Search results for: intermittence challenge
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2729

Search results for: intermittence challenge

2699 A Comparative Analysis of Self-help Housing and Government Mass Housing Scheme in Addressing the Challenge of Housing Access in Mararaba Area of Karu Local Government Area, Nasarawa State, Nigeria

Authors: John Abubakar

Abstract:

Access to decent housing is a global challenge. An estimated one billion people currently live in slum settlements globally. About 80 percent of these slum dwellers are in Asia and Africa. Nigeria accounts for a significant percentage of African slum dwellers because of its size. Addressing the challenge of slum settlement in Nigeria can have far reaching positive implications in Africa. A major slum settlement in Nigeria is Mararaba slum in Karu local government of Nasarawa state. The importance of this slum settlement hinges on its proximity to Abuja, Nigeria’s capital city. This study is an attempt at identifying the impact of self-help housing and government mass housing scheme in addressing the problem of housing access in Mararaba area of Karu local government, Nasarawa state. The research method used is the content analysis of existing literature. After the review of existing literature, the paper argues that self-help house is more impactful in addressing housing access in Mararaba area of Karu local government. Therefore, self-help housing should be recognized and incorporated into the housing policy of Nasarawa state. Both self-help housing and government mass housing programs are reviewed comparatively, and their strengths and weaknesses analyses.

Keywords: slum settlement, informal settlement, progressive improvement, holistic planning

Procedia PDF Downloads 60
2698 Impairments Correction of Six-Port Based Millimeter-Wave Radar

Authors: Dan Ohev Zion, Alon Cohen

Abstract:

In recent years, the presence of short-range millimeter-wave radar in civil application has increased significantly. Autonomous driving, security, 3D imaging and high data rate communication systems are a few examples. The next challenge is the integration inside small form-factor devices, such as smartphones (e.g. gesture recognition). The main challenge is implementation of a truly low-power, low-complexity high-resolution radar. The most popular approach is the Frequency Modulated Continuous Wave (FMCW) radar, with an analog multiplication front-end. In this paper, we present an approach for adaptive estimation and correction of impairments of such front-end, specifically implemented using the Six-Port Device (SPD) as the multiplier element. The proposed algorithm was simulated and implemented on a 60 GHz radar lab prototype.

Keywords: radar, FMCW Radar, IQ mismatch, six port

Procedia PDF Downloads 136
2697 Spatiotemporal Variability of Snow Cover and Snow Water Equivalent over Eurasia

Authors: Yinsheng Zhang

Abstract:

Changes in the extent and amount of snow cover in Eurasia are of great interest because of their vital impacts on the global climate system and regional water resource management. This study investigated the spatial and temporal variability of the snow cover extent (SCE) and snow water equivalent (SWE) of continental Eurasia using the Northern Hemisphere Equal-Area Scalable Earth Grid (EASE-Grid) Weekly SCE data for 1972–2006 and the Global Monthly EASE-Grid SWE data for 1979–2004. The results indicated that, in general, the spatial extent of snow cover significantly decreased during spring and summer, but varied little during autumn and winter over Eurasia in the study period. The date at which snow cover began to disappear in spring has significantly advanced, whereas the timing of snow cover onset in autumn did not vary significantly during 1972–2006. The snow cover persistence period declined significantly in the western Tibetan Plateau as well as the partial area of Central Asia and northwestern Russia but varied little in other parts of Eurasia. ‘Snow-free breaks’ (SFBs) with intermittent snow cover in the cold season were mainly observed in the Tibetan Plateau and Central Asia, causing a low sensitivity of snow cover persistence period to the timings of snow cover onset and disappearance over the areas with shallow snow. The averaged SFBs were 1–14 weeks in the Tibetan Plateau during 1972–2006 and the maximum intermittence could reach 25 weeks in some extreme years. At a seasonal scale, the SWE usually peaked in February or March but fell gradually since April across Eurasia. Both annual mean and annual maximum SWE decreased significantly during 1979–2004 in most parts of Eurasia except for eastern Siberia as well as northwestern and northeastern China.

Keywords: Eurasia, snow cover extent, snow cover persistence period, snow-free breaks, onset and disappearance timings, snow water equivalent

Procedia PDF Downloads 129
2696 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 271
2695 The Water-Way Route Management for Cultural Tourism Promotion at Angsila District: Challenge and Opportunity

Authors: Teera Intararuang

Abstract:

The purpose of this research is to study on the challenge and opportunity for waterway route management for promoting cultural tourism in Angsila District, Chonburi Province. To accomplish the goals and objectives, qualitative research will be applied. The research instruments used are observation, basic interviews, in-depth interviews, and interview key local performance. The study also uses both primary data and secondary data. From research result, it is revealed that all respondents had appreciated and strongly agree to promote their waterway route tourism as an intend for further increase for their income. However, it has some challenges to success this project due to natural obstacles such as water level, seasons and high temperature. Moreover, they lack financial support from government sectors also.

