Search results for: computer anxiety
2467 Net-Trainer-ST: A Swiss Army Knife for Pentesting, Based on Single Board Computer, for Cybersecurity Professionals and Hobbyists
Authors: K. Hołda, D. Śliwa, K. Daniec, A. Nawrat
Abstract:
This article was created as part of the developed master's thesis. It attempts to present a newly developed device, which will support the work of specialists dealing with broadly understood cybersecurity terms. The device is contrived to automate security tests. In addition, it simulates potential cyberattacks in the most realistic way possible, without causing permanent damage to the network, in order to maximize the quality of the subsequent corrections to the tested network systems. The proposed solution is a fully operational prototype created from commonly available electronic components and a single board computer. The focus of the following article is not only put on the hardware part of the device but also on the theoretical and applicatory way in which implemented cybersecurity tests operate and examples of their results.Keywords: Raspberry Pi, ethernet, automated cybersecurity tests, ARP, DNS, backdoor, TCP, password sniffing
Procedia PDF Downloads 1252466 Social Representations: Unplanned and Unwanted Pregnancy in Adolescents from Leon-Mexico
Authors: Alejandra Sierra, Maria de los Angeles Covarrubias, Guillermo Julian Gonzalez, Noe Alfaro
Abstract:
The objective of this study was to identify the cultural dimensions of the terms unplanned pregnancy and unwanted pregnancy built by adolescent women, through the focus of the social representations. Two associative methods were used: free listings and the paired comparison. 72 female students between the ages of 15 and 19 were interviewed, from the downtown area of Leon Guanajuato, Mexico. Words related to inducer terms were classified into five thematic categories: facilitators, consequences, reactions, expectations, and lexicon. The results showed that the social representations of unplanned pregnancy highlighted elements related to economic difficulties and negative emotional aspects, while unwanted pregnancy was associated with negative emotional aspects such as anger, anxiety, and sadness. The meanings each person attributes to terms related to pregnancy are culturally constructed and differ between populations; therefore, more attention should be paid to understanding the cultural meanings and attitudes of people in fertility decision-making, including also the views of adolescent men and other types of population, stratified by age groups and social conditions.Keywords: adolescent, qualitative research, unplanned pregnancy, unwanted pregnancy
Procedia PDF Downloads 2132465 Psychological Factors as Predictor of Sports Violence among Tertiary Institutions
Authors: Oluwasgun Moses Jolayemi
Abstract:
Violence has become a fairly often occurrence in sports (within our tertiary institutions), a development that is giving every society in the world sleepless night. School violence is part of youth violence, a broader salient public health problem. This study employing a questionnaire-based survey strategy aimed at investigates psychological factors as predictors of sports violence among Oyo state tertiary institution. A sample of Two hundred athletes and three tertiary institutions were selected through purposive sampling from the Oyo State tertiary institution. The estimated reliability co-efficient of the instrument was found to be 0.89 using cronbach Alpha technique. Data were analyzed at 0.05 level of significance using Statistical Package for the Social Sciences (SPSS) software, version 20.0. Five hypotheses were tested using Pearson Correlation. Result revealed that personality, anxiety, mental health has no significant influence on sports violence; mental stress has a significant influence on sports violence. Based on the findings, it was recommended that sport management should reduce work overload and that they should organized seminars and social activities to help athletes lose up.Keywords: Ibadan, mental health, personality, psychology, violence
Procedia PDF Downloads 3032464 Clinical Training Simulation Experience of Medical Sector Students
Authors: Tahsien Mohamed Okasha
Abstract:
Simulation is one of the emerging educational strategies that depend on the creation of scenarios to imitate what could happen in real life. At the time of COVID, we faced big obstacles in medical education, specially the clinical part and how we could apply it, the simulation was the golden key. Simulation is a very important tool of education for medical sector students, through creating a safe, changeable, quiet environment with less anxiety level for students to practice and to have repeated trials on their competencies. That impacts the level of practice, achievement, and the way of acting in real situations and experiences. A blind Random sample of students from different specialties and colleges who came and finished their training in an integrated environment was collected and tested, and the responses were graded from (1-5). The results revealed that 77% of the studied subjects agreed that dealing and interacting with different medical sector candidates in the same place was beneficial. 77% of the studied subjects agreed that simulations were challenging in thinking and decision-making skills .75% agreed that using high-fidelity manikins was helpful. 75% agree .76% agreed that working in a safe, prepared environment is helpful for realistic situations.Keywords: simulation, clinical training, education, medical sector students
