Search results for: intent to use
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 182

Search results for: intent to use

152 Flexible Alternative Current Transmission System Impact on Grid Stability and Power Markets

Authors: Abdulrahman M. Alsuhaibani, Martin Maken

Abstract:

FACTS devices have great influence on the grid stability and power markets price. Recently, there is intent to integrate a large scale of renewable energy sources to the power system which in turn push the power system to operate closer to the security limits. This paper discusses the power system stability and reliability improvement that could be achieved by using FACTS. There is a comparison between FACTS devices to evaluate their performance for different functions. A case study has also been made about its effect on reducing generation cost and minimizing transmission losses which have good impact on efficient and economic operation of electricity markets

Keywords: FACTS, grid stability, spot price, OPF

Procedia PDF Downloads 157
151 Self-Disclosure and Suicide

Authors: Netta Horesh Reinman

Abstract:

The inability to communicate feelings and thoughts to people close to oneself may be an important risk factor for suicidal behavior. This inability has been operationalized in the concept of “self-disclosure.” The purpose of this paper was to evaluate the correlation of self-disclosure with suicidal behavior in adolescents. Eighty consecutive admissions to an adolescent psychiatric inpatient unit were evaluated. Thirty-four were suicide attempters, 18 were suicidal ideators, and 18 were non-suicidal. Assessment measures included the Child Suicide Potential Scale, the Suicide Intent Scale, the Suicide Ideation Scale, and the Self-Disclosure Scale. The results show that low self-disclosure levels are associated with suicidal thinking, suicide attempts and suicidal attitudes. Thus, low self-disclosure may well be a risk factor worthy of further evaluation in the attempt to understand adolescent suicidal behavior.

Keywords: self disclosure, suicide, adolescents, treatment

Procedia PDF Downloads 122
150 Computer Simulation Studies of Aircraft Wing Architectures on Vibration Responses

Authors: Shengyong Zhang, Mike Mikulich

Abstract:

Vibration is a crucial limiting consideration in the analysis and design of airplane wing structures to avoid disastrous failures due to the propagation of existing cracks in the material. In this paper, we build CAD models of aircraft wings to capture the design intent with configurations. Subsequent FEA vibration analysis is performed to study the natural vibration properties and impulsive responses of the resulting user-defined wing models. This study reveals the variations of the wing’s vibration characteristics with respect to changes in its structural configurations. Integrating CAD modelling and FEA vibration analysis enables designers to improve wing architectures for implementing design requirements in the preliminary design stage.

Keywords: aircraft wing, CAD modelling, FEA, vibration analysis

Procedia PDF Downloads 165
149 Internal Family Systems Parts-Work: A Revolutionary Approach to Reducing Suicide Lethality

Authors: Bill D. Geis

Abstract:

Even with significantly increased spending, suicide rates continue to climb—with alarming increases among traditionally low-risk groups. This has caused clinicians and researchers to call for a complete rethinking of all assumptions about suicide prevention, assessment, and intervention. A form of therapy--Internal Family Systems Therapy--affords tremendous promise in sustained diminishment of lethal suicide risk. Though a form of therapy that is most familiar to trauma therapists, Internal Family Systems Therapy, involving direct work with suicidal parts, is a promising therapy for meaningful and sustained reduction in suicide deaths. Developed by Richard Schwartz, Internal Family Systems Therapy proposes that we are all influenced greatly by internal parts, frozen by development adversities, and these often-contradictory parts contribute invisibly to mood, distress, and behavior. In making research videos of patients from our database and discussing their suicide attempts, it is clear that many persons who attempt suicide are in altered states at the time of their attempt and influenced by factors other than conscious intent. Suicide intervention using this therapy involves direct work with suicidal parts and other interacting parts that generate distress and despair. Internal Family Systems theory posits that deep experiences of pain, fear, aloneness, and distress are defended by a range of different parts that attempt to contain these experiences of pain through various internal activities that unwittingly push forward inhibition, fear, self-doubt, hopelessness, desires to cut and engage in destructive behavior, addictive behavior, and even suicidal actions. These suicidal parts are often created (and “frozen”) at young ages, and these very young parts do not understand the consequences of this influence. Experience suggests that suicidal parts can create impulsive risk behind the scenes when pain is high and emotional support reduced—with significant crisis potential. This understanding of latent suicide risk is consistent with many of our video accounts of serious suicidal acts—compiled in a database of 1104 subjects. Since 2016, consent has been obtained and records kept of 23 highly suicidal patients, with initial Intention-to-Die ratings (0= no intent, 10 = conviction to die) between 5 and 10. In 67% of these cases using IFST parts-work intervention, these highly suicidal patients’ risk was reduced to 0-1, and 83% of cases were reduced to 4 or lower. There were no suicide deaths. Case illustrations will be offered.

