Search results for: technology enabled learning
4890 Bridging the Gap: Theoretical Challenges in Cognitive Translation Studies and the Language Industry
Authors: Alvaro Marin
Abstract:
This paper explores the challenges in Cognitive Translation Studies (CTS) conceptual development to accommodate professionals’ perceptions in the language industry into CTS established theoretical apparatus, empirical research projects, and university pedagogical proposals. A comparative conceptual assessment framework is developed from a pluralist epistemological stance that promotes interdisciplinary explorations of the translation process. The framework is used to review key notions such as expertise or feedback, as understood by language industry stakeholders. This review is followed by an analysis of how these notions can enrich research constructs to be applied in empirical investigations of translators’ cognitive processes from an embedded, situated cognition perspective. Thus, it will be proposed to apply the conceptual assessment framework as an effort towards strengthening the interpretative research tools and bridging the gap between industry and academia. The conclusions of this analysis will serve as a basis to further discuss how professional practices, combined with our current knowledge about expertise development in cognitive science and Expertise Studies, can enhance the learning experience of university translation students and help them better understand the processes and requirements of professional cross-linguistic mediation.Keywords: language industry, cognitive translation studies, translation cognitive theory, translation teaching
Procedia PDF Downloads 1584889 The SEMONT Monitoring and Risk Assessment of Environmental EMF Pollution
Authors: Dragan Kljajic, Nikola Djuric, Karolina Kasas-Lazetic, Danka Antic
Abstract:
Wireless communications have been expanded very fast in recent decades. This technology relies on an extensive network of base stations and antennas, using radio frequency signals to transmit information. Devices that use wireless communication, while offering various services, basically act as sources of non-ionizing electromagnetic fields (EMF). Such devices are permanently present in the human vicinity and almost constantly radiate, causing EMF pollution of the environment. This fact has initiated development of modern systems for observation of the EMF pollution, as well as for risk assessment. This paper presents the Serbian electromagnetic field monitoring network – SEMONT, designed for automated, remote and continuous broadband monitoring of EMF in the environment. Measurement results of the SEMONT monitoring at one of the test locations, within the main campus of the University of Novi Sad, are presented and discussed, along with corresponding exposure assessment of the general population, regarding the Serbian legislation.Keywords: EMF monitoring, exposure assessment, sensor nodes, wireless network
Procedia PDF Downloads 2644888 Academic Staff Recruitment in Islamic University: A Proposed Holistic Model
Authors: Syahruddin Sumardi, Indra Fajar Alamsyah, Junaidah Hashim
Abstract:
This study attempts to explore and presents a proposed recruitment model in Islamic university which aligned with holistic role. It is a conceptual paper in nature. In turn, this study is designed to utilize exploratory approach. Literature and document review that related to this topic are used as the methods to analyse the content found. Recruitment for any organization is fundamental to achieve its goal effectively. Staffing in universities is vital due to the importance role of lecturers. Currently, Islamic universities still adopt the common process of recruitment for their academic staffs. Whereas, they have own characteristics which are embedded in their institutions. Furthermore, the FCWC (Foundation, Capability, Worldview and Commitment) model of recruitment proposes to suit the holistic character of Islamic university. Further studies are required to empirically validate the concept through systematic investigations. Additionally, measuring this model by a designed means is appreciated. The model provides the map and alternative tool of recruitment for Islamic universities to determine the process of recruitment which can appropriate their institutions. In addition, it also allows stakeholders and policy makers to consider regarding Islamic values that should inculcate in the Islamic higher learning institutions. This study initiates a foundational contribution for an early sequence of research.Keywords: academic staff, Islamic values, recruitment model, university
Procedia PDF Downloads 1704887 Surfactant Improved Heavy Oil Recovery in Sandstone Reservoirs by Wettability Alteration
Authors: Rabia Hunky, Hayat Kalifa, Bai
Abstract:
The wettability of carbonate reservoirs has been widely recognized as an important parameter in oil recovery by flooding technology. Many surfactants have been studied for this application. However, the importance of wettability alteration in sandstone reservoirs by surfactant has been poorly studied. In this paper, our recent study of the relationship between rock surface wettability and cumulative oil recovery for sandstone cores is reported. In our research, it has been found there is a good agreement between the wettability and oil recovery. Nonionic surfactants, Tomadol® 25-12 and Tomadol® 45-13, are very effective in wettability alteration of sandstone core surface from highly oil-wet conditions to water-wet conditions. By spontaneous imbibition test, Interfacial tension, and contact angle measurement these two surfactants exhibit the highest recovery of the synthetic oil made with heavy oil. Based on these experimental results, we can further conclude that the contact angle measurement and imbibition test can be used as rapid screening tools to identify better EOR surfactants to increase heavy oil recovery from sandstone reservoirs.Keywords: EOR, oil gas, IOR, WC, IF, oil and gas