Procedia PDF Downloads 292463 A Survey on Genetic Algorithm for Intrusion Detection System
Authors: Prikhil Agrawal, N. Priyanka
Abstract:
With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security
Procedia PDF Downloads 2972462 Standardization of the Behavior Assessment System for Children-2, Parent Rating Scales - Adolescent Form (K BASC-2, PRS-A) among Korean Sample
Authors: Christine Myunghee Ahn, Sung Eun Baek, Sun Young Park
Abstract:
The purpose of this study was to evaluate the cross-cultural validity of the Korean version of the Behavioral Assessment System for Children 2nd Edition, Parent Rating Scales - Adolescent Form (K BASC-2, PRS-A). The 150-item K BASC-2, PRS-A questionnaire was administered to a total of 690 Korean parents or caregivers (N=690) of adolescent children in middle school and high school. Results from the confirmatory and exploratory factor analyses indicate that the K BASC-2, PRS-A yielded a 3-factor solution similar to the factor structure found in the original version of the BASC-2. The internal consistencies using the Cronbach’s alpha of the composite scale scores were in the .92~ .98 range. The overall reliability and validity of the K BASC-2, PRS-A seem adequate. Structural equation modeling was used to verify the theoretical relationship among the scales of Adaptability, Withdrawal, Somatization, Depression, and Anxiety, to render additional support for internal validity. Other relevant findings, practical implications regarding the use of the KBASC-2, PRS-A and suggestions for future research are discussed.Keywords: behavioral assessment system, cross-cultural validity, parent report, screening
Procedia PDF Downloads 4892461 Fitness Action Recognition Based on MediaPipe
Authors: Zixuan Xu, Yichun Lou, Yang Song, Zihuai Lin
Abstract:
MediaPipe is an open-source machine learning computer vision framework that can be ported into a multi-platform environment, which makes it easier to use it to recognize the human activity. Based on this framework, many human recognition systems have been created, but the fundamental issue is the recognition of human behavior and posture. In this paper, two methods are proposed to recognize human gestures based on MediaPipe, the first one uses the Adaptive Boosting algorithm to recognize a series of fitness gestures, and the second one uses the Fast Dynamic Time Warping algorithm to recognize 413 continuous fitness actions. These two methods are also applicable to any human posture movement recognition.Keywords: computer vision, MediaPipe, adaptive boosting, fast dynamic time warping
Procedia PDF Downloads 1182460 A Comparison of Efficacy of Two Drugs Combinations of 0.0625% Levobupivacaine with Fentanyl and 0.1% Ropivacaine with Fentanyl for Postoperative Analgesia after Cytoreductive Surgery with Hyperthermic Intraperotineal Chemotherapy (Crs + Hipec)
Authors: Vishal Bhatnagar
Abstract:
The objective of this study is to compare the efficacy of epidural analgesia of two amide local anesthetics, ropivacaine and levobupivacaine, with fentanyl for postoperative analgesia in major abdominal surgery CRS+HIPEC. Cytoreductive surgery and hyperthermic intraperitoneal chemotherapy (CRS+HIPEC) are done for primary peritoneal malignancies or peritoneal spread of malignant neoplasm. CRS and HIPEC are considered one of the most painful surgery among all major abdominal surgeries. Poorly managed postoperative pain elevates stress, increases anxiety, causes prolonged Hospital stay, increases opioid requirement and side effects, increases the cost of treatment and psychological effects on patient and family. It affects the quality of life of patients. The epidural technique provides better postoperative analgesia, earlier recovery of bowel function, fewer side effects, higher patient satisfaction, and an improvement in life quality in the postoperative days after abdominal surgery than other analgesic techniques.Keywords: HIPEC, postoperative analgesia, cytoreductive surgery, VAS score, rescue analgesia
Procedia PDF Downloads 422459 Computer-Aided Detection of Simultaneous Abdominal Organ CT Images by Iterative Watershed Transform
Authors: Belgherbi Aicha, Hadjidj Ismahen, Bessaid Abdelhafid
Abstract:
Interpretation of medical images benefits from anatomical and physiological priors to optimize computer-aided diagnosis applications. Segmentation of liver, spleen and kidneys is regarded as a major primary step in the computer-aided diagnosis of abdominal organ diseases. In this paper, a semi-automated method for medical image data is presented for the abdominal organ segmentation data using mathematical morphology. Our proposed method is based on hierarchical segmentation and watershed algorithm. In our approach, a powerful technique has been designed to suppress over-segmentation based on mosaic image and on the computation of the watershed transform. Our algorithm is currency in two parts. In the first, we seek to improve the quality of the gradient-mosaic image. In this step, we propose a method for improving the gradient-mosaic image by applying the anisotropic diffusion filter followed by the morphological filters. Thereafter, we proceed to the hierarchical segmentation of the liver, spleen and kidney. To validate the segmentation technique proposed, we have tested it on several images. Our segmentation approach is evaluated by comparing our results with the manual segmentation performed by an expert. The experimental results are described in the last part of this work.Keywords: anisotropic diffusion filter, CT images, morphological filter, mosaic image, simultaneous organ segmentation, the watershed algorithm
