Search results for: goal question metrics
4729 Early Childhood Education for Bilingual Children: A Cross-Cultural Examination
Authors: Dina C. Castro, Rossana Boyd, Eugenia Papadaki
Abstract:
Immigration within and across continents is currently a global reality. The number of people leaving their communities in search for a better life for them and their families has increased dramatically during the last twenty years. Therefore, young children of the 21st century around the World are growing up in diverse communities, exposed to many languages and cultures. One consequence of these migration movements is the increased linguistic diversity in school settings. Depending on the linguistic history and the status of languages in the communities (i.e., minority-majority; majority-majority) the instructional approaches will differ. This session will discuss how bilingualism is addressed in early education programs in both minority-majority and majority-majority language communities, analyzing experiences in three countries with very distinct societal and demographic characteristics: Peru (South America), the United States (North America), and Italy (European Union). The ultimate goal is to identify commonalities and differences across the three experiences that could lead to a discussion of bilingualism in early education from a global perspective. From Peru, we will discuss current national language and educational policies that have lead to the design and implementation of bilingual and intercultural education for children in indigenous communities. We will also discuss how those practices are being implemented in preschool programs, the progress made and challenges encountered. From the United States, we will discuss the early education of Spanish-English bilingual preschoolers, including the national policy environment, as well as variations in language of instruction approaches currently being used with these children. From Italy, we will describe early education practices in the Bilingual School of Monza, in northern Italy, a school that has 20 years promoting bilingualism and multilingualism in education. While the presentations from Peru and the United States will discuss bilingualism in a majority-minority language environment, this presentation will lead to a discussion on the opportunities and challenges of promoting bilingualism in a majority-majority language environment. It is evident that innovative models and policies are necessary to prevent inequality of opportunities for bilingual children beginning in their earliest years. The cross-cultural examination of bilingual education experiences for young children in three part of the World will allow us to learn from our success and challenges. The session will end with a discussion of the following question: To what extent are early care and education programs being effective in promoting positive development and learning among all children, including those from diverse language, ethnic and cultural backgrounds? We expect to identify, with participants to our session, a set of recommendations for policy and program development that could ensure access to high quality early education for all bilingual children.Keywords: early education for bilingual children, global perspectives in early education, cross-cultural, language policies
Procedia PDF Downloads 2984728 Feminism and the Nigerian Female Question: A Feminist Appraisal of Zaynab Alkali’s Stillborn
Authors: Ogbu Harry Omilonye
Abstract:
This paper examines feminism as a literary ideology which attempts to win for women a status of recognition and parity in a male-dominated society like Nigeria. This article deals essentially with the emergence of the ideology and literary personalities behind it. It focuses sharply on Zaynab Alkali’s brand of feminism as demonstrated in the delineation of her female characters vis-à-vis her male characters. The woman’s destiny, this paper believes, lies in her hand, and that true emancipation of women can only be realized through education and hard work.Keywords: feminism, stillborn, literary ideology, literature
Procedia PDF Downloads 2704727 Near Infrared Spectrometry to Determine the Quality of Milk, Experimental Design Setup and Chemometrics: Review
Authors: Meghana Shankara, Priyadarshini Natarajan
Abstract:
Infrared (IR) spectroscopy has revolutionized the way we look at materials around us. Unraveling the pattern in the molecular spectra of materials to analyze the composition and properties of it has been one of the most interesting challenges in modern science. Applications of the IR spectrometry are numerous in the field’s pharmaceuticals, health, food and nutrition, oils, agriculture, construction, polymers, beverage, fabrics and much more limited only by the curiosity of the people. Near Infrared (NIR) spectrometry is applied robustly in analyzing the solids and liquid substances because of its non-destructive analysis method. In this paper, we have reviewed the application of NIR spectrometry in milk quality analysis and have presented the modes of measurement applied in NIRS measurement setup, Design of Experiment (DoE), classification/quantification algorithms used in the case of milk composition prediction like Fat%, Protein%, Lactose%, Solids Not Fat (SNF%) along with different approaches for adulterant identification. We have also discussed the important NIR ranges for the chosen milk parameters. The performance metrics used in the comparison of the various Chemometric approaches include Root Mean Square Error (RMSE), R^2, slope, offset, sensitivity, specificity and accuracyKeywords: chemometrics, design of experiment, milk quality analysis, NIRS measurement modes
Procedia PDF Downloads 2714726 Intracommunity Attitudes Toward the Gatekeeping of Asexuality in the LGBTQ+ Community on Tumblr
Authors: A.D. Fredline, Beverly Stiles
Abstract:
This is a qualitative investigation that examines the social media site, Tumblr, for the goal of analyzing the controversy regarding the inclusion of asexuality in the LGBTQ+ community. As platforms such as Tumblr permit the development of communities for marginalized groups, social media serves as a core component to exclusionary practices and boundary negotiations for community membership. This research is important because there is a paucity of research on the topic and a significant gap in the literature with regards to intracommunity gatekeeping. However, discourse on the topic is blatantly apparent on social media platforms. The objectives are to begin to bridge the gap in the literature by examining attitudes towards the inclusion of asexuality within the LGBTQ+ community. In order to analyze the attitudes developed towards the inclusion of asexuality in the LGBTQ+ community, eight publicly available blogs on Tumblr.com were selected from both the “inclusionist” and “exclusionist” perspectives. Blogs selected were found through a basic search for “inclusionist” and “exclusionist” on the Tumblr website. Out of the first twenty blogs listed for each set of results, those centrally focused on asexuality discourse were selected. For each blog, the fifty most recent postings were collected. Analysis of the collected postings exposed three central themes from the exclusionist perspective as well as for the inclusionist perspective. Findings indicate that from the inclusionist perspective, asexuality belongs to the LGBTQ+ community. One primary argument from this perspective is that asexual individuals face opposition for their identity just as do other identities included in the community. This opposition is said to take a variety of forms, such as verbal shaming, assumption of illness and corrective rape. Another argument is that the LGBTQ+ community and asexuals face a common opponent in cisheterosexism as asexuals struggle with the assumed and expected sexualization. A final central theme is that denying asexual inclusion leads to the assumption of heteronormativity. Findings also indicate that from the exclusionist perspective, asexuality does not belong to the LGBTQ+ community. One central theme from this perspective is the equivalization of cisgender heteroromantic asexuals with cisgender heterosexuals. As straight individuals are not allowed in the community, exclusionists argue that asexuals engaged in opposite gender partnerships should not be included. Another debate is that including asexuality in the community sexualizes all other identities by assuming sexual orientation is inherently sexual rather than romantic. Finally, exclusionists also argue that asexuality encourages childhood labeling and forces sexual identities on children, something not promoted by the LGBTQ+ community. Conclusions drawn from analyzing both perspectives is that integration may be a possibility, but complexities add another layer of discourse. For example, both inclusionists and exclusionists agree that privileged identities do not belong to the LGBTQ+ community. The focus of discourse is whether or not asexuals are privileged. Clearly, both sides of the debate have the same vision of what binds the community together. The question that remains is who belongs to that community.Keywords: asexuality, exclusionists, inclusionists, Tumblr
Procedia PDF Downloads 1874725 A Critical Review and Bibliometric Analysis on Measures of Achievement Motivation
Authors: Kanupriya Rawat, Aleksandra Błachnio, Paweł Izdebski
Abstract:
Achievement motivation, which drives a person to strive for success, is an important construct in sports psychology. This systematic review aims to analyze the methods of measuring achievement motivation used in previous studies published over the past four decades and to find out which method of measuring achievement motivation is the most prevalent and the most effective by thoroughly examining measures of achievement motivation used in each study and by evaluating most highly cited achievement motivation measures in sport. In order to understand this latent construct, thorough measurement is necessary, hence a critical evaluation of measurement tools is required. The literature search was conducted in the following databases: EBSCO, MEDLINE, APA PsychARTICLES, Academic Search Ultimate, Open Dissertations, ERIC, Science direct, Web of Science, as well as Wiley Online Library. A total of 26 articles met the inclusion criteria and were selected. From this review, it was found that the Achievement Goal Questionnaire- Sport (AGQ-Sport) and the Task and Ego Orientation in Sport Questionnaire (TEOSQ) were used in most of the research, however, the average weighted impact factor of the Achievement Goal Questionnaire- Sport (AGQ-Sport) is the second highest and most relevant in terms of research articles related to the sport psychology discipline. Task and Ego Orientation in Sport Questionnaire (TEOSQ) is highly popular in cross-cultural adaptation but has the second last average IF among other scales due to the less impact factor of most of the publishing journals. All measures of achievement motivation have Cronbach’s alpha value of more than .70, which is acceptable. The advantages and limitations of each measurement tool are discussed, and the distinction between using implicit and explicit measures of achievement motivation is explained. Overall, both implicit and explicit measures of achievement motivation have different conceptualizations of achievement motivation and are applicable at either the contextual or situational level. The conceptualization and degree of applicability are perhaps the most crucial factors for researchers choosing a questionnaire, even though they differ in their development, reliability, and use.Keywords: achievement motivation, task and ego orientation, sports psychology, measures of achievement motivation
Procedia PDF Downloads 964724 Data Mining Practices: Practical Studies on the Telecommunication Companies in Jordan
Authors: Dina Ahmad Alkhodary
Abstract:
This study aimed to investigate the practices of Data Mining on the telecommunication companies in Jordan, from the viewpoint of the respondents. In order to achieve the goal of the study, and test the validity of hypotheses, the researcher has designed a questionnaire to collect data from managers and staff members from main department in the researched companies. The results shows improvements stages of the telecommunications companies towered Data Mining.Keywords: data, mining, development, business
Procedia PDF Downloads 4984723 Implementation of Proof of Work Using Ganache
Authors: Sakshi Singh, Shampa Chakraverty
Abstract:
One of the essential characteristics of Blockchain is the ability to validate the integrity of new transactions added to the Blockchain. Moreover, one of the essential consensus algorithms, Proof of Work, performs this job. In this work, we implemented the Proof of Work consensus method on the block formed by performing the transaction using Ganache. The primary goal of this implementation is to understand the process and record how Proof of Work works in reality on newly created blocks.Keywords: proof of work, blockchain, ganache, smart contract
Procedia PDF Downloads 1664722 The Role of Named Entity Recognition for Information Extraction
Authors: Girma Yohannis Bade, Olga Kolesnikova, Grigori Sidorov
Abstract:
Named entity recognition (NER) is a building block for information extraction. Though the information extraction process has been automated using a variety of techniques to find and extract a piece of relevant information from unstructured documents, the discovery of targeted knowledge still poses a number of research difficulties because of the variability and lack of structure in Web data. NER, a subtask of information extraction (IE), came to exist to smooth such difficulty. It deals with finding the proper names (named entities), such as the name of the person, country, location, organization, dates, and event in a document, and categorizing them as predetermined labels, which is an initial step in IE tasks. This survey paper presents the roles and importance of NER to IE from the perspective of different algorithms and application area domains. Thus, this paper well summarizes how researchers implemented NER in particular application areas like finance, medicine, defense, business, food science, archeology, and so on. It also outlines the three types of sequence labeling algorithms for NER such as feature-based, neural network-based, and rule-based. Finally, the state-of-the-art and evaluation metrics of NER were presented.Keywords: the role of NER, named entity recognition, information extraction, sequence labeling algorithms, named entity application area
Procedia PDF Downloads 814721 The Impact of Glass Additives on the Functional and Microstructural Properties of Sand-Lime Bricks
Authors: Anna Stepien
Abstract:
The paper presents the results of research on modifications of sand-lime bricks, especially using glass additives (glass fiber and glass sand) and other additives (e.g.:basalt&barite aggregate, lithium silicate and microsilica) as well. The main goal of this paper is to answer the question ‘How to use glass additives in the sand-lime mass and get a better bricks?’ The article contains information on modification of sand-lime bricks using glass fiber, glass sand, microsilica (different structure of silica). It also presents the results of the conducted compression tests, which were focused on compressive strength, water absorption, bulk density, and their microstructure. The Scanning Electron Microscope, spectrum EDS, X-ray diffractometry and DTA analysis helped to define the microstructural changes of modified products. The interpretation of the products structure revealed the existence of diversified phases i.e.the C-S-H and tobermorite. CaO-SiO2-H2O system is the object of intensive research due to its meaning in chemistry and technologies of mineral binding materials. Because the blocks are the autoclaving materials, the temperature of hydrothermal treatment of the products is around 200°C, the pressure - 1,6-1,8 MPa and the time - up to 8hours (it means: 1h heating + 6h autoclaving + 1h cooling). The microstructure of the products consists mostly of hydrated calcium silicates with a different level of structural arrangement. The X-ray diffraction indicated that the type of used sand is an important factor in the manufacturing of sand-lime elements. Quartz sand of a high hardness is also a substrate hardly reacting with other possible modifiers, which may cause deterioration of certain physical and mechanical properties. TG and DTA curves show the changes in the weight loss of the sand-lime bricks specimen against time as well as the endo- and exothermic reactions that took place. The endothermic effect with the maximum at T=573°C is related to isomorphic transformation of quartz. This effect is not accompanied by a change of the specimen weight. The next endothermic effect with the maximum at T=730-760°C is related to the decomposition of the calcium carbonates. The bulk density of the brick it is 1,73kg/dm3, the presence of xonotlite in the microstructure and significant weight loss during DTA and TG tests (around 0,6% after 70 minutes) have been noticed. Silicate elements were assessed on the basis of their compressive property. Orthogonal compositional plan type 3k (with k=2), i.e.full two-factor experiment was applied in order to carry out the experiments both, in the compression strength test and bulk density test. Some modification (e.g.products with barite and basalt aggregate) have improved the compressive strength around 41.3 MPa and water absorption due to capillary raising have been limited to 12%. The next modification was adding glass fiber to sand-lime mass, then glass sand. The results show that the compressive strength was higher than in the case of traditional bricks, while modified bricks were lighter.Keywords: bricks, fiber, glass, microstructure
Procedia PDF Downloads 3474720 The Role of the Basel Accords in Mitigating Systemic Risk
Authors: Wassamon Kun-Amornpong
Abstract:
When a financial crisis occurs, there will be a law and regulatory reform in order to manage the turmoil and prevent a future crisis. One of the most important regulatory efforts to help cope with systemic risk and a financial crisis is the third version of the Basel Accord. Basel III has introduced some measures and tools (e.g., systemic risk buffer, countercyclical buffer, capital conservation buffer and liquidity risk) in order to mitigate systemic risk. Nevertheless, the effectiveness of these measures in Basel III in adequately addressing the problem of contagious runs that can quickly spread throughout the financial system is questionable. This paper seeks to contribute to the knowledge regarding the role of the Basel Accords in mitigating systemic risk. The research question is to what extent the Basel Accords can help control systemic risk in the financial markets? The paper tackles this question by analysing the concept of systemic risk. It will then examine the weaknesses of the Basel Accords before and after the Global financial crisis in 2008. Finally, it will suggest some possible solutions in order to improve the Basel Accord. The rationale of the study is the fact that academic works on systemic risk and financial crises are largely studied from economic or financial perspective. There is comparatively little research from the legal and regulatory perspective. The finding of the paper is that there are some problems in all of the three pillars of the Basel Accords. With regards to Pillar I, the risk model is excessively complex while the benefits of its complexity are doubtful. Concerning Pillar II, the effectiveness of the risk-based supervision in preventing systemic risk still depends largely upon its design and implementation. Factors such as organizational culture of the regulator and the political context within which the risk-based supervision operates might be a barrier against the success of Pillar II. Meanwhile, Pillar III could not provide adequate market discipline as market participants do not always act in a rational way. In addition, the too-big-to-fail perception reduced the incentives of the market participants to monitor risks. There has been some development in resolution measure (e.g. TLAC and MREL) which might potentially help strengthen the incentive of the market participants to monitor risks. However, those measures have some weaknesses. The paper argues that if the weaknesses in the three pillars are resolved, it can be expected that the Basel Accord could contribute to the mitigation of systemic risk in a more significant way in the future.Keywords: Basel accords, financial regulation, risk-based supervision, systemic risk
Procedia PDF Downloads 1284719 To Remit or not to Remit: It is a Question of Interpersonal Trust
