Search results for: adaptive educational digital learning environments
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13299

Search results for: adaptive educational digital learning environments

4809 A Simple and Efficient Method for Accurate Measurement and Control of Power Frequency Deviation

Authors: S. J. Arif

Abstract:

In the presented technique, a simple method is given for accurate measurement and control of power frequency deviation. The sinusoidal signal for which the frequency deviation measurement is required is transformed to a low voltage level and passed through a zero crossing detector to convert it into a pulse train. Another stable square wave signal of 10 KHz is obtained using a crystal oscillator and decade dividing assemblies (DDA). These signals are combined digitally and then passed through decade counters to give a unique combination of pulses or levels, which are further encoded to make them equally suitable for both control applications and display units. The developed circuit using discrete components has a resolution of 0.5 Hz and completes measurement within 20 ms. The realized circuit is simulated and synthesized using Verilog HDL and subsequently implemented on FPGA. The results of measurement on FPGA are observed on a very high resolution logic analyzer. These results accurately match the simulation results as well as the results of same circuit implemented with discrete components. The proposed system is suitable for accurate measurement and control of power frequency deviation.

Keywords: digital encoder for frequency measurement, frequency deviation measurement, measurement and control systems, power systems

Procedia PDF Downloads 369
4808 A Discourse Study of Multimodal Intertextuality in Egyptian Social Media Memes

Authors: Ola Hafez

Abstract:

This study examines the way selected Egyptian digitally mediated memes utilize intertextuality as a means of expression. It is motivated by the emerging digital socio-political humorous practice using various forms of political commentary in Egyptian social media. One of these forms involves the use of memes incorporating (often doctored) video frames taken from Egyptian plays, films and songs, and relocated in a different socio-political context, often with a caption that re-appropriates the frame for the purpose of critical commentary, thus juxtaposing the socio-political phenomena being addressed and the Egyptian artistic and cultural heritage. The paper presents a discourse study of a convenience sample of a recent social media campaign and carries out two levels of analysis. At the micro level, the study pinpoints the various modes of intertextuality employed, including verbal as well as visual intertextuality in the light of the work of social semiotics by Kress and van Leeuwen. At the macro level, the paper sheds light on the socio-political implications of such practice in the light of Political Discourse Analysis.

Keywords: digitally mediated discourse, discourse analysis, Egyptian Arabic, intertextuality, memes, multimodality, political discourse analysis

Procedia PDF Downloads 212
4807 Effects of Merging Personal and Social Responsibility with Sports Education Model on Students' Game Performance and Responsibility

Authors: Yi-Hsiang Pan, Chen-Hui Huang, Wei-Ting Hsu

Abstract:

The purposes of the study were to understand these topics as follows: 1. To explore the effect of merging teaching personal and social responsibility (TPSR) with sports education model on students' game performance and responsibility. 2. To explore the effect of sports education model on students' game performance and responsibility. 3. To compare the difference between "merging TPSR with sports education model" and "sports education model" on students' game performance and responsibility. The participants include three high school physical education teachers and six physical education classes. Every teacher teaches an experimental group and a control group. The participants had 121 students, including 65 students in the experimental group and 56 students in the control group. The research methods had game performance assessment, questionnaire investigation, interview, focus group meeting. The research instruments include personal and social responsibility questionnaire and game performance assessment instrument. Paired t-test test and MANCOVA were used to test the difference between "merging TPSR with sports education model" and "sports education model" on students' learning performance. 1) "Merging TPSR with sports education model" showed significant improvements in students' game performance, and responsibilities with self-direction, helping others, cooperation. 2) "Sports education model" also had significant improvements in students' game performance, and responsibilities with effort, self-direction, helping others. 3.) There was no significant difference in game performance and responsibilities between "merging TPSR with sports education model" and "sports education model". 4)."Merging TPSR with sports education model" significantly improve learning atmosphere and peer relationships, it may be developed in the physical education curriculum. The conclusions were as follows: Both "Merging TPSR with sports education model" and "sports education model" can help improve students' responsibility and game performance. However, "Merging TPSR with sports education model" can reduce the competitive atmosphere in highly intensive games between students. The curricular projects of hybrid TPSR-Sport Education model is a good approach for moral character education.

Keywords: curriculum and teaching model, sports self-efficacy, sport enthusiastic, character education

Procedia PDF Downloads 311
4806 Transmission Line Protection Challenges under High Penetration of Renewable Energy Sources and Proposed Solutions: A Review

Authors: Melake Kuflom

Abstract:

European power networks involve the use of multiple overhead transmission lines to construct a highly duplicated system that delivers reliable and stable electrical energy to the distribution level. The transmission line protection applied in the existing GB transmission network are normally independent unit differential and time stepped distance protection schemes, referred to as main-1 & main-2 respectively, with overcurrent protection as a backup. The increasing penetration of renewable energy sources, commonly referred as “weak sources,” into the power network resulted in the decline of fault level. Traditionally, the fault level of the GB transmission network has been strong; hence the fault current contribution is more than sufficient to ensure the correct operation of the protection schemes. However, numerous conventional coal and nuclear generators have been or about to shut down due to the societal requirement for CO2 emission reduction, and this has resulted in a reduction in the fault level on some transmission lines, and therefore an adaptive transmission line protection is required. Generally, greater utilization of renewable energy sources generated from wind or direct solar energy results in a reduction of CO2 carbon emission and can increase the system security and reliability but reduces the fault level, which has an adverse effect on protection. Consequently, the effectiveness of conventional protection schemes under low fault levels needs to be reviewed, particularly for future GB transmission network operating scenarios. The proposed paper will evaluate the transmission line challenges under high penetration of renewable energy sources andprovides alternative viable protection solutions based on the problem observed. The paper will consider the assessment ofrenewable energy sources (RES) based on a fully rated converter technology. The DIgSILENT Power Factory software tool will be used to model the network.

