Search results for: context aware computing
6649 Research Inspiration for Urban Renewal in Regions with Historical Value in Developed Areas of China: A Case Study of the Hubei Ancient Village
Authors: Qingxiang Zeng
Abstract:
Since the beginning of the 21st century, China's urbanization process has rapidly progressed. Since 2005, China's developed regions have gradually entered the stage of urban conservation and updating. The over-pursuit of economic market benefits in urban construction in China has led to issues such as disrespect for residents' rights, neglect of historical context protection, and gentlemanization, which hinder urban social development in some developed urban areas. This article takes the Hubei Ancient Village renewal project in Shenzhen, China, as an example. The project took eight years to obtain government approval and implementation since its renewal proposal was launched, which has attracted attention from society and urban planning circles. Through an introduction to the project's general situation and renewal process, this article reflects on the issues of planning systems, historical context protection, conflicts between multiple values, and neglect of vulnerable groups in the Hubei Ancient Village renewal and protection project. Based on this reflection, this article summarizes the corresponding experience and provides theoretical help for urban renewal in developed regions in China, providing case references for urban renewal and construction in other developing countries and offering critical thinking and valuable experience for urban planning practitioners and policymakers.Keywords: urban renewal, Hubei Ancient Village, historical context, public participation
Procedia PDF Downloads 696648 Resilience in Refuge Context: The Validity Assessment Using Child and Youth Resilience Measure-28 among Afghan Young Immigrants in Iran
Authors: Baqir Rezai, Leila Heydarinasab, Rasol Roshan, Mohammad Ghulami
Abstract:
Introduction: The resilience process is one of the controversial and important subjects for child and youth immigrants throughout the world. Positive adaptation to the environment is a consequence of resilience which can affect the quality of life and physical and mental health among immigrants. Objective: A total of 714 Afghan young immigrants (14 to 18-years-old) who live in Iran for more than three years were entered into the study. A random sampling method was applied to obtain data. The study samples were divided into two groups (N1 =360 and N2=354) for exploratory and confirmation analysis. Exploratory factorial analysis was applied to confirm the construct validity of CYRM-28. Results: The results showed that this scale has useful validity content, and the study samples include three factors of individuals, context, and relational in child and youth resilience measure-28. However, from a total of 28 main items, only 15 items could identify these factors. Discussion: The resilience process among young immigrants is mainly explained by individuals, social and cultural conditions. For instance, young immigrants search the resilience process in conditions that caused their immigration. In this context, some questions about the content of security and personal promotion in society could identify three main factors.Keywords: CYRM-28, factorial analysis, resilience, Afghan young immigrants
Procedia PDF Downloads 1396647 The Clash between Environmental and Heritage Laws: An Australian Case Study
Authors: Andrew R. Beatty
Abstract:
The exploitation of Australia’s vast mineral wealth is regulated by a matrix of planning, environment and heritage legislation, and despite the desire for a ‘balance’ between economic, environmental and heritage values, Aboriginal objects and places are often detrimentally impacted by mining approvals. The Australian experience is not novel. There are other cases of clashes between the rights of traditional landowners and businesses seeking to exploit mineral or other resources on or beneath those lands, including in the United States, Canada, and Brazil. How one reconciles the rights of traditional owners with those of resource companies is an ongoing legal problem of general interest. In Australia, planning and environmental approvals for resource projects are ordinarily issued by State or Territory governments. Federal legislation such as the Aboriginal and Torres Strait Islander Heritage Protection Act 1984 (Cth) is intended to act as a safety net when State or Territory legislation is incapable of protecting Indigenous objects or places in the context of approvals for resource projects. This paper will analyse the context and effectiveness of legislation enacted to protect Indigenous heritage in the planning process. In particular, the paper will analyse how the statutory objects of such legislation need to be weighed against the statutory objects of competing legislation designed to facilitate and control resource exploitation. Using a current claim in the Federal Court of Australia for the protection of a culturally significant landscape as a case study, this paper will examine the challenges faced in ascribing value to cultural heritage within the wider context of environmental and planning laws. Our findings will reveal that there is an inherent difficulty in defining and weighing competing economic, environmental and heritage considerations. An alternative framework will be proposed to guide regulators towards making decisions that result in better protection of Indigenous heritage in the context of resource management.Keywords: environmental law, heritage law, indigenous rights, mining
Procedia PDF Downloads 956646 Peabody Picture Vocabulary Test in Indian ESL Context
Authors: Vijaya
Abstract:
This paper reports the results of a study that measures the level of receptive vocabularies using the Peabody Picture Vocabulary Test (PPVT) in an ESL context. PPVT is a popular standardized test used to measure the vocabulary level of L1 learners. In this study, PPVT was administered to fourteen 9 to 11 year old Indian ESL learners from the fifth standard from a school in Hyderabad. Their performance is compared with the age appropriate performance of L1 learners. Their performance on noun versus verb items is also compared. The results are discussed concerning the learning goals set by the National Council for Educational Research and Training (NCERT) position paper on Teaching of English in India.Keywords: national council for educational research and training, India, PPVT, second language acquistion, vocabulary acquisition