Keywords: Angsila community, waterway tourism route, cultural tourism, way of life

Procedia PDF Downloads 231
2694 Concentrations of Cortisol and Progesterone after Dexamethasone Challenge in Egyptian Stray Bitches

Authors: K. A. El-Battawy

Abstract:

This investigation was done to evaluate cortisol secretion in bitches following dexamethasone administration as well as its impact on progesterone levels during four days trail. Five bitches were used as their own pre-challenge control in a 4-day trial. On the control day, saline was injected intravenous (i.v.) and on the treatment day, 15 mg / animal of dexamethasone-21-disodiumphosphate (Dexa-TAD) was injected i.v. Blood samples were collected for four days then the analysis of cortisol and progesterone (P4) were done. Levels of cortisol decreased sharply within 24 h after dexamethasone administration. These low levels of cortisol remained for approximately 24hour then started again to reach normally back. Progesterone concentrations did not differ than pre-treatment one. In conclusion, this study confirms that single injection of dexamethasone lowered significantly the cortisol concentrations for approximately 24hour and did not affect the progesterone levels in bitches.

Keywords: dexa, progesterone, cortisol, blood, bitch, concentration

Procedia PDF Downloads 290
2693 Fairness in Grading of Work-Integrated Learning Assessment: Key Stakeholders’ Challenges and Solutions

Authors: Geraldine O’Neill

Abstract:

Work-integrated learning is a valuable learning experience for students in higher education. However, the fairness of the assessment process has been identified as a challenge. This study explored solutions to this challenge through interviews with expert authors in the field and workshops across nine different disciplines in Ireland. In keeping with the use of a participatory and action research methodology, the key stakeholders in the process, the students, educators, and practitioners, identified some solutions. The solutions included the need to: clarify the assessments’ expectations; enhance the flexibility of the competencies, reduce the number of competencies; use grading scales with lower specificity; support practitioner training, and empower students in the assessment process. The results are discussed as they relate to interactional, procedural, and distributive fairness.

Keywords: competencies, fairness, grading scales, work-integrated learning

Procedia PDF Downloads 110
2692 Privacy for the Internet of Things and its Different Dimensions

Authors: Maryam M Esfahani

Abstract:

The Internet of Things is a concept that has fundamentally changed the way information technology works and communication environments. This concept, which is referred to as the next revolution in the field of information and communication technology, takes advantage of existing technologies such as wireless sensor networks, RFID, cloud computing, M2M, etc., to the final slogan of providing the possibility of connecting any object anywhere and everywhere. This use of technologies, along with the possibility of providing new services, also inherits their threats, and although the Internet of Things is facing many challenges, it can be said that its most important challenge is security and privacy, and perhaps even a more tangible challenge is privacy. In this article, we will first introduce the definition and concepts related to privacy, and then we will examine some threats against the privacy of the Internet of Things in different layers of a typical architecture. Also, while examining the differences and the relationship between security and privacy, we study different dimensions of privacy, and finally, we review some of the methods and technologies for improving the level of privacy.

Keywords: Iot, privacy, different dimension of privacy, W3model, privacy enhancing technologies

Procedia PDF Downloads 76
2691 An Ontology for Semantic Enrichment of RFID Systems

Authors: Haitham S. Hamza, Mohamed Maher, Shourok Alaa, Aya Khattab, Hadeal Ismail, Kamilia Hosny

Abstract:

Radio Frequency Identification (RFID) has become a key technology in the margining concept of Internet of Things (IoT). Naturally, business applications would require the deployment of various RFID systems that are developed by different vendors and use various data formats. This heterogeneity poses a real challenge in developing large-scale IoT systems with RFID as integration is becoming very complex and challenging. Semantic integration is a key approach to deal with this challenge. To do so, ontology for RFID systems need to be developed in order to annotated semantically RFID systems, and hence, facilitate their integration. Accordingly, in this paper, we propose ontology for RFID systems. The proposed ontology can be used to semantically enrich RFID systems, and hence, improve their usage and reasoning. The usage of the proposed ontology is explained through a simple scenario in the health care domain.

Keywords: RFID, semantic technology, ontology, sparql query language, heterogeneity

Procedia PDF Downloads 453
2690 Introducing a Practical Model for Instructional System Design Based on Determining of the knowledge Level of the Organization: Case Study of Isfahan Public Transportation Co.