Keywords: suicide, internal family systems therapy, crisis management, suicide prevention

Procedia PDF Downloads 41
148 Decision-Making, Student Empathy, and Cold War Historical Events: A Case Study of Abstract Thinking through Content-Centered Learning

Authors: Jeffrey M. Byford

Abstract:

The conceptualized theory of decision making on historical events often does not conform to uniform beliefs among students. When presented the opportunity, many students have differing opinions and rationales associated with historical events and outcomes. The intent of this paper was to provide students with the economic, social and political dilemmas associated with the autonomy of East Berlin. Students ranked seven possible actions from the most to least acceptable. In addition, students were required to provide both positive and negative factors for each decision and relative ranking. Results from this activity suggested that while most students chose a financial action towards West Berlin, some students had trouble justifying their actions.

Keywords: content-centered learning, cold war, Berlin, decision-making

Procedia PDF Downloads 455
147 Adhering to the Traditional Standard of Originality in the Era of Artificial Intelligence Copyright Protection

Authors: Xiaochen Mu

Abstract:

Whether in common law countries that adhere to the "commercial copyright theory" or in civil law countries that center around "author's rights," the standards for judging originality have undergone continuous adjustments in response to the development of information technology. The adherence to originality standards does not arbitrarily dictate that all types of works be judged according to a single standard of originality, nor does it rigidly ignore the changes in creative methods and dissemination models brought about by technology. Adjustments and interpretations should be allowed based on the different forms of expression of works. Appropriate adjustments and interpretations are our response to technological advancements. However, what should be upheld are the principles and bottom lines of these adjustments and interpretations, namely the legislative intent and purpose of copyright law, which are to encourage the creation and dissemination of outstanding cultural works and to promote the flourishing of culture.

Keywords: generative artificial intelligence, originality, works, copyright

Procedia PDF Downloads 42
146 Eisenhower’s Farewell Speech: Initial and Continuing Communication Effects

Authors: B. Kuiper

Abstract:

When Dwight D. Eisenhower delivered his final Presidential speech in 1961, he was using the opportunity to bid farewell to America, but he was also trying to warn his fellow countrymen about deeper challenges threatening the country. In this analysis, Eisenhower’s speech is examined in light of the impact it had on American culture, communication concepts, and political ramifications. The paper initially highlights the previous literature on the speech, especially in light of its 50th anniversary, and reveals a man whose main concern was how the speech’s words would affect his beloved country. The painstaking approach to the wording of the speech to reveal the intent is key, particularly in light of analyzing the motivations according to “virtuous communication.” This philosophical construct indicates that Eisenhower’s Farewell Address was crafted carefully according to a departing President’s deepest values and concerns, concepts that he wanted to pass along to his successor, to his country, and even to the world.

Keywords: Eisenhower, mass communication, political speech, rhetoric

Procedia PDF Downloads 274
145 A Machine Learning Approach to Detecting Evasive PDF Malware

Authors: Vareesha Masood, Ammara Gul, Nabeeha Areej, Muhammad Asif Masood, Hamna Imran

Abstract:

The universal use of PDF files has prompted hackers to use them for malicious intent by hiding malicious codes in their victim’s PDF machines. Machine learning has proven to be the most efficient in identifying benign files and detecting files with PDF malware. This paper has proposed an approach using a decision tree classifier with parameters. A modern, inclusive dataset CIC-Evasive-PDFMal2022, produced by Lockheed Martin’s Cyber Security wing is used. It is one of the most reliable datasets to use in this field. We designed a PDF malware detection system that achieved 99.2%. Comparing the suggested model to other cutting-edge models in the same study field, it has a great performance in detecting PDF malware. Accordingly, we provide the fastest, most reliable, and most efficient PDF Malware detection approach in this paper.