Procedia PDF Downloads 2986645 Labour Migration in Russia in the Context of Russia’s National Security Problem
Authors: A. V. Dolzhikova
Abstract:
The article deals with the problems of labour migration in the Russian Federation in the context of Russia's national security, provides the typology of migrants residing in the territory of the Russian Federation and analyzes the risk factors. The author considers the structure of migration flows and the terms of legal, economic and socio-cultural adaptation of migrants in the Russian Federation. In this connection, the status of the Russian migration legislation, the concept of the comprehensive exam in Russian as a foreign language, history of Russia and the basics of the Russian Federation legislation for foreign citizens which was introduced in Russia on January 1, 2015, are analyzed. The article discloses its role as the adaptation strategy and the factor of Russia's migration security.Keywords: comprehensive exam, migration policy, migration legislation, Russia's national security
Procedia PDF Downloads 3636644 Intimate Femicide–Suicide in Israel: The Role of Migration and the Context
Authors: Revital Sela-Shayovitz
Abstract:
The current study examined the nature, the characteristics and the extent of intimate femicide followed by suicide (femicide-suicide) in Israel between the years 2005 – 2014. Data were collected from the Israeli organization ‘No to Violence Against Women’ and from two daily and widely-read newspapers in Israel. The findings indicated that migration is a risk factor for intimate femicide-suicide: the majority of the cases occurred among immigrants (59%). Moreover, the vulnerability of Ethiopian immigrants is very high in comparison to the other groups in Israeli society. The dominant motives were the victim's desire for separation and arguments between partners. The main methods used were firearms and stabbing followed by hanging. Furthermore, a prior report about violence was documented in 37% of the cases. The paper discusses these findings in the context of the existing research, offers directions for future research, and suggests some response strategies.Keywords: ethnicity, immigrants, intimate femicide, suicide
Procedia PDF Downloads 1536643 The Planning and Development of Green Public Places in Urban South Africa: A Child-Friendly Approach
Authors: E. J. Cilliers, Z. Goosen
Abstract:
The impact that urban green spaces have on sustainability and quality of life is phenomenal. This is also true for the local South African environment. However, in reality green spaces in urban environments are decreasing due to growing populations, increasing urbanization and development pressure. This further impacts on the provision of child-friendly spaces, a concept that is already limited in local context. Child-friendly spaces are described as environments in which people (children) feel intimately connected to, influencing the physical, social, emotional, and ecological health of individuals and communities. The benefits of providing such spaces for the youth are well documented in literature. This research therefore aimed to investigate the concept of child-friendly spaces and its applicability to the South African planning context, in order to guide the planning of such spaces for future communities and use. Child-friendly spaces in the urban environment of the city of Durban, was used as local case study, along with two international case studies namely Mullerpier public playground in Rotterdam, the Netherlands, and Kadidjiny Park in Melville, Australia. The aim was to determine how these spaces were planned and developed and to identify tools that were used to accomplish the goal of providing successful child-friendly green spaces within urban areas. The need and significance of planning for such spaces was portrayed within the international case studies. It is confirmed that minimal provision is made for green space planning within the South African context, when there is reflected on the international examples. As a result international examples and disciples of providing child-friendly green spaces should direct planning guidelines within local context. The research concluded that child-friendly green spaces have a positive impact on the urban environment and assist in a child’s development and interaction with the natural environment. Regrettably, the planning of these child-friendly spaces is not given priority within current spatial plans, despite the proven benefits of such.Keywords: built environment, child-friendly spaces, green spaces, public places, urban area
Procedia PDF Downloads 4436642 Exploring the Efficacy of Context-Based Instructional Strategy in Fostering Students Achievement in Chemistry
Authors: Charles U. Eze, Joy Johnbest Egbo
Abstract:
The study investigated the effect of Context-Based Instructional Strategy (CBIS) on students’ achievement in chemistry. CBIS was used as an experimental group and expository method (EM) as a control group, sources showed that students poor achievement in chemistry is from teaching strategy adopted by the chemistry teachers. Two research questions were answered, and two null hypotheses were formulated and tested. This strategy recognizes the need for student-centered, relevance of tasks and students’ voice; it also helps students develop creative and critical learning skills. A quasi-experimental (non-equivalent, pretest, posttest control group) design was adopted for the study. The population for the study comprised all senior secondary class one (SSI) students who were offering chemistry in co-education schools in Agbani Education zone. The instrument for data collection was a self-developed Basic Chemistry Achievement Test (BCAT). Relevant data were collected from a sample of SSI chemistry students using purposive random sampling techniques from two co-education schools in Agbani Education Zone of Enugu State, Nigeria. A reliability co-efficient was obtained for the instrument using Kuder-Richardson formula 20. Mean and standard deviation scores were used to answer the research questions while two-way analysis of covariance (ANCOVA) was used to test the hypotheses. The findings showed that the experimental group taught with context-based instructional strategy (CBIS) obtained a higher mean achievement score than the control group in the post BCAT; male students had higher mean achievement scores than their female counterparts. The difference was significant. It was recommended, among others, that CBIS should be given more emphasis in the training and re-training program of secondary school chemistry teachers.Keywords: context-based instructional strategy, expository strategy, student-centered