Authors: Mojtaba Aghajari, Alireza Aghasi

Abstract:

The first challenge which the current research faced has been the identification or determination of the level of knowledge in Isfahan public transportation corporation, and the second challenge has been the recognition and choice of a proper approach for the instructional system design. Responding these two challenges will present an appropriate model of instructional system design. In order to respond the first challenge or question, Nonaka and Takeuchi KM model has been utilized due to its universality among the 26 models proposed so far. The statistical population of this research included 2200 people, among which 200 persons were chosen as the sample of the research by the use of Morgan’s method. The data gathering has been carried out by the means of a questionnaire based on Nonaka and Takeuchi KM model, analysis of which has been done by SPSS program. The output of this questionnaire, yielding the point of 1.96 (out of 5 points), revealed that the general condition of Isfahan public transportation corporation is weak concerning its being knowledge-centered. After placing this output on Jonassen’s continuum, it was revealed that the appropriate approach for instructional system design is the system (or behavioral) approach. Accordingly, different steps of the general model of ADDIE, which covers all of the ISO10015 standards, were adopted in the act of designing. Such process in Isfahan public transportation corporation was designed and divided into three main steps, including: instructional designing and planning, instructional course planning, determination of the evaluation and the effectiveness of the instructional courses.

Keywords: instructional system design, system approach, knowledge management, employees

Procedia PDF Downloads 301
2689 Technology Impact on the Challenge between Human Rights and Cyber Terrorism

Authors: Abanoub Zare Zakaria Herzalla

Abstract:

The link between terrorism and human rights has become a major challenge in the fight against terrorism around the world. This is based on the fact that terrorism and human rights are so closely linked that when the former starts, the latter are violated. This direct connection was recognized in the Vienna Declaration and Program of Action adopted by the World Conference on Human Rights in Vienna on June 25, 1993, which recognizes that acts of terrorism in all their forms and manifestations aim to destroy the human rights of people. Terrorism therefore represents an attack on our most basic human rights. To this end, the first part of this article focuses on the connections between terrorism and human rights and seeks to highlight the interdependence between these two concepts. The second part discusses the emerging concept of cyberterrorism and its manifestations. An analysis of the fight against cyberterrorism in the context of human rights is also carried out.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 27
2688 The Establishing Cultural Learning Center of Wayang Artwork for Creative Tourism: Challenge and Opportunities

Authors: Pornnapat Berndt

Abstract:

The purpose of this research is to explore challenge and opportunities to establish cultural learning center of Wayang Artwork for creative tourism within the house of Mr. Sa-ngat Jaiprom. To accomplish the goals and objectives, qualitative research will be applied. The research instruments used are observation, questionnaires (pretest and posttest), basic interviews, in-depth interviews and interviewed of key local informants. The study also uses both primary data and secondary data. From research result, it is revealed that the sample groups more realized valuable heritage value after learning about the history of wayang and the way to practices. The sample group indicated that it not too difficult for them to carving Wayang artwork as they have knowledge about Thai art before. However, in their opinion, they comment that it might difficult for others who have no basic knowledge to learn to carve wayang artwork.

Keywords: creative tourism, local community, cultural learning center, wayang artwork  

Procedia PDF Downloads 345
2687 Employing a System of Systems Approach in the Maritime RobotX Challenge: Incorporating Information Technology Students in the Development of an Autonomous Catamaran

Authors: Adam Jenkins

Abstract:

The Maritime RobotX Challenge provides a platform for postgraduate students conducting research in autonomous robotic systems to participate in an international competition. Although targeted to postgraduate students, the problem domain lends itself to a wide range of different levels of student expertise. In 2022, undergraduate Information Technology students from the University of South Australia undertook the challenge, utilizing a System of the Systems approach to the project's architecture. Each student group produced an independent solution to an identified task, which was then implemented on a Single Board Computer (SBC). A Central Control System then engaged each solution when appropriate, allowing the encapsulated SBC systems to manage each task as it was encountered. This approach facilitated collaboration among the multiple independent student teams over an 18-month period, and the fundamental system-agnostic architecture allowed for both the variance in student solutions and the limitations caused by the global electronics shortage. By adopting this approach, Information Technology teams were able to work independently yet produce an effective solution, leveraging their expertise to develop and construct an autonomous catamaran capable of meeting the competition's demanding requirements while producing a high level of engagement. The System of Systems approach is recommended to other universities interested in competing at this level and engaging students in a real-world problem.

