Search results for: data acquisition
24946 Pre-service Social Studies Teachers Readiness in Promoting 21st Century Learning: Evidence from a Ghanaian University
Authors: Joseph Bentil
Abstract:
Successful acquisition of 21st-century competencies needed by students to navigate through the ever-changing world requires that they are taught and molded by 21st-century teachers with the needed professional competencies. Accordingly, this study sought to understand the readiness and how efficacious pre-service Social Studies specialism students are towards the implementation of the Common Core Social Studies Curriculum in the Junior High Schools in Ghana. Theory of Experience served as the theoretical lens for the study. Working within the pragmatist paradigm, this study utilized the cross-sectional descriptive survey design with a mixed method approach where, through census sampling technique, all the 120 pre-service Social Studies specialism students were sampled for the study. A structured questionnaire and an interview guide were the instruments employed for data collection. Descriptive statistics (mean, standard deviation and inferential statistics like independent samples t-test, one-way between groups ANOVA and Pearson Product Moment Correlation) were employed in the analysis the research questions and hypotheses with the aid of version 28 of SPSS while the qualitative data was analyzed using thematic analysis. The findings discovered that pre-service Social Studies teachers were highly ready and efficacious towards implementing the Common Core Junior High School Social Studies curriculum. However, male pre-service teachers were highly efficacious and ready than their female counterparts. Besides, it was disclosed that pre-service teachers within the 31-40 years age bracket were found to be highly efficacious and ready than their colleagues with 20-30 and below 20 years age bracket respectively. The findings further revealed that there was a moderate and statistically significant positive relationship between pre-service teachers’ readiness and efficacy in implementing the Common Core Social Studies curriculum. Therefore, the study recommended that interventional programmes aimed at raising the readiness and efficacy beliefs of pre-service teachers should be targeted towards female preservice teachers and those below 20 years age bracket for successful implementation and realization of the competencies enshrined in the common core social Studies curriculum.Keywords: pre-service, readiness, social studies, teachers
Procedia PDF Downloads 8324945 Estimation of Missing Values in Aggregate Level Spatial Data
Authors: Amitha Puranik, V. S. Binu, Seena Biju
Abstract:
Missing data is a common problem in spatial analysis especially at the aggregate level. Missing can either occur in covariate or in response variable or in both in a given location. Many missing data techniques are available to estimate the missing data values but not all of these methods can be applied on spatial data since the data are autocorrelated. Hence there is a need to develop a method that estimates the missing values in both response variable and covariates in spatial data by taking account of the spatial autocorrelation. The present study aims to develop a model to estimate the missing data points at the aggregate level in spatial data by accounting for (a) Spatial autocorrelation of the response variable (b) Spatial autocorrelation of covariates and (c) Correlation between covariates and the response variable. Estimating the missing values of spatial data requires a model that explicitly account for the spatial autocorrelation. The proposed model not only accounts for spatial autocorrelation but also utilizes the correlation that exists between covariates, within covariates and between a response variable and covariates. The precise estimation of the missing data points in spatial data will result in an increased precision of the estimated effects of independent variables on the response variable in spatial regression analysis.Keywords: spatial regression, missing data estimation, spatial autocorrelation, simulation analysis
Procedia PDF Downloads 38224944 Photovoltaic Modules Fault Diagnosis Using Low-Cost Integrated Sensors
Authors: Marjila Burhanzoi, Kenta Onohara, Tomoaki Ikegami
Abstract:
Faults in photovoltaic (PV) modules should be detected to the greatest extent as early as possible. For that conventional fault detection methods such as electrical characterization, visual inspection, infrared (IR) imaging, ultraviolet fluorescence and electroluminescence (EL) imaging are used, but they either fail to detect the location or category of fault, or they require expensive equipment and are not convenient for onsite application. Hence, these methods are not convenient to use for monitoring small-scale PV systems. Therefore, low cost and efficient inspection techniques with the ability of onsite application are indispensable for PV modules. In this study in order to establish efficient inspection technique, correlation between faults and magnetic flux density on the surface is of crystalline PV modules are investigated. Magnetic flux on the surface of normal and faulted PV modules is measured under the short circuit and illuminated conditions using two different sensor devices. One device is made of small integrated sensors namely 9-axis motion tracking sensor with a 3-axis electronic compass embedded, an IR temperature sensor, an optical laser position sensor and a microcontroller. This device measures the X, Y and Z components of the magnetic flux density (Bx, By and Bz) few mm above the surface of a PV module and outputs the data as line graphs in LabVIEW program. The second device is made of a laser optical sensor and two magnetic line sensor modules consisting 16 pieces of magnetic sensors. This device scans the magnetic field on the surface of PV module and outputs the data as a 3D surface plot of the magnetic flux intensity in a LabVIEW program. A PC equipped with LabVIEW software is used for data acquisition and analysis for both devices. To show the effectiveness of this method, measured results are compared to those of a normal reference module and their EL images. Through the experiments it was confirmed that the magnetic field in the faulted areas have different profiles which can be clearly identified in the measured plots. Measurement results showed a perfect correlation with the EL images and using position sensors it identified the exact location of faults. This method was applied on different modules and various faults were detected using it. The proposed method owns the ability of on-site measurement and real-time diagnosis. Since simple sensors are used to make the device, it is low cost and convenient to be sued by small-scale or residential PV system owners.Keywords: fault diagnosis, fault location, integrated sensors, PV modules