Keywords: PDF, PDF malware, decision tree classifier, random forest classifier

Procedia PDF Downloads 91
144 The Attitude and Intention to Purchase Halal Cosmetic Products: A Study of Muslim Consumers in Saudi Arabia

Authors: Abdulwahab S. Shmailan

Abstract:

The links between the halalan tayyiban dimensions and their impact on the propensity to purchase halal cosmetics in Muslim culture are investigated in this study. The information was gathered by a self-administered questionnaire survey of 207 Saudi Muslim customers using purposive sampling. The suggested model was tested using Pearson correlation coefficients and an ANOVA test. Significant and positive connections were found between halalan tayyiban dimensions, attitudes, and purchasing intent. There were also substantial changes in the study parameters depending on the respondent's work title. This is one of the first empirical tests of the halalan tayyiban, attitudes, and intention to purchase model among Saudi Muslim customers. The study offers helpful recommendations for cosmetics sector marketers as well as strategy formulation.

Keywords: cosmetics, halal cosmetics, halalan tayyiban, halal certificate, customers attitude, intention to purchase

Procedia PDF Downloads 178
143 Autonomic Threat Avoidance and Self-Healing in Database Management System

Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik

Abstract:

Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.

Keywords: autonomic computing, self-healing, threat avoidance, security

Procedia PDF Downloads 504
142 Strategic Orientation of Islamic Banks: A Review of Strategy Language

Authors: Imam Uddin, Imtiaz Ahmed Memon

Abstract:

This paper analyzes the ideological contextuality of market oriented strategy language used by Industry leaders to envision the future of Islamic financial Institutions (IFIs) in the light of Wittgenstein language-games and Foucault’s power-discourse framework. The analysis infers that the explicit market orientation of strategy language and modern knowledge of finance now defines various concepts related of Islamic finance, let alone Islamic finance theory itself. Theorizing and practicing Islamic finance therefore under the dominant influence of modern strategy discourse and modern knowledge of finance has significant implications for developing an ethical and spiritual orientation of Islamic banks. The concerned academia and scholarship therefore need to review such trends and work around the possible degradation to the public image of IFIs and resulting disappointments of religiously inspired customers.

Keywords: Islamic finance discourse, strategy discourse, language games, strategic intent, productive misunderstanding

Procedia PDF Downloads 407
141 Teaching for Change: Instructional Support in a Bilingual Setting

Authors: S. J. Hachar

Abstract:

The goal of this paper is to provide educators an overview of international practices supporting young learners, arming us with adequate information to lead effective change. We will report on research and observations of Service Learning Projects conducted by one South Texas University. The intent of the paper is also to provide readers an overview of service learning in the preparation of teacher candidates pursuing a Bachelor of Science in Elementary Education. The objective of noting the efficiency and effectiveness of programs leading to literacy and oral fluency in a native language and second language will be discussed. This paper also highlights experiential learning for academic credit that combines community service with student learning. Six weeks of visits to a variety of community sites, making personal observations with faculty members, conducting extensive interviews with parents and key personnel at all sites will be discussed. The culminating Service Learning Expo will be reported as well.

Keywords: elementary education, junior achievement, service learning

Procedia PDF Downloads 322
140 Defence Diplomacy and Collective Security in Africa: Case of Rwanda Defence Forces

Authors: Emmanuel Mugiraneza

Abstract:

Rwanda uses defence diplomacy to pursue international collective security through different mechanisms. This paper shows that with an intent of promoting international collective security, Rwanda has constituted its defense diplomacy policy in three standpoints. First, Rwanda has formed strategic cooperation alliances with state actors, regional and international Organizations that enables her to participate in and promote international collective peace, security and cooperation. Secondary, Rwanda uses defence diplomacy to foster cooperation in to pre-empt, minimize and neutralize potential triggers that would lead to the outbreak of international conflict. Thirdly, Rwanda implements defence diplomacy policy strategy through internationally recognized operational and tactical standards while dispelling hostilities, assisting the friendly nation’s forces and or building and maintaining public confidence and trust in the areas where Rwanda Defence Force deploys for peacekeeping missions in Sudan, South Sudan, Central African Republic and Mozambique for a counterterrorism mission.

Keywords: defence diplomacy, collective security, Rwanda, Peacekeeping

Procedia PDF Downloads 123
139 Autopoietic Socio-technical Systems: A New Lens for Understanding Anticipation

Authors: Gregory Vigneaux

Abstract:

The capacity to anticipate future events across varying time scales is integral to the effective operation of both emergency management and emergency services organizations. This paper provides fresh insight into anticipation by first offering a novel conceptualization of organizations in both fields by twisting together socio-technical systems and autopoietic theory. The result of this intertwining of theory is a view of emergency management and emergency services organizations as self-reproducing systems driven by socio-technical processes contingent upon both inflows and outflows across a boundary produced by the system’s own activity. Flowing from this perspective is an approach to anticipation that extends from a system’s intent of continuing to reproduce its identity over a dynamic landscape. This discussion takes a pragmatic turn through Maturana and Verden-Zöller’s domains of structural change, classifying anticipated events and connecting them with types of responses involving inflows, outflows, and socio-technical processes.

