Search results for: multiple%20regression
3743 The Escalation of Incivility in the Light of Social Constructions that Conceal Inequalities
Authors: J. M. B. Mendonça, M. V. S. Siqueira, A. Soares, M. A. F. Santos
Abstract:
The purpose of this article is to understand the dynamics of the increase in incivility through social relations (gender, race, class, sexual orientation, etc.), which hide inequalities in the form of treatment and opportunities within the organizational sphere. For this, we will examine works that address incivility at work, as well as studies that deviate from the mainstream, bringing more obscure organizational facets to light in connection with a critical approach to this issue. Next, some results of a bibliometric study shall be exposed, to analyze contributions connected to the theme and demonstrate gaps for future research. Then, models that facilitate reflection on the dynamics of violence shall be discussed. Finally, a broader concept of incivility in interpersonal relationships in the workplace shall be exposed considering the multiple approaches discussed.Keywords: incivility, inequalities, organization reflections, preventing violence
Procedia PDF Downloads 3203742 Emergency Condition Discrimination for Single People Using a CO2 Sensor and Body Detectors
Authors: Taiyo Matsumura, Kota Funabashi, Nobumichi Sakai, Takashi Ono
Abstract:
The purpose of this research is to construct a watching system that monitors human activity in a room and detects abnormalities at an early stage to prevent unattended deaths of people living alone. In this article, we propose a method whereby highly urgent abnormal conditions of a person are determined by changes in the concentration of CO2 generated from activity and respiration in a room. We also discussed the effects the amount of activity has on the determination. The results showed that this discrimination method is not dependent on the amount of activity and is effective in judging highly urgent abnormal conditions.Keywords: abnormal conditions, multiple sensors, people living alone, respiratory arrest, unattended death, watching system
Procedia PDF Downloads 1373741 Practical Aspects Pertaining to the Selection of Size and Location of Source Substations in an Oil Field
Authors: Yadavalli Venkata Sridhar
Abstract:
Finalization of Substation sizing and location is an important task to be carried out by electrical designers in an oil field. Practical issues influence the selection of size and location of the source substations that feed multiple production facilities are listed. Importance of selection of appropriately rated short circuit level for 11KV switchboards and constraints pertaining to availability of manufacturers are highlighted. Without being lost in the research of absolute optimum solution, under time constraints, the importance of practical approach is brought out. Focus on identifying near optimum solutions by process of elimination of unfeasible substation locations with the support of cost figures, is emphasized through a case study.Keywords: substation, size, location, oil field
Procedia PDF Downloads 6623740 The Predictors of Student Engagement: Instructional Support vs Emotional Support
Authors: Tahani Salman Alangari
Abstract:
Student success can be impacted by internal factors such as their emotional well-being and external factors such as organizational support and instructional support in the classroom. This study is to identify at least one factor that forecasts student engagement. It is a cross-sectional, conducted on 6206 teachers and encompassed three years of data collection and observations of math instruction in approximately 50 schools and 300 classrooms. A multiple linear regression revealed that a model predicting student engagement from emotional support, classroom organization, and instructional support was significant. Four linear regression models were tested using hierarchical regression to examine the effects of independent variables: emotional support was the highest predictor of student engagement while instructional support was the lowest.Keywords: student engagement, emotional support, organizational support, instructional support, well-being
Procedia PDF Downloads 783739 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems
Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia
Abstract:
The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.Keywords: cloud computing, data management, multi-tenancy, requirements, security
Procedia PDF Downloads 1563738 Addressing the Oracle Problem: Decentralized Authentication in Blockchain-Based Green Hydrogen Certification
Authors: Volker Wannack
Abstract:
The aim of this paper is to present a concept for addressing the Oracle Problem in the context of hydrogen production using renewable energy sources. The proposed approach relies on the authentication of the electricity used for hydrogen production by multiple surrounding actors with similar electricity generation facilities, which attest to the authenticity of the electricity production. The concept introduces an Authenticity Score assigned to each certificate, as well as a Trust Score assigned to each witness. Each certificate must be attested by different actors with a sufficient Trust Score to achieve an Authenticity Score above a predefined threshold, thereby demonstrating that the produced hydrogen is indeed "green."Keywords: hydrogen, blockchain, sustainability, structural change
Procedia PDF Downloads 623737 The Russian Preposition 'за': A Cognitive Linguistic Approach
Authors: M. Kalyuga
Abstract:
Prepositions have long been considered to be one of the major challenges for second language learners, since they have multiple uses that differ greatly from one language to another. The traditional approach to second language teaching supplies students with a list of uses of a preposition that they have to memorise and no explanation is provided. Contrary to the traditional grammar approach, the cognitive linguistic approach offers an explanation for the use of prepositions and provides strategies to comprehend and learn prepositions that would be otherwise seem obscure. The present paper demonstrates the use of the cognitive approach for the explanation of prepositions through the example of the Russian preposition 'за'. The paper demonstrates how various spatial and non-spatial uses of this preposition are linked together through metaphorical and metonymical mapping. The diversity of expressions with за is explained by the range of spatial scenes this preposition is associated with.Keywords: language teaching, Russian, preposition 'за', cognitive approach
Procedia PDF Downloads 4503736 Fuzzy Vehicle Routing Problem for Extreme Environment
Authors: G. Sirbiladze, B. Ghvaberidze, B. Matsaberidze
Abstract:
A fuzzy vehicle routing problem is considered in the possibilistic environment. A new criterion, maximization of expectation of reliability for movement on closed routes is constructed. The objective of the research is to implement a two-stage scheme for solution of this problem. Based on the algorithm of preferences on the first stage, the sample of so-called “promising” routes will be selected. On the second stage, for the selected promising routes new bi-criteria problem will be solved - minimization of total traveled distance and maximization of reliability of routes. The problem will be stated as a fuzzy-partitioning problem. Two possible solutions of this scheme are considered.Keywords: vehicle routing problem, fuzzy partitioning problem, multiple-criteria optimization, possibility theory
Procedia PDF Downloads 5473735 Effectiveness of Traditional Chinese Medicine in the Treatment of Eczema: A Systematic Review and Meta-Analysis Based on Eczema Area and Severity Index Score
Authors: Oliver Chunho Ma, Tszying Chang
Abstract:
Background: Traditional Chinese Medicine (TCM) has been widely used in the treatment of eczema. However, there is currently a lack of comprehensive research on the overall effectiveness of TCM in treating eczema, particularly using the Eczema Area and Severity Index (EASI) score as an evaluation tool. Meta-analysis can integrate the results of multiple studies to provide more convincing evidence. Objective: To conduct a systematic review and meta-analysis based on the EASI score to evaluate the overall effectiveness of TCM in the treatment of eczema. Specifically, the study will review and analyze published clinical studies that investigate TCM treatments for eczema and use the EASI score as an outcome measure, comparing the differences in improving the severity of eczema between TCM and other treatment modalities, such as conventional Western medicine treatments. Methods: Relevant studies, including randomized controlled trials (RCTs) and non-randomized controlled trials, that involve TCM treatment for eczema and use the EASI score as an outcome measure will be searched in medical literature databases such as PubMed, CNKI, etc. Relevant data will be extracted from the selected studies, including study design, sample size, treatment methods, improvement in EASI score, etc. The methodological quality and risk of bias of the included studies will be assessed using appropriate evaluation tools (such as the Cochrane Handbook). The results of the selected studies will be statistically analyzed, including pooling effect