Search results for: and understanding
6141 Early-Stage Venture Investment Model: Evidence from Saudi Arabia
Authors: Tibah Alharbi, Renzo Cordina, David Power
Abstract:
Relatively few studies have explored how venture capitalist investors (VCs) make investment decisions and the information they rely on when taking an equity stake in an investee company. In addition, little is known about how much investors monitor start-ups after the decision to invest has been made. The VC scene in the US or European context is understood better than that of developing countries such as those in the Middle East. Although some differences among VC investors have been identified, the reasons behind such differences have not been fully explored – especially in a country such as Saudi Arabia. Therefore, this research seeks to understand the impact of external factors on the VC investor’ behaviour. The unique cultural and legal environments in the Kingdom of Saudi Arabia, the growing VC sector in the country, and the increasing importance attached to start-ups under the Saudi Government’s Vision 2030 program make such an investigation timely. Ascertaining the perceptions of VC investors in such a context will provide a deeper understanding of the determinants of VC investment in a novel setting. Using semi-structured interviews with over 20 participants, the research explores the structure of VC funds, the cycle of the VC investment in a start-up from the sourcing of deals, the screening and evaluation of such deals, the closing of such deals, and finally, the monitoring of such investments before the decision to exit such deals at the appropriate time. The results show some similarities to the VC model, which characterizes such investment in the US and Europe, but several differences emerge given the unique cultural and legal settings within the Kingdom. The results provide an in-depth understanding of the VC investors’ mindset relative to the existing studies in the literature.Keywords: exit, monitoring, start-ups, venture capital
Procedia PDF Downloads 1456140 Environmental Awareness on Formal Education Level: A Program Approach through Physical Education Course
Authors: Jocelyn Floresca
Abstract:
This paper aimed to present the by-product of the introduction of environmental ecology awareness on a formal education level utilizing the program course of Physical Education, particularly in the tertiary level. It is based on the premise that the radical need for environmental protection may not only necessarily be the work of people in the pure sciences but also deemed necessary to look into more avenues of the school setting particularly in the field of Physical Education. In the Philippines, most schools’ Physical Education focuses on the advancement of sports, fitness and wellness which are mostly done in the confines of a closed building. The paper dwells into the introduction of Physical Education as an outdoor recreation activity where in the participants of the study had the opportunity to indulge in activities undertaken outside the confines of buildings and going into large areas of the environment. It looked into the individual participant’s environmental social behaviour and effects on the participant’s perceptions in terms of the set objectives of Physical Education before and after the study’s intervention. The study utilized the formal course in Physical Education on nature walks, mountaineering and bird watching as interventions to gain perceptions and understanding. The introduction of the environmental ecology activities as a formal Physical Education course has resulted in deeper awareness that led to understanding the need to protect the environment, appreciation of the value of natural areas and acquiring behaviour for a sustainable use of the environment during the practice of Physical Education. Also, prior to the introduction of environmental ecology in Physical Education as a formal study; participants have no knowledge of what dwells in the identified sites of intervention. Whereas after the study, participants were able to identify various species of birds and plants found in the sites of the study that may lead to further conservation of the particular species.Keywords: appreciation, conservation, environmental ecology, outdoor
Procedia PDF Downloads 2936139 Constructivist Grounded Theory of Intercultural Learning
Authors: Vaida Jurgile
Abstract:
Intercultural learning is one of the approaches taken to understand the cultural diversity of the modern world and to accept changes in cultural identity and otherness and the expression of tolerance. During intercultural learning, students develop their abilities to interact and communicate with their group members. These abilities help to understand social and cultural differences, to form one’s identity, and to give meaning to intercultural learning. Intercultural education recognizes that a true understanding of differences and similarities of another culture is necessary in order to lay the foundations for working together with others, which contributes to the promotion of intercultural dialogue, appreciation of diversity, and cultural exchange. Therefore, it is important to examine the concept of intercultural learning, revealed through students’ learning experiences and understanding of how this learning takes place and what significance this phenomenon has in higher education. At a scientific level, intercultural learning should be explored in order to uncover the influence of cultural identity, i.e., intercultural learning should be seen in a local context. This experience would provide an opportunity to learn from various everyday intercultural learning situations. Intercultural learning can be not only a form of learning but also a tool for building understanding between people of different cultures. The research object of the study is the process of intercultural learning. The aim of the dissertation is to develop a grounded theory of the process of learning in an intercultural study environment, revealing students’ learning experiences. The research strategy chosen in this study is a constructivist grounded theory (GT). GT is an inductive method that seeks to form a theory by applying the systematic collection, synthesis, analysis, and conceptualization of data. The targeted data collection was based on the analysis of data provided by previous research participants, which revealed the need for further research participants. During the research, only students with at least half a year of study experience, i.e., who have completed at least one semester of intercultural studies, were purposefully selected for the research. To select students, snowballing sampling was used. 18 interviews were conducted with students representing 3 different fields of sciences (social sciences, humanities, and technology sciences). In the process of intercultural learning, language expresses and embodies cultural reality and a person’s cultural identity. It is through language that individual experiences are expressed, and the world in which Others exist is perceived. The increased emphasis is placed on the fact that language conveys certain “signs’ of communication and perception with cultural value, enabling the students to identify the Self and the Other. Language becomes an important tool in the process of intercultural communication because it is only through language that learners can communicate, exchange information, and understand each other. Thus, in the process of intercultural learning, language either promotes interpersonal relationships with foreign students or leads to mutual rejection.Keywords: intercultural learning, grounded theory, students, other
Procedia PDF Downloads 656138 Bring Your Own Device Security Model in a Financial Institution of South Africa
Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren
Abstract:
This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis
Procedia PDF Downloads 316137 Fire Protection Performance of Different Industrial Intumescent Coatings for Steel Beams
Authors: Serkan Kocapinar, Gülay Altay
Abstract:
This study investigates the efficiency of two different industrial intumescent coatings which have different types of certifications, in the fire protection performance in steel beams in the case of ISO 834 fire for 2 hours. A better understanding of industrial intumescent coatings, which assure structural integrity and prevent a collapse of steel structures, is needed to minimize the fire risks in steel structures. A comparison and understanding of different fire protective intumescent coatings, which are Product A and Product B, are used as a thermal barrier between the steel components and the fire. Product A is tested according to EN 13381-8 and BS 476-20,22 and is certificated by ISO Standards. Product B is tested according to EN 13381-8 and ASTM UL-94 and is certificated by the Turkish Standards Institute (TSE). Generally, fire tests to evaluate the fire performance of steel components are done numerically with commercial software instead of experiments due to the high cost of an ISO 834 fire test in a furnace. Hence, there is a gap in the literature about the comparisons of different certificated intumescent coatings for fire protection in the case of ISO 834 fire in a furnace experiment for 2 hours. The experiment was carried out by using two 1-meter UPN 200 steel sections. Each one was coated by different industrial intumescent coatings. A furnace was used by the Turkish Standards Institute (TSE) for the experiment. The temperature of the protected steels and the inside of the furnace was measured with the help of 24 thermocouples which were applied before the intumescent coatings during the two hours for the performance of intumescent coatings by getting a temperature-time curve of steel components. FIN EC software was used to determine the critical temperatures of protected steels, and Abaqus was used for thermal analysis to get theoretical results to compare with the experimental results.Keywords: fire safety, structural steel, ABAQUS, thermal analysis, FIN EC, intumescent coatings
Procedia PDF Downloads 1036136 The Traditional Ceramics Value in the Middle East
Authors: Abdelmessih Malak Sadek Labib
Abstract:
Ceramic materials are known for their stability in harsh environments and excellent electrical, mechanical, and thermal properties. They have been widely used in various applications despite the emergence of new materials such as plastics and composites. However, ceramics are often brittle, which can lead to catastrophic failure. The fragility of ceramics and the mechanisms behind their failure have been a topic of extensive research, particularly in load-bearing applications like veneers. Porcelain, a type of traditional pottery, is commonly used in such applications. Traditional pottery consists of clay, silica, and feldspar, and the presence of quartz in the ceramic body can lead to microcracks and stress concentrations. The mullite hypothesis suggests that the strength of porcelain can be improved by increasing the interlocking of mullite needles in the ceramic body. However, there is a lack of reports on Young's moduli in the literature, leading to erroneous conclusions about the mechanical behavior of porcelain. This project aims to investigate the role of quartz and mullite on the mechanical strength of various porcelains while considering factors such as particle size, flexural strength, and fractographic forces. Research Aim: The aim of this research project is to assess the role of quartz and mullite in enhancing the mechanical strength of different porcelains. The project will also explore the effect of reducing particle size on the properties of porcelain, as well as investigate flexural strength and fractographic techniques. Methodology: The methodology for this project involves using scientific expressions and a mix of modern English to ensure the understanding of all attendees. It will include the measurement of Young's modulus and the evaluation of the mechanical behavior of porcelains through various experimental techniques. Findings: The findings of this study will provide a realistic assessment of the role of quartz and mullite in strengthening and reducing the fragility of porcelain. The research will also contribute to a better understanding of the mechanical behavior of ceramics, specifically in load-bearing applications. Theoretical Importance: The theoretical importance of this research lies in its contribution to the understanding of the factors influencing the mechanical strength and fragility of ceramics, particularly porcelain. By investigating the interplay between quartz, mullite, and other variables, this study will enhance our knowledge of the properties and behavior of traditional ceramics. Data Collection and Analysis Procedures: Data for this research will be collected through experiments involving the measurement of Young's modulus and other mechanical properties of porcelains. The effects of quartz, mullite, particle size, flexural strength, and fractographic forces will be examined and analyzed using appropriate statistical techniques and fractographic analysis. Questions Addressed: This research project aims to address the following questions: (1) How does the presence of quartz and mullite affect the mechanical strength of porcelain? (2) What is the impact of reducing particle size on the properties of porcelain? (3) How do flexural strength and fractographic forces influence the behavior of porcelains? Conclusion: In conclusion, this research project aims to enhance the understanding of the role of quartz and mullite in strengthening and reducing the fragility of porcelain. By investigating the mechanical properties of porcelains and considering factors such as particle size, flexural strength, and fractographic forces, this study will contribute to the knowledge of traditional ceramics and their potential applications. The findings will have practical implications for the use of ceramics in various fields.Keywords: stability, harsh environments, electrical, techniques, mechanical disadvantages, materials
Procedia PDF Downloads 686135 Placelessness and the Subversive Tactics of Mobility in Ernest Hemingway and Jabra Ibrahim Jabra
Authors: Ahmad Qabaha
Abstract:
This paper teases out the ways in which the constructs of placelessness and mobility are articulated in modern exilic Palestinian literature and American expatriate writing. The mode of placelessness embodied by the characters of each of my two authors (expatriation in Paris Montparnasse for Hemingway's characters and involuntary exile in Europe for Jabra's) will be elicited from the orientations of their mobility. This paper argues that the proclivity of Hemingway's characters for centrifugal motion (moving away from the centre) is a strategy to increase their sense of freedom that space (expatriation), rather than place, secures. By contrast, the movement of Jabra's characters is centripetal (moving or tending to move towards the centre). It echoes his Palestinian characters' recurrent futile attempts to return to Palestine, and it expresses their resistance to the lures of exile. This paper asserts that the involuntarily exiled character (the Palestinian in this case) is a figure obsessed with and ache for a place, roots and 'a dwelling' from which he was uprooted - a place that defines his authentic existence and frames his understanding of the world in Martin Heidegger's, Simone Weil's and Gaston Bachelard's senses. In parallel, this paper explains that the expatriate character (the American in this case) views place as confining, restrictive and disagreeable, while mobility as a figure of freedom, resistance, wealth, self-fashioning and understanding/inhabiting the world. Place in this sense is associated with past, tradition, ideology, existence and being. Mobility is equivalent with modernity, progression, innovation, self-fashioning and freedom.Keywords: American expatriate literature, exilic Palestinian literature, mobility, place, placelessness