Keywords: fault level, protection schemes, relay settings, relay coordination, renewable energy sources

Procedia PDF Downloads 197
4805 Motivation and Criteria as Determinant Factors in Accepting New Talents on User-Generated Content (UGC): Youtube as a Platform

Authors: Shereen Nadira Binti Jasney, Mohd Syuhaidi Bin Abu Bakar, Hafizah Binti Rosli

Abstract:

This quantitative study explored factors that motivate the public to use YouTube; and the elements of criteria, which the public are looking for to accept new talents on User-Generated Content (UGC). There are mass inputs on the net but the publics are still being very selective in accepting new talents. Thus, it is important to identify determinant factors that contribute to the acceptance of new talents on UGC. A total number of 236 respondents have participated in this study using Simple Random Sampling and they were analyzed with descriptive analysis. The findings of this paper advocate that tremendous expansion; and diversification YouTube music offers are main factors that motivated public viewers in using YouTube on accepting new talents. It is also found that by being relatable and concurrently providing interesting contents, having the artist name and song title in the YouTube talent’s title video and the number of views and likes of the video are some of the criteria that the public are looking for in accepting new talents on the UGC. This paper introduces YouTube as a mean of discovering new talents in the music industry where the public, especially the younger generations, whom are actively engaged with current digital landscape that they’ve been presently silver-plated.

Keywords: motivation, criteria, new talents, UGC, YouTube

Procedia PDF Downloads 283
4804 Robust Data Image Watermarking for Data Security

Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan

Abstract:

In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.

Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms

Procedia PDF Downloads 507
4803 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network

Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour

Abstract:

Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.

Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network

Procedia PDF Downloads 165
4802 Bridging the Gap: Living Machine in Educational Nature Preserve Center

Authors: Zakeia Benmoussa

Abstract:

Pressure on freshwater systems comes from removing too much water to grow crops; contamination from economic activities, land use practices, and human waste. The paper will be focusing on how water management can influence the design, implementation, and impacts of the ecological principles of biomimicry as sustainable methods in recycling wastewater. At Texas State, United States of America, in particular the lower area of the Trinity River refuge, there is a true example of the diversity to be found in that area, whether when exploring the lands or the waterways. However, as the Trinity River supplies water to the state’s residents, the lower part of the river at Liberty County presents several problem of wastewater discharge in the river. Therefore, conservation efforts are particularly important in the Trinity River basin. Clearly, alternative ways must be considered in order to conserve water to meet future demands. As a result, there should be another system provided rather than the conventional water treatment. Mimicking ecosystem's technologies out of context is not enough, but if we incorporate plants into building architecture, in addition to their beauty, they can filter waste, absorb excess water, and purify air. By providing an architectural proposal center, a living system can be explored through several methods that influence natural resources on the micro-scale in order to impact sustainability on the macro-scale. The center consists of an ecological program of Plant and Water Biomimicry study which becomes a living organism that purifies the river water in a natural way through architecture. Consequently, a rich beautiful nature could be used as an educational destination, observation and adventure, as well as providing unpolluted fresh water to the major cities of Texas. As a result, these facts raise a couple of questions: Why is conservation so rarely practiced by those who must extract a living from the land? Are we sufficiently enlightened to realize that we must now challenge that dogma? Do architects respond to the environment and reflect on it in the correct way through their public projects? The method adopted in this paper consists of general research into careful study of the system of the living machine, in how to integrate it at architectural level, and finally, the consolidation of the all the conclusions formed into design proposal. To summarise, this paper attempts to provide a sustainable alternative perspective in bridging physical and mental interaction with biodiversity to enhance nature by using architecture.

Keywords: Biodiversity, Design with Nature, Sustainable architecture, Waste water treatment.

Procedia PDF Downloads 293
4801 Student Participation in Higher Education Quality Assurance Processes

Authors: Tomasz Zarebski

Abstract:

A very important element of the education system is its evaluation procedure. Each education system should be systematically evaluated and improved. Among the criteria subject to evaluation, attention should be paid to the following: structure of the study programme, implementation of the study programme, admission to studies, verification of learning outcomes achievement by students, giving credit for individual semesters and years, and awarding diplomas, competence, experience, qualifications and the number of staff providing education, staff development, and in-service training, education infrastructure, cooperation with social and economic stakeholders on the development, conditions for and methods of improving the internationalisation of education provided as part of the degree programme, supporting learning, social, academic or professional development of students and their entry on the labour market, public access to information about the study programme and quality assurance policy. Concerning the assessment process and the individual assessment indicators, the participation of students in these processes is essential. The purpose of this paper is to analyse the rules of student participation in accreditation processes on the example of individual countries in Europe. The rules of students' participation in the work of accreditation committees and their influence on the final grade of the committee were analysed. Most of the higher education institutions follow similar rules for accreditation. The general model gives the individual institution freedom to organize its own quality assurance, as long as the system lives up to the criteria for quality and relevance laid down in the particular provisions. This point also applies to students. The regulations of the following countries were examined in the legal-comparative aspect: Poland (Polish Accreditation Committee), Denmark (The Danish Accreditation Institution), France (High Council for the Evaluation of Research and Higher Education), Germany (Agency for Quality Assurance through Accreditation of Study Programmes) and Italy (National Agency for the Evaluation of Universities and Research Institutes).

Keywords: accreditation, student, study programme, quality assurance in higher education

Procedia PDF Downloads 162
4800 The Layout Analysis of Handwriting Characters and the Fusion of Multi-style Ancient Books’ Background

Authors: Yaolin Tian, Shanxiong Chen, Fujia Zhao, Xiaoyu Lin, Hailing Xiong

Abstract:

Ancient books are significant culture inheritors and their background textures convey the potential history information. However, multi-style texture recovery of ancient books has received little attention. Restricted by insufficient ancient textures and complex handling process, the generation of ancient textures confronts with new challenges. For instance, training without sufficient data usually brings about overfitting or mode collapse, so some of the outputs are prone to be fake. Recently, image generation and style transfer based on deep learning are widely applied in computer vision. Breakthroughs within the field make it possible to conduct research upon multi-style texture recovery of ancient books. Under the circumstances, we proposed a network of layout analysis and image fusion system. Firstly, we trained models by using Deep Convolution Generative against Networks (DCGAN) to synthesize multi-style ancient textures; then, we analyzed layouts based on the Position Rearrangement (PR) algorithm that we proposed to adjust the layout structure of foreground content; at last, we realized our goal by fusing rearranged foreground texts and generated background. In experiments, diversified samples such as ancient Yi, Jurchen, Seal were selected as our training sets. Then, the performances of different fine-turning models were gradually improved by adjusting DCGAN model in parameters as well as structures. In order to evaluate the results scientifically, cross entropy loss function and Fréchet Inception Distance (FID) are selected to be our assessment criteria. Eventually, we got model M8 with lowest FID score. Compared with DCGAN model proposed by Radford at el., the FID score of M8 improved by 19.26%, enhancing the quality of the synthetic images profoundly.

