Search results for: academic social network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14985

Search results for: academic social network

14055 The Academic Achievement of Writing via Project-Based Learning

Authors: Duangkamol Thitivesa

Abstract:

This paper focuses on the use of project work as a pretext for applying the conventions of writing, or the correctness of mechanics, usage, and sentence formation, in a content-based class in a Rajabhat University. Its aim was to explore to what extent the student teachers’ academic achievement of the basic writing features against the 70% attainment target after the use of project is. The organization of work around an agreed theme in which the students reproduce language provided by texts and instructors is expected to enhance students’ correct writing conventions. The sample of the study comprised of 38 fourth-year English major students. The data was collected by means of achievement test and student writing works. The scores in the summative achievement test were analyzed by mean score, standard deviation, and percentage. It was found that the student teachers do more achieve of practicing mechanics and usage, and less in sentence formation. The students benefited from the exposure to texts during conducting the project; however, their automaticity of how and when to form phrases and clauses into simple/complex sentences had room for improvement.

Keywords: project-based learning, project work, writing conventions, academic achievement

Procedia PDF Downloads 316
14054 Mobile Network Users Amidst Ultra-Dense Networks in 5G Using an Improved Coordinated Multipoint (CoMP) Technology

Authors: Johnson O. Adeogo, Ayodele S. Oluwole, O. Akinsanmi, Olawale J. Olaluyi

Abstract:

In this 5G network, very high traffic density in densely populated areas, most especially in densely populated areas, is one of the key requirements. Radiation reduction becomes one of the major concerns to secure the future life of mobile network users in ultra-dense network areas using an improved coordinated multipoint technology. Coordinated Multi-Point (CoMP) is based on transmission and/or reception at multiple separated points with improved coordination among them to actively manage the interference for the users. Small cells have two major objectives: one, they provide good coverage and/or performance. Network users can maintain a good quality signal network by directly connecting to the cell. Two is using CoMP, which involves the use of multiple base stations (MBS) to cooperate by transmitting and/or receiving at the same time in order to reduce the possibility of electromagnetic radiation increase. Therefore, the influence of the screen guard with rubber condom on the mobile transceivers as one major piece of equipment radiating electromagnetic radiation was investigated by mobile network users amidst ultra-dense networks in 5g. The results were compared with the same mobile transceivers without screen guards and rubber condoms under the same network conditions. The 5 cm distance from the mobile transceivers was measured with the help of a ruler, and the intensity of Radio Frequency (RF) radiation was measured using an RF meter. The results show that the intensity of radiation from various mobile transceivers without screen guides and condoms was higher than the mobile transceivers with screen guides and condoms when call conversation was on at both ends.

Keywords: ultra-dense networks, mobile network users, 5g, coordinated multi-point.

Procedia PDF Downloads 76
14053 Securing Wireless Sensor Network From Rank Attack Using Fast Sensor Data Encryption and Decryption Protocol

Authors: Eden Teshome Hunde

Abstract:

Wireless sensor and actuator networks (WSANs) are of great significance in the realm of industrial automation systems. However, the aspect of security in WSANs has been somewhat overlooked. One particular security concern is the rank attack, where malicious actors actively manipulate the transmission of messages from neighboring nodes. This undermines the entire network's data collection and routing operations, resulting in a significant degradation of network performance. This attack adversely affects crucial metrics such as packet delivery ratio (PDR), latency, and power consumption, ultimately reducing the network's overall lifespan. In order to foster trust among nodes, ensure accurate delivery of data to end users, safeguard shared data in the cloud from security breaches, and prevent rank attacks within the network, it is crucial to protect the network against such malicious activities. This research paper aims to introduce an enhanced version of the Routing Protocol for Low-Power and Lossy Networks (RPL) protocol, specifically tailored to identify and eliminate rank attacks within existing WSANs. The effectiveness of the new protocol will be assessed through experimentation using Zolertia (Z1) sensors in the Cooja network simulator. To minimize network overhead on the sensors' side, the proposed scheme limits cryptographic operations to symmetric key-based mechanisms such as XORing, hash functions, and encryption. These operations will be implemented using a C-compiler and verified through the ModelSIM Altera SE edition 11.0 simulator.