Procedia PDF Downloads 22424943 Teachers' Perceptions of Physical Education and Sports Calendar and Conducted in the Light of the Objective of the Lesson Approach Competencies
Authors: Chelali Mohammed
Abstract:
In the context of the application of the competency-based approach in the system educational Algeria, the price of physical education and sport must privilege the acquisition of learning approaches and especially the approach science, which from problem situations, research and develops him information processing and application of knowledge and know-how in new situations in the words of ‘JOHN DEWEY’ ‘learning by practice’. And to achieve these goals and make teaching more EPS motivating, consistent and concrete, it is appropriate to perform a pedagogical approach freed from the constraints and open to creativity and student-centered in the light of the competency approach adopted in the formal curriculum. This approach is not unusual, but we think it is a highly professional nature requires the competence of the teacher.Keywords: approach competencies, physical, education, teachers
Procedia PDF Downloads 60324942 Patient Support Program in Pharmacovigilance: Foster Patient Confidence and Compliance
Authors: Atul Khurana, Rajul Rastogi, Hans-Joachim Gamperl
Abstract:
The pharmaceutical companies are getting more inclined towards patient support programs (PSPs) which assist patients and/or healthcare professionals (HCPs) in more desirable disease management and cost-effective treatment. The utmost objective of these programs is patient care. The PSPs may include financial assistance to patients, medicine compliance programs, access to HCPs via phone or online chat centers, etc. The PSP has a crucial role in terms of customer acquisition and retention strategies. During the conduct of these programs, Marketing Authorisation Holder (MAH) may receive information related to concerned medicinal products, which is usually reported by patients or involved HCPs. This information may include suspected adverse reaction(s) during/after administration of medicinal products. Hence, the MAH should design PSP to comply with regulatory reporting requirements and avoid non-compliance during PV inspection. The emergence of wireless health devices is lowering the burden on patients to manually incorporate safety data, and building a significant option for patients to observe major swings in reference to drug safety. Therefore, to enhance the adoption of these programs, MAH not only needs to aware patients about advantages of the program, but also recognizes the importance of time of patients and commitments made in a constructive manner. It is indispensable that strengthening the public health is considered as the topmost priority in such programs, and the MAH is compliant to Pharmacovigilance (PV) requirements along with regulatory obligations.Keywords: drug safety, good pharmacovigilance practice, patient support program, pharmacovigilance
Procedia PDF Downloads 31324941 Association Rules Mining and NOSQL Oriented Document in Big Data
Authors: Sarra Senhadji, Imene Benzeguimi, Zohra Yagoub
Abstract:
Big Data represents the recent technology of manipulating voluminous and unstructured data sets over multiple sources. Therefore, NOSQL appears to handle the problem of unstructured data. Association rules mining is one of the popular techniques of data mining to extract hidden relationship from transactional databases. The algorithm for finding association dependencies is well-solved with Map Reduce. The goal of our work is to reduce the time of generating of frequent itemsets by using Map Reduce and NOSQL database oriented document. A comparative study is given to evaluate the performances of our algorithm with the classical algorithm Apriori.Keywords: Apriori, Association rules mining, Big Data, Data Mining, Hadoop, MapReduce, MongoDB, NoSQL
Procedia PDF Downloads 16024940 Immunization-Data-Quality in Public Health Facilities in the Pastoralist Communities: A Comparative Study Evidence from Afar and Somali Regional States, Ethiopia
Authors: Melaku Tsehay
Abstract:
The Consortium of Christian Relief and Development Associations (CCRDA), and the CORE Group Polio Partners (CGPP) Secretariat have been working with Global Alliance for Vac-cines and Immunization (GAVI) to improve the immunization data quality in Afar and Somali Regional States. The main aim of this study was to compare the quality of immunization data before and after the above interventions in health facilities in the pastoralist communities in Ethiopia. To this end, a comparative-cross-sectional study was conducted on 51 health facilities. The baseline data was collected in May 2019, while the end line data in August 2021. The WHO data quality self-assessment tool (DQS) was used to collect data. A significant improvment was seen in the accuracy of the pentavalent vaccine (PT)1 (p = 0.012) data at the health posts (HP), while PT3 (p = 0.010), and Measles (p = 0.020) at the health centers (HC). Besides, a highly sig-nificant improvment was observed in the accuracy of tetanus toxoid (TT)2 data at HP (p < 0.001). The level of over- or under-reporting was found to be < 8%, at the HP, and < 10% at the HC for PT3. The data completeness was also increased from 72.09% to 88.89% at the HC. Nearly 74% of the health facilities timely reported their respective immunization data, which is much better than the baseline (7.1%) (p < 0.001). These findings may provide some hints for the policies and pro-grams targetting on improving immunization data qaulity in the pastoralist communities.Keywords: data quality, immunization, verification factor, pastoralist region
Procedia PDF Downloads 12324939 Language Learning Strategies to Improve English Speaking Skills among High School Students: A Case Study at Vo Minh Duc High School in Binh Duong Province, Viet Nam