Procedia PDF Downloads 1034886 Towards a Secure Storage in Cloud Computing
Authors: Mohamed Elkholy, Ahmed Elfatatry
Abstract:
Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security
Procedia PDF Downloads 3354885 To Be Freed from Conformists for Better Shared Leadership
Authors: Lyne Chantal Boudreau, Claudine Auger, Arline Laforest
Abstract:
In order to meet the challenges of learning in a minority Francophone environment, three organizers created a space where a group of stakeholders from the school system and from the post-secondary and community sectors could contribute to reflections on specific educational topics by sharing winning practices. The success of this provincial congress rest on shared leadership which was intuitively used by the organizers who planned and conducted both editions. This leadership style requires leaders to transition from a hierarchical to a horizontal approach, that is, to an approach where each individual is at the same level. In this exploratory research, it has been demonstrated that this shared leadership’s success depends on the capacity of the leaders to free themselves from conformists who are found at all levels of the education system. This ability best fosters the mobilization of all education stakeholders in advancing in-depth knowledge in a particular field while simultaneously creating a sense of collective efficacy among these partners and developing the learners’ full potential. This session will present ways in which it is possible to be freed from conformists through knowing how to recognize conformism, through taking risks and through opening genuine discussions. Shared leadership revolves around a collective power derived from the leadership of each and everyone in a space where all are rallied to promote the ultimate advancement of society.Keywords: conformists, education, minority context, shared leadership
Procedia PDF Downloads 3104884 A New Mechanical Architecture Design of a Multifunctional Bed for Bedridden Healthcare
Authors: Rogelio Portillo Vélez, Eduardo Vázquez-Santacruz, Mariano Gamboa-Zúñiga
Abstract:
In this paper a new mechanical architecture design of a multi functional robot bed, is presented. The importance of this design relies on the fact that in next years the need of assistive devices development will increase in such way that elderly patients will use this kind of devices. This mechanical design implies following specific mechanisms which attend Mexican hospital requirements. This design is the base of next step of this kind of development given that it shows all technical details of the mechanical systems which are needed in order to construct the bed. This is first hospital bed design which could responds to the Latin America hospital requirements. We have obtained these hospital requirements using our diagnosis methodology [14]. From these results we have designed the mechanical system. This is the mechanical base of the hospital robotic bed which is being developed in our robotics laboratory. It will be useful in different hospital environments for elderly and disabled patients.Keywords: assistive robotics, methodology, feasibility analysis, robotics, operational feasibility, assistive technology, viability analysis matrix, social impact
Procedia PDF Downloads 3974883 Research on Optimization Strategies for the Negative Space of Urban Rail Transit Based on Urban Public Art Planning
Authors: Kexin Chen
Abstract:
As an important method of transportation to solve the demand and supply contradiction generated in the rapid urbanization process, urban rail traffic system has been rapidly developed over the past ten years in China. During the rapid development, the space of urban rail Transit has encountered many problems, such as space simplification, sensory experience dullness, and poor regional identification, etc. This paper, focus on the study of the negative space of subway station and spatial softening, by comparing and learning from foreign cases. The article sorts out cases at home and abroad, make a comparative study of the cases, analysis more diversified setting of public art, and sets forth propositions on the domestic type of public art in the space of urban rail transit for reference, then shows the relationship of the spatial attribute in the space of urban rail transit and public art form. In this foundation, it aims to characterize more diverse setting ways for public art; then suggests the three public art forms corresponding properties, such as static presenting mode, dynamic image mode, and spatial softening mode; finds out the method of urban public art to optimize negative space.Keywords: diversification, negative space, optimization strategy, public art planning
Procedia PDF Downloads 2074882 Tea Club (Singapore)-Learning to Navigate the Social World without Fear: Adapted from PEERS® for Young Adults
Authors: Janice Cheong, Tan Seying
Abstract:
The growing years in adolescence are often a tumultuous time for both the individual and family; this is especially so for individuals with Autism Spectrum Disorder (ASD) and Social Communication Disorder (SCD). Tea Club, which is adapted from the PEERS® for Young Adults, seeks to address some of the social challenges faced by Singaporean adolescents with ASD/SCD while navigating social situations. Tea club (hybrid) consists of face-to-face sessions and virtual sessions. These sessions work with both the adolescent and their parents to tackle the individual's difficulties with social skills, empathy, and loneliness. Prior to the group intervention, both participants and their parents scored on the Test of Adolescent Social Skills Knowledge (TASSK) and Autism Spectrum Quotient (AQ), respectively. The session was spread across four months. At the end of the group based intervention, participants’ and parents’ scores were collected again and compared. Inputs on the programme and participant’s confidence in socialization were also gathered from both participants and their parents and looked at thematically. The findings highlight some of the challenges faced by teens with ASD in Singapore and the benefits of the intervention. Parental sentiments are also examined and discussed.Keywords: adolescence autism, group intervention, social communication disorder, social skills
