Search results for: computer confidence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3402

Search results for: computer confidence

2712 The Importance of Adopting Sustainable Practices in Power Projects

Authors: Sikander Ali Abbassi, Wazir Muhmmad Laghari, Bashir Ahmed Laghari

Abstract:

Attaining sustainable development is one of the greatest challenges facing Pakistan today. A challenge that can only be met by developing and deploying confidence among the people. Transparency in project activities at all stages and other measures will also enhance its social and economic growth. Adopting sustainable practices and sensible policies, we mean that project activity should be economically viable, socially acceptable and environment friendly. In order to achieve this objective, there must be a continued commitment to encourage and ensure the public participation in development of power projects. Since Pakistan is an energy deficient country, it has to initiate power projects on a large scale in the near future. Therefore, it is the need of the hour to tackle these projects in a sustainable way, so that it can be benefited to the maximum possible level and have the least adverse effects on people and the environment. In order to get desirable results, careful planning, efficient implementation, standardized operational practices and community participation are the key parameters which ensure the positive impacts on economy, prosperity and the well being of our people. This paper pinpoints the potential environmental hazards due to project activity and emphasizes to adopt sustainable approaches in power projects.

Keywords: environmental hazards, sustainable practices, environment friendly, power projects

Procedia PDF Downloads 379
2711 Dialogic Approaches to Writing Pedagogy

Authors: Yael Leibovitch

Abstract:

Teaching academic writing is a source of concern for secondary schools. Many students struggle to meet the basic standards of literacy while teacher confidence in this arena remains low. These issues are compounded by the conventionally prescriptive character of writing instruction, which fails to engage student writers. At the same time, a growing body of research on dialogic teaching has highlighted the powerful role of talk in student learning. With the intent of enhancing pedagogical capability, this paper shares finding from a co-inquiry case study that investigated how teachers think about and negotiate classroom discourse to position students as effective academic writers and thinkers. Using a range of qualitative methods, this project closely documents the iterative collaboration of educators as they sought to create more opportunities for dialogic engagement. More specifically, it triangulates both teacher and student data regarding the efficacy of interdependent thinking and collaborative reasoning as organizing principals for literacy learning. Findings indicate that a dialogic teaching repertoire helps to develop the cognitive and metacognitive skills of adolescent writers. In addition, they underscore the importance of sustained professional collaboration to the uptake of new writing pedagogies.

Keywords: dialogic teaching, writing, teacher professional development, student literacy

Procedia PDF Downloads 209
2710 A South African Perspective on Self-Leadership Development for Women Engineering Students – A Pilot Study

Authors: A. S. Lourens, B. Du Plooy

Abstract:

Across the world, initiatives have been introduced to encourage women to enter into and remain in engineering fields. However, research has shown that many women leave engineering or suffer a loss of self-esteem and self-confidence compared to their male counterparts. To address this problem, a South African comprehensive university developed a self-leadership intervention pilot study in 2013, aimed at improving the self-efficacy of its female engineering students and increasing retention rates. This paper is a qualitative, descriptive, and interpretive study of the rationale and operational aspects of the Women in Engineering Leadership Association’s (WELA) self-leadership workshop. The objectives of this paper are to provide a framework for the design of a self-leadership workshop and to provide insight into the process of developing such a workshop specifically for women engineering students at a South African university. Finally, the paper proposes an evaluation process for the pilot workshop, which also provides a framework to improve future workshops. It is anticipated that the self-leadership development framework will be applicable to other higher education institutions wishing to improve women engineering student’s feelings of self-efficacy and therefore retention rates of women in engineering.

Keywords: co-curricular interventions, self-efficacy, self-leadership, women in engineering

Procedia PDF Downloads 440
2709 Numerical Modeling for Water Engineering and Obstacle Theory

Authors: Mounir Adal, Baalal Azeddine, Afifi Moulay Larbi

Abstract:

Numerical analysis is a branch of mathematics devoted to the development of iterative matrix calculation techniques. We are searching for operations optimization as objective to calculate and solve systems of equations of order n with time and energy saving for computers that are conducted to calculate and analyze big data by solving matrix equations. Furthermore, this scientific discipline is producing results with a margin of error of approximation called rates. Thus, the results obtained from the numerical analysis techniques that are held on computer software such as MATLAB or Simulink offers a preliminary diagnosis of the situation of the environment or space targets. By this we can offer technical procedures needed for engineering or scientific studies exploitable by engineers for water.