Authors: Du T. Tran, Quyen T. L. Hoang
Abstract:
The role of language learning strategies in second language acquisition has received increased attention across several disciplines in recent years. Language learning strategies have been shown to occur in many studies over the passing years with the aim of improving the efficiency of language learning. Following previous studies, this study endeavors to scrutinize language learning strategies employed by the students at Vo Minh Duc high school and the effect of motivation on students’ learning strategy choices. The responses are examined quantitatively and qualitatively to enhance their validity and reliability. Data are collected from 342 students’ responses to the questionnaire, interviews with ten teachers and fifteen students, and classroom observations. The findings reveal that students’ motivation has an enormous impact on the choice of language learning strategies. The results simultaneously show that students use many language learning strategies to enhance their communicative competence, but the most frequently used ones are cognitive and affective ones. Significant correlations among types of learning strategies and the influence of motivation on the choices of language learning strategies were consistent with previous studies. The study’s results are expected to be beneficial to teachers of English and students in terms of narrowing the gap between the students' language learning strategies and their teaching methodologies preferences and sketching out the best strategies to enhance students’ speaking skills. The implications of these findings and the importance of viewing learners holistically are discussed, and recommendations are made for ongoing research.Keywords: learning strategies, speaking skills, memorization strategies, cognitive strategies, affective strategies
Procedia PDF Downloads 10424938 Hybrid GNN Based Machine Learning Forecasting Model For Industrial IoT Applications
Authors: Atish Bagchi, Siva Chandrasekaran
Abstract:
Background: According to World Bank national accounts data, the estimated global manufacturing value-added output in 2020 was 13.74 trillion USD. These manufacturing processes are monitored, modelled, and controlled by advanced, real-time, computer-based systems, e.g., Industrial IoT, PLC, SCADA, etc. These systems measure and manipulate a set of physical variables, e.g., temperature, pressure, etc. Despite the use of IoT, SCADA etc., in manufacturing, studies suggest that unplanned downtime leads to economic losses of approximately 864 billion USD each year. Therefore, real-time, accurate detection, classification and prediction of machine behaviour are needed to minimise financial losses. Although vast literature exists on time-series data processing using machine learning, the challenges faced by the industries that lead to unplanned downtimes are: The current algorithms do not efficiently handle the high-volume streaming data from industrial IoTsensors and were tested on static and simulated datasets. While the existing algorithms can detect significant 'point' outliers, most do not handle contextual outliers (e.g., values within normal range but happening at an unexpected time of day) or subtle changes in machine behaviour. Machines are revamped periodically as part of planned maintenance programmes, which change the assumptions on which original AI models were created and trained. Aim: This research study aims to deliver a Graph Neural Network(GNN)based hybrid forecasting model that interfaces with the real-time machine control systemand can detect, predict machine behaviour and behavioural changes (anomalies) in real-time. This research will help manufacturing industries and utilities, e.g., water, electricity etc., reduce unplanned downtimes and consequential financial losses. Method: The data stored within a process control system, e.g., Industrial-IoT, Data Historian, is generally sampled during data acquisition from the sensor (source) and whenpersistingin the Data Historian to optimise storage and query performance. The sampling may inadvertently discard values that might contain subtle aspects of behavioural changes in machines. This research proposed a hybrid forecasting and classification model which combines the expressive and extrapolation capability of GNN enhanced with the estimates of entropy and spectral changes in the sampled data and additional temporal contexts to reconstruct the likely temporal trajectory of machine behavioural changes. The proposed real-time model belongs to the Deep Learning category of machine learning and interfaces with the sensors directly or through 'Process Data Historian', SCADA etc., to perform forecasting and classification tasks. Results: The model was interfaced with a Data Historianholding time-series data from 4flow sensors within a water treatment plantfor45 days. The recorded sampling interval for a sensor varied from 10 sec to 30 min. Approximately 65% of the available data was used for training the model, 20% for validation, and the rest for testing. The model identified the anomalies within the water treatment plant and predicted the plant's performance. These results were compared with the data reported by the plant SCADA-Historian system and the official data reported by the plant authorities. The model's accuracy was much higher (20%) than that reported by the SCADA-Historian system and matched the validated results declared by the plant auditors. Conclusions: The research demonstrates that a hybrid GNN based approach enhanced with entropy calculation and spectral information can effectively detect and predict a machine's behavioural changes. The model can interface with a plant's 'process control system' in real-time to perform forecasting and classification tasks to aid the asset management engineers to operate their machines more efficiently and reduce unplanned downtimes. A series of trialsare planned for this model in the future in other manufacturing industries.Keywords: GNN, Entropy, anomaly detection, industrial time-series, AI, IoT, Industry 4.0, Machine Learning
Procedia PDF Downloads 15024937 Identifying Critical Success Factors for Data Quality Management through a Delphi Study
Authors: Maria Paula Santos, Ana Lucas
Abstract:
Organizations support their operations and decision making on the data they have at their disposal, so the quality of these data is remarkably important and Data Quality (DQ) is currently a relevant issue, the literature being unanimous in pointing out that poor DQ can result in large costs for organizations. The literature review identified and described 24 Critical Success Factors (CSF) for Data Quality Management (DQM) that were presented to a panel of experts, who ordered them according to their degree of importance, using the Delphi method with the Q-sort technique, based on an online questionnaire. The study shows that the five most important CSF for DQM are: definition of appropriate policies and standards, control of inputs, definition of a strategic plan for DQ, organizational culture focused on quality of the data and obtaining top management commitment and support.Keywords: critical success factors, data quality, data quality management, Delphi, Q-Sort
Procedia PDF Downloads 21724936 Towards a Proof Acceptance by Overcoming Challenges in Collecting Digital Evidence
Authors: Lilian Noronha Nassif
Abstract:
Cybercrime investigation demands an appropriated evidence collection mechanism. If the investigator does not acquire digital proofs in a forensic sound, some important information can be lost, and judges can discard case evidence because the acquisition was inadequate. The correct digital forensic seizing involves preparation of professionals from fields of law, police, and computer science. This paper presents important challenges faced during evidence collection in different perspectives of places. The crime scene can be virtual or real, and technical obstacles and privacy concerns must be considered. All pointed challenges here highlight the precautions to be taken in the digital evidence collection and the suggested procedures contribute to the best practices in the digital forensics field.Keywords: digital evidence, digital forensics process and procedures, mobile forensics, cloud forensics
Procedia PDF Downloads 40624935 Employees’ Work Performance Quality Development for Organizational Competency
Authors: Pornpong Porpraphant
Abstract:
This paper aimed to demonstrate how work performance quality development activity carried out for employees in an organization could lead to the organizational success and competency as a whole. The case studies selected for this research were the Thai huge corporate including Siam Cement Group or SCG, PTT Public Company Limited, and Electricity Generating Authority of Thailand or EGAT. The in- depth interview was applied with the three main groups that included the facilitator group, the managerial group, and the operational officer group. The Plan- Do- Check- Act approach was also utilized as to build up a conceptual model in corporate management that fostered employees’ knowledge acquisition, resulting in an improved work performance.Keywords: high performance organization, quality, work performance quality development
Procedia PDF Downloads 29424934 Data Mining in Medicine Domain Using Decision Trees and Vector Support Machine
Authors: Djamila Benhaddouche, Abdelkader Benyettou
Abstract:
In this paper, we used data mining to extract biomedical knowledge. In general, complex biomedical data collected in studies of populations are treated by statistical methods, although they are robust, they are not sufficient in themselves to harness the potential wealth of data. For that you used in step two learning algorithms: the Decision Trees and Support Vector Machine (SVM). These supervised classification methods are used to make the diagnosis of thyroid disease. In this context, we propose to promote the study and use of symbolic data mining techniques.Keywords: biomedical data, learning, classifier, algorithms decision tree, knowledge extraction
Procedia PDF Downloads 55924933 Playwriting in a German Language Class: How Creativity in a Language Lesson Supports Learning and the Acquisition of Political Agency
Authors: Ioannis Souris
Abstract:
In this paper, we would like to present how we taught German through playwriting and analyze the usefulness of this method for teaching languages and cultivating a sense of political agency in students and teachers alike. Last academic year, we worked at the German Saturday School in Greenwich, London. This school offers Saturday German lessons to children whose parents are German, living in London. The lessons are two hours long, and the children’s level of German varies according to how often or how much German is spoken at home or how often the families visit Germany (as well as other factors which will be discussed in more detail in the paper). The directors of the school provide teachers with learning material and course books, but they strongly encourage individual input on lesson structure and methods of teaching German. The class we taught consisted of six eight-to-nine-year-olds. Midway into the academic year, we ran out of teaching material, and we, therefore, decided to write a play. In the paper, we would like to explore the process we followed in creating or writing this play and how this encouraged the children to collaborate and exercise their skills in writing, storytelling, speaking, and opinion-sharing. We want to examine the impact this project had on the children who wrote and performed the play, the wider community of the Saturday school, and the development of our language teaching practice. We found, for instance, that some students, who were quiet or shy, became very open and outspoken in the process of writing and performing the play. They took the initiative and led the process, putting us, their teachers, in the role of simple observers or facilitators. When we showed the play in front of the school, the other children and teachers, as audience members, also became part of the process as they commented on the plot, language, and characters and gave feedback on further development. In the paper, we will discuss how this teaching project fits into recent developments in the research of creativity and the teaching of languages and how engagement with creative approaches to teaching has the potential to question and subvert traditional notions of ‘lesson’, ‘teacher’, and ‘student’. From the moment a questioning of norms takes place, we inadvertently raise questions about politics, agency, and resistance. We will conclude the paper with a definition of what we mean by ‘political agency’ within the context of our teaching project and education, in general, and why inspiring creativity and imagination within teaching can be considered a political act. Finally, our aim in this paper will be to propose the possibility of analyzing teaching languages through creativity and political agency theories.Keywords: innovation in language teaching and learning, language acquisition and learning, language curriculum development, language education