Procedia PDF Downloads 1444881 Virtual Reality Exposure Therapy for Post-Traumatic Stress Disorder: A Literature Review
Authors: Daniel Azizyan, Marina Vardanyan, Astghik Dallakyan
Abstract:
The objective of this literature review is to bring valuable and much-needed insight into Virtual Reality Exposure Therapy (VRET) for the treatment of Post-Traumatic Stress Disorder (PTSD) among military personnel. As the issues regarding war veterans who suffer from PTSD become more and more widespread, the task of finding possible solutions that would provide alternative approaches to existing methods being used today becomes more relevant than ever. By analyzing the previous applications of VRET, this literature review covers the state of the research done currently on the topic, reviews the known information while identifying the main problems, and aims to use missed opportunities and find potential solutions. It provides the answers to the most relevant questions concerning VRET and leads to important conclusions in the hope of making the technology more practical, widespread, and effective.Keywords: military PTSD, post-traumatic stress disorder, prolonged exposure, virtual reality exposure therapy, VRE
Procedia PDF Downloads 1184880 Biomass Waste-To-Energy Technical Feasibility Analysis: A Case Study for Processing of Wood Waste in Malta
Authors: G. A. Asciak, C. Camilleri, A. Rizzo
Abstract:
The waste management in Malta is a national challenge. Coupled with Malta’s recent economic boom, which has seen massive growth in several sectors, especially the construction industry, drastic actions need to be taken. Wood waste, currently being dumped in landfills, is one type of waste which has increased astronomically. This research study aims to carry out a thorough examination on the possibility of using this waste as a biomass resource and adopting a waste-to-energy technology in order to generate electrical energy. This study is composed of three distinct yet interdependent phases, namely, data collection from the local SMEs, thermal analysis using the bomb calorimeter, and generation of energy from wood waste using a micro biomass plant. Data collection from SMEs specializing in wood works was carried out to obtain information regarding the available types of wood waste, the annual weight of imported wood, and to analyse the manner in which wood shavings are used after wood is manufactured. From this analysis, it resulted that five most common types of wood available in Malta which would suitable for generating energy are Oak (hardwood), Beech (hardwood), Red Beech (softwood), African Walnut (softwood) and Iroko (hardwood). Subsequently, based on the information collected, a thermal analysis using a 6200 Isoperibol calorimeter on the five most common types of wood was performed. This analysis was done so as to give a clear indication with regards to the burning potential, which will be valuable when testing the wood in the biomass plant. The experiments carried out in this phase provided a clear indication that the African Walnut generated the highest gross calorific value. This means that this type of wood released the highest amount of heat during the combustion in the calorimeter. This is due to the high presence of extractives and lignin, which accounts for a slightly higher gross calorific value. This is followed by Red Beech and Oak. Moreover, based on the findings of the first phase, both the African Walnut and Red Beech are highly imported in the Maltese Islands for use in various purposes. Oak, which has the third highest gross calorific value is the most imported and common wood used. From the five types of wood, three were chosen for use in the power plant on the basis of their popularity and their heating values. The PP20 biomass plant was used to burn the three types of shavings in order to compare results related to the estimated feedstock consumed by the plant, the high temperatures generated, the time taken by the plant to produce gasification temperatures, and the projected electrical power attributed to each wood type. From the experiments, it emerged that whilst all three types reached the required gasification temperature and thus, are feasible for electrical energy generation. African Walnut was deemed to be the most suitable fast-burning fuel. This is followed by Red-beech and Oak, which required a longer period of time to reach the required gasification temperatures. The results obtained provide a clear indication that wood waste can not only be treated instead of being dumped in dumped in landfill but coupled.Keywords: biomass, isoperibol calorimeter, waste-to-energy technology, wood
Procedia PDF Downloads 2434879 Fractal: Formative Reflective Assessment and Critical Thinking in Learning
Authors: Yannis Stavrakakis, Damian Gordon
Abstract:
Critical Thinking and Reflective Practice are two vital skills that students undertaking postgraduate studies should ideally possess. To help students develop and enhance these skills, this research developed several authentic activities to be undertaken as part of a module that is delivered early in a taught MSc to enhance these skills. One of the challenges of these topics is that they are somewhat ill-defined in terms of precisely what they mean, and also, there is no clear route to operationalizing the teaching of these skills. This research focuses on identifying suitable models of these skills and delivering them in a manner that is both clear and highly motivating. To achieve this, a class of 22 Master's students was divided into two groups, one was provided with a presentation and checklist about critical thinking skills, and the other group was given the same materials on the reflective practice process. The groups were given two scenarios each to analyze using their respective checklists and were asked to present their outcomes to each other and give peer review. The results were coded and compared, and key differences were noted, including the fact that the Critical Thinking outcomes were more future-focused, and the Reflective Practice outcomes were more past-focused and present-focused, as well as the fact that the Reflective Practice process generated a significantly wider range of perspectives on the scenarios.Keywords: critical thinking, ethical scenarios, formative assessment, reflective practice
Procedia PDF Downloads 684878 Process Integration: Mathematical Model for Contaminant Removal in Refinery Process Stream
Authors: Wasif Mughees, Malik Al-Ahmad
Abstract:
This research presents the graphical design analysis and mathematical programming technique to dig out the possible water allocation distribution to minimize water usage in process units. The study involves the mass and property integration in its core methodology. Tehran Oil Refinery is studied to implement the focused water pinch technology for regeneration, reuse and recycling of water streams. Process data is manipulated in terms of sources and sinks, which are given in terms of properties. Sources are the streams to be allocated. Sinks are the units which can accept the sources. Suspended Solids (SS) is taken as a single contaminant. The model minimizes the mount of freshwater from 340 to 275m3/h (19.1%). Redesigning and allocation of water streams was built. The graphical technique and mathematical programming shows the consistency of results which confirms mass transfer dependency of water streams.Keywords: minimization, water pinch, process integration, pollution prevention
Procedia PDF Downloads 3194877 Assessment of the Effectiveness of the Anti-Debris Flow Engineering Constructed to Reduce the Risk of Expected Debris Flow in the River Mletiskhevi by Computer Program RAMMS
Authors: Sopio Gogilava, Goga Chakhaia, Levan Tsulukidze, Zurab Laoshvili, Irina Khubulava, Shalva Bosikashvili, Teimuraz Gugushvili
Abstract:
Geoinformatics systems (GIS) integrated computer program RAMMS is widely used for forecasting debris flows and accordingly for the determination of anticipating risks with 85% accuracy. In view of the above, the work introduces new capabilities of the computer program RAMMS, which evaluates the effectiveness of anti-debris flow engineering construction, namely: the possibility of decreasing the expected velocity, kinetic energy, and output cone volume in the Mletiskhevi River. As a result of research has been determined that the anti-debris flow engineering construction designed to reduce the expected debris flow risk in the Mletiskhevi River is an effective environmental protection technology, that's why its introduction is promising.Keywords: construction, debris flow, geoinformatics systems, program RAMMS
Procedia PDF Downloads 1454876 Meditation-Based Interventions in the Workplace
Authors: Louise Fitzgerald, John Allman
Abstract:
Introduction: Having previously engaged in a meditation-based programme (MBP) for staff in general practice, we explore the evidence and extent to which MBPs are employed in the workplace. Aim of the study: We aim to understand the current workplace MBP intervention literature, which will help inform the suitability of these interventions within the workplace domain. Objectives: Uptake of MBPs in the workplace has grown as organizations look to support employee health, wellbeing, and performance. We will discuss the current MBP literature, including the large variability across MBPs and the associated difficulties in evaluating their efficacy. Learning points: 1) MBPs have a positive impact on cognitive function including concentration and memory and as such job performance. MBPs appear to have a positive impact on objective and subjective job satisfaction, productivity, motivation and work engagement. Meditation in the workplace may have positive impacts on mental health issues - including stress reduction and depression. 2) From our review MBPs appear to be implementable in a wide range of professions and work contexts - regardless of individual factors. Given many companies are focusing on health and wellbeing of employees, this could be included in employee wellbeing programmes. 3) Despite the benefits of mindfulness and meditation interventions in psychosocial workplace health and work performance the long-term efficacy has yet to be fully determined.Keywords: meditation-based programmes, mindfulness, meditation, well-being
Procedia PDF Downloads 1404875 Teaching How to Speak ‘Correct’ English in No Time: An Assessment of the ‘Success’ of Professor Higgins’ Motivation in George Bernard Shaw’s Pygmalion
Authors: Armel Mbon
Abstract:
This paper examines the ‘success’ of George Bernard Shaw's main character Professor Higgins' motivation in teaching Eliza Doolittle, a young Cockney flower girl, how to speak 'correct' English in no time in Pygmalion. Notice should be given that Shaw in whose writings, language issues feature prominently, does not believe there is such a thing as perfectly correct English, but believes in the varieties of spoken English as a source of its richness. Indeed, along with his fellow phonetician Colonel Pickering, Henry Higgins succeeds in teaching Eliza that he first judges unfairly, the dialect of the upper classes and Received Pronunciation, to facilitate her social advancement. So, after six months of rigorous learning, Eliza's speech and manners are transformed, and she is able to pass herself off as a lady. Such is the success of Professor Higgins’ motivation in linguistically transforming his learner in record time. On the other side, his motivation is unsuccessful since, by the end of the play, he cannot have Eliza he believes he has shaped to his so-called good image, for wife. So, this paper aims to show, in support of the psychological approach, that in motivation, feelings, pride and prejudice cannot be combined, and that one has not to pre-judge someone’s attitude based purely on how well they speak English.Keywords: teaching, speak, in no time, success