Keywords: numerical analysis methods, obstacles solving, engineering, simulation, numerical modeling, iteration, computer, MATLAB, water, underground, velocity

Procedia PDF Downloads 456
2708 Treatment Performance of Waste Stabilization Ponds: A Look at Physic-Chemical Parameters in Ghana

Authors: Emmanuel Adu-Ofori, Richard Amfo-Otu, Isaac O. A. Hodgson

Abstract:

The study was conducted to determine the treatment performance of waste stabilization ponds in Akosombo. A total of 15 samples were taken for four consecutive months from the inlet, facultative pond and outlet of maturation pond. The samples were preserved and transported to Water Research Institute for laboratory analysis. The wastewater quality parameters analysed to assess the treatment performance were total suspended solids (TSS), biochemical oxygen demand (BOD), chemical oxygen demand (COD), ammonia and phosphate. The results of the laboratory analysis showed that the ponds achieved TSS, BOD and COD removals of about 30, 82 and 75 per cent respectively. Statistically, the BOD (t = 10.27, p = 6.68 x 10-6) and COD (t = 4.23, p = 0.0029) of the raw sewage were significantly different from the total effluent at 95% confidence interval. The ammonia and phosphate removal was as high as 92% and 84% respectively. The quality parameters analysed for the final effluent from the Waste Stabilisation Pond was within the EPA guideline values. The general treatment performances were very good with respect to the parameters studied and does not pose threat to the receiving water body. A further study to examine the bacteriological treatment performance was recommended.

Keywords: waste stabilization pond, wast water, treatment performance, nutrient, Ghana

Procedia PDF Downloads 315
2707 Skills Development: The Active Learning Model of a French Computer Science Institute

Authors: N. Paparisteidi, D. Rodamitou

Abstract:

This article focuses on the skills development and path planning of students studying computer science in EPITECH: french private institute of Higher Education. The researchers examine students’ points of view and experience in a blended learning model based on a skills development curriculum. The study is based on the collection of four main categories of data: semi-participant observation, distribution of questionnaires, interviews, and analysis of internal school databases. The findings seem to indicate that a skills-based program on active learning enables students to develop their learning strategies as well as their personal skills and to actively engage in the creation of their career path and contribute to providing additional information to curricula planners and decision-makers about learning design in higher education.

Keywords: active learning, blended learning, higher education, skills development

Procedia PDF Downloads 98
2706 Parameters Tuning of a PID Controller on a DC Motor Using Honey Bee and Genetic Algorithms

Authors: Saeid Jalilzadeh

Abstract:

PID controllers are widely used to control the industrial plants because of their robustness and simple structures. Tuning of the controller's parameters to get a desired response is difficult and time consuming. With the development of computer technology and artificial intelligence in automatic control field, all kinds of parameters tuning methods of PID controller have emerged in endlessly, which bring much energy for the study of PID controller, but many advanced tuning methods behave not so perfect as to be expected. Honey Bee algorithm (HBA) and genetic algorithm (GA) are extensively used for real parameter optimization in diverse fields of study. This paper describes an application of HBA and GA to the problem of designing a PID controller whose parameters comprise proportionality constant, integral constant and derivative constant. Presence of three parameters to optimize makes the task of designing a PID controller more challenging than conventional P, PI, and PD controllers design. The suitability of the proposed approach has been demonstrated through computer simulation using MATLAB/SIMULINK.

Keywords: controller, GA, optimization, PID, PSO

Procedia PDF Downloads 537
2705 Comparing Student Performance on Paper-Based versus Computer-Based Formats of Standardized Tests

Authors: Jin Koo

Abstract:

During the coronavirus pandemic, there has been a further increasing demand for computer-based tests (CBT), and now it has become an important test mode. The main purpose of this study is to investigate the comparability of student scores obtained from computerized-based formats of a standardized test in the two subject areas of reading and mathematics. Also, this study investigates whether there is an interaction effect between test modes of CBT and paper-based tests (PBT) and gender/ability level in each subject area. The test used in this study is a multiple-choice standardized test for students in grades 8-11. For this study, data were collected during four test administrations: 2015-16, 2017-18, and 2020-21. This research used a one-factor between-subjects ANOVA to compute the PBT and CBT groups’ test means for each subject area (reading and mathematics). Also, 2-factor between-subjects ANOVAs were conducted to investigate examinee characteristics: gender (male and female), ethnicity (African-American, Asian, Hispanic, multi-racial, and White), and ability level (low, average, and high-ability groups). The author found that students’ test scores in the two subject areas varied across CBT and PBT by gender and ability level, meaning that gender, ethnicity, and ability level were related to the score difference. These results will be discussed according to the current testing systems. In addition, this study’s results will open up to school teachers and test developers the possible influence that gender, ethnicity, and ability level have on a student’s score based on whether they take the CBT or PBT.