Keywords: case study, robotics, education, programming, system of systems, multi-disciplinary collaboration

Procedia PDF Downloads 62
2686 Mitigation of Cascading Power Outage Caused Power Swing Disturbance Using Real-time DLR Applications

Authors: Dejenie Birile Gemeda, Wilhelm Stork

Abstract:

The power system is one of the most important systems in modern society. The existing power system is approaching the critical operating limits as views of several power system operators. With the increase of load demand, high capacity and long transmission networks are widely used to meet the requirement. With the integration of renewable energies such as wind and solar, the uncertainty, intermittence bring bigger challenges to the operation of power systems. These dynamic uncertainties in the power system lead to power disturbances. The disturbances in a heavily stressed power system cause distance relays to mal-operation or false alarms during post fault power oscillations. This unintended operation of these relays may propagate and trigger cascaded trappings leading to total power system blackout. This is due to relays inability to take an appropriate tripping decision based on ensuing power swing. According to the N-1 criterion, electric power systems are generally designed to withstand a single failure without causing the violation of any operating limit. As a result, some overloaded components such as overhead transmission lines can still work for several hours under overload conditions. However, when a large power swing happens in the power system, the settings of the distance relay of zone 3 may trip the transmission line with a short time delay, and they will be acting so quickly that the system operator has no time to respond and stop the cascading. Misfiring of relays in absence of fault due to power swing may have a significant loss in economic performance, thus a loss in revenue for power companies. This research paper proposes a method to distinguish stable power swing from unstable using dynamic line rating (DLR) in response to power swing or disturbances. As opposed to static line rating (SLR), dynamic line rating support effective mitigation actions against propagating cascading outages in a power grid. Effective utilization of existing transmission lines capacity using machine learning DLR predictions will improve the operating point of distance relay protection, thus reducing unintended power outages due to power swing.

Keywords: blackout, cascading outages, dynamic line rating, power swing, overhead transmission lines

Procedia PDF Downloads 123
2685 Offshore Power Transition Project

Authors: Kashmir Johal

Abstract:

Within a wider context of improving whole-life effectiveness of gas and oil fields, we have been researching how to generate power local to the wellhead. (Provision of external power to a subsea wellhead can be prohibitively expensive and results in uneconomic fields. This has been an oil/gas industry challenge for many years.) We have been developing a possible approach to “local” power generation and have been conducting technical, environmental, (and economic) research to develop a viable approach. We sought to create a workable design for a new type of power generation system that makes use of differential pressure that can exist between the sea surface and a gas (or oil reservoir). The challenge has not just been to design a system capable of generating power from potential energy but also to design it in such a way that it anticipates and deals with the wide range of technological, environmental, and chemical constraints faced in such environments. We believe this project shows the enormous opportunity in deriving clean, economic, and zero emissions renewable energy from offshore sources. Since this technology is not currently available, a patent has been filed to protect the advancement of this technology.

Keywords: renewable, energy, power, offshore

Procedia PDF Downloads 53
2684 Opinion Mining and Sentiment Analysis on DEFT

Authors: Najiba Ouled Omar, Azza Harbaoui, Henda Ben Ghezala

Abstract:

Current research practices sentiment analysis with a focus on social networks, DEfi Fouille de Texte (DEFT) (Text Mining Challenge) evaluation campaign focuses on opinion mining and sentiment analysis on social networks, especially social network Twitter. It aims to confront the systems produced by several teams from public and private research laboratories. DEFT offers participants the opportunity to work on regularly renewed themes and proposes to work on opinion mining in several editions. The purpose of this article is to scrutinize and analyze the works relating to opinions mining and sentiment analysis in the Twitter social network realized by DEFT. It examines the tasks proposed by the organizers of the challenge and the methods used by the participants.

Keywords: opinion mining, sentiment analysis, emotion, polarity, annotation, OSEE, figurative language, DEFT, Twitter, Tweet

Procedia PDF Downloads 119
2683 Challenge Response-Based Authentication for a Mobile Voting System

Authors: Tohari Ahmad, Hudan Studiawan, Iwang Aryadinata, Royyana M. Ijtihadie, Waskitho Wibisono

Abstract:

A manual voting system has been implemented worldwide. It has some weaknesses which may decrease the legitimacy of the voting result. An electronic voting system is introduced to minimize this weakness. It has been able to provide a better result, in terms of the total time taken in the voting process and accuracy. Nevertheless, people may be reluctant to go to the polling location because of some reasons, such as distance and time. In order to solve this problem, mobile voting is implemented by utilizing mobile devices. There are many mobile voting architectures available. Overall, authenticity of the users is the common problem of all voting systems. There must be a mechanism which can verify the users’ authenticity such that only verified users can give their vote once; others cannot vote. In this paper, a challenge response-based authentication is proposed by utilizing properties of the users, for example, something they have and know. In terms of speed, the proposed system provides good result, in addition to other capabilities offered by the system.