Procedia PDF Downloads 4386134 Cybersecurity Challenges in Africa
Authors: Chimmoe Fomo Michelle Larissa
Abstract:
The challenges of cybersecurity in Africa are increasingly significant as the continent undergoes rapid digital transformation. With the rise of internet connectivity, mobile phone usage, and digital financial services, Africa faces unique cybersecurity threats. The significance of this study lies in understanding these threats and the multifaceted challenges that hinder effective cybersecurity measures across the continent. The methodologies employed in this study include a comprehensive analysis of existing cybersecurity frameworks in various African countries, surveys of key stakeholders in the digital ecosystem, and case studies of cybersecurity incidents. These methodologies aim to provide a detailed understanding of the current cybersecurity landscape, identify gaps in existing policies, and evaluate the effectiveness of implemented security measures. Major findings of the study indicate that Africa faces numerous cybersecurity challenges, including inadequate regulatory frameworks, insufficient cybersecurity awareness, and a shortage of skilled professionals. Additionally, the prevalence of cybercrime, such as financial fraud, data breaches, and ransomware attacks, exacerbates the situation. The study also highlights the role of international cooperation and regional collaboration in addressing these challenges and improving overall cybersecurity resilience. In conclusion, addressing cybersecurity challenges in Africa requires a multifaceted approach that involves strengthening regulatory frameworks, enhancing public awareness, and investing in cybersecurity education and training. The study underscores the importance of regional and international collaboration in building a robust cybersecurity infrastructure capable of mitigating the risks associated with the continent's digital growth.Keywords: Africa, cybersecurity, challenges, digital infrastructure, cybercrime
Procedia PDF Downloads 406133 DLtrace: Toward Understanding and Testing Deep Learning Information Flow in Deep Learning-Based Android Apps
Authors: Jie Zhang, Qianyu Guo, Tieyi Zhang, Zhiyong Feng, Xiaohong Li
Abstract:
With the widespread popularity of mobile devices and the development of artificial intelligence (AI), deep learning (DL) has been extensively applied in Android apps. Compared with traditional Android apps (traditional apps), deep learning based Android apps (DL-based apps) need to use more third-party application programming interfaces (APIs) to complete complex DL inference tasks. However, existing methods (e.g., FlowDroid) for detecting sensitive information leakage in Android apps cannot be directly used to detect DL-based apps as they are difficult to detect third-party APIs. To solve this problem, we design DLtrace; a new static information flow analysis tool that can effectively recognize third-party APIs. With our proposed trace and detection algorithms, DLtrace can also efficiently detect privacy leaks caused by sensitive APIs in DL-based apps. Moreover, using DLtrace, we summarize the non-sequential characteristics of DL inference tasks in DL-based apps and the specific functionalities provided by DL models for such apps. We propose two formal definitions to deal with the common polymorphism and anonymous inner-class problems in the Android static analyzer. We conducted an empirical assessment with DLtrace on 208 popular DL-based apps in the wild and found that 26.0% of the apps suffered from sensitive information leakage. Furthermore, DLtrace has a more robust performance than FlowDroid in detecting and identifying third-party APIs. The experimental results demonstrate that DLtrace expands FlowDroid in understanding DL-based apps and detecting security issues therein.Keywords: mobile computing, deep learning apps, sensitive information, static analysis
Procedia PDF Downloads 1776132 The Role of Teacher Candidates' Beliefs in Their Development of Inclusive Teaching Practices
Authors: Charlotte Brenner, Fisayo Latilo, McKenna Causey
Abstract:
This study explores the transformation of teacher candidates' beliefs regarding inclusion and inclusive teaching practices during their instructional and practicum experiences in the Canadian context. With the increasing diversity of schools, the study investigates how teacher candidates' beliefs impact their implementation of inclusive teaching practices, which are essential for meeting diverse student needs. The research examines the influence of teacher education programs, transformative learning experiences, and inclusive practicum placements on teacher candidates' beliefs about inclusion. Using a multiple case study approach, the study assesses teacher candidates' initial beliefs, documents changes in these beliefs after coursework on inclusion, and explores the supports and constraints affecting belief development in both university and practicum settings. Preliminary findings suggest that teacher candidates generally hold positive beliefs about inclusion at the outset of their teacher education programs. However, coursework and practicum experiences significantly shape their understanding of diversity, strategies for inclusion, and awareness of broader social issues related to inclusive classrooms. The research underscores the critical role of teacher education programs in shaping teacher candidates' beliefs about inclusion and highlights the value of transformative learning experiences and inclusive practicum placements in enhancing their understanding of equity and inclusion. Continued research is necessary to identify specific elements within courses and practicum experiences that promote positive beliefs about inclusive teaching practices, ultimately contributing to the creation of more equitable classrooms and improved student outcomes.Keywords: inclusion, beliefs, teacher candidates, inclusive teaching practices
Procedia PDF Downloads 716131 Analysis of Computer Science Papers Conducted by Board of Intermediate and Secondary Education at Secondary Level
Authors: Ameema Mahroof, Muhammad Saeed
Abstract:
The purpose of this study was to analyze the papers of computer science conducted by Board of Intermediate and Secondary Education with reference to Bloom’s taxonomy. The present study has two parts. First, the analysis is done on the papers conducted by Board of Intermediate of Secondary Education on the basis of basic rules of item construction especially Bloom’s (1956). And the item analysis is done to improve the psychometric properties of a test. The sample included the question papers of computer science of higher secondary classes (XI-XII) for the years 2011 and 2012. For item analysis, the data was collected from 60 students through convenient sampling. Findings of the study revealed that in the papers by Board of intermediate and secondary education the maximum focus was on knowledge and understanding level and very less focus was on the application, analysis, and synthesis. Furthermore, the item analysis on the question paper reveals that item difficulty of most of the questions did not show a balanced paper, the items were either very difficult while most of the items were too easy (measuring knowledge and understanding abilities). Likewise, most of the items were not truly discriminating the high and low achievers; four items were even negatively discriminating. The researchers also analyzed the items of the paper through software Conquest. These results show that the papers conducted by Board of Intermediate and Secondary Education were not well constructed. It was recommended that paper setters should be trained in developing the question papers that can measure various cognitive abilities of students so that a good paper in computer science should assess all cognitive abilities of students.Keywords: Bloom’s taxonomy, question paper, item analysis, cognitive domain, computer science