Keywords: ability level, computer-based, gender, paper-based, test

Procedia PDF Downloads 95
2704 Probabilistic Safety Assessment of Koeberg Spent Fuel Pool

Authors: Sibongiseni Thabethe, Ian Korir

Abstract:

The effective management of spent fuel pool (SFP) safety has been raised as one of the emerging issues to further enhance nuclear installation safety after the Fukushima accident on March 11, 2011. Before then, SFP safety-related issues have been mainly focused on (a) controlling the configuration of the fuel assemblies in the pool with no loss of pool coolants and (b) ensuring adequate pool storage space to prevent fuel criticality owing to chain reactions of the fission products and the ability for neutron absorption to keep the fuel cool. A probabilistic safety (PSA) assessment was performed using the systems analysis program for hands-on integrated reliability evaluations (SAPHIRE) computer code. Event and fault tree analysis was done to develop a PSA model for the Koeberg SFP. We present preliminary PSA results of events that lead to boiling and cause fuel uncovering, resulting in possible fuel damage in the Koeberg SFP.

Keywords: computer code, fuel assemblies, probabilistic risk assessment, spent fuel pool

Procedia PDF Downloads 163
2703 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 196
2702 Analysis of Matching Pursuit Features of EEG Signal for Mental Tasks Classification

Authors: Zin Mar Lwin

Abstract:

Brain Computer Interface (BCI) Systems have developed for people who suffer from severe motor disabilities and challenging to communicate with their environment. BCI allows them for communication by a non-muscular way. For communication between human and computer, BCI uses a type of signal called Electroencephalogram (EEG) signal which is recorded from the human„s brain by means of an electrode. The electroencephalogram (EEG) signal is an important information source for knowing brain processes for the non-invasive BCI. Translating human‟s thought, it needs to classify acquired EEG signal accurately. This paper proposed a typical EEG signal classification system which experiments the Dataset from “Purdue University.” Independent Component Analysis (ICA) method via EEGLab Tools for removing artifacts which are caused by eye blinks. For features extraction, the Time and Frequency features of non-stationary EEG signals are extracted by Matching Pursuit (MP) algorithm. The classification of one of five mental tasks is performed by Multi_Class Support Vector Machine (SVM). For SVMs, the comparisons have been carried out for both 1-against-1 and 1-against-all methods.

Keywords: BCI, EEG, ICA, SVM

Procedia PDF Downloads 271
2701 On the Development of Medical Additive Manufacturing in Egypt

Authors: Khalid Abdelghany

Abstract:

Additive Manufacturing (AM) is the manufacturing technology that is used to fabricate fast products direct from CAD models in very short time and with minimum operation steps. Jointly with the advancement in medical computer modeling, AM proved to be a very efficient tool to help physicians, orthopedic surgeons and dentists design and fabricate patient-tailored surgical guides, templates and customized implants from the patient’s CT / MRI images. AM jointly with computer-assisted designing/computer-assisted manufacturing (CAD/CAM) technology have enabled medical practitioners to tailor physical models in a patient-and purpose-specific fashion and helped to design and manufacture of templates, appliances and devices with a high range of accuracy using biocompatible materials. In developing countries, there are some technical and financial limitations of implementing such advanced tools as an essential portion of medical applications. CMRDI institute in Egypt has been working in the field of Medical Additive Manufacturing since 2003 and has assisted in the recovery of hundreds of poor patients using these advanced tools. This paper focuses on the surgical and dental use of 3D printing technology in Egypt as a developing country. The presented case studies have been designed and processed using the software tools and additive manufacturing machines in CMRDI through cooperative engineering and medical works. Results showed that the implementation of the additive manufacturing tools in developed countries is successful and could be economical comparing to long treatment plans.

Keywords: additive manufacturing, dental and orthopeadic stents, patient specific surgical tools, titanium implants

Procedia PDF Downloads 309
2700 The Cases Studies of Eyewitness Misidentifications during Criminal Investigation in Taiwan

Authors: Chih Hung Shih

Abstract:

Eyewitness identification is one of the efficient information to identify suspects during criminal investigation. However eyewitness identification is improved frequently, inaccurate and plays vital roles in wrongful convictions. Most eyewitness misidentifications are made during police criminal investigation stage and then accepted by juries. Four failure investigation case studies in Taiwan are conduct to demonstrate how misidentifications are caused during the police investigation context. The result shows that there are several common grounds among these cases: (1) investigators lacked for knowledge about eyewitness memory so that they couldn’t evaluate the validity of the eyewitnesses’ accounts and identifications, (2) eyewitnesses were always asked to filter out several suspects during the investigation, and received investigation information which contaminated the eyewitnesses’ memory, (3) one to one live individual identifications were made in most of cases, (4) eyewitness identifications were always used to support the hypotheses of investigators, and exaggerated theirs powers when conform with the investigation lines, (5) the eyewitnesses’ confidence didn’t t reflect the validity of their identifications , but always influence the investigators’ beliefs for the identifications, (6) the investigators overestimated the power of the eyewitness identifications and ignore the inconsistency with other evidence. Recommendations have been proposed for future academic research and police practice of eyewitness identification in Taiwan.