Procedia PDF Downloads 2276641 An Approach to Building a Recommendation Engine for Travel Applications Using Genetic Algorithms and Neural Networks
Authors: Adrian Ionita, Ana-Maria Ghimes
Abstract:
The lack of features, design and the lack of promoting an integrated booking application are some of the reasons why most online travel platforms only offer automation of old booking processes, being limited to the integration of a smaller number of services without addressing the user experience. This paper represents a practical study on how to improve travel applications creating user-profiles through data-mining based on neural networks and genetic algorithms. Choices made by users and their ‘friends’ in the ‘social’ network context can be considered input data for a recommendation engine. The purpose of using these algorithms and this design is to improve user experience and to deliver more features to the users. The paper aims to highlight a broader range of improvements that could be applied to travel applications in terms of design and service integration, while the main scientific approach remains the technical implementation of the neural network solution. The motivation of the technologies used is also related to the initiative of some online booking providers that have made the fact that they use some ‘neural network’ related designs public. These companies use similar Big-Data technologies to provide recommendations for hotels, restaurants, and cinemas with a neural network based recommendation engine for building a user ‘DNA profile’. This implementation of the ‘profile’ a collection of neural networks trained from previous user choices, can improve the usability and design of any type of application.Keywords: artificial intelligence, big data, cloud computing, DNA profile, genetic algorithms, machine learning, neural networks, optimization, recommendation system, user profiling
Procedia PDF Downloads 1626640 A Pragmatic Approach of Memes Created in Relation to the COVID-19 Pandemic
Authors: Alexandra-Monica Toma
Abstract:
Internet memes are an element of computer mediated communication and an important part of online culture that combines text and image in order to generate meaning. This term coined by Richard Dawkings refers to more than a mere way to briefly communicate ideas or emotions, thus naming a complex and an intensely perpetuated phenomenon in the virtual environment. This paper approaches memes as a cultural artefact and a virtual trope that mirrors societal concerns and issues, and analyses the pragmatics of their use. Memes have to be analysed in series, usually relating to some image macros, which is proof of the interplay between imitation and creativity in the memes’ writing process. We believe that their potential to become viral relates to three key elements: adaptation to context, reference to a successful meme series, and humour (jokes, irony, sarcasm), with various pragmatic functions. The study also uses the concept of multimodality and stresses how the memes’ text interacts with the image, discussing three types of relations: symmetry, amplification, and contradiction. Moreover, the paper proves that memes could be employed as speech acts with illocutionary force, when the interaction between text and image is enriched through the connection to a specific situation. The features mentioned above are analysed in a corpus that consists of memes related to the COVID-19 pandemic. This corpus shows them to be highly adaptable to context, which helps build the feeling of connection and belonging in an otherwise tremendously fragmented world. Some of them are created based on well-known image macros, and their humour results from an intricate dialogue between texts and contexts. Memes created in relation to the COVID-19 pandemic can be considered speech acts and are often used as such, as proven in the paper. Consequently, this paper tackles the key features of memes, makes a thorough analysis of the memes sociocultural, linguistic, and situational context, and emphasizes their intertextuality, with special accent on their illocutionary potential.Keywords: context, memes, multimodality, speech acts
Procedia PDF Downloads 1976639 Computing Machinery and Legal Intelligence: Towards a Reflexive Model for Computer Automated Decision Support in Public Administration
Authors: Jacob Livingston Slosser, Naja Holten Moller, Thomas Troels Hildebrandt, Henrik Palmer Olsen
Abstract:
In this paper, we propose a model for human-AI interaction in public administration that involves legal decision-making. Inspired by Alan Turing’s test for machine intelligence, we propose a way of institutionalizing a continuous working relationship between man and machine that aims at ensuring both good legal quality and higher efficiency in decision-making processes in public administration. We also suggest that our model enhances the legitimacy of using AI in public legal decision-making. We suggest that case loads in public administration could be divided between a manual and an automated decision track. The automated decision track will be an algorithmic recommender system trained on former cases. To avoid unwanted feedback loops and biases, part of the case load will be dealt with by both a human case worker and the automated recommender system. In those cases an experienced human case worker will have the role of an evaluator, choosing between the two decisions. This model will ensure that the algorithmic recommender system is not compromising the quality of the legal decision making in the institution. It also enhances the legitimacy of using algorithmic decision support because it provides justification for its use by being seen as superior to human decisions when the algorithmic recommendations are preferred by experienced case workers. The paper outlines in some detail the process through which such a model could be implemented. It also addresses the important issue that legal decision making is subject to legislative and judicial changes and that legal interpretation is context sensitive. Both of these issues requires continuous supervision and adjustments to algorithmic recommender systems when used for legal decision making purposes.Keywords: administrative law, algorithmic decision-making, decision support, public law