Procedia PDF Downloads 1506130 Effect of Surface Treatments on the Cohesive Response of Nylon 6/silica Interfaces
Authors: S. Arabnejad, D. W. C. Cheong, H. Chaobin, V. P. W. Shim
Abstract:
Debonding is the one of the fundamental damage mechanisms in particle field composites. This phenomenon gains more importance in nano composites because of the extensive interfacial region present in these materials. Understanding the debonding mechanism accurately, can help in understanding and predicting the response of nano composites as the interface deteriorates. The small length scale of the phenomenon makes the experimental characterization complicated and the results of it, far from real physical behavior. In this study the damage process in nylon-6/silica interface is examined through Molecular Dynamics (MD) modeling and simulations. The silica has been modeled with three forms of surfaces – without any surface treatment, with the surface treatment of 3-aminopropyltriethoxysilane (APTES) and with Hexamethyldisilazane (HMDZ) surface treatment. The APTES surface modification used to create functional groups on the silica surface, reacts and form covalent bonds with nylon 6 chains while the HMDZ surface treatment only interacts with both particle and polymer by non-bond interaction. The MD model in this study uses a PCFF force field. The atomic model is generated in a periodic box with a layer of vacuum on top of the polymer layer. This layer of vacuum is large enough that assures us from not having any interaction between particle and substrate after debonding. Results show that each of these three models show a different traction separation behavior. However, all of them show an almost bilinear traction separation behavior. The study also reveals a strong correlation between the length of APTES surface treatment and the cohesive strength of the interface.Keywords: debonding, surface treatment, cohesive response, separation behaviour
Procedia PDF Downloads 4606129 Diversity: Understanding Multicultural Concerns in Counseling
Authors: Zuwaira Abdullahi
Abstract:
In this increasing changing world, it is important to be aware of the needs of clients when it comes to race and ethnic diversities. These diversities create difficulties for multicultural counselling: the counsellor’s own culture, attitudes, and theoretical perspective; the client's culture; and the multiplicity of variables comprising an individual's identity. This paper examines the level of realization, sensitization and attitude of counsellors towards individuals that come from different cultural, social and economic background.Keywords: multicultural, diversities, counselling, needs
Procedia PDF Downloads 4176128 Digital Repository as a Service: Enhancing Access and Preservation of Cultural Heritage Artefacts
Authors: Lefteris Tsipis, Demosthenes Vouyioukas, George Loumos, Antonis Kargas, Dimitris Varoutas
Abstract:
The employment of technology and digitization is crucial for cultural organizations to establish and sustain digital repositories for their cultural heritage artefacts. This utilization is also essential in facilitating the presentation of cultural works and exhibits to a broader audience. Consequently, in this work, we propose a digital repository that functions as Software as a Service (SaaS), primarily promoting the safe storage, display, and sharing of cultural materials, enhancing accessibility, and fostering a deeper understanding and appreciation of cultural heritage. Moreover, the proposed digital repository service is designed as a multitenant architecture, which enables organizations to expand their reach, enhance accessibility, foster collaboration, and ensure the preservation of their content. Specifically, this project aims to assist each cultural institution in organizing its digital cultural assets into collections and feeding other digital platforms, including educational, museum, pedagogical, and games, through appropriate interfaces. Moreover, the creation of this digital repository offers a cutting-edge and effective open-access laboratory solution. It allows organizations to have a significant influence on their audiences by fostering cultural understanding and appreciation. Additionally, it facilitates the connection between different digital repositories and national/European aggregators, promoting collaboration and information sharing. By embracing this solution, cultural institutions can benefit from shared resources and features, such as system updates, backup and recovery services, and data analytics tools, that are provided by the platform.Keywords: cultural technologies, gaming technologies, web sharing, digital repository
Procedia PDF Downloads 796127 Talking to Ex-Islamic State Fighters inside Iraqi Prisons: An Arab Woman’s Perspective on Radicalization and Deradicalization
Authors: Suha Hassen
Abstract:
This research aims to untangle the complexity of conducting face-to-face interviews with 80 ex-Islamic State fighters, encompassing three groups: local Iraqis, Arabs from the Middle East, and international fighters from around the globe. Each interview lasted approximately two hours and was conducted in both Arabic and English, focusing on the motivations behind joining the Islamic State and the pathways and mechanisms facilitating their involvement. The phenomenon of individuals joining violent Islamist extremist and jihadist organizations is multifaceted, drawing substantial attention within terrorism and security studies. Organizations such as the Islamic State, Hezbollah, Hamas, and Al-Qaeda pose formidable threats to international peace and stability, employing various terrorist tactics for radicalization and recruitment. However, significant gaps remain in current studies, including a lack of firsthand accounts, an inadequate understanding of original narratives (religious and linguistic) due to abstraction and misinterpretation of motivations, and a lack of Arab women's perspectives from the region. This study addresses these gaps by exploring the cultural, religious, and historical complexities that shape the narratives of ex-ISIS fighters. The paper will showcase three distinct cases: one French prisoner, one Moroccan fighter, and a local Iraqi, illustrating the diverse motivations and experiences that contribute to joining and leaving extremist groups. The findings provide valuable insights into the nuanced dynamics of radicalization, emphasizing the need for gender-sensitive approaches in counter-terrorism strategies and deradicalization programs. Importantly, this research has practical implications for counter-narrative policies and early-stage prevention of radicalization. By understanding the narratives used by ex-fighters, policymakers can develop targeted counter-narratives that disrupt recruitment efforts. Additionally, insights into the mechanisms of radicalization can inform early intervention programs, helping to identify and support at-risk individuals before they become entrenched in extremist ideologies. Ultimately, this research enhances our understanding of the individual experiences of ex-ISIS fighters and calls for a reevaluation of the narratives surrounding women’s roles in extremism and recovery.Keywords: Arab women in extremism, counter-narrative policy, ex-ISIS fighters in Iraq, radicalization