Keywords: risk, anticipation, organizations, planning, transformation, identity

Procedia PDF Downloads 120
138 Interdependencies of Culture, Economy, and Resource Availability ’ as 'Determinants of Spatial Inequality in Cities

Authors: Shahna K. C., Belay Menon, Taniya Joshua

Abstract:

As globalization in the era progresses, spatial inequality is turned to be one of the major concerns; the main intent of the Study is to focus on if there is any interdependencies of culture economy and resource availability on creating spatial inequality in cities. The paper tries to establish the relationship between spatial inequality – the quality of life – the DETERMINANT TRIAD (culture, economy, resource availability). Slum area of Dharavi is taken to evaluate the influence of these determinants on the quality of life as spatial inequality is evident there. Interdependencies of the determinants on creating spatial inequality is evaluated. For this, It is understood that these three parameters, i.e., culture, economy, resource availability, are determinants of urban design, each from the social, economic, environmental domains of sustainability, respectively. And there are studies individually on each of these aspects, how they determine the urban spaces, and how influential on the whole process of urbanization. Now extending the study towards the interdependencies of these three so as to find out how these trilogy shapes the urban form and space.

Keywords: spatial inequality, culture, economy, resource availability, quality of life

Procedia PDF Downloads 209
137 Perception Differences in Children Learning to Golf with Traditional versus Modified (Scaled) Equipment

Authors: Lindsey D. Sams, Dean R. Gorman, Cathy D. Lirgg, Steve W. Dittmore, Jack C. Kern

Abstract:

Golf is a lifetime sport that provides numerous physical and psychological benefits. The game has struggled with attrition and retention within minority groups and this has exposed the lack of a modified introduction to the game that is uniformly accessible and developmentally appropriate. Factors that have been related to sport participatory behaviors include perceived competence, enjoyment and intention. The purpose of this study was to examine self-reported perception differences in competence and enjoyment between learners using modified and traditional equipment as well as the potential effects these factors could have on intent for future participation. For this study, SNAG Golf was chosen to serve as the scaled equipment used by the modified equipment group. The participants in this study were 99 children (24 traditional equipment users/ 75 modified equipment users) located across the U.S. with ages ranging from 7 to 12 years (2nd-5th grade). Utilizing a convenience sampling method, data was obtained on a voluntary basis through surveys measuring children’s golf participation and self-perceptions concerning perceived competence, enjoyment and intention to continue participation. The scales used for perceived competence and enjoyment included Susan Harter’s Self-Perception Profile for Children (SPPC) along with the Physical Activity Enjoyment Scale (PACES). Analysis revealed no significant differences for enjoyment, perceived competence or intention between children learning with traditional golf equipment and modified golf equipment. This was true even though traditional equipment users reported significantly higher experience levels than that of modified users. Intention was regressed on the enjoyment and perceived competence variables. Congruent with current literature, enjoyment was a strong predictor of intention to continue participation, for both groups. Modified equipment users demonstrated significantly lower experience levels but reported similar levels of competence, enjoyment and intent to continue participation as reported by the more experienced, and potentially more skilled, traditional users. The ability to immediately generate these positive affects suggests the potential adoption of a more effective way to learn golf and a method that is conducive to participatory behaviors related to attrition and retention. These implications in turn, highlight an equipment candidate ideal for inception into physical education programs where new learners are introduced to various sports in safe and developmentally appropriate environments. A major goal of this study was to provide foundational research that instigates the further examination of golf’s introductory teaching methodologies, as there is a lack of its presence in current literature. Future research recommendations range from improvements in the current research design to expansive approaches related to the topic, such as progressive skill development, knowledge of the game’s tactical and strategic concepts, playing ability and teaching effectiveness when utilizing modified versus traditional equipment.