Authors: Kasmaoui Kamal, Makhlouf farid
Abstract:
This article seeks to assess the role of the level of interpersonal trust in a country in the remittance landscape. Using historical data from the 2010-2014 wave of the World Value Survey (WVS) for interpersonal trust, our findings underline the substitution role played by the interpersonal trust with remittances. More accurately, remittances tend to drop when the rate of interpersonal trust in the country of origin is high. Overall, a rise in trust is likely to underpin social cohesion, limiting, therefore, the need for remittances. These results are still fairly solid and unambiguous after controlling for confounding factors and possible reverse causality.Keywords: interpersonal trust, remittances, social capital, social cohesion
Procedia PDF Downloads 1034718 An Empirical Investigation of the Challenges of Secure Edge Computing Adoption in Organizations
Authors: Hailye Tekleselassie
Abstract:
Edge computing is a spread computing outline that transports initiative applications closer to data sources such as IoT devices or local edge servers, and possible happenstances would skull the action of new technologies. However, this investigation was attained to investigation the consciousness of technology and communications organization workers and computer users who support the service cloud. Surveys were used to achieve these objectives. Surveys were intended to attain these aims, and it is the functional using survey. Enquiries about confidence are also a key question. Problems like data privacy, integrity, and availability are the factors affecting the company’s acceptance of the service cloud.Keywords: IoT, data, security, edge computing
Procedia PDF Downloads 834717 Convergence or Divergence of Economic Growth within the ASEAN Community: Challenges for the AEC
Authors: Philippe Gugler
Abstract:
This contribution reflects some important questions regarding inter alia the economic development occurring in the light of the ASEAN’s goal of creating the ASEAN Economic Community (AEC) by 2015. We observe a continuing economic growth of GDP per capita over recent years despite the negative effects of the world economic crisis. IMF forecasts indicate that this trend will continue. The paper focuses on the analysis and comparison of economic growth trends of ASEAN countries.Keywords: ASEAN, convergence, divergence, economic growth, globalization, integration
Procedia PDF Downloads 5184716 Perspective Shifting in the Elicited Language Production Can Defy with Aging
Authors: Tuyuan Cheng
Abstract:
As we age, many things become more difficult. Among the abilities are the linguistic and cognitive ones. Competing theories have shown that these two functions could diminish together or that one is selectively affected by the other. In other words, some proposes aging affects sentence production in the same way it affects sentence comprehension and other cognitive functions, while some argues it does not.To address this question, the current investigation is conducted into the critical aspect of sentences as well as cognitive abilities – the syntactic complexity and the number of perspective shifts being contained in the elicited production. Healthy non-pathological aging is often characterized by a cognitive and neural decline in a number of cognitive abilities. Although the language is assumed to be of the more stable domain, a variety of findings in the cognitive aging literature would suggest otherwise. Older adults often show deficits in language production and multiple aspects of comprehension. Nevertheless, while some age differences likely reflect cognitive decline, others might reflect changes in communicative goals, and some even display cognitive advantages. In the domain of language processing, research efforts have been made in tests that probed a variety of communicative abilities. In general, there exists a distinction: Comprehension seems to be selectively unaffected, while production does not. The current study raises a novel question and investigates whether aging affects the production of relative clauses (RCs) under the cognitive factor of perspective shifts. Based on Perspective Hypothesis (MacWhinney, 2000, 2005), our cognitive processes build upon a fundamental system of perspective-taking, and language provides a series of cues to facilitate the construction and shifting of perspectives. These cues include a wide variety of constructions, including RCs structures. In this regard, linguistic complexity can be determined by the number of perspective shifts, and the processing difficulties of RCs can be interpreted within the theory of perspective shifting. Two experiments were conducted to study language production under controlled conditions. In Experiment 1, older healthy participants were tested on standard measures of cognitive aging, including MMSE (Mini-Mental State Examination), ToMI-2 (a simplified Theory of Mind Inventory-2), and a perspective-shifting comprehension task programmed with E-Prime. The results were analyzed to examine if/how they are correlated with aging people’s subsequent production data. In Experiment 2, the production profile of differing RCs, SRC vs. ORC, were collected with healthy aging participants who perform a picture elicitation task. Variable containing 0, 1, or 2 perspective shifts were juxtaposed respectively to the pictures and counterbalanced presented for elicitation. In parallel, a controlled group of young adults were recruited to examine the linguistic and cognitive abilities in question. The results lead us to the discussion whetheraging affects RCs production in a manner determined by its semantic structure or the number of perspective shifts it contains or the status of participants’ mental understanding. The major findingsare: (1) Elders’ production on Chinese RCtypes did not display intrinsic difficulty asymmetry. (2) RC types (the linguistic structural features) and the cognitiveperspective shifts jointly play important roles in the elders’ RCproduction. (3) The production of RC may defy the aging in the case offlexibly preserved cognitive ability.Keywords: cognition aging, perspective hypothesis, perspective shift, relative clauses, sentence complexity
Procedia PDF Downloads 1184715 Concept-Based Assessment in Curriculum
Authors: Nandu C. Nair, Kamal Bijlani
Abstract:
This paper proposes a concept-based assessment to track the performance of the students. The idea behind this approach is to map the exam questions with the concepts learned in the course. So at the end of the course, each student will know how well he learned each concept. This system will give a self assessment for the students as well as instructor. By analyzing the score of all students, instructor can decide some concepts need to be teaching again or not. The system’s efficiency is proved using three courses from M-tech program in E-Learning technologies and results show that the concept-wise assessment improved the score in final exam of majority students on various courses.Keywords: assessment, concept, examination, question, score
