with distancing measures. These social distancing measures presented challenges to the health and wellbeing of people with dementia and their informal and professional caregivers. This study describes the concerns and recommendations of informal and professional caregivers for COVID-19 policy for home care and long-term care for people with dementia during the first and second COVID-19 wave in the Netherlands. In this qualitative interview study, 20 informal caregivers and 20 professional caregivers from home care services and long-term care participated. Interviews were analyzed using an inductive thematic analysis approach. Both informal and professional caregivers worried about getting infected or infecting others with COVID-19, the consequences of the distancing measures, and quality of care. There was a general agreement that policy in the second wave was better informed compared to the first wave. At an organizational level, the policy was remarkably flexible. Recommendations were given for dementia care (need to offer meaningful activities, improve the organization of care, more support for informal caregivers), policy (national vs. locally organization, social isolation measures, visitor policy), and communication. Our study contributes to the foundation of future care decisions by (inter)national policymakers, politicians, and healthcare organizations during the course of the COVID-19 pandemic, underlining the need for balance between safety and autonomy for people with dementia.Keywords: covid-19, dementia, home care, long-term care, policy
Procedia PDF Downloads 1341638 Influence of Information Technology on Financial Management Practices in Secondary School: For National Transormation in Zone C Senatorional District of Benue State
Authors: Eru Ihie Joel
Abstract:
This study was carried out to investigate the influence of information technology on financial management practice in secondary schools for transformation. In Zone C Senatorial District of Benue state. The study answered four research questions and tested four hypotheses. Related literature was reviewed to show the gap to be filled in the study. The population was 196 respondents made up of principals and finance clerks of secondary schools. The descriptive survey was adopted for the study. A structured 20 item questionnaire (IITFMPSQ) was constructed and used to collect date for the study. Data obtained were analyzed using descriptive and inferential statistic. Mean and standard deviation were used to analyze the research question while the chi- square (x2) test of goodness of fit was used to test the hypothesis. The major findings revealed that the use of computer system significantly influences budgeting in secondary schools in zone senatorial district of Benue State for transformation. It was also established that the use of internet facilities influences the funding of secondary schools for transformation in the zone. Based on the findings of the study, it was recommended among other things that administrators and teachers in schools should be trained to make effective use of the computer in budgeting so as to facilitate delegations, control, evaluation, accountability for transformation. It was further suggested that the study be replicated on the effective use of information communication teaching (ITC) in teaching and learning in secondary school for transformation.Keywords: influence, finance, management, technology
Procedia PDF Downloads 3621637 Thermal Vacuum Chamber Test Result for CubeSat Transmitter
Authors: Fitri D. Jaswar, Tharek A. Rahman, Yasser A. Ahmad
Abstract:
CubeSat in low earth orbit (LEO) mainly uses ultra high frequency (UHF) transmitter with fixed radio frequency (RF) output power to download the telemetry and the payload data. The transmitter consumes large amount of electrical energy during the transmission considering the limited satellite size of a CubeSat. A transmitter with power control ability is designed to achieve optimize the signal to noise ratio (SNR) and efficient power consumption. In this paper, the thermal vacuum chamber (TVAC) test is performed to validate the performance of the UHF band transmitter with power control capability. The TVAC is used to simulate the satellite condition in the outer space environment. The TVAC test was conducted at the Laboratory of Spacecraft Environment Interaction Engineering, Kyushu Institute of Technology, Japan. The TVAC test used 4 thermal cycles starting from +60°C to -20°C for the temperature setting. The pressure condition inside chamber was less than 10-5Pa. During the test, the UHF transmitter is integrated in a CubeSat configuration with other CubeSat subsystem such as on board computer (OBC), power module, and satellite structure. The system is validated and verified through its performance in terms of its frequency stability and the RF output power. The UHF band transmitter output power is tested from 0.5W to 2W according the satellite mode of operations and the satellite power limitations. The frequency stability is measured and the performance obtained is less than 2 ppm in the tested operating temperature range. The test demonstrates the RF output power is adjustable in a thermal vacuum condition.Keywords: communication system, CubeSat, SNR, UHF transmitter
Procedia PDF Downloads 2631636 Risk Management in Industrial Supervision Projects
Authors: Érick Aragão Ribeiro, George André Pereira Thé, José Marques Soares
Abstract:
Several problems in industrial supervision software development projects may lead to the delay or cancellation of projects. These problems can be avoided or contained by using identification methods, analysis and control of risks. These procedures can give an overview of the possible problems that can happen in the projects and what are the immediate solutions. Therefore, we propose a risk management method applied to the teaching and development of industrial supervision software. The method is developed through a literature review and previous projects can be divided into phases of management and have basic features that are validated with experimental research carried out by mechatronics engineering students and professionals. The management is conducted through the stages of identification, analysis, planning, monitoring, control and communication of risks. Programmers use a method of prioritizing risks considering the gravity and the possibility of occurrence of the risk. The outputs of the method indicate which risks occurred or are about to happen. The first results indicate which risks occur at different stages of the project and what risks have a high probability of occurring. The results show the efficiency of the proposed method compared to other methods, showing the improvement of software quality and leading developers in their decisions. This new way of developing supervision software helps students identify design problems, evaluate software developed and propose effective solutions. We conclude that the risk management optimizes the development of the industrial process control software and provides higher quality to the product.Keywords: supervision software, risk management, industrial supervision, project management
Procedia PDF Downloads 3541635 Transmission Line Matrix (TLM) Modelling of Microstrip Circular Antenna
Authors: Jugoslav Jokovic, Tijana Dimitrijevic, Nebojsa Doncov
Abstract:
The goal of this paper is to investigate the possibilities and effectiveness of the TLM (Transmission Line Matrix) method for modelling of up-to-date microstrip antennas with circular geometry that have significant application in modern wireless communication systems. The coaxially fed microstrip antenna configurations with circular patch are analyzed by using the in-house 3DTLMcyl_cw solver based on computational electromagnetic TLM method adapted to the cylindrical grid and enhanced with the compact wire model. Opposed to the widely used rectangular TLM mesh, where a staircase approximation has to be used to describe curved boundaries, precise modelling of circular boundaries can be accomplished in the cylindrical grid irrespective of the mesh resolution. Using the compact wire model incorporated in cylindrical mesh, it is possible to model coaxial feed and include the influence of the real excitation in the antenna model. The conventional and inverted configuration of a coaxially fed circular patch antenna are considered, comparing the resonances obtained using TLM cylindrical model with results reached by the corresponding model in a rectangular grid as well as with experimental ones. Bearing in mind that accuracy of simulated results depends on a relevantly created model, besides structure geometry and dimensions, it is important to consider additional modelling issues, regarding appropriate mesh resolution and a relevant extension of a mesh around the considered structure that would provide convergence of the results.Keywords: computational electromagnetic, coaxial feed, microstrip antenna, TLM modelling
Procedia PDF Downloads 2791634 Developmental Psycholinguistic Approach to Conversational Skills - A Continuum of the Sensitivity to Gricean Maxims
Authors: Zsuzsanna Schnell, Francesca Ervas
Abstract:
Background: the experimental pragmatic study confirms a basic tenet in the Relevance theoretical views in language philosophy. It draws up a developmental trajectory of the maxims, revealing the cognitive difficulty of their interpretation, their relative place to each other, and the order they may follow in development. A central claim of the present research is that social-cognitive skills play a significant role in inferential meaning construction. Children passing the False Belief Test are significantly more successful in tasks measuring the recognition of the infringement of conversational maxims. Aims and method: Preschoolers’ conversational skills and pragmatic competence is examined in view of their mentalization skills. In doing so it use a measure of linguistic tasks, containing 5 short scenarios for each Gricean maxim. it measure preschoolers’ ToM performance with a first- and a second order ToM task and compare participants’ ability to recognize the infringement of the Gricean maxims in view of their social cognitive skills. Results: Findings suggest that Theory of Mind has a predictive force of 75% concerning the ability to follow Gricean maxims efficiently. ToM proved to be a significant factor in predicting the group’s performance and success rates in 3 out of 4 maxim infringement recognition tasks: in the Quantity, Relevance and Manner conditions, but not in the Quality trial. Conclusions: the results confirm that children’s communicative competence in social contexts requires the development of higher-order social-cognitive reasoning, and reveal the cognitive effort needed for the recognition of the infringement of each maxim, yielding a continuum of their cognitive difficulty and trajectory of development.Keywords: maxim infringement recognition, social cognition, Gricean maxims, developmental pragmatics
Procedia PDF Downloads 51633 Resource Orchestration Based on Two-Sides Scheduling in Computing Network Control Sytems
Authors: Li Guo, Jianhong Wang, Dian Huang, Shengzhong Feng
Abstract:
Computing networks as a new network architecture has shown great promise in boosting the utilization of different resources, such as computing, caching, and communications. To maximise the efficiency of resource orchestration in computing network control systems (CNCSs), this work proposes a dynamic orchestration strategy of a different resource based on task requirements from computing power requestors (CPRs). Specifically, computing power providers (CPPs) in CNCSs could share information with each other through communication channels on the basis of blockchain technology, especially their current idle resources. This dynamic process is modeled as a cooperative game in which CPPs have the same target of maximising long-term rewards by improving the resource utilization ratio. Meanwhile, the task requirements from CPRs, including size, deadline, and calculation, are simultaneously considered in this paper. According to task requirements, the proposed orchestration strategy could schedule the best-fitting resource in CNCSs, achieving the maximum long-term rewards of CPPs and the best quality of experience (QoE) of CRRs at the same time. Based on the EdgeCloudSim simulation platform, the efficiency of the proposed strategy is achieved from both sides of CPRs and CPPs. Besides, experimental results show that the proposed strategy outperforms the other comparisons in all cases.Keywords: computing network control systems, resource orchestration, dynamic scheduling, blockchain, cooperative game
Procedia PDF Downloads 1141632 From Being to Becoming: Emancipation and Empowerment in the African Diaspora
Authors: R. Vidhya
Abstract:
Diasporic writings present a comprehensive view of social, cultural and psychological dualities of immigrants. Isolation and the strong feelings of insecurity and inferiority due to constant marginalization coupled with a nostalgia for their motherland, its customs, culture, language, food and people which keep haunting the minds of immigrants are the major themes that are handled by diasporic writers. In the African diaspora, more than the men, it is the women who face the brunt and burden of the triple jeopardy – the racial, class and gender discrimination. Women writers from Africa have successfully sketched the plight of African women in the diaspora. Buchi Emecheta, a Nigerian woman writer deftly portrays the African Diaspora in her novels. She skillfully weaves her stories with her own experiences as an immigrant in the United Kingdom. She portrays the immigrant life and psychology through numerous themes like exile, geographical shift of locations, transactions of culture, political instability and the dilemma of moral and religious ideologies in her diasporic novels Second-class Citizen, Gwendolyn and Kehinde. The contemporary Nigerian woman writer Chimamanda Ngozi Adichie has also dexterously depicted the diasporic dilemma of her protagonist Ifemelu in Americannah, who initially has the experience of a despondent and a downcast in the United States of America. This paper aims to analyse the diasporic sentiments and sensibilities of the Nigerian Igbo women writers Buchi Emecheta and Chimamanda Ngozi Adichie whose women characters finally find emancipation and empowerment in the African Diaspora. This study is based on the Africana Womanist Literary theory propounded by Clenora Hudson-Weems.Keywords: African Diaspora, Nigerian women writers, Buchi Emecheta, Chimamanda Ngozi Adichie, emancipation, empowerment
Procedia PDF Downloads 2861631 Interdisciplinarity as a Regular Pedagogical Practice in the Classrooms
Authors: Catarina Maria Neto Da Cruz, Ana Maria Reis D’Azevedo Breda
Abstract:
The world is changing and, consequently, the young people need more sophisticated tools and skills to lead with the world’s complexity. The Organisation for Economic Co-operation and Development Learning Framework 2030 suggests an interdisciplinary knowledge as a principle for the future of education systems. In the curricular document Portuguese about the profile of students leaving compulsory education, the critical thinking and creative thinking are pointed out as skills to be developed, which imply the interconnection of different knowledge, applying it in different contexts and learning areas. Unlike primary school teachers, teachers specialized in a specific area lead to more difficulties in the implementation of interdisciplinary approaches in the classrooms and, despite the effort, the interdisciplinarity is not a common practice in schools. Statement like "Mathematics is everywhere" is unquestionable, however, many math teachers show difficulties in presenting such evidence in their classes. Mathematical modelling and problems in real contexts are promising in the development of interdisciplinary pedagogical practices and in Portugal there is a continuous training offer to contribute to the development of teachers in terms of their pedagogical approaches. But when teachers find themselves in the classroom, without a support, do they feel able to implement interdisciplinary practices? In this communication we will try to approach this issue through a case study involving a group of Mathematics teachers, who attended a training aimed at stimulating interdisciplinary practices in real contexts, namely related to the COVID-19 pandemic.Keywords: education, mathematics, teacher training, interdisciplinarity
Procedia PDF Downloads 921630 Understanding the Impact of Ambience, Acoustics, and Chroma on User Experience through Different Mediums and Study Scenarios
Authors: Mushty Srividya
Abstract:
Humans that inhabit a designed space consciously or unconsciously accept the spaces which have an impact on how they perceive, feel and act accordingly. Spaces that are more interactive and communicative with the human senses become more interesting. Interaction in architecture is the art of building relationships between the user and the spaces. Often spaces are form-based, function-based or aesthetically pleasing spaces but they are not interactive with the user which actually has a greater impact on how the user perceives the designed space and appreciate it. It is very necessary for a designer to understand and appreciate the human character and design accordingly, wherein the user gets the flexibility to explore and experience it for themselves rather than the designed space dictating the user how to perceive or feel in that space. In this interaction between designed spaces and the user, a designer needs to understand the spatial potential and user’s needs because the design language varies with varied situations in accordance with these factors. Designers often have the tendency to construct spaces with their perspectives, observations, and sense the space in their range of different angles rather than the users. It is, therefore, necessary to understand the potential of the space by understanding different factors and improve the quality of space with the help of creating better interactive spaces. For an interaction to occur between the user and space, there is a need for some medium. In this paper, light, color, and sound will be used as the mediums to understand and create interactions between the user and space, considering these to be the primary sources which would not require any physical touch in the space and would help in triggering the human senses. This paper involves in studying and understanding the impact of light, color and sound on different typologies of spaces on the user through different findings, articles, case studies and surveys and try to get links between these three mediums to create an interaction. This paper also deals with understanding in which medium takes an upper hand in a varied typology of spaces and identify different techniques which would create interactions between the user and space with the help of light, color, and sound.Keywords: color, communicative spaces, human factors, interactive spaces, light, sound
Procedia PDF Downloads 2101629 An Anthropometric and Postural Risk Assessment of Students in Computer Laboratories of a State University
Authors: Sarah Louise Cruz, Jemille Venturina
Abstract:
Ergonomics considers the capabilities and limitations of a person as they interact with tools, equipment, facilities and tasks in their work environment. Workplace is one example of physical work environment, be it a workbench or a desk. In school laboratories, sitting is the most common working posture of the students. Students maintain static sitting posture as they perform different computer-aided activities. The College of Engineering and College of Information and Communication Technology of a State University consist of twenty-two computer laboratories. Normally, students aren’t usually aware of the importance of sustaining proper sitting posture while doing their long hour computer laboratory activities. The study evaluates the perceived discomfort and working postures of students as they are exposed on current workplace design of computer laboratories. The current study utilizes Rapid Upper Limb Assessment (RULA), Body Discomfort Chart using Borg’s CR-10 Scale Rating and Quick Exposure Checklist in order to assess the posture and the current working condition. The result of the study may possibly minimize the body discomfort experienced by the students. The researchers redesign the individual workstations which includes working desk, sitting stool and other workplace design components. Also, the economic variability of each alternative was considered given that the study focused on improvement of facilities of a state university.Keywords: computer workstation, ergonomics, posture, students, workplace
Procedia PDF Downloads 3091628 Professional Competences of E-Learning Lecturers: Case of Russian National Platforms of Open Education
Authors: Polina Pekker
Abstract:
This work analyzes the role of lecturers in e-learning in Russia. It is based on qualitative research of lecturers who conduct courses on Russian national platforms of open education. The platform is based on edx software (provider of massive open online courses). The interviews with e-learning lecturers were conducted: from December 2015 till January 2016 and from April 2016 till May 2016. The results of interviews (face-to-face, telephone, skype) show, firstly, the difference between the role of lecturers in e-learning and in traditional education and, secondly, that the competition between lecturers is high in Russia. The results of interviews in Russia show that e-learning lecturer should have several special professional competences: the ability to keep attention of audiences without real contact, the ability to work on camera and competences related with e-learning course support (test, forum, communication on forum and etc.) It is concluded that lecturers need special course on acting and speech skills and on conducting and organizing of e-learning course in Russia. It is planned to conduct French study. When results from French research will be totally ready, they will be compared to Russian. As well French platform, France Universite Numerique, was launched earlier, in January 2014, so Russian lecturers should get best practice from the French colleagues.Keywords: e-courses lecturer, e-learning, professional competences of lecturers, national Russian and French platforms of open education
Procedia PDF Downloads 1911627 Comparison of Deep Learning and Machine Learning Algorithms to Diagnose and Predict Breast Cancer
Authors: F. Ghazalnaz Sharifonnasabi, Iman Makhdoom
Abstract:
Breast cancer is a serious health concern that affects many people around the world. According to a study published in the Breast journal, the global burden of breast cancer is expected to increase significantly over the next few decades. The number of deaths from breast cancer has been increasing over the years, but the age-standardized mortality rate has decreased in some countries. It’s important to be aware of the risk factors for breast cancer and to get regular check- ups to catch it early if it does occur. Machin learning techniques have been used to aid in the early detection and diagnosis of breast cancer. These techniques, that have been shown to be effective in predicting and diagnosing the disease, have become a research hotspot. In this study, we consider two deep learning approaches including: Multi-Layer Perceptron (MLP), and Convolutional Neural Network (CNN). We also considered the five-machine learning algorithm titled: Decision Tree (C4.5), Naïve Bayesian (NB), Support Vector Machine (SVM), K-Nearest Neighbors (KNN) Algorithm and XGBoost (eXtreme Gradient Boosting) on the Breast Cancer Wisconsin Diagnostic dataset. We have carried out the process of evaluating and comparing classifiers involving selecting appropriate metrics to evaluate classifier performance and selecting an appropriate tool to quantify this performance. The main purpose of the study is predicting and diagnosis breast cancer, applying the mentioned algorithms and also discovering of the most effective with respect to confusion matrix, accuracy and precision. It is realized that CNN outperformed all other classifiers and achieved the highest accuracy (0.982456). The work is implemented in the Anaconda environment based on Python programing language.Keywords: breast cancer, multi-layer perceptron, Naïve Bayesian, SVM, decision tree, convolutional neural network, XGBoost, KNN
Procedia PDF Downloads 741626 Client Hacked Server
Authors: Bagul Abhijeet
Abstract:
Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring
Procedia PDF Downloads 2501625 Improving the Quality of Staff Performance with a Talent-Driven Approach: Case Study of SAIPA Automotive Manufacturing Company in Iran
Authors: Abdolmajid Mosleh, Afzal Ghasimi
Abstract:
The purpose of this research is to investigate and identify effective factors that can improve the quality of personal performance in industrial companies. In the present study, it was assumed that the hidden variables of talent management could be explained by an important part of the variance in improving the quality of employee performance. This research is targeted in terms of applied research. The statistical population of the research is SAIPA automobile company with a number (N=10291); the sample of 380 people was selected based on the Cochran formula in a random sampling method among employed people. The measurement tool in this research was a questionnaire of 33 items with a control questionnaire that included two talent management departments (talent identification and talent exploitation) and improvements in staff performance (enhancement of technical and specialized capabilities, managerial capability, organizational interaction, and communication). The reliability of the internal consistency method was confirmed by the Cronbach's alpha coefficient and the two half-ways. In order to determine the validity of the questionnaire structure, confirmatory factor analysis was used. Based on the results of the data analysis, the effect of talent management on improving the quality of staff performance was confirmed. Based on the results of inferential statistics and structural equations of the proposed model, it had high fitness.Keywords: employee performance, talent management, performance improvement, SAIPA automobile manufacturing company
Procedia PDF Downloads 901624 Barriers to Teachers' Use of Technology in Nigeria and Its Implications in the Academic Performance of Students of Higher Learning: A Case Study of Adeniran Ogunsanya College of Education, Lagos
Authors: Iyabo Aremu
Abstract:
The role of the teacher in stirring a qualitative and distinctive knowledge-driven and value-laden environment with modern teaching practices cannot be over accentuated. In spite of the myriad advantages the use of Information and Communication Technology (ICT) promises, many teachers are still at the rear of this archetypical transition. These teachers; notable forces needed to elicit positive academic performances of students of higher learning are ill-equipped for the task. In view of this, the research work sought to assess how teachers have been able to effectively apply ICT tools to improve students’ academic performance in the higher institution and to evaluate the challenges faced by teachers in using these tools. Thus, the research adopted descriptive survey research design and involved a sample of 25 lecturers from five schools in the study area: Adeniran Ogunsanya College of Education (AOCOED). The barrier to Teachers’ Use of ICT Questionnaire (BTUICTQ) was used to gather data from these respondents. The data gathered was tested with chi-square at 0.05 level of significance. The results revealed that the perception and attitude of teachers towards the use of ICT is not favourable. It was also discovered that teachers suffer from gaps in ICT knowledge and skills. Finally, the research showed that lack of training and inadequate support is a major challenge teacher contend with. The study recommended that teachers should be given adequate training and support and that teachers’ unrestricted access to ICT gadgets should be ensured by schools.Keywords: ICT, teachers, AOCOED, academic performance
Procedia PDF Downloads 158