Keywords: adaptive sports, enjoyment, golf participation, modified equipment, perceived competence, SNAG golf

Procedia PDF Downloads 340
136 The Delone and McLean Model: A Review and Reconceptualisation for Explaining Organisational IS Success

Authors: Probir Kumar Banerjee

Abstract:

Though the revised DeLone and McLean (DM) model of IS success is found to be effective at the individual level of analysis, there is lack of consensus in regard to its effectiveness at the organisational level. This research reviews the DM model in the light of business/IT alignment theory and supporting literature, and suggests its reconceptualization. Specifically, arguments are made for augmenting it with business process quality. Business process quality, it is argued, captures the effect of intent to use, use and user satisfaction interactions, thus eliminating the need to capture their interaction effects in explaining organisational IS success. It is also argued that ‘operational performance’ driven by systems and business process quality, and higher order measures of organisational performance tied to operational performance are appropriate measures of ‘net benefit’. Suggestions are made for reconceptualisation of the other constructs and an adapted model of organisational IS success is proposed.

Keywords: organisational IS success, business/IT alignment, systems quality, business process quality, operational performance, market performance

Procedia PDF Downloads 395
135 Efficiency Analysis of Trader in Thailand and Laos Border Trade: Case Study of Textile and Garment Products

Authors: Varutorn Tulnawat, Padcharee Phasuk

Abstract:

This paper investigates the issue of China’s dumping on border trade between Thailand and Laos. From the pass mostly, the border trade goods are traditional textile and garment mainly served locals and tourists which majority of traders is of small and medium size. In the present day the competition is fierce, the volume of trade has expanded far beyond its original intent. The major competitors in Thai-Laos border trade are China, Vietnam and also South Korea. This research measures and compares the efficiency and ability to survive the onslaught of Thai and Laos firm along Thailand (Nong Kai province) and Laos (Vientiane) border. Two attack strategies are observed, price cutting and incense such as full facilitation for big volume order. Data Envelopment Analysis (DEA) is applied to data surveyed from 90 Thai and Laos entrepreneurs. The expected results are the proportion of efficiency and inefficiency firms. Points of inefficiency and suggested improvement are also discussed.

Keywords: border trade, dea, textile, garment

Procedia PDF Downloads 245
134 Modal Analysis for Study of Minor Historical Architecture

Authors: Milorad Pavlovic, Anna Manzato, Antonella Cecchi

Abstract:

Cultural heritage conservation is a challenge for contemporary society. In recent decades, significant resources have been allocated for the conservation and restoration of architectural heritage. Historical buildings were restored, protected and reinforced with the intent to limit the risks of degradation or loss, due to phenomena of structural damage and to external factors such as differential settlements, earthquake effects, etc. The wide diffusion of historic masonry constructions in Italy, Europe and the Mediterranean area requires reliable tools for the evaluation of their structural safety. In this paper is presented a free modal analysis performed on a minor historical architecture located in the village of Bagno Grande, near the city of L’Aquila in Italy. The location is characterized by a complex urban context, seriously damaged by the earthquake of 2009. The aim of this work is to check the structural behavior of a masonry building characterized by several boundary conditions imposed by adjacent buildings and infrastructural facilities.

Keywords: FEM, masonry, minor historical architecture, modal analysis

Procedia PDF Downloads 317
133 The Role of Personality Type as Predictor of Trust among Ridesharing Community: Study in Nebengers Community Jakarta

Authors: Firdaus Amri, Ima Sri Rahmani

Abstract:

Traffic jam becomes the main problem among the people in a metropolitan city, especially in Indonesia. Nebengers, as one of ridesharing community in Indonesia, offer solutions against this problem. Nebengers is a social media community that connect people who want to give the ride and who want to ask for the ride. But in reality, Nebengers still have quite problems, especially regarding the safety issue. Practically, in this issue, they (people in Nebengers) only depend on trust between the one who gives the ride and who asks for the ride. Trust is defined as an expectation that partners, including potential partners, have goodwill and benign intent in their dealing with one and another. This paper will examine the role of personality type as predictor of trust among Nebengers community. Hexaco Personality consists of six dimensions (honesty-humility, emotionality, agreeableness, conscientiousness, extraversion, and openness to experience) is used in this research. By using snowball sampling, we took 250 respondents from Nebengers community as participants for this research. They complete questionnaires which are provided in online form. The role of each personality type as a basic analysis to understand trust among Nebengers community will be discussed in this research.