Keywords: criminal investigation, eyewitness identification, investigative bias, investigative failures

Procedia PDF Downloads 239
2699 Lab Support: A Computer Laboratory Class Management Support System

Authors: Eugenia P. Ramirez, Kevin Matthe Caramancion, Mia Eleazar

Abstract:

Getting the attention of students is a constant challenge to the instructors/lecturers. Although in the computer laboratories some networking and entertainment websites are blocked, yet, these websites have unlimited ways of attracting students to get into it. Thus, when an instructor gives a specific set of instructions, some students may not be able to follow sequentially the steps that are given. The instructor has to physically go to the specific remote terminal and show the student the details. Sometimes, during an examination in laboratory set-up, a proctor may prefer to give detailed and text-written instructions rather than verbal instructions. Even the mere calling of a specific student at any time will distract the whole class especially when activities are being performed. What is needed is : An application software that is able to lock the student's monitor and at the same time display the instructor’s screen; a software that is powerful enough to process in its side alone and manipulate a specific user’s terminal in terms of free configuration that is, without restrictions at the server level is a required functionality for a modern and optimal server structure; a software that is able to send text messages to students, per terminal or in group will be a solution. These features are found in LabSupport. This paper outlines the LabSupport application software framework to efficiently manage computer laboratory sessions and will include different modules: screen viewer, demonstration mode, monitor locking system, text messaging, and class management. This paper's ultimate aim is to provide a system that increases instructor productivity.

Keywords: application software, broadcast messaging, class management, locking system

Procedia PDF Downloads 436
2698 Activation of Google Classroom Features to Engage Introvert Students in Comprehensible Output

Authors: Raghad Dwaik

Abstract:

It is well known in language acquisition literature that a mere understanding of a reading text is not enough to help students build proficiency in comprehension. Students should rather follow understanding by attempting to express what has been understood by pushing their competence to the limit. Learners' attempt to push their competence was given the term "comprehensible output" by Swain (1985). Teachers in large classes, however, find it sometimes difficult to give all students a chance to communicate their views or to share their ideas during the short class time. In most cases, students who are outgoing dominate class discussion and get more opportunities for practice which leads to ignoring the shy students totally while helping the good ones become better. This paper presents the idea of using Google Classroom features of posting and commenting to allow students who hesitate to participate in class discussions about a reading text to write their views on the wall of a Google Classroom and share them later after they have received feedback and comments from classmates. Such attempts lead to developing their proficiency through additional practice in comprehensible output and to enhancing their confidence in themselves and their views. It was found that virtual classroom interaction would help students maintain vocabulary, use more complex structures and focus on meaning besides form.

Keywords: learning groups, reading TESOL, Google Classroom, comprehensible output

Procedia PDF Downloads 70
2697 Effect of Hill Interval Training on VO₂ Max among Filed Hockey Players

Authors: Sujay Bisht

Abstract:

The purpose of the study was to evaluate and find out the effect of Hill interval training on VO₂ MAX among field Hockey players. Thirty male field hockey players were selected from LNIPE, Guwahati who were studied in B.P.Ed course. The selected subjects were aged between 18 to 23 years. The VO₂ MAX was calculated and they were divided into two group. One group (N=15) considered as control group that did not participated in any special training apart from regular scheduled/curriculum and another group (N=15) considered as an experimental group which underwent four week Hill Training program. The selected criterion variable such VO₂ Max was measured by the cooper 12min/run/walk test and scores was recorded in ml/kg/min. The subjects were tested on selected criterion variable such as VO₂ Max prior and immediately after the training program. The pretest and posttest data were evaluate by the Analysis of Covariance (ANCOVA) to find out the significance difference if any between the experimental and control group on selected criterion variable. The level of significance was set at 0.05 level of confidence. After applied ANCOVA it was revealed that there was a significant different among the experimental and control group on VO₂ Max. Finally it was concluded that 4 week of Hill interval training effect the VO₂ max performance of field hockey players.

Keywords: VO₂ max, hill interval training, ANCOVA, experimental group

Procedia PDF Downloads 214
2696 Hand Detection and Recognition for Malay Sign Language

Authors: Mohd Noah A. Rahman, Afzaal H. Seyal, Norhafilah Bara

Abstract:

Developing a software application using an interface with computers and peripheral devices using gestures of human body such as hand movements keeps growing in interest. A review on this hand gesture detection and recognition based on computer vision technique remains a very challenging task. This is to provide more natural, innovative and sophisticated way of non-verbal communication, such as sign language, in human computer interaction. Nevertheless, this paper explores hand detection and hand gesture recognition applying a vision based approach. The hand detection and recognition used skin color spaces such as HSV and YCrCb are applied. However, there are limitations that are needed to be considered. Almost all of skin color space models are sensitive to quickly changing or mixed lighting circumstances. There are certain restrictions in order for the hand recognition to give better results such as the distance of user’s hand to the webcam and the posture and size of the hand.