Keywords: authentication, data protection, mobile voting, security

Procedia PDF Downloads 399
2682 Nine Foundational Interventions for Students with Autism Spectrum Disorders

Authors: Jennie Long, Marjorie Bock

Abstract:

Although the professional literature related to Autism Spectrum Disorder (ASD) has focused on successful interventions and strategies, there is a lack of documentation regarding which of these methods and supports are most foundational and essential for classroom use. Specifically, literature does not define the core foundational interventions and strategies that would be elemental for educators to use with students with an ASD diagnosis. From the increase in prevalence of autism spectrum disorders, to the challenge students with ASD pose in classrooms, to the requirement to implement evidence-based practice, rises an enormous challenge in the field of education. Foundational interventions should be in place the first day the student enters the classroom. The nine interventions are foundational in nature and because of the dramatic increase in prevalence there is currently a need for classroom programs to provide the foundation of basic educational skills as well as the specialty skills specific to the area of ASD utilizing the most current research. This article presents nine evidence-based intervention categories for implementation with students on the spectrum.

Keywords: autism spectrum disorder, classroom, evidence-based, foundational

Procedia PDF Downloads 252
2681 An Image Based Visual Servoing (IBVS) Approach Using a Linear-Quadratic Regulator (LQR) for Quadcopters

Authors: C. Gebauer, C. Henke, R. Vossen

Abstract:

Within the Mohamed Bin Zayed International Robotics Challenge (MBZIRC) 2020, a team of unmanned aerial vehicles (UAV) is used to capture intruder drones by physical interaction. The challenge is motivated by UAV safety. The purpose of this work is to investigate the agility of a quadcopter being controlled visually. The aim is to track and follow a highly dynamic target, e.g., an intruder quadcopter. The following is realized in close range and the opponent has a velocity of up to 10 m/s. Additional limitations are given by the hardware itself, where only monocular vision is present, and no additional knowledge about the targets state is available. An image based visual servoing (IBVS) approach is applied in combination with a Linear Quadratic Regulator (LQR). The IBVS is integrated into the LQR and an optimal trajectory is computed within the projected three-dimensional image-space. The approach has been evaluated on real quadcopter systems in different flight scenarios to demonstrate the system's stability.

Keywords: image based visual servoing, quadcopter, dynamic object tracking, linear-quadratic regulator

Procedia PDF Downloads 130
2680 A Comparative Study of Malware Detection Techniques Using Machine Learning Methods

Authors: Cristina Vatamanu, Doina Cosovan, Dragos Gavrilut, Henri Luchian

Abstract:

In the past few years, the amount of malicious software increased exponentially and, therefore, machine learning algorithms became instrumental in identifying clean and malware files through semi-automated classification. When working with very large datasets, the major challenge is to reach both a very high malware detection rate and a very low false positive rate. Another challenge is to minimize the time needed for the machine learning algorithm to do so. This paper presents a comparative study between different machine learning techniques such as linear classifiers, ensembles, decision trees or various hybrids thereof. The training dataset consists of approximately 2 million clean files and 200.000 infected files, which is a realistic quantitative mixture. The paper investigates the above mentioned methods with respect to both their performance (detection rate and false positive rate) and their practicability.

Keywords: ensembles, false positives, feature selection, one side class algorithm

Procedia PDF Downloads 274
2679 Modernizer'ness as Madness: A Comparative Historical Study of Emperor Tewodros II of Ethiopia and Sultan Selim III of Ottoman Turkey's Modernization Reforms

Authors: Seid Ahmed Mohammed, Nedim Yalansiz

Abstract:

Many historians hardly gave due attention for historical comparison as their methods of study. They were still stunt supporter of the use of their own historical research method in their studies. But this method lacks the way to analyze some worldwide dynamics of events in comparative perspectives. Some dynamics like revolution, modernization, societal change and transformation needs broader analysis for broadening our historical knowledge’s by comparing and contrasting of the causes, courses and consequences of such dynamics historical developments in the world at large. In this paper, our study focuses up on ‘the dynamics of modernization’ and the challenge of modernity of the old regimes. For instance, countries like Turkey, Ethiopia, China, Russia, Iran, Afghanistan and Thailand have almost the same dynamics in facing the challenge of modernity. In such countries, the old regimes tried to introduce modernization and ‘reform from the above’ in order to tackle the gradual decline of the empire that faced strong challenge from the outside world. The other similarity of them was that as the rulers attempted to introduce the modernization reforms the old traditional and the religious institutions strongly opposed the reforms as the reforms alienated the power and prestige of the traditional classes. Similarly, the rules introduced modernization for maintaining their own unique socio-cultural and religious dynamics not as borrowing and acculturation of the west by complete destruction of their own. Therefore, this paper attempted to give a comparative analysis of two modernizers Tewodros II (1855-1868) of Ethiopia and Sultan Selim III (1739-1808) of Ottoman Turkey who tried to modernize their empire unfortunately they paid their precious life as a result of modernization.