Procedia PDF Downloads 4402458 Blockchain Technology Security Evaluation: Voting System Based on Blockchain
Authors: Omid Amini
Abstract:
Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election.Keywords: blockchain, technology, security, information, voting system, transparency
Procedia PDF Downloads 1322457 Effective Strategies for Teaching English Language to Beginners in Primary Schools in Nigeria
Authors: Halima Musa Kamilu
Abstract:
This paper discusses the effective strategies for teaching English language to learners in primary schools in Nigeria. English language development is the systematic use of instructional strategies designed to promote the acquisition of English by pupils in primary schools whose primary language is not English. Learning a second language is through total immersion. These strategies support this learning method, allowing pupils to have the knowledge of English language in a pattern similar to the way they learned their native language through regular interaction with others who already know the language. The focus is on fluency and learning to speak English in a social context with native speakers. The strategies allow for effective acquisition. The paper also looked into the following areas: visuals that reinforce spoken or written words, employ gestures for added emphasis, adjusting of speech, stressing of high-frequency vocabulary words, use of fewer idioms and clarifying the meaning of words or phrases in context, stressing of participatory learning and maintaining a low anxiety level and boosting of enthusiasm. It recommended that the teacher include vocabulary words that will make the content more comprehensible to the learner.Keywords: effective, strategies, teaching, beginners and primary schools
Procedia PDF Downloads 4942456 Performance Evaluation of Single Basin Solar Still
Authors: Prem Singh, Jagdeep Singh
Abstract:
In an attempt to investigate the performance of single basin solar still for climate conditions of Ludhiana a single basin solar still was designed, fabricated and tested. The energy balance equations for various parts of the still are solved by Gauss-Seidel iteration method. Computer model was made and experimentally validated. The validated computer model was used to estimate the annual distillation yield and performance ratio of the still for Ludhiana. The Theoretical and experimental distillation yield were 4318.79 ml and 3850 ml, respectively for the typical day. The predicted distillation yield was 12.5% higher than the experimental yield. The annual distillation yield per square meter aperture area and annual performance ratio for single basin solar still is 1095 liters and 0.43 liters, respectively. The payback period for micro-stepped solar still is 2.5 years.Keywords: solar distillation, solar still, single basin, still
Procedia PDF Downloads 5042455 TACTICAL: Ram Image Retrieval in Linux Using Protected Mode Architecture’s Paging Technique
Authors: Sedat Aktas, Egemen Ulusoy, Remzi Yildirim
Abstract:
This article explains how to get a ram image from a computer with a Linux operating system and what steps should be followed while getting it. What we mean by taking a ram image is the process of dumping the physical memory instantly and writing it to a file. This process can be likened to taking a picture of everything in the computer’s memory at that moment. This process is very important for tools that analyze ram images. Volatility can be given as an example because before these tools can analyze ram, images must be taken. These tools are used extensively in the forensic world. Forensic, on the other hand, is a set of processes for digitally examining the information on any computer or server on behalf of official authorities. In this article, the protected mode architecture in the Linux operating system is examined, and the way to save the image sample of the kernel driver and system memory to disk is followed. Tables and access methods to be used in the operating system are examined based on the basic architecture of the operating system, and the most appropriate methods and application methods are transferred to the article. Since there is no article directly related to this study on Linux in the literature, it is aimed to contribute to the literature with this study on obtaining ram images. LIME can be mentioned as a similar tool, but there is no explanation about the memory dumping method of this tool. Considering the frequency of use of these tools, the contribution of the study in the field of forensic medicine has been the main motivation of the study due to the intense studies on ram image in the field of forensics.Keywords: linux, paging, addressing, ram-image, memory dumping, kernel modules, forensic
Procedia PDF Downloads 1172454 Real-Time Gesture Recognition System Using Microsoft Kinect
Authors: Ankita Wadhawan, Parteek Kumar, Umesh Kumar
Abstract:
Gesture is any body movement that expresses some attitude or any sentiment. Gestures as a sign language are used by deaf people for conveying messages which helps in eliminating the communication barrier between deaf people and normal persons. Nowadays, everybody is using mobile phone and computer as a very important gadget in their life. But there are some physically challenged people who are blind/deaf and the use of mobile phone or computer like device is very difficult for them. So, there is an immense need of a system which works on body gesture or sign language as input. In this research, Microsoft Kinect Sensor, SDK V2 and Hidden Markov Toolkit (HTK) are used to recognize the object, motion of object and human body joints through Touch less NUI (Natural User Interface) in real-time. The depth data collected from Microsoft Kinect has been used to recognize gestures of Indian Sign Language (ISL). The recorded clips are analyzed using depth, IR and skeletal data at different angles and positions. The proposed system has an average accuracy of 85%. The developed Touch less NUI provides an interface to recognize gestures and controls the cursor and click operation in computer just by waving hand gesture. This research will help deaf people to make use of mobile phones, computers and socialize among other persons in the society.Keywords: gesture recognition, Indian sign language, Microsoft Kinect, natural user interface, sign language
Procedia PDF Downloads 3062453 God, The Master Programmer: The Relationship Between God and Computers
Authors: Mohammad Sabbagh
Abstract:
Anyone who reads the Torah or the Quran learns that GOD created everything that is around us, seen and unseen, in six days. Within HIS plan of creation, HE placed for us a key proof of HIS existence which is essentially computers and the ability to program them. Digital computer programming began with binary instructions, which eventually evolved to what is known as high-level programming languages. Any programmer in our modern time can attest that you are essentially giving the computer commands by words and when the program is compiled, whatever is processed as output is limited to what the computer was given as an ability and furthermore as an instruction. So one can deduce that GOD created everything around us with HIS words, programming everything around in six days, just like how we can program a virtual world on the computer. GOD did mention in the Quran that one day where GOD’s throne is, is 1000 years of what we count; therefore, one might understand that GOD spoke non-stop for 6000 years of what we count, and gave everything it’s the function, attributes, class, methods and interactions. Similar to what we do in object-oriented programming. Of course, GOD has the higher example, and what HE created is much more than OOP. So when GOD said that everything is already predetermined, it is because any input, whether physical, spiritual or by thought, is outputted by any of HIS creatures, the answer has already been programmed. Any path, any thought, any idea has already been laid out with a reaction to any decision an inputter makes. Exalted is GOD!. GOD refers to HIMSELF as The Fastest Accountant in The Quran; the Arabic word that was used is close to processor or calculator. If you create a 3D simulation of a supernova explosion to understand how GOD produces certain elements and fuses protons together to spread more of HIS blessings around HIS skies; in 2022 you are going to require one of the strongest, fastest, most capable supercomputers of the world that has a theoretical speed of 50 petaFLOPS to accomplish that. In other words, the ability to perform one quadrillion (1015) floating-point operations per second. A number a human cannot even fathom. To put in more of a perspective, GOD is calculating when the computer is going through those 50 petaFLOPS calculations per second and HE is also calculating all the physics of every atom and what is smaller than that in all the actual explosion, and it’s all in truth. When GOD said HE created the world in truth, one of the meanings a person can understand is that when certain things occur around you, whether how a car crashes or how a tree grows; there is a science and a way to understand it, and whatever programming or science you deduce from whatever event you observed, it can relate to other similar events. That is why GOD might have said in The Quran that it is the people of knowledge, scholars, or scientist that fears GOD the most! One thing that is essential for us to keep up with what the computer is doing and for us to track our progress along with any errors is we incorporate logging mechanisms and backups. GOD in The Quran said that ‘WE used to copy what you used to do’. Essentially as the world is running, think of it as an interactive movie that is being played out in front of you, in a full-immersive non-virtual reality setting. GOD is recording it, from every angle to every thought, to every action. This brings the idea of how scary the Day of Judgment will be when one might realize that it’s going to be a fully immersive video when we would be getting and reading our book.Keywords: programming, the Quran, object orientation, computers and humans, GOD
Procedia PDF Downloads 1072452 Mapping Network Connection of Personality Traits and Psychiatric Symptoms in Chinese Adolescents
Authors: Yichao Lv, Minmin Cai, Yanqiang Tao, Xinyuan Zou, Chao Zhang, Xiangping Liu
Abstract:
Objective: This study aims to explore the network structure of personality traits and mental health and identify key factors for effective intervention strategies. Methods: All participants (N = 6,067; 3,368 females) underwent the Eysenck Personality Scale (EPQ) to measure personality traits and the Symptom Self-rating Scale (SCL-90) to measure psychiatric symptoms. Using the mean value of the SCL-90 total score plus one standard deviation as the cutoff, 854 participants (14.08%; 528 females) were categorized as individuals exhibiting potential psychological symptoms and were included in the follow-up network analysis. The structure and bridge centrality of the network for dimensions of EPQ and SCL-90 were estimated. Results: Between the EPQ and SCL-90, psychoticism (P), extraversion (E), and neuroticism (N) showed the strongest positive correlations with somatization (Som), interpersonal sensitivity (IS), and hostility (Hos), respectively. Extraversion (E), somatization (Som), and anxiety (Anx) were identified as the most important bridge factors influencing the overall network. Conclusions: This study explored the network structure and complex connections between mental health and personality traits from a network perspective, providing potential targets for intervening in adolescent personality traits and mental health.Keywords: EPQ, SCL-90, Chinese adolescents, network analysis
Procedia PDF Downloads 472451 Eros and Postmodern Nihilism in Don Delillo’s Zero K (2016): A Psychoanalytical Reading
Authors: Nouioua Wafa
Abstract:
It is broadly accepted that the existence of postmodern individuals is distinguished by a predominant presence of skepticism, anxiety and loneliness. This social unrest is the consequence of a drastic shift in how reality and meaning are conceived, which has been replaced by something that is referred to in media theory and criticism as hyperreality. The purpose of this paper is to investigate the hyperreality that exists in the postmodern nihilistic American community that Don Delillo depicts in Zero K (2016) through the use of Jean Baudrillard's notions of Simulacra and Simulations. It is a troubled technological late capitalist society obsessed with immortality and fear of demise, and ergo it is an appropriate reading to implement Sigmund Freud’s theory of life drive (Eros), which refers to the life instinct fundamental to all humans and the urge to support productivity and construction. The results obtained from a qualitative analysis of Zero K indicate the presence of a clash between the character’s life drive and fear of mortality. In an effort to escape loneliness and death, the character Ross Lockhart undergoes, after a moment of hesitation, cryonic freezing in the convergence to preserve his life as well as that of his wife Artis, yet his son Jeffery is firmly convinced of the uselessness of combating the inevitable death.Keywords: Don DeLillo, Eros, postmodernism Nihilism, Zero K
Procedia PDF Downloads 822450 Age-Based Interface Design for Children’s CAPT Systems
Authors: Saratu Yusuf Ilu, Mumtaz B. Mustafa, Siti Salwah Salim, Mehdi Malekzadeh
Abstract:
Children today use computer based application in various activities especially for learning and education. Many of these tools and application such as the Computer Aided Pronunciation Training (CAPT) system enable children to explore and experience them with little supervision from the adults. In order for these tools and application to have maximum effect on the children’s learning and education, it must be attractive to the children to use them. This could be achieved with the proper user interface (UI) design. As children grow, so do their ability, taste and preferences. They interact differently with these applications as they grow older. This study reviews several articles on how age factor influences the UI design. The review focuses on age related abilities such as cognitive, literacy, concentration and feedback requirement. We have also evaluated few of existing CAPT systems and determine the influence of age-based factors on the interface design.Keywords: children, age-based interaction, learning application, age-based capability
Procedia PDF Downloads 4242449 Eros and Postmodern Nihilism in Don Delillo’s Zero K (2016): A Psychoanalytical Reading
Authors: Wafa Nouioua
Abstract:
It is broadly accepted that the existence of postmodern individuals is distinguished by a predominant presence of skepticism, anxiety and loneliness. This social unrest is the consequence of a drastic shift in how reality and meaning are conceived, which has been replaced by something that is referred to in media theory and criticism as hyperreality. The purpose of this paper is to investigate the hyperreality that exists in the postmodern nihilistic American community that Don Delillo depicts in Zero K (2016) through the use of Jean Baudrillard notions of Simulacra and Simulations. It is a troubled technological late capitalist society obsessed with immortality and fear of demise, ergo it is an appropriate reading to implement Sigmund Freud’s theory of life drive (Eros), which refers to the life instinct fundamental to all humans and the urge to support productivity and construction. The results obtained from a qualitative analysis of Zero K indicate the presence of a clash between the character’s life drive and fear of mortality. In an effort to escape loneliness and death, the character Ross Lockhart undergoes, after a moment of hesitation, cryonic freezing in the convergence to preserve his life as well as that of his wife Artis, yet his son Jeffery is firmly convinced of the uselessness of combating the inevitable death.Keywords: Don Dellilo, Eros, Postmodernism Nihilism, Zero K
Procedia PDF Downloads 742448 Iranian EFL Learners' Attitudes towards Computer Assisted Language Learning (CALL)
Authors: Rose Shayeghi, Pejman Hosseiniun, Ghasem Ghorbanirostam
Abstract:
The present study was conducted to investigate the Iranian EFL learners’ attitudes toward the use of computer technology in language classes as a method of improving English learning. To this end, 120 male and female Iranian learners participated in the study. Instrumentation included a 20-item questionnaire. The analysis of the data revealed that the majority of learners had a positive attitude towards the application of CALL in language classes. Moreover, independent samples t-tests indicated that male participants had a significantly more positive attitude compared with that of the female participants. Finally, the results obtained through ANOVA revealed that the youngest age group had a significantly more positive attitude toward the use of technology in language classes compared to the other age groups.Keywords: EFL learners, Iranian learners, CALL, language learning
Procedia PDF Downloads 4432447 Paediatric Motor Difficulties and Internalising Problems: An Integrative Review on the Environmental Stress Hypothesis
Authors: Noah Erskine, Jaime Barratt, John Cairney
Abstract:
The current study aims to provide an in-depth analysis and extension of the Environmental Stress Hypothesis (ESH) framework, focusing on the complex interplay between poor motor skills and internalising problems like anxiety and depression. Using an integrative research review methodology, this study synthesizes findings from 38 articles, both empirical and theoretical, building upon the foundational work of the model. The hypothesis posits that poor motor skills serve as a primary stressor, leading to internalising problems through various secondary stressors. A rigorous comparison of data was conducted, considering study design, findings, and methodologies - while giving special attention to variables such as age, sex, and comorbidities. The study also enhances the ESH framework by introducing resource buffers, including optimism and familial support, as additional influencing factors. This multi-level approach yields a more nuanced and comprehensive ESH framework, highlighting the need for future studies to consider intersectional variables and how they may vary across various life stages.Keywords: motor coordination, mental health, developmental coordination disorders, paediatric comorbidities, obesity, peer problems
Procedia PDF Downloads 752446 Mindfulness Meditation in Higher Education
Authors: Steve Haberlin
Abstract:
United States college students are experiencing record-high stress and anxiety rates, and due to technological advances, there are more distractions in the classroom. With these challenges comes the need to explore additional, non-traditional pedagogical strategies that can help students de-stress, become centered, and feel more deeply connected to content. In addition, embedding contemplative practices, such as mindfulness meditation, in the higher education classroom could assist faculty in presenting a more holistic education that encourages students to develop self-awareness, emotional intelligence, compassion, interconnectedness, and other “non-academic” qualities. Brief meditation may help students de-stress, focus, and connect. A facilitation guide could also help faculty implement classroom meditation practices; however, additional research is needed to determine how to best train faculty, what meditation techniques work best with students, and how to handle resistance. In this paper, a two-phase study is presented that involves a mindfulness meditation intervention with 180 undergraduate students at a private college in the southeastern United States. Data were collected through qualitative surveys and journaling and analyzed for themes. Findings included a majority of students reporting improved calm, reduced stress, and increased focus and ability to transition to classroom instruction.Keywords: college students, higher education, mindfulness meditation, stress
Procedia PDF Downloads 642445 3D Object Retrieval Based on Similarity Calculation in 3D Computer Aided Design Systems
Authors: Ahmed Fradi
Abstract:
Nowadays, recent technological advances in the acquisition, modeling, and processing of three-dimensional (3D) objects data lead to the creation of models stored in huge databases, which are used in various domains such as computer vision, augmented reality, game industry, medicine, CAD (Computer-aided design), 3D printing etc. On the other hand, the industry is currently benefiting from powerful modeling tools enabling designers to easily and quickly produce 3D models. The great ease of acquisition and modeling of 3D objects make possible to create large 3D models databases, then, it becomes difficult to navigate them. Therefore, the indexing of 3D objects appears as a necessary and promising solution to manage this type of data, to extract model information, retrieve an existing model or calculate similarity between 3D objects. The objective of the proposed research is to develop a framework allowing easy and fast access to 3D objects in a CAD models database with specific indexing algorithm to find objects similar to a reference model. Our main objectives are to study existing methods of similarity calculation of 3D objects (essentially shape-based methods) by specifying the characteristics of each method as well as the difference between them, and then we will propose a new approach for indexing and comparing 3D models, which is suitable for our case study and which is based on some previously studied methods. Our proposed approach is finally illustrated by an implementation, and evaluated in a professional context.Keywords: CAD, 3D object retrieval, shape based retrieval, similarity calculation
Procedia PDF Downloads 2622444 Thermal and Hydraulic Design of Shell and Tube Heat Exchangers