Procedia PDF Downloads 8424932 Analysis of Different Classification Techniques Using WEKA for Diabetic Disease
Authors: Usama Ahmed
Abstract:
Data mining is the process of analyze data which are used to predict helpful information. It is the field of research which solve various type of problem. In data mining, classification is an important technique to classify different kind of data. Diabetes is most common disease. This paper implements different classification technique using Waikato Environment for Knowledge Analysis (WEKA) on diabetes dataset and find which algorithm is suitable for working. The best classification algorithm based on diabetic data is Naïve Bayes. The accuracy of Naïve Bayes is 76.31% and take 0.06 seconds to build the model.Keywords: data mining, classification, diabetes, WEKA
Procedia PDF Downloads 14724931 Corrective Feedback and Uptake Patterns in English Speaking Lessons at Hanoi Law University
Authors: Nhac Thanh Huong
Abstract:
New teaching methods have led to the changes in the teachers’ roles in an English class, in which teachers’ error correction is an integral part. Language error and corrective feedback have been the interest of many researchers in foreign language teaching. However, the techniques and the effectiveness of teachers’ feedback have been a question of much controversy. This present case study has been carried out with a view to finding out the patterns of teachers’ corrective feedback and their impact on students’ uptake in English speaking lessons of legal English major students at Hanoi Law University. In order to achieve those aims, the study makes use of classroom observations as the main method of data collection to seeks answers to the two following questions: 1. What patterns of corrective feedback occur in English speaking lessons for second- year legal English major students in Hanoi Law University?; 2. To what extent does that corrective feedback lead to students’ uptake? The study provided some important findings, among which was a close relationship between corrective feedback and uptake. In particular, recast was the most commonly used feedback type, yet it was the least effective in terms of students’ uptake and repair, while the most successful feedback, namely meta-linguistic feedback, clarification requests and elicitation, which led to students’ generated repair, was used at a much lower rate by teachers. Furthermore, it revealed that different types of errors needed different types of feedback. Also, the use of feedback depended on the students’ English proficiency level. In the light of findings, a number of pedagogical implications have been drawn in the hope of enhancing the effectiveness of teachers’ corrective feedback to students’ uptake in foreign language acquisition process.Keywords: corrective feedback, error, uptake, speaking English lesson
Procedia PDF Downloads 26224930 Low-Cost Aviation Solutions to Strengthen Counter-Poaching Efforts in Kenya
Authors: Kuldeep Rawat, Michael O'Shea, Maureen McGough
Abstract:
The paper will discuss a National Institute of Justice (NIJ) funded project to provide cost-effective aviation technologies and research to support counter-poaching operations related to endangered, protected, and/or regulated wildlife. The goal of this project is to provide cost-effective aviation technology and research support to Kenya Wildlife Service (KWS) in their counter-poaching efforts. In pursuit of this goal, Elizabeth City State University (ECSU) is assisting the National Institute of Justice (NIJ) in enhancing the Kenya Wildlife Service’s aviation technology and related capacity to meet its counter-poaching mission. Poaching, at its core, is systemic as poachers go to the most extreme lengths to kill high target species such as elephant and rhino. These high target wildlife species live in underdeveloped or impoverished nations, where poachers find fewer barriers to their operations. In Kenya, with fifty-nine (59) parks and reserves, spread over an area of 225,830 square miles (584,897 square kilometers) adequate surveillance on the ground is next to impossible. Cost-effective aviation surveillance technologies, based on a comprehensive needs assessment and operational evaluation, are needed to curb poaching and effectively prevent wildlife trafficking. As one of the premier law enforcement Air Wings in East Africa, KWS plays a crucial role in Kenya, not only in counter-poaching and wildlife conservation efforts, but in aerial surveillance, counterterrorism and national security efforts as well. While the Air Wing has done, a remarkable job conducting aerial patrols with limited resources, additional aircraft and upgraded technology should significantly advance the Air Wing’s ability to achieve its wildlife protection mission. The project includes: (i) Needs Assessment of the KWS Air Wing, to include the identification of resources, current and prospective capacity, operational challenges and priority goals for expansion, (ii) Acquisition of Low-Cost Aviation Technology to meet priority needs, and (iii) Operational Evaluation of technology performance, with a focus on implementation and effectiveness. The Needs Assessment reflects the priorities identified through two site visits to the KWS Air Wing in Nairobi, Kenya, as well as field visits to multiple national parks receiving aerial support and interviewing/surveying KWS Air wing pilots and leadership. Needs Assessment identified some immediate technology needs that includes, GPS with upgrades, including weather application, Night flying capabilities, to include runway lights and night vision technology, Cameras and surveillance equipment, Flight tracking system and/or Emergency Position Indicating Radio Beacon, Lightweight ballistic-resistant body armor, and medical equipment, to include a customized stretcher and standard medical evacuation equipment. Results of this assessment, along with significant input from the KWS Air Wing, will guide the second phase of this project: technology acquisition. Acquired technology will then be evaluated in the field, with a focus on implementation and effectiveness. Results will ultimately be translated for any rural or tribal law enforcement agencies with comparable aerial surveillance missions and operational environments, and jurisdictional challenges, seeking to implement low-cost aviation technology. Results from Needs Assessment phase, including survey results and our ongoing technology acquisition and baseline operational evaluation will be discussed in the paper.Keywords: aerial surveillance mission, aviation technology, counter-poaching, wildlife protection