Procedia PDF Downloads 216126 Quality of Life Assessment across the Cancer Continuum: Understanding the Role of an Exercise Rehabilitation Programme
Authors: Bernat-Carles Serdà Ferrer, Arantza Del Valle Gómez
Abstract:
The Quality of Life (QoL) paradigm is multidimensional, dynamic and modular and its definition differs across the cancer continuum. The challenge in the interpretation of QoL data in clinical research is that QoL is influenced by psychological phenomena such as adaptation to illness. This research aims to obtain a valid and sensitive assessment of QoL change over the continuum disease, and to evaluate a rehabilitation programme aimed at inverting the observed decrease in QoL when patients return to daily living activities. The sample comprised 66 men. Patients were first assessed to establish a baseline (P1-diagnosis). This was followed by a post-test (P2-discharge) and a then-test measurement (P3-retrospective evaluation) and after returning home patients were randomized in experimental and control groups. The experimental group attended a rehabilitation programme over 24 weeks (P4). Results show that from baseline to post-test, QoL decreased significantly. The recalibration then-test confirmed a low QoL in all periods evaluated. Significant differences between the experimental and control groups prove the positive effect of the Exercise Rehabilitation Programme (ERP) on QoL. Understanding the real dynamic of QoL over time would help to adapt rehabilitation programmes by improving sensitivity and efficacy and provide professionals with a more accurate perception of the impact of treatment and side effects on patients’ QoL. Our results underline the importance of changing the approach adopted by health professionals towards one of watchful waiting on patients’ QoL until their complete recovery in daily life.Keywords: exercise, prostate cancer, quality of life, rehabilitation programme, response shift
Procedia PDF Downloads 1676125 The Discovery and Application of Perspective Representation in Modern Italy
Authors: Matthias Stange
Abstract:
In the early modern period, a different image of man began to prevail in Europe. The focus was on the self-determined human being and his abilities. At first, these developments could be seen in Italian painting and architecture, which again oriented itself to the concepts and forms of antiquity. For example, through the discovery of perspective representation by Brunelleschi or later the orthogonal projection by Alberti, after the ancient knowledge of optics had been forgotten in the Middle Ages. The understanding of reality in the Middle Ages was not focused on the sensually perceptible world but was determined by ecclesiastical dogmas. The empirical part of this study examines the rediscovery and development of perspective. With the paradigm of antiquity, the figure of the architect was also recognised again - the cultural man trained theoretically and practically in numerous subjects, as Vitruvius describes him. In this context, the role of the architect, the influence on the painting of the Quattrocento as well as the influence on architectural representation in the Baroque period are examined. Baroque is commonly associated with the idea of illusionistic appearance as opposed to the tangible reality presented in the Renaissance. The study has shown that the central perspective projection developed by Filippo Brunelleschi enabled another understanding of seeing and the dissemination of painted images. Brunelleschi's development made it possible to understand the sight of nature as a reflection of what is presented to the viewer's eye. Alberti later shortened Brunelleschi's central perspective representation for practical use in painting. In early modern Italian architecture and painting, these developments apparently supported each other. The pictorial representation of architecture initially served the development of an art form before it became established in building practice itself.Keywords: Alberti, Brunelleschi, central perspective projection, orthogonal projection, quattrocento, baroque
Procedia PDF Downloads 856124 Self-Organizing Maps for Credit Card Fraud Detection
Authors: ChunYi Peng, Wei Hsuan CHeng, Shyh Kuang Ueng
Abstract:
This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities.Keywords: self-organizing map technology, fraud detection, information visualization, data analysis, composite intelligent system technologies, decision support technologies
Procedia PDF Downloads 576123 Live Music Promotion in Burundi Country
Authors: Aster Anderson Rugamba
Abstract:
Context: Live music in Burundi is currently facing neglect and a decline in popularity, resulting in artists struggling to generate income from this field. Additionally, live music from Burundi has not been able to gain traction in the international market. It is essential to establish various structures and organizations to promote cultural events and support artistic endeavors in music and performing arts. Research Aim: The aim of this research is to seek new knowledge and understanding in the field of live music and its content in Burundi. Furthermore, it aims to connect with other professionals in the industry, make new discoveries, and explore potential collaborations and investments. Methodology: The research will utilize both quantitative and qualitative research methodologies. The quantitative approach will involve a sample size of 57 musician artists in Burundi. It will employ closed-ended questions and gather quantitative data to ensure a large sample size and high external validity. The qualitative approach will provide deeper insights and understanding through open-ended questions and in-depth interviews with selected participants. Findings: The research expects to find new theories, methodologies, empirical findings, and applications of existing knowledge that can contribute to the development of live music in Burundi. By exploring the challenges faced by artists and identifying potential solutions, the study aims to establish live music as a catalyst for development and generate a positive impact on both the Burundian and international community. Theoretical Importance: Theoretical contributions of this research will expand the current understanding of the live music industry in Burundi. It will propose new theories and models to address the issues faced by artists and highlight the potential of live music as a lucrative and influential industry. By bridging the gap between theory and practice, the research aims to provide valuable insights for academics, professionals, and policymakers. Data Collection and Analysis Procedures: Data will be collected through surveys, interviews, and archival research. Surveys will be administered to the sample of 57 musician artists, while interviews will be conducted to gain in-depth insights from selected participants. The collected data will be analyzed using both quantitative and qualitative methods, including statistical analysis and thematic analysis, respectively. This mixed-method approach will ensure a comprehensive and rigorous examination of the research questions addressed.Keywords: business music in burundi, music in burundi, promotion of art, burundi music culture
Procedia PDF Downloads 616122 Implementation of Modern Information Technologies in Business to Customer Marketing Activity and the Implementation of Pro-Environmental Goals of Enterprises
Authors: M. Łęgowik-Małolepsza
Abstract:
The article discusses the problem related to the use of modern information technologies to achieve pro-environmental marketing goals in business-to-customer (B2C) relationships. The topic is important and topical due to the strong social need to implement the concept of sustainable development. The aim of the article is to understand and evaluate the possibilities of implementing modern information technologies, such as Customer Relationship Management platforms (CRM), in the area of implementing marketing activities of companies operating in the Business to Customer model. In B2C relations, marketing departments struggle with problems resulting from the need for quick customer segmentation and the fragmentation of data existing in many systems, which significantly hinders the achievement of the assumed marketing goals. Therefore, the article proposes the use of modern information technology solutions in the area of marketing activities of enterprises, taking into account their pro-environmental goals. The most important results of the research carried out include an in-depth understanding of the possibilities of implementing modern information technologies to achieve marketing goals in B2C relationships. Moreover, a better understanding of the coexistence of opportunities and threats related to the implementation of marketing activities, taking into account pro-environmental goals and modern technologies, allows for more effective implementation of sustainable development management in enterprises. The methods used to achieve the goal are literature studies, descriptive analysis, and case studies. The study contributes to the discussion on the scope of application of modern information technologies in the area of B2C marketing activity, taking into account the implementation of pro-environmental goals of enterprises.Keywords: B2C marketing activity, implementation of technologies, modern information technologies, pro-environmental activities
Procedia PDF Downloads 1046121 The Effect of Technology- facilitated Lesson Study toward Teacher’s Computer Assisted Language Learning Competencies
Authors: Yi-Ning Chang
Abstract:
With the rapid advancement of technology, it has become crucial for educators to adeptly integrate technology into their teaching and develop a robust Computer-Assisted Language Learning (CALL) competency. Addressing this need, the present study adopted a technology-based Lesson Study approach to assess its impact on the CALL competency and professional capabilities of EFL teachers. Additionally, the study delved into teachers' perceptions of the benefits derived from participating in the creation of technologically integrated lesson plans. The iterative process of technology-based Lesson Study facilitated ample peer discussion, enabling teachers to flexibly design and implement lesson plans that incorporate various technological tools. This 15-week study included 10 in- service teachers from a university of science and technology in the central of Taiwan. The collected data included pre- and post- lesson planning scores, pre- and post- TPACK survey scores, classroom observation forms, designed lesson plans, and reflective essays. The pre- and post- lesson planning and TPACK survey scores were analyzed employing a pair-sampled t test; students’ reflective essays were respectively analyzed applying content analysis. The findings revealed that the teachers’ lesson planning ability and CALL competencies were improved. Teachers perceived a better understanding of integrating technology with teaching subjects, more effective teaching skills, and a deeper understanding of technology. Pedagogical implications and future studies are also discussed.Keywords: CALL, language learning, lesson study, lesson plan
Procedia PDF Downloads 406120 The Patterns of Cross-Sentence: An Event-Related Potential Study of Mathematical Word Problem
Authors: Tien-Ching Yao, Ching-Ching Lu
Abstract:
Understanding human language processing is one of the main challenges of current cognitive neuroscience. The aims of the present study were to use a sentence decision task combined with event-related potentials to investigate the psychological reality of "cross-sentence patterns." Therefore, we take the math word problems the experimental materials and use the ERPs' P600 component to verify. In this study, the experimental material consisted of 200 math word problems with three different conditions were used ( multiplication word problems、division word problems type 1、division word problems type 2 ). Eighteen Mandarin native speakers participated in the ERPs study (14 of whom were female). The result of the grand average waveforms suggests a later posterior positivity at around 500ms - 900ms. These findings were tested statistically using repeated measures ANOVAs at the component caused by the stimulus type of different questions. Results suggest that three conditions present significant (P < 0.05) on the Mean Amplitude, Latency, and Peak Amplitude. The result showed the characteristic timing and posterior scalp distribution of a P600 effect. We interpreted these characteristic responses as the psychological reality of "cross-sentence patterns." These results provide insights into the sentence processing issues in linguistic theory and psycholinguistic models of language processing and advance our understanding of how people make sense of information during language comprehension.Keywords: language processing, sentence comprehension, event-related potentials, cross-sentence patterns
Procedia PDF Downloads 1486119 An Exploration of Organisational Elements on Social Media Platforms Based Knowledge Sharing: The Case of Higher Education Institutions in Malaysia
Authors: Nor Erlissa Abd Aziz, R. M. U. S. Udagedara, S. Sharifi
Abstract:
Managing and sharing knowledge has been a broadly satisfactory strategy to most of the organisations. Harnessing the power of knowledge supported the organisations to gain a competitive advantage over their competitors. Along with the invention of social media, knowledge sharing process has been more efficient and comfortable. Numerous researches have been conducted to investigate the effect of social media platforms for public and academic use. Furthermore, knowledge sharing, in general, have been subject to considerable n research, but research on sharing knowledge in Higher Education Institutions (HEIs) is rare. Also, it is noted that still there is a gap related to the organisational elements that contribute to the successful knowledge sharing through social media platforms. Thus, this research aims to investigate organisational elements that influence the social media platform based knowledge sharing within the context of Malaysian Higher Education Institutions (HEIs). The research used qualitative research methods to get an in-depth understanding of the subject matter. The conclusions of this study are based on interpreting the results of semi-structured interviews with academic staff from various Malaysian HEIs from the public and private sectors. Documents review will supplement the data from the interviews, and this ensures triangulation of the responses and thus increase the validity of the research. This research contributes to the literature by investigating an in-depth understanding the role of organisational elements about the social media platform based knowledge sharing in nourishing knowledge and spreading it to become better HEIs in utilising their knowledge. The proposed framework which identifies the organisational elements influences of social media platform based knowledge sharing will present as the main contribution of this research.Keywords: knowledge sharing, social media, knowledge and knowledge management
Procedia PDF Downloads 2056118 Self-Organizing Maps for Credit Card Fraud Detection and Visualization
Authors: Peng Chun-Yi, Chen Wei-Hsuan, Ueng Shyh-Kuang
Abstract:
This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities.Keywords: self-organizing map technology, fraud detection, information visualization, data analysis, composite intelligent system technologies, decision support technologies
Procedia PDF Downloads 596117 Architecture - Performance Relationship in GPU Computing - Composite Process Flow Modeling and Simulations
Authors: Ram Mohan, Richard Haney, Ajit Kelkar
Abstract:
Current developments in computing have shown the advantage of using one or more Graphic Processing Units (GPU) to boost the performance of many computationally intensive applications but there are still limits to these GPU-enhanced systems. The major factors that contribute to the limitations of GPU(s) for High Performance Computing (HPC) can be categorized as hardware and software oriented in nature. Understanding how these factors affect performance is essential to develop efficient and robust applications codes that employ one or more GPU devices as powerful co-processors for HPC computational modeling. This research and technical presentation will focus on the analysis and understanding of the intrinsic interrelationship of both hardware and software categories on computational performance for single and multiple GPU-enhanced systems using a computationally intensive application that is representative of a large portion of challenges confronting modern HPC. The representative application uses unstructured finite element computations for transient composite resin infusion process flow modeling as the computational core, characteristics and results of which reflect many other HPC applications via the sparse matrix system used for the solution of linear system of equations. This work describes these various software and hardware factors and how they interact to affect performance of computationally intensive applications enabling more efficient development and porting of High Performance Computing applications that includes current, legacy, and future large scale computational modeling applications in various engineering and scientific disciplines.Keywords: graphical processing unit, software development and engineering, performance analysis, system architecture and software performance
Procedia PDF Downloads 3636116 Hydrodynamics in Wetlands of Brazilian Savanna: Electrical Tomography and Geoprocessing
Authors: Lucas M. Furlan, Cesar A. Moreira, Jepherson F. Sales, Guilherme T. Bueno, Manuel E. Ferreira, Carla V. S. Coelho, Vania Rosolen
Abstract:
Located in the western part of the State of Minas Gerais, Brazil, the study area consists of a savanna environment, represented by sedimentary plateau and a soil cover composed by lateritic and hydromorphic soils - in the latter, occurring the deferruginization and concentration of high-alumina clays, exploited as refractory material. In the hydromorphic topographic depressions (wetlands) the hydropedogical relationships are little known, but it is observed that in times of rainfall, the depressed region behaves like a natural seasonal reservoir - which suggests that the wetlands on the surface of the plateau are places of recharge of the aquifer. The aquifer recharge areas are extremely important for the sustainable social, economic and environmental development of societies. The understanding of hydrodynamics in relation to the functioning of the ferruginous and hydromorphic lateritic soils system in the savanna environment is a subject rarely explored in the literature, especially its understanding through the joint application of geoprocessing by UAV (Unmanned Aerial Vehicle) and electrical tomography. The objective of this work is to understand the hydrogeological dynamics in a wetland (with an area of 426.064 m²), in the Brazilian savanna,as well as the understanding of the subsurface architecture of hydromorphic depressions in relation to the recharge of aquifers. The wetland was compartmentalized in three different regions, according to the geoprocessing. Hydraulic conductivity studies were performed in each of these three portions. Electrical tomography was performed on 9 lines of 80 meters in length and spaced 10 meters apart (direction N45), and a line with 80 meters perpendicular to all others. With the data, it was possible to generate a 3D cube. The integrated analysis showed that the area behaves like a natural seasonal reservoir in the months of greater precipitation (December – 289mm; January – 277,9mm; February – 213,2mm), because the hydraulic conductivity is very low in all areas. In the aerial images, geotag correction of the images was performed, that is, the correction of the coordinates of the images by means of the corrected coordinates of the Positioning by Precision Point of the Brazilian Institute of Geography and Statistics (IBGE-PPP). Later, the orthomosaic and the digital surface model (DSM) were generated, which with specific geoprocessing generated the volume of water that the wetland can contain - 780,922m³ in total, 265,205m³ in the region with intermediate flooding and 49,140m³ in the central region, where a greater accumulation of water was observed. Through the electrical tomography it was possible to identify that up to the depth of 6 meters the water infiltrates vertically in the central region. From the 8 meters depth, the water encounters a more resistive layer and the infiltration begins to occur horizontally - tending to concentrate the recharge of the aquifer to the northeast and southwest of the wetland. The hydrodynamics of the area is complex and has many challenges in its understanding. The next step is to relate hydrodynamics to the evolution of the landscape, with the enrichment of high-alumina clays, and to propose a management model for the seasonal reservoir.Keywords: electrical tomography, hydropedology, unmanned aerial vehicle, water resources management
Procedia PDF Downloads 1466115 Causes and Consequences of Unauthorized Use of Books: Readers, Authors, and Publishers' Perspective
Authors: Arūnas Gudinavičius, Vincas Grigas
Abstract:
Purpose: The current study aims to identify and explore causes and consequences of unauthorized use of books from readers’, publishers’, and authors’ points of view. The case of Lithuania also assessed, especially historical background (banned alphabet, book smuggling, theft as the social norm in Soviet times) of the country. Design/methodology/approach: Aiming for more understanding why readers, authors and publishers are using or not using technology for unauthorized access of books, technology acceptance model approach was used, a total of 30 respondents (publishers, authors and readers) were interviewed in semi-structured face-to-face interviews and thematic analysis of collected qualitative data was conducted. Interviews were coded in English with coding software for further analysis. Findings: Findings indicate that the main cause for the unauthorized use of books is a lack of legal e-book titles and acquisition options. This mainly points at publishers, however, instead of using unauthorized sources as opportunities for author promotion or marketing, they rather concentrate on the causes of unauthorized use of books which they are not in control of, including access to unauthorized sources, habits, and economic causes. Some publishers believe that the lack of legal e-book titles is the consequence of unauthorized use of book rather than its cause. Originality: This research contributed to the body of knowledge by investigating unauthorized use of books from readers’, publishers’, and authors’ points of view which renders to have a better understanding of the causes and consequences of such behavior, as well as differences between these roles. We suggest that these causes lead to the intention to use and actual use of technology which is easier to use and which gives more perceived advantages – technology for unauthorized downloading and reading of books vs legal e-book acquisition options.Keywords: digital piracy, unauthorized access, publishing industry, book reader, intellectual property rights