Procedia PDF Downloads 694874 Retaining Users in a Commercially-Supported Social Network
Authors: Sasiphan Nitayaprapha
Abstract:
A commercially-supported social network has become an emerging channel for an organization to communicate with and provide services to customers. The success of the commercially-supported social network depends on the ability of the organization to keep the customers in participating in the network. Drawing from the theories of information adoption, information systems continuance, and web usability, the author develops a model to explore how a commercially-supported social network can encourage customers to continue participating and using the information in the network. The theoretical model will be proved through an online survey of customers using the commercially-supported social networking sites of several high technology companies operating in the same sector. The result will be compared with previous studies to learn about the explanatory power of the research model, and to identify the main factors determining users’ intention to continue using a commercially-supported social network. Theoretical and practical implications, and limitations are discussed.Keywords: social network, information adoption, information systems continuance, web usability, user satisfaction
Procedia PDF Downloads 3164873 Research on the Construction of Fair Use of Copyright and Compensation System for Artificial Intelligence Creation
Authors: Shen Xiaoyun
Abstract:
The AI-generated works must intersect with the right holder’s work, thus having a certain impact on the rights and interests of the right holder’s work. The law needs to explore and improve the regulation of the fair use of AI creations and build a compensation system to adapt to the development of the times. The development of AI technology has brought about problems such as the unclear relationship between fair use and infringement of copyright, the unclear general terms and conditions of application, and the incomplete criteria for judging at different stages. Through different theoretical methods, the legitimacy of the rational use of the system can be demonstrated. The compensation standard for fair use of copyright in AI creation can refer to the market pricing of the right holder's work, and the compensation can construct a formula for the amount of damages for AI copyright infringement, and construct the compensation standard based on the main factors affecting the market value of the work, so as to provide a reference for the construction of a compensation system for fair use of works generated by AI.Keywords: artificial intelligence, creative acts, fair use of copyright, copyright compensation system
Procedia PDF Downloads 234872 Secure Mobile E-Business Applications
Authors: Hala A. Alrumaih
Abstract:
It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.Keywords: e-business, mobile applications, risk mitigations, security assurance
Procedia PDF Downloads 2954871 How to Teach Italian Intransitive Verbs: Focusing on Unaccusatives and Unergatives
Authors: Joung Hyoun Lee
Abstract:
Intransitive verbs consist of two subclasses called unergatives and unaccusatives. However, traditionally Italian intransitive verbs have been taught regardless their semantic distinctions and any mention of grammatical terms such as unaccusatives and unergatives even though there is a huge gap between them. This paper aims to explore the teaching of Italian intransitive verbs categorizing them into unaccusatives and unergatives, which is compared with researches on the teaching of English unaccusative and unergative verbs. For this purpose, first, the study analyses various aspects of English vs. Italian unergatives and unaccusatives, and their properties of the constructions. Next, this study highlights the research trend on Korean students' learning errors, which is leaning toward causal analyses of the over passivization of English unaccusative verbs. In order to investigate these issues, 53 students of the Busan University of Foreign Studies, who are studying Italian language as a second language, were surveyed through a grammaticality judgment test divided into 9 sections. As expected, the findings confirmed that the test results of Italian unaccusatives and unergatives showed similar and different aspects comparing to those of English. Moreover, there was a highly affirmative demand for a more careful way of teaching which should be considered both syntactically and semantically according to the grammatical items. The research provides a framework of a more effective and systematic teaching method of Italian intransitive verbs for further research.Keywords: unaccusative verbs, unergative verbs, agent, patient, theme, overpassivization
Procedia PDF Downloads 2604870 Challenges Being Faced by Students of Arabic and Islamic Studies in Tetiary Institutions in Nigeria: Case Study of Some Selected Tetiary Instutions of Yobe State, Nigeria
Authors: Muhammad Alhaji Maidugu
Abstract:
The role played by Arabic and Islamic Studies in the history of Nigeria - particularly Northern part of the country - cannot be overemphasized. Before the British colonialism, Arabic language was the official language in some of the great empires in Nigeria such as the Kanem Borno Empire. Islam, on the other hand, is the state religion. Both the rulers and the ruled were deeply involved in the pursuit of Arabic and Islamic knowledge traveling as far as Egypt, Saudia Arabia for scholarship. Their homes are like a modern library where Islamic books are kept and used to teach the community the different fields of Arabic and Islamic Studies. Scholars of Arabic and Islamic Studies were highly regarded and well respected in the society as they were the decision makers, diplomats and advisers to the authorities. Unfortunately, the colonizers used their influence and force to replace this language with a foreign language. In fact, they tried to exterminate it. Arabic became less important in the country. Arabic and Islamic Students became less significant and anybody studying Arabic or Islamic Studies is looked down at with disdain, and the course is considered unprofessional. This paper aims at casting a glance in the position of Arabic and Islamic Studies in Yobe State, Nigeria and social, political, economical and moral challenges faced by the students at institutions of learning.Keywords: challenges, students of Arabic and Islamic studies, tertiary, institutions, Yobe
Procedia PDF Downloads 3594869 Clustering Categorical Data Using the K-Means Algorithm and the Attribute’s Relative Frequency
Authors: Semeh Ben Salem, Sami Naouali, Moetez Sallami
Abstract:
Clustering is a well known data mining technique used in pattern recognition and information retrieval. The initial dataset to be clustered can either contain categorical or numeric data. Each type of data has its own specific clustering algorithm. In this context, two algorithms are proposed: the k-means for clustering numeric datasets and the k-modes for categorical datasets. The main encountered problem in data mining applications is clustering categorical dataset so relevant in the datasets. One main issue to achieve the clustering process on categorical values is to transform the categorical attributes into numeric measures and directly apply the k-means algorithm instead the k-modes. In this paper, it is proposed to experiment an approach based on the previous issue by transforming the categorical values into numeric ones using the relative frequency of each modality in the attributes. The proposed approach is compared with a previously method based on transforming the categorical datasets into binary values. The scalability and accuracy of the two methods are experimented. The obtained results show that our proposed method outperforms the binary method in all cases.Keywords: clustering, unsupervised learning, pattern recognition, categorical datasets, knowledge discovery, k-means
Procedia PDF Downloads 2594868 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)
Authors: Reham Al-Zahrani, Noura Aleisa
Abstract:
The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols
Procedia PDF Downloads 654867 Automatic Facial Skin Segmentation Using Possibilistic C-Means Algorithm for Evaluation of Facial Surgeries
Authors: Elham Alaee, Mousa Shamsi, Hossein Ahmadi, Soroosh Nazem, Mohammad Hossein Sedaaghi
Abstract:
Human face has a fundamental role in the appearance of individuals. So the importance of facial surgeries is undeniable. Thus, there is a need for the appropriate and accurate facial skin segmentation in order to extract different features. Since Fuzzy C-Means (FCM) clustering algorithm doesn’t work appropriately for noisy images and outliers, in this paper we exploit Possibilistic C-Means (PCM) algorithm in order to segment the facial skin. For this purpose, first, we convert facial images from RGB to YCbCr color space. To evaluate performance of the proposed algorithm, the database of Sahand University of Technology, Tabriz, Iran was used. In order to have a better understanding from the proposed algorithm; FCM and Expectation-Maximization (EM) algorithms are also used for facial skin segmentation. The proposed method shows better results than the other segmentation methods. Results include misclassification error (0.032) and the region’s area error (0.045) for the proposed algorithm.Keywords: facial image, segmentation, PCM, FCM, skin error, facial surgery
Procedia PDF Downloads 5864866 Development of Solar Poly House Tunnel Dryer (STD) for Medicinal Plants
Authors: N. C. Shahi, Anupama Singh, E. Kate
Abstract:
Drying is practiced to enhance the storage life, to minimize losses during storage, and to reduce transportation costs of agricultural products. Drying processes range from open sun drying to industrial drying. In most of the developing countries, use of fossil fuels for drying of agricultural products has not been practically feasible due to unaffordable costs to majority of the farmers. On the other hand, traditional open sun drying practiced on a large scale in the rural areas of the developing countries suffers from high product losses due to inadequate drying, fungal growth, encroachment of insects, birds and rodents, etc. To overcome these problems a middle technology dryer having low cost need to be developed for farmers. In case of mechanical dryers, the heated air is the main driving force for removal of moisture. The air is heated either electrically or by burning wood, coal, natural gas etc. using heaters. But, all these common sources have finite supplies. The lifetime is estimated to range from 15 years for a natural gas to nearly 250 years for coal. So, mankind must turn towards its safe and reliable utilization and may have undesirable side effects. The mechanical drying involves higher cost of drying and open sun drying deteriorates the quality. The solar tunnel dryer is one of promising option for drying various agricultural and agro-industrial products on large scale. The advantage of Solar tunnel dryer is its relatively cheaper cost of construction and operation. Although many solar dryers have been developed, still there is a scope of modification in them. Therefore, an attempt was made to develop Solar tunnel dryer and test its performance using highly