Keywords: deep learning, image fusion, image generation, layout analysis

Procedia PDF Downloads 150
4799 Machine Learning Analysis of Eating Disorders Risk, Physical Activity and Psychological Factors in Adolescents: A Community Sample Study

Authors: Marc Toutain, Pascale Leconte, Antoine Gauthier

Abstract:

Introduction: Eating Disorders (ED), such as anorexia, bulimia, and binge eating, are psychiatric illnesses that mostly affect young people. The main symptoms concern eating (restriction, excessive food intake) and weight control behaviors (laxatives, vomiting). Psychological comorbidities (depression, executive function disorders, etc.) and problematic behaviors toward physical activity (PA) are commonly associated with ED. Acquaintances on ED risk factors are still lacking, and more community sample studies are needed to improve prevention and early detection. To our knowledge, studies are needed to specifically investigate the link between ED risk level, PA, and psychological risk factors in a community sample of adolescents. The aim of this study is to assess the relation between ED risk level, exercise (type, frequency, and motivations for engaging in exercise), and psychological factors based on the Jacobi risk factors model. We suppose that a high risk of ED will be associated with the practice of high caloric cost PA, motivations oriented to weight and shape control, and psychological disturbances. Method: An online survey destined for students has been sent to several middle schools and colleges in northwest France. This survey combined several questionnaires, the Eating Attitude Test-26 assessing ED risk; the Exercise Motivation Inventory–2 assessing motivations toward PA; the Hospital Anxiety and Depression Scale assessing anxiety and depression, the Contour Drawing Rating Scale; and the Body Esteem Scale assessing body dissatisfaction, Rosenberg Self-esteem Scale assessing self-esteem, the Exercise Dependence Scale-Revised assessing PA dependence, the Multidimensional Assessment of Interoceptive Awareness assessing interoceptive awareness and the Frost Multidimensional Perfectionism Scale assessing perfectionism. Machine learning analysis will be performed in order to constitute groups with a tree-based model clustering method, extract risk profile(s) with a bootstrap method comparison, and predict ED risk with a prediction method based on a decision tree-based model. Expected results: 1044 complete records have already been collected, and the survey will be closed at the end of May 2022. Records will be analyzed with a clustering method and a bootstrap method in order to reveal risk profile(s). Furthermore, a predictive tree decision method will be done to extract an accurate predictive model of ED risk. This analysis will confirm typical main risk factors and will give more data on presumed strong risk factors such as exercise motivations and interoceptive deficit. Furthermore, it will enlighten particular risk profiles with a strong level of proof and greatly contribute to improving the early detection of ED and contribute to a better understanding of ED risk factors.

Keywords: eating disorders, risk factors, physical activity, machine learning

Procedia PDF Downloads 79
4798 Analysis of Factors Affecting Public Awareness in Paying Zakat

Authors: Roikhan Mochamad Aziz

Abstract:

This study aims to analze the interdependence of several variables simultaneously in order to simplify the form of the relationship between some of the variables studied a number of factors less than the variable studied which means it can also describe the data structure of a research. Based 100 respondents from the public, such as the people of South Tangerang, this study used factor analysis tool. The results of this study indicate that the studied variables being formed into nine factors, namely faith factors, community factors, factors of social care, confidence factor, factor income, educational factors, self-satisfaction factors, factors work, and knowledge factor. Total variance of the 9 factors is 67,30% means that all nine of these factors are factors that can contribute too paying zakat of muzakki consciousness of 67,30% while the remaining 32,70% is supported by other factors outside the 9 factors.

Keywords: zakat, analysis factor, faith, education, knowledge

Procedia PDF Downloads 274
4797 Subjective Quality Assessment for Impaired Videos with Varying Spatial and Temporal Information

Authors: Muhammad Rehan Usman, Muhammad Arslan Usman, Soo Young Shin

Abstract:

The new era of digital communication has brought up many challenges that network operators need to overcome. The high demand of mobile data rates require improved networks, which is a challenge for the operators in terms of maintaining the quality of experience (QoE) for their consumers. In live video transmission, there is a sheer need for live surveillance of the videos in order to maintain the quality of the network. For this purpose objective algorithms are employed to monitor the quality of the videos that are transmitted over a network. In order to test these objective algorithms, subjective quality assessment of the streamed videos is required, as the human eye is the best source of perceptual assessment. In this paper we have conducted subjective evaluation of videos with varying spatial and temporal impairments. These videos were impaired with frame freezing distortions so that the impact of frame freezing on the quality of experience could be studied. We present subjective Mean Opinion Score (MOS) for these videos that can be used for fine tuning the objective algorithms for video quality assessment.

Keywords: frame freezing, mean opinion score, objective assessment, subjective evaluation

Procedia PDF Downloads 482
4796 Impoliteness Principle in Online Chatroom Discourses

Authors: Christiana Darkoah

Abstract:

This study investigated impolite behaviour in online chatroom conversations, looking at its expressions, origins, online chatroom participant responses, impacts, and possible interventions. Online impoliteness has become a major worry as technology improvements move public conversation online, causing communication breakdowns and escalating conflict. The study used a qualitative methodology, including observation and thematic analysis to examine interactions from Facebook, Instagram, and WhatsApp. The findings showed that in online chatrooms, face-threatening behaviours and disputes can be sparked by political remarks, conversational humour, picture interpretations, and personal disclosures. Depending on the situation, the interpreter's job, and the accepted standards, the same statement could be interpreted as disrespectful or courteous. Impolite behaviour in online chatrooms and the possibility of misinterpretation are evident in the furious reactions that can arise from seemingly harmless posts. According to the study's findings, impoliteness is common in online chat rooms, where disputes over politics and personal grievances frequently turn into written attacks. Creating unambiguous community norms in partnership with social media businesses and putting digital literacy campaigns into action are among the recommendations.