Keywords: comparative history, Ethiopia, modernization, Ottoman Turkey

Procedia PDF Downloads 181
2678 An Energy Efficient Clustering Approach for Underwater ‎Wireless Sensor Networks

Authors: Mohammad Reza Taherkhani‎

Abstract:

Wireless sensor networks that are used to monitor a special environment, are formed from a large number of sensor nodes. The role of these sensors is to sense special parameters from ambient and to make a connection. In these networks, the most important challenge is the management of energy usage. Clustering is one of the methods that are broadly used to face this challenge. In this paper, a distributed clustering protocol based on learning automata is proposed for underwater wireless sensor networks. The proposed algorithm that is called LA-Clustering forms clusters in the same energy level, based on the energy level of nodes and the connection radius regardless of size and the structure of sensor network. The proposed approach is simulated and is compared with some other protocols with considering some metrics such as network lifetime, number of alive nodes, and number of transmitted data. The simulation results demonstrate the efficiency of the proposed approach.

Keywords: underwater sensor networks, clustering, learning automata, energy consumption

Procedia PDF Downloads 343
2677 Ultra-Reliable Low Latency V2X Communication for Express Way Using Multiuser Scheduling Algorithm

Authors: Vaishali D. Khairnar

Abstract:

The main aim is to provide lower-latency and highly reliable communication facilities for vehicles in the automobile industry; vehicle-to-everything (V2X) communication basically intends to increase expressway road security and its effectiveness. The Ultra-Reliable Low-Latency Communications (URLLC) algorithm and cellular networks are applied in combination with Mobile Broadband (MBB). This is particularly used in express way safety-based driving applications. Expressway vehicle drivers (humans) will communicate in V2X systems using the sixth-generation (6G) communication systems which have very high-speed mobility features. As a result, we need to determine how to ensure reliable and consistent wireless communication links and improve the quality to increase channel gain, which is becoming a challenge that needs to be addressed. To overcome this challenge, we proposed a unique multi-user scheduling algorithm for ultra-massive multiple-input multiple-output (MIMO) systems using 6G. In wideband wireless network access in case of high traffic and also in medium traffic conditions, moreover offering quality-of-service (QoS) to distinct service groups with synchronized contemporaneous traffic on the highway like the Mumbai-Pune expressway becomes a critical problem. Opportunist MAC (OMAC) is a way of proposing communication across a wireless communication link that can change in space and time and might overcome the above-mentioned challenge. Therefore, a multi-user scheduling algorithm is proposed for MIMO systems using a cross-layered MAC protocol to achieve URLLC and high reliability in V2X communication.

Keywords: ultra-reliable low latency communications, vehicle-to-everything communication, multiple-input multiple-output systems, multi-user scheduling algorithm

Procedia PDF Downloads 69
2676 A Case Study Using Sounds Write and The Writing Revolution to Support Students with Literacy Difficulties

Authors: Emilie Zimet

Abstract:

During our department meetings for teachers of children with learning disabilities and difficulties, we often discuss the best practices for supporting students who come to school with literacy difficulties. After completing Sounds Write and Writing Revolution courses, it seems there is a possibility to link approaches and still maintain fidelity to a program and provide individualised instruction to support students with such difficulties and disabilities. In this case study, the researcher has been focussing on how best to use the knowledge acquired to provide quality intervention that targets the varied areas of challenge that students require support in. Students present to school with a variety of co-occurring reading and writing deficits and with complementary approaches, such as The Writing Revolution and Sounds Write, it is possible to support students to improve their fundamental skills in these key areas. Over the next twelve weeks, the researcher will collect data on current students with whom this approach will be trialled and then compare growth with students from last year who received support using Sounds-Write only. Maintaining fidelity may be a potential challenge as each approach has been tested in a specific format for best results. The aim of this study is to determine if approaches can be combined, so the implementation will need to incorporate elements of both reading (from Sounds Write) and writing (from The Writing Revolution). A further challenge is the time length of each session (25 minutes), so the researcher will need to be creative in the use of time to ensure both writing and reading are targeted while ensuring the programs are implemented. The implementation will be documented using student work samples and planning documents. This work will include a display of findings using student learning samples to demonstrate the importance of co-targeting the reading and writing challenges students come to school with.