Keywords: hand detection, hand gesture, hand recognition, sign language

Procedia PDF Downloads 301
2695 Toxicity Depletion Rates of Water Lettuce (Pistia stratoites) in an Aquaculture Effluent Hydroponic System

Authors: E. A. Kiridi, A. O. Ogunlela

Abstract:

The control of ammonia build-up and its by-product is a limiting factor for a successful commercial aquaculture in a developing country like Nigeria. The technology for an advanced treatment of fish tank effluent is uneconomical to local fish farmers which have led to indiscriminate disposal of aquaculture wastewater, thereby increasing the concentrations of these nitrogenous compound and other contaminants in surface and groundwater above the permissible level. Phytoremediation using water lettuce could offer cheaper and sustainable alternative. On the first day of experimentation, approximately 100 g of water lettuce were replicated in four hydroponic units containing aquaculture effluents. The water quality parameters measured were concentration of ammonium–nitrogen (NH4+-N), nitrite-nitrogen (NO2--N), nitrate-nitrogen (NO3--N), and phosphate–phosphorus (PO43--P). Others were total suspended solids (TSS), pH, electrical conductivity (EC), and biomass value. At phytoremediation intervals of 7, 14, 21 and 28 days, the biomass recorded were 361.2 g, 498.7 g, 561.2 g, and 623.7 g. Water lettuce was able to reduce the pollutant concentration of all the selected parameter. The percentage reduction of pH ranged from 3.9% to 14.4%, EC from 49.8% to 96.2%, TDS from 50.4% to 96.2%, TSS from 38.3% to 81.7%, NH4+-N from 38.9% to 90.7%, NO2--N from 0% to 74.9%, NO3--N from 63.2% to 95.9% and PO43--P from 0% to 76.3%. At 95% confidence level, the analysis of variance shows that F(critical) is less than F(cal) and p < 0.05; therefore, it can be concluded statistically that the inequality between the pre-treatment and post-treatment values are significant. This suggests the potency of water lettuce for remediation of aquaculture effluent.

Keywords: aquaculture effluent, nitrification, phytoremediation, water lettuce

Procedia PDF Downloads 205
2694 On Cloud Computing: A Review of the Features

Authors: Assem Abdel Hamed Mousa

Abstract:

The Internet of Things probably already influences your life. And if it doesn’t, it soon will, say computer scientists; Ubiquitous computing names the third wave in computing, just now beginning. First were mainframes, each shared by lots of people. Now we are in the personal computing era, person and machine staring uneasily at each other across the desktop. Next comes ubiquitous computing, or the age of calm technology, when technology recedes into the background of our lives. Alan Kay of Apple calls this "Third Paradigm" computing. Ubiquitous computing is essentially the term for human interaction with computers in virtually everything. Ubiquitous computing is roughly the opposite of virtual reality. Where virtual reality puts people inside a computer-generated world, ubiquitous computing forces the computer to live out here in the world with people. Virtual reality is primarily a horse power problem; ubiquitous computing is a very difficult integration of human factors, computer science, engineering, and social sciences. The approach: Activate the world. Provide hundreds of wireless computing devices per person per office, of all scales (from 1" displays to wall sized). This has required new work in operating systems, user interfaces, networks, wireless, displays, and many other areas. We call our work "ubiquitous computing". This is different from PDA's, dynabooks, or information at your fingertips. It is invisible; everywhere computing that does not live on a personal device of any sort, but is in the woodwork everywhere. The initial incarnation of ubiquitous computing was in the form of "tabs", "pads", and "boards" built at Xerox PARC, 1988-1994. Several papers describe this work, and there are web pages for the Tabs and for the Boards (which are a commercial product now): Ubiquitous computing will drastically reduce the cost of digital devices and tasks for the average consumer. With labor intensive components such as processors and hard drives stored in the remote data centers powering the cloud , and with pooled resources giving individual consumers the benefits of economies of scale, monthly fees similar to a cable bill for services that feed into a consumer’s phone.