Keywords: ModelSIM Altera SE, RPL, WSANs, Zolertia

Procedia PDF Downloads 18
14052 Computational Neurosciences: An Inspiration from Biological Neurosciences

Authors: Harsh Sadawarti, Kamal Malik

Abstract:

Humans are the unique and the most powerful creature on this planet just because of the high level of intelligence gifted by nature. Computational Intelligence is highly influenced by the term natural intelligence, neurosciences and mathematics. To deal with the in-depth study of computational intelligence and to utilize it in real-life applications, it is quite important to understand its simulation with the human brain. In this paper, the three important parts, Frontal Lobe, Occipital Lobe and Parietal Lobe of the human brain, are compared with the ANN(Artificial Neural Network), CNN(Convolutional Neural network), and RNN(Recurrent Neural Network), respectively. Intelligent computational systems are created by combining deductive reasoning, logical concepts and high-level algorithms with the simulation and study of the human brain. Human brain is a combination of Physiology, Psychology, emotions, calculations and many other parameters which are of utmost importance that determines the overall intelligence. To create intelligent algorithms, smart machines and to simulate the human brain in an effective manner, it is quite important to have an insight into the human brain and the basic concepts of biological neurosciences.

Keywords: computational intelligence, neurosciences, convolutional neural network, recurrent neural network, artificial neural network, frontal lobe, occipital lobe, parietal lobe

Procedia PDF Downloads 96
14051 Support of Syrian Refugees: The Roles of Descriptive and Injunctive Norms, Perception of Threat, and Negative Emotions

Authors: Senay Yitmen

Abstract:

This research investigated individual’s support and helping intentions towards Syrian refugees in Turkey. This is examined in relation to perceived threat and negative emotions, and also to the perceptions of whether one’s intimate social network (family and friends) considers Syrians a threat (descriptive network norm) and whether this network morally supports Syrian refugees (injunctive norms). A questionnaire study was conducted among Turkish participants (n= 565) and the results showed that perception of threat was associated with negative emotions which, in turn, were related to less support of Syrian refugees. Additionally, descriptive norms moderated the relationship between perceived threat and negative emotions towards Syrian refugees. Furthermore, injunctive norms moderated the relationship between negative emotions and support to Syrian refugees. Specifically, the findings indicate that perceived threat is associated with less support of Syrian refugees through negative emotions when descriptive norms are weak and injunctive norms are strong. Injunctive norms appear to trigger a dilemma over the decision to conform or not to conform: when one has negative emotions as a result of perceived threat, it becomes more difficult to conform to the moral obligation of injunctive norms which is associated with less support of Syrian refugees. Hence, these findings demonstrate that both descriptive and injunctive norms are important and play different roles in individual’s support of Syrian refugees.

Keywords: descriptive norms, emotions, injunctive norms, the perception of threat

Procedia PDF Downloads 170
14050 [Keynote Talk]: From Clinical Practice to Academic Setup, 'Quality Circles' for Quality Outputs in Both

Authors: Vandita Mishra

Abstract:

From the management of patients, reception, record, and assistants in a clinical practice; to the management of ongoing research, clinical cases and department profile in an academic setup, the healthcare provider has to deal with all of it. The victory lies in smooth running of the show in both the above situations with an apt solution of problems encountered and smooth management of crisis faced. Thus this paper amalgamates dental science with health administration by means of introduction of a concept for practice management and problem-solving called 'Quality Circles'. This concept uses various tools for problem solving given by experts from different fields. QC tools can be applied in both clinical and academic settings in dentistry for better productivity and for scientifically approaching the process of continuous improvement in both the categories. When approached through QC, our organization showed better patient outcomes and more patient satisfaction. Introduced in 1962 by Kaoru Ishikawa, this tool has been extensively applied in certain fields outside dentistry and healthcare. By exemplification of some clinical cases and virtual scenarios, the tools of Quality circles will be elaborated and discussed upon.

Keywords: academics, dentistry, healthcare, quality

Procedia PDF Downloads 84
14049 Extracting Attributes for Twitter Hashtag Communities

Authors: Ashwaq Alsulami, Jianhua Shao

Abstract:

Various organisations often need to understand discussions on social media, such as what trending topics are and characteristics of the people engaged in the discussion. A number of approaches have been proposed to extract attributes that would characterise a discussion group. However, these approaches are largely based on supervised learning, and as such they require a large amount of labelled data. We propose an approach in this paper that does not require labelled data, but rely on lexical sources to detect meaningful attributes for online discussion groups. Our findings show an acceptable level of accuracy in detecting attributes for Twitter discussion groups.

Keywords: attributed community, attribute detection, community, social network

Procedia PDF Downloads 143
14048 Trauma: Constructivist Theoretical Framework

Authors: Wendi Dunham, Kimberly Floyd

Abstract:

The constructivist approach to learning is a theoretical orientation that posits that individuals create their own understanding and knowledge of the world through their experiences and interactions. This approach emphasizes that learning is an active process and that individuals are not passive recipients when constructing their understanding of their world. When used concurrently with trauma-informed practices, a constructivist approach can inform the development of a framework for students and teachers that supports their social, emotional, and mental health in addition to enabling academic success. This framework can be applied to teachers and students. When applied to teachers, it can be used to achieve purposeful coping mechanisms through restorative justice and dispositional mindfulness. When applied to students, the framework can implement proactive, student-based practices such as Response to Intervention (RtI) and the 4 Rs to connect resiliency and intervention to academic learning. Using a constructivist, trauma-informed framework can provide students with a greater sense of control and agency over their trauma experiences and impart confidence in achieving school success.