Procedia PDF Downloads 1716114 Evidence of Paternal Protein Provisioning During Male Pregnancy in the Seahorse, Hippocampus Abdominalis
Authors: Zoe M. G. Skalkos, Sam N. Dowland, James U. Van Dyke, Camilla. M. Whittington
Abstract:
Syngnathid fishes (seahorses, pipefishes, and seadragons) are unique because embryos develop on or in the male in a specialised brooding structure. Many seahorse species are endangered or vulnerable, while others are popular in the ornamental fish trade. Seahorses are capable of nutrient provisioning (patrotrophy) of lipids during pregnancy via their fully enclosed brood pouch. Protein is vital for gene regulation and tissue growth during embryogenesis. We tested the hypothesis that protein is paternally transported to developing embryos during pregnancy in the Australian Pot-bellied seahorse, Hippocampus abdominalis. We compared the dry masses and nitrogen content in recently fertilised H. abdominalis embryos and newborns. We calculated an updated patrotrophy index, 1.34, but without a significant difference in dry mass between the two developmental stages. There was, however, a significant increase in total protein content from recently fertilised embryos to neonates. This suggests paternal protein transport is essential for H. abdominalis embryogenesis because protein yolk reserves are depleted by embryonic metabolism, and supplementation is required. This study is the first to provide evidence for paternal protein transport during pregnancy in seahorses. It furthers our understanding of the paternal influence on embryonic development in male pregnancy and how a protein-deficient diet during pregnancy may limit the allocation of resources to embryos, reducing offspring fitness. This research contributes to a deeper understanding of the fundamental reproductive biology of seahorses, which can help improve conservation and farming production outcomes.Keywords: brood pouch, embryonic provisioning, nitrogen, parentotrophy, paternal investment, reproduction
Procedia PDF Downloads 1056113 Thematical and Critical Analysis of Answers of Saduddin Thafthazani and His Methodology in His Book Sharahul Aqaid
Authors: Muhsina Khadeeja
Abstract:
Introducing theological texts combined with philosophy will be useful in understanding the major difference between theology and philosophy and making a comparative study between these two epistemologies. SHARAHUL AQAID is one of them. Which originated in the Fourteenth century; the time was enriched with theological discourses and religious revisions. Meanwhile, visions of philosophy strengthened and its ideologies were discussed widely until it reflected on Islamic theology. Those philosophers initiated to interpretation of Islamic theology from a philosophical aspect. Some prominent Muslim theologists like Gazzali analyzed that this genre of interpretations and followed questions will threaten the existence of Islamic theology. Understanding these situations, prominent leaders defended Islamic theology through their intellectual works. SHARAHUL AQAID of SADUDDIN THATHAZANI is one of them, which is written as a commentary on UMAR NASAFI's work. The mentioned book is full of answers to the counters of philosophers and rectification of their interpretation. He adopted the philosophical method in this work rather than other methods to make philosophers understand his answers vividly. Because of that, the book is plentiful with philosophical terminologies. Common people can't grasp it without a deep reading. So, the researcher hopes that the analysis of this work will help to elaborate its meanings and make it graspable. The researcher chooses a thematical and critical analysis of the answers of SADUDDIN THAFTHAZANI in SHARAHUL AQAID and on his methodology. This analysis denotes theology and philosophy show similarities rather than contradictions. The researcher concludes this study by examining the difference between theology and philosophy, similarities and contradiction. Finally, researcher proves how both epistemologies coexist.Keywords: islamic theology, sharahul aqaid, saduddin thafthazani, philosophy
Procedia PDF Downloads 786112 Creation of a Test Machine for the Scientific Investigation of Chain Shot
Authors: Mark McGuire, Eric Shannon, John Parmigiani
Abstract:
Timber harvesting increasingly involves mechanized equipment. This has increased the efficiency of harvesting, but has also introduced worker-safety concerns. One such concern arises from the use of harvesters. During operation, harvesters subject saw chain to large dynamic mechanical stresses. These stresses can, under certain conditions, cause the saw chain to fracture. The high speed of harvester saw chain can cause the resulting open chain loop to fracture a second time due to the dynamic loads placed upon it as it travels through space. If a second fracture occurs, it can result in a projectile consisting of one-to-several chain links. This projectile is referred to as a chain shot. It has speeds similar to a bullet but typically has greater mass and is a significant safety concern. Numerous examples exist of chain shots penetrating bullet-proof barriers and causing severe injury and death. Improved harvester-cab barriers can help prevent injury however a comprehensive scientific understanding of chain shot is required to consistently reduce or prevent it. Obtaining this understanding requires a test machine with the capability to cause chain shot to occur under carefully controlled conditions and accurately measure the response. Worldwide few such test machine exist. Those that do focus on validating the ability of barriers to withstand a chain shot impact rather than obtaining a scientific understanding of the chain shot event itself. The purpose of this paper is to describe the design, fabrication, and use of a test machine capable of a comprehensive scientific investigation of chain shot. The capabilities of this machine are to test all commercially-available saw chains and bars at chain tensions and speeds meeting and exceeding those typically encountered in harvester use and accurately measure the corresponding key technical parameters. The test machine was constructed inside of a standard shipping container. This provides space for both an operator station and a test chamber. In order to contain the chain shot under any possible test conditions, the test chamber was lined with a base layer of AR500 steel followed by an overlay of HDPE. To accommodate varying bar orientations and fracture-initiation sites, the entire saw chain drive unit and bar mounting system is modular and capable of being located anywhere in the test chamber. The drive unit consists of a high-speed electric motor with a flywheel. Standard Ponsse harvester head components are used to bar mounting and chain tensioning. Chain lubrication is provided by a separate peristaltic pump. Chain fracture is initiated through ISO standard 11837. Measure parameters include shaft speed, motor vibration, bearing temperatures, motor temperature, motor current draw, hydraulic fluid pressure, chain force at fracture, and high-speed camera images. Results show that the machine is capable of consistently causing chain shot. Measurement output shows fracture location and the force associated with fracture as a function of saw chain speed and tension. Use of this machine will result in a scientific understanding of chain shot and consequently improved products and greater harvester operator safety.Keywords: chain shot, safety, testing, timber harvesters
Procedia PDF Downloads 152