Keywords: internet, cloud computing, ubiquitous computing, big data

Procedia PDF Downloads 377
2693 Identifying the Goals of a Multicultural Curriculum for the Primary Education Course

Authors: Fatemeh Havas Beigi

Abstract:

The purpose of this study is to identify the objectives of a multicultural curriculum for the primary education period from the perspective of ethnic teachers and education experts and cultural professionals. The research paradigm is interpretive, the research approach is qualitative, the research strategy is content analysis, the sampling method is purposeful and it is a snowball, and the sample of informants in the research for Iranian ethnic teachers and experts until the theoretical saturation was estimated to be 67 people. The data collection tools used were based on semi-structured interviews and individual interviews and focal interviews were used to collect information. The data format was also in audio format and the first period coding and the second coding were used to analyze the data. Based on data analysis 11 Objective: Paying attention to ethnic equality, expanding educational opportunities and justice, peaceful coexistence, anti-ethnic and racial discrimination education, paying attention to human value and dignity, accepting religious diversity, getting to know ethnicities and cultures, promoting teaching-learning, fostering self-confidence, building national unity, and developing cultural commonalities for a multicultural curriculum were identified.

Keywords: objective, multicultural curriculum, connect, elementary education period

Procedia PDF Downloads 91
2692 Enhancing Fall Detection Accuracy with a Transfer Learning-Aided Transformer Model Using Computer Vision

Authors: Sheldon McCall, Miao Yu, Liyun Gong, Shigang Yue, Stefanos Kollias

Abstract:

Falls are a significant health concern for older adults globally, and prompt identification is critical to providing necessary healthcare support. Our study proposes a new fall detection method using computer vision based on modern deep learning techniques. Our approach involves training a trans- former model on a large 2D pose dataset for general action recognition, followed by transfer learning. Specifically, we freeze the first few layers of the trained transformer model and train only the last two layers for fall detection. Our experimental results demonstrate that our proposed method outperforms both classical machine learning and deep learning approaches in fall/non-fall classification. Overall, our study suggests that our proposed methodology could be a valuable tool for identifying falls.

Keywords: healthcare, fall detection, transformer, transfer learning

Procedia PDF Downloads 128
2691 Neural Style Transfer Using Deep Learning

Authors: Shaik Jilani Basha, Inavolu Avinash, Alla Venu Sai Reddy, Bitragunta Taraka Ramu

Abstract:

We can use the neural style transfer technique to build a picture with the same "content" as the beginning image but the "style" of the picture we've chosen. Neural style transfer is a technique for merging the style of one image into another while retaining its original information. The only change is how the image is formatted to give it an additional artistic sense. The content image depicts the plan or drawing, as well as the colors of the drawing or paintings used to portray the style. It is a computer vision programme that learns and processes images through deep convolutional neural networks. To implement software, we used to train deep learning models with the train data, and whenever a user takes an image and a styled image, the output will be as the style gets transferred to the original image, and it will be shown as the output.

Keywords: neural networks, computer vision, deep learning, convolutional neural networks

Procedia PDF Downloads 82
2690 Students' Perception of Virtual Learning Environment (VLE) Skills in Setting up the Simulator Welding Technology

Authors: Mohd Afif Md Nasir, Faizal Amin Nur Yunus, Jamaluddin Hashim, Abd Samad Hassan Basari, A. Halim Sahelan

Abstract:

The aim of this study is to identify the suitability of Virtual Learning Environment (VLE) in welding simulator application towards Computer-Based Training (CBT) in developing skills upon new students at the Advanced Technology Training Center (ADTEC), Batu Pahat, Johor, Malaysia and GIATMARA, Batu Pahat, Johor, Malaysia. The purpose of the study is to create a computer-based skills development approach in welding technology among new students in ADTEC and GIATMARA, as well as cultivating the elements of general skills among them. This study is also important in elevating the number of individual knowledge workers (K-workers) working in manufacturing industry in order to achieve a national vision which is to be an industrial nation in the year of 2020. The design of the study is a survey type of research which uses questionnaires as the instruments and 136 students from ADTEC and GIATMARA were interviewed. Descriptive analysis is used to identify the frequency and mean values. The findings of the study shows that the welding technology skills have developed in the students as a result of the application of VLE simulator at a high level and the respondents agreed that the skills could be embedded through the application of the VLE simulator. In summary, the VLE simulator is suitable in welding skills development training in terms of exposing new students with the relevant characteristics of welding skills and at the same time spurring the students’ interest towards learning more about the skills.

Keywords: computer-based training (CBT), knowledge workers (K-workers), virtual learning environment, welding simulator, welding technology

Procedia PDF Downloads 343
2689 Musical Composition by Computer with Inspiration from Files of Different Media Types

Authors: Cassandra Pratt Romero, Andres Gomez de Silva Garza

Abstract:

This paper describes a computational system designed to imitate human inspiration during musical composition. The system is called MIS (Musical Inspiration Simulator). The MIS system is inspired by media to which human beings are exposed daily (visual, textual, or auditory) to create new musical compositions based on the emotions detected in said media. After building the system we carried out a series of evaluations with volunteer users who used MIS to compose music based on images, texts, and audio files. The volunteers were asked to judge the harmoniousness and innovation in the system's compositions. An analysis of the results points to the difficulty of computational analysis of the characteristics of the media to which we are exposed daily, as human emotions have a subjective character. This observation will direct future improvements in the system.