Procedia PDF Downloads 2166638 System Survivability in Networks in the Context of Defense/Attack Strategies: The Large Scale
Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez, Mehdi Mrad
Abstract:
We investigate the large scale of networks in the context of network survivability under attack. We use appropriate techniques to evaluate and the attacker-based- and the defender-based-network survivability. The attacker is unaware of the operated links by the defender. Each attacked link has some pre-specified probability to be disconnected. The defender choice is so that to maximize the chance of successfully sending the flow to the destination node. The attacker however will select the cut-set with the highest chance to be disabled in order to partition the network. Moreover, we extend the problem to the case of selecting the best p paths to operate by the defender and the best k cut-sets to target by the attacker, for arbitrary integers p,k > 1. We investigate some variations of the problem and suggest polynomial-time solutions.Keywords: defense/attack strategies, large scale, networks, partitioning a network
Procedia PDF Downloads 2826637 Application of Griddization Management to Construction Hazard Management
Authors: Lingzhi Li, Jiankun Zhang, Tiantian Gu
Abstract:
Hazard management that can prevent fatal accidents and property losses is a fundamental process during the buildings’ construction stage. However, due to lack of safety supervision resources and operational pressures, the conduction of hazard management is poor and ineffective in China. In order to improve the quality of construction safety management, it is critical to explore the use of information technologies to ensure that the process of hazard management is efficient and effective. After exploring the existing problems of construction hazard management in China, this paper develops the griddization management model for construction hazard management. First, following the knowledge grid infrastructure, the griddization computing infrastructure for construction hazards management is designed which includes five layers: resource entity layer, information management layer, task management layer, knowledge transformation layer and application layer. This infrastructure will be as the technical support for realizing grid management. Second, this study divides the construction hazards into grids through city level, district level and construction site level according to grid principles. Last, a griddization management process including hazard identification, assessment and control is developed. Meanwhile, all stakeholders of construction safety management, such as owners, contractors, supervision organizations and government departments, should take the corresponding responsibilities in this process. Finally, a case study based on actual construction hazard identification, assessment and control is used to validate the effectiveness and efficiency of the proposed griddization management model. The advantage of this designed model is to realize information sharing and cooperative management between various safety management departments.Keywords: construction hazard, griddization computing, grid management, process
Procedia PDF Downloads 2736636 A Sociolinguistic Investigation of Code-Switching Practices of ESL Students Outside EFL Classrooms
Authors: Shehroz Mukhtar, Maqsood Ahmed, Abdullah Mukhtar, Choudhry Shahid, Waqar Javaid
Abstract:
Code switching is a common phenomenon, generally observed in multilingual communities across the globe. A critical look at code switching literature reveals that mostly code switching has been studied in classroom in learning and teaching context while code switching outside classroom in settings such as café, hostel and so on have been the least explored areas. Current research investigated the reasons for code switching in the interactive practices of students and their perceptions regarding the same outside the classroom settings. This paper is the study of the common practice that prevails in the Universities of Sialkot that bilinguals mix two languages when they speak in different class room situations. In Pakistani classrooms where Multilingual are in abundance i.e. they can speak two or more than two languages at the same time, the code switching or language combination is very common. The teachers of Sialkot switch from one language to another consciously or unconsciously while teaching English in the class rooms. This phenomenon has not been explored in the Sialkot’s teaching context. In Sialkot private educational institutes does not encourage code-switching whereas the public or government institutes use it frequently. The crux of this research is to investigate and identify the importance of code switching by taking its users in consideration. Survey research method and survey questionnaire will be used to get exact data from teachers and students. We will try to highlight the functions and importance of code switching in foreign language classrooms of Sialkot and will explore why this trend is emerging in Sialkot.Keywords: code switching, bilingual context, L1, L2
Procedia PDF Downloads 646635 Women, Culture and Ambiguity: Postcolonial Feminist Critique of Lobola in African Culture and Society
Authors: Goodness Thandi Ntuli
Abstract:
Some cultural aspects in the African context have a tendency of uplifting women while some thrust them into the worst denigration scenarios; hence African Women Theologians refer to culture as a ‘double edged sword. Through socialization and internalization of social norms, some women become custodians of life, denying aspects of the culture that are against them and hand them down to the next generation. This indirectly contributes to the perpetuation of patriarchal tendencies wherein women themselves uphold and endorse such tendencies to their own detriment. One of the findings of the empirical research study conducted among the Zulu young women in the South African context was that, on the one hand, lobola (the bride-price) is one of the cultural practices that contribute a great deal in the vilification of women. On the other hand, a woman whose lobola has been paid is highly esteemed in the cultural context not only by society at large but also by the implicated woman who takes pride in it. Consequently, lobola becomes an ambiguous cultural practice. Thus from the postcolonial feminist perspective, this paper examines and critiques lobola practice while also disclosing and exposing its deep seated cultural reinforcement that is life denying to women. The paper elucidates the original lobola as a cultural practice before colonization and how it became commercialized during colonial times. With commercialization in the modern world, lobola has completely lost its preliminary meaning and ceased to be a life-giving cultural practice, particularly for women. It turned out to be the worst cultural practice that demeans women to the extent that it becomes suicidal to women dignity because, in marriage, they become objects or property to the men who purchased them. Women objectification in marriage does not only leave them culturally trapped in what was perceived to be a good practice, but it also leads to women abuse and gender based or domestic violence. The research has indicated that this kind of violence is escalating and has become so pervasive in the South African context that the country is rated as one of the capital cities of violence against women in the world. Therefore, this paper demonstrates how cultural practices at times indirectly contribute to this national scourge that needs to be condemned, disparaged and rejected. Women in the African context where such cultural activities are still viewed as a norm are in desperate need for true liberation from such ambiguous cultural practices that leave them in the margins in spite of the earned social status they might have achieved.Keywords: african, ambiguity, critique, culture, feminist, lobola, postcolonial, society
Procedia PDF Downloads 1976634 In-Context Meta Learning for Automatic Designing Pretext Tasks for Self-Supervised Image Analysis
Authors: Toktam Khatibi
Abstract:
Self-supervised learning (SSL) includes machine learning models that are trained on one aspect and/or one part of the input to learn other aspects and/or part of it. SSL models are divided into two different categories, including pre-text task-based models and contrastive learning ones. Pre-text tasks are some auxiliary tasks learning pseudo-labels, and the trained models are further fine-tuned for downstream tasks. However, one important disadvantage of SSL using pre-text task solving is defining an appropriate pre-text task for each image dataset with a variety of image modalities. Therefore, it is required to design an appropriate pretext task automatically for each dataset and each downstream task. To the best of our knowledge, the automatic designing of pretext tasks for image analysis has not been considered yet. In this paper, we present a framework based on In-context learning that describes each task based on its input and output data using a pre-trained image transformer. Our proposed method combines the input image and its learned description for optimizing the pre-text task design and its hyper-parameters using Meta-learning models. The representations learned from the pre-text tasks are fine-tuned for solving the downstream tasks. We demonstrate that our proposed framework outperforms the compared ones on unseen tasks and image modalities in addition to its superior performance for previously known tasks and datasets.Keywords: in-context learning (ICL), meta learning, self-supervised learning (SSL), vision-language domain, transformers
Procedia PDF Downloads 786633 Organisational Disclosure: Threats to Individuals' Privacy
Authors: N. A. Badrul
Abstract:
People are concerned that they are vulnerable as a result of what is exposed about them on the internet. Users are increasingly aware of their privacy and are making various efforts to protect their personal information. However, besides individuals themselves, organisations are also exposing personal information of their staff to the general public by publishing it on their official website. This practice may put individuals at risk and particularly vulnerable to threats. This preliminary study explores explicitly the amount and types of personal information disclosure from organisational websites. Threats and risks related to the disclosures are discussed. In general, all the examined organisational websites discloses personal information with varies identifiable degree of data.Keywords: personal information, privacy, e-government, information disclosure
Procedia PDF Downloads 3176632 Reflections on the Role of Cultural Identity in a Bilingual Education Program
Authors: Lina Tenjo, Ilba Rodríguez
Abstract:
The role of cultural identity in bilingual programs has been barely discussed in regards to SLA. This research focuses on providing relevant information that helps in having more knowledge about the experiences that an elementary student has during the second language learning process in a bilingual program within a multicultural context. This study explores the experience of 18 students in a dual language program, in a public elementary school in Northern Virginia, USA. It examines their dual language experience and the different ways this experience contributes to the formation of their cultural identity. The findings were studied with the purpose of determining the relationship between participants and certain aspects of cultural identity in a multicultural context. The reflections that originate from the voices of children are the key source that helps us to better understand the particular needs that young learners have during their participation in a DLP.Keywords: acculturation, bilingual education, culture, dual language program, identity, second language acquisition
Procedia PDF Downloads 3386631 The Experiences of Hong Kong Chinese Divorced Wives in Facing the Cancer Death of Their Ex-Husbands
Authors: M. L. Yeung
Abstract:
With the surge of divorce rate and male cancer onset/death rates, the phenomenon of divorced wives in the facing cancer death of their ex-husbands is not uncommon in Hong Kong. Yet, there is a dearth of study on the experiences of bereaved-divorced wives in the Hong Kong cultural context. This project fills the knowledge gap by conducting a qualitative study for having interviewed four bereaved ex-wives, who returned to ex-husbands’ end-of-life caregiving and eventually grieved for the ex-spousal’s death. From the perspectives of attachment theory and disenfranchised grief in the Hong Kong cultural context, a ‘double-loss’ experience is found in which interviewees suffer from the first loss of divorce and the second loss of ex-husbands’ death. Traumatic childhood experiences, attachment needs, role ambiguity, unresolved emotions and unrecognized grief are found significant in their lived experiences which alert the ‘double-loss’ is worthy of attention. Extending a family-centered end-of-life and bereavement care services to divorced couples is called for, in which validation on the attachment needs, ex-couple reconciliation, and acknowledgement on the disenfranchised grief are essential for social work practice on this group of clienteles specifically in Hong Kong cultural context.Keywords: changing family, disenfranchised grief, divorce, ex-spousal death, marriage
Procedia PDF Downloads 3196630 Customization of Moodle Open Source LMS for Tanzania Secondary Schools’ Use
Authors: Ellen A. Kalinga
Abstract:
Moodle is an open source learning management system that enables creation of a powerful and flexible learning environment. Many organizations, especially learning institutions have customized Moodle open source LMS for their own use. In general open source LMSs are of great interest due to many advantages they offer in terms of cost, usage and freedom to customize to fit a particular context. Tanzania Secondary School e-Learning (TanSSe-L) system is the learning management system for Tanzania secondary schools. TanSSe-L system was developed using a number of methods, one of them being customization of Moodle Open Source LMS. This paper presents few areas on the way Moodle OS LMS was customized to produce a functional TanSSe-L system fitted to the requirements and specifications of Tanzania secondary schools’ context.Keywords: LMS, Moodle, e-learning, Tanzania, secondary school
Procedia PDF Downloads 3906629 Hybrid Collaborative-Context Based Recommendations for Civil Affairs Operations
Authors: Patrick Cummings, Laura Cassani, Deirdre Kelliher
Abstract:
In this paper we present findings from a research effort to apply a hybrid collaborative-context approach for a system focused on Marine Corps civil affairs data collection, aggregation, and analysis called the Marine Civil Information Management System (MARCIMS). The goal of this effort is to provide operators with information to make sense of the interconnectedness of entities and relationships in their area of operation and discover existing data to support civil military operations. Our approach to build a recommendation engine was designed to overcome several technical challenges, including 1) ensuring models were robust to the relatively small amount of data collected by the Marine Corps civil affairs community; 2) finding methods to recommend novel data for which there are no interactions captured; and 3) overcoming confirmation bias by ensuring content was recommended that was relevant for the mission despite being obscure or less well known. We solve this by implementing a combination of collective matrix factorization (CMF) and graph-based random walks to provide recommendations to civil military operations users. We also present a method to resolve the challenge of computation complexity inherent from highly connected nodes through a precomputed process.Keywords: Recommendation engine, collaborative filtering, context based recommendation, graph analysis, coverage, civil affairs operations, Marine Corps
Procedia PDF Downloads 1246628 Cloud Resources Utilization and Science Teacher’s Effectiveness in Secondary Schools in Cross River State, Nigeria
Authors: Michael Udey Udam
Abstract:
Background: This study investigated the impact of cloud resources, a component of cloud computing, on science teachers’ effectiveness in secondary schools in Cross River State. Three (3) research questions and three (3) alternative hypotheses guided the study. Method: The descriptive survey design was adopted for the study. The population of the study comprised 1209 science teachers in public secondary schools of Cross River state. Sample: A sample of 487 teachers was drawn from the population using a stratified random sampling technique. The researcher-made structured questionnaire with 18 was used for data collection for the study. Research question one was answered using the Pearson Product Moment Correlation, while research question two and the hypotheses were answered using the Analysis of Variance (ANOVA) statistics in the Statistical Package for Social Sciences (SPSS) at a 0.05 level of significance. Results: The results of the study revealed that there is a positive correlation between the utilization of cloud resources in teaching and teaching effectiveness among science teachers in secondary schools in Cross River state; there is a negative correlation between gender and utilization of cloud resources among science teachers in secondary schools in Cross River state; and that there is a significant correlation between teaching experience and the utilization of cloud resources among science teachers in secondary schools in Cross River state. Conclusion: The study justifies the effectiveness of the Cross River state government policy of introducing cloud computing into the education sector. The study recommends that the policy should be sustained.Keywords: cloud resources, science teachers, effectiveness, secondary school
Procedia PDF Downloads 726627 Questioning Ethiopia's University Education Philosophy: A Policy towards Disempowering the Country's Youth
Authors: Sisay Tamrat Ayalew
Abstract:
This paper aims to explore the two contradictory debates about the educational philosophy of universities in the context of Ethiopia. It also explores how the understanding of the philosophy of the university is shaped by environmental factors and exacerbates the marginalization of youth. On the one hand, universities are perceived as places where knowledge can solve a certain practical problem. On the other hand, universities are places where knowledge is produced and disseminated irrespective of its immediate use value. This study found that understanding the philosophy of education varies across time and place. In the Ethiopian context, there is neither a disinterested pursuit of knowledge nor an instrumentalist epistemology nor a synthesis of the two. It disregards the value of knowledge altogether and overly simplifies the philosophy of instrumentalist epistemology to the extent of buying and selling certificates, even in the absence of formal training.Keywords: philosophy of universities, marginalized youth, diploma mill, instrumentalist epistemology, disinterested pursuit