sizes (such as standardized mean differences, relative risks, etc.), subgroup analysis (e.g., different TCM syndromes, different treatment modalities), and sensitivity analysis (e.g., excluding low-quality studies). Based on the results of the statistical analysis and quality assessment, the overall effectiveness of TCM in improving the severity of eczema will be interpreted. Expected outcomes: By integrating the results of multiple studies, we expect to provide more convincing evidence regarding the specific effects of TCM in improving the severity of eczema. Additionally, subgroup analysis and sensitivity analysis can further elucidate whether the effectiveness of TCM treatment is influenced by different factors. Besides, we will compare the results of the meta-analysis with the clinical data from our clinic. For both the clinical data and the meta-analysis results, we will perform descriptive statistics such as means, standard deviations, percentages, etc. and compare the differences between the two using statistical tests such as independent samples t-test or non-parametric tests to assess the statistical differences between them.Keywords: Eczema, traditional Chinese medicine, EASI, systematic review, meta-analysis
Procedia PDF Downloads 553734 The Performance of Modern Eugenics: Ballroom of the Skies as a Method of Understanding American Social Eugenics
Authors: Michael Stokes
Abstract:
Using a disability studies approach, this paper analyzes the American science fiction novel Ballroom of the Skies as way to address and access narratives of American exceptionalism in relation to global struggle. Combined with a critical race studies analysis of identity and cultural practice, this essay seeks to find parallels between the treatment of disability and the treatment of the racialized body in literature to forcibly reread potential for multiple assemblages of identity in the speculated futures of science fiction. Thinking through this relationship, the essay constructs a thematic understanding of social eugenics as practiced in American culture.Keywords: disability studies, science fiction, eugenics, cultural studies
Procedia PDF Downloads 2493733 An Unusual Case of Extensive, Unilateral, Idiopathic Dental Resorption
Authors: Ceri McIntosh
Abstract:
A 25-year-old male was referred to the Maxillofacial department by his general dental practitioner with a complaint of mobile teeth. Medically he was well though he took mirtazapine for anxiety. He was found to have had previous extractions of the lower right second premolar and first molar, with grade 2 mobility of the upper right first and second molars and lower right lateral incisor. Radiographically there was significant external root resorption of these teeth, which were subsequently extracted. Over the next 18 months, the resorption continued around multiple teeth on the right side, and when the mobile teeth were removed, they showed no remaining root, including loss of coronal dentine, leaving only an enamel shell. No cause has been identified either histologically or in the patient’s blood work. A review of relevant literature will be included in this case report.Keywords: case report, idiopathic resorption, idiopathic root resorption, external resorption
Procedia PDF Downloads 783732 Substrate Coupling in Millimeter Wave Frequencies
Authors: Vasileios Gerakis, Fontounasios Christos, Alkis Hatzopoulos
Abstract:
A study of the impact of metal guard rings on the coupling between two square metal pads is presented. The structure is designed over a bulk silicon substrate with epitaxial layer, so the coupling through the substrate is also involved. A lightly doped profile is adopted and is simulated by means of an electromagnetic simulator for various pad distances and different metal layers, assuming a 65 nm bulk CMOS technology. The impact of various guard ring design (geometrical) parameters is examined. Furthermore, the increase of isolation (resulting in reduction of the noise coupling) between the pads by cutting the ring, or by using multiple rings, is also analyzed. S parameters are used to compare the various structures.Keywords: guard rings, metal pad coupling, millimeter wave frequencies, substrate noise,
Procedia PDF Downloads 5363731 The Unique Journeys from Different Pasts to Multiple Presents in the Work of the Pritzker Prize Laureates of 2010-2020
Authors: Christakis Chatzichristou Kyriakos Miltiadou, Konstantinos Gounaridis
Abstract:
The paper discusses how the Pritzker Prize Laureates of the last decade themselves identify the various ways different aspects or interpretations of the past have influenced their design methodologies. As the recipients of what is considered to be the most prestigious award in architecture, these architects are worth examining not only because of their exemplary work but also because of the strong influence they have on architectural culture in general. Rather than attempting to interpret their projects, the methodology chosen focuses on what the architects themselves have to say on the subject. The research aims at, and, as the tabular form of the findings shows, also succeeds in revealing the numerous and diverse ways different aspects of what is termed as the Past can potentially enrich contemporary design practices.Keywords: design methodology, Pritzker Prize Laureates, past, culture, tradition
Procedia PDF Downloads 433730 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 283729 Trauma inside and Out: A Descriptive Cross-Sectional Study of Family, Community and Psychological Wellbeing amongst Pediatric Victims of Interpersonal Violence
Authors: Mary Bernardin, Margie Batek, Joseph Moen, David Schnadower
Abstract:
Background: Exposure to violence not only has negative psychological impact on children but is a risk factor for children becoming recurrent victims of violence. However, little is known regarding the degree to which child victims of violence are exposed to trauma at home and in their community, or its association with specific psychological diagnoses. Objective: The aims of this study were to perform in-depth characterizations of family, community and psychological wellness amongst pediatric victims of interpersonal violence. Methods: As standard of care at the Saint Louis Children’s Hospital pediatric emergency department (ED), social workers perform in-depth interviews with all children presenting due to violent interpersonal encounters. In this retrospective cross-sectional study, we collected data from social work interviews on family structure, exposure to violence in the community and the home, as well as history of psychological diagnoses amongst children ages 8-19 years who presented to the ED for injuries related to interpersonal violence from 2014-2017. Results: A total of 407 patients presenting to the ED for an interpersonal violent encounter were analyzed. The average age of studied youths was 14.7 years (SD 2.5). Youths were 97.5% African American ethnicity and 66.6% male. 67.8% described their home having a nonnuclear family structure, 50% of which reported living with a single mother. Of the 21% who reported having incarcerated family members, 56.3% reported their father being incarcerated, 15% reported their mother being incarcerated, and 12.5% reported multiple family members being incarcerated. 11.3% reported witnessing domestic violence in their home. 12.8% of youths reported some form of child abuse. The type of child abuse was not specified in 29.3% of cases, but physical abuse (32.8%) followed by sexual abuse (22.4%) were the most commonly reported. 14.5% had history of placement in foster care and/or adoption. 64% reported having witnessed violence in their community. 30.2% reported having lost friends or family due to violence, and of those, 26.4% reported the loss of a cousin, 18.9% the loss of a friend, 16% the loss of their father, and 12.3% the loss of their brother due to violence. Of the 22.4% youths with psychiatric diagnose(s), 48.4% had multiple diagnoses, the most common of which were ADD/ADHD (62.6%), followed by depression (31.9%), bipolar disorder (27.5%) and anxiety (15.4%). Conclusions: A remarkable proportion of children presenting to EDs due to interpersonal violence have a history of exposure to instability and violence in their homes and communities. Additionally, psychological diagnoses are frequent among pediatric victims of violence. More research is needed to better understand the association between trauma exposure, psychological health and violent victimization amongst children.Keywords: community violence, emergency department, pediatric interpersonal violence, pediatric trauma, psychological effects of trauma
Procedia PDF Downloads 2353728 Examining the Mediating and Moderating Role of Relationships in the Association between Poverty and Children’s Subjective Well-Being
Authors: Esther Yin-Nei Cho
Abstract:
There is inconsistency among studies about whether there is an association between poverty and the subjective wellbeing of children. Some have found a positive association, though its magnitude could be limited, others have shown no association. One possible explanation for this inconsistency is that household income, an often-adopted measure of child poverty, may not accurately and stably reflect the actual life experience of children. Some studies have suggested, however, that material deprivation covering various dimensions of children’s lives could be a better measure of child poverty. Another possible explanation for the inconsistency is that the link between poverty and subjective wellbeing of children may not be that straightforward, as there could be underlying mechanisms, such as mediation and moderation, influencing its direction or strength. While a mediator refers to the mechanism through which an independent variable affects a dependent variable, a moderator changes the direction or strength of the relationship between an independent variable and a dependent variable. As suggested by empirical evidence, family relationships and friendships could be potential mediators or moderators of the link between poverty and subjective well-being: poverty affects relationships; relationships are an important element in children’s subjective well-being; and economic status affects child outcomes, though not necessarily subjective wellbeing, through relationships. Since the potential links have not been adequately understood, this study fills this gap by examining the possible role of family relationships and friendships as mediators or moderators between poverty (using child-derived material deprivation as measure) and the subjective wellbeing of children. Improving subjective wellbeing is increasingly considered as a policy goal. The finding of no or a limited association between poverty and subjective wellbeing of children could be a justification for less effort to improve poverty in this regard. But if the observed magnitude of that association is due to some underlying mechanisms at work, the effect of poverty may be underestimated and the potentially useful strategies that take into account both poverty and other mediators or moderators for improving children’s subjective well-being may be overlooked. Multiple mediation, and multiple moderation models, based on regression analyses, are performed to a sample of approximately 1,600 children, who are aged 10 to 15, from the wellbeing survey conducted by The Children’s Society in England from 2010 to 2011. Results show that the effect of children’s material deprivation on their subjective well-being is mediated by their family relationships and friendships. Moreover, family relationships are a significant moderator. It is found that the negative impact of child deprivation on subjective wellbeing could be exacerbated if family relationships are not going well, while good family relationships may prevent the further decline in subjective well-being. Policy implications of the findings are discussed. In particular, policy measures that focus on strengthening the family relationships or nurturing home environment through supporting household’s economic security and parental time with children could promote the subjective wellbeing of children.Keywords: child poverty, mediation, moderation, subjective well-being of children
Procedia PDF Downloads 3263727 Women's Contemporary Dystopias: Feminist Protagonists Taking Back Control
Authors: Natalia Fontes De Oliveira
Abstract:
The Canadian author Margaret Atwood deconstructs the tainted dichotomies between women and men by embracing the disorder throughout her dystopias. In Atwood’s The Testaments, nature can be seen as a background to the story as well as a metaphorical expression of the characters’ state of mind, nevertheless, the protagonists’ nature writing portrays conveys a curiosity to the pre-established sanctions of a docile garden, viewing nature as an autonomous entity, especially when they are away from the confinements of Gilead’s regime. The three narrating protagonists, Agnes, Aunt Lydia, and Nicole, use nature writing subversively as a form of rebellion. This paper investigates how the three protagonists narrate nature through an intimist point of view, with sensibility to observe the multiple relationships among humanity, nature, and the impositions of a theocratic ultra conservative patriarchal society.Keywords: contemporary literature, dystopias, feminism, women’s writing
Procedia PDF Downloads 1673726 Meso-Scopic Structural Analysis of Chaura Thrust, Himachal Pradesh, India
Authors: Rajkumar Ghosh
Abstract:
Jhakri Thrust (JT) coeval of Sarahan Thrust (ST) was later considered to be part of Chaura Thrust (CT). The Main Central Thrust (MCT) delimits the southern extreme of Higher Himalaya, whereas the northern boundary defines by South Tibetan Detachment System (STDS). STDS is parallel set of north dipping extensional faults. The activation timing of MCT and STDS. MCT activated in two parts (MCT-L during 15- 0.7 Ma, and MCT-U during 25-14 Ma). Similarly, STDS triggered in two parts (STDS-L during 24-12 Ma, and STDS-U during 19-14 Ma). The activation ages for MBT and MFT. Besides, the MBT occurred during 11-9 Ma, and MFT followed as <2.5 Ma. There are two mylonitised zones (zone of S-C fabric) found under the microscope. Dynamic and bulging recrystallization and sub-grain formation was documented under the optical microscope from samples collected from these zones. The varieties of crenulated schistosity are shown in photomicrographs. In a rare and uncommon case, crenulation cleavage and sigmoid Muscovite were found together side-by-side. Recrystallized quartzo-feldspathic grains exist in between crenulation cleavages. These thin-section studies allow three possible hypotheses for such variations in crenulation cleavages. S/SE verging meso- and micro-scale box folds around Chaura might be a manifestation of some structural upliftment. Near Chaura, kink folds are visible. Prominent asymmetric shear sense indicators in augen mylonite are missing in meso-scale but dominantly present under the microscope. The main foliation became steepest (range of dip ~ 65 – 80 º) at this place. The aim of this section is to characterize the box fold and its signature in the regional geology of Himachal Himalaya. Grain Boundary Migration (GBM) associated temperature range (400–750 ºC) from microstructural studies in grain scale along Jhakri-Wangtu transect documented. Oriented samples were collected from the Jhakri-Chaura transect at a regular interval of ~ 1km for strain analysis. The Higher Himalayan Out-of-Sequence Thrust (OOST) in Himachal Pradesh is documented a decade ago. The OOST in other parts of the Himalayas is represented as a line in between MCTL and MCTU. But In Himachal Pradesh area, OOST activated the MCTL as well as in between a zone located south of MCTU. The expectations for strain variation near the OOST are very obvious. But multiple sets of OOSTs may produce a zigzag pattern of strain accumulation for this area and figure out the overprinting structures for multiple sets of OOSTs.Keywords: Chaura Thrust, out-of-sequence thrust, Main Central Thrust, Sarahan Thrust
Procedia PDF Downloads 763725 Modelling of Induction Motor Including Skew Effect Using MWFA for Performance Improvement
Authors: M. Harir, A. Bendiabdellah, A. Chaouch, N. Benouzza
Abstract:
This paper deals with the modelling and simulation of the squirrel cage induction motor by taking into account all space harmonic components, as well as the introduction of the bars skew, in the calculation of the linear evolution of the magnetomotive force (MMF) between the slots extremities. The model used is based on multiple coupled circuits and the modified winding function approach (MWFA). The effect of skewing is included in the calculation of motors inductances with an axial asymmetry in the rotor. The simulation results in both time and spectral domains show the effectiveness and merits of the model and the error that may be caused if the skew of the bars is neglected.Keywords: modeling, MWFA, skew effect, squirrel cage induction motor, spectral domain
Procedia PDF Downloads 4373724 The Relationship between School Belonging, Self-Efficacy and Academic Achievement in Tabriz High School Students
Authors: F. Pari, E. Fathiazar, T. Hashemi, M. Pari
Abstract:
The present study aimed to examine the role of self-efficacy and school belonging in the academic achievement of Tabriz high school students in grade 11. Therefore, using a random cluster method, 377 subjects were selected from the whole students of Tabriz high schools. They filled in the School Belonging Questionnaire (SBQ) and General Self-Efficacy Scale. Data were analyzed using correlational as well as multiple regression methods. Findings demonstrate self-efficacy and school belonging have significant roles in the prediction of academic achievement. On the other hand, the results suggest that considering the gender variable there is no significant difference between self-efficacy and school belonging. On the whole, cognitive approaches could be effective in the explanation of academic achievement.Keywords: school belonging, self-efficacy, academic achievement, high school
Procedia PDF Downloads 2963723 A Social Cognitive Investigation in the Context of Vocational Training Performance of People with Disabilities
Authors: Majid A. AlSayari
Abstract:
The study reported here investigated social cognitive theory (SCT) in the context of Vocational Rehab (VR) for people with disabilities. The prime purpose was to increase knowledge of VR phenomena and make recommendations for improving VR services. The sample consisted of 242 persons with Spinal Cord Injuries (SCI) who completed questionnaires. A further 32 participants were Trainers. Analysis of questionnaire data was carried out using factor analysis, multiple regression analysis, and thematic analysis. The analysis suggested that, in motivational terms, and consistent with research carried out in other academic contexts, self-efficacy was the best predictor of VR performance. The author concludes that that VR self-efficacy predicted VR training performance.Keywords: people with physical disabilities, social cognitive theory, self-efficacy, vocational training
Procedia PDF Downloads 3143722 Thermodynamic Trends in Co-Based Alloys via Inelastic Neutron Scattering
Authors: Paul Stonaha, Mariia Romashchenko, Xaio Xu
Abstract:
Magnetic shape memory alloys (MSMAs) are promising technological materials for a range of fields, from biomaterials to energy harvesting. We have performed inelastic neutron scattering on two powder samples of cobalt-based high-entropy MSMAs across a range of temperatures in an effort to compare calculations of thermodynamic properties (entropy, specific heat, etc.) to the measured ones. The measurements were correct for multiphonon scattering and multiple scattering contributions. We present herein the neutron-weighted vibrational density of states. Future work will utilize DFT calculations of the disordered lattice to correct for the neutron weighting and retrieve the true thermodynamical properties.Keywords: neutron scattering, vibrational dynamics, computational physics, material science
Procedia PDF Downloads 313721 A Dual Band Microstrip Patch Antenna for WLAN and WiMAX Applications
Authors: P. Krachodnok
Abstract:
In this paper, the design of a multiple U-slotted microstrip patch antenna with frequency selective surface (FSS) as a superstrate for WLAN and WiMAX applications is presented. The proposed antenna is designed by using substrate FR4 having permittivity of 4.4 and air substrate. The characteristics of the antenna are designed and evaluated the performance of modelled antenna using CST Microwave studio. The proposed antenna dual resonant frequency has been achieved in the band of 2.37-2.55 GHz and 3.4-3.6 GHz. Because of the impact of FSS superstrate, it is found that the bandwidths have been improved from 6.12% to 7.35 % and 3.7% to 5.7% at resonant frequencies 2.45 GHz and 3.5 GHz, respectively. The maximum gain at the resonant frequency of 2.45 and 3.5 GHz are 9.3 and 11.33 dBi, respectively.Keywords: multi-slotted antenna, microstrip patch antenna, frequency selective surface, artificial magnetic conduction
Procedia PDF Downloads 3783720 A Novel Idea to Benefit of the Load Side’s Harmonics
Authors: Hussein Al-bayaty
Abstract:
This paper presents a novel idea to show the ability to benefit of the harmonic currents which are produced on the load side of the power grid. The proposed circuit contributes in reduction of the total harmonic distortion (THD) percentage through adding a high pass filter to draw harmonic currents with 150 Hz and multiple frequencies a and convert them to DC current and then reconvert it to AC current with 50 Hz frequency in order to feed different loads. The circuit has been designed, investigated and simulated in the MATLAB, Simulink program; the results will be assessed and compared the two cases: firstly, the system without adding the new circuit. Secondly, with adding the high pas filter circuit to the power system.Keywords: harmonics elimination, passive filters, Total Harmonic Distortion (THD), filter circuit
Procedia PDF Downloads 4113719 Multiple Fault Diagnosis in Digital Circuits using Critical Path Tracing and Enhanced Deduction Algorithm
Authors: Mohamed Mahmoud
Abstract:
This paper has developed an effect-cause analysis technique for fault diagnosis in digital circuits. The main algorithm of our technique is based on the Enhanced Deduction Algorithm, which processes the real response of the CUT to the applied test T to deduce the values of the internal lines. An experimental version of the algorithm has been implemented in C++. The code takes about 7592 lines. The internal values are determined based on the logic values under the permanent stuck-fault model. Using a backtracking strategy guarantees that the actual values are covered by at least one solution, or no solution is found.Keywords: enhanced deduction algorithm, backtracking strategy, automatic test equipment, verfication
Procedia PDF Downloads 1183718 Application of Molecular Markers for Crop Improvement
Authors: Monisha Isaac
Abstract:
Use of molecular markers for selecting plants with desired traits has been started long back. Due to their heritable characteristics, they are useful for identification and characterization of specific genotypes. The study involves various types of molecular markers used to select multiple desired characters in plants, their properties, and advantages to improve crop productivity in adverse climatological conditions for the purpose of providing food security to fast-growing global population. The study shows that genetic similarities obtained from molecular markers provide more accurate information and the genetic diversity can be better estimated from the genetic relationship obtained from the dendrogram. The information obtained from markers assisted characterization is more suitable for the crops of economic importance like sugarcane.Keywords: molecular markers, crop productivity, genetic diversity, genotype
Procedia PDF Downloads 5143717 Gentrification and Its Impact on Urbanization in India
Authors: Swapnil Vidhate, Anupama Sharma
Abstract:
At present the world is experiencing an extraordinary rate of urbanization. India is also in a major phase of urbanization. Gentrification is being practiced in India much later compared to western countries as a strategy for urban renewal. The urban fabric in Indian context is composed of multiple layers in it. Thus, the process of gentrification has different typologies, views and impacts in Indian context. It is a curative concept to restructure the declined areas of the city. But it has more negative views compared to positive due to the concerns in the process in India. The paper brings out the impacts of gentrification and concerns related with the process in Indian context with a case example of core city.Keywords: urbanization, urban renewal, gentrification, restructure, core city
Procedia PDF Downloads 7513716 A New Spell-Out Mechanism
Authors: Yusra Yahya
Abstract:
In this paper, a new spell-out mechanism is developed and defended. This mechanism builds on the role of phase heads as both the loci of spell-out features and the transfer triggers via either Phase Impenetrability Condition 1 (PIC1) and/or Phase Impenetrability Condition 2 (PIC2). The assumption here is that phase heads, mainly v*, can regulate the spell-out process by deciding both the type of spell-out applying and the timing of spell-out relevant. This paper also proposes a new form of the constraint Wrap call it Wrap-XP’ and it is assumed to apply to IP as a functional maximal projection. This extension is shown to fall as a natural result once we assume the new theory of phases and multiple spell-out. Moreover, it is proposed in this work that some forms of XP movement are not motivated by an EPP feature of a strong phase head mainly v*, but they are rather motivated by a last resort strategy to accomplish the spell-out instruction of this phase head.Keywords: linguistics, syntax, phonology, phase theory, optimality theory
Procedia PDF Downloads 5123715 The Control System Architecture of Space Environment Simulator
Authors: Zhan Haiyang, Gu Miao
Abstract:
This article mainly introduces the control system architecture of space environment simulator, simultaneously also briefly introduce the automation control technology of industrial process and the measurement technology of vacuum and cold black environment. According to the volume of chamber, the space environment simulator is divided into three types of small, medium and large. According to the classification and application of space environment simulator, the control system is divided into the control system of small, medium, large space environment simulator and the centralized control system of multiple space environment simulators.Keywords: space environment simulator, control system, architecture, automation control technology
Procedia PDF Downloads 4733714 Simulating Drilling Using a CAD System
Authors: Panagiotis Kyratsis, Konstantinos Kakoulis
Abstract:
Nowadays, the rapid development of CAD systems’ programming environments results in the creation of multiple downstream applications, which are developed and becoming increasingly available. CAD based manufacturing simulations is gradually following the same trend. Drilling is the most popular hole-making process used in a variety of industries. A specially built piece of software that deals with the drilling kinematics is presented. The cutting forces are calculated based on the tool geometry, the cutting conditions and the tool/work piece materials. The results are verified by experimental work. Finally, the response surface methodology (RSM) is applied and mathematical models of the total thrust force and the thrust force developed because of the main cutting edges are proposed.Keywords: CAD, application programming interface, response surface methodology, drilling, RSM
Procedia PDF Downloads 468