Keywords: Nebengers, personality type, ridesharing, trust

Procedia PDF Downloads 360
132 Emotion Dysregulation as Mediator between Child Abuse and Opiate Use Motives

Authors: Usha Barahmand, Ali Khazaee, Goudarz Sadeghi Hashjin

Abstract:

Coping motives are considered to be indicators of problematic substance use. The present investigation examined a model with emotional abuse as an antecedent and emotional dysregulation as a mediator leading to substance use. The intent of this study was to examine the associations between various types of childhood maltreatment and motives for substance use. The sample consisted of 72 male opiate users recruited from those enrolled for Methadone Maintenance treatment. Participants responded to measures of childhood maltreatment, emotion dysregulation, and motives for opiate use. All data were analyzed using Pearson's correlation coefficients and bootstrap analysis of mediation. Results supported the hypothesis that the experience of emotional abuse in childhood is associated with problems in regulating emotions which in turn correlates with opiate use as a way to cope with negative affect, to enhance positive effect or to obtain social rewards. Bootstrap analysis confirmed the mediating role of emotion dysregulation. Findings support the potential utility of further research into emotion dysregulation and motives as antecedents of problematic opiate use.

Keywords: childhood abuse, emotion dysregulation, motives, substance use

Procedia PDF Downloads 444
131 New Approaches to Guest Engagement Leading to Guest Satisfaction and Driving Guest Loyalty

Authors: Vaibhav Garg

Abstract:

The concept of guest engagement lies in the rigor of operational excellence and the emotional engagement of associates who perform their tasks genuinely from their hearts and hence in word and indeed, in intent and through gestures, a great hospitality is always genuine, attentive, passionate, caring and warm where engaged associates deliver exceptional service experiences and creates memories to last forever for the guests. One out of every five guests says that their decision of coming back to the same hotel is influenced by the opportunity to “experience and be engaged” A key question is what does a guest mean by experience and be engaged? Most hotels are highly concerned about the guest satisfaction. Therefore they have the brand standards which are a guide to the associate to ensure consistent implementation of set service and product standards to satisfy a guest. However, satisfaction of basic guest needs does not necessarily lead to engagement. For example an absolutely clean room and an in room dining order delivered on time can satisfy a guest but may not engage him. Absence of these standards can certainly lead to guest dissatisfaction however; the presence of these standards does not necessarily lead to guest engagement or guest delight.

Keywords: guest engagement, guest satisfaction, hospitality, hotel operations, operational excellence

Procedia PDF Downloads 239
130 Optimization of Line Loss Minimization Using Distributed Generation

Authors: S. Sambath, P. Palanivel

Abstract:

Research conducted in the last few decades has proven that an inclusion of Distributed Genaration (DG) into distribution systems considerably lowers the level of power losses and the power quality improved. Moreover, the choice of DG is even more attractive since it provides not only benefits in power loss minimisation, but also a wide range of other advantages including environment, economic, power qualities and technical issues. This paper is an intent to quantify and analyse the impact of distributed generation (DG) in Tamil Nadu, India to examine what the benefits of decentralized generation would be for meeting rural loads. We used load flow analysis to simulate and quantify the loss reduction and power quality enhancement by having decentralized generation available line conditions for actual rural feeders in Tamil Nadu, India. Reactive and voltage profile was considered. This helps utilities to better plan their system in rural areas to meet dispersed loads, while optimizing the renewable and decentralised generation sources.

Keywords: distributed generation, distribution system, load flow analysis, optimal location, power quality

Procedia PDF Downloads 400
129 Investigating Factors Impacting Student Motivation in Classroom Use of Digital Games

Authors: Max Neu

Abstract:

A large variety of studies on the utilization of games in classroom settings promote positive effects on students motivation for learning. Still, most of those studies rarely can give any specifics about the factors that might lead to changes in students motivation. The undertaken study has been conducted in tandem with the development of a highly classroom-optimized serious game, with the intent of providing a subjectively positive initial contact with the subject of political participation and to enable the development of personal motivation towards further engagement with the topic. The goal of this explorative study was to Identify the factors that influence students motivation towards the subject when serious games are being used in classroom education. Therefor, students that have been exposed to a set of classes in which a classroom optimized serious game has been used. Afterwards, a selection of those have been questioned in guided interviews that have been evaluated through Qualitative Content Analysis. The study indicates that at least 23 factors in the categories, mechanics, content and context potentially influence students motivation to engage with the classes subject. The conclusions are of great value for the further production of classroom games as well as curricula involving digital games in general.