Procedia PDF Downloads 716626 The End a Two-Party Hegemony
Authors: Mary Chidiebere Asoya
Abstract:
The dominance of two parties in multiparty democracies is a phenomenon that has come to be taken for granted. It has led to deepening corruption and redundant governance in many countries as politicians in the two dominating parties are aware of and exploit the fact that power must rotate between the two parties. As a result, politicians in two dominating parties can hobnob and frequently inter-marry between the two parties in a way that appears to suggest they are running a single dominating party. This paper explores what could end this hegemony by projecting a third party into the limelight. The argument is that long-standing frustration with corruption and increasing revolutionary tendencies could move voters away from the two dominating parties, ending the dominance of the parties. The case study is the February 25, 2023, Presidential elections in Nigeria.Keywords: democracy, political party, election, nigeria, political science
Procedia PDF Downloads 906625 Cultural Awareness, Intercultural Communication Competence and Academic Performance of Foreign Students Towards an Education ASEAN Integration in Global Education
Authors: Rizalito B. Javier
Abstract:
Research has shown that foreign students with higher levels of cultural awareness and intercultural communication competence tend to have better academic performance outcomes. This study aimed to find out the cultural awareness, intercultural communication competence, and academic performance of foreign students and its relationships among variables. Methods used were descriptive-comparative and correlational research design, quota purposive sampling technique while frequency counts and percentages, mean and standard deviation, T, and F-test and chi-square were utilized to analyze the data. The results revealed that the majority of the respondents were under the age bracket of 21-25 years old, mostly males, all single, and mostly citizens of Papua New Guinea, Angolan, Vanuatu, Tanzanian, Nigerian, Korean, Rwanda, and Myanmar. Most language spoken was English, many of them were born again Christians, the majority took BS business management degree program, their studies mainly supported by their parents, they had stayed in the Philippines for 3-4 years, and most of them attended five to six times of cultural awareness/competence workshop-seminars, majority of their parent’s occupations were family own business, and had been earning a family monthly income of P61,0000 and above. The respondents were highly aware of their culture in terms of clients’ issues. The intercultural communication competence of the respondents was slightly aware in terms of intercultural awareness, while the foreign students performed good remarks in their average academic performance. However, the profiles of the participants in terms of age, gender, civil status, nationality, course/degree program taken, support to the study, length of stay, workshop attended, and parents’ occupation have significant differences in the academic performance except for the type of family, language spoken, religion and family monthly income. Moreover, cultural awareness was significantly related to intercultural communication competence, and both were not related to academic performance. It is recommended that foreign students be provided with cultural orientation programs, offered language support services, promoted intercultural exchange activities, and implemented inclusive teaching practices to allow students to effectively navigate and interact with people from different cultural backgrounds, fostering a more inclusive and collaborative learning environment.Keywords: cultural competence, communication competence, intercultural competence, and culture-academic performance.
Procedia PDF Downloads 186624 A Review of Spatial Analysis as a Geographic Information Management Tool
Authors: Chidiebere C. Agoha, Armstong C. Awuzie, Chukwuebuka N. Onwubuariri, Joy O. Njoku
Abstract:
Spatial analysis is a field of study that utilizes geographic or spatial information to understand and analyze patterns, relationships, and trends in data. It is characterized by the use of geographic or spatial information, which allows for the analysis of data in the context of its location and surroundings. It is different from non-spatial or aspatial techniques, which do not consider the geographic context and may not provide as complete of an understanding of the data. Spatial analysis is applied in a variety of fields, which includes urban planning, environmental science, geosciences, epidemiology, marketing, to gain insights and make decisions about complex spatial problems. This review paper explores definitions of spatial analysis from various sources, including examples of its application and different analysis techniques such as Buffer analysis, interpolation, and Kernel density analysis (multi-distance spatial cluster analysis). It also contrasts spatial analysis with non-spatial analysis.Keywords: aspatial technique, buffer analysis, epidemiology, interpolation
Procedia PDF Downloads 3156623 Key Factors for a Smart City
Authors: Marta Christina Suciu, Cristina Andreea Florea
Abstract:
The purpose of this paper is to highlight the relevance of building smart cities in the context of regional development and to analyze the important factors that make a city smart. These cities could be analyzed through the perspective of environment quality, the socio-cultural condition, technological applications and innovations, the vitality of the economic environment and public policies. Starting with these five sustainability domains, we will demonstrate the hypothesis that smart cities are the engine of the regional development. The aim of this paper is to assess the implications of smart cities, in the context of sustainable development, analyzing the benefits of developing creative and innovative cities. Regarding the methodology, it is used the systemic, logical and comparative analysis of important literature and data, also descriptive statistics and correlation analysis. In conclusion, we will define a direction on the regional development and competitiveness increasing.Keywords: creativity, innovation, regional development, smart city, sustainability, triple helix