Keywords: impoliteness, online chatroom, discourses, conflicts

Procedia PDF Downloads 11
4795 Silica Nanoparticles Induced Oxidative Stress and Inflammation in MRC-5 Human Lung Fibroblasts

Authors: Anca Dinischiotu, Sorina Nicoleta Voicu

Abstract:

Silica nanoparticles (SiO2-NPs) are widely used in consumer products such as paints, plastics, insulation materials, tires, concrete production, as well as in gene delivery systems and imaging procedures. Environmental human exposure to them occurs during utilization of these products, in a time-dependent manner, the uptake being by topic and inhalation route especially. SiO2-NPs enter cells and induce membrane damage, oxidative stress and inflammatory reactions in a concentration-dependent manner. In this study, MRC-5 cells (human fetal lung fibroblasts) were exposed to amorphous SiO2-NPs at a dose of 62.5 μg/ml for 24, 48 and 72 hours. The size distribution of NPs was a lognormal function, in the range 3-14 nm. A time-dependent decrease of total reduced glutathione concentration by 36%, 50%, and 78% and an increase of NO level by 62%, 32%, respectively 24% compared to control were noticed. An up-regulation of NF-kB expression by 20%, 50% respectively 10% and of Nrf-2 by 139%, 58%, and 16% compared to control after 24, 48 and 72 hours was noticed also. The expression of IL-1β, IL-6, IL-8, and COX-2 was up-regulated in a time-dependent manner. Also, the expression of MMP-2 and MMP-9 were down-regulated after 48 and 72 hours, whereas their activities raised in a time-dependent manner. Exposure of cells to NPs up-regulated the expression of inducible NO synthase, as previously was shown, and probably this is the reason for the increased level of NO, that can react with the thiol groups of reduced glutathione molecules, diminishing its concentration Nrf2 is a transcription factor translocated in nucleus, under oxidative stress, where downstream gene expression activates in order to modulate the adaptive intracellular response against oxidative stress. The cross-talk between Nrf2 and NF-kB activities regulates the inflammatory processes. The activation of NF-kB could activate up-regulation of IL-1β, IL-6, and IL-8. The increase of COX-2 expression could be correlated with IL-1β one. Also, probably in response to the pro-inflammatory cytokines, MMP-2 and MMP-9 were induced and activated. In conclusion, the exposure of MRC-5 cells to SiO2-NPs generated inflammation in a time-dependent manner.

Keywords: inflammation, MRC-5 cells, oxidative stress, silica nanoparticles

Procedia PDF Downloads 143
4794 Identifying Business Opportunities Based on Patent and Trademark Portfolios: a Technology-Based Service Industry Case

Authors: Mingook Lee, Sungjoo Lee

Abstract:

As technology-based service industries grow drastically worldwide; companies are recognizing the importance of market preoccupancy and have made an effort to capture a large market to gain the upper hand. To this end, a focus on patents can be used to determine the properties of a technology, as well as to capture advantages in technical skills, in comparison with the firm’s competitors. However, technology-based services largely depend not only on their technological value but also their economic value, due to the recognized worth that is passed to a plurality of users. Thus, it is important to determine whether there are any competitors in the target areas and what services they provide in any field. Despite this importance, little effort has been made to systematically benchmark competitors in order to identify business opportunities. Thus, this study aims to not only identify each position of technology-centered service companies in complex market dynamics, but also to discover new business opportunities. For this, we try to consider both technology and market environments simultaneously by utilizing patent data as a representative proxy for technology and trademark dates as an index for a firm’s target goods and services. Theoretically, this is one of the earliest attempts to combine patent data and trademark data to analyze corporate strategies. In practice, the research results are expected to be used as a decision criterion to diagnose the economic value that companies can obtain by entering the market, as well as the technological value to be passed onto their customers. Thus, the proposed approach can be useful to support effective technology and business strategies in a firm.

Keywords: business opportunity, patent, Portfolio analysis, trademark

Procedia PDF Downloads 287
4793 Seismic Perimeter Surveillance System (Virtual Fence) for Threat Detection and Characterization Using Multiple ML Based Trained Models in Weighted Ensemble Voting

Authors: Vivek Mahadev, Manoj Kumar, Neelu Mathur, Brahm Dutt Pandey

Abstract:

Perimeter guarding and protection of critical installations require prompt intrusion detection and assessment to take effective countermeasures. Currently, visual and electronic surveillance are the primary methods used for perimeter guarding. These methods can be costly and complicated, requiring careful planning according to the location and terrain. Moreover, these methods often struggle to detect stealthy and camouflaged insurgents. The object of the present work is to devise a surveillance technique using seismic sensors that overcomes the limitations of existing systems. The aim is to improve intrusion detection, assessment, and characterization by utilizing seismic sensors. Most of the similar systems have only two types of intrusion detection capability viz., human or vehicle. In our work we could even categorize further to identify types of intrusion activity such as walking, running, group walking, fence jumping, tunnel digging and vehicular movements. A virtual fence of 60 meters at GCNEP, Bahadurgarh, Haryana, India, was created by installing four underground geophones at a distance of 15 meters each. The signals received from these geophones are then processed to find unique seismic signatures called features. Various feature optimization and selection methodologies, such as LightGBM, Boruta, Random Forest, Logistics, Recursive Feature Elimination, Chi-2 and Pearson Ratio were used to identify the best features for training the machine learning models. The trained models were developed using algorithms such as supervised support vector machine (SVM) classifier, kNN, Decision Tree, Logistic Regression, Naïve Bayes, and Artificial Neural Networks. These models were then used to predict the category of events, employing weighted ensemble voting to analyze and combine their results. The models were trained with 1940 training events and results were evaluated with 831 test events. It was observed that using the weighted ensemble voting increased the efficiency of predictions. In this study we successfully developed and deployed the virtual fence using geophones. Since these sensors are passive, do not radiate any energy and are installed underground, it is impossible for intruders to locate and nullify them. Their flexibility, quick and easy installation, low costs, hidden deployment and unattended surveillance make such systems especially suitable for critical installations and remote facilities with difficult terrain. This work demonstrates the potential of utilizing seismic sensors for creating better perimeter guarding and protection systems using multiple machine learning models in weighted ensemble voting. In this study the virtual fence achieved an intruder detection efficiency of over 97%.