Keywords: trauma, trauma informed practices in education, constructivist theory framework, school responses to trauma, trauma informed supports for teachers, trauma informed strategies for students, restorative justice, mindfulness, response to intervention, the 4 R's, resiliency

Procedia PDF Downloads 23
14047 Joint Space Hybrid Force/Position Control of 6-DoF Robot Manipulator Using Neural Network

Authors: Habtemariam Alemu

Abstract:

It has been known that the performance of position and force control is highly affected by both robot dynamic and environment stiffness uncertainties. In this paper, joint space hybrid force and position control strategy with self-selecting matrix using artificial neural network compensator is proposed. The objective of the work is to improve controller robustness by applying a neural network technique in order to compensate the effect of uncertainties in the robot model. Simulation results for a 6 degree of freedom (6-DoF) manipulator and different types of environments showed the effectiveness of the suggested approach. 6-DoF Puma 560 family robot manipulator is chosen as industrial robot and its efficient dynamic model is designed using Matlab/SimMechanics library.

Keywords: robot manipulator, force/position control, artificial neural network, Matlab/Simulink

Procedia PDF Downloads 496
14046 Success Factors for Innovations in SME Networks

Authors: J. Gochermann

Abstract:

Due to complex markets and products, and increasing need to innovate, cooperation between small and medium size enterprises arose during the last decades, which are not prior driven by process optimization or sales enhancement. Especially small and medium sized enterprises (SME) collaborate increasingly in innovation and knowledge networks to enhance their knowledge and innovation potential, and to find strategic partners for product and market development. These networks are characterized by dual objectives, the superordinate goal of the total network, and the specific objectives of the network members, which can cause target conflicts. Moreover, most SMEs do not have structured innovation processes and they are not accustomed to collaborate in complex innovation projects in an open network structure. On the other hand, SMEs have suitable characteristics for promising networking. They are flexible and spontaneous, they have flat hierarchies, and the acting people are not anonymous. These characteristics indeed distinguish them from bigger concerns. Investigation of German SME networks have been done to identify success factors for SME innovation networks. The fundamental network principles, donation-return and confidence, could be confirmed and identified as basic success factors. Further factors are voluntariness, adequate number of network members, quality of communication, neutrality and competence of the network management, as well as reliability and obligingness of the network services. Innovation and knowledge networks with an appreciable number of members from science and technology institutions need also active sense-making to bring different disciplines into successful collaboration. It has also been investigated, whether and how the involvement in an innovation network impacts the innovation structure and culture inside the member companies. The degree of reaction grows with time and intensity of commitment.

Keywords: innovation and knowledge networks, SME, success factors, innovation structure and culture

Procedia PDF Downloads 266
14045 Effects of Sports Participation on Academics Performance of Students at Yaa Asantewaa Girls’ Senior High School

Authors: Alhassan Dramani Yakubu

Abstract:

The primary purpose of this study was to analyze effects that participating in sporting activities has on academic performance among students at Yaa Asantewaa Girls’ Senior High School. To dig out the main objective of the study, descriptive survey design was employed. The study used 45 respondents comprising of 25 student – athletes and 20 non-student – athletes. The purposive sampling and stratified random sampling technique were used to sample population of 455 students involved. The academic performance of sports participants is compared with those of non – participants in terms of their outcomes in the form of grades from mathematics. Data was obtained from the sample by the use of questionnaire which was self - administered. The questionnaire sought information on level of student’s participation in sports and importance of sports participation to students. Results revealed that participation in sporting activities is associated with higher grades among students. The analysis reinforces the idea that apart from their health benefits for participants, sporting activities lead to the attainment of the performance goals to which higher institutions aspire. The findings also implies that, mathematics teachers and other subject teachers should not fend off students from participating in sporting activities with the trepidation that participating in sports inflame academic performance. This study recommend that, educational programs about sports should be provided for students’ through the educational system to bring about positive academic performance.

Keywords: physical activity, physical education, intra mural, extra mural

Procedia PDF Downloads 41
14044 Upon One Smoothing Problem in Project Management

Authors: Dimitri Golenko-Ginzburg

Abstract:

A CPM network project with deterministic activity durations, in which activities require homogenous resources with fixed capacities, is considered. The problem is to determine the optimal schedule of starting times for all network activities within their maximal allowable limits (in order not to exceed the network's critical time) to minimize the maximum required resources for the project at any point in time. In case when a non-critical activity may start only at discrete moments with the pregiven time span, the problem becomes NP-complete and an optimal solution may be obtained via a look-over algorithm. For the case when a look-over requires much computational time an approximate algorithm is suggested. The algorithm's performance ratio, i.e., the relative accuracy error, is determined. Experimentation has been undertaken to verify the suggested algorithm.