Keywords: formal education, games in classroom, motivation, political education

Procedia PDF Downloads 109
128 Building 1-Well-Covered Graphs by Corona, Join, and Rooted Product of Graphs

Authors: Vadim E. Levit, Eugen Mandrescu

Abstract:

A graph is well-covered if all its maximal independent sets are of the same size. A well-covered graph is 1-well-covered if deletion of every vertex of the graph leaves it well-covered. It is known that a graph without isolated vertices is 1-well-covered if and only if every two disjoint independent sets are included in two disjoint maximum independent sets. Well-covered graphs are related to combinatorial commutative algebra (e.g., every Cohen-Macaulay graph is well-covered, while each Gorenstein graph without isolated vertices is 1-well-covered). Our intent is to construct several infinite families of 1-well-covered graphs using the following known graph operations: corona, join, and rooted product of graphs. Adopting some known techniques used to advantage for well-covered graphs, one can prove that: if the graph G has no isolated vertices, then the corona of G and H is 1-well-covered if and only if H is a complete graph of order two at least; the join of the graphs G and H is 1-well-covered if and only if G and H have the same independence number and both are 1-well-covered; if H satisfies the property that every three pairwise disjoint independent sets are included in three pairwise disjoint maximum independent sets, then the rooted product of G and H is 1-well-covered, for every graph G. These findings show not only how to generate some more families of 1-well-covered graphs, but also that, to this aim, sometimes, one may use graphs that are not necessarily 1-well-covered.

Keywords: maximum independent set, corona, concatenation, join, well-covered graph

Procedia PDF Downloads 208
127 Analysis of Erosion Quantity on Application of Conservation Techniques in Ci Liwung Hulu Watershed

Authors: Zaenal Mutaqin

Abstract:

The level of erosion that occurs in the upsteam watersheed will lead to limited infiltrattion, land degradation and river trivialisation and estuaries in the body. One of the watesheed that has been degraded caused by using land is the DA Ci Liwung Upstream. The high degradation that occurs in the DA Ci Liwung upstream is indicated by the hugher rate of erosion on the region, especially in the area of agriculture. In this case, agriculture cultivation intent to the agricultural land that has been applied conservation techniques. This study is applied to determine the quantity of erosion by reviewing Hidrologic Response Unit (HRU) in agricuktural cultivation land which is contained in DA Ci Liwung upstream by using the Soil and Water Assessmen Tool (SWAT). Conservation techniques applied are terracing, agroforestry and gulud terrace. It was concluded that agroforestry conservation techniques show the best value of erosion (lowest) compared with other conservation techniques with the contribution of erosion of 25.22 tonnes/ha/year. The results of the calibration between the discharge flow models with the observation that R²=0.9014 and NS=0.79 indicates that this model is acceptable and feasible applied to the Ci Liwung Hulu watershed.

Keywords: conservation, erosion, SWAT analysis, watersheed

Procedia PDF Downloads 292
126 Emerging Challenges Related to Digital Pedagogy: A Practitioners’ Case

Authors: Petronella Jonck, Martin Chanza, Anna-Marie Pelser

Abstract:

Ascribed to the global pandemic most higher education institutions responded by relocating content presented by means of contact sessions to an online platform giving rise to digital pedagogy. The purpose of the research reported on was to explore emerging challenges linked to digital pedagogy from a practitioner stance. Digital pedagogy has emerged as a powerful tool to compliment traditional methods. However, stumbling blocks should be identified and addressed for future utilization. A qualitative research design was implemented by means of a semi-structured interview schedule distributed to practitioners during the COVID-19 pandemic. Results revealed that institutional type influenced the implementation of digital pedagogy. Other challenges relate to the increased cost of education, decreased access, limited knowledge about digital pedagogy, behavioral intent to adopt a multi-modal approach, lack of ICT infrastructure to mention a few. Higher education institutions should address challenges towards the optimal use of digital pedagogy in future.

Keywords: COVID-19, digital pedagogy, higher education institutions, information communication technology

Procedia PDF Downloads 130
125 Rumour Containment Using Monitor Placement and Truth Propagation

Authors: Amrah Maryam

Abstract:

The emergence of online social networks (OSNs) has transformed the way we pursue and share information. On the one hand, OSNs provide great ease for the spreading of positive information while, on the other hand, they may also become a channel for the spreading of malicious rumors and misinformation throughout the social network. Thus, to assure the trustworthiness of OSNs to its users, it is of vital importance to detect the misinformation propagation in the network by placing network monitors. In this paper, we aim to place monitors near the suspected nodes with the intent to limit the diffusion of misinformation in the social network, and then we also detect the most significant nodes in the network for propagating true information in order to minimize the effect of already diffused misinformation. Thus, we initiate two heuristic monitor placement using articulation points and truth propagation using eigenvector centrality. Furthermore, to provide real-time workings of the system, we integrate both the monitor placement and truth propagation entities as well. To signify the effectiveness of the approaches, we have carried out the experiment and evaluation of Stanford datasets of online social networks.