Authors: Ahmed R. Ballil
Abstract:
Heat exchangers are devices used to transfer heat between two fluids. These devices are utilized in many engineering and industrial applications such as heating, cooling, condensation and boiling processes. The fluids might be in direct contact (mixed), or they separated by a solid wall to avoid mixing. In the present paper, interactive computer-aided design of shell and tube heat exchangers is developed using Visual Basic computer code as a framework. This design is based on the Bell-Delaware method, which is one of the very well known methods reported in the literature for the design of shell and tube heat exchangers. Physical properties for either the tube or the shell side fluids are internally evaluated by calling on an enormous data bank composed of more than a hundred fluid compounds. This contributes to increase the accuracy of the present design. The international system of units is considered in the developed computer program. The present design has an added feature of being capable of performing modification based upon a preset design criterion, such that an optimum design is obtained at satisfying constraints set either by the user or by the method itself. Also, the present code is capable of giving an estimate of the approximate cost of the heat exchanger based on the predicted surface area of the exchanger evaluated by the program. Finally, the present thermal and hydraulic design code is tested for accuracy and consistency against some of existed and approved designs of shell and tube heat exchangers.Keywords: bell-delaware method, heat exchangers, shell and tube, thermal and hydraulic design
Procedia PDF Downloads 1482443 Simulation for the Magnetized Plasma Compression Study
Authors: Victor V. Kuzenov, Sergei V. Ryzhkov
Abstract:
Ongoing experimental and theoretical studies on magneto-inertial confinement fusion (Angara, C-2, CJS-100, General Fusion, MagLIF, MAGPIE, MC-1, YG-1, Omega) and new constructing facilities (Baikal, C-2W, Z300 and Z800) require adequate modeling and description of the physical processes occurring in high-temperature dense plasma in a strong magnetic field. This paper presents a mathematical model, numerical method, and results of the computer analysis of the compression process and the energy transfer in the target plasma, used in magneto-inertial fusion (MIF). The computer simulation of the compression process of the magnetized target by the high-power laser pulse and the high-speed plasma jets is presented. The characteristic patterns of the two methods of the target compression are being analysed.Keywords: magnetized target, magneto-inertial fusion, mathematical model, plasma and laser beams
Procedia PDF Downloads 2962442 Musical Tesla Coil Controlled by an Audio Signal Processed in Matlab
Authors: Sandra Cuenca, Danilo Santana, Anderson Reyes
Abstract:
The following project is based on the manipulation of audio signals through the Matlab software, which has an audio signal that is modified, and its resultant obtained through the auxiliary port of the computer is passed through a signal amplifier whose amplified signal is connected to a tesla coil which has a behavior like a vumeter, the flashes at the output of the tesla coil increase and decrease its intensity depending on the audio signal in the computer and also the voltage source from which it is sent. The amplified signal then passes to the tesla coil being shown in the plasma sphere with the respective flashes; this activation is given through the specified parameters that we want to give in the MATLAB algorithm that contains the digital filters for the manipulation of our audio signal sent to the tesla coil to be displayed in a plasma sphere with flashes of the combination of colors commonly pink and purple that varies according to the tone of the song.Keywords: auxiliary port, tesla coil, vumeter, plasma sphere
Procedia PDF Downloads 902441 The Use of Computer Simulation as Technological Education for Crisis Management Staff
Authors: Jiří Barta, Josef Krahulec, Jiří F. Urbánek
Abstract:
Education and practical training crisis management members are a topical issue nowadays. The paper deals with the perspectives and possibilities of ‘smart solutions’ to education for crisis management staff. Currently, there are a large number of simulation tools, which notes that they are suitable for practical training of crisis management staff. The first part of the paper is focused on the introduction of the technology simulation tools. The simulators aim is to create a realistic environment for the practical training of extending units of crisis staff. The second part of the paper concerns the possibilities of using the simulation technology to the education process. The aim of this section is to introduce the practical capabilities and potential of the simulation programs for practical training of crisis management staff.Keywords: crisis management staff, computer simulation, software, technological education
Procedia PDF Downloads 3542440 Optimized Brain Computer Interface System for Unspoken Speech Recognition: Role of Wernicke Area
Authors: Nassib Abdallah, Pierre Chauvet, Abd El Salam Hajjar, Bassam Daya
Abstract:
In this paper, we propose an optimized brain computer interface (BCI) system for unspoken speech recognition, based on the fact that the constructions of unspoken words rely strongly on the Wernicke area, situated in the temporal lobe. Our BCI system has four modules: (i) the EEG Acquisition module based on a non-invasive headset with 14 electrodes; (ii) the Preprocessing module to remove noise and artifacts, using the Common Average Reference method; (iii) the Features Extraction module, using Wavelet Packet Transform (WPT); (iv) the Classification module based on a one-hidden layer artificial neural network. The present study consists of comparing the recognition accuracy of 5 Arabic words, when using all the headset electrodes or only the 4 electrodes situated near the Wernicke area, as well as the selection effect of the subbands produced by the WPT module. After applying the articial neural network on the produced database, we obtain, on the test dataset, an accuracy of 83.4% with all the electrodes and all the subbands of 8 levels of the WPT decomposition. However, by using only the 4 electrodes near Wernicke Area and the 6 middle subbands of the WPT, we obtain a high reduction of the dataset size, equal to approximately 19% of the total dataset, with 67.5% of accuracy rate. This reduction appears particularly important to improve the design of a low cost and simple to use BCI, trained for several words.Keywords: brain-computer interface, speech recognition, artificial neural network, electroencephalography, EEG, wernicke area
Procedia PDF Downloads 2712439 Treatment and Diagnostic Imaging Methods of Fetal Heart Function in Radiology
Authors: Mahdi Farajzadeh Ajirlou
Abstract:
Prior evidence of normal cardiac anatomy is desirable to relieve the anxiety of cases with a family history of congenital heart disease or to offer the option of early gestation termination or close follow-up should a cardiac anomaly be proved. Fetal heart discovery plays an important part in the opinion of the fetus, and it can reflect the fetal heart function of the fetus, which is regulated by the central nervous system. Acquisition of ventricular volume and inflow data would be useful to quantify more valve regurgitation and ventricular function to determine the degree of cardiovascular concession in fetal conditions at threat for hydrops fetalis. This study discusses imaging the fetal heart with transvaginal ultrasound, Doppler ultrasound, three-dimensional ultrasound (3DUS) and four-dimensional (4D) ultrasound, spatiotemporal image correlation (STIC), glamorous resonance imaging and cardiac catheterization. Doppler ultrasound (DUS) image is a kind of real- time image with a better imaging effect on blood vessels and soft tissues. DUS imaging can observe the shape of the fetus, but it cannot show whether the fetus is hypoxic or distressed. Spatiotemporal image correlation (STIC) enables the acquisition of a volume of data concomitant with the beating heart. The automated volume accession is made possible by the array in the transducer performing a slow single reach, recording a single 3D data set conforming to numerous 2D frames one behind the other. The volume accession can be done in a stationary 3D, either online 4D (direct volume scan, live 3D ultrasound or a so-called 4D (3D/ 4D)), or either spatiotemporal image correlation-STIC (off-line 4D, which is a circular volume check-up). Fetal cardiovascular MRI would appear to be an ideal approach to the noninvasive disquisition of the impact of abnormal cardiovascular hemodynamics on antenatal brain growth and development. Still, there are practical limitations to the use of conventional MRI for fetal cardiovascular assessment, including the small size and high heart rate of the mortal fetus, the lack of conventional cardiac gating styles to attend data accession, and the implicit corruption of MRI data due to motherly respiration and unpredictable fetal movements. Fetal cardiac MRI has the implicit to complement ultrasound in detecting cardiovascular deformations and extracardiac lesions. Fetal cardiac intervention (FCI), minimally invasive catheter interventions, is a new and evolving fashion that allows for in-utero treatment of a subset of severe forms of congenital heart deficiency. In special cases, it may be possible to modify the natural history of congenital heart disorders. It's entirely possible that future generations will ‘repair’ congenital heart deficiency in utero using nanotechnologies or remote computer-guided micro-robots that work in the cellular layer.Keywords: fetal, cardiac MRI, ultrasound, 3D, 4D, heart disease, invasive, noninvasive, catheter
Procedia PDF Downloads 392438 Attitudes of Saudi Students Attending the English Programmes of the Royal Commission for Jubail and Yanbu toward Using Computer-Assisted Language Learning
Authors: Sultan Ahmed Arishi
Abstract:
The objective of the study was to investigate the attitude of the Saudi students attending the English Language programmes of the Royal Commission for Jubail towards using CALL, as well as to discover whether computer-assisted teaching is useful and valuable for students in learning English. Data were collected with the help of interviews and survey questionnaires. The outcomes of the investigation showed that students had a positive attitude towards CALL. Moreover, the listening skills of the students had the most substantial effect on students learning English through CALL. Unexpectedly, the teaching staff, equipment, curriculum, or even a student's poor English background was a distinct barrier that attributed to any weaknesses of using CALL, or in other words, all these factors were of a similar attitude.Keywords: CALL, teaching aids, teaching technology, teaching English with technology, teaching English in Saudi Arabia
Procedia PDF Downloads 145