Procedia PDF Downloads 27524929 Comprehensive Study of Data Science
Authors: Asifa Amara, Prachi Singh, Kanishka, Debargho Pathak, Akshat Kumar, Jayakumar Eravelly
Abstract:
Today's generation is totally dependent on technology that uses data as its fuel. The present study is all about innovations and developments in data science and gives an idea about how efficiently to use the data provided. This study will help to understand the core concepts of data science. The concept of artificial intelligence was introduced by Alan Turing in which the main principle was to create an artificial system that can run independently of human-given programs and can function with the help of analyzing data to understand the requirements of the users. Data science comprises business understanding, analyzing data, ethical concerns, understanding programming languages, various fields and sources of data, skills, etc. The usage of data science has evolved over the years. In this review article, we have covered a part of data science, i.e., machine learning. Machine learning uses data science for its work. Machines learn through their experience, which helps them to do any work more efficiently. This article includes a comparative study image between human understanding and machine understanding, advantages, applications, and real-time examples of machine learning. Data science is an important game changer in the life of human beings. Since the advent of data science, we have found its benefits and how it leads to a better understanding of people, and how it cherishes individual needs. It has improved business strategies, services provided by them, forecasting, the ability to attend sustainable developments, etc. This study also focuses on a better understanding of data science which will help us to create a better world.Keywords: data science, machine learning, data analytics, artificial intelligence
Procedia PDF Downloads 8224928 Enhancing Communicative Skills for Students in Automatics
Authors: Adrian Florin Busu
Abstract:
The communicative approach, or communicative language teaching, used for enhancing communicative skills in students in automatics is a modern teaching approach based on the concept of learning a language through having to communicate real meaning. In the communicative approach, real communication is both the objective of learning and the means through which it takes place. This approach was initiated during the 1970’s and quickly became prominent, as it proposed an alternative to the previous systems-oriented approaches. In other words, instead of focusing on the acquisition of grammar and vocabulary, the communicative approach aims at developing students’ competence to communicate in the target language with an enhanced focus on real-life situations. To put it in an nutshell, CLT considers using the language to be just as important as actually learning the language.Keywords: communication, approach, objective, learning
Procedia PDF Downloads 16024927 Delineation of Fracture Zones for Investigation of Groundwater Potentials Using Vertical Electrical Sounding in a Sedimentary Complex Terrain
Authors: M. N. Yahaya, K. A. Salako, U. Z. Magawata
Abstract:
Vertical electrical sounding (VES) method was used to investigate the groundwater potential at the southern part of Gulumbe district, Kebbi State, north-western part of Nigeria. The study was carried out with the aim of determining the subsurface layer’s parameters (resistivity and thickness) and uses the same to characterize the groundwater potential of the study area. The Schlumberger configuration was used for data acquisition. A total number of thirty-three (33) sounding points (VES) were surveyed over six profiles. The software IPI2WIN was used to obtain n-layered geo-electric sections. The geo-electric section drawn from the results of the interpretation revealed that three subsurface layers could be delineated, which comprise of top soil, sand, sandstone, coarse sand, limestone, and gravelly sand. The results of the resistivity sounding were correlated with the lithological logs of nearby boreholes that expose cross-section geologic units around the study area. We found out that the area is dominated by three subsurface layers. The coarse sand layers constituted the aquifer zones in the majority of sounding stations. Thus, this present study concluded that the depth of any borehole in the study area should be located between the depth of 18.5 to 39 m. The study further classified the VES points penetrated based on their conductivity content as highly suitable, suitable, moderately suitably, and poor zones for groundwater exploration. Hence, from this research, we recommended that boreholes can be sited in high conductivity zones across VES 2, 11, 13, 16, 20, 21, 27, and 33, respectively.Keywords: vertical electrical sounding, resistivity, geo-electric, resistivity, aquifer and groundwater
Procedia PDF Downloads 16424926 Development of Electromyography (EMG) Signal Acquisition System by Simple Electronic Circuits
Authors: Divya Pradip Roy, Md. Zahirul Alam Chowdhury
Abstract:
Electromyography (EMG) sensors are generally used to record the electrical activity produced by skeletal muscles. The conventional EMG sensors available in the market are expensive. This research suggests a low cost EMG sensor design which can be built with simple devices within our reach. In this research, one instrumentation amplifier, two high pass filters, two low pass filters and an inverting amplifier is connected sequentially. The output from the circuit exhibits electrical potential generated by the muscle cells when they are neurologically activated. This electromyography signal is used to control prosthetic devices, identifying neuromuscular diseases and for various other purposes.Keywords: EMG, high pass filter, instrumentation amplifier, inverting amplifier, low pass filter, neuromuscular