Keywords: human inspiration, musical composition, musical composition by computer, theory of sensation and human perception

Procedia PDF Downloads 171
2688 Interconnected Market Hypothesis: A Conceptual Model of Individualistic, Information-Based Interconnectedness

Authors: James Kinsella

Abstract:

There is currently very little understanding of how the interaction between in- vestors, consumers, the firms (agents) affect a) the transmission of information, and b) the creation and transfer of value and wealth between these two groups. Employing scholarly ideas from multiple research areas (behavioural finance, emotional finance, econo-biology, and game theory) we develop a conceptual the- oretic model (the ‘bow-tie’ model) as a framework for considering this interaction. Our bow-tie model views information transfer, value and wealth creation, and transfer through the lens of “investor-consumer connection facilitated through the communicative medium of the ‘firm’ (agents)”. We confront our bow-tie model with theoretical and practical examples. Next, we utilise consumer and business confidence data alongside index data, to conduct quantitative analy- sis, to support our bow-tie concept, and to introduce the concept of “investor- consumer connection”. We highlight the importance of information persuasiveness, knowledge, and emotional categorization of characteristics in facilitating a communicative relationship between investors, consumers, and the firm (agents), forming academic and practical applications of the conceptual bow-tie model, alongside applications to wider instances, such as those seen within the Covid-19 pandemic.

Keywords: behavioral finance, emotional finance, economy-biology, social mood

Procedia PDF Downloads 120
2687 Thyroid Hormones and Thyrotropin Status in Nepalese Postmenopausal Women

Authors: S. A. Khan, B. Mishra, O. Sherchan

Abstract:

Background and Aims: Thyroid disorder is the most common endocrine disorder after diabetes mellitus. Females are more vulnerable to this disease, and old age is an important risk factor. This study was undertaken to investigate the burden of thyroid disorder in Nepalese postmenopausal women. Methods: In the present cross-sectional study, we included 271 post-menopausal women. Three ml of blood was collected following standard protocol after taking the written consent. Serum was separated and analyzed for free T3, free T4, and Thyroid Stimulating Hormone (TSH) by Chemiluminescence Immunoassay (CLIA) method in Snibe Maglumi 1000 analyzer. Data obtained was analyzed in SPSS Version 21. P < 0.05 was set for statistical significant at 95% Confidence Interval (CI). Results: Majority of the participants belong to Janjati (46.5%) ethnicity, followed by Brahmin/Chhetri (41.7%), residing either in urban or suburban locality. Most of them were non-vegetarian, non-smoker, and non-alcoholic. Subjects were divided into hyperthyroid (TSH < 0.3 uIU/ml), hypothyroid (TSH > 4.5 uIU/ml), and euthyroid (TSH=0.3-4.5 uIU/ml) based on TSH value. We reported 10.3% hyperthyroid and 29.2% hypothyroid cases. TSH was significantly correlated with T3 (r=-0.244; p < 0.001) T4 (r=-0.398; p < 0.001); age (r=-0.138; p=0.023) and BMI (r=0.123; p=0.043). Multiple linear regression model for TSH reveals only T3 and T4 were significantly associated with TSH (p < 0.001; p=0.001). Conclusion: To conclude, nearly 39.5% of the postmenopausal women had thyroid disorder. Postmenopausal women are vulnerable to thyroid disorder; therefore, requires regular thyroid monitoring.

Keywords: thyroid stimulating hormone, TSH, T3, T4, thyroid disorder

Procedia PDF Downloads 125
2686 Improving the Performance of Deep Learning in Facial Emotion Recognition with Image Sharpening

Authors: Ksheeraj Sai Vepuri, Nada Attar

Abstract:

We as humans use words with accompanying visual and facial cues to communicate effectively. Classifying facial emotion using computer vision methodologies has been an active research area in the computer vision field. In this paper, we propose a simple method for facial expression recognition that enhances accuracy. We tested our method on the FER-2013 dataset that contains static images. Instead of using Histogram equalization to preprocess the dataset, we used Unsharp Mask to emphasize texture and details and sharpened the edges. We also used ImageDataGenerator from Keras library for data augmentation. Then we used Convolutional Neural Networks (CNN) model to classify the images into 7 different facial expressions, yielding an accuracy of 69.46% on the test set. Our results show that using image preprocessing such as the sharpening technique for a CNN model can improve the performance, even when the CNN model is relatively simple.