Keywords: geophone, seismic perimeter surveillance, machine learning, weighted ensemble method

Procedia PDF Downloads 74
4792 Comparative Study on the Social Behaviour of Sambar Deer (Rusa unicolor) in Captive Facilities in Peninsular Malaysia

Authors: Kushaal Selvarajah, Geetha Annavi, Mohd Noor Hisham Mohd Nadzir

Abstract:

Sambar deer (Rusa unicolor) was uplisted from Least Concern to Vulnerable by the International Union for Conservation of Nature Red list in 2015 due to drastic population decline in the wild throughout its geographical range. Sambar deer is a valued prey for the highly endangered species such as the Malayan tiger. Ex-situ conservation efforts, i.e., captive breeding, initiated by local government to boost sambar deer numbers in captivity and to reintroduce into the wild to support a higher number of tigers, consistent with the goal of our National Tiger Conservation Action Plan. The reproductive success of sambar deer and their welfare management practices in captivity are important components for effective captive breeding programs. However, there is a lack of study carried out on sambar deer in recent years and their behavior in captivity. Three captive sites (Zoo Negara, Zoo Taiping, and Sungkai Conservation Centre) were selected and observed for an average of 40 days each site (6 hours/day). A Generalized Linear Model (GLM) was used to determine the correlation between social behavior and extrinsic parameters. A comparison between all three captive sites showed the strongest correlation in behavioral variability, followed by a time of observation. This proves that there is a difference between in behavioral consistency and frequency between herds across captive sites rising to the possibility of external factors that are influential. Time of day of observation also had significant influence on certain extrinsic parameters being skewed to morning observations and this could be due to an adaptive behavior to the feeding time in the captive sites being in the morning which caused the deer to be resting towards the afternoon. Extensive study need to be done on sambar deer to pinpoint the specifics and better understanding of these possible influential factors in their behavior.

Keywords: behaviour ecology, captivity, ex-situ conservation, husbandry

Procedia PDF Downloads 154
4791 Current Status and Future Trends of Mechanized Fruit Thinning Devices and Sensor Technology

Authors: Marco Lopes, Pedro D. Gaspar, Maria P. Simões

Abstract:

This paper reviews the different concepts that have been investigated concerning the mechanization of fruit thinning as well as multiple working principles and solutions that have been developed for feature extraction of horticultural products, both in the field and industrial environments. The research should be committed towards selective methods, which inevitably need to incorporate some kinds of sensor technology. Computer vision often comes out as an obvious solution for unstructured detection problems, although leaves despite the chosen point of view frequently occlude fruits. Further research on non-traditional sensors that are capable of object differentiation is needed. Ultrasonic and Near Infrared (NIR) technologies have been investigated for applications related to horticultural produce and show a potential to satisfy this need while simultaneously providing spatial information as time of flight sensors. Light Detection and Ranging (LIDAR) technology also shows a huge potential but it implies much greater costs and the related equipment is usually much larger, making it less suitable for portable devices, which may serve a purpose on smaller unstructured orchards. Portable devices may serve a purpose on these types of orchards. In what concerns sensor methods, on-tree fruit detection, major challenge is to overcome the problem of fruits’ occlusion by leaves and branches. Hence, nontraditional sensors capable of providing some type of differentiation should be investigated.

Keywords: fruit thinning, horticultural field, portable devices, sensor technologies

Procedia PDF Downloads 136
4790 Research on Hangzhou Commercial Center System Based on Point of Interest Data

Authors: Chen Wang, Qiuxiao Chen

Abstract:

With the advent of the information age and the era of big data, urban planning research is no longer satisfied with the analysis and application of traditional data. Because of the limitations of traditional urban commercial center system research, big data provides new opportunities for urban research. Therefore, based on the quantitative evaluation method of big data, the commercial center system of the main city of Hangzhou is analyzed and evaluated, and the scale and hierarchical structure characteristics of the urban commercial center system are studied. In order to make up for the shortcomings of the existing POI extraction method, it proposes a POI extraction method based on adaptive adjustment of search window, which can accurately and efficiently extract the POI data of commercial business in the main city of Hangzhou. Through the visualization and nuclear density analysis of the extracted Point of Interest (POI) data, the current situation of the commercial center system in the main city of Hangzhou is evaluated. Then it compares with the commercial center system structure of 'Hangzhou City Master Plan (2001-2020)', analyzes the problems existing in the planned urban commercial center system, and provides corresponding suggestions and optimization strategy for the optimization of the planning of Hangzhou commercial center system. Then get the following conclusions: The status quo of the commercial center system in the main city of Hangzhou presents a first-level main center, a two-level main center, three third-level sub-centers, and multiple community-level business centers. Generally speaking, the construction of the main center in the commercial center system is basically up to standard, and there is still a big gap in the construction of the sub-center and the regional-level commercial center, further construction is needed. Therefore, it proposes an optimized hierarchical functional system, organizes commercial centers in an orderly manner; strengthens the central radiation to drive surrounding areas; implements the construction guidance of the center, effectively promotes the development of group formation and further improves the commercial center system structure of the main city of Hangzhou.

Keywords: business center system, business format, main city of Hangzhou, POI extraction method

Procedia PDF Downloads 136
4789 Automated Prediction of HIV-associated Cervical Cancer Patients Using Data Mining Techniques for Survival Analysis

Authors: O. J. Akinsola, Yinan Zheng, Rose Anorlu, F. T. Ogunsola, Lifang Hou, Robert Leo-Murphy

Abstract:

Cervical Cancer (CC) is the 2nd most common cancer among women living in low and middle-income countries, with no associated symptoms during formative periods. With the advancement and innovative medical research, there are numerous preventive measures being utilized, but the incidence of cervical cancer cannot be truncated with the application of only screening tests. The mortality associated with this invasive cervical cancer can be nipped in the bud through the important role of early-stage detection. This study research selected an array of different top features selection techniques which was aimed at developing a model that could validly diagnose the risk factors of cervical cancer. A retrospective clinic-based cohort study was conducted on 178 HIV-associated cervical cancer patients in Lagos University teaching Hospital, Nigeria (U54 data repository) in April 2022. The outcome measure was the automated prediction of the HIV-associated cervical cancer cases, while the predictor variables include: demographic information, reproductive history, birth control, sexual history, cervical cancer screening history for invasive cervical cancer. The proposed technique was assessed with R and Python programming software to produce the model by utilizing the classification algorithms for the detection and diagnosis of cervical cancer disease. Four machine learning classification algorithms used are: the machine learning model was split into training and testing dataset into ratio 80:20. The numerical features were also standardized while hyperparameter tuning was carried out on the machine learning to train and test the data. Logistic Regression (LR), Decision Tree (DT), Random Forest (RF), and K-Nearest Neighbor (KNN). Some fitting features were selected for the detection and diagnosis of cervical cancer diseases from selected characteristics in the dataset using the contribution of various selection methods for the classification cervical cancer into healthy or diseased status. The mean age of patients was 49.7±12.1 years, mean age at pregnancy was 23.3±5.5 years, mean age at first sexual experience was 19.4±3.2 years, while the mean BMI was 27.1±5.6 kg/m2. A larger percentage of the patients are Married (62.9%), while most of them have at least two sexual partners (72.5%). Age of patients (OR=1.065, p<0.001**), marital status (OR=0.375, p=0.011**), number of pregnancy live-births (OR=1.317, p=0.007**), and use of birth control pills (OR=0.291, p=0.015**) were found to be significantly associated with HIV-associated cervical cancer. On top ten 10 features (variables) considered in the analysis, RF claims the overall model performance, which include: accuracy of (72.0%), the precision of (84.6%), a recall of (84.6%) and F1-score of (74.0%) while LR has: an accuracy of (74.0%), precision of (70.0%), recall of (70.0%) and F1-score of (70.0%). The RF model identified 10 features predictive of developing cervical cancer. The age of patients was considered as the most important risk factor, followed by the number of pregnancy livebirths, marital status, and use of birth control pills, The study shows that data mining techniques could be used to identify women living with HIV at high risk of developing cervical cancer in Nigeria and other sub-Saharan African countries.