Keywords: resource smoothing problem, CPM network, lookover algorithm, lexicographical order, approximate algorithm, accuracy estimate

Procedia PDF Downloads 289
14043 A Car Parking Monitoring System Using a Line-Topology Wireless Sensor Network

Authors: Dae Il Kim, Jungho Moon, Tae Yun Chung

Abstract:

This paper presents a car parking monitoring system using a wireless sensor network. The presented sensor network has a line-shaped topology and adopts a TDMA-based protocol for allowing multi-hop communications. Sensor nodes are deployed in the ground of an outdoor parking lot in such a way that a sensor node monitors a parking space. Each sensor node detects the availability of the associated parking space and transmits the detection result to a sink node via intermediate sensor nodes existing between the source sensor node and the sink node. We evaluate the feasibility of the presented sensor network and the TDMA-based communication protocol through experiments using 11 sensor nodes deployed in a real parking lot. The result shows that the presented car parking monitoring system is robust to changes in the communication environments and efficient for monitoring parking spaces of outdoor parking lots.

Keywords: multi-hop communication, parking monitoring system, TDMA, wireless sensor network

Procedia PDF Downloads 290
14042 Examining Procrastination and Delay among Individuals with and without Attention Deficit Hyperactivity Disorder

Authors: S. J. Taylor, S. Chowdhury, T. A. Pychyl

Abstract:

Attention Deficit Hyperactivity Disorder (ADHD) and procrastination are often discussed in relation to problems with self-regulation and executive functioning (EF). The small body of extant research that has explored the relations between these variables has many limitations particularly in terms of the samples used and the measurement of procrastination. In this study, we recruited a sample of undergraduate students with a confirmed clinical diagnosis of ADHD (n = 48, 66.7% females) as well as a sample of student volunteers without ADHD (n = 68, 75.8% females) to investigate the relations between ADHD subtypes, EF, procrastination and other forms of delay. We used the newly developed Multidimensional Measure of Academic Procrastination and Delay Questionnaire. As hypothesized, the results revealed that individuals with ADHD displayed significantly more irrational delay, general procrastination and academic procrastination compared to individuals without ADHD. This study contributed to the research literature indicating that individuals with ADHD struggle with procrastination as a result of symptoms of ADHD and EF deficits. Theses results provide support for adopting a new language when describing procrastination problems among individuals with ADHD, and they have implications for the nature of academic accommodations and interventions for individuals with ADHD.

Keywords: ADHD, delay, executive functioning, procrastination, self-regulation

Procedia PDF Downloads 189
14041 Research Activity in Computational Science Using High Performance Computing: Co-Authorship Network Analysis

Authors: Sul-Ah Ahn, Youngim Jung

Abstract:

The research activities of the computational scientists using high-performance computing are analyzed using bibliometric approaches. This study aims at providing computational scientists using high-performance computing and relevant policy planners with useful bibliometric results for an assessment of research activities. In order to achieve this purpose, we carried out a co-authorship network analysis of journal articles to assess the research activities of computational scientists using high-performance computing as a case study. For this study, we used journal articles of the Scopus database from Elsevier covering the time period of 2006-2015. We extracted the author rank in the computational science field using high-performance computing by the number of papers published during ten years from 2006. Finally, we drew the co-authorship network for 50 top-authors and their coauthors and described some features of the co-authorship network in relation to the author rank. Suggestions for further studies are discussed.

Keywords: co-authorship network analysis, computational science, high performance computing, research activity

Procedia PDF Downloads 301
14040 The Academic Importance of the Arts in Fostering Belonging

Authors: Ana Handel, Jamal Ellerbe, Sarah Kanzaki, Natalie White, Nathan Ousey, Sean Gallagher

Abstract:

A sense of belonging is the ability for individuals to feel they are a necessary part of whatever organization or community they find themselves in. In an academic setting, a sense of belonging is key to a student’s success. The collected research points to this sense of belonging in academic settings as a significant contributor of students’ levels of engagement and trust. When universities leverage the arts, students are provided with more opportunities to engage and feel confident in their surroundings. This allows for greater potential to develop within academic and social settings. The arts also call for the promotion of diversity, equity, and inclusion by showcasing works of artists from all different backgrounds, thus allowing students to gain cultural knowledge and be able to embrace differences. Equity, diversity, and inclusion are all emotional facets of belonging. Equity relates to the concept of making the conscious choice to recognize opportunities to incorporate inclusive and diverse ideals into different thought processes and collaboration. Inclusion involves providing equal access to opportunities and resources for people of all ‘ingroups. In an inclusive culture, individuals are able to maximize their potential with the confidence they have gained through an accepting environment. A variety of members in academic communities have noted it may be beneficial to make certain events surrounding the arts to be built into course requirements in order to ensure students are expanding their horizons and exposing themselves to the arts. These academics also recommend incorporating the arts into extracurricular activities, such as Greek life, in order to appeal to large groups of students. Once students have an understanding of the rich knowledge cultivated through exploring the arts, they will feel more comfortable in their surroundings and thus more confident to become involved in other areas of their university. A number of universities, including West Chester and Carnegie Mellon, have instituted programs aiming to provide students with the necessary tools and resources to feel comfortable in their educational settings. Different programs include references to hotlines for discrimination and office for diversity, equity, and inclusion. Staff members have also been provided with means of combating biases and increasing feelings of belongingness in order to properly support and communicate with students. These tools have successfully allowed universities to foster inviting environments for students of all backgrounds to feel belong as well as strengthening the community’s diversity, equity, and inclusion. Through demonstrating concepts of diversity, equity, and inclusion by introducing the arts into learning spaces, students can find a sense of belonging within their academic environments. It is essential to understand these topics and how they work together to achieve a common goal. The efforts of universities have made much progress in shedding light on different cultures and ideas to show students their full potential and opportunities. Once students feel more comfortable within their organizations, engagement will increase substantially.

Keywords: arts, belonging, engagement, inclusion

Procedia PDF Downloads 154
14039 DAG Design and Tradeoff for Full Live Virtual Machine Migration over XIA Network

Authors: Dalu Zhang, Xiang Jin, Dejiang Zhou, Jianpeng Wang, Haiying Jiang

Abstract:

Traditional TCP/IP network is showing lots of shortages and research for future networks is becoming a hotspot. FIA (Future Internet Architecture) and FIA-NP (Next Phase) are supported by US NSF for future Internet designing. Moreover, virtual machine migration is a significant technique in cloud computing. As a network application, it should also be supported in XIA (expressive Internet Architecture), which is in both FIA and FIA-NP projects. This paper is an experimental study aims at verifying the feasibility of VM migration over XIA. We present three ways to maintain VM connectivity and communication states concerning DAG design and routing table modification. VM migration experiments are conducted intra-AD and inter-AD with KVM instances. The procedure is achieved by a migration control protocol which is suitable for the characters of XIA. Evaluation results show that our solutions can well supports full live VM migration over XIA network respectively, keeping services seamless.

Keywords: DAG, downtime, virtual machine migration, XIA

Procedia PDF Downloads 833
14038 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network

Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour

Abstract:

Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.

Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network

Procedia PDF Downloads 156
14037 Capacitated Multiple Allocation P-Hub Median Problem on a Cluster Based Network under Congestion

Authors: Çağrı Özgün Kibiroğlu, Zeynep Turgut

Abstract:

This paper considers a hub location problem where the network service area partitioned into predetermined zones (represented by node clusters is given) and potential hub nodes capacity levels are determined a priori as a selection criteria of hub to investigate congestion effect on network. The objective is to design hub network by determining all required hub locations in the node clusters and also allocate non-hub nodes to hubs such that the total cost including transportation cost, opening cost of hubs and penalty cost for exceed of capacity level at hubs is minimized. A mixed integer linear programming model is developed introducing additional constraints to the traditional model of capacitated multiple allocation hub location problem and empirically tested.

Keywords: hub location problem, p-hub median problem, clustering, congestion

Procedia PDF Downloads 479
14036 Corpus Stylistics and Multidimensional Analysis for English for Specific Purposes Teaching and Assessment

Authors: Svetlana Strinyuk, Viacheslav Lanin

Abstract:

Academic English has become lingua franca for international scientific community which stimulates universities to introduce English for Specific Purposes (EAP) courses into curriculum. Teaching L2 EAP students might be fulfilled with corpus technologies and digital stylistics. A special software developed to reach the manifold task of teaching, assessing and researching academic writing of L2 students on basis of digital stylistics and multidimensional analysis was created. A set of annotations (style markers) – grammar, lexical and syntactic features most significant of academic writing was built. Contrastive comparison of two corpora “model corpus”, subject domain limited papers published by competent writers in leading academic journals, and “students’ corpus”, subject domain limited papers written by last year students allows to receive data about the features of academic writing underused or overused by L2 EAP student. Both corpora are tagged with a special software created in GATE Developer. Style markers within the framework of research might be replaced depending on the relevance and validity of the result which is achieved from research corpora. Thus, selecting relevant (high frequency) style markers and excluding less relevant, i.e. less frequent annotations, high validity of the model is achieved. Software allows to compare the data received from processing model corpus to students’ corpus and get reports which can be used in teaching and assessment. The less deviation from the model corpus students demonstrates in their writing the higher is academic writing skill acquisition. The research showed that several style markers (hedging devices) were underused by L2 EAP students whereas lexical linking devices were used excessively. A special software implemented into teaching of EAP courses serves as a successful visual aid, makes assessment more valid; it is indicative of the degree of writing skill acquisition, and provides data for further research.