Procedia PDF Downloads 17524925 An Ethnographic View of Elementary School English Language Policy Implementation
Authors: Peter Ferguson
Abstract:
In 2018, Japan’s Ministry of Education revised the public elementary school curriculum. As part of widespread reforms, the recent Course of Study established English as an academic subject in Grades 5 and 6 plus lowered the starting age of 'foreign language activities' to Grade 3. These changes were implemented in April 2020. This presentation will examine the process and effects that policy implementation had on schools and teachers. A critical analysis of the 2018 Course of Study policy documents revealed several discourses were expressed concerning not only English education and foreign language acquisition, but that larger political and socioeconomic ideological beliefs on globalization, language, nation, culture, and identity were also articulated. Using excerpts from document analysis, the presenter will demonstrate how competing discourses were expressed in policy texts. Data from interviews with national policymakers also exposed several challenges policymakers faced as they tried to balance competing discourses and articulate important pedagogical concepts while having their voices heard. Findings show that some stakeholders were marginalized during the processes of policy creation, transmission, and implementation. This presentation is part of a larger multiple case study that utilized ethnography of language policy and critical analysis of discourse to examine how English education language policy was implemented into the national elementary school curriculum in Japan, and how stakeholders at the various educational levels contended with the creation, interpretation, and appropriation of the language policy.Keywords: ethnography of language policy, elementary school EFL, language ideologies, discourse analysis
Procedia PDF Downloads 11924924 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography
Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou
Abstract:
Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol
Procedia PDF Downloads 27124923 Vocational and Technical Education in Nigeria: Issues and Challenges
Authors: Maikudi Umar
Abstract:
This paper conceived Vocational and Technical Education as those aspects of educational process, in addition to general education leading to acquisition of practical skills, attitudes as well as basic scientific knowledge as it relates to occupations in various sectors of the economic and social life. The paper therefore viewed Vocational and Technical education as those aspects of educational training designed to provide the recipient with the skills abilities and understanding needed for efficient performance in chosen occupational carrier for self reliance. The paper also examined some major inhibitions to the attainment of self reliance through VTE. The paper also recommended a change of attitudes by governments in Nigeria by providing adequate equipment so as to meet up with the challenges.Keywords: vocational education, technical education, skills and self reliance, issues and challenges
Procedia PDF Downloads 47924922 Women’s Colours in Digital Innovation
Authors: Daniel J. Patricio Jiménez
Abstract:
Digital reality demands new ways of thinking, flexibility in learning, acquisition of new competencies, visualizing reality under new approaches, generating open spaces, understanding dimensions in continuous change, etc. We need inclusive growth, where colors are not lacking, where lights do not give a distorted reality, where science is not half-truth. In carrying out this study, the documentary or bibliographic collection has been taken into account, providing a reflective and analytical analysis of current reality. In this context, deductive and inductive methods have been used on different multidisciplinary information sources. Women today and tomorrow are a strategic element in science and arts, which, under the umbrella of sustainability, implies ‘meeting current needs without detriment to future generations’. We must build new scenarios, which qualify ‘the feminine and the masculine’ as an inseparable whole, encouraging cooperative behavior; nothing is exclusive or excluding, and that is where true respect for diversity must be based. We are all part of an ecosystem, which we will make better as long as there is a real balance in terms of gender. It is the time of ‘the lifting of the veil’, in other words, it is the time to discover the pseudonyms, the women who painted, wrote, investigated, recorded advances, etc. However, the current reality demands much more; we must remove doors where they are not needed. Mass processing of data, big data, needs to incorporate algorithms under the perspective of ‘the feminine’. However, most STEM students (science, technology, engineering, and math) are men. Our way of doing science is biased, focused on honors and short-term results to the detriment of sustainability. Historically, the canons of beauty, the way of looking, of perceiving, of feeling, depended on the circumstances and interests of each moment, and women had no voice in this. Parallel to science, there is an under-representation of women in the arts, but not so much in the universities, but when we look at galleries, museums, art dealers, etc., colours impoverish the gaze and once again highlight the gender gap and the silence of the feminine. Art registers sensations by divining the future, science will turn them into reality. The uniqueness of the so-called new normality requires women to be protagonists both in new forms of emotion and thought, and in the experimentation and development of new models. This will result in women playing a decisive role in the so-called "5.0 society" or, in other words, in a more sustainable, more humane world.Keywords: art, digitalization, gender, science
Procedia PDF Downloads 16524921 Application of Artificial Neural Network Technique for Diagnosing Asthma
Authors: Azadeh Bashiri
Abstract:
Introduction: Lack of proper diagnosis and inadequate treatment of asthma leads to physical and financial complications. This study aimed to use data mining techniques and creating a neural network intelligent system for diagnosis of asthma. Methods: The study population is the patients who had visited one of the Lung Clinics in Tehran. Data were analyzed using the SPSS statistical tool and the chi-square Pearson's coefficient was the basis of decision making for data ranking. The considered neural network is trained using back propagation learning technique. Results: According to the analysis performed by means of SPSS to select the top factors, 13 effective factors were selected, in different performances, data was mixed in various forms, so the different models were made for training the data and testing networks and in all different modes, the network was able to predict correctly 100% of all cases. Conclusion: Using data mining methods before the design structure of system, aimed to reduce the data dimension and the optimum choice of the data, will lead to a more accurate system. Therefore, considering the data mining approaches due to the nature of medical data is necessary.Keywords: asthma, data mining, Artificial Neural Network, intelligent system
Procedia PDF Downloads 27324920 Stop Consonants in Chinese and Slovak: Contrastive Analysis by Using Praat
Authors: Maria Istvanova
Abstract:
The acquisition of the correct pronunciation in Chinese is closely linked to the initial phase of the study. Based on the contrastive analysis, we determine the differences in the pronunciation of stop consonants in Chinese and Slovak taking into consideration the place and manner of articulation to gain a better understanding of the students' main difficulties in the process of acquiring correct pronunciation of Chinese stop consonants. We employ the software Praat for the analysis of the recorded samples with an emphasis on the pronunciation of the students with a varying command of Chinese. The comparison of the VOT length for the individual consonants in the students' pronunciation and the pronunciation of the native speaker exposes the differences between the correct pronunciation and the deviant pronunciation of the students.Keywords: Chinese, contrastive analysis, Praat, pronunciation, Slovak.
Procedia PDF Downloads 13724919 Interpreting Privacy Harms from a Non-Economic Perspective
Authors: Christopher Muhawe, Masooda Bashir
Abstract:
With increased Internet Communication Technology(ICT), the virtual world has become the new normal. At the same time, there is an unprecedented collection of massive amounts of data by both private and public entities. Unfortunately, this increase in data collection has been in tandem with an increase in data misuse and data breach. Regrettably, the majority of data breach and data misuse claims have been unsuccessful in the United States courts for the failure of proof of direct injury to physical or economic interests. The requirement to express data privacy harms from an economic or physical stance negates the fact that not all data harms are physical or economic in nature. The challenge is compounded by the fact that data breach harms and risks do not attach immediately. This research will use a descriptive and normative approach to show that not all data harms can be expressed in economic or physical terms. Expressing privacy harms purely from an economic or physical harm perspective negates the fact that data insecurity may result into harms which run counter the functions of privacy in our lives. The promotion of liberty, selfhood, autonomy, promotion of human social relations and the furtherance of the existence of a free society. There is no economic value that can be placed on these functions of privacy. The proposed approach addresses data harms from a psychological and social perspective.Keywords: data breach and misuse, economic harms, privacy harms, psychological harms
Procedia PDF Downloads 19524918 Machine Learning Analysis of Student Success in Introductory Calculus Based Physics I Course
Authors: Chandra Prayaga, Aaron Wade, Lakshmi Prayaga, Gopi Shankar Mallu
Abstract:
This paper presents the use of machine learning algorithms to predict the success of students in an introductory physics course. Data having 140 rows pertaining to the performance of two batches of students was used. The lack of sufficient data to train robust machine learning models was compensated for by generating synthetic data similar to the real data. CTGAN and CTGAN with Gaussian Copula (Gaussian) were used to generate synthetic data, with the real data as input. To check the similarity between the real data and each synthetic dataset, pair plots were made. The synthetic data was used to train machine learning models using the PyCaret package. For the CTGAN data, the Ada Boost Classifier (ADA) was found to be the ML model with the best fit, whereas the CTGAN with Gaussian Copula yielded Logistic Regression (LR) as the best model. Both models were then tested for accuracy with the real data. ROC-AUC analysis was performed for all the ten classes of the target variable (Grades A, A-, B+, B, B-, C+, C, C-, D, F). The ADA model with CTGAN data showed a mean AUC score of 0.4377, but the LR model with the Gaussian data showed a mean AUC score of 0.6149. ROC-AUC plots were obtained for each Grade value separately. The LR model with Gaussian data showed consistently better AUC scores compared to the ADA model with CTGAN data, except in two cases of the Grade value, C- and A-.Keywords: machine learning, student success, physics course, grades, synthetic data, CTGAN, gaussian copula CTGAN
Procedia PDF Downloads 4424917 Data Access, AI Intensity, and Scale Advantages
Authors: Chuping Lo
Abstract:
This paper presents a simple model demonstrating that ceteris paribus countries with lower barriers to accessing global data tend to earn higher incomes than other countries. Therefore, large countries that inherently have greater data resources tend to have higher incomes than smaller countries, such that the former may be more hesitant than the latter to liberalize cross-border data flows to maintain this advantage. Furthermore, countries with higher artificial intelligence (AI) intensity in production technologies tend to benefit more from economies of scale in data aggregation, leading to higher income and more trade as they are better able to utilize global data.Keywords: digital intensity, digital divide, international trade, scale of economics
Procedia PDF Downloads 68