Procedia PDF Downloads 4704714 The Convergence of IoT and Machine Learning: A Survey of Real-time Stress Detection System
Authors: Shreyas Gambhirrao, Aditya Vichare, Aniket Tembhurne, Shahuraj Bhosale
Abstract:
In today's rapidly evolving environment, stress has emerged as a significant health concern across different age groups. Stress that isn't controlled, whether it comes from job responsibilities, health issues, or the never-ending news cycle, can have a negative effect on our well-being. The problem is further aggravated by the ongoing connection to technology. In this high-tech age, identifying and controlling stress is vital. In order to solve this health issue, the study focuses on three key metrics for stress detection: body temperature, heart rate, and galvanic skin response (GSR). These parameters along with the Support Vector Machine classifier assist the system to categorize stress into three groups: 1) Stressed, 2) Not stressed, and 3) Moderate stress. Proposed training model, a NodeMCU combined with particular sensors collects data in real-time and rapidly categorizes individuals based on their stress levels. Real-time stress detection is made possible by this creative combination of hardware and software.Keywords: real time stress detection, NodeMCU, sensors, heart-rate, body temperature, galvanic skin response (GSR), support vector machine
Procedia PDF Downloads 724713 The Impact of Government Subsidies to Keep Residents Studying at Home
Authors: Melissa James Maceachern
Abstract:
This study examines a financial aid program that is designed to “keep residents at home” to attend higher education by providing financial aid as an incentive or discount in their first year of university following high school graduation. This study offers insight into financial matters for higher education students that can assist in providing policy direction for student financing. In particular, this study found that students appeared to value the bursary but none of the key metrics related to participation or conversion to the home institution indicated that the bursary impacted enrolment or participation. One key metric, student loans received by direct entry high school students did indicate a decline in the number of recipients. This study also identified accessibility issues to higher education that are of importance when considering the declining youth populations, future labour market needs and the need to sustain higher education institutions. This is undoubtedly a challenging period of time given the changing social and demographic forces within Canada. A comprehensive examination of the policy and programs to address these forces needs to be undertaken. This study highlights the importance of utilizing financial aid in combination with other policy to assist students in accessing higher education.Keywords: accessibility, participation, financing, government
Procedia PDF Downloads 4164712 China Global Policy through the Shanghai Cooperation Organization
Authors: Enayatollah Yazdani
Abstract:
In the post-Cold War era, the world is facing a new emerging global order with the rise of multiple actors in the international arena. China, as a rising global power, has great leverage in internal relations. In particular, during the last two decades, China has rapidly transformed its economy into a global leader in advanced technologies. As a rising power and as one of the two major founding members of the Shanghai Cooperation Organization (SCO), China has tried to use this regional organization, which has the potential to become an important political and security organization of the major states located in the vast Eurasian landmass, for its “go global” strategy. In fact, for Beijing, the SCO represents a new and unique cooperation model, reflecting its vision of a multipolar world order. China has used the SCO umbrella as a multilateral platform to address external threats posed by non-state actors on its vulnerable western border; to gain a strong economic and political foothold in Central Asia without putting the Sino-Russian strategic partnership at risk; and to enhance its energy security through large-scale infrastructure investment in, and trade with, the Central Asian member states. In other words, the SCO is one of the successful outcomes of Chines foreign policy in the post-Cold War era. The expansion of multilateral ties all over the world by dint of pursuing institutional strategies as SCO identifies China as a more constructive power. SCO became a new model of cooperation that was formed on the remains of collapsed Soviet system and predetermined China's geopolitical role in the region. As the fast developing effective regional mechanism, SCO now has more of an external impact on the international system and forms a new type of interaction for promoting China's grand strategy of 'peaceful rise.' This paper aims to answer this major question: How the Chinese government has manipulated the SCO for its foreign policy and global and regional influence? To answer this question, the main discussion is that with regard to the SCO capabilities and politico-economic potential, this organization has been used by China as a platform to expand influence beyond its borders.Keywords: China, the Shanghai Cooperation Organization (SCO), Central Asia, global policy, foreign policy
Procedia PDF Downloads 654711 Addressing Scheme for IOT Network Using IPV6
Authors: H. Zormati, J. Chebil, J. Bel Hadj Taher
Abstract:
The goal of this paper is to present an addressing scheme that allows for assigning a unique IPv6 address to each node in the Internet of Things (IoT) network. This scheme guarantees uniqueness by extracting the clock skew of each communication device and converting it into an IPv6 address. Simulation analysis confirms that the presented scheme provides reductions in terms of energy consumption, communication overhead and response time as compared to four studied addressing schemes Strong DAD, LEADS, SIPA and CLOSA.Keywords: addressing, IoT, IPv6, network, nodes
Procedia PDF Downloads 2934710 IoT Based Approach to Healthcare System for a Quadriplegic Patient Using EEG
Authors: R. Gautam, P. Sastha Kanagasabai, G. N. Rathna
Abstract:
The proposed healthcare system enables quadriplegic patients, people with severe motor disabilities to send commands to electronic devices and monitor their vitals. The growth of Brain-Computer-Interface (BCI) has led to rapid development in 'assistive systems' for the disabled called 'assistive domotics'. Brain-Computer-Interface is capable of reading the brainwaves of an individual and analyse it to obtain some meaningful data. This processed data can be used to assist people having speech disorders and sometimes people with limited locomotion to communicate. In this Project, Emotiv EPOC Headset is used to obtain the electroencephalogram (EEG). The obtained data is processed to communicate pre-defined commands over the internet to the desired mobile phone user. Other Vital Information like the heartbeat, blood pressure, ECG and body temperature are monitored and uploaded to the server. Data analytics enables physicians to scan databases for a specific illness. The Data is processed in Intel Edison, system on chip (SoC). Patient metrics are displayed via Intel IoT Analytics cloud service.Keywords: brain computer interface, Intel Edison, Emotiv EPOC, IoT analytics, electroencephalogram
Procedia PDF Downloads 1864709 Interrelationship of Socio-Demographic Factors, Health Belief Dimensions and Compliance to Measles Vaccination among Filipino Mothers
Authors: Beryl Rene R. Lopez, Lesley Anne M. Lipat, Rhogene Barbette C. Lirio, Laurice Joy H. Llanes, Karl Philippe M. Llapitan, Einstein James R. Lopez, Socorro S. GuanHing
Abstract:
Background: Measles remain as one of the most common childhood diseases despite the availability of the vaccine that is safe and cost-effective. Because of morbidity and mortality associated with the recent measles outbreak in the Philippines, there is an increasing concern from the health care professionals. Objective: The purpose of this study is to determine the relationship between the compliance of Filipino mothers to measles vaccination and their health beliefs when grouped according to the given socio-demographic factors using a researcher-made questionnaire. Research Methodology: This research utilized the descriptive-correlational research design. With the use of purposive sampling technique, the study involved 200 Filipino mothers aged 18 years old and above excluding those who are healthcare professionals with children aged 2-3 years old with either urban or rural as their settlements. Pre-testing was done prior to the actual data gathering. A questionnaire composed of 26 items involving socio-demographic, compliance, and health beliefs was distributed to the sample population. Statistical analysis was done with the use of Exploratory Factor Analysis (EFA) for the first research question and Structural Equation Model (SEM) for the second research question. Results: Four dimensions were generated with the use of EFA namely: Vulnerability-Oriented Beliefs (VOB), Knowledge-Oriented Beliefs (KOB), Accessibility-Oriented Beliefs (AOB), and Outcomes-Oriented Beliefs (OOB). These were then correlated with the mothers’ socio-demographic factors (age, educational attainment, the area of residence, the number of children, and family income) and their compliance to the measles vaccination schedule. Results showed significant and direct relationships between area of residence and compliance, family income and compliance, KOB and compliance, education and KOB, KOB and VOB, KOB and OOB, AOB and KOB, AOB and OOB, AOB and VOB, and lastly, OOB and VOB. Conclusion: The Knowledge – Oriented Belief dimension greatly influence compliance to measles vaccination. Other determinants of compliance like the area of residence, educational attainment, and family income significantly increase the Filipino mothers’ likelihood of compliance to measles vaccination, which have implications to health education.Keywords: socio-demographic, health beliefs, compliance, measles vaccination
Procedia PDF Downloads 3754708 Rescaling Global Health and International Relations: Globalization of Health in a Low Security Environment
Authors: F. Argurio, F. G. Vaccaro
Abstract:
In a global environment defined by ever-increasing health issues, in spite of the progress made by modern medicine, this paper seeks to readdress the question of global health in an international relations perspective. The research hypothesis is: the lower the security environment, the higher the spread of communicable diseases. This question will be channeled by re-scaling the connotation of 'global' and 'international' dimension through the theoretical lens of glocalization, a theory by Bauman that starts its analysis from simple systems to get to the most complex ones. Glocalization theory will be operationalized by analyzing health in an armed-conflict context. In this respect, the independent variable 'low security environment' translates into the cases of Syria and Yemen, which provide a clear example of the all-encompassing nature of conflict on national health and the effects on regional development. In fact, Syria and Yemen have been affected by poliomyelitis and cholera outbreaks respectively. The dependent variable will be constructed on said communicable diseases which belong to the families of sanitation-related and vaccine-preventable diseases. The research will be both qualitative and quantitative, based on primary (interviews) and secondary (WHO and other NGO’s reports) sources. The methodology is based on the assessment of the vaccine coverage and case-analysis in time and space using epidemiological data. Moreover, local health facilities’ functioning and efficiency will be studied. The article posits that the intervention and cooperation of international organizations with the local authorities becomes crucial to provide the local populations with their primary health needs. In Yemen, the majority of fatal cholera cases were in the regions controlled by the Houthi rebels, not officially accredited by the International Community. Similarly, the polio outbreak in Syria primarily affected the areas not controlled by the Syrian Arab Republic forces, recognized as the leading interlocutor by the WHO. The jeopardized possibilities to access these countries have been pivotal to the determining the problem in controlling sanitation-related and vaccine preventable diseases. This represents a potential threat to global health.Keywords: health in conflict-affected areas, cholera, polio, Yemen, Syria, glocalization
Procedia PDF Downloads 1344707 A Geophysical Study for Delineating the Subsurface Minerals at El Qusier Area, Central Eastern Desert, Egypt
Authors: Ahmed Khalil, Elhamy Tarabees, Svetlana Kovacikova
Abstract:
The Red Sea Mountains have been famous for their ore deposits since ancient times. Also, petrographic analysis and previous potential field surveys indicated large unexplored accumulations of ore minerals in the area. Therefore, the main goal of the presented study is to contribute to the discovery of hitherto unknown ore mineral deposits in the Red Sea region. To achieve this goal, we used two geophysical techniques: land magnetic survey and magnetotelluric data. A high-resolution land magnetic survey has been acquired using two proton magnetometers, one instrument used as a base station for the diurnal correction and the other used to measure the magnetic field along the study area. Two hundred eighty land magnetic stations were measured over a mesh-like area with a 500m spacing interval. The necessary reductions concerning daily variation, regional gradient and time observation were applied. Then, the total intensity anomaly map was constructed and transformed into the reduced magnetic pole (RTP). The magnetic interpretation was carried out using the analytical signal as well as regional–residual separation is carried out using the power spectrum. Also, the tilt derivative method (TDR) technique is applied to delineate the structure and hidden anomalies. Data analysis has been performed using trend analysis and Euler deconvolution. The results indicate that magnetic contacts are not the dominant geological feature of the study area. The magnetotleruric survey consisted of two profiles with a total of 8 broadband measurement points with a duration of about 24 hours crossing a wadi um Gheig approximately 50 km south of El Quseir. Collected data have been inverted to the electrical resistivity model using the 3D modular 3D inversion technique ModEM. The model revealed a non-conductive body in its central part, probably corresponding to a dolerite dyke, with which possible ore mineralization could be related.Keywords: magnetic survey, magnetotelluric, mineralization, 3d modeling
Procedia PDF Downloads 274706 Wearable Jacket for Game-Based Post-Stroke Arm Rehabilitation
Authors: A. Raj Kumar, A. Okunseinde, P. Raghavan, V. Kapila
Abstract:
Stroke is the leading cause of adult disability worldwide. With recent advances in immediate post-stroke care, there is an increasing number of young stroke survivors, under the age of 65 years. While most stroke survivors will regain the ability to walk, they often experience long-term arm and hand motor impairments. Long term upper limb rehabilitation is needed to restore movement and function, and prevent deterioration from complications such as learned non-use and learned bad-use. We have developed a novel virtual coach, a wearable instrumented rehabilitation jacket, to motivate individuals to participate in long-term skill re-learning, that can be personalized to their impairment profile. The jacket can estimate the movements of an individual’s arms using embedded off-the-shelf sensors (e.g., 9-DOF IMU for inertial measurements, flex-sensors for measuring angular orientation of fingers) and a Bluetooth Low Energy (BLE) powered microcontroller (e.g., RFduino) to non-intrusively extract data. The 9-DOF IMU sensors contain 3-axis accelerometer, 3-axis gyroscope, and 3-axis magnetometer to compute the quaternions, which are transmitted to a computer to compute the Euler angles and estimate the angular orientation of the arms. The data are used in a gaming environment to provide visual, and/or haptic feedback for goal-based, augmented-reality training to facilitate re-learning in a cost-effective, evidence-based manner. The full paper will elaborate the technical aspects of communication, interactive gaming environment, and physical aspects of electronics necessary to achieve our stated goal. Moreover, the paper will suggest methods to utilize the proposed system as a cheaper, portable, and versatile system vis-à-vis existing instrumentation to facilitate post-stroke personalized arm rehabilitation.Keywords: feedback, gaming, Euler angles, rehabilitation, augmented reality
Procedia PDF Downloads 2774705 A Cloud-Based Federated Identity Management in Europe
Authors: Jesus Carretero, Mario Vasile, Guillermo Izquierdo, Javier Garcia-Blas
Abstract:
Currently, there is a so called ‘identity crisis’ in cybersecurity caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Federated Identity Management (FIM) could be solution for this crisis, as it is a method that facilitates management of identity processes and policies among collaborating entities without enforcing a global consistency, that is difficult to achieve when there are ID legacy systems. To cope with this problem, the Connecting Europe Facility (CEF) initiative proposed in 2014 a federated solution in anticipation of the adoption of the Regulation (EU) N°910/2014, the so-called eIDAS Regulation. At present, a network of eIDAS Nodes is being deployed at European level to allow that every citizen recognized by a member state is to be recognized within the trust network at European level, enabling the consumption of services in other member states that, until now were not allowed, or whose concession was tedious. This is a very ambitious approach, since it tends to enable cross-border authentication of Member States citizens without the need to unify the authentication method (eID Scheme) of the member state in question. However, this federation is currently managed by member states and it is initially applied only to citizens and public organizations. The goal of this paper is to present the results of a European Project, named eID@Cloud, that focuses on the integration of eID in 5 cloud platforms belonging to authentication service providers of different EU Member States to act as Service Providers (SP) for private entities. We propose an initiative based on a private eID Scheme both for natural and legal persons. The methodology followed in the eID@Cloud project is that each Identity Provider (IdP) is subscribed to an eIDAS Node Connector, requesting for authentication, that is subscribed to an eIDAS Node Proxy Service, issuing authentication assertions. To cope with high loads, load balancing is supported in the eIDAS Node. The eID@Cloud project is still going on, but we already have some important outcomes. First, we have deployed the federation identity nodes and tested it from the security and performance point of view. The pilot prototype has shown the feasibility of deploying this kind of systems, ensuring good performance due to the replication of the eIDAS nodes and the load balance mechanism. Second, our solution avoids the propagation of identity data out of the native domain of the user or entity being identified, which avoids problems well known in cybersecurity due to network interception, man in the middle attack, etc. Last, but not least, this system allows to connect any country or collectivity easily, providing incremental development of the network and avoiding difficult political negotiations to agree on a single authentication format (which would be a major stopper).Keywords: cybersecurity, identity federation, trust, user authentication
Procedia PDF Downloads 1664704 Real-Time Network Anomaly Detection Systems Based on Machine-Learning Algorithms
Authors: Zahra Ramezanpanah, Joachim Carvallo, Aurelien Rodriguez
Abstract:
This paper aims to detect anomalies in streaming data using machine learning algorithms. In this regard, we designed two separate pipelines and evaluated the effectiveness of each separately. The first pipeline, based on supervised machine learning methods, consists of two phases. In the first phase, we trained several supervised models using the UNSW-NB15 data-set. We measured the efficiency of each using different performance metrics and selected the best model for the second phase. At the beginning of the second phase, we first, using Argus Server, sniffed a local area network. Several types of attacks were simulated and then sent the sniffed data to a running algorithm at short intervals. This algorithm can display the results of each packet of received data in real-time using the trained model. The second pipeline presented in this paper is based on unsupervised algorithms, in which a Temporal Graph Network (TGN) is used to monitor a local network. The TGN is trained to predict the probability of future states of the network based on its past behavior. Our contribution in this section is introducing an indicator to identify anomalies from these predicted probabilities.Keywords: temporal graph network, anomaly detection, cyber security, IDS
Procedia PDF Downloads 1034703 Evaluating Performance of Value at Risk Models for the MENA Islamic Stock Market Portfolios
Authors: Abderrazek Ben Maatoug, Ibrahim Fatnassi, Wassim Ben Ayed
Abstract:
In this paper we investigate the issue of market risk quantification for Middle East and North Africa (MENA) Islamic market equity. We use Value-at-Risk (VaR) as a measure of potential risk in Islamic stock market, for long and short position, based on Riskmetrics model and the conditional parametric ARCH class model volatility with normal, student and skewed student distribution. The sample consist of daily data for the 2006-2014 of 11 Islamic stock markets indices. We conduct Kupiec and Engle and Manganelli tests to evaluate the performance for each model. The main finding of our empirical results show that (i) the superior performance of VaR models based on the Student and skewed Student distribution, for the significance level of α=1% , for all Islamic stock market indices, and for both long and short trading positions (ii) Risk Metrics model, and VaR model based on conditional volatility with normal distribution provides the best accurate VaR estimations for both long and short trading positions for a significance level of α=5%.Keywords: value-at-risk, risk management, islamic finance, GARCH models
Procedia PDF Downloads 5924702 Significant Growth in Expected Muslim Inbound Tourists in Japan Towards 2020 Tokyo Olympic and Still Incipient Stage of Current Halal Implementations in Hiroshima
Authors: Kyoko Monden
Abstract:
Tourism has moved to the forefront of national attention in Japan since September of 2013 when Tokyo won its bid to host the 2020 Summer Olympics. The number of foreign tourists has continued to break records, reaching 13.4 million in 2014, and is now expected to hit 20 million sooner than initially targeted 2020 due to government stimulus promotions; an increase in low cost carriers; the weakening of the Japanese yen, and strong economic growth in Asia. The tourism industry can be an effective trigger in Japan’s economic recovery as foreign tourists spent two trillion yen ($16.6 million) in Japan in 2014. In addition, 81% of them were all from Asian countries, and it is essential to know that 68.9% of the world’s Muslims, about a billion people, live in South and Southeast Asia. An important question is ‘Do Muslim tourists feel comfortable traveling in Japan?’ This research was initiated by an encounter with Muslim visitors in Hiroshima, a popular international tourist destination, who said they had found very few suitable restaurants in Hiroshima. The purpose of this research is to examine halal implementation in Hiroshima and suggest the next steps to be taken to improve current efforts. The goal will be to provide anyone, Muslims included, with first class hospitality in the near future in preparation for the massive influx of foreign tourists in 2020. The methods of this research were questionnaires, face-to-face interviews, phone interviews, and internet research. First, this research aims to address the significance of growing inbound tourism in Japan, especially the expected growth in Muslim tourists. Additionally, it should address the strong popularity of eating Japanese foods in Asian Muslim countries and as ranked no. 1 thing foreign tourists want to do in Japan. Secondly, the current incipient stage of Hiroshima’s halal implementation at hotels, restaurants, and major public places were exposed, and the existing action plans by Hiroshima Prefecture Government were presented. Furthermore, two surveys were conducted to clarify basic halal awareness of local residents in Hiroshima, and to gauge the inconveniences Muslims living in Hiroshima faced. Thirdly, the reasons for this lapse were observed and compared to the benchmarking data of other major tourist sites, Hiroshima’s halal implementation plans were proposed. The conclusion is, despite increasing demands and interests in halal-friendly businesses, overall halal actions have barely been applied in Hiroshima. 76% of Hiroshima residents had no idea what halal or halaal meant. It is essential to increase halal awareness and its importance to the economy and to launch further actions to make Muslim tourists feel welcome in Hiroshima and the entire country.Keywords: halaal, halal implementation, Hiroshima, inbound tourists in Japan
Procedia PDF Downloads 2234701 Using Mixed Methods in Studying Classroom Social Network Dynamics
Authors: Nashrawan Naser Taha, Andrew M. Cox
Abstract:
In a multi-cultural learning context, where ties are weak and dynamic, combining qualitative with quantitative research methods may be more effective. Such a combination may also allow us to answer different types of question, such as about people’s perception of the network. In this study the use of observation, interviews and photos were explored as ways of enhancing data from social network questionnaires. Integrating all of these methods was found to enhance the quality of data collected and its accuracy, also providing a richer story of the network dynamics and the factors that shaped these changes over time.Keywords: mixed methods, social network analysis, multi-cultural learning, social network dynamics
Procedia PDF Downloads 5114700 Sexual and Gender Based Crimes in International Criminal Law: Moving Forwards or Backwards
Authors: Khadija Ali
Abstract:
Prosecution of sexual violence in international criminal law requires not only an understanding of the mechanisms employed to prosecute sexual violence but also a critical analysis of the factors facilitating perpetuation of such crimes in armed conflicts. The extrapolations laid out in this essay delve into the jurisprudence of international criminal law pertaining to sexual and gender based violence followed by the core question of this essay: Has the entrenchment of sexual violence as international crimes in the Rome Statute been successful to address such violence in armed conflicts?Keywords: conflict, gender, international criminal law, sexual violence
Procedia PDF Downloads 573