Keywords: associated cervical cancer, data mining, random forest, logistic regression

Procedia PDF Downloads 82
4788 The Dynamic Nexus of Public Health and Journalism in Informed Societies

Authors: Ali Raza

Abstract:

The dynamic landscape of communication has brought about significant advancements that intersect with the realms of public health and journalism. This abstract explores the evolving synergy between these fields, highlighting how their intersection has contributed to informed societies and improved public health outcomes. In the digital age, communication plays a pivotal role in shaping public perception, policy formulation, and collective action. Public health, concerned with safeguarding and improving community well-being, relies on effective communication to disseminate information, encourage healthy behaviors, and mitigate health risks. Simultaneously, journalism, with its commitment to accurate and timely reporting, serves as the conduit through which health information reaches the masses. Advancements in communication technologies have revolutionized the ways in which public health information is both generated and shared. The advent of social media platforms, mobile applications, and online forums has democratized the dissemination of health-related news and insights. This democratization, however, brings challenges, such as the rapid spread of misinformation and the need for nuanced strategies to engage diverse audiences. Effective collaboration between public health professionals and journalists is pivotal in countering these challenges, ensuring that accurate information prevails. The synergy between public health and journalism is most evident during public health crises. The COVID-19 pandemic underscored the pivotal role of journalism in providing accurate and up-to-date information to the public. However, it also highlighted the importance of responsible reporting, as sensationalism and misinformation could exacerbate the crisis. Collaborative efforts between public health experts and journalists led to the amplification of preventive measures, the debunking of myths, and the promotion of evidence-based interventions. Moreover, the accessibility of information in the digital era necessitates a strategic approach to health communication. Behavioral economics and data analytics offer insights into human decision-making and allow tailored health messages to resonate more effectively with specific audiences. This approach, when integrated into journalism, enables the crafting of narratives that not only inform but also influence positive health behaviors. Ethical considerations emerge prominently in this alliance. The responsibility to balance the public's right to know with the potential consequences of sensational reporting underscores the significance of ethical journalism. Health journalists must meticulously source information from reputable experts and institutions to maintain credibility, thus fortifying the bridge between public health and the public. As both public health and journalism undergo transformative shifts, fostering collaboration between these domains becomes essential. Training programs that familiarize journalists with public health concepts and practices can enhance their capacity to report accurately and comprehensively on health issues. Likewise, public health professionals can gain insights into effective communication strategies from seasoned journalists, ensuring that health information reaches a wider audience. In conclusion, the convergence of public health and journalism, facilitated by communication advancements, is a cornerstone of informed societies. Effective communication strategies, driven by collaboration, ensure the accurate dissemination of health information and foster positive behavior change. As the world navigates complex health challenges, the continued evolution of this synergy holds the promise of healthier communities and a more engaged and educated public.

Keywords: public awareness, journalism ethics, health promotion, media influence, health literacy

Procedia PDF Downloads 66
4787 Replica-Exchange Metadynamics Simulations of G-Quadruplex DNA Structures Under Substitution of K+ by Na+ Ions

Authors: Juan Antonio Mondragon Sanchez, Ruben Santamaria

Abstract:

The DNA G-quadruplex is a four-stranded DNA structure conformed by stacked planes of four base paired guanines (G-quartet). The guanine rich DNA sequences are present in many sites of genomic DNA and can potentially lead to the formation of G-quadruplexes, especially at the 3'-terminus of the human telomeric DNA with many TTAGGG repeats. The formation and stabilization of a G-quadruplex by small ligands at the telomeric region can inhibit the telomerase activity. In turn, the ligands can be used to regulate oncogene expression making the G-quadruplex an attractive target for anticancer therapy. Clearly, the G-quadruplex structured in the telomeric DNA is of fundamental importance for rational drug design. In this context, we investigate two G-quadruplex structures, the first follows from the sequence TTAGGG(TTAGGG)3TT (HUT1), and the second from AAAGGG(TTAGGG)3AA (HUT2), both in a K+ solution. We determine the free energy surfaces of the HUT1 and HUT2 structures and investigate their conformations using replica-exchange metadynamics simulations. The carbonyl-carbonyl distances belonging to different guanines residues are selected as the main collective variables to determine the free energy surfaces. The surfaces exhibit two main local minima, compatible with experiments on the conformational transformations of HUT1 and HUT2 under substitution of the K+ ions by the Na+ ions. The conformational transitions are not observed in short MD simulations without the use of the metadynamics approach. The results of this work should be of help to understand the formation and stability of human telomeric G-quadruplex in environments including the presence of K+ and Na+ ions.