Keywords: online social networks, monitor placement, independent cascade model, spread of misinformation

Procedia PDF Downloads 161
124 A Real-Time Bayesian Decision-Support System for Predicting Suspect Vehicle’s Intended Target Using a Sparse Camera Network

Authors: Payam Mousavi, Andrew L. Stewart, Huiwen You, Aryeh F. G. Fayerman

Abstract:

We present a decision-support tool to assist an operator in the detection and tracking of a suspect vehicle traveling to an unknown target destination. Multiple data sources, such as traffic cameras, traffic information, weather, etc., are integrated and processed in real-time to infer a suspect’s intended destination chosen from a list of pre-determined high-value targets. Previously, we presented our work in the detection and tracking of vehicles using traffic and airborne cameras. Here, we focus on the fusion and processing of that information to predict a suspect’s behavior. The network of cameras is represented by a directional graph, where the edges correspond to direct road connections between the nodes and the edge weights are proportional to the average time it takes to travel from one node to another. For our experiments, we construct our graph based on the greater Los Angeles subset of the Caltrans’s “Performance Measurement System” (PeMS) dataset. We propose a Bayesian approach where a posterior probability for each target is continuously updated based on detections of the suspect in the live video feeds. Additionally, we introduce the concept of ‘soft interventions’, inspired by the field of Causal Inference. Soft interventions are herein defined as interventions that do not immediately interfere with the suspect’s movements; rather, a soft intervention may induce the suspect into making a new decision, ultimately making their intent more transparent. For example, a soft intervention could be temporarily closing a road a few blocks from the suspect’s current location, which may require the suspect to change their current course. The objective of these interventions is to gain the maximum amount of information about the suspect’s intent in the shortest possible time. Our system currently operates in a human-on-the-loop mode where at each step, a set of recommendations are presented to the operator to aid in decision-making. In principle, the system could operate autonomously, only prompting the operator for critical decisions, allowing the system to significantly scale up to larger areas and multiple suspects. Once the intended target is identified with sufficient confidence, the vehicle is reported to the authorities to take further action. Other recommendations include a selection of road closures, i.e., soft interventions, or to continue monitoring. We evaluate the performance of the proposed system using simulated scenarios where the suspect, starting at random locations, takes a noisy shortest path to their intended target. In all scenarios, the suspect’s intended target is unknown to our system. The decision thresholds are selected to maximize the chances of determining the suspect’s intended target in the minimum amount of time and with the smallest number of interventions. We conclude by discussing the limitations of our current approach to motivate a machine learning approach, based on reinforcement learning in order to relax some of the current limiting assumptions.

Keywords: autonomous surveillance, Bayesian reasoning, decision support, interventions, patterns of life, predictive analytics, predictive insights

Procedia PDF Downloads 115
123 [Keynote]: No-Trust-Zone Architecture for Securing Supervisory Control and Data Acquisition

Authors: Michael Okeke, Andrew Blyth

Abstract:

Supervisory Control And Data Acquisition (SCADA) as the state of the art Industrial Control Systems (ICS) are used in many different critical infrastructures, from smart home to energy systems and from locomotives train system to planes. Security of SCADA systems is vital since many lives depend on it for daily activities and deviation from normal operation could be disastrous to the environment as well as lives. This paper describes how No-Trust-Zone (NTZ) architecture could be incorporated into SCADA Systems in order to reduce the chances of malicious intent. The architecture is made up of two distinctive parts which are; the field devices such as; sensors, PLCs pumps, and actuators. The second part of the architecture is designed following lambda architecture, which is made up of a detection algorithm based on Particle Swarm Optimization (PSO) and Hadoop framework for data processing and storage. Apache Spark will be a part of the lambda architecture for real-time analysis of packets for anomalies detection.

Keywords: industrial control system (ics, no-trust-zone (ntz), particle swarm optimisation (pso), supervisory control and data acquisition (scada), swarm intelligence (SI)

Procedia PDF Downloads 345