Keywords: corpus technologies in EAP teaching, multidimensional analysis, GATE Developer, corpus stylistics

Procedia PDF Downloads 178
14035 Parent’s Expectations and School Achievement: Longitudinal Perspective among Chilean Pupils

Authors: Marine Hascoet, Valentina Giaconi, Ludivine Jamain

Abstract:

The aim of our study is to examine if the family socio-economic status (SES) has an influence on students’ academic achievement. We first make the hypothesis that the more their families have financial and social resources, the more students succeed at school. We second make the hypothesis that this family SES has also an impact on parents’ expectations about their children educational outcomes. Moreover, we want to study if that parents’ expectations play the role of mediator between parents’ socio-economic status and the student’ self-concept and academic outcome. We test this model with a longitudinal design thanks to the census-based assessment from the System of Measurement of the Quality of Education (SIMCE). The SIMCE tests aim to assess all the students attending to regular education in a defined level. The sample used in this study came from the SIMCE assessments done three times: in 4th, 8th and 11th grade during the years 2007, 2011 and 2014 respectively. It includes 156.619 students (75.084 boys and 81.535 girls) that had valid responses for the three years. The family socio-economic status was measured at the first assessment (in 4th grade). The parents’ educational expectations and the students’ self-concept were measured at the second assessment (in 8th grade). The achievement score was measured twice; once when children were in 4th grade and a second time when they were in 11th grade. To test our hypothesis, we have defined a structural equation model. We found that our model fit well the data (CFI = 0.96, TLI = 0.95, RMSEA = 0.05, SRMR = 0.05). Both family SES and prior achievements predict parents’ educational expectations and effect of SES is important in comparison to the other coefficients. These expectations predict students’ achievement three years later (with prior achievement controlled) but not their self-concept. Our model explains 51.9% of the achievement in the 11th grade. Our results confirm the importance of the parents’ expectations and the significant role of socio-economic status in students’ academic achievement in Chile.

Keywords: Chilean context, parent’s expectations, school achievement, self-concept, socio-economic status

Procedia PDF Downloads 129
14034 Online Pose Estimation and Tracking Approach with Siamese Region Proposal Network

Authors: Cheng Fang, Lingwei Quan, Cunyue Lu

Abstract:

Human pose estimation and tracking are to accurately identify and locate the positions of human joints in the video. It is a computer vision task which is of great significance for human motion recognition, behavior understanding and scene analysis. There has been remarkable progress on human pose estimation in recent years. However, more researches are needed for human pose tracking especially for online tracking. In this paper, a framework, called PoseSRPN, is proposed for online single-person pose estimation and tracking. We use Siamese network attaching a pose estimation branch to incorporate Single-person Pose Tracking (SPT) and Visual Object Tracking (VOT) into one framework. The pose estimation branch has a simple network structure that replaces the complex upsampling and convolution network structure with deconvolution. By augmenting the loss of fully convolutional Siamese network with the pose estimation task, pose estimation and tracking can be trained in one stage. Once trained, PoseSRPN only relies on a single bounding box initialization and producing human joints location. The experimental results show that while maintaining the good accuracy of pose estimation on COCO and PoseTrack datasets, the proposed method achieves a speed of 59 frame/s, which is superior to other pose tracking frameworks.

Keywords: computer vision, pose estimation, pose tracking, Siamese network

Procedia PDF Downloads 137
14033 Modelling Fluoride Pollution of Groundwater Using Artificial Neural Network in the Western Parts of Jharkhand

Authors: Neeta Kumari, Gopal Pathak

Abstract:

Artificial neural network has been proved to be an efficient tool for non-parametric modeling of data in various applications where output is non-linearly associated with input. It is a preferred tool for many predictive data mining applications because of its power , flexibility, and ease of use. A standard feed forward networks (FFN) is used to predict the groundwater fluoride content. The ANN model is trained using back propagated algorithm, Tansig and Logsig activation function having varying number of neurons. The models are evaluated on the basis of statistical performance criteria like Root Mean Squarred Error (RMSE) and Regression coefficient (R2), bias (mean error), Coefficient of variation (CV), Nash-Sutcliffe efficiency (NSE), and the index of agreement (IOA). The results of the study indicate that Artificial neural network (ANN) can be used for groundwater fluoride prediction in the limited data situation in the hard rock region like western parts of Jharkhand with sufficiently good accuracy.