Keywords: g-quadruplex, metadynamics, molecular dynamics, replica-exchange

Procedia PDF Downloads 341
4786 Identification and Classification of Medicinal Plants of Indian Himalayan Region Using Hyperspectral Remote Sensing and Machine Learning Techniques

Authors: Kishor Chandra Kandpal, Amit Kumar

Abstract:

The Indian Himalaya region harbours approximately 1748 plants of medicinal importance, and as per International Union for Conservation of Nature (IUCN), the 112 plant species among these are threatened and endangered. To ease the pressure on these plants, the government of India is encouraging its in-situ cultivation. The Saussurea costus, Valeriana jatamansi, and Picrorhiza kurroa have also been prioritized for large scale cultivation owing to their market demand, conservation value and medicinal properties. These species are found from 1000 m to 4000 m elevation ranges in the Indian Himalaya. Identification of these plants in the field requires taxonomic skills, which is one of the major bottleneck in the conservation and management of these plants. In recent years, Hyperspectral remote sensing techniques have been precisely used for the discrimination of plant species with the help of their unique spectral signatures. In this background, a spectral library of the above 03 medicinal plants was prepared by collecting the spectral data using a handheld spectroradiometer (325 to 1075 nm) from farmer’s fields of Himachal Pradesh and Uttarakhand states of Indian Himalaya. The Random forest (RF) model was implied on the spectral data for the classification of the medicinal plants. The 80:20 standard split ratio was followed for training and validation of the RF model, which resulted in training accuracy of 84.39 % (kappa coefficient = 0.72) and testing accuracy of 85.29 % (kappa coefficient = 0.77). This RF classifier has identified green (555 to 598 nm), red (605 nm), and near-infrared (725 to 840 nm) wavelength regions suitable for the discrimination of these species. The findings of this study have provided a technique for rapid and onsite identification of the above medicinal plants in the field. This will also be a key input for the classification of hyperspectral remote sensing images for mapping of these species in farmer’s field on a regional scale. This is a pioneer study in the Indian Himalaya region for medicinal plants in which the applicability of hyperspectral remote sensing has been explored.

Keywords: himalaya, hyperspectral remote sensing, machine learning; medicinal plants, random forests

Procedia PDF Downloads 199
4785 A Scenario-Based Experiment Comparing Managerial and Front-Line Employee Apologies in Terms of Customers' Perceived Justice, Satisfaction, and Commitment

Authors: Ioana Dallinger, Vincent P. Magnini

Abstract:

Due to the many moving parts and high human component, mistakes and failures sometimes occur during transactions in service environments. Because a certain portion of such failures is unavoidable, many service providers constantly look for guidance regarding optimal ways by which they should manage failures and recoveries. Through the use of a scenario-based experiment, the findings of this study run counter to the empowerment approach (i.e. that frontline employees should be empowered to resolve failure situations on their own doing). Specifically, this study finds that customers’ perceptions of distributive, procedural, and interactional justice are significantly higher [p-values < .05] when a manager delivers an apology as opposed to the frontline provider. Moreover, customers’ satisfaction with the recovery and commitment to the firm are also significantly stronger [p-values < .05] when a manager apologizes. Interestingly, this study also empirically tests the effects of combined apologies of both the manager and employee and finds that the combined approach yields better results for customers’ interactional justice perceptions and for their satisfaction with recovery, but not for their distributive or procedural justice perceptions or consequent commitment to the firm. This study can serve a springboard for further research. For example, perceptions and attitudes regarding employee empowerment vary based upon country culture. Furthermore, there are likely a number of factors that can moderate the cause and effect relationship between a failure recovery and customers’ post-recovery perceptions [e.g. the severity of the failure].

Keywords: apology, empowerment, service failure recovery, service recovery

Procedia PDF Downloads 293
4784 Comparative Fragility Analysis of Shallow Tunnels Subjected to Seismic and Blast Loads

Authors: Siti Khadijah Che Osmi, Mohammed Ahmad Syed

Abstract:

Underground structures are crucial components which required detailed analysis and design. Tunnels, for instance, are massively constructed as transportation infrastructures and utilities network especially in urban environments. Considering their prime importance to the economy and public safety that cannot be compromised, thus any instability to these tunnels will be highly detrimental to their performance. Recent experience suggests that tunnels become vulnerable during earthquakes and blast scenarios. However, a very limited amount of studies has been carried out to study and understanding the dynamic response and performance of underground tunnels under those unpredictable extreme hazards. In view of the importance of enhancing the resilience of these structures, the overall aims of the study are to evaluate probabilistic future performance of shallow tunnels subjected to seismic and blast loads by developing detailed fragility analysis. Critical non-linear time history numerical analyses using sophisticated finite element software Midas GTS NX have been presented about the current methods of analysis, taking into consideration of structural typology, ground motion and explosive characteristics, effect of soil conditions and other associated uncertainties on the tunnel integrity which may ultimately lead to the catastrophic failure of the structures. The proposed fragility curves for both extreme loadings are discussed and compared which provide significant information the performance of the tunnel under extreme hazards which may beneficial for future risk assessment and loss estimation.

Keywords: fragility analysis, seismic loads, shallow tunnels, blast loads

Procedia PDF Downloads 339
4783 Teachers' Accessibility to and Utilization of Electronic Media for Teaching Basic Science and Technology in Ilorin Metropolis, Kwara, Nigeria

Authors: Taibat Busari

Abstract:

Electronic media has created new options for enhancing education. It has long been providing innovative methods for arousing students’ attention in learning and improves teachers’ performance in disseminating instructional contents. However, the advancement of electronic media has increased the flexibility, availability, accessibility and improved communications among students-students, students-teacher, and teacher-students. This study investigated: (i) teachers’ accessibility to, and utilization of electronic media for teaching basic science and technology in Ilorin metropolis; (ii) the influence of school proprietorship on teachers’ access to and utilization of electronic media for teaching and; the influence of teachers’ gender on the use of electronic media. The research was a descriptive design using the survey method. The study sample was drawn for private and public secondary schools in Ilorin Metropolis. The respondents were 285 basic science and technology teachers, which comprised of 146 males and 139 females. A structured researcher designed questionnaire was used to gather data for the study. Pilot study was carried out on mini sample of 20 basic science and technology teachers in five schools which are not part of the study’s population. It was then subjected to Cronbach’s Alpha and yielded the values 0.794 for availability, 0.730 for accessibility and 0.84 for utilization of electronic media. The research questions were answered using mean and percentage while research hypotheses one and two was tested using t- test. The findings of the study showed that: (i) electronic media are available for teaching basic science and technology; (ii) teachers’ had access to electronic media for teaching; (iii) teachers’ utilized electronic media for teaching basic science and technology; (iv) there was no significant difference between teachers’ utilization of electronic media for teaching; (v) there was no significant difference between teachers’ utilization of electronic media for teaching based on school proprietorship. The study, therefore, concluded that teachers’ had access to electronic media and utilized it for teaching purposes. Gender had no influence on teachers’ access to and utilization on electronic media for teaching and also, school proprietorship had no influence on access and utilization of electronic media for teaching. Based on findings it was recommended that electronic media should be made available and utilized in all schools across the nation to improve the learning rate of the students.