Procedia PDF Downloads 4886622 Modelling Export Dynamics in the CSEE Countries Using GVAR Model
Abstract:
The paper investigates the key factors of export dynamics for a set of Central and Southeast European (CSEE) countries in the context of current economic and financial crisis. In order to model the export dynamics a Global Vector Auto Regressive (GVAR) model is defined. As opposed to models which model each country separately, the GVAR combines all country models in a global model which enables obtaining important information on spill-over effects in the context of globalization and rising international linkages. The results of the study indicate that for most of the CSEE countries, exports are mainly driven by domestic shocks, both in the short run and in the long run. This study is the first application of the GVAR model to studying the export dynamics in the CSEE countries and therefore the results of the study present an important empirical contribution.Keywords: export, GFEVD, global VAR, international trade, weak exogeneity
Procedia PDF Downloads 3006621 An Adjoint-Based Method to Compute Derivatives with Respect to Bed Boundary Positions in Resistivity Measurements
Authors: Mostafa Shahriari, Theophile Chaumont-Frelet, David Pardo
Abstract:
Resistivity measurements are used to characterize the Earth’s subsurface. They are categorized into two different groups: (a) those acquired on the Earth’s surface, for instance, controlled source electromagnetic (CSEM) and Magnetotellurics (MT), and (b) those recorded with borehole logging instruments such as Logging-While-Drilling (LWD) devices. LWD instruments are mostly used for geo-steering purposes, i.e., to adjust dip and azimuthal angles of a well trajectory to drill along a particular geological target. Modern LWD tools measure all nine components of the magnetic field corresponding to three orthogonal transmitter and receiver orientations. In order to map the Earth’s subsurface and perform geo-steering, we invert measurements using a gradient-based method that utilizes the derivatives of the recorded measurements with respect to the inversion variables. For resistivity measurements, these inversion variables are usually the constant resistivity value of each layer and the bed boundary positions. It is well-known how to compute derivatives with respect to the constant resistivity value of each layer using semi-analytic or numerical methods. However, similar formulas for computing the derivatives with respect to bed boundary positions are unavailable. The main contribution of this work is to provide an adjoint-based formulation for computing derivatives with respect to the bed boundary positions. The key idea to obtain the aforementioned adjoint state formulations for the derivatives is to separate the tangential and normal components of the field and treat them differently. This formulation allows us to compute the derivatives faster and more accurately than with traditional finite differences approximations. In the presentation, we shall first derive a formula for computing the derivatives with respect to the bed boundary positions for the potential equation. Then, we shall extend our formulation to 3D Maxwell’s equations. Finally, by considering a 1D domain and reducing the dimensionality of the problem, which is a common practice in the inversion of resistivity measurements, we shall derive a formulation to compute the derivatives of the measurements with respect to the bed boundary positions using a 1.5D variational formulation. Then, we shall illustrate the accuracy and convergence properties of our formulations by comparing numerical results with the analytical derivatives for the potential equation. For the 1.5D Maxwell’s system, we shall compare our numerical results based on the proposed adjoint-based formulation vs those obtained with a traditional finite difference approach. Numerical results shall show that our proposed adjoint-based technique produces enhanced accuracy solutions while its cost is negligible, as opposed to the finite difference approach that requires the solution of one additional problem per derivative.Keywords: inverse problem, bed boundary positions, electromagnetism, potential equation
Procedia PDF Downloads 1766620 Computer Network Applications, Practical Implementations and Structural Control System Representations
Authors: El Miloudi Djelloul
Abstract:
The computer network play an important position for practical implementations of the differently system. To implement a system into network above all is needed to know all the configurations, which is responsible to be a part of the system, and to give adequate information and solution in realtime. So if want to implement this system for example in the school or relevant institutions, the first step is to analyze the types of model which is needed to be configured and another important step is to organize the works in the context of devices, as a part of the general system. Often before configuration, as important point is descriptions and documentations from all the works into the respective process, and then to organize in the aspect of problem-solving. The computer network as critic infrastructure is very specific so the paper present the effectiveness solutions in the structured aspect viewed from one side, and another side is, than the paper reflect the positive aspect in the context of modeling and block schema presentations as an better alternative to solve the specific problem because of continually distortions of the system from the line of devices, programs and signals or packed collisions, which are in movement from one computer node to another nodes.Keywords: local area networks, LANs, block schema presentations, computer network system, computer node, critical infrastructure packed collisions, structural control system representations, computer network, implementations, modeling structural representations, companies, computers, context, control systems, internet, software
Procedia PDF Downloads 363