Keywords: Artificial neural network (ANN), FFN (Feed-forward network), backpropagation algorithm, Levenberg-Marquardt algorithm, groundwater fluoride contamination

Procedia PDF Downloads 523
14032 Design and Implementation of Campus Wireless Networking for Sharing Resources in Federal Polytechnic Bauchi, Bauchi State, Nigeria

Authors: Hassan Abubakar

Abstract:

This paper will serve as a guide to good design and implementation of wireless networking for campus institutions in Nigeria. It can be implemented throughout the primary, secondary and tertiary institutions. This paper describe the some technical functions, standard configurations and layouts of the 802.11 wireless LAN(Local Area Network) that can be implemented across the campus network. The paper also touches upon the wireless infrastructure standards involved with enhanced services, such as voice over wireless and wireless guest hotspot. The paper also touch the benefits derived from implementing campus wireless network and share some lights on how to arrive at the success in increasing the performance of wireless and using the campus wireless to share resources like software applications, printer and documents.

Keywords: networking, standards, wireless local area network (WLAN), radio frequency (RF), campus

Procedia PDF Downloads 401
14031 Using Focused Free-Writing to Help English to Speakers of Other Languages Students Generate Ideas for Critical, Academic Writing

Authors: Ratnawati Mohd Asraf, Sabreena Ahmed

Abstract:

This paper describes how the method of focused freewriting can be used to help teachers to foster critical thinking through writing. In this study, we used focused freewriting during the pre-writing stage of our writing course to help our English to Speakers of Other Languages (ESOL) students to generate ideas and to think critically about the issues they were to write on. In each of the four classes where we applied this technique, we used pictures or videos to stimulate their thinking during the prewriting stage of writing and then asked them to write non-stop for ten minutes about whatever that came to their minds as a result of being presented with these prompts. We then asked them to focus on the themes that emerged from their brief writing. Using observations, in-depth interviews, and an analysis of their brief essays, our study found that focused freewriting helped our students to generate ideas and think critically about the issues they were writing on. We postulate that by using focused freewriting and discussions during the prewriting stage of writing, instructors can help their students to think critically about various issues and facilitate their efforts at organising their arguments for critical, academic essays.

Keywords: academic writing, critical writing, critical thinking, focused free-writing, pre-writing

Procedia PDF Downloads 146
14030 Urban Poor: The Situations and Characteristics of the Problem and Social Welfare Service of Bangkok Metropolis

Authors: Sanchai Ratthanakwan

Abstract:

This research aims to study situations and characteristics of the problems facing the urban poor. The data and information are collected by focus group and in-depth interview leader and members of Four Regions Slum Network, community representatives and the social welfare officer. The research can be concluded that the problems of the urban poor faced with three major problems: Firstly, the shortage of housing and stability issues in housing; secondly, the problem of substandard quality of life; and thirdly, the debt problem. The study found that a solution will be found in two ways: First way is the creation of housing for the urban poor in slums or community intrusion by the state. Second way is the stability in the housing and subsistence provided by the community center called “housing stability”.

Keywords: urban poor, social welfare, Bangkok metropolis, housing stability

Procedia PDF Downloads 404
14029 Node Optimization in Wireless Sensor Network: An Energy Approach

Authors: Y. B. Kirankumar, J. D. Mallapur

Abstract:

Wireless Sensor Network (WSN) is an emerging technology, which has great invention for various low cost applications both for mass public as well as for defence. The wireless sensor communication technology allows random participation of sensor nodes with particular applications to take part in the network, which results in most of the uncovered simulation area, where fewer nodes are located at far distances. The drawback of such network would be that the additional energy is spent by the nodes located in a pattern of dense location, using more number of nodes for a smaller distance of communication adversely in a region with less number of nodes and additional energy is again spent by the source node in order to transmit a packet to neighbours, thereby transmitting the packet to reach the destination. The proposed work is intended to develop Energy Efficient Node Placement Algorithm (EENPA) in order to place the sensor node efficiently in simulated area, where all the nodes are equally located on a radial path to cover maximum area at equidistance. The total energy consumed by each node compared to random placement of nodes is less by having equal burden on fewer nodes of far location, having distributed the nodes in whole of the simulation area. Calculating the network lifetime also proves to be efficient as compared to random placement of nodes, hence increasing the network lifetime, too. Simulation is been carried out in a qualnet simulator, results are obtained on par with random placement of nodes with EENP algorithm.