Keywords: electronic media, basic science and technology, teachers' accessibility, Nigeria

Procedia PDF Downloads 151
4782 Evaluation of Teaching Performance in Higher Education: From the Students' Responsibility to Their Evaluative Competence

Authors: Natacha Jesus-Silva, Carla S. Pereira, Natercia Durao, Maria Das Dores Formosinho, Cristina Costa-Lobo

Abstract:

Any assessment process, by its very nature, raises a wide range of doubts, uncertainties, and insecurities of all kinds. The evaluation process should be ethically irreproachable, treating each and every one of the evaluated according to a conduct that ensures that the process is fair, contributing to all recognize and feel well with the processes and results of the evaluation. This is a very important starting point and implies that positive and constructive conceptions and attitudes are developed regarding the evaluation of teaching performance, where students' responsibility is desired. It is not uncommon to find teachers feeling threatened at various levels, in particular as regards their autonomy and their professional dignity. Evaluation must be useful in that it should enable decisions to be taken to improve teacher performance, the quality of teaching or the learning climate of the school. This study is part of a research project whose main objective is to identify, select, evaluate and synthesize the available evidence on Quality Indicators in Higher Education. In this work, the 01 parameters resulting from pedagogical surveys in a Portuguese higher education institution in the north of the country will be presented, surveys for the 2015/2016 school year, presented to 1751 students, in a total of 11 degrees and 18 master's degrees. It has analyzed the evaluation made by students with respect to the performance of a group of 68 teachers working full time. This paper presents the lessons learned in the last three academic years, allowing for the identification of the effects on the following areas: teaching strategies and methodologies, capacity of systematization, learning climate, creation of conditions for active student participation. This paper describes the procedures resulting from the descriptive analysis (frequency analysis, descriptive measures and association measures) and inferential analysis (ANOVA one-way, MANOVA one-way, MANOVA two-way and correlation analysis).

Keywords: teaching performance, higher education, students responsibility, indicators of teaching management

Procedia PDF Downloads 272
4781 Migration, Assimilation and Well-Being of Interstate Migrant Workers in Kerala: A Critical Assessment

Authors: Arun Perumbilavil Anand

Abstract:

It may no longer be just anecdotal that every twelfth person in Kerala is a migrant worker from outside the state. For the past few years, the state has been witnessing large inflow of migrants from other states of India, which emerged as a result of demographic transition and Gulf emigration. Initially, the migrants were from the neighbouring states but, at a later period, the state started getting migrants from the distant parts of the country. Currently, migrants have turned to be a decisive force in the state and their increasing numbers have already started creating turbulences in the state. Over the past years, the increasing involvement of migrants in unlawful and criminal activities have generated apprehensions on their presence in the state. Moreover, at present, the Kerala society is not just hosting the first generation migrants, but there has been an increase in the second generation migrants making the situations more complex and diverse. In such a paradigm, the study ponders into the issues of migrants concerning their assimilation and well-being in the host society. Also, the study looks into the factors that impede the assimilation process, along with the perceptions of the migrants about the host society and the people. The study also tries to bring out the differences in the levels of assimilation among the migrants along the lines of religion, caste, state of origin, gender, stay duration and education. Methodology: The study is based on the empirical findings obtained out of the primary survey conducted on migrants employed in the Kanjikode industrial area of Kerala. The samples were selected through purposive sampling and the study employed techniques like observation, questionnaire and in-depth interviews. The findings are based on interviews conducted with 100 migrants. Findings and Conclusion: The study was an attempt of its kind in addressing the issues of assimilation and integration of interstate migrants working in the Kerala. As mentioned, the study could bring out differences in the levels of assimilation along the lines of different characteristics. The study could also locate the importance, and the role played by the peer groups and neighborhoods in accelerating the process of assimilation among the migrants. As an extension, the study also looked at the assimilation and educational issues of the migrant children living in Kerala, and it found that the place of birth, age at entry and the peer group plays a pivotal role in the assimilation process. The study through its findings recommends the need for incorporating the concept of inclusive education into the state educational system by giving due emphasis to the needs of the marginalized. The study points out that owing to the existing demographic conditions, the state will inevitably have to depend on migrant labor in future. Moreover, in such a paradigm, the host community and the government should strive to create a conducive environment for the proper assimilation of the migrants and which in turn can be an impetus for the fulfilment of the needs of both the migrants and the state.

Keywords: assimilation, integration, Kerala, migrant workers, well-being

Procedia PDF Downloads 137
4780 Improving Numeracy Standards for UK Pharmacy Students

Authors: Luke Taylor, Samantha J. Hall, Kenneth I. Cumming, Jakki Bardsley, Scott S. P. Wildman

Abstract:

Medway School of Pharmacy, as part of an Equality Diversity and Inclusivity (EDI) initiative run by the University of Kent, decided to take steps to try and negate disparities in numeracy competencies within students undertaking the Master of Pharmacy degree in order to combat a trend in pharmacy students’ numerical abilities upon entry. This included a research driven project 1) to identify if pharmacy students are aware of weaknesses in their numeracy capabilities, and 2) recognise where their numeracy skillset is lacking. In addition to gaining this student perspective, a number of actions have been implemented to support students in improving their numeracy competencies. Reflective and quantitative analysis has shown promising improvements for the final year cohort of 2014/15 when compared to previous years. The method of involving student feedback into the structure of numeracy teaching/support has proven to be extremely beneficial to both students and teaching staff alike. Students have felt empowered and in control of their own learning requirements, leading to increased engagement and attainment. School teaching staff have received quality data to help improve existing initiatives and to innovate further in the area of numeracy teaching. In light of the recognised improvements, further actions are currently being trialled in the area of numeracy support. This involves utilising Virtual Learning Environment platforms to provide individualised support as a supplement to the increased numeracy mentoring (staff and peer) provided to students. Mentors who provide group or one-to-one sessions are now given significant levels of training in dealing with situations that commonly arise from mentoring schemes. They are also provided with continued support throughout the life of their degree. Following results from this study, Medway School of Pharmacy hopes to drive increasing numeracy standards within Pharmacy (primarily through championing peer mentoring) as well as other healthcare professions including Midwifery and Nursing.

Keywords: attainment, ethnicity, numeracy, pharmacy, support

Procedia PDF Downloads 233