Keywords: literacy difficulties, intervention, individual differences, methods of provision

Procedia PDF Downloads 35
2675 Cross-Knowledge Graph Relation Completion for Non-Isomorphic Cross-Lingual Entity Alignment

Authors: Yuhong Zhang, Dan Lu, Chenyang Bu, Peipei Li, Kui Yu, Xindong Wu

Abstract:

The Cross-Lingual Entity Alignment (CLEA) task aims to find the aligned entities that refer to the same identity from two knowledge graphs (KGs) in different languages. It is an effective way to enhance the performance of data mining for KGs with scarce resources. In real-world applications, the neighborhood structures of the same entities in different KGs tend to be non-isomorphic, which makes the representation of entities contain diverse semantic information and then poses a great challenge for CLEA. In this paper, we try to address this challenge from two perspectives. On the one hand, the cross-KG relation completion rules are designed with the alignment constraint of entities and relations to improve the topology isomorphism of two KGs. On the other hand, a representation method combining isomorphic weights is designed to include more isomorphic semantics for counterpart entities, which will benefit the CLEA. Experiments show that our model can improve the isomorphism of two KGs and the alignment performance, especially for two non-isomorphic KGs.

Keywords: knowledge graphs, cross-lingual entity alignment, non-isomorphic, relation completion

Procedia PDF Downloads 107
2674 Efficient Rehearsal Free Zero Forgetting Continual Learning Using Adaptive Weight Modulation

Authors: Yonatan Sverdlov, Shimon Ullman

Abstract:

Artificial neural networks encounter a notable challenge known as continual learning, which involves acquiring knowledge of multiple tasks over an extended period. This challenge arises due to the tendency of previously learned weights to be adjusted to suit the objectives of new tasks, resulting in a phenomenon called catastrophic forgetting. Most approaches to this problem seek a balance between maximizing performance on the new tasks and minimizing the forgetting of previous tasks. In contrast, our approach attempts to maximize the performance of the new task, while ensuring zero forgetting. This is accomplished through the introduction of task-specific modulation parameters for each task, and only these parameters are learned for the new task, after a set of initial tasks have been learned. Through comprehensive experimental evaluations, our model demonstrates superior performance in acquiring and retaining novel tasks that pose difficulties for other multi-task models. This emphasizes the efficacy of our approach in preventing catastrophic forgetting while accommodating the acquisition of new tasks.

Keywords: continual learning, life-long learning, neural analogies, adaptive modulation

Procedia PDF Downloads 53
2673 The Effectiveness of Adaptive Difficulty Adjustment in Touch Tablet App on Young Children's Spatial Problem Solving Development

Authors: Chenchen Liu, Jacques Audran

Abstract:

Using tablet apps with a certain educational purpose to promote young children’s cognitive development, is quite common now. Developing an educational app on an Ipad like tablet, especially for a young child (age 3-5) requires an optimal level of challenge to continuously attract children’s attention and obtain an educational effect. Adaptive difficulty adjustment, which could dynamically set the difficulty in the challenge according to children’s performance, seems to be a good solution. Since space concept plays an important role in young children’s cognitive development, we made an experimental comparison in a French kindergarten between one group of 23 children using an educational app ‘Debout Ludo’ with adaptive difficulty settings and another group of 20 children using the previous version of ‘Debout Ludo’ with a classic incremental difficulty adjustment. The experiment results of spatial problem solving indicated that a significantly higher learning outcome was acquired by the young children who used the adaptive version of the app.

Keywords: adaptive difficulty, spatial problem solving, tactile tablet, young children

Procedia PDF Downloads 421
2672 A Learning Automata Based Clustering Approach for Underwater ‎Sensor Networks to Reduce Energy Consumption

Authors: Motahareh Fadaei

Abstract:

Wireless sensor networks that are used to monitor a special environment, are formed from a large number of sensor nodes. The role of these sensors is to sense special parameters from ambient and to make connection. In these networks, the most important challenge is the management of energy usage. Clustering is one of the methods that are broadly used to face this challenge. In this paper, a distributed clustering protocol based on learning automata is proposed for underwater wireless sensor networks. The proposed algorithm that is called LA-Clustering forms clusters in the same energy level, based on the energy level of nodes and the connection radius regardless of size and the structure of sensor network. The proposed approach is simulated and is compared with some other protocols with considering some metrics such as network lifetime, number of alive nodes, and number of transmitted data. The simulation results demonstrate the efficiency of the proposed approach.