Keywords: energy, WSN, wireless sensor network, energy approach

Procedia PDF Downloads 296
14028 Technical and Vocational Education and Technology Transfer: Departments of Electrical Engineering at the Public Authority for Applied Education and Training, PAAE&T, Kuwait, a case Study

Authors: Salah Al-Ali

Abstract:

The role of technology transfer in technical and vocational education is significant since lecturers, trainers, and students can obtain the updated knowledge, skills, and attitudes that are currently being practiced by local and international businesses and industries. Technology transfer can indeed close the gap between what is being learned and practiced in technical and vocational institutions and the world of work. However, the success of technology transfer in technical and vocational education perspectives would depend entirely on the quality of management. It is their responsibility when signing an agreement with internal or external providers of technology, to include calluses that enable academic staff in related specialty to interact positively and freely with the supplier of technology. In other terms, ensuring no clear or hidden restriction is imposed by the supplier of technology to acquire the know-how and know-why that are embedded in the agreement. In this paper, I present some of the empirical results and observations which describe the interactions between the supplier of technology (Electrical Engineering System) and the recipient of the technology (PAAE&T) in the field of technology transfer. In another word, whether the PAAE&T have taken the opportunity while building its new headquarter, the transfer of technology from the supplier of an electrical engineering system to its academic staff in its various Electrical Engineering Academic Departments at the PAAE&T colleges and institutions. The paper argues that, for effective and efficient transfer of technology, the recipient (PAAE&T) must ensure that the agreement with the supplier of the Electrical Engineering System must include calluses that would allow the PAAE&T academic staff in its various Electrical Engineering Academic Departments in its various colleges and institutions to acquire the technology embedded in the agreement. The paper concludes that the transfer of technology and the building of a local scientific and technical infrastructure must be viewed by Kuwaiti decision-makers as complementary to one another. Thus, reducing, to great extent, the level of dependence on expatriates, particularly in the essential sectors of the economy.

Keywords: vocational and technical education, technology transfer, enhancing indigenous capabilities, Kuwait

Procedia PDF Downloads 118
14027 Chinese Sentence Level Lip Recognition

Authors: Peng Wang, Tigang Jiang

Abstract:

The computer based lip reading method of different languages cannot be universal. At present, for the research of Chinese lip reading, whether the work on data sets or recognition algorithms, is far from mature. In this paper, we study the Chinese lipreading method based on machine learning, and propose a Chinese Sentence-level lip-reading network (CNLipNet) model which consists of spatio-temporal convolutional neural network(CNN), recurrent neural network(RNN) and Connectionist Temporal Classification (CTC) loss function. This model can map variable-length sequence of video frames to Chinese Pinyin sequence and is trained end-to-end. More over, We create CNLRS, a Chinese Lipreading Dataset, which contains 5948 samples and can be shared through github. The evaluation of CNLipNet on this dataset yielded a 41% word correct rate and a 70.6% character correct rate. This evaluation result is far superior to the professional human lip readers, indicating that CNLipNet performs well in lipreading.

Keywords: lipreading, machine learning, spatio-temporal, convolutional neural network, recurrent neural network

Procedia PDF Downloads 107
14026 The Analysis of Changes in Urban Hierarchy of Isfahan Province in the Fifty-Year Period (1956-2006)

Authors: Hamidreza Joudaki, Yousefali Ziari

Abstract:

The appearance of city and urbanism is one of the important processes which have affected social communities. Being industrialized urbanism developed along with each other in the history. In addition, they have had simple relationship for more than six thousand years, that is, from the appearance of the first cities. In 18th century by coming out of industrial capitalism, progressive development took place in urbanism in the world. In Iran, the city of each region made its decision by itself and the capital of region (downtown) was the only central part and also the regional city without any hierarchy, controlled its realm. However, this method of ruling during these three decays, because of changing in political, social and economic issues that have caused changes in rural and urban relationship. Moreover, it has changed the variety of performance of cities and systematic urban network in Iran. Today, urban system has very vast imbalanced apace and performance. In Isfahan, the trend of urbanism is like the other part of Iran and systematic urban hierarchy is not suitable and normal. This article is a quantitative and analytical. The statistical communities are Isfahan Province cities and the changes in urban network and its hierarchy during the period of fifty years (1956 -2006) has been surveyed. In addition, those data have been analyzed by model of Rank and size and Entropy index. In this article Iran cities and also the factor of entropy of primate city and urban hierarchy of Isfahan Province have been introduced. Urban residents of this Province have been reached from 55 percent to 83% (2006). As we see the analytical data reflects that there is mismatching and imbalance between cities. Because the entropy index was.91 in 1956.And it decreased to.63 in 2006. Isfahan city is the primate city in the whole of these periods. Moreover, the second and the third cities have population gap with regard to the other cities and finally, they do not follow the system of rank-size.

Keywords: urban network, urban hierarchy, primate city, Isfahan province, urbanism, first cities

Procedia PDF Downloads 238