perishable commodity i.e. leafy vegetables (spinach). The effect of air velocity, loading density and shade net on performance parameters namely, collector efficiency, drying efficiency, overall efficiency of dryer and specific heat energy consumption were also studied. Thus, the need for an intermediate level technology was realized and an effort was made to develop a small scale Solar Tunnel Dryer . A dryer consisted of base frame, semi cylindrical drying chamber, solar collector and absorber, air distribution system with chimney and auxiliary heating system, and wheels for its mobility were the main functional components. Drying of fenugreek was carried out to analyze the performance of the dryer. The Solar Tunnel Dryer temperature was maintained using the auxiliary heating system. The ambient temperature was in the range of 12-33oC. The relative humidity was found inside and outside the Solar Tunnel Dryer in the range of 21-75% and 35-79%, respectively. The solar radiation was recorded in the range of 350-780W/m2 during the experimental period. Studies revealed that total drying time was in range of 230 to 420 min. The drying time in Solar Tunnel Dryer was considerably reduced by 67% as compared to sun drying. The collector efficiency, drying efficiency, overall efficiency and specific heat consumption were determined and were found to be in the range of 50.06- 38.71%, 15.53-24.72%, 4.25 to 13.34% and 1897.54-3241.36 kJ/kg, respectively.Keywords: overall efficiency, solar tunnel dryer, specific heat consumption, sun drying
Procedia PDF Downloads 3134865 Application of the MOOD Technique to the Steady-State Euler Equations
Authors: Gaspar J. Machado, Stéphane Clain, Raphael Loubère
Abstract:
The goal of the present work is to numerically study steady-state nonlinear hyperbolic equations in the context of the finite volume framework. We will consider the unidimensional Burgers' equation as the reference case for the scalar situation and the unidimensional Euler equations for the vectorial situation. We consider two approaches to solve the nonlinear equations: a time marching algorithm and a direct steady-state approach. We first develop the necessary and sufficient conditions to obtain the existence and unicity of the solution. We treat regular examples and solutions with a steady shock and to provide very-high-order finite volume approximations we implement a method based on the MOOD technology (Multi-dimensional Optimal Order Detection). The main ingredient consists in using an 'a posteriori' limiting strategy to eliminate non physical oscillations deriving from the Gibbs phenomenon while keeping a high accuracy for the smooth part.Keywords: Euler equations, finite volume, MOOD, steady-state
Procedia PDF Downloads 2774864 An Invertebrate-Type Lysozyme from Chinese Mitten Crab Eriocheir Sinensis: Cloning and Characterization
Authors: Fengmei Li, Li Xu, Guoliang Xia
Abstract:
Lysozyme is a catalytic enzyme that performs bacterial cell lysis by cleaving the β-1,4-glycosidic bond between N-acetylmuramic acid and N-acetylglucosamine of peptidoglycan in cell walls. In the present study, an invertebrate-type (i-type) lysozyme gene was cloned from Chinese mitten crab Eriocheir sinensis (designated as EsLysozyme) based on PCR-based rapid amplification of cDNA ends (RACE) technology. The full-length cDNA of EsLysozyme was of 831 bp. SMART and SIGNALP 3.0 program analysis revealed that EsLysozyme contained a signal peptide and a destabilase domain. The five amino acid residues (Tyr63, Trp64, Tyr91, His110, Pro114) and the conserved motif GSLSCG(P/Y)FQI and CL(E/L/R/H)C(I/M)C in i-type lysozymes were also found in EsLysozyme. The high similarity of EsLysozyme with L. vannamei lysozymes and phylogenetic analysis suggested that EsLysozyme should be a new member of i-type lysozyme family.Keywords: i-type lysozyme, Eriocheir sinensis, cloning, characterization
Procedia PDF Downloads 2964863 Methodology of Choosing Technology and Sizing of the Hybrid Energy Storage Based on Cost-benefit Analysis
Authors: Krzysztof Rafał, Weronika Radziszewska, Hubert Biedka, Oskar Grabowski, Krzysztof Mik
Abstract:
We present a method to choose energy storage technologies and their parameters for the economic operation of a microgrid. A grid-connected system with local loads and PV generation is assumed, where an energy storage system (ESS) is attached to minimize energy cost by providing energy balancing and arbitrage functionalities. The ESS operates in a hybrid configuration and consists of two unique technologies operated in a coordinated way. Based on given energy profiles and economical data a model calculates financial flow for ESS investment, including energy cost and ESS depreciation resulting from degradation. The optimization strategy proposes a hybrid set of two technologies with their respective power and energy ratings to minimize overall system cost in a given timeframe. Results are validated through microgrid simulations using real-life input profiles.Keywords: energy storage, hybrid energy storage, cost-benefit analysis, microgrid, battery sizing
Procedia PDF Downloads 2204862 A Technology of Hot Stamping and Welding of Carbon Reinforced Plastic Sheets Using High Electric Resistance
Authors: Tomofumi Kubota, Mitsuhiro Okayasu
Abstract:
In recent years, environmental problems and energy problems typified by global warming are intensifying, and transportation devices are required to reduce the weight of structural materials from the viewpoint of strengthening fuel efficiency regulations and energy saving. Carbon fiber reinforced plastic (CFRP) used in this research is attracting attention as a structural material to replace metallic materials. Among them, thermoplastic CFRP is expected to expand its application range in terms of recyclability and cost. High formability and weldability of the unidirectional CFRP sheets conducted by a proposed hot stamping process were proposed, in which the carbon fiber reinforced plastic sheets are heated by a designed technique. In this case, the CFRP sheets are heated by the high electric voltage applied through carbon fibers. In addition, the electric voltage was controlled by the area ratio of exposed carbon fiber on the sample surfaces. The lower exposed carbon fiber on the sample surface makes high electric resistance leading to the high sample temperature. In this case, the CFRP sheets can be heated to more than 150 °C. With the sample heating, the stamping and welding technologies can be carried out. By changing the sample temperature, the suitable stamping condition can be detected. Moreover, the proper welding connection of the CFRP sheets was proposed. In this study, we propose a fusion bonding technique using thermoplasticity, high current flow, and heating caused by electrical resistance. This technology uses the principle of resistance spot welding. In particular, the relationship between the carbon fiber exposure rate and the electrical resistance value that affect the bonding strength is investigated. In this approach, the mechanical connection using rivet is also conducted to make a comparison of the severity of welding. The change of connecting strength is reflected by the fracture mechanism. The low and high connecting strength are obtained for the separation of two CFRP sheets and fractured inside the CFRP sheet, respectively. In addition to the two fracture modes, micro-cracks in CFRP are also detected. This approach also includes mechanical connections using rivets to compare the severity of the welds. The change in bond strength is reflected by the destruction mechanism. Low and high bond strengths were obtained to separate the two CFRP sheets, each broken inside the CFRP sheets. In addition to the two failure modes, micro cracks in CFRP are also detected. In this research, from the relationship between the surface carbon fiber ratio and the electrical resistance value, it was found that different carbon fiber ratios had similar electrical resistance values. Therefore, we investigated which of carbon fiber and resin is more influential to bonding strength. As a result, the lower the carbon fiber ratio, the higher the bonding strength. And this is 50% better than the conventional average strength. This can be evaluated by observing whether the fracture mode is interface fracture or internal fracture.Keywords: CFRP, hot stamping, weliding, deforamtion, mechanical property
Procedia PDF Downloads 1254861 Comparing Implications of Manual and ROSA-assisted Total Knee Replacements on Patients and Physicians: A Scoping Review
Authors: Bassem M. Darwish, Robert H. Ablove
Abstract:
Introduction: Total knee arthroscopy (TKA) is a commonly performed procedure in patients with end-stage osteoarthritis and inaccuracy of component alignment in TKA has been shown to have many adverse post-operative outcomes such as accelerated implant wear, reduced functional outcomes, and shorter overall implant survival. Robotic surgical systems have been introduced to try and improve joint alignment and functional outcomes in knee arthroscopy, one recent iteration is the ROSA knee system, released to the market in 2019. The objective of this scoping review is to map the available evidence, identify the current types of evidence, and identify knowledge gaps to guide future studies on patient outcomes following ROSA-assisted total knee arthroplasties. Methods: An electronic search was conducted in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) extension for scoping reviews. Search terms included ROSA, knee arthroscopy, osteoarthritis, robotic, and malalignment. Types of study participants included patients with osteoarthritis, ages 18 and older, male or female, who received manual TKA (mTKA) or ROSA-assisted TKA (rTKA), and human patients or cadavers. Published, peer-reviewed controlled trials, observational studies, and case series were included. Case reports were not included in article review. Resulting articles were first screened based on title and abstract. Articles meeting inclusion criteria based on title and abstract review then underwent full-text review by the same reviewer. Results: This scoping review identified 11 total studies, 3 prospective observational studies, and 8 retrospective observational studies - a total of 970 rTKA patients and 1745 mTKA patients. There were no case series or randomized controlled trials comparing rTKA and mTKA. Patient-centered outcomes showed promise for rTKA, where it frequently showed significantly favorable functional outcomes, measured via KOOS-JR, VAS, KSS, OKS, FJS, and PROMIS scores, at various times postoperatively. However, there was much discrepancy about which score yielded significance at which postoperative follow-up. Complication rates, reoperation rates, and LOS were very similar between mTKA and rTKA groups. Studies also showed rTKA had more accurate joint alignment within the 0 ± 3o corridor and had significantly higher rates of achieving postoperative joint angles similar to the preoperative plan. Finally, there was major agreement that rTKA cases take significantly longer time at the start, however, there is a rapid learning curve. Once past the learning curve, rTKA cases are performed in a similar time to mTKA and reduced physician stress and strain. Conclusion: The ROSA knee system represents a promising option for the management of osteoarthritis via total knee arthroscopy. The studies reviewed in this paper favor the patient-centered function outcomes, joint alignments, and physician health implications of the ROSA knee system to conventional total knee arthroscopy. Further study is warranted, however, to better understand recovery periods, longer-term functional outcomes, operative fatigue, and reduction in radiation exposure.Keywords: arthroplasty, knee, robotics, malalignment
Procedia PDF Downloads 29