Keywords: clustering, energy consumption‎, learning automata, underwater sensor networks

Procedia PDF Downloads 298
2671 Poliovirus Vaccine Immunity among Chronically Malnourished Pakistani Infants: A Randomized Controlled Trial from Developing Country

Authors: Ali Faisal Saleem, Farheen Quadri, Mach Ondrej, Anita Zaidi

Abstract:

Purpose: Pakistan is the final frontier for a polio-free world. Chronic malnutrition is associated with lack of effective gut immunity, and possibly associated with poliomyelitis in children received multiple OPV. We evaluate IPV dose administered together with OPV results in higher immunogenicity and mucosal immunity compared to OPV alone in chronically malnourished infants. Methods AND Materials: A community-based, unblinded-randomized-trial, conducted in 5 peri-urban, low-middle-income households of Karachi, in infants 9-12 months. Two study groups were non-malnourished (HAZ= -2 or more) and chronic malnourished (HAZ <-2SD), with 2-arms each i) OPV and ii) OPV and IPV. Two blood specimens (2ml) at baseline and at day 28 and two stool specimens (6 gm.) at day 29 and after 7 days. All infants received a bOPV challenge dose after first stool specimen. Calculates sample size was 210 in each arm. Serological (baseline compared to 28 days post-vaccine) and mucosal immunity after one week of bOPV challenge dose were study outcomes. Results: Baseline seroprevalence in malnourished infants were low compared to non-malnourished (P1, P2 and P3 (p=<0.001). There is significant rise in antibody titer and P1 seroprevalence in Mal A and B after receiving study vaccine; much higher in Mal B. Infants randomized to bOPV + IPV study vaccine showed incremental immune response against P1 (Mal B, 92.2%; Nor B, 98.4%), P2 (Mal B, 90.4%; Nor B, 94.7%), and P3 (Mal B, 85.6% and Nor B, 93.5%) was observed. A significant proportion of infants in malnourished (P1, 13%; P2, 24%; P3, 26%) and normally nourished group (P1, 5%; P2, 11%; P3, 14%) were found to be seronegative at baseline. Infants who received BOPV + IPV as their study vaccine showed a very high seroconversion response after vaccine (p=<0.001 for P1, P2 and P3). Majority of the specimens were negative at baseline (Mal A, 2%, Mal B, 1%; Nor A, 2%; Nor B, 1%), and remains negative after bOPV challenge dose (Mal A, 8%, Mal B, 6%; Nor A, 11%; Nor B, 10%). Conclusion: Malnourished-infants have low poliovirus-seroprevalence that increased remarkably after IPV. There is less viral shedding after IPV in infants.

Keywords: chronic malnutrition, infants, IPV, OPV

Procedia PDF Downloads 384
2670 The Importance of Awareness and Appropriate Management in Inclusive Education in India

Authors: Lusia Ndahafa Nghitotelwa

Abstract:

India is a home to many languages, cultures, traditions, castes and religions. This diversity, when observed in education, appears to be challenging and difficult to manage with respect to including everyone in the educational system. But in order to achieve this, attempts to understand the complexity of the issue and find some solutions for including everyone in education has been made in India since independence, regardless of the students’ background. Despite that, the challenge is still topical. Plenty of students are left out of the system due to the lack of awareness and appropriate management of these diversities. Therefore, the present paper makes an attempt to study the awareness and management of diversity in Indian schools. Existing studies on diversity in Indian schools, along with how measures and which measures have been taken to accommodate and retain everyone in school, have been looked at, and a thorough critical analysis of findings has been narrated. It was found that a lot of efforts have been conjugated to include and educate children of all castes, religions, and linguistic backgrounds. Furthermore, the awareness of inclusive education among teachers and society members is moderate, but teachers lack the necessary skills and knowledge on how to deal with students with special educational needs in regular classes. Also, the management is aware of inclusive education, but the management does not include teachers in decision-making. Moreover, it was found that the poor management of inclusion services and retention of special needs students in Indian schools results in their poor effective integration into the workforce. Finally, the management was found to have stringent admission criteria, which has the effect of hindering some students from entering the educational system. Based on the results of the study, it is clear that the implementation of inclusive education is still a challenge in India. However, there are promising results in tackling the issue. All children should be given an opportunity to learn together with other children in order to broaden their interest and challenge their potential.

Keywords: awareness, management, inclusive education, students

Procedia PDF Downloads 214