Keywords: facial expression recognittion, image preprocessing, deep learning, CNN

Procedia PDF Downloads 135
2685 Tea Club (Singapore)-Learning to Navigate the Social World without Fear: Adapted from PEERS® for Young Adults

Authors: Janice Cheong, Tan Seying

Abstract:

The growing years in adolescence are often a tumultuous time for both the individual and family; this is especially so for individuals with Autism Spectrum Disorder (ASD) and Social Communication Disorder (SCD). Tea Club, which is adapted from the PEERS® for Young Adults, seeks to address some of the social challenges faced by Singaporean adolescents with ASD/SCD while navigating social situations. Tea club (hybrid) consists of face-to-face sessions and virtual sessions. These sessions work with both the adolescent and their parents to tackle the individual's difficulties with social skills, empathy, and loneliness. Prior to the group intervention, both participants and their parents scored on the Test of Adolescent Social Skills Knowledge (TASSK) and Autism Spectrum Quotient (AQ), respectively. The session was spread across four months. At the end of the group based intervention, participants’ and parents’ scores were collected again and compared. Inputs on the programme and participant’s confidence in socialization were also gathered from both participants and their parents and looked at thematically. The findings highlight some of the challenges faced by teens with ASD in Singapore and the benefits of the intervention. Parental sentiments are also examined and discussed.

Keywords: adolescence autism, group intervention, social communication disorder, social skills

Procedia PDF Downloads 136
2684 Factors Influencing Prevalence of HIV/AIDS Among Men Who Have Sex With men (MSM) Aged 18-24 years in Mtwapa Town, Kilifi County, Kenya

Authors: Oscar Maina Irungu

Abstract:

Background: Men who have sex with men (MSM) in Mtwapa Town, Kilifi County are at high risk of HIV infection. Probability sample surveys to determine HIV prevalence among MSM in Mtwapa are needed to inform prevention and care services. Methods: In 2013, a cross-sectional survey was conducted among MSM aged 18-24 years old, using respondent-driven sampling (RDS) in Mtwapa. Consenting MSM were tested for HIV (fingerstick rapid test). Population-based prevalence and 95 % confidence intervals (CI) were estimated using RDS Analysis Tool (RDSAT). Results: Among 274 MSM, the median age was 20 years (IQR: 19-23 years). Fifty percent of MSM reported not selling sex, while 13.2 % reported sex work as their “main occupation”, and another 28.4 % reported selling sex in the past two months (but not as their main occupation).Overall HIV prevalence was 19.2 % (CI: 12.2-23.6%). HIV prevalence was higher among MSM who reported sex work as their main occupation (28.3%,CI: 12.1-42.3%) or selling sex in the past two months (26.6 %, CI: 17.2-35.7 %),than among MSM who did not sell sex (11.6%,CI: 7.0-18.1%). Conclusion: HIV prevalence among MSM were high than among Kilifi’s general population aged 15-64 years (8.8%; 2010 KAIS) and highest in male sex workers. Health programs need to address concerns and modify services to meet needs of diverse subgroups of MSM. We recommend continued, periodic surveillance to monitor HIV prevalence among MSM in Mtwapa, and expansion to other areas in Kenya.

Keywords: power point, Kenya, homosexuality, sex

Procedia PDF Downloads 371
2683 Enhancement of Natural Convection Heat Transfer within Closed Enclosure Using Parallel Fins

Authors: F. A. Gdhaidh, K. Hussain, H. S. Qi

Abstract:

A numerical study of natural convection heat transfer in water filled cavity has been examined in 3D for single phase liquid cooling system by using an array of parallel plate fins mounted to one wall of a cavity. The heat generated by a heat source represents a computer CPU with dimensions of 37.5×37.5 mm mounted on substrate. A cold plate is used as a heat sink installed on the opposite vertical end of the enclosure. The air flow inside the computer case is created by an exhaust fan. A turbulent air flow is assumed and k-ε model is applied. The fins are installed on the substrate to enhance the heat transfer. The applied power energy range used is between 15- 40W. In order to determine the thermal behaviour of the cooling system, the effect of the heat input and the number of the parallel plate fins are investigated. The results illustrate that as the fin number increases the maximum heat source temperature decreases. However, when the fin number increases to critical value the temperature start to increase due to the fins are too closely spaced and that cause the obstruction of water flow. The introduction of parallel plate fins reduces the maximum heat source temperature by 10% compared to the case without fins. The cooling system maintains the maximum chip temperature at 64.68℃ when the heat input was at 40 W which is much lower than the recommended computer chips limit temperature of no more than 85℃ and hence the performance of the CPU is enhanced.

Keywords: chips limit temperature, closed enclosure, natural convection, parallel plate, single phase liquid

Procedia PDF Downloads 257